Release Notes for the Catalyst 4500 Series Switch, Cisco IOS Releases 12.2(54)SGx and 12.2(53)SGx
Cisco IOS Software Packaging for the Cisco Catalyst 4500 Series
Catalyst 4500 Series Switch Cisco IOS Release Strategy
Cisco IOS Software Migration Guide
Supported Hardware on Catalyst 4500 Series Switch
Supported Hardware on Catalyst 4500 E-Series Switch
Supported Features on the Catalyst 4500 Series Switch
Features Unique to Supervisor Engines 6-E and 6L-E
New Hardware Features in Release12.2(54)SG1
New Software Features in Release12.2(54)SG1
New Hardware Features in Release12.2(54)SG
New Software Features in Release12.2(54)SG
New Hardware Features in Release 12.2(53)SG6
New Software Features in Release 12.2(53)SG6
New Hardware Features in Release 12.2(53)SG5
New Software Features in Release 12.2(53)SG5
New Hardware Features in Release 12.2(53)SG4
New Software Features in Release 12.2(53)SG4
New Hardware Features in Release12.2(53)SG3
New Software Features in Release12.2(53)SG3
New Hardware Features in Release12.2(53)SG2
New Software Features in Release12.2(53)SG2
New Hardware Features in Release12.2(53)SG1
New Software Features in Release12.2(53)SG1
New Hardware Features in Release12.2(53)SG
New Software Features in Release12.2(53)SG
New Hardware Features in Release12.2(52)XO
New Software Features in Release12.2(52)XO
New Hardware Features in Release12.2(52)SG
New Software Features in Release12.2(52)SG
New Hardware Features in Release 12.2(50)SG3
New Software Features in Release 12.2(50)SG3
New Hardware Features in Release 12.2(50)SG2
New Software Features in Release 12.2(50)SG2
New Hardware Features in Release12.2(50)SG1
New Software Features in Release12.2(50)SG1
New Hardware Features in Release12.2(50)SG
New Software Features in Release12.2(50)SG
New Hardware Features in Release12.2(46)SG
New Software Features in Release12.2(46)SG
New Hardware Features in Release12.2(44)SG
New Software Features in Release12.2(44)SG
New Hardware Features in Release12.2(40)SG
New Software Features in Release12.2(40)SG
Identifying an +E Chassis and ROMMON
Guidelines for Upgrading the ROMMON
Upgrading the Supervisor Engine ROMMON from the Console
Upgrading the Supervisor Engine ROMMON Remotely Using Telnet
Upgrading the Cisco IOS Software
For Supervisor Engines II+Plus through V-10GE
For Supervisor Engine 6-E and Supervisor Engine 6L-E
Open Caveats for Cisco IOS Release 12.2(54)SG1
Resolved Caveats in Cisco IOS Release 12.2(54)SG1
Open Caveats for Cisco IOS Release 12.2(54)SG
Resolved Caveats in Cisco IOS Release 12.2(54)SG
Open Caveats for Cisco IOS Release 12.2(53)SG11
Resolved Caveats for Cisco IOS Release 12.2(53)SG11
Open Caveats for Cisco IOS Release 12.2(53)SG10
Resolved Caveats in Cisco IOS Release 12.2(53)SG10
Open Caveats for Cisco IOS Release 12.2(53)SG9
Resolved Caveats in Cisco IOS Release 12.2(53)SG9
Open Caveats for Cisco IOS Release 12.2(53)SG8
Resolved Caveats in Cisco IOS Release 12.2(53)SG8
Open Caveats for Cisco IOS Release 12.2(53)SG7
Resolved Caveats in Cisco IOS Release 12.2(53)SG7
Open Caveats for Cisco IOS Release 12.2(53)SG6
Resolved Caveats in Cisco IOS Release 12.2(53)SG6
Open Caveats for Cisco IOS Release 12.2(53)SG5
Resolved Caveats in Cisco IOS Release 12.2(53)SG5
Open Caveats for Cisco IOS Release 12.2(53)SG4
Resolved Caveats in Cisco IOS Release 12.2(53)SG4
Open Caveats for Cisco IOS Release 12.2(53)SG3
Resolved Caveats in Cisco IOS Release 12.2(53)SG3
Open Caveats for Cisco IOS Release 12.2(53)SG2
Resolved Caveats in Cisco IOS Release 12.2(53)SG2
Open Caveats for Cisco IOS Release 12.2(53)SG1
Resolved Caveats in Cisco IOS Release 12.2(53)SG1
Open Caveats for Cisco IOS Release 12.2(53)SG
Resolved Caveats in Cisco IOS Release 12.2(53)SG
Open Caveats for Cisco IOS Release 12.2(52)XO
Resolved Caveats in Cisco IOS Release 12.2(52)XO
Open Caveats for Cisco IOS Release 12.2(52)SG
Resolved Caveats in Cisco IOS Release 12.2(52)SG
Open Caveats for Cisco IOS Release 12.2(50)SG8
Resolved Caveats in Cisco IOS Release 12.2(50)SG8
Open Caveats for Cisco IOS Release 12.2(50)SG7
Resolved Caveats in Cisco IOS Release 12.2(50)SG7
Open Caveats for Cisco IOS Release 12.2(50)SG6
Resolved Caveats in Cisco IOS Release 12.2(50)SG6
Open Caveats for Cisco IOS Release 12.2(50)SG5
Resolved Caveats in Cisco IOS Release 12.2(50)SG5
Open Caveats for Cisco IOS Release 12.2(50)SG4
Resolved Caveats in Cisco IOS Release 12.2(50)SG4
Open Caveats for Cisco IOS Release 12.2(50)SG3
Resolved Caveats in Cisco IOS Release 12.2(50)SG3
Open Caveats for Cisco IOS Release 12.2(50)SG2
Resolved Caveats in Cisco IOS Release 12.2(50)SG2
Open Caveats for Cisco IOS Release 12.2(50)SG1
Resolved Caveats in Cisco IOS Release 12.2(50)SG1
Open Caveats in Cisco IOS Release 12.2(50)SG
Resolved Caveats in Cisco IOS Release 12.2(50)SG
Open Caveats in Cisco IOS Release 12.2(46)SG
Resolved Caveats in Cisco IOS Release 12.2(46)SG
Open Caveats in Cisco IOS Release 12.2(44)SG1
Resolved Caveats in Cisco IOS Release 12.2(44)SG1
Open Caveats in Cisco IOS Release 12.2(44)SG
Resolved Caveats in Cisco IOS Release 12.2(44)SG
Open Caveats in Cisco IOS Release 12.2(40)SG
Resolved Caveats in Cisco IOS Release 12.2(40)SG
Troubleshooting at the System Level
Obtaining Documentation and Submitting a Service Request
Current Release
12.2(53)SG11—August 18, 2014
Previous Releases
12.2(54)SG1, 12.2(54)SG, 12.2(53)SG10, 12.2(53)SG9, 12.2(53)SG8, 12.2(53)SG7, 12.2(53)SG6, 12.2(53)SG5, 12.2(53)SG4, 12.2(53)SG3, 12..2(53)SG2, 12.2(53)SG1, 12.2(53)SG, 12.2(52)XO, 12.2(52)SG, 12.2(50)SG8, 12.2(50)SG7, 12.2(50)SG6, 12.2(50)SG5, 12.2(50)SG4, 12.2(50)SG3, 12.2(50)SG2, 12.2(50)SG1, 12.2(50)SG, 12.2(46)SG, 12.2(44)SG1, 12.2(44)SG, 12.2(40)SG
These release notes describe the features, modifications, and caveats for the Cisco IOS software on the Catalyst 4500 series switch. The most current software release is Cisco IOS Release 12.2(54)SG.
Support for Cisco IOS Software Release 12.2(54SG, the default image, follows the standard Cisco Systems® support policy, available at
http://www.cisco.com/en/US/products/products_end-of-life_policy.html
Note Although their Release Notes are unique, the 4 platforms (Catalyst 4500, Catalyst 4900,
Catalyst ME 4900, and Catalyst 4900M/4948E) use the same Software Configuration Guide, Command Reference Guide, and System Message Guide.
For more information on the Catalyst 4500 series switches, visit the following URL:
http://www.cisco.com/go/cat4500/docs
This publication consists of these sections:
A new Cisco IOS Software package for Cisco Catalyst 4500 Series Switches was introduced in Cisco IOS Software Release 12.2(25)SG. It is a new foundation for features and functionality and provides consistency across all Cisco Catalyst switches. The new Cisco IOS Software release train is designated as 12.2SG.
Prior Cisco Catalyst 4500 Series IOS Software images for the Cisco Catalyst 4500 Series Switches, formerly known as Basic Layer 3 and Enhanced Layer 3, now map to IP Base and Enterprise Services, respectively. All currently shipping Cisco Catalyst 4500 software features based on Cisco IOS Software are supported in the IP Base image of Release 12.2(54)SG, with a few exceptions.
The IP Base image does not support enhanced routing features such as NSF/SSO, BGP, EIGRP, EIGRPv6, OSPF, OSPFv3, IS-IS, Internetwork Packet Exchange (IPX), AppleTalk, VRF-lite, and Policy-Based Routing (PBR). The IP Base image supports EIGRP-Stub for limited routing on Supervisor Engines II-Plus, II-Plus-TS, II-Plus-10GE, IV, V, V-10GE, and 6-E.
The Enterprise Services image supports all Cisco Catalyst 4500 Series software features based on Cisco IOS Software, including enhanced routing. Customers planning to enable BGP for Supervisor Engine IV, V, or V-10GE will no longer need to purchase a separate BGP license (FR-IRC4) because BGP is included in the Enterprise Services package. Beginning with 12.2(53)SG2, we support the Enterprise Services image on Supervisor Engine 6L-E.
Cisco IOS Release 12.2(46)SG1 introduced a new LAN Base software and an IP upgrade image. These complement the existing IP Base and Enterprise Services images. The LAN base image is supported on the Supervisor Engine II-Plus-10GE and Supervisor Engine 6L-E starting with
Cisco IOS Release 12.2(52)XO. LAN Base image is primarily focused on customer access and Layer 2 requirements and therefore many of the IP Base features are not required. The IP upgrade image is available if at a later date you require some of those features.
Table 1 contrasts feature support on the LAN Base vs IP Base images.
For information on MiBs support, pls refer to this URL:
http://ftp.cisco.com/pub/mibs/supportlists/cat4000/cat4000-supportlist.html
Cisco IOS Release 12.2SG train offers the latest features for the Catalyst 4500 Series supervisor engines. Customers with Catalyst 4500 Series supervisor engines who need the latest hardware support and software features should migrate to Cisco IOS Release 12.2(54)SG.
Note As part of the Cisco IOS Reformation effort, Cisco IOS Releases 12.2EW and 12.2SG are the same release train with a name change.
Catalyst 4500 Series has three maintenance trains. The Cisco IOS Release 12.2(31)SGA train is the longest living train. Currently, the Cisco IOS Release 12.2(31)SGA8 is the recommended release for customers who require a release with a maintenance train.The Cisco IOS Release 12.2(53)SG is the latest maintenance train and includes the most recent features including support for the WS-X45-Sup6L-E supervisor engine and OSPF for routed Access.
For more information on the Catalyst 4500 series switches, visit the following URL:
http://www.cisco.com/go/cat4500/docs
Figure 1 displays the two active, 12.2(31)SGA and 12.2(50)SG, and newly introduced 12.2(53)SG extended maintenance trains.
Figure 1 Software Release Strategy for the Catalyst 4500 Series Switch
Support for Cisco IOS Software Release 12.2(54)SG follows the standard Cisco Systems® support policy, available at
http://www.cisco.com/en/US/products/products_end-of-life_policy.html
This section describes the system requirements:
Table 2 lists the hardware supported on the Catalyst 4500 Series Switch.
For Catalyst 4500 transciever module compatibility information, see the url:
http://www.cisco.com/en/US/products/hw/modules/ps5455/products_device_support_tables_list.html
Table 3 briefly describes the four chassis in the Catalyst 4500 Series Switch. For the chassis listed in the table, refer to Table 6 for software release information.
In addition to the classic line cards and supervisor engines, Cisco IOS Software Release 12.2(54)SG supports the next-generation high-performance E-Series Supervisor Engine 6-E with CenterFlex technology and E-Series line cards and chassis. A brief list of primary E-Series hardware supported on Catalyst 4500 series switch ( Table 5 ).
Table 6 outlines the chassis and supervisor engine compatibility.
(M=Minimum release, R=Recommended release)
Table 7 lists the Cisco IOS software features for the Catalyst 4500 Series Switch.
Storm Control: Per-Port Multicast Suppression (Sup 6-E only) |
Multicast Storm Control1 |
Layer 2 transparent bridging2 |
Layer 2 MAC3 learning, aging, and switching by software |
VMPS4 Client |
Private VLAN trunks5 |
ISL6-based VLAN encapsulation (excluding blocking ports on WS-X4418-GB and WS-X4412-2GB-T)7 |
No. of VLAN support per switch: 2048 (for LAN Base), 4096 (for IP Base) |
802.1Q Tunneling (Q in Q)8 |
ANCP Client9 |
Bidiectional PIM10 |
IP and IP multicast routing and switching between Ethernet ports |
IP Multicast Load Splitting (Equal Cost Multipath (ECMP) using S, G and Next-hop) |
Classless routing11 |
PBR12 |
Cisco Modular QoS Command-Line Interface (Sup 6-E and Sup 6L-E only) |
CEF13 load balancing |
uRPF14 (Sup 6-E and Sup 6L-E only) |
Multicast VRF-lite15 |
Route Leaking16 |
IS-IS17 |
DTP18 |
RIP19 and RIP II |
EIGRP20 |
OSPF21 |
OSPF for Routed Access22 |
BGP423 |
MBGP24 |
MSDP25 |
ICMP26 Router Discovery Protocol |
PIM27—sparse and dense mode |
DVMRP28 |
NTP29 |
VRRP30 |
SCP31 |
GLBP32 |
Load balancing for routed traffic, based on source and destination IP addresses |
Link Layer Discovery Protocol Media Endpoint Discovery (LLDP-MED) |
Authentication, authorization, and accounting using TACACS+ and RADIUS protocol |
Selecting Mode of Capturing Control Packets (Not supported on Sup 6-E) |
HSRP33 over Ethernet, EtherChannels - 10/100/1000Mbps, 10 Gbps |
IGMP snooping version1, version 2, and version 3 (Full Support) |
SSH version 1 and version 234 |
UDLR35 |
SNMP36 version 1, version 2, and version 3 |
IPv6 Multicast Listener Discovery Snooping (Sup 6-E and 6L-E only) |
DHCP Relay Agent for IPv6 37 |
802.1X Multiple Domain Authentication and Multiple Authorization |
PPPoE Intermediate Agent38 |
Cisco NAC39 Layer 2 802.1X |
Router standard and extended ACLs 40on all ports with no performance penalty |
Identity 4.1 ACL Policy Enforcement41 |
PACL42 |
Dynamic Multi-Protocol Ternary Content Addressable Memory (Sup 6-E and Sup 6L-E only) |
Per-port QoS43 rate-limiting and shaping |
PoE44 |
Enhanced Power over Ethernet Support (Sup 6-E and Sup 6L-E only) |
RPR45 |
SSO46 |
Non-stop Forwarding Awareness for EIGRP-stub in IP base for all supervisor engines |
ISSU47 |
OSPF and EIGRP Fast Convergence48 |
CNA49 |
CLI to turn off Auto MDIX50 |
Service-Aware Resource Allocation (Sup 6-E and Sup 6L-E only) |
High Availability: 2+2 10GE or 4+4 1GE active uplinks (Sup 6-E only) |
EEM51 |
IP/SLA52 |
Embedded management53 |
Eight configurable queues per port (Sup 6-E and Sup 6L-E only) |
OBFL54 |
DHCPv6 Relay - Persistent Interface ID option DHCPv6 Relay Agent notification for Prefix Delegation |
PIM Accept Register - Rogue Multicast Server Protection55 |
Fa1 interface (Ethernet management port)56 |
With Cisco IOS Release 12.2(54)SG, the following features are available only with
Supervisor Engine 6-E and Supervisor Engine 6L-E:
– IPv6 Addressing Architecture
– DNS resolver for AAAA over an IPv4 transport
– DNS resolver for AAAA over an IPv6 transport
– ISATAP (supported in software only)
– MLD Snooping (supported in software and hardware on Catalyst 4900M, Catalyst 4948E, Supervisor Engine 6-E, and Catalyst 6L-E)
– Two Rate three Color Policing
– Table map support for marking
– Class based queuing actions (shaping/bandwidth/queue-limit/dbl/strict priority)
For all Supervisor Engines (II-Plus thru 6-E), the following features are not supported in Cisco IOS Release 12.2(54)SG for the Catalyst 4500 series switches:
– Standard Xerox Network System (XNS) access list
– Protocol type-code access list
– <1200-1299> IPX summary address access list
These sections describe the new and changed information for the Catalyst 4500 series switch running Cisco IOS software:
Release 12.2(54)SG1 provides the following new hardware on the Catalyst 4500 series switch:
Release 12.2(54)SG provide no new software features on the Catalyst 4500 series switch.
Release 12.2(54)SG provides the following new hardware on the Catalyst 4500 series switch:
Release 12.2(54)SG provides the following new software features on the Catalyst 4500 series switch:
For details, refer to the URL:
http://www.cisco.com/en/US/docs/switches/datacenter/sw/5_x/nx-os/system_management/configuration/guide/sm_12eem.html
For details refer to the URL:
http://www.cisco.com/en/US/docs/ios/saf/configuration/guide/saf_cg.html
For details refer to the URL:
http://www.cisco.com/en/US/docs/switches/lan/energywise/phase2/ios/configuration/guide/ew_v2.html
For details refer to the URL:
http://www.cisco.com/en/US/docs/ios/netmgmt/configuration/guide/nm_xmlpi_v1.html
Release 12.2(53)SG6 provides no new hardware for the Catalyst 4500 series switch.
Release 12.2(53)SG6 provides no new features for the Catalyst 4500 series switch.
Release 12.2(53)SG5 provides no new hardware for the Catalyst 4500 series switch.
Release 12.2(53)SG5 provides no new features for the Catalyst 4500 series switch.
Release 12.2(53)SG4 provides the following new hardware on the Catalyst 4500 series switch:
Release 12.2(53)SG4 provides no new features for the Catalyst 4500 series switch.
Release 12.2(53)SG3 provides the following new hardware on the Catalyst 4500 series switch:
Note This set of optics is not supported on Cisco IOS Release 12.2(54)SG and Cisco IOS XE Release 3.1.0 SG. However, the same set of optics is supported on Cisco IOS Release 15.0(2)SG and Cisco IOS XE Release 3.2.0(SG).
Release 12.2(53)SG3 provides no new features for the Catalyst 4500 series switch.
Release 12.2(53)SG2 provides no new hardware for the Catalyst 4500 series switch.
Release 12.2(53)SG2 provides no new features for the Catalyst 4500 series switch.
Release 12.2(53)SG1 provides no new hardware for the Catalyst 4500 series switch.
Release 12.2(53)SG1 provides no new features for the Catalyst 4500 series switch.
Release 12.2(53)SG does not provide any new hardware for the Catalyst 4500 series switch. However, it does integrate Supervisor Engine 6L-E, introduced in 12.2(52)XO.
Release 12.2(53)SG provides the following Cisco IOS software features for the Catalyst 4500 series switch:
OSPF for Routed Access is designed specifically to enable customers to extend Layer 3 routing capabilities to the access or Wiring Closet.
Note OSPF for Routed Access supports only one OSPFv2 and one OSPFv3 instance with a maximum number of 200 dynamically learned routes.
With the typical topology (hub and spoke) in a campus environment, where the wiring closets (spokes) are connected to the distribution switch (hub) forwarding all nonlocal traffic to the distribution layer, the wiring closet switch need not hold a complete routing table. A best practice design, where the distribution switch sends a default route to the wiring closet switch to reach inter-area and external routes (OSPF stub or totally stub area configuration) should be used when OSPF for Routed Access is used in the wiring closet.
http://www.cisco.com/en/US/docs/switches/lan/catalyst4500/12.2/54sg/configuration/guide/automacr.html
The OSPF for Routed Access feature adheres to the following software restrictions:
– Limit the number of OSPF instances to one on OSPFv2 and one on OSPFv3.
– Limit number of dynamic routes learned through platform dependant work to 200.
Refer to the following link for more details:
http://www.cisco.com/en/US/docs/solutions/Enterprise/Campus/routed-ex.html
With Cisco IOS Release 12.2(53)SG, the IP Base image supports OSPF for routed access. The Enterprise Services image is required if you need multiple OSPFv2 and OSPFv3 instances without route restrictions. Additionally, Enterprise Services is required to enable the VRF-lite feature.
Release 12.2(52)XO provides the following new hardware for the Catalyst 4500 series switch:
Note Only supported on 3, 6, and 7 slot chassis and IP LAN and IP BASE images
Note This release is equivalent in functionality to 12.2(52)SG, but adds support for the new Sup6L-E supervisor. The only supervisor engine it supports is Supervisor Engine 6L-E; for all other supervisor engines, use 12.2(52)SG instead.
Release 12.2(52)XO provides the following Cisco IOS software features for the Catalyst 4500 series switch:
– DHCPv6 Ethernet Remote ID option
– DHCPv6 Relay - Persistent Interface ID option DHCPv6 Relay Agent notification for Prefix Delegation
Release 12.2(52)SG provides the following new hardware for the Catalyst 4500 series switch:
Release 12.2(52)SG provides the following Cisco IOS software features for the Catalyst 4500 series switch:
– DHCPv6 Ethernet Remote ID option
– DHCPv6 Relay - Persistent Interface ID option DHCPv6 Relay Agent notification for Prefix Delegation
Release 12.2(50)SG3 provides the following hardware for the Catalyst 4500 series switch:
Hot-swappable input/output (I/O) converter module that fits into a 10-Gigabit Ethernet X2 slot on a switch or line card module. Hosts one 10-Gigabit Ethernet SFP+ transceiver module.
Release 12.2(50)SG3 provides no new features for the Catalyst 4500 series switch.
Release 12.2(50)SG2 provides no new hardware for the Catalyst 4500 series switch.
Release 12.2(50)SG2 provides no new features for the Catalyst 4500 series switch.
Release 12.2(50)SG1 provides no new hardware for the Catalyst 4500 series switch.
Release 12.2(50)SG1 provides the following Cisco IOS software features for the Catalyst 4500 series switch:
For information on EEM, see the URL:
http://www.cisco.com/en/US/products/ps6815/products_ios_protocol_group_home.html
Note In addition to the classic line cards and supervisor engines, Cisco IOS Software Release 12.2(50)SG supports the next-generation high-performance E-Series Supervisor Engine 6-E with CenterFlex technology and E-Series line cards and chassis.
Release 12.2(50)SG provides the following new hardware for the Catalyst 4500 series switch:
Release 12.2(50)SG provides the following Cisco IOS software features for the Catalyst 4500 series switch:
Note The following chapter references are for the Catalyst 4500 Series Switch Cisco IOS Software Configuration Guide.
Note The implementation for multiple spanning tree (MST) changed from the previous release. Multiple STP (MSTP) complies with the IEEE 802.1s standard. Previous MSTP implementations were based on a draft of the IEEE 802.1s standard.
Note The link up/down information in the CDP Second Port Status TLV (added by the Cisco IP Phones Host Movement Detection enhancement) allows the switch to de-authenticate devices which were previously authenticated. The phone must have firmware release 8.1(1) or later to generate this CDP TLV.
For more information, refer to the following URLs:
http://www.cisco.com/en/US/docs/switches/lan/trustsec/configuration/guide/trustsec.html
Note In addition to the classic line cards and supervisor engines, Cisco IOS Software Release 12.2(46)SG supports the next-generation high-performance E-Series Supervisor Engine 6-E with CenterFlex technology and E-Series line cards and chassis.
Release 12.2(46)SG provides the following new hardware for the Catalyst 4500 series switch:
Release 12.2(46)SG provides the following Cisco IOS software features for the Catalyst 4500 series switch:
Note The following chapter references are for the Catalyst 4500 Series Switch Cisco IOS Software Configuration Guide.
– 802.1X Critical Authentication
On all the Supervisor Engines (II-Plus thru 6-E)
– Reliable Backup Static Routing with EOT
Note The implementation for multiple spanning tree (MST) changed from the previous release. Multiple STP (MSTP) complies with the IEEE 802.1s standard. Previous MSTP implementations were based on a draft of the IEEE 802.1s standard.
Note In addition to the classic line cards and supervisor engines, Cisco IOS Software Release 12.2(44)SG supports the next-generation high-performance E-Series Supervisor Engine 6-E with CenterFlex technology and E-Series line cards and chassis.
Release 12.2(44)SG provides the following new hardware for the Catalyst 4500 series switch:
Release 12.2(44)SG provides the following Cisco IOS software features for the Catalyst 4500 series switch:
Note The following chapter references are for the Catalyst 4500 Series Switch Cisco IOS Software Configuration Guide.
On all the Supervisor Engines (II-Plus thru 6-E)
For details, refer to the EEM Home Page:
http://www.cisco.com/en/US/products/ps6815/products_ios_protocol_group_home.html
For details, refer to the ESM Home Page:
http://www.cisco.com/en/US/docs/ios/12_3t/12_3t2/feature/guide/gt_esm.html
After configuring VSS dual-active on a Catalyst 6500 switches, the Catalyst 4500 series switch can detect VSS dual-active with PagP+ support.
Note The implementation for multiple spanning tree (MST) changed from the previous release. Multiple STP (MSTP) complies with the IEEE 802.1s standard. Previous MSTP implementations were based on a draft of the IEEE 802.1s standard.
Note In addition to the classic line cards and supervisor engines, Cisco IOS Software Release 12.2(40)SG supports the next-generation high-performance E-Series Supervisor Engine 6-E with CenterFlex technology and E-Series line cards and chassis.
A brief list of primary E-Series hardware supported by Cisco IOS Release 12.2(40)SG includes the following:
Release 12.2(40)SG provides the following Cisco IOS software features for the Catalyst 4500 series switch:
Note The following chapter references are for the Catalyst 4500 Series Switch Cisco IOS Software Configuration Guide.
Only available on Supervisor Engine 6-E
Only available on Supervisor Engines II-Plus thru V-10GE
Available on all Supervisor Engines (II-Plus thru 6-E)
Note The implementation for multiple spanning tree (MST) changed from the previous release. Multiple STP (MSTP) complies with the IEEE 802.1s standard. Previous MSTP implementations were based on a draft of the IEEE 802.1s standard.
In most cases, upgrading the switch to a newer release of Cisco IOS software does not require a ROMMON upgrade. However, if you are running an early release of Cisco IOS software and plan to upgrade, refer to the following tables for the minimum Cisco IOS image and the recommended ROMMON release, respectively.
Note You must upgrade to ROMMON Release 12.2(44r)SG5 to run Cisco IOS Release 12.2(54)SG on the Supervisor Engine 6-E and Supervisor Engine 6L-E.
The following sections describe how to upgrade your switch software:
An +E chassis is identified by a FRU minor value in the chassis' idprom.
When supervisor engine 1 (sup1) is in ROMMON and supervisor engine 2 (sup2) is in IOS, only sup2 can read the idprom contents of chassis’ idprom. Chassis type is displayed as “+E” in the output of the show version command. Conversely, sup1 can only display the chassis type as “E.”
When both sup1 and sup2 are in ROMMON, both engines can read the chassis’ idprom. Chassis type is displayed correctly as “+E” in the output of the show version command.
When both sup1 and sup2 are in IOS, both engines can read the chassis’ idprom. Chassis type is displayed correctly as “+E” in the output of the show version command.
Note The examples in this section use the programmable read-only memory (PROM) upgrade version 12.1(20r)EW1 and Cisco IOS Release 12.1(20)EW1. For other releases, replace the ROMMON release and Cisco IOS software release with the appropriate releases and filenames.
Follow this procedure to upgrade your supervisor engine ROMMON:
Step 1 Directly connect a serial cable to the console port of the supervisor engine.
Note This section assumes that the console baud rate is set to 9600 (default). If you want to use a different baud rate, change the configuration register value for your switch.
Step 2 Download the cat4000-ios-promupgrade-121_20r_EW1 program from Cisco.com, and place it on a TFTP server in a directory that is accessible from the switch that is upgraded.
The cat4000-ios-promupgrade-121_20r_EW1 programs are available on Cisco.com at the same location from which you download Catalyst 4000 system images.
Step 3 Use the dir bootflash: command to ensure that there is sufficient space in Flash memory to store the PROM upgrade image. If there is insufficient space, delete one or more images, and then enter the
squeeze bootflash: command to reclaim the space.
If you are using a CompactFlash card, replace bootflash: with slot0:.
Step 4 Download the cat4000-ios-promupgrade-121_20r_EW1 program into Flash memory using the copy tftp command.
The following example shows how to download the PROM upgrade image cat4000-ios-promupgrade-121_20r_EW1 from the remote host 172.20.58.78 to bootflash:
Step 5 Enter the reload command to reset the switch, press Ctrl-C to stop the boot process, and re-enter ROMMON.
The following example shows the output after a reset into ROMMON:
Step 6 Run the PROM upgrade program by entering this command:
boot bootflash:cat4000-ios-promupgrade-121_20r_EW1
The following example shows the output from a successful upgrade, followed by a system reset:
Step 7 Boot the Cisco IOS software image, and enter the show version command to verify that ROMMON has been upgraded to 12.1(20r)EW1.
Step 8 Use the delete command to delete the PROM upgrade program from bootflash and the squeeze command to reclaim unused space.
The following example shows how to delete the cat4000-ios-promupgrade-121_20r_EW1 image from bootflash and reclaim unused space:
Step 9 Use the show version command to verify that the ROMMON has been upgraded
The ROMMON has now been upgraded.
See the “Upgrading the Cisco IOS Software” section for instructions on how to upgrade the Cisco IOS software on your switch.
Follow this procedure to upgrade your supervisor engine ROMMON to Release 12.1(20r)EW1. This procedure can be used when console access is not available and when the ROMMON upgrade must be performed remotely.
Note In the following section, use the PROM upgrade version cat4000-ios-promupgrade-121_20r_EW1.
Step 1 Establish a Telnet session to the supervisor engine.
Note In the following discussion, we assume that at least one IP address has been assigned to either an SVI or a routed port.
Step 2 Download the cat4000-ios-promupgrade-121_20r_EW1 program from Cisco.com, and place it on a TFTP server in a directory that is accessible from the switch to be upgraded.
The cat4000-ios-promupgrade-121_20r_EW1 programs are available on Cisco.com at the same location from which you download Catalyst 4500 system images.
Step 3 Use the dir bootflash: command to ensure that there is sufficient space in Flash memory to store the PROM upgrade image. If there is insufficient space, delete one or more images, and then enter the
squeeze bootflash: command to reclaim the space.
If you are using a CompactFlash card, replace bootflash: with slot0:.
Step 4 Download the cat4000-ios-promupgrade-121_20r_EW1 program into Flash memory using the
copy tftp command.
The following example shows how to download the PROM upgrade image cat4000-ios-promupgrade-121_20r_EW1 from the remote host 172.20.58.78 to bootflash:
Step 5 Use the no boot system flash bootflash: file_name command to clear all BOOT variable commands in the configuration file. In this example, the BOOT variable was set to boot the image cat4000-i5s-mz.121-19.EW1.bin from bootflash:
Note The config-register must be set to autoboot.
Step 6 Use the show bootvar command to verify the boot string. The BOOT variable in this example will first run the PROM upgrade to upgrade ROMMON. Then, the upgrade software will reload and the supervisor engine will load the Cisco IOS software image.
Step 7 Run the PROM upgrade program by issuing the reload command. Issuing this command will terminate your Telnet session.
The following example shows the console port output from a successful ROMMON upgrade followed by a system reset. Your Telnet session is disconnected during the ROMMON upgrade, so you will not see this output. This step could take 2-3 minutes to complete. You will need to reconnect your Telnet session after 2-3 minutes when the Cisco IOS software image and the interfaces are loaded.
Step 8 Use the no boot system flash bootflash: file_name command to clear the BOOT command used to upgrade the ROMMON.
Step 9 Use the show version command to verify that the ROMMON has been upgraded.
Step 10 Use the delete command to delete the PROM upgrade program from bootflash and the squeeze command to reclaim unused space.
The following example shows how to delete the cat4000-ios-promupgrade-121_20r_EW1 image from bootflash and reclaim unused space:
Step 11 Use the show bootvar command to verify that the ROMMON upgrade program has been removed from the BOOT variable.
The ROMMON has now been upgraded.
See the “Upgrading the Cisco IOS Software” section for instructions on how to upgrade the Cisco IOS software on your switch.
Before you proceed, observe the following rules for hostname:
Uppercase and lowercase characters look the same to many internet software applications. It may seem appropriate to capitalize a name the same way you might do in English, but conventions dictate that computer names appear all lowercase. For more information, refer to RFC 1178, Choosing a Name for Your Computer.
To upgrade the Cisco IOS software on your Catalyst 4500 series switch, use this procedure:
Step 1 Download Cisco IOS Release 12.1(20)EW from Cisco.com, and place the image on a TFTP server in a directory that is accessible from the supervisor engine that is upgraded.
Step 2 Use the dir bootflash: command to ensure that there is sufficient space in Flash memory to store the promupgrade image. If there is insufficient space, delete one or more images, and then enter the squeeze bootflash: command to reclaim the space.
If you are using a CompactFlash card, use slot0: instead of bootflash.
Step 3 Download the software image into Flash memory using the copy tftp command.
The following example shows how to download the Cisco IOS software image cat4000-is-mz.121-12c.EW from the remote host 172.20.58.78 to bootflash:
Step 4 Use the no boot system flash bootflash: file_name command to clear the cat4000-is-mz.121-8a.EW file and to save the BOOT variable.
The following example shows how to clear the BOOT variable:
Step 5 Use the boot system flash command to add the Cisco IOS software image to the BOOT variable.
The following example shows how to add the cat4000-is-mz.121-12c.EW image to the BOOT variable:
Step 6 Use the config-register command to set the configuration register to 0x2102.
The following example show how to set the second least significant bit in the configuration register:
Step 7 Enter the reload command to reset the switch and load the software.
The following example shows the output from a successful upgrade followed by a system reset:
Step 8 Use the show version command to verify that the new Cisco IOS release is operating on the switch.
These sections list the limitations and restrictions for the current release of Cisco IOS software on the Catalyst 4500 series switch.
– Fast UDLD is disabled by default.
– Configure fast UDLD only on point-to-point links between network devices that support fast UDLD.
– You can configure fast UDLD in either normal or aggressive mode.
– Do not enter the link debounce command on fast UDLD ports.
– Configure fast UDLD on at least two links between each connected network device. This reduces the likelihood of fast UDLD incorrectly error disabling a link due to false positives.
– Fast UDLD does not report a unidirectional link if the same error occurs simultaneously on more than one link to the same neighbor device.
The outputs of certain commands, such as show ip route and show access-lists, contain non-deterministic text. While the output is easily understood, the output text does not contain strings that are consistently output. A general purpose specification file entry is unable to parse all possible output.
While a general purpose specification file entry may not be possible, a specification file entry might be created that returns the desired text by searching for text that is guaranteed to be in the output. If a string is guaranteed to be in the output, it can be used for parsing.
For example, the output of the show ip access-lists SecWiz_Gi3_17_out_ip command is this:
The first line is easily parsed because access list is guaranteed to be in the output:
The remaining lines all contain the term host. As a result, the specification file may report the desired values by specifying that string. For example, this line
will produce the following for the first and second rules
and the following for the third statement
Request the output of the show running-config command using NETCONF and parse that output for the desired strings. This is useful when the desired lines contain nothing in common. For example, the rules in this access list do not contain a common string and the order (three permits, then a deny, then another permit), prevent the spec file entry from using permit as a search string, as in the following example:
The XML output of show running-config command includes the following, which can then be parsed programmatically, as desired:
– Unnumbered interface and numbered interface in different VRFs
– GRE encapsulation forwarding method
– Hash bucket based assignment method
– Redirection on an egress interface (redirection out)
– NHRP (Next Hop Resolution Protocol)
– AppleTalk Control Protocol for PPP
– NetFlow will not account for control packets, packets that encountered link-level errors, and ARP/RARP packets.
– The software cache for NetFlow is fixed, users cannot change the size.
– The statistical distribution row that displays the distribution across various packet sizes is not available.
– Packet length-based matching policies are not supported.
– IP Precedence, TOS and Qos groups are fixed.
– ACL/Route-map statistics are not updated.
Workaround: Configure the NSF interval timer to 0 minutes, or delay entering the issu runversion command until the NSF interval timer expires and NSF restarts.
For example, if the active supervisor engine is in slot 1, and you have configured interface Gi1/1, the supervisor engine in slot 2 becomes active if you remove the active supervisor engine from the chassis. In addition, while the startup configuration file is being parsed, you will receive an error message indicating that interface Gi1/1 is no longer present. This behavior is correct. When the formerly active supervisor engine is reinserted into slot 1, there is no configuration for interface Gi1/1.
This situation does not occur when both supervisor engines are present in the chassis.
Workaround: Copy the startup configuration file into the running configuration:
Workaround: Display the configuration with the show standby command, then remove the CLI. Here is an example of the show standby GigabitEthernet1/1 command output:
Use the standby delay reload option if the router is rebooting after reloading the image.
Workaround: Because the problem is caused by mismatched MTUs, you should change the MTU on either router to match the other’s MTU.
Workaround: Remove and reinsert the standby supervisor engine after the active supervisor engine boots. (CSCsa66509)
If this message appears, verify that the switch is connected to the ACS. You should also ensure that the switch has been properly configured as an AAA client on the ACS.
Workaround: Disable idle timeouts. (CSCec30214)
1. Disable inline power on the switch ports using the power inline never command.
2. Configure the media converter to autonegotiate the speed and duplex instead of running them at 100 Mbps and full duplex. (CSCee62109)
– It supports Layer 2 access port and PVLAN host port (isolated or community port).
– It does not support trunk port, Layer 3 port, or EtherChannel.
– Allow for at least three MAC addresses to access the switch: two for the phone (the MAC address of a phone gets registered to the Data domain and Voice domain), and one for the PC.
– Ensure that the data and voice VLAN IDs differ.
– As IPSG learns the static hosts on each interface, the switch CPU may achieve 100 percent if there are a large number of hosts to learn. CPU usage will drop after the hosts are learned.
– IPSG violations for static hosts are printed as they occur. If multiple violations occur simultaneously on different interfaces, the CLI displays the last violation. For example, if IPSG is configured for 10 ports and violations exist on ports 3, 6, and 9, the violation messages are printed only for port 9.
– Inactive host bindings will appear in the device tracking table when either a VLAN is associated with another port or a port is removed from a VLAN. So, as hosts are moved across subnets, the hosts appear in the device tracking table as Inactive.
– Autostate SVI does not work on EtherChannel.
– Chassis WS-C4507R-E, WS-C4510R-E
– Dual supervisor WS-X45-Sup6-E
– One or more of the models WS-X4448-GB-RJ45 or WS-X4148-FX-MT
To maximize the 10/100/1000 port density of 7- and 10-slot chassis when using redundant Supervisor Engine 6-E, install WS-X4548-GB-RJ45 instead of WS-X4448-GB-RJ45 line cards. If you require WS-X4448-GB-RJ45 line cards, two options are available:
Only four line card slots can be used on the Catalyst 4507R and six line card slots on the
Catalyst 4510R chassis.
When all slots are required, only one model WS-X4448-GB-RJ45 line card can be used.
To maximize the 100-BASE-FX port density of 7 and 10 slot chassis when using Supervisor Engine 6-E install WS-4248-FE-SFP line cards with FX optics instead of WS-X4148-FX-MT line cards. If WS-X4148-FX-MT line cards are required, two options are available:
You can use only 4 linecard slots on the Cat4507R chassis and 6 line card slots on the Cat4510R chassis.
When all slots are required, you can only use one WS-X4448-GB-RJ45 line card.
In such a scenario, the IPv6 MTU value programmed in hardware differs from the IPv6 interface MTU value. This will happen if no room exists in the hardware MTU table to store additional values.
To create room in the table, unconfigure some unused MTU values. Then, either disable or reenable IPv6 on the interface, or reapply the MTU configuration.
To enable IPSG with static hosts on a port, enter the following commands:
Note The preceding condition also applies to IPSG with static hosts on a PVLAN host port.
– Force the supplicant to use multicast EAPOL.
For example, if the active supervisor engine is in slot 1, and you have configured interface Gi1/1, the supervisor engine in slot 2 becomes active if you remove the active supervisor engine from the chassis. In addition, while the startup configuration file is being parsed, you will receive an error message indicating that interface Gi1/1 is no longer present. This behavior is correct. When the formerly active supervisor engine is reinserted into slot 1, there is no configuration for interface Gi1/1.
This situation will not occur when both supervisor engines are physically in the chassis.
Workaround: Copy the startup configuration file into the running configuration:
Workaround: Display the configuration with the show standby command, then remove the CLI. Here is an example of show standby GigabitEthernet1/1 command output:
Use the standby delay reload option if the router is rebooting after reloading the image.
Workaround: Ensure that the MTUs match.
– The verify and squeeze commands are not supported.
– The rename command is supported in FAT file system.
For Supervisor Engine 6-E, the rename command is available for bootflash and slot0. For all other supervisor engines, the rename command is supported for nvram devices only.
– The fsck command is supported for slot0 device. It is not supported in the file systems on supervisor engines other than 6-E.
– In the FAT file system, the IOS format bootflash: command erases user files only. It does not erase system configuration.
– The FAT file system supports a maximum of 63 characters for file/directory name. The maximum for path length is 127 characters.
– The FAT file system does not support the following characters in file/directory names:{}#%^ and space characters.
– The FAT file system honors the Microsoft Windows file attribute of read-only and read-write, but it does not support the Windows file hidden attribute.
– Supervisor Engine 6-E uses the FAT file system for compact flash (slot0). If a compact flash is not formatted in FAT file system (such as compact flash on a supervisor engine other than 6-E), the switch does not recognize it.
Workaround: Remove and reinsert the standby supervisor engine after the active supervisor engine boots. (CSCsa66509)
If this message appears, ensure network connectivity exists between the switch and the ACS. Also check that the switch has been properly configured as an AAA client on the ACS.
– As IPSG learns the static hosts on each interface, the switch CPU may achieve 100 percent if there are a large number of hosts to learn. The CPU usage will drop after the hosts are learned.
– IPSG violations for static hosts are printed as they occur. If multiple violations occur simultaneously on different interfaces, the CLI displays the last violation. For example, if IPSG is configured for 10 ports and violations exist on ports 3,6, and 9, the violation messages are printed only for port 9.
– Inactive host bindings will appear in the device tracking table when either a VLAN is associated with another port or a port is removed from a VLAN. So, as hosts are moved across subnets, the hosts appear in the device tracking table as inactive.
– Autostate SVI does not work on EtherChannel.
In such a scenario, the IPv6 MTU value programmed in hardware differs from the IPv6 interface MTU value. This occurs if no room exists in the hardware MTU table to store additional values.
To create room, unconfigure some unused MTU values. Then, either disable or re-enable IPv6 on the interface, or reapply the MTU configuration.
To enable IPSG with static hosts on a port, enter the following commands:
Note The preceding condition also applies to IPSG with static hosts on a PVLAN host port.
– WS-X4148-FX-MT Cisco Catalyst 4500 Fast Ethernet Switching Module, 48-port 100BASE-FX (MT-RJ)
– WS-X4448-GB-RJ45 Cisco Catalyst 4500 48-port 10/100/1000 Module (RJ-45)
The Catalyst 4503-E and Catalyst 4506-E have no caveats. The Catalyst 4507R-E configurations that use power supplies rated at 1400 W or above also have no caveats.
The following replacement switching modules will not exceed the power supply capacity for any Catalyst 4500-E chassis:
Refer to the Catalyst 4500 Series Module Installation Guide to determine the power requirements for all of the Catalyst 4500 linecards and the power capacities of the Catalyst 4500 power supplies.
This situation only occurs if a switch reached SSO before you removed the line card.
Caveats describe unexpected behavior in Cisco IOS releases. Caveats listed as open in a prior release are carried forward to the next release as either open or resolved.
Note All caveats in Release 12.4 also apply to the corresponding 12.1 E releases. Refer to the Caveats for Cisco IOS Release 12.4 publication at the following URL:
http://www.cisco.com/en/US/docs/ios/12_4/release/notes/124MCAVS.html
Note For the latest information on PSIRTS, refer to the Security Advisories on CCO at the following URL:
http://tools.cisco.com/security/center/publicationListing.x
This section lists the open caveats for Cisco IOS Release 12.2(54)SG1:
Workaround: Verify that the MAC addresses being transmitted through the system are learned.
Workaround: None. (CSCeg48586)
– If such a certificate does not exist and the device's hostname and default_domain are set, then a persistent self-signed certificate is generated.
– If such a certificate exists, the FQDN in the certificate is compared with the current device's hostname and default_domain. If either differs from the FQDN in the certificate, the existing persistent self-signed certificate is replaced with a new one with the updated FQDN. Be aware that the existing keypair is used in the new certificate.
On a switch that supports redundancy, the generation of the self-signed certificate occurs independently on the active and the standby supervisor engines, and the certificates differ. After switchover, the HTTP client that holds the old certificate cannot connect to the HTTPS server.
Workaround: Reconnect. (CSCsb11964)
This only affects a switch that has any of the following queues configured as SPAN source in releases prior to 12.2(31)SG and saved to the startup configuration. The SPAN destination would not get the same traffic after upgrading to 12.2(31)SG.
Workaround: After upgrading to 12.2(31)SG and later releases, remove the old SPAN source configuration and reconfigure with the new queue names/IDs. For example:
Workaround: None. (CSCsc11726)
This situation could occur for these reasons:
– A packet requires an IP redirect to an IP unnumbered outgoing port within 3 minutes of booting the Catalyst 4500 series switch.
– The switch administrator enters the shutdown and no shutdown commands on an outgoing interface that has enabled IP unnumbered. The switch receives packets that require redirection; and the destination MAC address is already in ARP table.
– Do not inject packets that require an IP redirect sent out to an IP unnumbered port within 3 minutes of booting the Catalyst 4500 series switch.
– Configure the correct default gateway on the host side. (CSCse75660)
Workaround: None. (CSCsg58526)
This does not affect performance.
Workaround: Enter the no shutdown command. (CSCsg27395)
Workaround: Remove the transceiver from the new port and place it in the old port. After the SFP is recognized in the old port, remove it slowly and insert it in the new port. (CSCse34693)
Workaround: None. This is an informational message. (CSCsi60898)
Workaround: None. (CSCsm30320)
Workarounds: Do one of the following:
– After a reload, copy the startup-config to the running-config.
– Use a loopback interface as the target of the ip unnumbered command.
– Change the CLI configuration so that during bootup the router port is created first.
Workaround: When the port channel starts to flap, enter shut and no shut on the port channel. After the first switchover and after deleting the port channel, create a new channel. (CSCsr00333)
Workaround: Configure an ISL/dot1q trunk port. (CSCsu43445)
Workaround: Do one of the following:
– Reload the standby switch again with the line card in place.
– Remove and reenter the commands on the active supervisor engine. The standby supervisor engine will acquire this change.
This applies to classic or E-series Catalyst 4500 supervisor engines running
Cisco IOS Release 12.2(50)SG
Workaround: None. (CSCsw14005)
If the switch were to run a supervisor switchover while in this state, the host's MAC address would not be present in the new active supervisor engine’s MAC address table, causing possible connectivity interruption on the host.
Workaround: Enter the shutdown command, followed by the no shutdown command on the interface. This triggers relearning and synchronizing of the host's MAC to the standby supervisor engine. CSCsw91661
The queue transmit counters as well as the policing statistics (if any) are correct. CSCsz20149
This only happens when the switch is running network mobility service protocol (nmsp). It does not happen if the phone is CDP enabled.
Workaround: Use the VLAN ID or name to differentiate the IP phone and the PC sitting behind the phone on the WCS.
The IP phone is detected on the voice VLAN, and the displayed information of serial number, model number, and software version is correct. However, a PC sitting behind the phone is detected on a data VLAN, and the displayed device information is wrong and should be ignored.
Workaround: When interface mode is changed from Layer2 to Layer3, manually change interface trust state by enter the cos trust dscp command. CSCta16492
Prior to Cisco IOS Release 12.2(53)SG1 and 12.2(50)SG6, the switchport block multicast command blocks IP Multicast, Layer 2 multicast, and broadcast traffic. (CSCta61825)
Despite the different default value, you can configure any value in the time range.
Workaround: Reconfigure VLAN load balancing with a different configuration, by performing the following task:
a. Reconfigure the VLAN load balancing configuration on the desired REP ports.
b. Use the shut command on any one REP port in the segment to cause a failure in that segment.
c. Use the no-shut on the same port to restore normal REP topology with one ALT port.
d. Invoke manual preemption on a primary edge port to obtain VLAN load balancing with the new configuration.
Workaround: When a log message appears indicating that the SFP+ has been removed, do one of the following:
– Enter any commands for that port.
– Insert an SFP+ in that port.
– Reinsert the removed SFP+ in any other port.
Workarounds: The Cisco switch default link-flap detection value is 5 flaps in 10 seconds. Use the default value or larger numbers. CSCtg07677
Workaround: Do shut, then no shut on the SVI. CSCtg72559
The CDP TLV generated to indicate that a data device has disconnected is ignored. This is done to avoid disconnecting other connected data clients, if any. (Refer to CSCta47293.)
Workarounds: Enter either of the following commands:
– clear authentication session interface
– authentication timer inactivity
Workaround: Remove the X2 or SFP from the port. CSCth08212
Workaround: Configure an ACL on the port. CSCte18760
Similarly, the show epm sessions command always displays the authentication method as DOT1X.
Workaround: To view the authentication method used for a client, enter the
show authentication sessions command. CSCsx42157
Workaround: None. (CSCso93282)
Workaround: Disable the ip cef accounting non-recursive command.
– Configure the switch port for mab rather than mab eap.
– Configure the AAA server to propose EAP-MD5 first rather than EAP-TLS for MAB EAP requests. CSCti78674
On a switch running Cisco IOS Release 12.2(40)SG, all MTU values configured on a line card are set to default when the module is reset. MTU values are not retained for modules that are physically moved.
Workaround: None. (CSCsk52542)
Workaround: Reinsert the X2. (CSCsk43618)
Workaround: Enter the show policy-map interface command to find the actual burst value programmed. (CSCsi71036)
If you enter the show policy-map name, however, the unconditional marking actions appear. (CSCsi94144)
Workaround: None. (CSCsl72868)
This behavior occurs in a redundant switch when the active supervisor engine is running Cisco IOS, the standby supervisor engine is in ROMMON, and the standby supervisor engine’s ROMMON is upgraded from version 0.34 or to a later version. The upgrade process causes the uplinks on the standby supervisor engine to go down but the active supervisor engine is unaware of this.
Workarounds: To resume normal operation, do one of the following:
– Reload both supervisor engines with the redundancy reload shelf command.
– Power-cycle the standby supervisor engine by briefly pulling it from the chassis.
There is no workaround for the link flap issue. (CSCsm81875)
This problem can happen when pause frames are sent to a switch port and the flow control receive configuration is toggled on a 10-Gigabit Ethernet port.
Workaround: Change the flow control receive configuration when no traffic exists. CSCso71647
Workaround: None. (CSCsq99468)
You only see this behavior if you initially did not allocate a VLAN before you configure the IFM, and then later allocate the same VLAN.
Workaround: Unconfigure, and then reconfigure the IFM on the port.
Workaround: Disable native VLAN tagging on the trunk port of the switch by entering the
no switchport trunk native vlan tag command. CSCsz12611
Workaround: No functional impact.
You must wait for the ACLs to be programmed before performing other TCAM related changes. CSCtd57063
This section lists the resolved caveats in Release 12.2(54)SG1:
Workaround: Upgrade to 12.2(53)SG3, 12.2(50)SG8, or later. CSCth00398
Note In a non-redundant chassis with the same PoE linecards, CPU utilization will not reach 80 percent.
This issue is not applicable to fixed config chassis.
Workaround: Configure spanning-tree bpdufilter enable in configuration interface mode.
If you randomly add or remove VLANs in a VLAN database, SVI traffic stops on some VLANs.
The next line in the output of the show ip ospf int command is the following:
If you now advance the output by pressing either Enter or the space bar, the device reloads and the following error message displays:
– Reload the switch when the error message displays.
– Upgrade to Cisco Catalyst Release 12.2(54)SG1, Cisco Catalyst Release 12.2(53)SG4 (and later), when available.
This section lists the open caveats for Cisco IOS Release 12.2(54)SG:
Workaround: Verify that the MAC addresses being transmitted through the system are learned.
Workaround: None. (CSCeg48586)
– If such a certificate does not exist and the device's hostname and default_domain are set, then a persistent self-signed certificate is generated.
– If such a certificate exists, the FQDN in the certificate is compared with the current device's hostname and default_domain. If either differs from the FQDN in the certificate, the existing persistent self-signed certificate is replaced with a new one with the updated FQDN. Be aware that the existing keypair is used in the new certificate.
On a switch that supports redundancy, the generation of the self-signed certificate occurs independently on the active and the standby supervisor engines, and the certificates differ. After switchover, the HTTP client that holds the old certificate cannot connect to the HTTPS server.
Workaround: Reconnect. (CSCsb11964)
This only affects a switch that has any of the following queues configured as SPAN source in releases prior to 12.2(31)SG and saved to the startup configuration. The SPAN destination would not get the same traffic after upgrading to 12.2(31)SG.
Workaround: After upgrading to 12.2(31)SG and later releases, remove the old SPAN source configuration and reconfigure with the new queue names/IDs. For example:
Workaround: None. (CSCsc11726)
This situation could occur for these reasons:
– A packet requires an IP redirect to an IP unnumbered outgoing port within 3 minutes of booting the Catalyst 4500 series switch.
– The switch administrator enters the shutdown and no shutdown commands on an outgoing interface that has enabled IP unnumbered. The switch receives packets that require redirection; and the destination MAC address is already in ARP table.
– Do not inject packets that require an IP redirect sent out to an IP unnumbered port within 3 minutes of booting the Catalyst 4500 series switch.
– Configure the correct default gateway on the host side. (CSCse75660)
Workaround: None. (CSCsg58526)
This does not affect performance.
Workaround: Enter the no shutdown command. (CSCsg27395)
Workaround: Remove the transceiver from the new port and place it in the old port. After the SFP is recognized in the old port, remove it slowly and insert it in the new port. (CSCse34693)
Workaround: None. This is an informational message. (CSCsi60898)
Workaround: None. (CSCsm30320)
Workarounds: Do one of the following:
– After a reload, copy the startup-config to the running-config.
– Use a loopback interface as the target of the ip unnumbered command.
– Change the CLI configuration so that during bootup the router port is created first.
Workaround: When the port channel starts to flap, enter shut and no shut on the port channel. After the first switchover and after deleting the port channel, create a new channel. (CSCsr00333)
Workaround: Configure an ISL/dot1q trunk port. (CSCsu43445)
Workaround: Do one of the following:
– Reload the standby switch again with the line card in place.
– Remove and reenter the commands on the active supervisor engine. The standby supervisor engine will acquire this change.
This applies to classic or E-series Catalyst 4500 supervisor engines running
Cisco IOS Release 12.2(50)SG
Workaround: None. (CSCsw14005)
If the switch were to run a supervisor switchover while in this state, the host's MAC address would not be present in the new active supervisor engine’s MAC address table, causing possible connectivity interruption on the host.
Workaround: Enter the shutdown command, followed by the no shutdown command on the interface. This triggers relearning and synchronizing of the host's MAC to the standby supervisor engine. CSCsw91661
The queue transmit counters as well as the policing statistics (if any) are correct. CSCsz20149
This only happens when the switch is running network mobility service protocol (nmsp). It does not happen if the phone is CDP enabled.
Workaround: Use the VLAN ID or name to differentiate the IP phone and the PC sitting behind the phone on the WCS.
The IP phone is detected on the voice VLAN, and the displayed information of serial number, model number, and software version is correct. However, a PC sitting behind the phone is detected on a data VLAN, and the displayed device information is wrong and should be ignored.
Workaround: When interface mode is changed from Layer2 to Layer3, manually change interface trust state by enter the cos trust dscp command. CSCta16492
Prior to Cisco IOS Release 12.2(53)SG1 and 12.2(50)SG6, the switchport block multicast command blocks IP Multicast, Layer 2 multicast, and broadcast traffic. (CSCta61825)
Despite the different default value, you can configure any value in the time range.
Workaround: Reconfigure VLAN load balancing with a different configuration, by performing the following task:
a. Reconfigure the VLAN load balancing configuration on the desired REP ports.
b. Use the shut command on any one REP port in the segment to cause a failure in that segment.
c. Use the no-shut on the same port to restore normal REP topology with one ALT port.
d. Invoke manual preemption on a primary edge port to obtain VLAN load balancing with the new configuration.
Workaround: When a log message appears indicating that the SFP+ has been removed, do one of the following:
– Enter any commands for that port.
– Insert an SFP+ in that port.
– Reinsert the removed SFP+ in any other port.
Workarounds: The Cisco switch default link-flap detection value is 5 flaps in 10 seconds. Use the default value or larger numbers. CSCtg07677
Workaround: Do shut, then no shut on the SVI. CSCtg72559
The CDP TLV generated to indicate that a data device has disconnected is ignored. This is done to avoid disconnecting other connected data clients, if any. (Refer to CSCta47293.)
Workarounds: Enter either of the following commands:
– clear authentication session interface
– authentication timer inactivity
Workaround: Remove the X2 or SFP from the port. CSCth08212
Workaround: Configure an ACL on the port. CSCte18760
Similarly, the show epm sessions command always displays the authentication method as DOT1X.
Workaround: To view the authentication method used for a client, enter the
show authentication sessions command. CSCsx42157
Workaround: None. (CSCso93282)
Workaround: Disable the ip cef accounting non-recursive command.
– Configure the switch port for mab rather than mab eap.
– Configure the AAA server to propose EAP-MD5 first rather than EAP-TLS for MAB EAP requests. CSCti78674
On a switch running Cisco IOS Release 12.2(40)SG, all MTU values configured on a line card are set to default when the module is reset. MTU values are not retained for modules that are physically moved.
Workaround: None. (CSCsk52542)
Workaround: Reinsert the X2. (CSCsk43618)
Workaround: Enter the show policy-map interface command to find the actual burst value programmed. (CSCsi71036)
If you enter the show policy-map name, however, the unconditional marking actions appear. (CSCsi94144)
Workaround: None. (CSCsl72868)
This behavior occurs in a redundant switch when the active supervisor engine is running Cisco IOS, the standby supervisor engine is in ROMMON, and the standby supervisor engine’s ROMMON is upgraded from version 0.34 or to a later version. The upgrade process causes the uplinks on the standby supervisor engine to go down but the active supervisor engine is unaware of this.
Workarounds: To resume normal operation, do one of the following:
– Reload both supervisor engines with the redundancy reload shelf command.
– Power-cycle the standby supervisor engine by briefly pulling it from the chassis.
There is no workaround for the link flap issue. (CSCsm81875)
This problem can happen when pause frames are sent to a switch port and the flow control receive configuration is toggled on a 10-Gigabit Ethernet port.
Workaround: Change the flow control receive configuration when no traffic exists. CSCso71647
Workaround: None. (CSCsq99468)
You only see this behavior if you initially did not allocate a VLAN before you configure the IFM, and then later allocate the same VLAN.
Workaround: Unconfigure, and then reconfigure the IFM on the port.
Workaround: Disable native VLAN tagging on the trunk port of the switch by entering the
no switchport trunk native vlan tag command. CSCsz12611
Workaround: No functional impact.
You must wait for the ACLs to be programmed before performing other TCAM related changes. CSCtd57063
This section lists the resolved caveats in Release 12.2(54)SG:
Prior to Cisco IOS Release 12.2(53)SG1, 12.2(50)SG6, the switchport block multicast command would block IP Multicast, Layer 2 multicast, and broadcast traffic.
Assuming that you configured authentication open on the port and a host is authenticated on that port, if you unconfigure open auth (no authentication open), the STP state becomes blocked on an authenticated port.
The connected host is authenticated so it should be able to send traffic and the STP state should be forwarding.
Workaround: Enter shut, then no shut on the port. CSCta04665
Workaround: Specify a profile name when you enter the diagnostic command.
You might want to avoid requesting on demand send for invalid modules. First, enter the
show module command to check for valid or present modules. CSCsz05888
Workaround: Shut down then reopen the interface. CSCso50921
Workaround: Before removing a linecard, delete the statically configured ip source binding entries on any of the interfaces on the line-card. (CSCsv54529)
Workaround: Replace the default interface command with the following:
Workaround: Enter shut, then no-shut on any REP port (of the same segment in which VLB is configured) in the topology. (CSCsq75342)
Workaround: Unconfigure any generic QOS policies from the system. The QoS policies with the match any attribute cause IPv6 entries to become active. If the switch is a pure Layer 2 device, remove the generic protocol family attributes and narrow it to the protocol family. (CSCsq84796)
Workaround: Unconfigure all generic QOS policies from the system. CSCsq84853
When an output service-policy is attached to an interface and if the policy is configured to apply DBL on a queue, the flows that are enqueued to the queue are subjected to the DBL algorithm. If one or more flows are classified as belligerent (flows do not back-off in response to drops because of congestion in the queue), those flows continue to be classified as belligerent even when DBL is disabled on that queue.
For this condition to persist, the transmit queues in question must remain congested for a long period of time and that congestion must be caused by flows that remain belligerent.
Workaround: Detach and re-attach the service-policy, provided the queue in question is non-default (queuing actions are not configured in the class-default class of the policy-map).
If this occurs on the default queue, modify and reset some queuing parameters like bandwidth or shape. CSCsk62457
Workaround: Configure the route map to only match on ACL(s). CSCtg22126
For the SFP+ optical modules SFP-10G-LRM, SFP-10G-LR, and SFP-10G-SRA, a Tx low power alarm displays when either IOS boots or you replace the module. This is an initial false alarm upon detection of a new SFP+ module; subsequently, it clears.
SFP and 10GBASE-CU SFP+ modules do not show this problem.
Workaround: Disable PoE (through entering the power inline never command in interface configuration mode.
In Cisco IOS Release 12.2(54)SG, you can enter the power inline autoneg-advertise command in global config mode to enable linkup. CSCtb78851
The statistics are displayed properly on the active supervisor.
Workaround: None. (CSCsk66449)
This happens provided one the following conditions apply:
– A route map matching on prefix-list is attached to an input interface as a PBR policy.
– A route map for PBR (already attached to an interface) is configured or modified to match on prefix-list(s) instead of ACL(s).
Workaround: Configure the route map for PBR to only match on ACLs.
When a packet is sent to the CPU it may ported out another interface. If so, the original CoS value for a.1X packet cannot be matched by software QoS (according to CSCsk66449). The packet is transmitted with the CoS value it was generated with (7, for the MLDv1 packets described here).
Part of the root cause of this problem is captured in CSCsk66449, which indicates that the software QoS cannot match a.1X packet. (CSCsk72544)
Workaround: Embed the graphic into the HTML file with a maximum of 256 kilobytes (according to RFC 2397).
The following browsers support RFC 2397:
This impacts restoration timing but not REP functionality. After a REP segment fails, traffic restoration time sometimes exceeds 200ms.
Workaround: Reload the active and standby supervisor engine.
While performing OIR of the supervisor engines, you must remove the engines completely before re-insertion.
Workaround: Clear the errors with the clear ethernet cfm errors command. CSCsv43819
Workaround: Enter the queue-limit command to specify an explicit queue size. CSCso06422
Workaround: Attempt an authorization after a timeout. CSCte84432
Workaround: Disable the debug management expression evaluator command. (CSCsu67323)
This occurs only if the following conditions are satisfied:
– Multi-host mode is configured on the port with the authentication host-mode multi-host command.
– Default ACL (the IP access-list) is configured on the interface specifies deny ip any any.
– Dynamic policy authorization for the client specifies permit ip any any.
Workaround: Load Cisco IOS Release 12.2(54)SG or 12.2(53)SG4 on WS-C4507R+E and WS-C4510R+E. CSCtl70275
Workaround: When using the access-list N permit host hostname command, specify the IP address of the host rather than the hostname (CSCef67489)
Workaround: Verify that the MAC addresses being transmitted through the system are learned.
Workaround: None. (CSCeg48586)
– If such a certificate does not exist and the device's hostname and default_domain are set, then a persistent self-signed certificate is generated.
– If such a certificate exists, the FQDN in the certificate is compared with the current device's hostname and default_domain. If either differs from the FQDN in the certificate, the existing persistent self-signed certificate is replaced with a new one with the updated FQDN. Be aware that the existing keypair is used in the new certificate.
On a switch that supports redundancy, the generation of the self-signed certificate occurs independently on the active and the standby supervisor engines, and the certificates differ. After switchover, the HTTP client that holds the old certificate cannot connect to the HTTPS server.
Workaround: Reconnect. (CSCsb11964)
This only affects a switch that has any of the following queues configured as SPAN source in releases prior to 12.2(31)SG and saved to the startup configuration. The SPAN destination would not get the same traffic after upgrading to 12.2(31)SG.
Workaround: After upgrading to 12.2(31)SG and later releases, remove the old SPAN source configuration and reconfigure with the new queue names/IDs. For example:
Workaround: None. (CSCsc11726)
This situation could occur for these reasons:
– A packet requires an IP redirect to an IP unnumbered outgoing port within 3 minutes of booting the Catalyst 4500 series switch.
– The switch administrator enters the shutdown and no shutdown commands on an outgoing interface that has enabled IP unnumbered. The switch receives packets that require redirection; and the destination MAC address is already in ARP table.
– Do not inject packets that require an IP redirect sent out to an IP unnumbered port within 3 minutes of booting the Catalyst 4500 series switch.
– Configure the correct default gateway on the host side. (CSCse75660)
Workaround: None. (CSCsg58526)
This does not affect performance.
Workaround: Enter the no shutdown command. (CSCsg27395)
Workaround: Remove the transceiver from the new port and place it in the old port. After the SFP is recognized in the old port, remove it slowly and insert it in the new port. (CSCse34693).
Workaround: None. This is an informational message. (CSCsi60898)
Workaround: None. (CSCsm30320)
Workarounds: Do one of the following:
– After a reload, copy the startup-config to the running-config.
– Use a loopback interface as the target of the ip unnumbered command.
– Change the CLI configuration so that during bootup the router port is created first.
Workaround: When the port channel starts to flap, enter shut and no shut on the port channel. After the first switchover and after deleting the port channel, create a new channel. (CSCsr00333)
Workaround: Before removing a line card, delete the statically configured ip source binding entries on any of the interfaces on the line card. (CSCsv54529)
Workaround: Shut down, and then reopen the interface. (CSCso50921)
Workaround: Configure an ISL/dot1q trunk port. (CSCsu43445)
Workaround: Do one of the following:
– Reload the standby switch again with the line card in place.
– Remove and reenter the commands on the active supervisor engine. The standby supervisor engine will acquire this change.
This applies to classic or E-series Catalyst 4500 supervisor engines running
Cisco IOS Release 12.2(50)SG
Workaround: None. (CSCsw14005)
If the switch were to run a supervisor switchover while in this state, the host's MAC address would not be present in the new active supervisor engine’s MAC address table, causing possible connectivity interruption on the host.
Workaround: Enter the shutdown command, followed by the no shutdown command on the interface. This triggers relearning and synchronizing of the host's MAC to the standby supervisor engine. CSCsw91661
The statistics are displayed properly on the active supervisor.
Workaround: Configure a lower value for the low threshold so that the frame errors are seen divided into the expected number of frame errored seconds.
Workaround: Specify a profile name when you enter the diagnostic command.
You might want to avoid requesting on demand send for invalid modules. First, enter the
show module command to check for valid or present modules.
CSCsz06719 (4500 + 4900, for now)
This only happens when the switch is running network mobility service protocol (nmsp). It does not happen if the phone is CDP enabled.
Workaround: Use the VLAN ID or name to differentiate the IP phone and the PC sitting behind the phone on the WCS.
The IP phone is detected on the voice VLAN, and the displayed information of serial number, model number, and software version is correct. However, a PC sitting behind the phone is detected on a data VLAN, and the displayed device information is wrong and should be ignored.
Assuming that you configured authentication open on the port and a host is authenticated on that port, if you unconfigure open auth (no authentication open), the STP state becomes blocked on an authenticated port.
The connected host is authenticated so it should be able to send traffic and the STP state should be Forwarding.
Workaround: Enter shut, then no shut on the port.
Workaround: When interface mode is changed from Layer2 to Layer3, manually change interface trust state by enter the cos trust dscp command.
This occurs only if the following conditions are satisfied:
– Multi-host mode configured on the port with the authentication host-mode multi-host command.
– Default ACL (the IP access-list) configured on the interface specifies deny ip any any.
– Dynamic policy authorization for the client specifies permit ip any any.
Workaround: Add entries to the Default ACL in addition to 'deny ip any any'.
Despite the different default value, you can configure any value in the time range.
Workaround: Reload the linecard by entering the hw-module reset command.
The show memory debug leak lowmem command can work in extremely low memory conditions but might crash the switch due to its very high CPU intensity. It also takes between 20 and 90 minutes to complete.
Workaround: If call or packet drops persist, contact TAC rather than entering these commands on your own. CSCsi48986
Workaround: When creating the file, enter some characters, remove the ftp command, then re-enter it as follows:
Workaround: Load Cisco IOS Releases 12.2(53)SG4, 12.2(54)SG, 15.0(1)SG or later.
Workaround: None. (CSCso93282)
When Supervisor Engine II+10GE attempts to boot in a 4510R+E chassis, the following error message is displayed:
Supervisor Engine II+10GE is not supported on a ten-slot chassis. So, the correct message is displayed but the chassis type listed is WS-C4510R-E instead of WS-C4510R+E.
– Place the Supervisor Engine II+10GE in a seven-slot chassis.
– Place a supervisor engine that is supported in a ten-slot chassis. The discrepancy in identifying the chassis type is purely cosmetic.
Workaround: None. (CSCsk66449)
When an output service policy attaches to an interface and if the policy is configured to apply DBL on a queue, the flows that are enqueued are subjected to the DBL algorithm. One or more flows that are classified as belligerent (flows that do not back off in response to drops because of congestion in the queue) continue to be classified as belligerent even when DBL is disabled on that queue.
For this condition to persist, the transmit queues in question must remain congested for a long period of time, and that congestion must be caused by flows that remain belligerent.
Workaround: Provided the queue in question is nondefault (queuing actions are not configured in the class-default class of the policy map), detach and reattach the service policy.
If this happens on the default queue, modifying and resetting some queuing parameters such as bandwidth and shape resolves the problem. (CSCsk62457
On a switch running Cisco IOS Release 12.2(40)SG, all MTU values configured on a line card are set to default when the module is reset. MTU values are not retained for modules that are physically moved.
Workaround: None. (CSCsk52542)
Workaround: Reinsert the X2. (CSCsk43618)
When a packet is sent to the CPU it may get sent out on some other interface. If so, the original CoS value for a.1X packet cannot be matched by software QoS (according to CSCsk66449). The packet is transmitted with the CoS value it was generated with (7, for the MLDv1 packets described here).
Part of the root cause of this problem is captured in CSCsk66449, which indicates that the software QoS cannot match a.1X packet. (CSCsk72544)
Workaround: Enter the show policy-map interface command to find the actual burst value programmed. (CSCsi71036)
Workaround: None. If you enter the show policy-map name, however, the unconditional marking actions appear. (CSCsi94144)
Workaround: None. (CSCsl72868)
Workaround: To ensure that the DBL action operates on the default queue, use the queue-limit command to specify an explicit queue size. This command dictates the size range. (CSCso06422)
This behavior occurs in a redundant switch when the active supervisor engine is running Cisco IOS, the standby supervisor engine is in ROMMON, and the standby supervisor engine’s ROMMON is upgraded from version 0.34 or to a later version. The upgrade process causes the uplinks on the standby supervisor engine to go down but the active supervisor engine is unaware of this.
Workarounds: To resume normal operation, do one of the following:
– Reload both supervisor engines with the redundancy reload shelf command.
– Power-cycle the standby supervisor engine by briefly pulling it from the chassis.
There is no workaround for the link flap issue. (CSCsm81875)
This problem can happen when pause frames are sent to the switch port and the flow control receive configuration is toggled on 10-Gb port.
Workaround: Change the flow control receive configuration when no traffic exists. (CSCso71647)
The issue is observed only for packets that are logically switched but are internally controlled such that on egress the system is generated by the switch itself. This can happen for certain snooping features such as DAI, IGMP snooping, DHCP snooping, and MLD snooping. This can also happen for IPv4/v6 packets with IP options/ extension headers that need processing in software.
Workaround: None. (CSCsq99468)
You only see this behavior if you initially did not allocate a VLAN before you configure the IFM, and then at a later time allocate the same VLAN.
Workaround: Unconfigure, and then reconfigure the IFM on the port.
Workaround: Disable native VLAN tagging on the trunk port of the switch using the
no switchport trunk native vlan tag command.
The active supervisor engine also displays following log message for each linecard slot in the chassis:
If the standby supervisor engine boots, the active supervisor engine displays the following message and reboots:
While active supervisor engine is up, no traffic can be handled by the switch.
The two supervisor engines might alternately reboot continuously.
Workaround: Use Cisco IOS Release 12.2(53)SG4, 12.2(54)SG, 15.0(1)SG or later images with WS-C4510R+E and WS-C4507R+E chassis.
Cisco IOS Release 12.2(53)SG3 and earlier are not supported on WS-C4510R+E and WS-4507R+E chassis and should display a valid error message when loaded.
Workaround: Load a LAN Base image from Cisco IOS Release 12.2(53)SG4 and later.
Workaround: Clear the errors with the clear ethernet cfm errors command. (CSCsv43819)
This section lists the open caveats for Cisco IOS Release 12.2(53)SG10:
Workaround: When using the access-list N permit host hostname command, specify the IP address of the host rather than the hostname (CSCef67489)
Workaround: Verify that the MAC addresses being transmitted through the system are learned.
Workaround: None. (CSCeg48586)
– If such a certificate does not exist and the device's hostname and default_domain are set, then a persistent self-signed certificate is generated.
– If such a certificate exists, the FQDN in the certificate is compared with the current device's hostname and default_domain. If either differs from the FQDN in the certificate, the existing persistent self-signed certificate is replaced with a new one with the updated FQDN. Be aware that the existing keypair is used in the new certificate.
On a switch that supports redundancy, the generation of the self-signed certificate occurs independently on the active and the standby supervisor engines, and the certificates differ. After switchover, the HTTP client that holds the old certificate cannot connect to the HTTPS server.
Workaround: Reconnect. (CSCsb11964)
This only affects a switch that has any of the following queues configured as SPAN source in releases prior to 12.2(31)SG and saved to the startup configuration. The SPAN destination would not get the same traffic after upgrading to 12.2(31)SG.
Workaround: After upgrading to 12.2(31)SG and later releases, remove the old SPAN source configuration and reconfigure with the new queue names/IDs. For example:
Workaround: None. (CSCsc11726)
This situation could occur for these reasons:
– A packet requires an IP redirect to an IP unnumbered outgoing port within 3 minutes of booting the Catalyst 4500 series switch.
– The switch administrator enters the shutdown and no shutdown commands on an outgoing interface that has enabled IP unnumbered. The switch receives packets that require redirection; and the destination MAC address is already in ARP table.
– Do not inject packets that require an IP redirect sent out to an IP unnumbered port within 3 minutes of booting the Catalyst 4500 series switch.
– Configure the correct default gateway on the host side. (CSCse75660)
Workaround: None. (CSCsg58526)
This does not affect performance.
Workaround: Enter the no shutdown command. (CSCsg27395)
Workaround: Remove the transceiver from the new port and place it in the old port. After the SFP is recognized in the old port, remove it slowly and insert it in the new port. (CSCse34693).
Workaround: None. This is an informational message. (CSCsi60898)
Workaround: None. (CSCsm30320)
Workarounds: Do one of the following:
– After a reload, copy the startup-config to the running-config.
– Use a loopback interface as the target of the ip unnumbered command.
– Change the CLI configuration so that during bootup the router port is created first.
Workaround: When the port channel starts to flap, enter shut and no shut on the port channel. After the first switchover and after deleting the port channel, create a new channel. (CSCsr00333)
Workaround: Before removing a line card, delete the statically configured ip source binding entries on any of the interfaces on the line card. (CSCsv54529)
Workaround: Clear the errors with the clear ethernet cfm errors command. (CSCsv43819)
Workaround: Shut down, and then reopen the interface. (CSCso50921)
Workaround: Configure an ISL/dot1q trunk port. (CSCsu43445)
Workaround: Do one of the following:
– Reload the standby switch again with the line card in place.
– Remove and reenter the commands on the active supervisor engine. The standby supervisor engine will acquire this change.
This applies to classic or E-series Catalyst 4500 supervisor engines running
Cisco IOS Release 12.2(50)SG
Workaround: None. (CSCsw14005)
If the switch were to run a supervisor switchover while in this state, the host's MAC address would not be present in the new active supervisor engine’s MAC address table, causing possible connectivity interruption on the host.
Workaround: Enter the shutdown command, followed by the no shutdown command on the interface. This triggers relearning and synchronizing of the host's MAC to the standby supervisor engine. CSCsw91661
The statistics are displayed properly on the active supervisor.
Workaround: Configure a lower value for the low threshold so that the frame errors are seen divided into the expected number of frame errored seconds.
Workaround: Specify a profile name when you enter the diagnostic command.
You might want to avoid requesting on demand send for invalid modules. First, enter the
show module command to check for valid or present modules.
The queue transmit counters as well as the policing statistics (if any) are correct.
CSCsz06719 (4500 + 4900, for now)
This only happens when the switch is running network mobility service protocol (nmsp). It does not happen if the phone is CDP enabled.
Workaround: Use the VLAN ID or name to differentiate the IP phone and the PC sitting behind the phone on the WCS.
The IP phone is detected on the voice VLAN, and the displayed information of serial number, model number, and software version is correct. However, a PC sitting behind the phone is detected on a data VLAN, and the displayed device information is wrong and should be ignored.
Assuming that you configured authentication open on the port and a host is authenticated on that port, if you unconfigure open auth (no authentication open), the STP state becomes blocked on an authenticated port.
The connected host is authenticated so it should be able to send traffic and the STP state should be Forwarding.
Workaround: Enter shut, then no shut on the port.
Workaround: When interface mode is changed from Layer2 to Layer3, manually change interface trust state by enter the cos trust dscp command.
This occurs only if the following conditions are satisfied:
– Multi-host mode configured on the port with the authentication host-mode multi-host command.
– Default ACL (the IP access-list) configured on the interface specifies deny ip any any.
– Dynamic policy authorization for the client specifies permit ip any any.
Workaround: Add entries to the Default ACL in addition to 'deny ip any any'.
Despite the different default value, you can configure any value in the time range.
Workaround: Reload the linecard by entering the hw-module reset command.
The show memory debug leak lowmem command can work in extremely low memory conditions but might crash the switch due to its very high CPU intensity. It also takes between 20 and 90 minutes to complete.
Workaround: If call or packet drops persist, contact TAC rather than entering these commands on your own. CSCsi48986
Workaround: When creating the file, enter some characters, remove the ftp command, then re-enter it as follows:
Workaround: Load Cisco IOS Releases 12.2(53)SG4, 12.2(54)SG, 15.0(1)SG or later.
Workaround: None. (CSCso93282)
When Supervisor Engine II+10GE attempts to boot in a 4510R+E chassis, the following error message is displayed:
Supervisor Engine II+10GE is not supported on a ten-slot chassis. So, the correct message is displayed but the chassis type listed is WS-C4510R-E instead of WS-C4510R+E.
– Place the Supervisor Engine II+10GE in a seven-slot chassis.
– Place a supervisor engine that is supported in a ten-slot chassis. The discrepancy in identifying the chassis type is purely cosmetic.
Workaround: None. (CSCsk66449)
When an output service policy attaches to an interface and if the policy is configured to apply DBL on a queue, the flows that are enqueued are subjected to the DBL algorithm. One or more flows that are classified as belligerent (flows that do not back off in response to drops because of congestion in the queue) continue to be classified as belligerent even when DBL is disabled on that queue.
For this condition to persist, the transmit queues in question must remain congested for a long period of time, and that congestion must be caused by flows that remain belligerent.
Workaround: Provided the queue in question is nondefault (queuing actions are not configured in the class-default class of the policy map), detach and reattach the service policy.
If this happens on the default queue, modifying and resetting some queuing parameters such as bandwidth and shape resolves the problem. (CSCsk62457
On a switch running Cisco IOS Release 12.2(40)SG, all MTU values configured on a line card are set to default when the module is reset. MTU values are not retained for modules that are physically moved.
Workaround: None. (CSCsk52542)
Workaround: Reinsert the X2. (CSCsk43618)
When a packet is sent to the CPU it may get sent out on some other interface. If so, the original CoS value for a.1X packet cannot be matched by software QoS (according to CSCsk66449). The packet is transmitted with the CoS value it was generated with (7, for the MLDv1 packets described here).
Part of the root cause of this problem is captured in CSCsk66449, which indicates that the software QoS cannot match a.1X packet. (CSCsk72544)
Workaround: Enter the show policy-map interface command to find the actual burst value programmed. (CSCsi71036)
Workaround: None. If you enter the show policy-map name, however, the unconditional marking actions appear. (CSCsi94144)
Workaround: None. (CSCsl72868)
Workaround: To ensure that the DBL action operates on the default queue, use the queue-limit command to specify an explicit queue size. This command dictates the size range. (CSCso06422)
This behavior occurs in a redundant switch when the active supervisor engine is running Cisco IOS, the standby supervisor engine is in ROMMON, and the standby supervisor engine’s ROMMON is upgraded from version 0.34 or to a later version. The upgrade process causes the uplinks on the standby supervisor engine to go down but the active supervisor engine is unaware of this.
Workarounds: To resume normal operation, do one of the following:
– Reload both supervisor engines with the redundancy reload shelf command.
– Power-cycle the standby supervisor engine by briefly pulling it from the chassis.
There is no workaround for the link flap issue. (CSCsm81875)
This problem can happen when pause frames are sent to the switch port and the flow control receive configuration is toggled on 10-Gb port.
Workaround: Change the flow control receive configuration when no traffic exists. (CSCso71647)
The issue is observed only for packets that are logically switched but are internally controlled such that on egress the system is generated by the switch itself. This can happen for certain snooping features such as DAI, IGMP snooping, DHCP snooping, and MLD snooping. This can also happen for IPv4/v6 packets with IP options/ extension headers that need processing in software.
Workaround: None. (CSCsq99468)
You only see this behavior if you initially did not allocate a VLAN before you configure the IFM, and then at a later time allocate the same VLAN.
Workaround: Unconfigure, and then reconfigure the IFM on the port.
Workaround: Disable native VLAN tagging on the trunk port of the switch using the
no switchport trunk native vlan tag command.
The active supervisor engine also displays following log message for each linecard slot in the chassis:
If the standby supervisor engine boots, the active supervisor engine displays the following message and reboots:
While active supervisor engine is up, no traffic can be handled by the switch.
The two supervisor engines might alternately reboot continuously.
Workaround: Use Cisco IOS Release 12.2(53)SG4, 12.2(54)SG, 15.0(1)SG or later images with WS-C4510R+E and WS-C4507R+E chassis.
Cisco IOS Release 12.2(53)SG3 and earlier are not supported on WS-C4510R+E and WS-4507R+E chassis and should display a valid error message when loaded.
Workaround: Load a LAN Base image from Cisco IOS Release 12.2(53)SG4 and later.
This section lists the resolved caveats in Release 12.2(53)SG10:
This section lists the open caveats for Cisco IOS Release 12.2(53)SG9:
Workaround: When using the access-list N permit host hostname command, specify the IP address of the host rather than the hostname (CSCef67489)
Workaround: Verify that the MAC addresses being transmitted through the system are learned.
Workaround: None. (CSCeg48586)
– If such a certificate does not exist and the device's hostname and default_domain are set, then a persistent self-signed certificate is generated.
– If such a certificate exists, the FQDN in the certificate is compared with the current device's hostname and default_domain. If either differs from the FQDN in the certificate, the existing persistent self-signed certificate is replaced with a new one with the updated FQDN. Be aware that the existing keypair is used in the new certificate.
On a switch that supports redundancy, the generation of the self-signed certificate occurs independently on the active and the standby supervisor engines, and the certificates differ. After switchover, the HTTP client that holds the old certificate cannot connect to the HTTPS server.
Workaround: Reconnect. (CSCsb11964)
This only affects a switch that has any of the following queues configured as SPAN source in releases prior to 12.2(31)SG and saved to the startup configuration. The SPAN destination would not get the same traffic after upgrading to 12.2(31)SG.
Workaround: After upgrading to 12.2(31)SG and later releases, remove the old SPAN source configuration and reconfigure with the new queue names/IDs. For example:
Workaround: None. (CSCsc11726)
This situation could occur for these reasons:
– A packet requires an IP redirect to an IP unnumbered outgoing port within 3 minutes of booting the Catalyst 4500 series switch.
– The switch administrator enters the shutdown and no shutdown commands on an outgoing interface that has enabled IP unnumbered. The switch receives packets that require redirection; and the destination MAC address is already in ARP table.
– Do not inject packets that require an IP redirect sent out to an IP unnumbered port within 3 minutes of booting the Catalyst 4500 series switch.
– Configure the correct default gateway on the host side. (CSCse75660)
Workaround: None. (CSCsg58526)
This does not affect performance.
Workaround: Enter the no shutdown command. (CSCsg27395)
Workaround: Remove the transceiver from the new port and place it in the old port. After the SFP is recognized in the old port, remove it slowly and insert it in the new port. (CSCse34693).
Workaround: None. This is an informational message. (CSCsi60898)
Workaround: None. (CSCsm30320)
Workarounds: Do one of the following:
– After a reload, copy the startup-config to the running-config.
– Use a loopback interface as the target of the ip unnumbered command.
– Change the CLI configuration so that during bootup the router port is created first.
Workaround: When the port channel starts to flap, enter shut and no shut on the port channel. After the first switchover and after deleting the port channel, create a new channel. (CSCsr00333)
Workaround: Before removing a line card, delete the statically configured ip source binding entries on any of the interfaces on the line card. (CSCsv54529)
Workaround: Clear the errors with the clear ethernet cfm errors command. (CSCsv43819)
Workaround: Shut down, and then reopen the interface. (CSCso50921)
Workaround: Configure an ISL/dot1q trunk port. (CSCsu43445)
Workaround: Do one of the following:
– Reload the standby switch again with the line card in place.
– Remove and reenter the commands on the active supervisor engine. The standby supervisor engine will acquire this change.
This applies to classic or E-series Catalyst 4500 supervisor engines running
Cisco IOS Release 12.2(50)SG
Workaround: None. (CSCsw14005)
If the switch were to run a supervisor switchover while in this state, the host's MAC address would not be present in the new active supervisor engine’s MAC address table, causing possible connectivity interruption on the host.
Workaround: Enter the shutdown command, followed by the no shutdown command on the interface. This triggers relearning and synchronizing of the host's MAC to the standby supervisor engine. CSCsw91661
The statistics are displayed properly on the active supervisor.
Workaround: Configure a lower value for the low threshold so that the frame errors are seen divided into the expected number of frame errored seconds.
Workaround: Specify a profile name when you enter the diagnostic command.
You might want to avoid requesting on demand send for invalid modules. First, enter the
show module command to check for valid or present modules.
The queue transmit counters as well as the policing statistics (if any) are correct.
CSCsz06719 (4500 + 4900, for now)
This only happens when the switch is running network mobility service protocol (nmsp). It does not happen if the phone is CDP enabled.
Workaround: Use the VLAN ID or name to differentiate the IP phone and the PC sitting behind the phone on the WCS.
The IP phone is detected on the voice VLAN, and the displayed information of serial number, model number, and software version is correct. However, a PC sitting behind the phone is detected on a data VLAN, and the displayed device information is wrong and should be ignored.
Assuming that you configured authentication open on the port and a host is authenticated on that port, if you unconfigure open auth (no authentication open), the STP state becomes blocked on an authenticated port.
The connected host is authenticated so it should be able to send traffic and the STP state should be Forwarding.
Workaround: Enter shut, then no shut on the port.
Workaround: When interface mode is changed from Layer2 to Layer3, manually change interface trust state by enter the cos trust dscp command.
This occurs only if the following conditions are satisfied:
– Multi-host mode configured on the port with the authentication host-mode multi-host command.
– Default ACL (the IP access-list) configured on the interface specifies deny ip any any.
– Dynamic policy authorization for the client specifies permit ip any any.
Workaround: Add entries to the Default ACL in addition to 'deny ip any any'.
Despite the different default value, you can configure any value in the time range.
Workaround: Reload the linecard by entering the hw-module reset command.
The show memory debug leak lowmem command can work in extremely low memory conditions but might crash the switch due to its very high CPU intensity. It also takes between 20 and 90 minutes to complete.
Workaround: If call or packet drops persist, contact TAC rather than entering these commands on your own. CSCsi48986
Workaround: When creating the file, enter some characters, remove the ftp command, then re-enter it as follows:
Workaround: Load Cisco IOS Releases 12.2(53)SG4, 12.2(54)SG, 15.0(1)SG or later.
Workaround: None. (CSCso93282)
When Supervisor Engine II+10GE attempts to boot in a 4510R+E chassis, the following error message is displayed:
Supervisor Engine II+10GE is not supported on a ten-slot chassis. So, the correct message is displayed but the chassis type listed is WS-C4510R-E instead of WS-C4510R+E.
– Place the Supervisor Engine II+10GE in a seven-slot chassis.
– Place a supervisor engine that is supported in a ten-slot chassis. The discrepancy in identifying the chassis type is purely cosmetic.
Workaround: None. (CSCsk66449)
When an output service policy attaches to an interface and if the policy is configured to apply DBL on a queue, the flows that are enqueued are subjected to the DBL algorithm. One or more flows that are classified as belligerent (flows that do not back off in response to drops because of congestion in the queue) continue to be classified as belligerent even when DBL is disabled on that queue.
For this condition to persist, the transmit queues in question must remain congested for a long period of time, and that congestion must be caused by flows that remain belligerent.
Workaround: Provided the queue in question is nondefault (queuing actions are not configured in the class-default class of the policy map), detach and reattach the service policy.
If this happens on the default queue, modifying and resetting some queuing parameters such as bandwidth and shape resolves the problem. (CSCsk62457
On a switch running Cisco IOS Release 12.2(40)SG, all MTU values configured on a line card are set to default when the module is reset. MTU values are not retained for modules that are physically moved.
Workaround: None. (CSCsk52542)
Workaround: Reinsert the X2. (CSCsk43618)
When a packet is sent to the CPU it may get sent out on some other interface. If so, the original CoS value for a.1X packet cannot be matched by software QoS (according to CSCsk66449). The packet is transmitted with the CoS value it was generated with (7, for the MLDv1 packets described here).
Part of the root cause of this problem is captured in CSCsk66449, which indicates that the software QoS cannot match a.1X packet. (CSCsk72544)
Workaround: Enter the show policy-map interface command to find the actual burst value programmed. (CSCsi71036)
Workaround: None. If you enter the show policy-map name, however, the unconditional marking actions appear. (CSCsi94144)
Workaround: None. (CSCsl72868)
Workaround: To ensure that the DBL action operates on the default queue, use the queue-limit command to specify an explicit queue size. This command dictates the size range. (CSCso06422)
This behavior occurs in a redundant switch when the active supervisor engine is running Cisco IOS, the standby supervisor engine is in ROMMON, and the standby supervisor engine’s ROMMON is upgraded from version 0.34 or to a later version. The upgrade process causes the uplinks on the standby supervisor engine to go down but the active supervisor engine is unaware of this.
Workarounds: To resume normal operation, do one of the following:
– Reload both supervisor engines with the redundancy reload shelf command.
– Power-cycle the standby supervisor engine by briefly pulling it from the chassis.
There is no workaround for the link flap issue. (CSCsm81875)
This problem can happen when pause frames are sent to the switch port and the flow control receive configuration is toggled on 10-Gb port.
Workaround: Change the flow control receive configuration when no traffic exists. (CSCso71647)
The issue is observed only for packets that are logically switched but are internally controlled such that on egress the system is generated by the switch itself. This can happen for certain snooping features such as DAI, IGMP snooping, DHCP snooping, and MLD snooping. This can also happen for IPv4/v6 packets with IP options/ extension headers that need processing in software.
Workaround: None. (CSCsq99468)
You only see this behavior if you initially did not allocate a VLAN before you configure the IFM, and then at a later time allocate the same VLAN.
Workaround: Unconfigure, and then reconfigure the IFM on the port.
Workaround: Disable native VLAN tagging on the trunk port of the switch using the
no switchport trunk native vlan tag command.
The active supervisor engine also displays following log message for each linecard slot in the chassis:
If the standby supervisor engine boots, the active supervisor engine displays the following message and reboots:
While active supervisor engine is up, no traffic can be handled by the switch.
The two supervisor engines might alternately reboot continuously.
Workaround: Use Cisco IOS Release 12.2(53)SG4, 12.2(54)SG, 15.0(1)SG or later images with WS-C4510R+E and WS-C4507R+E chassis.
Cisco IOS Release 12.2(53)SG3 and earlier are not supported on WS-C4510R+E and WS-4507R+E chassis and should display a valid error message when loaded.
Workaround: Load a LAN Base image from Cisco IOS Release 12.2(53)SG4 and later.
This section lists the resolved caveats in Release 12.2(53)SG9:
Workaround: Retain the default setting (VLAN 1) for the native VLAN on trunks ports. CSCud05521
Cisco has released free software updates that address this vulnerability. Workarounds that mitigate this vulnerability are not available.
This advisory is available at the following link:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130327-nat
Note: The March 27, 2013, Cisco IOS Software Security Advisory bundled publication includes seven Cisco Security Advisories. All advisories address vulnerabilities in Cisco IOS Software. Each Cisco IOS Software Security Advisory lists the Cisco IOS Software releases that correct the vulnerability or vulnerabilities detailed in the advisory as well as the Cisco IOS Software releases that correct all Cisco IOS Software vulnerabilities in the March 2013 bundled publication.
Individual publication links are in “Cisco Event Response: Semiannual Cisco IOS Software Security Advisory Bundled Publication” at the following link:
http://www.cisco.com/web/about/security/intelligence/Cisco_ERP_mar13.html
This section lists the open caveats for Cisco IOS Release 12.2(53)SG8:
Workaround: When using the access-list N permit host hostname command, specify the IP address of the host rather than the hostname (CSCef67489)
Workaround: Verify that the MAC addresses being transmitted through the system are learned.
Workaround: None. (CSCeg48586)
– If such a certificate does not exist and the device's hostname and default_domain are set, then a persistent self-signed certificate is generated.
– If such a certificate exists, the FQDN in the certificate is compared with the current device's hostname and default_domain. If either differs from the FQDN in the certificate, the existing persistent self-signed certificate is replaced with a new one with the updated FQDN. Be aware that the existing keypair is used in the new certificate.
On a switch that supports redundancy, the generation of the self-signed certificate occurs independently on the active and the standby supervisor engines, and the certificates differ. After switchover, the HTTP client that holds the old certificate cannot connect to the HTTPS server.
Workaround: Reconnect. (CSCsb11964)
This only affects a switch that has any of the following queues configured as SPAN source in releases prior to 12.2(31)SG and saved to the startup configuration. The SPAN destination would not get the same traffic after upgrading to 12.2(31)SG.
Workaround: After upgrading to 12.2(31)SG and later releases, remove the old SPAN source configuration and reconfigure with the new queue names/IDs. For example:
Workaround: None. (CSCsc11726)
This situation could occur for these reasons:
– A packet requires an IP redirect to an IP unnumbered outgoing port within 3 minutes of booting the Catalyst 4500 series switch.
– The switch administrator enters the shutdown and no shutdown commands on an outgoing interface that has enabled IP unnumbered. The switch receives packets that require redirection; and the destination MAC address is already in ARP table.
– Do not inject packets that require an IP redirect sent out to an IP unnumbered port within 3 minutes of booting the Catalyst 4500 series switch.
– Configure the correct default gateway on the host side. (CSCse75660)
Workaround: None. (CSCsg58526)
This does not affect performance.
Workaround: Enter the no shutdown command. (CSCsg27395)
Workaround: Remove the transceiver from the new port and place it in the old port. After the SFP is recognized in the old port, remove it slowly and insert it in the new port. (CSCse34693).
Workaround: None. This is an informational message. (CSCsi60898)
Workaround: None. (CSCsm30320)
Workarounds: Do one of the following:
– After a reload, copy the startup-config to the running-config.
– Use a loopback interface as the target of the ip unnumbered command.
– Change the CLI configuration so that during bootup the router port is created first.
Workaround: When the port channel starts to flap, enter shut and no shut on the port channel. After the first switchover and after deleting the port channel, create a new channel. (CSCsr00333)
Workaround: Before removing a line card, delete the statically configured ip source binding entries on any of the interfaces on the line card. (CSCsv54529)
Workaround: Clear the errors with the clear ethernet cfm errors command. (CSCsv43819)
Workaround: Shut down, and then reopen the interface. (CSCso50921)
Workaround: Configure an ISL/dot1q trunk port. (CSCsu43445)
Workaround: Do one of the following:
– Reload the standby switch again with the line card in place.
– Remove and reenter the commands on the active supervisor engine. The standby supervisor engine will acquire this change.
This applies to classic or E-series Catalyst 4500 supervisor engines running
Cisco IOS Release 12.2(50)SG
Workaround: None. (CSCsw14005)
If the switch were to run a supervisor switchover while in this state, the host's MAC address would not be present in the new active supervisor engine’s MAC address table, causing possible connectivity interruption on the host.
Workaround: Enter the shutdown command, followed by the no shutdown command on the interface. This triggers relearning and synchronizing of the host's MAC to the standby supervisor engine. CSCsw91661
The statistics are displayed properly on the active supervisor.
Workaround: Configure a lower value for the low threshold so that the frame errors are seen divided into the expected number of frame errored seconds.
Workaround: Specify a profile name when you enter the diagnostic command.
You might want to avoid requesting on demand send for invalid modules. First, enter the
show module command to check for valid or present modules.
The queue transmit counters as well as the policing statistics (if any) are correct.
CSCsz06719 (4500 + 4900, for now)
This only happens when the switch is running network mobility service protocol (nmsp). It does not happen if the phone is CDP enabled.
Workaround: Use the VLAN ID or name to differentiate the IP phone and the PC sitting behind the phone on the WCS.
The IP phone is detected on the voice VLAN, and the displayed information of serial number, model number, and software version is correct. However, a PC sitting behind the phone is detected on a data VLAN, and the displayed device information is wrong and should be ignored.
Assuming that you configured authentication open on the port and a host is authenticated on that port, if you unconfigure open auth (no authentication open), the STP state becomes blocked on an authenticated port.
The connected host is authenticated so it should be able to send traffic and the STP state should be Forwarding.
Workaround: Enter shut, then no shut on the port.
Workaround: When interface mode is changed from Layer2 to Layer3, manually change interface trust state by enter the cos trust dscp command.
This occurs only if the following conditions are satisfied:
– Multi-host mode configured on the port with the authentication host-mode multi-host command.
– Default ACL (the IP access-list) configured on the interface specifies deny ip any any.
– Dynamic policy authorization for the client specifies permit ip any any.
Workaround: Add entries to the Default ACL in addition to 'deny ip any any'.
Despite the different default value, you can configure any value in the time range.
Workaround: Reload the linecard by entering the hw-module reset command.
The show memory debug leak lowmem command can work in extremely low memory conditions but might crash the switch due to its very high CPU intensity. It also takes between 20 and 90 minutes to complete.
Workaround: If call or packet drops persist, contact TAC rather than entering these commands on your own. CSCsi48986
Workaround: When creating the file, enter some characters, remove the ftp command, then re-enter it as follows:
Workaround: Load Cisco IOS Releases 12.2(53)SG4, 12.2(54)SG, 15.0(1)SG or later. CSCtl70275
Workaround: Retain the default setting (VLAN 1) for the native VLAN on trunks ports. CSCud05521
Workaround: None. (CSCso93282)
When Supervisor Engine II+10GE attempts to boot in a 4510R+E chassis, the following error message is displayed:
Supervisor Engine II+10GE is not supported on a ten-slot chassis. So, the correct message is displayed but the chassis type listed is WS-C4510R-E instead of WS-C4510R+E.
– Place the Supervisor Engine II+10GE in a seven-slot chassis.
– Place a supervisor engine that is supported in a ten-slot chassis. The discrepancy in identifying the chassis type is purely cosmetic.
Workaround: None. (CSCsk66449)
When an output service policy attaches to an interface and if the policy is configured to apply DBL on a queue, the flows that are enqueued are subjected to the DBL algorithm. One or more flows that are classified as belligerent (flows that do not back off in response to drops because of congestion in the queue) continue to be classified as belligerent even when DBL is disabled on that queue.
For this condition to persist, the transmit queues in question must remain congested for a long period of time, and that congestion must be caused by flows that remain belligerent.
Workaround: Provided the queue in question is nondefault (queuing actions are not configured in the class-default class of the policy map), detach and reattach the service policy.
If this happens on the default queue, modifying and resetting some queuing parameters such as bandwidth and shape resolves the problem. (CSCsk62457
On a switch running Cisco IOS Release 12.2(40)SG, all MTU values configured on a line card are set to default when the module is reset. MTU values are not retained for modules that are physically moved.
Workaround: None. (CSCsk52542)
Workaround: Reinsert the X2. (CSCsk43618)
When a packet is sent to the CPU it may get sent out on some other interface. If so, the original CoS value for a.1X packet cannot be matched by software QoS (according to CSCsk66449). The packet is transmitted with the CoS value it was generated with (7, for the MLDv1 packets described here).
Part of the root cause of this problem is captured in CSCsk66449, which indicates that the software QoS cannot match a.1X packet. (CSCsk72544)
Workaround: Enter the show policy-map interface command to find the actual burst value programmed. (CSCsi71036)
Workaround: None. If you enter the show policy-map name, however, the unconditional marking actions appear. (CSCsi94144)
Workaround: None. (CSCsl72868)
Workaround: To ensure that the DBL action operates on the default queue, use the queue-limit command to specify an explicit queue size. This command dictates the size range. (CSCso06422)
This behavior occurs in a redundant switch when the active supervisor engine is running Cisco IOS, the standby supervisor engine is in ROMMON, and the standby supervisor engine’s ROMMON is upgraded from version 0.34 or to a later version. The upgrade process causes the uplinks on the standby supervisor engine to go down but the active supervisor engine is unaware of this.
Workarounds: To resume normal operation, do one of the following:
– Reload both supervisor engines with the redundancy reload shelf command.
– Power-cycle the standby supervisor engine by briefly pulling it from the chassis.
There is no workaround for the link flap issue. (CSCsm81875)
This problem can happen when pause frames are sent to the switch port and the flow control receive configuration is toggled on 10-Gb port.
Workaround: Change the flow control receive configuration when no traffic exists. (CSCso71647)
The issue is observed only for packets that are logically switched but are internally controlled such that on egress the system is generated by the switch itself. This can happen for certain snooping features such as DAI, IGMP snooping, DHCP snooping, and MLD snooping. This can also happen for IPv4/v6 packets with IP options/ extension headers that need processing in software.
Workaround: None. (CSCsq99468)
You only see this behavior if you initially did not allocate a VLAN before you configure the IFM, and then at a later time allocate the same VLAN.
Workaround: Unconfigure, and then reconfigure the IFM on the port.
Workaround: Disable native VLAN tagging on the trunk port of the switch using the
no switchport trunk native vlan tag command.
The active supervisor engine also displays following log message for each linecard slot in the chassis:
If the standby supervisor engine boots, the active supervisor engine displays the following message and reboots:
While active supervisor engine is up, no traffic can be handled by the switch.
The two supervisor engines might alternately reboot continuously.
Workaround: Use Cisco IOS Release 12.2(53)SG4, 12.2(54)SG, 15.0(1)SG or later images with WS-C4510R+E and WS-C4507R+E chassis.
Cisco IOS Release 12.2(53)SG3 and earlier are not supported on WS-C4510R+E and WS-4507R+E chassis and should display a valid error message when loaded.
Workaround: Load a LAN Base image from Cisco IOS Release 12.2(53)SG4 and later.
This section lists the resolved caveats in Release 12.2(53)SG8:
Workaround: Enter the no cdp run command to disable CDP. CSCub45763
This section lists the open caveats for Cisco IOS Release 12.2(53)SG7:
Workaround: When using the access-list N permit host hostname command, specify the IP address of the host rather than the hostname (CSCef67489)
Workaround: Verify that the MAC addresses being transmitted through the system are learned.
Workaround: None. (CSCeg48586)
– If such a certificate does not exist and the device's hostname and default_domain are set, then a persistent self-signed certificate is generated.
– If such a certificate exists, the FQDN in the certificate is compared with the current device's hostname and default_domain. If either differs from the FQDN in the certificate, the existing persistent self-signed certificate is replaced with a new one with the updated FQDN. Be aware that the existing keypair is used in the new certificate.
On a switch that supports redundancy, the generation of the self-signed certificate occurs independently on the active and the standby supervisor engines, and the certificates differ. After switchover, the HTTP client that holds the old certificate cannot connect to the HTTPS server.
Workaround: Reconnect. (CSCsb11964)
This only affects a switch that has any of the following queues configured as SPAN source in releases prior to 12.2(31)SG and saved to the startup configuration. The SPAN destination would not get the same traffic after upgrading to 12.2(31)SG.
Workaround: After upgrading to 12.2(31)SG and later releases, remove the old SPAN source configuration and reconfigure with the new queue names/IDs. For example:
Workaround: None. (CSCsc11726)
This situation could occur for these reasons:
– A packet requires an IP redirect to an IP unnumbered outgoing port within 3 minutes of booting the Catalyst 4500 series switch.
– The switch administrator enters the shutdown and no shutdown commands on an outgoing interface that has enabled IP unnumbered. The switch receives packets that require redirection; and the destination MAC address is already in ARP table.
– Do not inject packets that require an IP redirect sent out to an IP unnumbered port within 3 minutes of booting the Catalyst 4500 series switch.
– Configure the correct default gateway on the host side. (CSCse75660)
Workaround: None. (CSCsg58526)
This does not affect performance.
Workaround: Enter the no shutdown command. (CSCsg27395)
Workaround: Remove the transceiver from the new port and place it in the old port. After the SFP is recognized in the old port, remove it slowly and insert it in the new port. (CSCse34693).
Workaround: None. This is an informational message. (CSCsi60898)
Workaround: None. (CSCsm30320)
Workarounds: Do one of the following:
– After a reload, copy the startup-config to the running-config.
– Use a loopback interface as the target of the ip unnumbered command.
– Change the CLI configuration so that during bootup the router port is created first.
Workaround: When the port channel starts to flap, enter shut and no shut on the port channel. After the first switchover and after deleting the port channel, create a new channel. (CSCsr00333)
Workaround: Before removing a line card, delete the statically configured ip source binding entries on any of the interfaces on the line card. (CSCsv54529)
Workaround: Clear the errors with the clear ethernet cfm errors command. (CSCsv43819)
Workaround: Shut down, and then reopen the interface. (CSCso50921)
Workaround: Configure an ISL/dot1q trunk port. (CSCsu43445)
Workaround: Do one of the following:
– Reload the standby switch again with the line card in place.
– Remove and reenter the commands on the active supervisor engine. The standby supervisor engine will acquire this change.
This applies to classic or E-series Catalyst 4500 supervisor engines running
Cisco IOS Release 12.2(50)SG
Workaround: None. (CSCsw14005)
If the switch were to run a supervisor switchover while in this state, the host's MAC address would not be present in the new active supervisor engine’s MAC address table, causing possible connectivity interruption on the host.
Workaround: Enter the shutdown command, followed by the no shutdown command on the interface. This triggers relearning and synchronizing of the host's MAC to the standby supervisor engine. CSCsw91661
The statistics are displayed properly on the active supervisor.
Workaround: Configure a lower value for the low threshold so that the frame errors are seen divided into the expected number of frame errored seconds.
Workaround: Specify a profile name when you enter the diagnostic command.
You might want to avoid requesting on demand send for invalid modules. First, enter the
show module command to check for valid or present modules.
The queue transmit counters as well as the policing statistics (if any) are correct.
CSCsz06719 (4500 + 4900, for now)
This only happens when the switch is running network mobility service protocol (nmsp). It does not happen if the phone is CDP enabled.
Workaround: Use the VLAN ID or name to differentiate the IP phone and the PC sitting behind the phone on the WCS.
The IP phone is detected on the voice VLAN, and the displayed information of serial number, model number, and software version is correct. However, a PC sitting behind the phone is detected on a data VLAN, and the displayed device information is wrong and should be ignored.
Assuming that you configured authentication open on the port and a host is authenticated on that port, if you unconfigure open auth (no authentication open), the STP state becomes blocked on an authenticated port.
The connected host is authenticated so it should be able to send traffic and the STP state should be Forwarding.
Workaround: Enter shut, then no shut on the port.
Workaround: When interface mode is changed from Layer2 to Layer3, manually change interface trust state by enter the cos trust dscp command.
This occurs only if the following conditions are satisfied:
– Multi-host mode configured on the port with the authentication host-mode multi-host command.
– Default ACL (the IP access-list) configured on the interface specifies deny ip any any.
– Dynamic policy authorization for the client specifies permit ip any any.
Workaround: Add entries to the Default ACL in addition to 'deny ip any any'.
Despite the different default value, you can configure any value in the time range.
Workaround: Reload the linecard by entering the hw-module reset command.
The show memory debug leak lowmem command can work in extremely low memory conditions but might crash the switch due to its very high CPU intensity. It also takes between 20 and 90 minutes to complete.
Workaround: If call or packet drops persist, contact TAC rather than entering these commands on your own. CSCsi48986
Workaround: When creating the file, enter some characters, remove the ftp command, then re-enter it as follows:
Workaround: Load Cisco IOS Releases 12.2(53)SG4, 12.2(54)SG, 15.0(1)SG or later.
Workaround: Enter the no cdp run command to disable CDP. CSCub45763
Workaround: Retain the default setting (VLAN 1) for the native VLAN on trunks ports. CSCud05521
Workaround: None. (CSCso93282)
When Supervisor Engine II+10GE attempts to boot in a 4510R+E chassis, the following error message is displayed:
Supervisor Engine II+10GE is not supported on a ten-slot chassis. So, the correct message is displayed but the chassis type listed is WS-C4510R-E instead of WS-C4510R+E.
– Place the Supervisor Engine II+10GE in a seven-slot chassis.
– Place a supervisor engine that is supported in a ten-slot chassis. The discrepancy in identifying the chassis type is purely cosmetic.
Workaround: None. (CSCsk66449)
When an output service policy attaches to an interface and if the policy is configured to apply DBL on a queue, the flows that are enqueued are subjected to the DBL algorithm. One or more flows that are classified as belligerent (flows that do not back off in response to drops because of congestion in the queue) continue to be classified as belligerent even when DBL is disabled on that queue.
For this condition to persist, the transmit queues in question must remain congested for a long period of time, and that congestion must be caused by flows that remain belligerent.
Workaround: Provided the queue in question is nondefault (queuing actions are not configured in the class-default class of the policy map), detach and reattach the service policy.
If this happens on the default queue, modifying and resetting some queuing parameters such as bandwidth and shape resolves the problem. (CSCsk62457
On a switch running Cisco IOS Release 12.2(40)SG, all MTU values configured on a line card are set to default when the module is reset. MTU values are not retained for modules that are physically moved.
Workaround: None. (CSCsk52542)
Workaround: Reinsert the X2. (CSCsk43618)
When a packet is sent to the CPU it may get sent out on some other interface. If so, the original CoS value for a.1X packet cannot be matched by software QoS (according to CSCsk66449). The packet is transmitted with the CoS value it was generated with (7, for the MLDv1 packets described here).
Part of the root cause of this problem is captured in CSCsk66449, which indicates that the software QoS cannot match a.1X packet. (CSCsk72544)
Workaround: Enter the show policy-map interface command to find the actual burst value programmed. (CSCsi71036)
Workaround: None. If you enter the show policy-map name, however, the unconditional marking actions appear. (CSCsi94144)
Workaround: None. (CSCsl72868)
Workaround: To ensure that the DBL action operates on the default queue, use the queue-limit command to specify an explicit queue size. This command dictates the size range. (CSCso06422)
This behavior occurs in a redundant switch when the active supervisor engine is running Cisco IOS, the standby supervisor engine is in ROMMON, and the standby supervisor engine’s ROMMON is upgraded from version 0.34 or to a later version. The upgrade process causes the uplinks on the standby supervisor engine to go down but the active supervisor engine is unaware of this.
Workarounds: To resume normal operation, do one of the following:
– Reload both supervisor engines with the redundancy reload shelf command.
– Power-cycle the standby supervisor engine by briefly pulling it from the chassis.
There is no workaround for the link flap issue. (CSCsm81875)
This problem can happen when pause frames are sent to the switch port and the flow control receive configuration is toggled on 10-Gb port.
Workaround: Change the flow control receive configuration when no traffic exists. (CSCso71647)
The issue is observed only for packets that are logically switched but are internally controlled such that on egress the system is generated by the switch itself. This can happen for certain snooping features such as DAI, IGMP snooping, DHCP snooping, and MLD snooping. This can also happen for IPv4/v6 packets with IP options/ extension headers that need processing in software.
Workaround: None. (CSCsq99468)
You only see this behavior if you initially did not allocate a VLAN before you configure the IFM, and then at a later time allocate the same VLAN.
Workaround: Unconfigure, and then reconfigure the IFM on the port.
Workaround: Disable native VLAN tagging on the trunk port of the switch using the
no switchport trunk native vlan tag command.
The active supervisor engine also displays following log message for each linecard slot in the chassis:
If the standby supervisor engine boots, the active supervisor engine displays the following message and reboots:
While active supervisor engine is up, no traffic can be handled by the switch.
The two supervisor engines might alternately reboot continuously.
Workaround: Use Cisco IOS Release 12.2(53)SG4, 12.2(54)SG, 15.0(1)SG or later images with WS-C4510R+E and WS-C4507R+E chassis.
Cisco IOS Release 12.2(53)SG3 and earlier are not supported on WS-C4510R+E and WS-4507R+E chassis and should display a valid error message when loaded.
Workaround: Load a LAN Base image from Cisco IOS Release 12.2(53)SG4 and later.
This section lists the resolved caveats in Release 12.2(53)SG7:
Workaround: Do not use AAA accounting with the broadcast keyword. CSCts56125
Products that are not running Cisco IOS software are not vulnerable.
Cisco has released free software updates that address these vulnerabilities.
The HTTP server may be disabled as a workaround for the vulnerability described in this advisory.
This advisory is available at the following link:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120328-pai
Additional information on Cisco's security vulnerability policy can be found at the URL:
http://www.cisco.com/web/about/security/psirt/security_vulnerability_policy.html
Cisco has released free software updates that address this vulnerability. Workarounds that mitigate this vulnerability are available. This advisory is available at the following link:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120328-msdp
Note The March 28, 2012, Cisco IOS Software Security Advisory bundled publication includes nine Cisco Security Advisories. Each advisory lists the Cisco IOS Software releases that correct the vulnerability or vulnerabilities detailed in the advisory as well as the Cisco IOS Software releases that correct all vulnerabilities in the March 2012 bundled publication.
Individual publication links are in ''Cisco Event Response: Semiannual Cisco IOS Software Security Advisory Bundled Publication'' at the following link:
http://www.cisco.com/web/about/security/intelligence/Cisco_ERP_mar12.html
provided the following conditions apply:
– A switchport is configured with the following:
authentication event server dead action authorize...
authenticaton event server alive action reinitalize
– The RADIUS server was down previously, and a port without traffic (for example, a hub with no devices attached) was authorized into the inaccessible authentication bypass (IAB) VLAN without an associated MAC address.
The RADIUS server becomes available again, and the IAB-authorized port transitions to another state.
This section lists the open caveats for Cisco IOS Release 12.2(53)SG6:
Workaround: When using the access-list N permit host hostname command, specify the IP address of the host rather than the hostname (CSCef67489)
Workaround: Verify that the MAC addresses being transmitted through the system are learned.
Workaround: None. (CSCeg48586)
– If such a certificate does not exist and the device's hostname and default_domain are set, then a persistent self-signed certificate is generated.
– If such a certificate exists, the FQDN in the certificate is compared with the current device's hostname and default_domain. If either differs from the FQDN in the certificate, the existing persistent self-signed certificate is replaced with a new one with the updated FQDN. Be aware that the existing keypair is used in the new certificate.
On a switch that supports redundancy, the generation of the self-signed certificate occurs independently on the active and the standby supervisor engines, and the certificates differ. After switchover, the HTTP client that holds the old certificate cannot connect to the HTTPS server.
Workaround: Reconnect. (CSCsb11964)
This only affects a switch that has any of the following queues configured as SPAN source in releases prior to 12.2(31)SG and saved to the startup configuration. The SPAN destination would not get the same traffic after upgrading to 12.2(31)SG.
Workaround: After upgrading to 12.2(31)SG and later releases, remove the old SPAN source configuration and reconfigure with the new queue names/IDs. For example:
Workaround: None. (CSCsc11726)
This situation could occur for these reasons:
– A packet requires an IP redirect to an IP unnumbered outgoing port within 3 minutes of booting the Catalyst 4500 series switch.
– The switch administrator enters the shutdown and no shutdown commands on an outgoing interface that has enabled IP unnumbered. The switch receives packets that require redirection; and the destination MAC address is already in ARP table.
– Do not inject packets that require an IP redirect sent out to an IP unnumbered port within 3 minutes of booting the Catalyst 4500 series switch.
– Configure the correct default gateway on the host side. (CSCse75660)
Workaround: None. (CSCsg58526)
This does not affect performance.
Workaround: Enter the no shutdown command. (CSCsg27395)
Workaround: Remove the transceiver from the new port and place it in the old port. After the SFP is recognized in the old port, remove it slowly and insert it in the new port. (CSCse34693).
Workaround: None. This is an informational message. (CSCsi60898)
Workaround: None. (CSCsm30320)
Workarounds: Do one of the following:
– After a reload, copy the startup-config to the running-config.
– Use a loopback interface as the target of the ip unnumbered command.
– Change the CLI configuration so that during bootup the router port is created first.
Workaround: When the port channel starts to flap, enter shut and no shut on the port channel. After the first switchover and after deleting the port channel, create a new channel. (CSCsr00333)
Workaround: Before removing a line card, delete the statically configured ip source binding entries on any of the interfaces on the line card. (CSCsv54529)
Workaround: Clear the errors with the clear ethernet cfm errors command. (CSCsv43819)
Workaround: Shut down, and then reopen the interface. (CSCso50921)
Workaround: Configure an ISL/dot1q trunk port. (CSCsu43445)
Workaround: Do one of the following:
– Reload the standby switch again with the line card in place.
– Remove and reenter the commands on the active supervisor engine. The standby supervisor engine will acquire this change.
This applies to classic or E-series Catalyst 4500 supervisor engines running
Cisco IOS Release 12.2(50)SG
Workaround: None. (CSCsw14005)
If the switch were to run a supervisor switchover while in this state, the host's MAC address would not be present in the new active supervisor engine’s MAC address table, causing possible connectivity interruption on the host.
Workaround: Enter the shutdown command, followed by the no shutdown command on the interface. This triggers relearning and synchronizing of the host's MAC to the standby supervisor engine. CSCsw91661
The statistics are displayed properly on the active supervisor.
Workaround: Configure a lower value for the low threshold so that the frame errors are seen divided into the expected number of frame errored seconds.
Workaround: Specify a profile name when you enter the diagnostic command.
You might want to avoid requesting on demand send for invalid modules. First, enter the
show module command to check for valid or present modules.
The queue transmit counters as well as the policing statistics (if any) are correct.
CSCsz06719 (4500 + 4900, for now)
This only happens when the switch is running network mobility service protocol (nmsp). It does not happen if the phone is CDP enabled.
Workaround: Use the VLAN ID or name to differentiate the IP phone and the PC sitting behind the phone on the WCS.
The IP phone is detected on the voice VLAN, and the displayed information of serial number, model number, and software version is correct. However, a PC sitting behind the phone is detected on a data VLAN, and the displayed device information is wrong and should be ignored.
Assuming that you configured authentication open on the port and a host is authenticated on that port, if you unconfigure open auth (no authentication open), the STP state becomes blocked on an authenticated port.
The connected host is authenticated so it should be able to send traffic and the STP state should be Forwarding.
Workaround: Enter shut, then no shut on the port.
Workaround: When interface mode is changed from Layer2 to Layer3, manually change interface trust state by enter the cos trust dscp command.
This occurs only if the following conditions are satisfied:
– Multi-host mode configured on the port with the authentication host-mode multi-host command.
– Default ACL (the IP access-list) configured on the interface specifies deny ip any any.
– Dynamic policy authorization for the client specifies permit ip any any.
Workaround: Add entries to the Default ACL in addition to 'deny ip any any'.
Despite the different default value, you can configure any value in the time range.
Workaround: Reload the linecard by entering the hw-module reset command.
The show memory debug leak lowmem command can work in extremely low memory conditions but might crash the switch due to its very high CPU intensity. It also takes between 20 and 90 minutes to complete.
Workaround: If call or packet drops persist, contact TAC rather than entering these commands on your own. CSCsi48986
Workaround: When creating the file, enter some characters, remove the ftp command, then re-enter it as follows:
Workaround: Load Cisco IOS Releases 12.2(53)SG4, 12.2(54)SG, 15.0(1)SG or later.
Workaround: Do not use AAA accounting with the broadcast keyword. CSCts56125
Products that are not running Cisco IOS software are not vulnerable.
Cisco has released free software updates that address these vulnerabilities.
The HTTP server may be disabled as a workaround for the vulnerability described in this advisory.
This advisory is available at the following link:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120328-pai
Additional information on Cisco's security vulnerability policy can be found at the URL:
http://www.cisco.com/web/about/security/psirt/security_vulnerability_policy.html
Cisco has released free software updates that address this vulnerability. Workarounds that mitigate this vulnerability are available. This advisory is available at the following link:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120328-msdp
Note The March 28, 2012, Cisco IOS Software Security Advisory bundled publication includes nine Cisco Security Advisories. Each advisory lists the Cisco IOS Software releases that correct the vulnerability or vulnerabilities detailed in the advisory as well as the Cisco IOS Software releases that correct all vulnerabilities in the March 2012 bundled publication.
Individual publication links are in ''Cisco Event Response: Semiannual Cisco IOS Software Security Advisory Bundled Publication'' at the following link:
http://www.cisco.com/web/about/security/intelligence/Cisco_ERP_mar12.html
provided the following conditions apply:
– A switchport is configured with the following:
authentication event server dead action authorize...
authenticaton event server alive action reinitalize
– The RADIUS server was down previously, and a port without traffic (for example, a hub with no devices attached) was authorized into the inaccessible authentication bypass (IAB) VLAN without an associated MAC address.
The RADIUS server becomes available again, and the IAB-authorized port transitions to another state.
Workaround: Retain the default setting (VLAN 1) for the native VLAN on trunks ports. CSCud05521
Workaround: None. (CSCso93282)
When Supervisor Engine II+10GE attempts to boot in a 4510R+E chassis, the following error message is displayed:
Supervisor Engine II+10GE is not supported on a ten-slot chassis. So, the correct message is displayed but the chassis type listed is WS-C4510R-E instead of WS-C4510R+E.
– Place the Supervisor Engine II+10GE in a seven-slot chassis.
– Place a supervisor engine that is supported in a ten-slot chassis. The discrepancy in identifying the chassis type is purely cosmetic.
Workaround: None. (CSCsk66449)
When an output service policy attaches to an interface and if the policy is configured to apply DBL on a queue, the flows that are enqueued are subjected to the DBL algorithm. One or more flows that are classified as belligerent (flows that do not back off in response to drops because of congestion in the queue) continue to be classified as belligerent even when DBL is disabled on that queue.
For this condition to persist, the transmit queues in question must remain congested for a long period of time, and that congestion must be caused by flows that remain belligerent.
Workaround: Provided the queue in question is nondefault (queuing actions are not configured in the class-default class of the policy map), detach and reattach the service policy.
If this happens on the default queue, modifying and resetting some queuing parameters such as bandwidth and shape resolves the problem. (CSCsk62457
On a switch running Cisco IOS Release 12.2(40)SG, all MTU values configured on a line card are set to default when the module is reset. MTU values are not retained for modules that are physically moved.
Workaround: None. (CSCsk52542)
Workaround: Reinsert the X2. (CSCsk43618)
When a packet is sent to the CPU it may get sent out on some other interface. If so, the original CoS value for a.1X packet cannot be matched by software QoS (according to CSCsk66449). The packet is transmitted with the CoS value it was generated with (7, for the MLDv1 packets described here).
Part of the root cause of this problem is captured in CSCsk66449, which indicates that the software QoS cannot match a.1X packet. (CSCsk72544)
Workaround: Enter the show policy-map interface command to find the actual burst value programmed. (CSCsi71036)
Workaround: None. If you enter the show policy-map name, however, the unconditional marking actions appear. (CSCsi94144)
Workaround: None. (CSCsl72868)
Workaround: To ensure that the DBL action operates on the default queue, use the queue-limit command to specify an explicit queue size. This command dictates the size range. (CSCso06422)
This behavior occurs in a redundant switch when the active supervisor engine is running Cisco IOS, the standby supervisor engine is in ROMMON, and the standby supervisor engine’s ROMMON is upgraded from version 0.34 or to a later version. The upgrade process causes the uplinks on the standby supervisor engine to go down but the active supervisor engine is unaware of this.
Workarounds: To resume normal operation, do one of the following:
– Reload both supervisor engines with the redundancy reload shelf command.
– Power-cycle the standby supervisor engine by briefly pulling it from the chassis.
There is no workaround for the link flap issue. (CSCsm81875)
This problem can happen when pause frames are sent to the switch port and the flow control receive configuration is toggled on 10-Gb port.
Workaround: Change the flow control receive configuration when no traffic exists. (CSCso71647)
The issue is observed only for packets that are logically switched but are internally controlled such that on egress the system is generated by the switch itself. This can happen for certain snooping features such as DAI, IGMP snooping, DHCP snooping, and MLD snooping. This can also happen for IPv4/v6 packets with IP options/ extension headers that need processing in software.
Workaround: None. (CSCsq99468)
You only see this behavior if you initially did not allocate a VLAN before you configure the IFM, and then at a later time allocate the same VLAN.
Workaround: Unconfigure, and then reconfigure the IFM on the port.
Workaround: Disable native VLAN tagging on the trunk port of the switch using the
no switchport trunk native vlan tag command.
The active supervisor engine also displays following log message for each linecard slot in the chassis:
If the standby supervisor engine boots, the active supervisor engine displays the following message and reboots:
While active supervisor engine is up, no traffic can be handled by the switch.
The two supervisor engines might alternately reboot continuously.
Workaround: Use Cisco IOS Release 12.2(53)SG4, 12.2(54)SG, 15.0(1)SG or later images with WS-C4510R+E and WS-C4507R+E chassis.
Cisco IOS Release 12.2(53)SG3 and earlier are not supported on WS-C4510R+E and WS-4507R+E chassis and should display a valid error message when loaded.
Workaround: Load a LAN Base image from Cisco IOS Release 12.2(53)SG4 and later.
This section lists the resolved caveats in Release 12.2(53)SG6:
– Force the supplicant to use multicast EAPOL.
– Avoid authentication open mode. CSCtq33048
Workaround: Re-enter the rep preempt segment command.
Workaround: Ensure that a policy is configured on an interface prior to changing a default next-hop in route-map. CSCtr31759
– Traps are not sent through IPv6.
– SNMP GETs sent to a switch IPv6 address trigger a traceback.
Workaround: Perform the following task:
1. Disable the SNMP engine with the no snmp-server command.
2. Configure an IPv4 address and an IPv6 address on loopback interfaces.
Workaround: Perform the following task:
1. Disable the SNMP engine with the no snmp-server command.
2. Configure an IP address and an IPv6 address on loopback interfaces.
Workaround: Configure static MAC addresses for the source addresses on the backup flex link interface. CSCtr40070
Issue is likely not to appear in environments with low latency (<5msec).
– None (regarding ethernet jitter probe)
– Consider using the IP sla ethernet echo probes to collect RTT statistics. CSCtb96522
Workaround: Disable LLDP MA TLV sending on the peers. CSCtj22354
Workaround: Use getnext rather than get to list valid indicies for the MIB OID. CSCtr52740
– Delete and add impacted VLAN with no vlan vlan_id and vlan vlan_id commands.
– Flap the impacted port channel with the shutdown and no shutdown commands. CSCtr17251
Workaround: Reconfigure VLAN load balancing with a different configuration, by performing the following task:
a. Reconfigure the VLAN load balancing configuration on the desired REP ports.
b. Use the shut command on any one REP port in the segment to cause a failure in that segment.
c. Use the no-shut on the same port to restore normal REP topology with one ALT port.
d. Invoke manual preemption on a primary edge port to obtain VLAN load balancing with the new configuration.
This section lists the open caveats for Cisco IOS Release 12.2(53)SG5:
Workaround: When using the access-list N permit host hostname command, specify the IP address of the host rather than the hostname (CSCef67489)
Workaround: Verify that the MAC addresses being transmitted through the system are learned.
Workaround: None. (CSCeg48586)
– If such a certificate does not exist and the device's hostname and default_domain are set, then a persistent self-signed certificate is generated.
– If such a certificate exists, the FQDN in the certificate is compared with the current device's hostname and default_domain. If either differs from the FQDN in the certificate, the existing persistent self-signed certificate is replaced with a new one with the updated FQDN. Be aware that the existing keypair is used in the new certificate.
On a switch that supports redundancy, the generation of the self-signed certificate occurs independently on the active and the standby supervisor engines, and the certificates differ. After switchover, the HTTP client that holds the old certificate cannot connect to the HTTPS server.
Workaround: Reconnect. (CSCsb11964)
This only affects a switch that has any of the following queues configured as SPAN source in releases prior to 12.2(31)SG and saved to the startup configuration. The SPAN destination would not get the same traffic after upgrading to 12.2(31)SG.
Workaround: After upgrading to 12.2(31)SG and later releases, remove the old SPAN source configuration and reconfigure with the new queue names/IDs. For example:
Workaround: None. (CSCsc11726)
This situation could occur for these reasons:
– A packet requires an IP redirect to an IP unnumbered outgoing port within 3 minutes of booting the Catalyst 4500 series switch.
– The switch administrator enters the shutdown and no shutdown commands on an outgoing interface that has enabled IP unnumbered. The switch receives packets that require redirection; and the destination MAC address is already in ARP table.
– Do not inject packets that require an IP redirect sent out to an IP unnumbered port within 3 minutes of booting the Catalyst 4500 series switch.
– Configure the correct default gateway on the host side. (CSCse75660)
Workaround: None. (CSCsg58526)
This does not affect performance.
Workaround: Enter the no shutdown command. (CSCsg27395)
Workaround: Remove the transceiver from the new port and place it in the old port. After the SFP is recognized in the old port, remove it slowly and insert it in the new port. (CSCse34693).
Workaround: None. This is an informational message. (CSCsi60898)
Workaround: None. (CSCsm30320)
Workarounds: Do one of the following:
– After a reload, copy the startup-config to the running-config.
– Use a loopback interface as the target of the ip unnumbered command.
– Change the CLI configuration so that during bootup the router port is created first.
Workaround: When the port channel starts to flap, enter shut and no shut on the port channel. After the first switchover and after deleting the port channel, create a new channel. (CSCsr00333)
Workaround: Before removing a line card, delete the statically configured ip source binding entries on any of the interfaces on the line card. (CSCsv54529)
Workaround: Clear the errors with the clear ethernet cfm errors command. (CSCsv43819)
Workaround: Shut down, and then reopen the interface. (CSCso50921)
Workaround: Configure an ISL/dot1q trunk port. (CSCsu43445)
Workaround: Do one of the following:
– Reload the standby switch again with the line card in place.
– Remove and reenter the commands on the active supervisor engine. The standby supervisor engine will acquire this change.
Workaround: Reconfigure VLAN load balancing with a different configuration, by performing the following task:
a. Reconfigure the VLAN load balancing configuration on the desired REP ports.
b. Use the shut command on any one REP port in the segment to cause a failure in that segment.
c. Use the no-shut on the same port to restore normal REP topology with one ALT port.
d. Invoke manual preemption on a primary edge port to obtain VLAN load balancing with the new configuration.
This applies to classic or E-series Catalyst 4500 supervisor engines running
Cisco IOS Release 12.2(50)SG
Workaround: None. (CSCsw14005)
If the switch were to run a supervisor switchover while in this state, the host's MAC address would not be present in the new active supervisor engine’s MAC address table, causing possible connectivity interruption on the host.
Workaround: Enter the shutdown command, followed by the no shutdown command on the interface. This triggers relearning and synchronizing of the host's MAC to the standby supervisor engine. CSCsw91661
The statistics are displayed properly on the active supervisor.
Workaround: Configure a lower value for the low threshold so that the frame errors are seen divided into the expected number of frame errored seconds.
Workaround: Specify a profile name when you enter the diagnostic command.
You might want to avoid requesting on demand send for invalid modules. First, enter the
show module command to check for valid or present modules.
The queue transmit counters as well as the policing statistics (if any) are correct.
CSCsz06719 (4500 + 4900, for now)
This only happens when the switch is running network mobility service protocol (nmsp). It does not happen if the phone is CDP enabled.
Workaround: Use the VLAN ID or name to differentiate the IP phone and the PC sitting behind the phone on the WCS.
The IP phone is detected on the voice VLAN, and the displayed information of serial number, model number, and software version is correct. However, a PC sitting behind the phone is detected on a data VLAN, and the displayed device information is wrong and should be ignored.
Assuming that you configured authentication open on the port and a host is authenticated on that port, if you unconfigure open auth (no authentication open), the STP state becomes blocked on an authenticated port.
The connected host is authenticated so it should be able to send traffic and the STP state should be Forwarding.
Workaround: Enter shut, then no shut on the port.
Workaround: When interface mode is changed from Layer2 to Layer3, manually change interface trust state by enter the cos trust dscp command.
This occurs only if the following conditions are satisfied:
– Multi-host mode configured on the port with the authentication host-mode multi-host command.
– Default ACL (the IP access-list) configured on the interface specifies deny ip any any.
– Dynamic policy authorization for the client specifies permit ip any any.
Workaround: Add entries to the Default ACL in addition to 'deny ip any any'.
Despite the different default value, you can configure any value in the time range.
Workaround: Reload the linecard by entering the hw-module reset command.
The show memory debug leak lowmem command can work in extremely low memory conditions but might crash the switch due to its very high CPU intensity. It also takes between 20 and 90 minutes to complete.
Workaround: If call or packet drops persist, contact TAC rather than entering these commands on your own. CSCsi48986
Workaround: When creating the file, enter some characters, remove the ftp command, then re-enter it as follows:
Workaround: Load Cisco IOS Releases 12.2(53)SG4, 12.2(54)SG, 15.0(1)SG or later.
Workaround: Do not use AAA accounting with the broadcast keyword. CSCts56125
Products that are not running Cisco IOS software are not vulnerable.
Cisco has released free software updates that address these vulnerabilities.
The HTTP server may be disabled as a workaround for the vulnerability described in this advisory.
This advisory is available at the following link:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120328-pai
Additional information on Cisco's security vulnerability policy can be found at the URL:
http://www.cisco.com/web/about/security/psirt/security_vulnerability_policy.html
Cisco has released free software updates that address this vulnerability. Workarounds that mitigate this vulnerability are available. This advisory is available at the following link:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120328-msdp
Note The March 28, 2012, Cisco IOS Software Security Advisory bundled publication includes nine Cisco Security Advisories. Each advisory lists the Cisco IOS Software releases that correct the vulnerability or vulnerabilities detailed in the advisory as well as the Cisco IOS Software releases that correct all vulnerabilities in the March 2012 bundled publication.
Individual publication links are in ''Cisco Event Response: Semiannual Cisco IOS Software Security Advisory Bundled Publication'' at the following link:
http://www.cisco.com/web/about/security/intelligence/Cisco_ERP_mar12.html
provided the following conditions apply:
– A switchport is configured with the following:
authentication event server dead action authorize...
authenticaton event server alive action reinitalize
– The RADIUS server was down previously, and a port without traffic (for example, a hub with no devices attached) was authorized into the inaccessible authentication bypass (IAB) VLAN without an associated MAC address.
The RADIUS server becomes available again, and the IAB-authorized port transitions to another state.
Workaround: Retain the default setting (VLAN 1) for the native VLAN on trunks ports. CSCud05521
Workaround: None. (CSCso93282)
When Supervisor Engine II+10GE attempts to boot in a 4510R+E chassis, the following error message is displayed:
Supervisor Engine II+10GE is not supported on a ten-slot chassis. So, the correct message is displayed but the chassis type listed is WS-C4510R-E instead of WS-C4510R+E.
– Place the Supervisor Engine II+10GE in a seven-slot chassis.
– Place a supervisor engine that is supported in a ten-slot chassis. The discrepancy in identifying the chassis type is purely cosmetic.
Workaround: None. (CSCsk66449)
When an output service policy attaches to an interface and if the policy is configured to apply DBL on a queue, the flows that are enqueued are subjected to the DBL algorithm. One or more flows that are classified as belligerent (flows that do not back off in response to drops because of congestion in the queue) continue to be classified as belligerent even when DBL is disabled on that queue.
For this condition to persist, the transmit queues in question must remain congested for a long period of time, and that congestion must be caused by flows that remain belligerent.
Workaround: Provided the queue in question is nondefault (queuing actions are not configured in the class-default class of the policy map), detach and reattach the service policy.
If this happens on the default queue, modifying and resetting some queuing parameters such as bandwidth and shape resolves the problem. (CSCsk62457
On a switch running Cisco IOS Release 12.2(40)SG, all MTU values configured on a line card are set to default when the module is reset. MTU values are not retained for modules that are physically moved.
Workaround: None. (CSCsk52542)
Workaround: Reinsert the X2. (CSCsk43618)
When a packet is sent to the CPU it may get sent out on some other interface. If so, the original CoS value for a.1X packet cannot be matched by software QoS (according to CSCsk66449). The packet is transmitted with the CoS value it was generated with (7, for the MLDv1 packets described here).
Part of the root cause of this problem is captured in CSCsk66449, which indicates that the software QoS cannot match a.1X packet. (CSCsk72544)
Workaround: Enter the show policy-map interface command to find the actual burst value programmed. (CSCsi71036)
Workaround: None. If you enter the show policy-map name, however, the unconditional marking actions appear. (CSCsi94144)
Workaround: None. (CSCsl72868)
Workaround: To ensure that the DBL action operates on the default queue, use the queue-limit command to specify an explicit queue size. This command dictates the size range. (CSCso06422)
This behavior occurs in a redundant switch when the active supervisor engine is running Cisco IOS, the standby supervisor engine is in ROMMON, and the standby supervisor engine’s ROMMON is upgraded from version 0.34 or to a later version. The upgrade process causes the uplinks on the standby supervisor engine to go down but the active supervisor engine is unaware of this.
Workarounds: To resume normal operation, do one of the following:
– Reload both supervisor engines with the redundancy reload shelf command.
– Power-cycle the standby supervisor engine by briefly pulling it from the chassis.
There is no workaround for the link flap issue. (CSCsm81875)
This problem can happen when pause frames are sent to the switch port and the flow control receive configuration is toggled on 10-Gb port.
Workaround: Change the flow control receive configuration when no traffic exists. (CSCso71647)
The issue is observed only for packets that are logically switched but are internally controlled such that on egress the system is generated by the switch itself. This can happen for certain snooping features such as DAI, IGMP snooping, DHCP snooping, and MLD snooping. This can also happen for IPv4/v6 packets with IP options/ extension headers that need processing in software.
Workaround: None. (CSCsq99468)
You only see this behavior if you initially did not allocate a VLAN before you configure the IFM, and then at a later time allocate the same VLAN.
Workaround: Unconfigure, and then reconfigure the IFM on the port.
Workaround: Disable native VLAN tagging on the trunk port of the switch using the
no switchport trunk native vlan tag command.
The active supervisor engine also displays following log message for each linecard slot in the chassis:
If the standby supervisor engine boots, the active supervisor engine displays the following message and reboots:
While active supervisor engine is up, no traffic can be handled by the switch.
The two supervisor engines might alternately reboot continuously.
Workaround: Use Cisco IOS Release 12.2(53)SG4, 12.2(54)SG, 15.0(1)SG or later images with WS-C4510R+E and WS-C4507R+E chassis.
Cisco IOS Release 12.2(53)SG3 and earlier are not supported on WS-C4510R+E and WS-4507R+E chassis and should display a valid error message when loaded.
Workaround: Load a LAN Base image from Cisco IOS Release 12.2(53)SG4 and later.
This section lists the resolved caveats in Release 12.2(53)SG5:
– Do not provide an extra space while specifying a proxy ACL ACE.
– Use a Downloadable ACL or a Filter-ID ACL rather than a proxy ACL. CSCtk67010
This occurs when a peer switch is connected to a line card in a non-redundant switch and you reload the active supervisor engine. Some interfaces on some linecards remain linked up. Far-end switches must rely on protocol timeouts to detect the switch’s reload.
This situation only occurs with the WS-X4648-RJ45-E and WS-X4548-RJ45-V-E line cards.
Workaround: Reset the linecards with the hw module module n command, then reload the switch. CSCtl11764
– Enter the power inline never command.
– Enter the speed auto 10 100 command. CSCtn43537
Workaround: Disable gratuitous ARP on the Windows device. CSCtn27420
– Configure the supplicant to retry 802.1X.
– Connect or disconnect to the port. CSCtl89361
Workaround: Disable AAA accounting. CSCtl77241
The problem is not observed for another 72 weeks.
Workaround: Configure ip routing. CSCtj20399
This happens only if you use a custom banner configured like the following:
Workaround: Remove the custom banner. CSCtb77378
– Reconfigure 802.1X with the no dot1x pae authenticator/dot1x pae authenticator command.
– Reload the switch. CSCtd43793
LLDP IEEE standard requires frames sent untagged. With this issue, some peer devices may reject the tagged LLDP frame.
Workaround: Use the default native VLAN for the trunks. CSCtn29321
Workaround: If you include snmp-server enable traps envmon in the device configuration, a ciscoEnvMonSuppStatusChangeNotification is generated when the power supply either turns off or fails. CSCtl72109
Workaround: Disable IP cef accounting. CSCtn68186
– vlan dot1q tag native is configured.
– Either the native VLAN is not allowed on the trunk, or the peer does not accept tagged channel protocol packets.
Workaround: Ensure that all trunk ports in the REP ring topology have the same list of VLANs, including ports in other REP rings that export STCNs into the REP ring where the problem is observed. CSCto67625
Workaround: Avoid using DHCP load balancing. CSCth00482
Workaround: Use a different host-mode. CSCti92970
Workaround: Allow SSH connections only from trusted hosts. CSCth87458
– Do not provide any extra space while specifying a proxy ACL ACE.
– Use DACL or Filter-Id ACL instead of proxy ACLs. CSCtk67010
This behavior is anticipated. In multi-auth mode, the system cannot distinguish between the data client that is attached to the phone and those that are attached to the switch through a hub.
Workaround: Remove the entire route-map and re-create it. CSCsr23563
Here is how you configured the banner:
If you telnet to the router, the banner shows correctly as follows:
Workaround: Enter shut and no shut on the alternate interface. CSCtn03533
Workaround: Avoid configuring overlapping IP addresses. CSCtj96095
This section lists the open caveats for Cisco IOS Release 12.2(53)SG4:
Workaround: When using the access-list N permit host hostname command, specify the IP address of the host rather than the hostname (CSCef67489)
Workaround: Verify that the MAC addresses being transmitted through the system are learned.
Workaround: None. (CSCeg48586)
– If such a certificate does not exist and the device's hostname and default_domain are set, then a persistent self-signed certificate is generated.
– If such a certificate exists, the FQDN in the certificate is compared with the current device's hostname and default_domain. If either differs from the FQDN in the certificate, the existing persistent self-signed certificate is replaced with a new one with the updated FQDN. Be aware that the existing keypair is used in the new certificate.
On a switch that supports redundancy, the generation of the self-signed certificate occurs independently on the active and the standby supervisor engines, and the certificates differ. After switchover, the HTTP client that holds the old certificate cannot connect to the HTTPS server.
Workaround: Reconnect. (CSCsb11964)
This only affects a switch that has any of the following queues configured as SPAN source in releases prior to 12.2(31)SG and saved to the startup configuration. The SPAN destination would not get the same traffic after upgrading to 12.2(31)SG.
Workaround: After upgrading to 12.2(31)SG and later releases, remove the old SPAN source configuration and reconfigure with the new queue names/IDs. For example:
Workaround: None. (CSCsc11726)
This situation could occur for these reasons:
– A packet requires an IP redirect to an IP unnumbered outgoing port within 3 minutes of booting the Catalyst 4500 series switch.
– The switch administrator enters the shutdown and no shutdown commands on an outgoing interface that has enabled IP unnumbered. The switch receives packets that require redirection; and the destination MAC address is already in ARP table.
– Do not inject packets that require an IP redirect sent out to an IP unnumbered port within 3 minutes of booting the Catalyst 4500 series switch.
– Configure the correct default gateway on the host side. (CSCse75660)
Workaround: None. (CSCsg58526)
This does not affect performance.
Workaround: Enter the no shutdown command. (CSCsg27395)
Workaround: Remove the transceiver from the new port and place it in the old port. After the SFP is recognized in the old port, remove it slowly and insert it in the new port. (CSCse34693).
Workaround: None. This is an informational message. (CSCsi60898)
Workaround: None. (CSCsm30320)
Workarounds: Do one of the following:
– After a reload, copy the startup-config to the running-config.
– Use a loopback interface as the target of the ip unnumbered command.
– Change the CLI configuration so that during bootup the router port is created first.
Workaround: When the port channel starts to flap, enter shut and no shut on the port channel. After the first switchover and after deleting the port channel, create a new channel. (CSCsr00333)
Workaround: Before removing a line card, delete the statically configured ip source binding entries on any of the interfaces on the line card. (CSCsv54529)
Workaround: Clear the errors with the clear ethernet cfm errors command. (CSCsv43819)
Workaround: Shut down, and then reopen the interface. (CSCso50921)
Workaround: Configure an ISL/dot1q trunk port. (CSCsu43445)
Workaround: Do one of the following:
– Reload the standby switch again with the line card in place.
– Remove and reenter the commands on the active supervisor engine. The standby supervisor engine will acquire this change.
Workaround: Reconfigure VLAN load balancing with a different configuration, by performing the following task:
a. Reconfigure the VLAN load balancing configuration on the desired REP ports.
b. Use the shut command on any one REP port in the segment to cause a failure in that segment.
c. Use the no-shut on the same port to restore normal REP topology with one ALT port.
d. Invoke manual preemption on a primary edge port to obtain VLAN load balancing with the new configuration.
This applies to classic or E-series Catalyst 4500 supervisor engines running
Cisco IOS Release 12.2(50)SG
Workaround: None. (CSCsw14005)
If the switch were to run a supervisor switchover while in this state, the host's MAC address would not be present in the new active supervisor engine’s MAC address table, causing possible connectivity interruption on the host.
Workaround: Enter the shutdown command, followed by the no shutdown command on the interface. This triggers relearning and synchronizing of the host's MAC to the standby supervisor engine. CSCsw91661
The statistics are displayed properly on the active supervisor.
Workaround: Configure a lower value for the low threshold so that the frame errors are seen divided into the expected number of frame errored seconds.
Workaround: Specify a profile name when you enter the diagnostic command.
You might want to avoid requesting on demand send for invalid modules. First, enter the
show module command to check for valid or present modules.
The queue transmit counters as well as the policing statistics (if any) are correct.
CSCsz06719 (4500 + 4900, for now)
This only happens when the switch is running network mobility service protocol (nmsp). It does not happen if the phone is CDP enabled.
Workaround: Use the VLAN ID or name to differentiate the IP phone and the PC sitting behind the phone on the WCS.
The IP phone is detected on the voice VLAN, and the displayed information of serial number, model number, and software version is correct. However, a PC sitting behind the phone is detected on a data VLAN, and the displayed device information is wrong and should be ignored.
Assuming that you configured authentication open on the port and a host is authenticated on that port, if you unconfigure open auth (no authentication open), the STP state becomes blocked on an authenticated port.
The connected host is authenticated so it should be able to send traffic and the STP state should be Forwarding.
Workaround: Enter shut, then no shut on the port.
Workaround: When interface mode is changed from Layer2 to Layer3, manually change interface trust state by enter the cos trust dscp command.
This occurs only if the following conditions are satisfied:
– Multi-host mode configured on the port with the authentication host-mode multi-host command.
– Default ACL (the IP access-list) configured on the interface specifies deny ip any any.
– Dynamic policy authorization for the client specifies permit ip any any.
Despite the different default value, you can configure any value in the time range.
Workaround: Reload the linecard by entering the hw-module reset command.
The show memory debug leak lowmem command can work in extremely low memory conditions but might crash the switch due to its very high CPU intensity. It also takes between 20 and 90 minutes to complete.
Workaround: If call or packet drops persist, contact TAC rather than entering these commands on your own. CSCsi48986
Workaround: When creating the file, enter some characters, remove the ftp command, then re-enter it as follows:
Workaround: Load Cisco IOS Releases 12.2(53)SG4, 12.2(54)SG, 15.0(1)SG or later.
– Do not provide an extra space while specifying a proxy ACL ACE.
– Use a Downloadable ACL or a Filter-ID ACL instead of a proxy ACL.
Workaround: Disable the ip cef accounting non-recursive command.
Workaround: Do not use AAA accounting with the broadcast keyword. CSCts56125
Products that are not running Cisco IOS software are not vulnerable.
Cisco has released free software updates that address these vulnerabilities.
The HTTP server may be disabled as a workaround for the vulnerability described in this advisory.
This advisory is available at the following link:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120328-pai
Additional information on Cisco's security vulnerability policy can be found at the URL:
http://www.cisco.com/web/about/security/psirt/security_vulnerability_policy.html
Cisco has released free software updates that address this vulnerability. Workarounds that mitigate this vulnerability are available. This advisory is available at the following link:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120328-msdp
Note The March 28, 2012, Cisco IOS Software Security Advisory bundled publication includes nine Cisco Security Advisories. Each advisory lists the Cisco IOS Software releases that correct the vulnerability or vulnerabilities detailed in the advisory as well as the Cisco IOS Software releases that correct all vulnerabilities in the March 2012 bundled publication.
Individual publication links are in ''Cisco Event Response: Semiannual Cisco IOS Software Security Advisory Bundled Publication'' at the following link:
http://www.cisco.com/web/about/security/intelligence/Cisco_ERP_mar12.html
provided the following conditions apply:
– A switchport is configured with the following:
authentication event server dead action authorize...
authenticaton event server alive action reinitalize
– The RADIUS server was down previously, and a port without traffic (for example, a hub with no devices attached) was authorized into the inaccessible authentication bypass (IAB) VLAN without an associated MAC address.
The RADIUS server becomes available again, and the IAB-authorized port transitions to another state.
Workaround: Retain the default setting (VLAN 1) for the native VLAN on trunks ports. CSCud05521
Workaround: None. (CSCso93282)
When Supervisor Engine II+10GE attempts to boot in a non-production 4510R+E chassis, the following error message is displayed:
Supervisor Engine II+10GE is not supported on a ten-slot chassis. So, the correct message is displayed but the chassis type listed is WS-C4510R-E instead of WS-C4510R+E.
– Place the Supervisor Engine II+10GE in a seven-slot chassis.
– Place a supervisor engine that is supported in a ten-slot chassis. The discrepancy in identifying the chassis type is purely cosmetic.
Workaround: None. (CSCsk66449)
When an output service policy attaches to an interface and if the policy is configured to apply DBL on a queue, the flows that are enqueued are subjected to the DBL algorithm. One or more flows that are classified as belligerent (flows that do not back off in response to drops because of congestion in the queue) continue to be classified as belligerent even when DBL is disabled on that queue.
For this condition to persist, the transmit queues in question must remain congested for a long period of time, and that congestion must be caused by flows that remain belligerent.
Workaround: Provided the queue in question is nondefault (queuing actions are not configured in the class-default class of the policy map), detach and reattach the service policy.
If this happens on the default queue, modifying and resetting some queuing parameters such as bandwidth and shape resolves the problem. (CSCsk62457
On a switch running Cisco IOS Release 12.2(40)SG, all MTU values configured on a line card are set to default when the module is reset. MTU values are not retained for modules that are physically moved.
Workaround: None. (CSCsk52542)
Workaround: Reinsert the X2. (CSCsk43618)
When a packet is sent to the CPU it may get sent out on some other interface. If so, the original CoS value for a.1X packet cannot be matched by software QoS (according to CSCsk66449). The packet is transmitted with the CoS value it was generated with (7, for the MLDv1 packets described here).
Part of the root cause of this problem is captured in CSCsk66449, which indicates that the software QoS cannot match a.1X packet. (CSCsk72544)
Workaround: Enter the show policy-map interface command to find the actual burst value programmed. (CSCsi71036)
Workaround: None. If you enter the show policy-map name, however, the unconditional marking actions appear. (CSCsi94144)
Workaround: None. (CSCsl72868)
Workaround: To ensure that the DBL action operates on the default queue, use the queue-limit command to specify an explicit queue size. This command dictates the size range. (CSCso06422)
This behavior occurs in a redundant switch when the active supervisor engine is running Cisco IOS, the standby supervisor engine is in ROMMON, and the standby supervisor engine’s ROMMON is upgraded from version 0.34 or to a later version. The upgrade process causes the uplinks on the standby supervisor engine to go down but the active supervisor engine is unaware of this.
Workarounds: To resume normal operation, do one of the following:
– Reload both supervisor engines with the redundancy reload shelf command.
– Power-cycle the standby supervisor engine by briefly pulling it from the chassis.
There is no workaround for the link flap issue. (CSCsm81875)
This problem can happen when pause frames are sent to the switch port and the flow control receive configuration is toggled on 10-Gb port.
Workaround: Change the flow control receive configuration when no traffic exists. (CSCso71647)
The issue is observed only for packets that are logically switched but are internally controlled such that on egress the system is generated by the switch itself. This can happen for certain snooping features such as DAI, IGMP snooping, DHCP snooping, and MLD snooping. This can also happen for IPv4/v6 packets with IP options/ extension headers that need processing in software.
Workaround: None. (CSCsq99468)
You only see this behavior if you initially did not allocate a VLAN before you configure the IFM, and then at a later time allocate the same VLAN.
Workaround: Unconfigure, and then reconfigure the IFM on the port.
Workaround: Disable native VLAN tagging on the trunk port of the switch using the
no switchport trunk native vlan tag command.
The active supervisor engine also displays following log message for each linecard slot in the chassis:
If the standby supervisor engine boots, the active supervisor engine displays the following message and reboots:
While active supervisor engine is up, no traffic can be handled by the switch.
The two supervisor engines might alternately reboot continuously.
Workaround: Use Cisco IOS Release 12.2(53)SG4, 12.2(54)SG, 15.0(1)SG or later images with WS-C4510R+E and WS-C4507R+E chassis.
Cisco IOS Release 12.2(53)SG3 and earlier are not supported on WS-C4510R+E and WS-4507R+E chassis and should display a valid error message when loaded.
Workaround: Load a LAN Base image from Cisco IOS Release 12.2(53)SG4 and later.
This section lists the resolved caveats in Release 12.2(53)SG4:
This does not impact REP functionality, but it impacts restoration timing. Traffic restoration time after the failure of a REP segment sometimes exceeds 200ms.
Workaround: Unconfigure the customized HTML page to use default internal Webauth pages and reload the switch after changing the configuration. CSCti81874
Workaround: When a log message appears indicating that the SFP+ has been removed, do one of the following:
– Enter any commands for that port.
– Insert an SFP+ in that port.
This section lists the open caveats for Cisco IOS Release 12.2(53)SG3:
Workaround: When using the access-list N permit host hostname command, specify the IP address of the host rather than the hostname (CSCef67489)
Workaround: Verify that the MAC addresses being transmitted through the system are learned.
Workaround: None. (CSCeg48586)
– If such a certificate does not exist and the device's hostname and default_domain are set, then a persistent self-signed certificate is generated.
– If such a certificate exists, the FQDN in the certificate is compared with the current device's hostname and default_domain. If either differs from the FQDN in the certificate, the existing persistent self-signed certificate is replaced with a new one with the updated FQDN. Be aware that the existing keypair is used in the new certificate.
On a switch that supports redundancy, the generation of the self-signed certificate occurs independently on the active and the standby supervisor engines, and the certificates differ. After switchover, the HTTP client that holds the old certificate cannot connect to the HTTPS server.
Workaround: Reconnect. (CSCsb11964)
This only affects a switch that has any of the following queues configured as SPAN source in releases prior to 12.2(31)SG and saved to the startup configuration. The SPAN destination would not get the same traffic after upgrading to 12.2(31)SG.
Workaround: After upgrading to 12.2(31)SG and later releases, remove the old SPAN source configuration and reconfigure with the new queue names/IDs. For example:
Workaround: None. (CSCsc11726)
This situation could occur for these reasons:
– A packet requires an IP redirect to an IP unnumbered outgoing port within 3 minutes of booting the Catalyst 4500 series switch.
– The switch administrator enters the shutdown and no shutdown commands on an outgoing interface that has enabled IP unnumbered. The switch receives packets that require redirection; and the destination MAC address is already in ARP table.
– Do not inject packets that require an IP redirect sent out to an IP unnumbered port within 3 minutes of booting the Catalyst 4500 series switch.
– Configure the correct default gateway on the host side. (CSCse75660)
Workaround: None. (CSCsg58526)
This does not affect performance.
Workaround: Enter the no shutdown command. (CSCsg27395)
Workaround: Remove the transceiver from the new port and place it in the old port. After the SFP is recognized in the old port, remove it slowly and insert it in the new port. (CSCse34693).
Workaround: None. This is an informational message. (CSCsi60898)
Workaround: None. (CSCsm30320)
Workarounds: Do one of the following:
– After a reload, copy the startup-config to the running-config.
– Use a loopback interface as the target of the ip unnumbered command.
– Change the CLI configuration so that during bootup the router port is created first.
Workaround: When the port channel starts to flap, enter shut and no shut on the port channel. After the first switchover and after deleting the port channel, create a new channel. (CSCsr00333)
Workaround: Before removing a line card, delete the statically configured ip source binding entries on any of the interfaces on the line card. (CSCsv54529)
Workaround: Clear the errors with the clear ethernet cfm errors command. (CSCsv43819)
Workaround: Shut down, and then reopen the interface. (CSCso50921)
Workaround: Configure an ISL/dot1q trunk port. (CSCsu43445)
Workaround: Do one of the following:
– Reload the standby switch again with the line card in place.
– Remove and reenter the commands on the active supervisor engine. The standby supervisor engine will acquire this change.
Workaround: Reconfigure VLAN load balancing with a different configuration, by performing the following task:
a. Reconfigure the VLAN load balancing configuration on the desired REP ports.
b. Use the shut command on any one REP port in the segment to cause a failure in that segment.
c. Use the no-shut on the same port to restore normal REP topology with one ALT port.
d. Invoke manual preemption on a primary edge port to obtain VLAN load balancing with the new configuration.
Workaround: When a log message appears indicating that the SFP+ has been removed, do one of the following:
– Enter any commands for that port.
– Insert an SFP+ in that port.
– Reinsert the removed SFP+ in any other port.
This applies to classic or E-series Catalyst 4500 supervisor engines running
Cisco IOS Release 12.2(50)SG
Workaround: None. (CSCsw14005)
If the switch were to run a supervisor switchover while in this state, the host's MAC address would not be present in the new active supervisor engine’s MAC address table, causing possible connectivity interruption on the host.
Workaround: Enter the shutdown command, followed by the no shutdown command on the interface. This triggers relearning and synchronizing of the host's MAC to the standby supervisor engine. CSCsw91661
This does not impact REP functionality, but it impacts restoration timing. Traffic restoration time after the failure of a REP segment sometimes exceeds 200ms.
The statistics are displayed properly on the active supervisor.
Workaround: Configure a lower value for the low threshold so that the frame errors are seen divided into the expected number of frame errored seconds.
Workaround: Specify a profile name when you enter the diagnostic command.
You might want to avoid requesting on demand send for invalid modules. First, enter the
show module command to check for valid or present modules.
The queue transmit counters as well as the policing statistics (if any) are correct.
CSCsz06719 (4500 + 4900, for now)
This only happens when the switch is running network mobility service protocol (nmsp). It does not happen if the phone is CDP enabled.
Workaround: Use the VLAN ID or name to differentiate the IP phone and the PC sitting behind the phone on the WCS.
The IP phone is detected on the voice VLAN, and the displayed information of serial number, model number, and software version is correct. However, a PC sitting behind the phone is detected on a data VLAN, and the displayed device information is wrong and should be ignored.
Assuming that you configured authentication open on the port and a host is authenticated on that port, if you unconfigure open auth (no authentication open), the STP state becomes blocked on an authenticated port.
The connected host is authenticated so it should be able to send traffic and the STP state should be Forwarding.
Workaround: Enter shut, then no shut on the port.
Workaround: When interface mode is changed from Layer2 to Layer3, manually change interface trust state by enter the cos trust dscp command.
This occurs only if the following conditions are satisfied:
– Multi-host mode configured on the port with the authentication host-mode multi-host command.
– Default ACL (the IP access-list) configured on the interface specifies deny ip any any.
– Dynamic policy authorization for the client specifies permit ip any any.
Despite the different default value, you can configure any value in the time range.
Workaround: Reload the linecard by entering the hw-module reset command.
The show memory debug leak lowmem command can work in extremely low memory conditions but might crash the switch due to its very high CPU intensity. It also takes between 20 and 90 minutes to complete.
Workaround: If call or packet drops persist, contact TAC rather than entering these commands on your own. CSCsi48986
Workaround: Unconfigure the customized HTML page to use default internal Webauth pages and reload the switch after changing the configuration. CSCti81874
Workaround: Disable the ip cef accounting non-recursive command.
Workaround: Do not use AAA accounting with the broadcast keyword. CSCts56125
Products that are not running Cisco IOS software are not vulnerable.
Cisco has released free software updates that address these vulnerabilities.
The HTTP server may be disabled as a workaround for the vulnerability described in this advisory.
This advisory is available at the following link:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120328-pai
Additional information on Cisco's security vulnerability policy can be found at the URL:
http://www.cisco.com/web/about/security/psirt/security_vulnerability_policy.html
Cisco has released free software updates that address this vulnerability. Workarounds that mitigate this vulnerability are available. This advisory is available at the following link:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120328-msdp
Note The March 28, 2012, Cisco IOS Software Security Advisory bundled publication includes nine Cisco Security Advisories. Each advisory lists the Cisco IOS Software releases that correct the vulnerability or vulnerabilities detailed in the advisory as well as the Cisco IOS Software releases that correct all vulnerabilities in the March 2012 bundled publication.
Individual publication links are in ''Cisco Event Response: Semiannual Cisco IOS Software Security Advisory Bundled Publication'' at the following link:
http://www.cisco.com/web/about/security/intelligence/Cisco_ERP_mar12.html
provided the following conditions apply:
– A switchport is configured with the following:
authentication event server dead action authorize...
authenticaton event server alive action reinitalize
– The RADIUS server was down previously, and a port without traffic (for example, a hub with no devices attached) was authorized into the inaccessible authentication bypass (IAB) VLAN without an associated MAC address.
The RADIUS server becomes available again, and the IAB-authorized port transitions to another state.
Workaround: Retain the default setting (VLAN 1) for the native VLAN on trunks ports. CSCud05521
Workaround: None. (CSCsk66449)
When an output service policy attaches to an interface and if the policy is configured to apply DBL on a queue, the flows that are enqueued are subjected to the DBL algorithm. One or more flows that are classified as belligerent (flows that do not back off in response to drops because of congestion in the queue) continue to be classified as belligerent even when DBL is disabled on that queue.
For this condition to persist, the transmit queues in question must remain congested for a long period of time, and that congestion must be caused by flows that remain belligerent.
Workaround: Provided the queue in question is nondefault (queuing actions are not configured in the class-default class of the policy map), detach and reattach the service policy.
If this happens on the default queue, modifying and resetting some queuing parameters such as bandwidth and shape resolves the problem. (CSCsk62457
On a switch running Cisco IOS Release 12.2(40)SG, all MTU values configured on a line card are set to default when the module is reset. MTU values are not retained for modules that are physically moved.
Workaround: None. (CSCsk52542)
Workaround: Reinsert the X2. (CSCsk43618)
When a packet is sent to the CPU it may get sent out on some other interface. If so, the original CoS value for a.1X packet cannot be matched by software QoS (according to CSCsk66449). The packet is transmitted with the CoS value it was generated with (7, for the MLDv1 packets described here).
Part of the root cause of this problem is captured in CSCsk66449, which indicates that the software QoS cannot match a.1X packet. (CSCsk72544)
Workaround: Enter the show policy-map interface command to find the actual burst value programmed. (CSCsi71036)
Workaround: None. If you enter the show policy-map name, however, the unconditional marking actions appear. (CSCsi94144)
Workaround: None. (CSCsl72868)
Workaround: To ensure that the DBL action operates on the default queue, use the queue-limit command to specify an explicit queue size. This command dictates the size range. (CSCso06422)
This behavior occurs in a redundant switch when the active supervisor engine is running Cisco IOS, the standby supervisor engine is in ROMMON, and the standby supervisor engine’s ROMMON is upgraded from version 0.34 or to a later version. The upgrade process causes the uplinks on the standby supervisor engine to go down but the active supervisor engine is unaware of this.
Workarounds: To resume normal operation, do one of the following:
– Reload both supervisor engines with the redundancy reload shelf command.
– Power-cycle the standby supervisor engine by briefly pulling it from the chassis.
There is no workaround for the link flap issue. (CSCsm81875)
This problem can happen when pause frames are sent to the switch port and the flow control receive configuration is toggled on 10-Gb port.
Workaround: Change the flow control receive configuration when no traffic exists. (CSCso71647)
The issue is observed only for packets that are logically switched but are internally controlled such that on egress the system is generated by the switch itself. This can happen for certain snooping features such as DAI, IGMP snooping, DHCP snooping, and MLD snooping. This can also happen for IPv4/v6 packets with IP options/ extension headers that need processing in software.
Workaround: None. (CSCsq99468)
You only see this behavior if you initially did not allocate a VLAN before you configure the IFM, and then at a later time allocate the same VLAN.
Workaround: Unconfigure, and then reconfigure the IFM on the port.
Workaround: Disable native VLAN tagging on the trunk port of the switch using the
no switchport trunk native vlan tag command.
This section lists the resolved caveats in Release 12.2(53)SG3:
Workaround: Embed the graphic into the HTML file up to 256 kilobytes (according to RFC 2397).
The following browsers support RFC 2397:
Workaround: Reload the active and standby supervisor engine.
While performing OIR of the supervisor engines, the engines must be removed completely before re-insertion. CSCsy70428
Prior to Cisco IOS Release 12.2(53)SG1 and 12.2(50)SG6, the switchport block multicast command blocks IP Multicast, Layer 2 multicast, and broadcast traffic. CSCta61825
This happens provided on the following conditions apply:
– A route map matching on prefix-list is attached to an input interface as a PBR policy.
– A route map for PBR (already attached to an interface) is configured or modified to match on prefix-list(s) instead of ACL(s).
Workaround: Configure the route map for PBR to only match on ACLs. CSCtg22126
After upgrading to Cisco IOS Release 12.2(53)SG3, ensure that the vrf-also keyword follows any access-class under the SSH configuration.
This section lists the open caveats for Cisco IOS Release 12.2(53)SG2:
Workaround: When using the access-list N permit host hostname command, specify the IP address of the host rather than the hostname (CSCef67489)
Workaround: Verify that the MAC addresses being transmitted through the system are learned.
Workaround: None. (CSCeg48586)
– If such a certificate does not exist and the device's hostname and default_domain are set, then a persistent self-signed certificate is generated.
– If such a certificate exists, the FQDN in the certificate is compared with the current device's hostname and default_domain. If either differs from the FQDN in the certificate, the existing persistent self-signed certificate is replaced with a new one with the updated FQDN. Be aware that the existing keypair is used in the new certificate.
On a switch that supports redundancy, the generation of the self-signed certificate occurs independently on the active and the standby supervisor engines, and the certificates differ. After switchover, the HTTP client that holds the old certificate cannot connect to the HTTPS server.
Workaround: Reconnect. (CSCsb11964)
This only affects a switch that has any of the following queues configured as SPAN source in releases prior to 12.2(31)SG and saved to the startup configuration. The SPAN destination would not get the same traffic after upgrading to 12.2(31)SG.
Workaround: After upgrading to 12.2(31)SG and later releases, remove the old SPAN source configuration and reconfigure with the new queue names/IDs. For example:
Workaround: None. (CSCsc11726)
This situation could occur for these reasons:
– A packet requires an IP redirect to an IP unnumbered outgoing port within 3 minutes of booting the Catalyst 4500 series switch.
– The switch administrator enters the shutdown and no shutdown commands on an outgoing interface that has enabled IP unnumbered. The switch receives packets that require redirection; and the destination MAC address is already in ARP table.
– Do not inject packets that require an IP redirect sent out to an IP unnumbered port within 3 minutes of booting the Catalyst 4500 series switch.
– Configure the correct default gateway on the host side. (CSCse75660)
Workaround: None. (CSCsg58526)
This does not affect performance.
Workaround: Enter the no shutdown command. (CSCsg27395)
Workaround: Remove the transceiver from the new port and place it in the old port. After the SFP is recognized in the old port, remove it slowly and insert it in the new port. (CSCse34693).
Workaround: None. This is an informational message. (CSCsi60898)
Workaround: None. (CSCsm30320)
Workarounds: Do one of the following:
– After a reload, copy the startup-config to the running-config.
– Use a loopback interface as the target of the ip unnumbered command.
– Change the CLI configuration so that during bootup the router port is created first.
Workaround: When the port channel starts to flap, enter shut and no shut on the port channel. After the first switchover and after deleting the port channel, create a new channel. (CSCsr00333)
Workaround: Before removing a line card, delete the statically configured ip source binding entries on any of the interfaces on the line card. (CSCsv54529)
Workaround: Clear the errors with the clear ethernet cfm errors command. (CSCsv43819)
Workaround: Shut down, and then reopen the interface. (CSCso50921)
Workaround: Configure an ISL/dot1q trunk port. (CSCsu43445)
Workaround: None. (CSCsv42869)
Workaround: Do one of the following:
– Reload the standby switch again with the line card in place.
– Remove and reenter the commands on the active supervisor engine. The standby supervisor engine will acquire this change.
Workaround: Reconfigure VLAN load balancing with a different configuration, by performing the following task:
a. Reconfigure the VLAN load balancing configuration on the desired REP ports.
b. Use the shut command on any one REP port in the segment to cause a failure in that segment.
c. Use the no-shut on the same port to restore normal REP topology with one ALT port.
d. Invoke manual preemption on a primary edge port to obtain VLAN load balancing with the new configuration.
Workaround: When a log message appears indicating that the SFP+ has been removed, do one of the following:
– Enter any commands for that port.
– Insert an SFP+ in that port.
– Reinsert the removed SFP+ in any other port.
Workaround: Embed the graphic into the HTML file up to 256 kilobytes (according to RFC 2397).
The following browsers support RFC 2397:
This applies to classic or E-series Catalyst 4500 supervisor engines running
Cisco IOS Release 12.2(50)SG
Workaround: None. (CSCsw14005)
If the switch were to run a supervisor switchover while in this state, the host's MAC address would not be present in the new active supervisor engine’s MAC address table, causing possible connectivity interruption on the host.
Workaround: Enter the shutdown command, followed by the no shutdown command on the interface. This triggers relearning and synchronizing of the host's MAC to the standby supervisor engine. CSCsw91661
This does not impact REP functionality, but it impacts restoration timing. Traffic restoration time after the failure of a REP segment sometimes exceeds 200ms.
The statistics are displayed properly on the active supervisor.
Workaround: Configure a lower value for the low threshold so that the frame errors are seen divided into the expected number of frame errored seconds.
Workaround: Reload the active and standby supervisor engine.
While performing OIR of the supervisor engines, the engines must be removed completely before re-insertion.
Workaround: Specify a profile name when you enter the diagnostic command.
You might want to avoid requesting on demand send for invalid modules. First, enter the
show module command to check for valid or present modules.
The queue transmit counters as well as the policing statistics (if any) are correct.
CSCsz06719 (4500 + 4900, for now)
This only happens when the switch is running network mobility service protocol (nmsp). It does not happen if the phone is CDP enabled.
Workaround: Use the VLAN ID or name to differentiate the IP phone and the PC sitting behind the phone on the WCS.
The IP phone is detected on the voice VLAN, and the displayed information of serial number, model number, and software version is correct. However, a PC sitting behind the phone is detected on a data VLAN, and the displayed device information is wrong and should be ignored.
Assuming that you configured authentication open on the port and a host is authenticated on that port, if you unconfigure open auth (no authentication open), the STP state becomes blocked on an authenticated port.
The connected host is authenticated so it should be able to send traffic and the STP state should be Forwarding.
Workaround: Enter shut, then no shut on the port.
Workaround: When interface mode is changed from Layer2 to Layer3, manually change interface trust state by enter the cos trust dscp command.
Prior to Cisco IOS Release 12.2(53)SG1 and 12.2(50)SG6, the switchport block multicast command blocks IP Multicast, Layer 2 multicast, and broadcast traffic. (CSCta61825)
This occurs only if the following conditions are satisfied:
– Multi-host mode configured on the port with the authentication host-mode multi-host command.
– Default ACL (the IP access-list) configured on the interface specifies deny ip any any.
– Dynamic policy authorization for the client specifies permit ip any any.
Despite the different default value, you can configure any value in the time range.
This happens provided on the following conditions apply:
– A route map matching on prefix-list is attached to an input interface as a PBR policy.
– A route map for PBR (already attached to an interface) is configured or modified to match on prefix-list(s) instead of ACL(s).
Workaround: Configure the route map for PBR to only match on ACLs.
Workaround: Disable the ip cef accounting non-recursive command.
Workaround: Do not use AAA accounting with the broadcast keyword. CSCts56125
Products that are not running Cisco IOS software are not vulnerable.
Cisco has released free software updates that address these vulnerabilities.
The HTTP server may be disabled as a workaround for the vulnerability described in this advisory.
This advisory is available at the following link:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120328-pai
Additional information on Cisco's security vulnerability policy can be found at the URL:
http://www.cisco.com/web/about/security/psirt/security_vulnerability_policy.html
Cisco has released free software updates that address this vulnerability. Workarounds that mitigate this vulnerability are available. This advisory is available at the following link:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120328-msdp
Note The March 28, 2012, Cisco IOS Software Security Advisory bundled publication includes nine Cisco Security Advisories. Each advisory lists the Cisco IOS Software releases that correct the vulnerability or vulnerabilities detailed in the advisory as well as the Cisco IOS Software releases that correct all vulnerabilities in the March 2012 bundled publication.
Individual publication links are in ''Cisco Event Response: Semiannual Cisco IOS Software Security Advisory Bundled Publication'' at the following link:
http://www.cisco.com/web/about/security/intelligence/Cisco_ERP_mar12.html
provided the following conditions apply:
– A switchport is configured with the following:
authentication event server dead action authorize...
authenticaton event server alive action reinitalize
– The RADIUS server was down previously, and a port without traffic (for example, a hub with no devices attached) was authorized into the inaccessible authentication bypass (IAB) VLAN without an associated MAC address.
The RADIUS server becomes available again, and the IAB-authorized port transitions to another state.
Workaround: Retain the default setting (VLAN 1) for the native VLAN on trunks ports. CSCud05521
Workaround: None. (CSCsk66449)
When an output service policy attaches to an interface and if the policy is configured to apply DBL on a queue, the flows that are enqueued are subjected to the DBL algorithm. One or more flows that are classified as belligerent (flows that do not back off in response to drops because of congestion in the queue) continue to be classified as belligerent even when DBL is disabled on that queue.
For this condition to persist, the transmit queues in question must remain congested for a long period of time, and that congestion must be caused by flows that remain belligerent.
Workaround: Provided the queue in question is nondefault (queuing actions are not configured in the class-default class of the policy map), detach and reattach the service policy.
If this happens on the default queue, modifying and resetting some queuing parameters such as bandwidth and shape resolves the problem. (CSCsk62457
On a switch running Cisco IOS Release 12.2(40)SG, all MTU values configured on a line card are set to default when the module is reset. MTU values are not retained for modules that are physically moved.
Workaround: None. (CSCsk52542)
Workaround: Reinsert the X2. (CSCsk43618)
When a packet is sent to the CPU it may get sent out on some other interface. If so, the original CoS value for a.1X packet cannot be matched by software QoS (according to CSCsk66449). The packet is transmitted with the CoS value it was generated with (7, for the MLDv1 packets described here).
Part of the root cause of this problem is captured in CSCsk66449, which indicates that the software QoS cannot match a.1X packet. (CSCsk72544)
Workaround: Enter the show policy-map interface command to find the actual burst value programmed. (CSCsi71036)
Workaround: None. If you enter the show policy-map name, however, the unconditional marking actions appear. (CSCsi94144)
Workaround: None. (CSCsl72868)
Workaround: To ensure that the DBL action operates on the default queue, use the queue-limit command to specify an explicit queue size. This command dictates the size range. (CSCso06422)
This behavior occurs in a redundant switch when the active supervisor engine is running Cisco IOS, the standby supervisor engine is in ROMMON, and the standby supervisor engine’s ROMMON is upgraded from version 0.34 or to a later version. The upgrade process causes the uplinks on the standby supervisor engine to go down but the active supervisor engine is unaware of this.
Workarounds: To resume normal operation, do one of the following:
– Reload both supervisor engines with the redundancy reload shelf command.
– Power-cycle the standby supervisor engine by briefly pulling it from the chassis.
There is no workaround for the link flap issue. (CSCsm81875)
This problem can happen when pause frames are sent to the switch port and the flow control receive configuration is toggled on 10-Gb port.
Workaround: Change the flow control receive configuration when no traffic exists. (CSCso71647)
The issue is observed only for packets that are logically switched but are internally controlled such that on egress the system is generated by the switch itself. This can happen for certain snooping features such as DAI, IGMP snooping, DHCP snooping, and MLD snooping. This can also happen for IPv4/v6 packets with IP options/ extension headers that need processing in software.
Workaround: None. (CSCsq99468)
You only see this behavior if you initially did not allocate a VLAN before you configure the IFM, and then at a later time allocate the same VLAN.
Workaround: Unconfigure, and then reconfigure the IFM on the port.
Workaround: Disable native VLAN tagging on the trunk port of the switch using the
no switchport trunk native vlan tag command.
This section lists the resolved caveats in Release 12.2(53)SG2:
This is only seen in Cisco IOS Release 12.2(52)SG.
Workaround: Downgrade to Cisco IOS Release 12.2(50)SG3.
Workaround: Configure the port in multi-domain mode (rather than multi-auth mode) with the authentication host-mode multi-domain command
Workaround: Avoid lengthy bootflash operations, like copying large files in IOS.
This is a side effect of a heavily shared path.
Workaround: Rename the flash device to the default name flash:.
You will need to disableWake-on-LAN on the interface.
Workaround: Reconfigure tracking on the newly created interface. (CSCsr66876)
Workaround: Do one of the following:
– Do not attach routers to PVLAN isolated ports.
– Disable IGMP snooping (either globally or on the VLAN).
– Do not use a router connected to PVLAN isolated port as a multicast source.
Workarounds: Do one of the following:
– Enter spanning-tree portfast then authentication control-direction in on a 802.1X port.
– Enter shut then no shut on a 802.1X port.
Workaround: Enter shut, then no shut on the port.
Workaround: Clear the ARP table on the neighbor switch.
Workaround: Disable explicit host tracking on the affected VLANs.
All software releases up to and including Cisco IOS Releases 12.2(31)SGA9, 12.2(50)SG6 and 12,2(53)SG1 are affected.
Workaround: After rebooting the switch, adjust the system clock with the clock set command.
This message is does not impact performance.
– Restart when it tries to power a PoE device
– Power on or off the PoE device at an incorrect time
This occurs when the time change for the next year occurs after the time change for the current year.
Before the time change occurs, use one of these workarounds:
– Remove the recurring events from the EnergyWise configuration, do not use recurring events for a week, and reconfigure them a week after the time change occurs.
– Use the energywise level level recurrence importance importance time-range time-range-nam e interface configuration command to reschedule the events.
– Use the power inline auto interface configuration command to power on the PoE port.
Workaround: Define the backup EtherChannel before applying the flexlink command. (CSCsq13477)
Workaround: Create an ACL to block non-RPF packets from entering non-RPF ports.
All software releases up to and including Cisco IOS Releases 12.2(31)SGA9, 12.2(50)SG6 and 12,2(53)SG1 are affected.
Workaround: After rebooting the switch, adjust the system clock with the clock set command.
The following conditions may cause a RACL to malfunction:
– ACL are applied on the output direction of the interface.
– IPv6 ACL contain Ace to match on the ICMP option fields (ICMP Type or ICMP Code).
Here are two examples of such non-functioning RACL:
The problem occurs when the following three conditions are met:
– A software-generated or software-switched packet exits an interface (P), which is a member of a VLAN (V).
– The packet is not a high priority; PAK_PRIORITY is not set.
– Of the three possible targets, port P, VLAN V, and port-VLAN PV in the output direction, a qos policy-map is attached only to the VLAN V in the output direction.
– Provided the VLAN-only policy-map has only marking actions., replace the VLAN-only policy-map with a port-VLAN policy-map on all the ports in the VLAN.
– Provided the VLAN-only policy-map has a policing action, retain the VLAN output policymap and attach a queuing action-only output policymap to all the ports in that VLAN.
The port level policy-map should appear as follows.
This problem is observed on images later than Cisco IOS Release 12.2(46)SG.
Workarounds: Use the show log command to find the cause of the power-down.
– LogGalInsufficientFansDetected messages in the log indicate a fan-tray failure.
– LogRkiosModuleShutdownTemp messages in the log indicate that the supervisor engine critical temperature exceeded the failure threshold.
This section lists the open caveats for Cisco IOS Release 12.2(53)SG1:
Workaround: When using the access-list N permit host hostname command, specify the IP address of the host rather than the hostname (CSCef67489)
Workaround: Verify that the MAC addresses being transmitted through the system are learned.
Workaround: None. (CSCeg48586)
– If such a certificate does not exist and the device's hostname and default_domain are set, then a persistent self-signed certificate is generated.
– If such a certificate exists, the FQDN in the certificate is compared with the current device's hostname and default_domain. If either differs from the FQDN in the certificate, the existing persistent self-signed certificate is replaced with a new one with the updated FQDN. Be aware that the existing keypair is used in the new certificate.
On a switch that supports redundancy, the generation of the self-signed certificate occurs independently on the active and the standby supervisor engines, and the certificates differ. After switchover, the HTTP client that holds the old certificate cannot connect to the HTTPS server.
Workaround: Reconnect. (CSCsb11964)
This only affects a switch that has any of the following queues configured as SPAN source in releases prior to 12.2(31)SG and saved to the startup configuration. The SPAN destination would not get the same traffic after upgrading to 12.2(31)SG.
Workaround: After upgrading to 12.2(31)SG and later releases, remove the old SPAN source configuration and reconfigure with the new queue names/IDs. For example:
Workaround: None. (CSCsc11726)
This situation could occur for these reasons:
– A packet requires an IP redirect to an IP unnumbered outgoing port within 3 minutes of booting the Catalyst 4500 series switch.
– The switch administrator enters the shutdown and no shutdown commands on an outgoing interface that has enabled IP unnumbered. The switch receives packets that require redirection; and the destination MAC address is already in ARP table.
– Do not inject packets that require an IP redirect sent out to an IP unnumbered port within 3 minutes of booting the Catalyst 4500 series switch.
– Configure the correct default gateway on the host side. (CSCse75660)
Workaround: None. (CSCsg58526)
This does not affect performance.
Workaround: Enter the no shutdown command. (CSCsg27395)
Workaround: Remove the transceiver from the new port and place it in the old port. After the SFP is recognized in the old port, remove it slowly and insert it in the new port. (CSCse34693).
Workaround: None. This is an informational message. (CSCsi60898)
Workaround: None. (CSCsm30320)
Workarounds: Do one of the following:
– After a reload, copy the startup-config to the running-config.
– Use a loopback interface as the target of the ip unnumbered command.
– Change the CLI configuration so that during bootup the router port is created first.
Workaround: When the port channel starts to flap, enter shut and no shut on the port channel. After the first switchover and after deleting the port channel, create a new channel. (CSCsr00333)
Workaround: Before removing a line card, delete the statically configured ip source binding entries on any of the interfaces on the line card. (CSCsv54529)
Workaround: Shut down, and then reopen the interface. (CSCso50921)
Workaround: Reconfigure tracking on the newly created interface. (CSCsr66876)
Workaround: Do one of the following:
– Do not attach routers to PVLAN isolated ports.
– Disable IGMP snooping (either globally or on the VLAN).
– Do not use a router connected to PVLAN isolated port as a multicast source.
Workaround: Configure an ISL/dot1q trunk port. (CSCsu43445)
Workarounds: Do one of the following:
– Enter spanning-tree portfast then authentication control-direction in on a 802.1X port.
– Enter shut then no shut on a 802.1X port.
Workaround: None. (CSCsv07019)
On a switch with multiple Layer 3 interfaces, if the CTS SXP connection is configured without specifying source IP address and no default SXP source IP address is configured on the box, different SXP connections may acquire different source IP address for each connection.
Workaround: Do one of the following:
– Ensure that only one active Layer 3 interface exists on the switch.
– Specify the source of the IP address in each SXP connection configuration to avoid ambiguity.
– Configure a default SXP source IP address so that the SXP connection without the source IP address will use this IP address.
Workaround: None. (CSCsv42869)
Workaround: Do one of the following:
– Reload the standby switch again with the line card in place.
– Remove and reenter the commands on the active supervisor engine. The standby supervisor engine will acquire this change.
Workaround: Reconfigure VLAN load balancing with a different configuration, by performing the following task:
a. Reconfigure the VLAN load balancing configuration on the desired REP ports.
b. Use the shut command on any one REP port in the segment to cause a failure in that segment.
c. Use the no-shut on the same port to restore normal REP topology with one ALT port.
d. Invoke manual preemption on a primary edge port to obtain VLAN load balancing with the new configuration.
Workaround: When a log message appears indicating that the SFP+ has been removed, do one of the following:
– Enter any commands for that port.
– Insert an SFP+ in that port.
– Reinsert the removed SFP+ in any other port.
Workaround: Embed the graphic into the HTML file up to 256 kilobytes (according to RFC 2397).
The following browsers support RFC 2397:
This applies to classic or E-series Catalyst 4500 supervisor engines running
Cisco IOS Release 12.2(50)SG
Workaround: None. (CSCsw14005)
If the switch were to run a supervisor switchover while in this state, the host's MAC address would not be present in the new active supervisor engine’s MAC address table, causing possible connectivity interruption on the host.
Workaround: Enter the shutdown command, followed by the no shutdown command on the interface. This triggers relearning and synchronizing of the host's MAC to the standby supervisor engine. CSCsw91661
This does not impact REP functionality, but it impacts restoration timing. Traffic restoration time after the failure of a REP segment sometimes exceeds 200ms.
The statistics are displayed properly on the active supervisor.
Workaround: Re-authenticate the client.
Workaround: Configure a lower value for the low threshold so that the frame errors are seen divided into the expected number of frame errored seconds.
Workaround: Reload the active and standby supervisor engine.
While performing OIR of the supervisor engines, the engines must be removed completely before re-insertion.
Workaround: Specify a profile name when you enter the diagnostic command.
You might want to avoid requesting on demand send for invalid modules. First, enter the
show module command to check for valid or present modules.
No TCAM entries are available for the new access-list.
Workaround: Manually remove and reapply the ACL after freeing hardware TCAM resources by removing or shortening other classification policies on the switch.
The queue transmit counters as well as the policing statistics (if any) are correct.
CSCsz06719 (4500 + 4900, for now)
Workaround: Enter shut, then no shut on the port.
Workaround: Clear the ARP table on the neighbor switch.
Workaround: Disable explicit host tracking on the affected VLANs.
This only happens when the switch is running network mobility service protocol (nmsp). It does not happen if the phone is CDP enabled.
Workaround: Use the VLAN ID or name to differentiate the IP phone and the PC sitting behind the phone on the WCS.
The IP phone is detected on the voice VLAN, and the displayed information of serial number, model number, and software version is correct. However, a PC sitting behind the phone is detected on a data VLAN, and the displayed device information is wrong and should be ignored.
Assuming that you configured authentication open on the port and a host is authenticated on that port, if you unconfigure open auth (no authentication open), the STP state becomes blocked on an authenticated port.
The connected host is authenticated so it should be able to send traffic and the STP state should be Forwarding.
Workaround: Enter shut, then no shut on the port.
Workaround: When interface mode is changed from Layer2 to Layer3, manually change interface trust state by enter the cos trust dscp command.
Workaround: Configure the port in multi-domain mode (rather than multi-auth mode) with the authentication host-mode multi-domain command
All software releases up to and including Cisco IOS Releases 12.2(31)SGA9, 12.2(50)SG6 and 12,2(53)SG1 are affected.
Workaround: After rebooting the switch, adjust the system clock with the clock set command.
Prior to Cisco IOS Release 12.2(53)SG1 and 12.2(50)SG6, the switchport block multicast command blocks IP Multicast, Layer 2 multicast, and broadcast traffic. (CSCta61825)
This message is does not impact performance.
This occurs only if the following conditions are satisfied:
– Multi-host mode configured on the port with the authentication host-mode multi-host command.
– Default ACL (the IP access-list) configured on the interface specifies deny ip any any.
– Dynamic policy authorization for the client specifies permit ip any any.
– Restart when it tries to power a PoE device
– Power on or off the PoE device at an incorrect time
This occurs when the time change for the next year occurs after the time change for the current year.
Before the time change occurs, use one of these workarounds:
– Remove the recurring events from the EnergyWise configuration, do not use recurring events for a week, and reconfigure them a week after the time change occurs.
– Use the energywise level level recurrence importance importance time-range time-range-nam e interface configuration command to reschedule the events.
– Use the power inline auto interface configuration command to power on the PoE port.
Workaround: Rename the flash device to the default name flash:.
Despite the different default value, you can configure any value in the time range.
Workaround: Disable the ip cef accounting non-recursive command.
Workaround: Do not use AAA accounting with the broadcast keyword. CSCts56125
Products that are not running Cisco IOS software are not vulnerable.
Cisco has released free software updates that address these vulnerabilities.
The HTTP server may be disabled as a workaround for the vulnerability described in this advisory.
This advisory is available at the following link:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120328-pai
Additional information on Cisco's security vulnerability policy can be found at the URL:
http://www.cisco.com/web/about/security/psirt/security_vulnerability_policy.html
Cisco has released free software updates that address this vulnerability. Workarounds that mitigate this vulnerability are available. This advisory is available at the following link:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120328-msdp
Note The March 28, 2012, Cisco IOS Software Security Advisory bundled publication includes nine Cisco Security Advisories. Each advisory lists the Cisco IOS Software releases that correct the vulnerability or vulnerabilities detailed in the advisory as well as the Cisco IOS Software releases that correct all vulnerabilities in the March 2012 bundled publication.
Individual publication links are in ''Cisco Event Response: Semiannual Cisco IOS Software Security Advisory Bundled Publication'' at the following link:
http://www.cisco.com/web/about/security/intelligence/Cisco_ERP_mar12.html
provided the following conditions apply:
– A switchport is configured with the following:
authentication event server dead action authorize...
authenticaton event server alive action reinitalize
– The RADIUS server was down previously, and a port without traffic (for example, a hub with no devices attached) was authorized into the inaccessible authentication bypass (IAB) VLAN without an associated MAC address.
The RADIUS server becomes available again, and the IAB-authorized port transitions to another state.
Workaround: Retain the default setting (VLAN 1) for the native VLAN on trunks ports. CSCud05521
Workaround: None. (CSCsk66449)
When an output service policy attaches to an interface and if the policy is configured to apply DBL on a queue, the flows that are enqueued are subjected to the DBL algorithm. One or more flows that are classified as belligerent (flows that do not back off in response to drops because of congestion in the queue) continue to be classified as belligerent even when DBL is disabled on that queue.
For this condition to persist, the transmit queues in question must remain congested for a long period of time, and that congestion must be caused by flows that remain belligerent.
Workaround: Provided the queue in question is nondefault (queuing actions are not configured in the class-default class of the policy map), detach and reattach the service policy.
If this happens on the default queue, modifying and resetting some queuing parameters such as bandwidth and shape resolves the problem. (CSCsk62457
Workarounds: Use the show log command to find the cause of the power-down.
– LogGalInsufficientFansDetected messages in the log indicate a fan-tray failure.
– LogRkiosModuleShutdownTemp messages in the log indicate that the supervisor engine critical temperature exceeded the failure threshold.
On a switch running Cisco IOS Release 12.2(40)SG, all MTU values configured on a line card are set to default when the module is reset. MTU values are not retained for modules that are physically moved.
Workaround: None. (CSCsk52542)
Workaround: Reinsert the X2. (CSCsk43618)
When a packet is sent to the CPU it may get sent out on some other interface. If so, the original CoS value for a.1X packet cannot be matched by software QoS (according to CSCsk66449). The packet is transmitted with the CoS value it was generated with (7, for the MLDv1 packets described here).
Part of the root cause of this problem is captured in CSCsk66449, which indicates that the software QoS cannot match a.1X packet. (CSCsk72544)
Workaround: Enter the show policy-map interface command to find the actual burst value programmed. (CSCsi71036)
Workaround: None. If you enter the show policy-map name, however, the unconditional marking actions appear. (CSCsi94144)
Workaround: None. (CSCsl72868)
Workaround: To ensure that the DBL action operates on the default queue, use the queue-limit command to specify an explicit queue size. This command dictates the size range. (CSCso06422)
This behavior occurs in a redundant switch when the active supervisor engine is running Cisco IOS, the standby supervisor engine is in ROMMON, and the standby supervisor engine’s ROMMON is upgraded from version 0.34 or to a later version. The upgrade process causes the uplinks on the standby supervisor engine to go down but the active supervisor engine is unaware of this.
Workarounds: To resume normal operation, do one of the following:
– Reload both supervisor engines with the redundancy reload shelf command.
– Power-cycle the standby supervisor engine by briefly pulling it from the chassis.
There is no workaround for the link flap issue. (CSCsm81875)
This problem can happen when pause frames are sent to the switch port and the flow control receive configuration is toggled on 10-Gb port.
Workaround: Change the flow control receive configuration when no traffic exists. (CSCso71647)
The issue is observed only for packets that are logically switched but are internally controlled such that on egress the system is generated by the switch itself. This can happen for certain snooping features such as DAI, IGMP snooping, DHCP snooping, and MLD snooping. This can also happen for IPv4/v6 packets with IP options/ extension headers that need processing in software.
Workaround: Enter shut followed by no shut on any REP port (of the same segment in which VLB is configured) in the topology. (CSCsq75342)
Workaround: Define the backup EtherChannel before applying the flexlink command. (CSCsq13477)
Workaround: None. (CSCsq99468)
You only see this behavior if you initially did not allocate a VLAN before you configure the IFM, and then at a later time allocate the same VLAN.
Workaround: Unconfigure, and then reconfigure the IFM on the port.
Workaround: Disable native VLAN tagging on the trunk port of the switch using the
no switchport trunk native vlan tag command.
This is only seen in Cisco IOS Release 12.2(52)SG.
Workaround: Downgrade to Cisco IOS Release 12.2(50)SG3.
Workaround: Create an ACL to block non-RPF packets from entering non-RPF ports.
All software releases up to and including Cisco IOS Releases 12.2(31)SGA9, 12.2(50)SG6 and 12,2(53)SG1 are affected.
Workaround: After rebooting the switch, adjust the system clock with the clock set command.
The following conditions may cause a RACL to malfunction:
– ACL are applied on the output direction of the interface.
– IPv6 ACL contain Ace to match on the ICMP option fields (ICMP Type or ICMP Code).
This section lists the resolved caveats in Release 12.2(53)SG1
All broadcast traffic (such as ARP request and DHCP discovery) are not received by the port. So, protocols that use such broadcasts stop working.
– Enabe ip pim spare-mode on a VLAN interface in a vrf without enabling multicast routing on the vrf.
– Enable multicast routing on the vrf and setting the STP threshold to infinity.
Workaround: Use static neighbors.
The show module command will indicate that the linecard is faulty.
Workaround: Enter hw-module reset on the failed module, and reseat the failed module.
This caveat occurs when a register value is corrupted and you subsequently enable a Layer 3 feature.
Workaround: Configure an access-list to permit the CPU generated packets and apply the ACL to the class-map.
Workaround: Enter either the show policy-map interface and show policy-map control-plane commands in Exec mode and not in policy-map config mode.
Workaround: Ensure that the port is active before apply the policy-map or entering the
show policy-map command.
The command to activate a previously inactive interface is the following:
hw-module module [module number] port-group [group number] select [gigabitethernet]
Workaround: Manually re-enter all entries with new time settings.
Downgrade to Cisco IOS Release 12.2(50)SG3 if needed.
Certain applications such as IP Source Guard and QoS enable ACL statistics by default. Configuring such features trigger the high CPU.
High CPU usage is observed through the show proc cpu command. The output of
the show platform health command reveals that the process using a high percentage of CPU is "K5AclCamStatsMan hw".
This issue can occur in any release after Cisco IOS Release 12.2(40)SG.
This issue is resolved in Cisco IOS Release 12.2(53)SG1 and 12.2(50)SG6.
Workaround: Reduce the size of the ACL, IPSG, and QoS configurations. If statistics are enabled explicitly for ACLs, disable them with the CLI.
If the high CPU is due to ACLs and IPSG, upgrade to the new software.
If the high CPU is due to the QoS configuration, upgrade the IOS image and enter the
no qos statistics classification command.
Workaround: Change the VTP version from 3 to version 2 or 1 and then revert to version 3.
This issue happens only on flexlink ports under the following two scenarios:
– You configure flexlink vlan load balancing before changing the port mode of a backup interface to trunk mode.
– Flexlink recovers from per vlan-port error disable states.
The syslog and Traceback do not impact functionality. Flexlink states end up with correct states and there is no impact on traffic forwarding.
The existing per-port error disable (that is, when a violation happens, the entire port will be error disabled) still works on flexlink.
Workaround: Use flexlink with VLAN load balancing.
If you do not want to use vlan load balancing, then enter the
switchport backup interface perfer vlan command on the Active interface, where vlan z is set to an unused vlan on the system
Workaround: None. Functionality is unaffected.
– Enter the mac address-table dynamic group protocols ip other command.
This section lists the open caveats for Cisco IOS Release 12.2(53)SG:
Workaround: When using the access-list N permit host hostname command, specify the IP address of the host rather than the hostname (CSCef67489)
Workaround: Verify that the MAC addresses being transmitted through the system are learned.
Workaround: None. (CSCeg48586)
– If such a certificate does not exist and the device's hostname and default_domain are set, then a persistent self-signed certificate is generated.
– If such a certificate exists, the FQDN in the certificate is compared with the current device's hostname and default_domain. If either differs from the FQDN in the certificate, the existing persistent self-signed certificate is replaced with a new one with the updated FQDN. Be aware that the existing keypair is used in the new certificate.
On a switch that supports redundancy, the generation of the self-signed certificate occurs independently on the active and the standby supervisor engines, and the certificates differ. After switchover, the HTTP client that holds the old certificate cannot connect to the HTTPS server.
Workaround: Reconnect. (CSCsb11964)
This only affects a switch that has any of the following queues configured as SPAN source in releases prior to 12.2(31)SG and saved to the startup configuration. The SPAN destination would not get the same traffic after upgrading to 12.2(31)SG.
Workaround: After upgrading to 12.2(31)SG and later releases, remove the old SPAN source configuration and reconfigure with the new queue names/IDs. For example:
Workaround: None. (CSCsc11726)
This situation could occur for these reasons:
– A packet requires an IP redirect to an IP unnumbered outgoing port within 3 minutes of booting the Catalyst 4500 series switch.
– The switch administrator enters the shutdown and no shutdown commands on an outgoing interface that has enabled IP unnumbered. The switch receives packets that require redirection; and the destination MAC address is already in ARP table.
– Do not inject packets that require an IP redirect sent out to an IP unnumbered port within 3 minutes of booting the Catalyst 4500 series switch.
– Configure the correct default gateway on the host side. (CSCse75660)
Workaround: None. (CSCsg58526)
This does not affect performance.
Workaround: Enter the no shutdown command. (CSCsg27395)
Workaround: Remove the transceiver from the new port and place it in the old port. After the SFP is recognized in the old port, remove it slowly and insert it in the new port. (CSCse34693).
Workaround: None. This is an informational message. (CSCsi60898)
Workaround: None. (CSCsm30320)
Workarounds: Do one of the following:
– After a reload, copy the startup-config to the running-config.
– Use a loopback interface as the target of the ip unnumbered command.
– Change the CLI configuration so that during bootup the router port is created first.
Workaround: When the port channel starts to flap, enter shut and no shut on the port channel. After the first switchover and after deleting the port channel, create a new channel. (CSCsr00333)
Workaround: Before removing a line card, delete the statically configured ip source binding entries on any of the interfaces on the line card. (CSCsv54529)
Workaround: Shut down, and then reopen the interface.
Workaround: Reconfigure tracking on the newly created interface. (CSCsr66876)
Workaround: Do one of the following:
– Do not attach routers to PVLAN isolated ports.
– Disable IGMP snooping (either globally or on the VLAN).
– Do not use a router connected to PVLAN isolated port as a multicast source.
Workaround: Configure an ISL/dot1q trunk port. (CSCsu43445)
Workarounds: Do one of the following:
– Enter spanning-tree portfast then authentication control-direction in on a 802.1X port.
– Enter shut then no shut on a 802.1X port.
Workaround: None. (CSCsv07019)
On a switch with multiple Layer 3 interfaces, if the CTS SXP connection is configured without specifying source IP address and no default SXP source IP address is configured on the box, different SXP connections may acquire different source IP address for each connection.
Workaround: Do one of the following:
– Ensure that only one active Layer 3 interface exists on the switch.
– Specify the source of the IP address in each SXP connection configuration to avoid ambiguity.
– Configure a default SXP source IP address so that the SXP connection without the source IP address will use this IP address.
Workaround: None. (CSCsv42869)
Workaround: Do one of the following:
– Reload the standby switch again with the line card in place.
– Remove and reenter the commands on the active supervisor engine. The standby supervisor engine will acquire this change.
Workaround: Reconfigure VLAN load balancing with a different configuration, by performing the following task:
a. Reconfigure the VLAN load balancing configuration on the desired REP ports.
b. Use the shut command on any one REP port in the segment to cause a failure in that segment.
c. Use the no-shut on the same port to restore normal REP topology with one ALT port.
d. Invoke manual preemption on a primary edge port to obtain VLAN load balancing with the new configuration.
Workaround: When a log message appears indicating that the SFP+ has been removed, do one of the following:
– Enter any commands for that port.
– Insert an SFP+ in that port.
– Reinsert the removed SFP+ in any other port.
Workaround: Embed the graphic into the HTML file up to 256 kilobytes (according to RFC 2397).
The following browsers support RFC 2397:
This applies to classic or E-series Catalyst 4500 supervisor engines running
Cisco IOS Release 12.2(50)SG
Workaround: None. (CSCsw14005)
If the switch were to run a supervisor switchover while in this state, the host's MAC address would not be present in the new active supervisor engine’s MAC address table, causing possible connectivity interruption on the host.
Workaround: Enter the shutdown command, followed by the no shutdown command on the interface. This triggers relearning and synchronizing of the host's MAC to the standby supervisor engine. CSCsw91661
This does not impact REP functionality, but it impacts restoration timing. Traffic restoration time after the failure of a REP segment sometimes exceeds 200ms.
The statistics are displayed properly on the active supervisor.
Workaround: Re-authenticate the client.
Workaround: Configure a lower value for the low threshold so that the frame errors are seen divided into the expected number of frame errored seconds.
Workaround: Reload the active and standby supervisor engine.
While performing OIR of the supervisor engines, the engines must be removed completely before re-insertion.
Workaround: Specify a profile name when you enter the diagnostic command.
You might want to avoid requesting on demand send for invalid modules. First, enter the
show module command to check for valid or present modules.
No TCAM entries are available for the new access-list.
Workaround: Manually remove and reapply the ACL after freeing hardware TCAM resources by removing or shortening other classification policies on the switch.
The queue transmit counters as well as the policing statistics (if any) are correct.
CSCsz06719 (4500 + 4900, for now)
Workaround: Enter shut, then no shut on the port.
Workaround: Manually re-enter all entries with new time settings.
Workaround: Clear the ARP table on the neighbor switch.
Workaround: Disable explicit host tracking on the affected VLANs.
This only happens when the switch is running network mobility service protocol (nmsp). It does not happen if the phone is CDP enabled.
Workaround: Use the VLAN ID or name to differentiate the IP phone and the PC sitting behind the phone on the WCS.
The IP phone is detected on the voice VLAN, and the displayed information of serial number, model number, and software version is correct. However, a PC sitting behind the phone is detected on a data VLAN, and the displayed device information is wrong and should be ignored.
Assuming that you configured authentication open on the port and a host is authenticated on that port, if you unconfigure open auth (no authentication open), the STP state becomes blocked on an authenticated port.
The connected host is authenticated so it should be able to send traffic and the STP state should be Forwarding.
Workaround: Enter shut, then no shut on the port.
Workaround: When interface mode is changed from Layer2 to Layer3, manually change interface trust state by enter the cos trust dscp command.
This issue happens only on flexlink ports under the following two scenarios:
– You configure flexlink vlan load balancing before changing the port mode of a backup interface to trunk mode.
– Flexlink recovers from per vlan-port error disable states.
The syslog and Traceback do not impact functionality. Flexlink states end up with correct states and there is no impact on traffic forwarding.
The existing per-port error disable (that is, when a violation happens, the entire port will be error disabled) still works on flexlink.
Workaround: Use flexlink with VLAN load balancing.
If you do not want to use vlan load balancing, then enter the
switchport backup interface perfer vlan command on the Active interface, where vlan z is set to an unused vlan on the system
This occurs only if the following conditions are satisfied:
– Multi-host mode configured on the port with the authentication host-mode multi-host command.
– Default ACL (the IP access-list) configured on the interface specifies deny ip any any.
– Dynamic policy authorization for the client specifies permit ip any any.
– Restart when it tries to power a PoE device
– Power on or off the PoE device at an incorrect time
This occurs when the time change for the next year occurs after the time change for the current year.
Before the time change occurs, use one of these workarounds:
– Remove the recurring events from the EnergyWise configuration, do not use recurring events for a week, and reconfigure them a week after the time change occurs.
– Use the energywise level level recurrence importance importance time-range time-range-nam e interface configuration command to reschedule the events.
– Use the power inline auto interface configuration command to power on the PoE port.
Workaround: Rename the flash device to the default name flash:.
Despite the different default value, you can configure any value in the time range.
Workaround: Disable the ip cef accounting non-recursive command.
Workaround: Do not use AAA accounting with the broadcast keyword. CSCts56125
Products that are not running Cisco IOS software are not vulnerable.
Cisco has released free software updates that address these vulnerabilities.
The HTTP server may be disabled as a workaround for the vulnerability described in this advisory.
This advisory is available at the following link:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120328-pai
Additional information on Cisco's security vulnerability policy can be found at the URL:
http://www.cisco.com/web/about/security/psirt/security_vulnerability_policy.html
Cisco has released free software updates that address this vulnerability. Workarounds that mitigate this vulnerability are available. This advisory is available at the following link:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120328-msdp
Note The March 28, 2012, Cisco IOS Software Security Advisory bundled publication includes nine Cisco Security Advisories. Each advisory lists the Cisco IOS Software releases that correct the vulnerability or vulnerabilities detailed in the advisory as well as the Cisco IOS Software releases that correct all vulnerabilities in the March 2012 bundled publication.
Individual publication links are in ''Cisco Event Response: Semiannual Cisco IOS Software Security Advisory Bundled Publication'' at the following link:
http://www.cisco.com/web/about/security/intelligence/Cisco_ERP_mar12.html
provided the following conditions apply:
– A switchport is configured with the following:
authentication event server dead action authorize...
authenticaton event server alive action reinitalize
– The RADIUS server was down previously, and a port without traffic (for example, a hub with no devices attached) was authorized into the inaccessible authentication bypass (IAB) VLAN without an associated MAC address.
The RADIUS server becomes available again, and the IAB-authorized port transitions to another state.
Workaround: Retain the default setting (VLAN 1) for the native VLAN on trunks ports. CSCud05521
Workaround: None. (CSCso93282)
– Enter the mac address-table dynamic group protocols ip other command.
Workaround: None. (CSCsk66449)
When an output service policy attaches to an interface and if the policy is configured to apply DBL on a queue, the flows that are enqueued are subjected to the DBL algorithm. One or more flows that are classified as belligerent (flows that do not back off in response to drops because of congestion in the queue) continue to be classified as belligerent even when DBL is disabled on that queue.
For this condition to persist, the transmit queues in question must remain congested for a long period of time, and that congestion must be caused by flows that remain belligerent.
Workaround: Provided the queue in question is nondefault (queuing actions are not configured in the class-default class of the policy map), detach and reattach the service policy.
If this happens on the default queue, modifying and resetting some queuing parameters such as bandwidth and shape resolves the problem. (CSCsk62457
Workarounds: Use the show log command to find the cause of the power-down.
– LogGalInsufficientFansDetected messages in the log indicate a fan-tray failure.
– LogRkiosModuleShutdownTemp messages in the log indicate that the supervisor engine critical temperature exceeded the failure threshold.
On a switch running Cisco IOS Release 12.2(40)SG, all MTU values configured on a line card are set to default when the module is reset. MTU values are not retained for modules that are physically moved.
Workaround: None. (CSCsk52542)
Workaround: Reinsert the X2. (CSCsk43618)
When a packet is sent to the CPU it may get sent out on some other interface. If so, the original CoS value for a.1X packet cannot be matched by software QoS (according to CSCsk66449). The packet is transmitted with the CoS value it was generated with (7, for the MLDv1 packets described here).
Part of the root cause of this problem is captured in CSCsk66449, which indicates that the software QoS cannot match a.1X packet. (CSCsk72544)
Workaround: Enter the show policy-map interface command to find the actual burst value programmed. (CSCsi71036)
Workaround: None. If you enter the show policy-map name, however, the unconditional marking actions appear. (CSCsi94144)
Workaround: None. (CSCsl72868)
Workaround: To ensure that the DBL action operates on the default queue, use the queue-limit command to specify an explicit queue size. This command dictates the size range. (CSCso06422)
This behavior occurs in a redundant switch when the active supervisor engine is running Cisco IOS, the standby supervisor engine is in ROMMON, and the standby supervisor engine’s ROMMON is upgraded from version 0.34 or to a later version. The upgrade process causes the uplinks on the standby supervisor engine to go down but the active supervisor engine is unaware of this.
Workarounds: To resume normal operation, do one of the following:
– Reload both supervisor engines with the redundancy reload shelf command.
– Power-cycle the standby supervisor engine by briefly pulling it from the chassis.
There is no workaround for the link flap issue. (CSCsm81875)
This problem can happen when pause frames are sent to the switch port and the flow control receive configuration is toggled on 10-Gb port.
Workaround: Change the flow control receive configuration when no traffic exists. (CSCso71647)
The issue is observed only for packets that are logically switched but are internally controlled such that on egress the system is generated by the switch itself. This can happen for certain snooping features such as DAI, IGMP snooping, DHCP snooping, and MLD snooping. This can also happen for IPv4/v6 packets with IP options/ extension headers that need processing in software.
Workaround: Enter shut followed by no shut on any REP port (of the same segment in which VLB is configured) in the topology. (CSCsq75342)
Workaround: Define the backup EtherChannel before applying the flexlink command. (CSCsq13477)
Workaround: None. (CSCsq99468)
You only see this behavior if you initially did not allocate a VLAN before you configure the IFM, and then at a later time allocate the same VLAN.
Workaround: Unconfigure, and then reconfigure the IFM on the port.
Workaround: Disable native VLAN tagging on the trunk port of the switch using the
no switchport trunk native vlan tag command.
Workaround: None. Functionality is unaffected.
The following conditions may cause a RACL to malfunction:
– ACL are applied on the output direction of the interface.
– IPv6 ACL contain Ace to match on the ICMP option fields (ICMP Type or ICMP Code).
Here are two examples of such non-functioning RACL:
Workaround: Avoid lengthy bootflash operations, like copying large files in IOS.
This section lists the resolved caveats in Release 12.2(53)SG:
Entering shut, then no shut on the port after deleting a secondary VLAN.
– Configure error recovery for port-security violation instead of entering shut, then no shut after deleting the VLAN.
– Configure port-security aging time to age out the MAC addresses before entering shut, then
no shut. Then, you can reconfigure port-security on the port only after reloading the switch.
– Configure error recovery for port-security violation instead of entering shut, then no shut to recover the port.
– Enter clear errdisable interface vlan rather than shut, then no shut.
– Configure port-security aging time to age out the MAC addresses before entering shut, then
no shut. Reload the switch, then reconfigure port-security.
Cisco has released free software updates that address this vulnerability.
Workaround: Disable the debug management expression evaluator command. (CSCsu67323)
This section lists the open caveats for Cisco IOS Release 12.2(52)XO:
Workaround: When using the access-list N permit host hostname command, specify the IP address of the host rather than the hostname (CSCef67489)
Workaround: Verify that the MAC addresses being transmitted through the system are learned.
Workaround: None. (CSCeg48586)
– If such a certificate does not exist and the device's hostname and default_domain are set, then a persistent self-signed certificate is generated.
– If such a certificate exists, the FQDN in the certificate is compared with the current device's hostname and default_domain. If either differs from the FQDN in the certificate, the existing persistent self-signed certificate is replaced with a new one with the updated FQDN. Be aware that the existing keypair is used in the new certificate.
On a switch that supports redundancy, the generation of the self-signed certificate occurs independently on the active and the standby supervisor engines, and the certificates differ. After switchover, the HTTP client that holds the old certificate cannot connect to the HTTPS server.
Workaround: Reconnect. (CSCsb11964)
This only affects a switch that has any of the following queues configured as SPAN source in releases prior to 12.2(31)SG and saved to the startup configuration. The SPAN destination would not get the same traffic after upgrading to 12.2(31)SG.
Workaround: After upgrading to 12.2(31)SG and later releases, remove the old SPAN source configuration and reconfigure with the new queue names/IDs. For example:
Workaround: None. (CSCsc11726)
This situation could occur for these reasons:
– A packet requires an IP redirect to an IP unnumbered outgoing port within 3 minutes of booting the Catalyst 4500 series switch.
– The switch administrator enters the shutdown and no shutdown commands on an outgoing interface that has enabled IP unnumbered. The switch receives packets that require redirection; and the destination MAC address is already in ARP table.
– Do not inject packets that require an IP redirect sent out to an IP unnumbered port within 3 minutes of booting the Catalyst 4500 series switch.
– Configure the correct default gateway on the host side. (CSCse75660)
Workaround: None. (CSCsg58526)
This does not affect performance.
Workaround: Enter the no shutdown command. (CSCsg27395)
Workaround: Remove the transceiver from the new port and place it in the old port. After the SFP is recognized in the old port, remove it slowly and insert it in the new port. (CSCse34693).
Workaround: None. This message is an informational message. (CSCsi60913)
Workaround: None. This is an informational message. (CSCsi60898)
Workaround: None. (CSCsm30320)
Workarounds: Do one of the following:
– After a reload, copy the startup-config to the running-config.
– Use a loopback interface as the target of the ip unnumbered command.
– Change the CLI configuration so that during bootup the router port is created first.
Workaround: When the port channel starts to flap, enter shut and no shut on the port channel. After the first switchover and after deleting the port channel, create a new channel. (CSCsr00333)
Workaround: Before removing a line card, delete the statically configured ip source binding entries on any of the interfaces on the line card. (CSCsv54529)
Workaround: Shut down, and then reopen the interface.
Workaround: Reconfigure tracking on the newly created interface. (CSCsr66876)
Workaround: Do one of the following:
– Do not attach routers to PVLAN isolated ports.
– Disable IGMP snooping (either globally or on the VLAN).
– Do not use a router connected to PVLAN isolated port as a multicast source.
Workaround: Configure an ISL/dot1q trunk port. (CSCsu43445)
Workaround: Disable the debug management expression evaluator command. (CSCsu67323)
Workarounds: Do one of the following:
– Enter spanning-tree portfast then authentication control-direction in on a 802.1X port.
– Enter shut then no shut on a 802.1X port.
Workaround: None. (CSCsv07019)
On a switch with multiple Layer 3 interfaces, if the CTS SXP connection is configured without specifying source IP address and no default SXP source IP address is configured on the box, different SXP connections may acquire different source IP address for each connection.
Workaround: Do one of the following:
– Ensure that only one active Layer 3 interface exists on the switch.
– Specify the source of the IP address in each SXP connection configuration to avoid ambiguity.
– Configure a default SXP source IP address so that the SXP connection without the source IP address will use this IP address.
Workaround: None. (CSCsv42869)
Workaround: Do one of the following:
– Reload the standby switch again with the line card in place.
– Remove and reenter the commands on the active supervisor engine. The standby supervisor engine will acquire this change.
Workaround: Reconfigure VLAN load balancing with a different configuration, by performing the following task:
a. Reconfigure the VLAN load balancing configuration on the desired REP ports.
b. Use the shut command on any one REP port in the segment to cause a failure in that segment.
c. Use the no-shut on the same port to restore normal REP topology with one ALT port.
d. Invoke manual preemption on a primary edge port to obtain VLAN load balancing with the new configuration.
Workaround: When a log message appears indicating that the SFP+ has been removed, do one of the following:
– Enter any commands for that port.
– Insert an SFP+ in that port.
– Reinsert the removed SFP+ in any other port.
Workaround: Embed the graphic into the HTML file up to 256 kilobytes (according to RFC 2397).
The following browsers support RFC 2397:
This applies to classic or E-series Catalyst 4500 supervisor engines running
Cisco IOS Release 12.2(50)SG
Workaround: None. (CSCsw14005)
If the switch were to run a supervisor switchover while in this state, the host's MAC address would not be present in the new active supervisor engine’s MAC address table, causing possible connectivity interruption on the host.
Workaround: Enter the shutdown command, followed by the no shutdown command on the interface. This triggers relearning and synchronizing of the host's MAC to the standby supervisor engine. CSCsw91661
This does not impact REP functionality, but it impacts restoration timing. Traffic restoration time after the failure of a REP segment sometimes exceeds 200ms.
The statistics are displayed properly on the active supervisor.
Workaround: Re-authenticate the client.
Workaround: Configure a lower value for the low threshold so that the frame errors are seen divided into the expected number of frame errored seconds.
Workaround: Change the VTP version from 3 to version 2 or 1 and then revert to version 3.
Workaround: Reload the active and standby supervisor engine.
While performing OIR of the supervisor engines, the engines must be removed completely before re-insertion.
Workaround: Specify a profile name when you enter the diagnostic command.
You might want to avoid requesting on demand send for invalid modules. First, enter the
show module command to check for valid or present modules.
No TCAM entries are available for the new access-list.
Workaround: Manually remove and reapply the ACL after freeing hardware TCAM resources by removing or shortening other classification policies on the switch.
The queue transmit counters as well as the policing statistics (if any) are correct.
CSCsz06719 (4500 + 4900, for now)
Workaround: Enter shut, then no shut on the port.
Workaround: Manually re-enter all entries with new time settings.
Workaround: Clear the ARP table on the neighbor switch.
Workaround: Disable explicit host tracking in the affected VLANs.
This only happens when the switch is running network mobility service protocol (nmsp). It does not happen if the phone is CDP enabled.
Workaround: Use VLAN ID or name to differentiate the IP phone and the PC sitting behind the phone on the WCS. Specifically, the IP phone is detected on the voice VLAN, and the displayed information of serial number, model number, and software version is correct. However, a PC sitting behind the phone is detected on a data VLAN, and the displayed device information is wrong and should be ignored.
Entering shut/no shut on the port after deleting a secondary VLAN. (CSCsz73895)
– Configure error recovery for port-security violation instead of entering shut/no shut after deleting the VLAN.
– Configure port-security aging time to age out the MAC addresses before entering shut/no shut. Then, you can reconfigure port-security on the port only after reloading the switch.
Entering shut/no shut on the port after configuring port-security vp err disable and a violation occurs. (CSCsz80415)
– Configure error recovery for port-security violation instead of entering shut/no shut to recover the port.
– Configure clear errdisable interface name vlan [range] instead of entering shut/no shut.
– Configure port-security aging time to age out the MAC addresses before entering shut/no shut. Then, reconfigure port-security on the port after reloading the switch.
This occurs only if the following conditions are satisfied:
– Multi-host mode configured on the port with the authentication host-mode multi-host command.
– Default ACL (the IP access-list) configured on the interface specifies deny ip any any.
– Dynamic policy authorization for the client specifies permit ip any any.
– Restart when it tries to power a PoE device
– Power on or off the PoE device at an incorrect time
This occurs when the time change for the next year occurs after the time change for the current year.
Before the time change occurs, use one of these workarounds:
– Remove the recurring events from the EnergyWise configuration, do not use recurring events for a week, and reconfigure them a week after the time change occurs.
– Use the energywise level level recurrence importance importance time-range time-range-nam e interface configuration command to reschedule the events.
– Use the power inline auto interface configuration command to power on the PoE port.
Workaround: Rename the flash device to the default name flash:.
Despite the different default value, you can configure any value in the time range.
– The SVI (network) is unreachable. If an SVI exists on the ASW, because of the STP flap in the setup as well as the CISP operations, the SVI MAC configuration on the ASW is incorrect.
Workaround: Configure the ASW or any other switch upstream as the root-bridge for all the VLANs. CSCtg71030
Workaround: None. (CSCso93282)
– Enter the mac address-table dynamic group protocols ip other command.
Workaround: None. (CSCsk66449)
When an output service policy attaches to an interface and if the policy is configured to apply DBL on a queue, the flows that are enqueued are subjected to the DBL algorithm. One or more flows that are classified as belligerent (flows that do not back off in response to drops because of congestion in the queue) continue to be classified as belligerent even when DBL is disabled on that queue.
For this condition to persist, the transmit queues in question must remain congested for a long period of time, and that congestion must be caused by flows that remain belligerent.
Workaround: Provided the queue in question is nondefault (queuing actions are not configured in the class-default class of the policy map), detach and reattach the service policy.
If this happens on the default queue, modifying and resetting some queuing parameters such as bandwidth and shape resolves the problem. (CSCsk62457
Workarounds: Use the show log command to find the cause of the power-down.
– LogGalInsufficientFansDetected messages in the log indicate a fan-tray failure.
– LogRkiosModuleShutdownTemp messages in the log indicate that the supervisor engine critical temperature exceeded the failure threshold.
On a switch running Cisco IOS Release 12.2(40)SG, all MTU values configured on a line card are set to default when the module is reset. MTU values are not retained for modules that are physically moved.
Workaround: None. (CSCsk52542)
Workaround: Reinsert the X2. (CSCsk43618)
When a packet is sent to the CPU it may get sent out on some other interface. If so, the original CoS value for a.1X packet cannot be matched by software QoS (according to CSCsk66449). The packet is transmitted with the CoS value it was generated with (7, for the MLDv1 packets described here).
Part of the root cause of this problem is captured in CSCsk66449, which indicates that the software QoS cannot match a.1X packet. (CSCsk72544)
Workaround: Enter the show policy-map interface command to find the actual burst value programmed. (CSCsi71036)
Workaround: None. If you enter the show policy-map name, however, the unconditional marking actions appear. (CSCsi94144)
Workaround: None. (CSCsl72868)
Workaround: To ensure that the DBL action operates on the default queue, use the queue-limit command to specify an explicit queue size. This command dictates the size range. (CSCso06422)
This behavior occurs in a redundant switch when the active supervisor engine is running Cisco IOS, the standby supervisor engine is in ROMMON, and the standby supervisor engine’s ROMMON is upgraded from version 0.34 or to a later version. The upgrade process causes the uplinks on the standby supervisor engine to go down but the active supervisor engine is unaware of this.
Workarounds: To resume normal operation, do one of the following:
– Reload both supervisor engines with the redundancy reload shelf command.
– Power-cycle the standby supervisor engine by briefly pulling it from the chassis.
There is no workaround for the link flap issue. (CSCsm81875)
This problem can happen when pause frames are sent to the switch port and the flow control receive configuration is toggled on 10-Gb port.
Workaround: Change the flow control receive configuration when no traffic exists. (CSCso71647)
The issue is observed only for packets that are logically switched but are internally controlled such that on egress the system is generated by the switch itself. This can happen for certain snooping features such as DAI, IGMP snooping, DHCP snooping, and MLD snooping. This can also happen for IPv4/v6 packets with IP options/ extension headers that need processing in software.
Workaround: Enter shut followed by no shut on any REP port (of the same segment in which VLB is configured) in the topology. (CSCsq75342)
Workaround: Define the backup EtherChannel before applying the flexlink command. (CSCsq13477)
Workaround: None. (CSCsq99468)
You only see this behavior if you initially did not allocate a VLAN before you configure the IFM, and then at a later time allocate the same VLAN.
Workaround: Unconfigure, and then reconfigure the IFM on the port.
Workaround: Disable native VLAN tagging on the trunk port of the switch using the
no switchport trunk native vlan tag command.
The following conditions may cause a RACL to malfunction:
– ACL are applied on the output direction of the interface.
– IPv6 ACL contain Ace to match on the ICMP option fields (ICMP Type or ICMP Code).
Here are two examples of such non-functioning RACL:
Workaround: Avoid lengthy bootflash operations, like copying large files in IOS.
This section lists the resolved caveats in Release 12.2(52)XO:
Workaround: Clear the errors with the clear ethernet cfm errors command. (CSCsv43819)
This behaviour is not observed with traffic passing through the switch.
In contrast, data plane classes (the classes that are configured manually by user written ACLs), the byte counter increments as expected, but the packet count remains 0.
This impacts Cisco IOS Releases 12.2(31)SGA08, 12.2(37)SG, 12.2(40)SG, 12.2(44)SG, 12.2(46)SG, 12.2(50)SG, and 12.2(50)SG1.
For a Classic Series Supervisor Engine, disable and configure QoS on the port.
For example, to configure Gig 2/1 as an isolated private VLAN trunk port, do the following:
You can configure the following EEM script to automate this workaround. QoS will be disabled and re-enabled whenever a port flaps.
On Supervisor Engine 6-E or a Catalyst 4900M switch, remove and reapply the QoS service policy on the impacted VLAN:
The problem occurs on redundant Catalyst 4500 series switches that run
Cisco IOS Releases 12.2(46)SG or 12.2(50)SG and use one of the following supervisor engines:
II Plus, II Plus+10GE, IV, V, or V-10GE.
Workaround: Configure each interface individually.
Explicitly enter the exit or end commands to exit the tx-queue configuration context illustrated above. The short form of the exit command (ex) does not work. Type the commands exit and end line by line, rather than copying and pasting a lot of commands.
The following linecards are affected:
E-series linecards with SFP, TenGigabit ports using HAMM modules, and WS-C4948 SFP uplinks do not exhibit this problem.
Workarounds: Do one of the following:
– Enter the shut then no shut commands.
Workaround: None, other than stopping the query.
Workaround: Disable the authentication control-direction in command.
If you require authentication control-direction in, configure the port for multi-authentication or Multi-Domain Authentication (MDA).
This problem is fixed in Cisco IOS Releases 12.2(50)SG2 and 12.2(52)SG.
Workaround: Turn off LLDP (on the switch) and the phone (from Call Manager).
This problem is fixed in 12.2(50)SG2 and 12.2(52)SG.
The key pieces of data are "VECTOR 0" and a MCSR value of 40000000, 20000000, or 10000000.
Workaround: Enter the show platform cpu cache command to lanuch an IOS algorithm that detects and recovers from parity errors in the CPU's cache. You will obtain a running count of the number of CPU cache parity errors that have been successfully detected and corrected on a running system:
This problem occurs only when a port is configured with PVLAN and 802.1X multi-auth.
Workaround: Shut down, and then reopen the interface. (CSCsr58573)
Workaround: None. (CSCsu42775)
Workaround: None. (CSCsv59929)
This symptom may occur when running Cisco IOS Release 12.2(40)SG or later.
Workaround: Verify the integrity of the image using the verify /md5 command. Compare the resultant MD5 signature with the signature posted on CCO for that image.
Workaround: Verify the integrity of the image with the verify /md5 command. Compare the resultant MD5 signature with the signature posted on CCO for that image.
Port-channel functionality is not supported on the fa1 management interface.
This is a configuration error.
Workaround: Configure every interface individually.
To avoid rebooting the standby supervisor engine, explicitly run the exit or end command to exit the tx-queue configuration context when working in an interface range. The short form of the exit command ex does not work. These commands should be typed line by line; copy/paste will not work.
This problem is first seen in 12.2(40)SG.
Workaround: Manually apply the configuration that is generated by AutoQoS. Do not use Auto Qos. CSCsv03316
Workaround: None. You cannot explicitly verify the trusted boundary state. However, you can indirectly ascertain this state:
The trusted boundary feature ensures that the packet’s CoS/DSCP value is trusted or not. When the interface is not in a trusted state, the CoS/DSCP fields are forced to zero on a received packet. Because one QoS policy on that interface uses that CoS/DSCP value for classification, if the packet classification is based on the packet value, you can infer that the interface is in a trusted state.
Workaround: Unconfigure the port channel and the associated physical port, and reconfigure them.
Workaround: None. (CSCsv17545)
The exception crashinfo file feature is not supported in RPR mode.
Workaround: None. (CSCsr66481)
Workaround: Disable IGMP snooping on all the relevant VLANs before disabling it globally.
Workaround: Ping the global and link local addresses of the neighbor to ascertain and reinstate reachability. (CSCsq77181)
This problem is seen on all Catalyst 4500 or 4900 chassis running Cisco IOS Release 12.2.(50)SG. The problem occurs when the following conditions are present:
– The router is configured with AAA authentication and authorization.
– The AAA server runs CiscoSecure ACS 2.4.
– The callback or callback-dialstring attribute is configured on the AAA server for the user.
Workaround: Do not configure the callback or callback-dialstring attribute for the user. If you use the callback-dialstring attribute in the TACACS+ profile, ensure that the NULL value is not configured. (CSCei62358)
This problem occurs only when a port is configured with PVLAN and 802.1X multi-auth.
Workaround: Shut down, and then reopen the interface. (CSCsr58573)
This problem is first seen in 12.2(40)SG.
Workaround: Manually apply the configuration that is generated by AutoQoS. Do not use Auto Qos. CSCsv03316
Workaround: None. (CSCsv17545)
Port-channel functionality is not supported on the fa1 management interface.
This is a configuration error.
The problem occurs on redundant Catalyst 4500 series switches that run
Cisco IOS Releases 12.2(46)SG or 12.2(50)SG and use one of the following supervisor engines:
II Plus, II Plus+10GE, IV, V, or V-10GE.
Workaround: Configure each interface individually.
Explicitly enter the exit or end commands to exit the tx-queue configuration context illustrated above. The short form of the exit command (ex) does not work. Type the commands exit and end line by line, rather than copying and pasting a lot of commands.
This section lists the open caveats for Cisco IOS Release 12.2(52)SG:
Workaround: When using the access-list N permit host hostname command, specify the IP address of the host rather than the hostname (CSCef67489)
Workaround: Verify that the MAC addresses being transmitted through the system are learned.
Workaround: None. (CSCeg48586)
– If such a certificate does not exist and the device's hostname and default_domain are set, then a persistent self-signed certificate is generated.
– If such a certificate exists, the FQDN in the certificate is compared with the current device's hostname and default_domain. If either differs from the FQDN in the certificate, the existing persistent self-signed certificate is replaced with a new one with the updated FQDN. Be aware that the existing keypair is used in the new certificate.
On a switch that supports redundancy, the generation of the self-signed certificate occurs independently on the active and the standby supervisor engines, and the certificates differ. After switchover, the HTTP client that holds the old certificate cannot connect to the HTTPS server.
Workaround: Reconnect. (CSCsb11964)
This only affects a switch that has any of the following queues configured as SPAN source in releases prior to 12.2(31)SG and saved to the startup configuration. The SPAN destination would not get the same traffic after upgrading to 12.2(31)SG.
Workaround: After upgrading to 12.2(31)SG and later releases, remove the old SPAN source configuration and reconfigure with the new queue names/IDs. For example:
Workaround: None. (CSCsc11726)
This situation could occur for these reasons:
– A packet requires an IP redirect to an IP unnumbered outgoing port within 3 minutes of booting the Catalyst 4500 series switch.
– The switch administrator enters the shutdown and no shutdown commands on an outgoing interface that has enabled IP unnumbered. The switch receives packets that require redirection; and the destination MAC address is already in ARP table.
– Do not inject packets that require an IP redirect sent out to an IP unnumbered port within 3 minutes of booting the Catalyst 4500 series switch.
– Configure the correct default gateway on the host side. (CSCse75660)
Workaround: None. (CSCsg58526)
This does not affect performance.
Workaround: Enter the no shutdown command. (CSCsg27395)
Workaround: Remove the transceiver from the new port and place it in the old port. After the SFP is recognized in the old port, remove it slowly and insert it in the new port. (CSCse34693).
Workaround: None. This message is an informational message. (CSCsi60913)
Workaround: None. This is an informational message. (CSCsi60898)
Workaround: None. (CSCsm30320)
Workarounds: Do one of the following:
– After a reload, copy the startup-config to the running-config.
– Use a loopback interface as the target of the ip unnumbered command.
– Change the CLI configuration so that during bootup the router port is created first.
Workaround: When the port channel starts to flap, enter shut and no shut on the port channel. After the first switchover and after deleting the port channel, create a new channel. (CSCsr00333)
Workaround: Before removing a line card, delete the statically configured ip source binding entries on any of the interfaces on the line card. (CSCsv54529)
Workaround: Shut down, and then reopen the interface.
Workaround: Reconfigure tracking on the newly created interface. (CSCsr66876)
Workaround: Do one of the following:
– Do not attach routers to PVLAN isolated ports.
– Disable IGMP snooping (either globally or on the VLAN).
– Do not use a router connected to PVLAN isolated port as a multicast source.
Workaround: Configure an ISL/dot1q trunk port. (CSCsu43445)
Workarounds: Do one of the following:
– Enter spanning-tree portfast then authentication control-direction in on a 802.1X port.
– Enter shut then no shut on a 802.1X port.
Workaround: None. (CSCsv07019)
On a switch with multiple Layer 3 interfaces, if the CTS SXP connection is configured without specifying source IP address and no default SXP source IP address is configured on the box, different SXP connections may acquire different source IP address for each connection.
Workaround: Do one of the following:
– Ensure that only one active Layer 3 interface exists on the switch.
– Specify the source of the IP address in each SXP connection configuration to avoid ambiguity.
– Configure a default SXP source IP address so that the SXP connection without the source IP address will use this IP address.
Workaround: None. (CSCsv42869)
Workaround: Do one of the following:
– Reload the standby switch again with the line card in place.
– Remove and reenter the commands on the active supervisor engine. The standby supervisor engine will acquire this change.
Workaround: Reconfigure VLAN load balancing with a different configuration, by performing the following task:
a. Reconfigure the VLAN load balancing configuration on the desired REP ports.
b. Use the shut command on any one REP port in the segment to cause a failure in that segment.
c. Use the no-shut on the same port to restore normal REP topology with one ALT port.
d. Invoke manual preemption on a primary edge port to obtain VLAN load balancing with the new configuration.
Workaround: When a log message appears indicating that the SFP+ has been removed, do one of the following:
– Enter any commands for that port.
– Insert an SFP+ in that port.
– Reinsert the removed SFP+ in any other port.
Workaround: Embed the graphic into the HTML file up to 256 kilobytes (according to RFC 2397).
The following browsers support RFC 2397:
This applies to classic or E-series Catalyst 4500 supervisor engines running
Cisco IOS Release 12.2(50)SG
Workaround: None. (CSCsw14005)
If the switch were to run a supervisor switchover while in this state, the host's MAC address would not be present in the new active supervisor engine’s MAC address table, causing possible connectivity interruption on the host.
Workaround: Enter the shutdown command, followed by the no shutdown command on the interface. This triggers relearning and synchronizing of the host's MAC to the standby supervisor engine. CSCsw91661
This does not impact REP functionality, but it impacts restoration timing. Traffic restoration time after the failure of a REP segment sometimes exceeds 200ms.
The statistics are displayed properly on the active supervisor.
Workaround: Re-authenticate the client.
Workaround: Configure a lower value for the low threshold so that the frame errors are seen divided into the expected number of frame errored seconds.
Workaround: Change the VTP version from 3 to version 2 or 1 and then revert to version 3.
Workaround: Reload the active and standby supervisor engine.
While performing OIR of the supervisor engines, the engines must be removed completely before re-insertion.
Workaround: Specify a profile name when you enter the diagnostic command.
You might want to avoid requesting on demand send for invalid modules. First, enter the
show module command to check for valid or present modules.
No TCAM entries are available for the new access-list.
Workaround: Manually remove and reapply the ACL after freeing hardware TCAM resources by removing or shortening other classification policies on the switch.
The queue transmit counters as well as the policing statistics (if any) are correct.
CSCsz06719 (4500 + 4900, for now)
Workaround: Enter shut, then no shut on the port.
Workaround: Manually re-enter all entries with new time settings.
Workaround: Clear the ARP table on the neighbor switch.
Workaround: Disable explicit host tracking in the affected VLANs.
This only happens when the switch is running network mobility service protocol (nmsp). It does not happen if the phone is CDP enabled.
Workaround: Use VLAN ID or name to differentiate the IP phone and the PC sitting behind the phone on the WCS. Specifically, the IP phone is detected on the voice VLAN, and the displayed information of serial number, model number, and software version is correct. However, a PC sitting behind the phone is detected on a data VLAN, and the displayed device information is wrong and should be ignored.
Entering shut/no shut on the port after deleting a secondary VLAN. (CSCsz73895)
– Configure error recovery for port-security violation instead of entering shut/no shut after deleting the VLAN.
– Configure port-security aging time to age out the MAC addresses before entering shut/no shut. Then, you can reconfigure port-security on the port only after reloading the switch.
Entering shut/no shut on the port after configuring port-security vp err disable and a violation occurs. (CSCsz80415)
– Configure error recovery for port-security violation instead of entering shut/no shut to recover the port.
– Configure clear errdisable interface name vlan [range] instead of entering shut/no shut.
– Configure port-security aging time to age out the MAC addresses before entering shut/no shut. Then, reconfigure port-security on the port after reloading the switch.
This occurs only if the following conditions are satisfied:
– Multi-host mode configured on the port with the authentication host-mode multi-host command.
– Default ACL (the IP access-list) configured on the interface specifies deny ip any any.
– Dynamic policy authorization for the client specifies permit ip any any.
– Restart when it tries to power a PoE device
– Power on or off the PoE device at an incorrect time
This occurs when the time change for the next year occurs after the time change for the current year.
Before the time change occurs, use one of these workarounds:
– Remove the recurring events from the EnergyWise configuration, do not use recurring events for a week, and reconfigure them a week after the time change occurs.
– Use the energywise level level recurrence importance importance time-range time-range-nam e interface configuration command to reschedule the events.
– Use the power inline auto interface configuration command to power on the PoE port.
Workaround: Rename the flash device to the default name flash:.
Despite the different default value, you can configure any value in the time range.
Workaround: None. (CSCsk66449)
When an output service policy attaches to an interface and if the policy is configured to apply DBL on a queue, the flows that are enqueued are subjected to the DBL algorithm. One or more flows that are classified as belligerent (flows that do not back off in response to drops because of congestion in the queue) continue to be classified as belligerent even when DBL is disabled on that queue.
For this condition to persist, the transmit queues in question must remain congested for a long period of time, and that congestion must be caused by flows that remain belligerent.
Workaround: Provided the queue in question is nondefault (queuing actions are not configured in the class-default class of the policy map), detach and reattach the service policy.
If this happens on the default queue, modifying and resetting some queuing parameters such as bandwidth and shape resolves the problem. (CSCsk62457
Workarounds: Use the show log command to find the cause of the power-down.
– LogGalInsufficientFansDetected messages in the log indicate a fan-tray failure.
– LogRkiosModuleShutdownTemp messages in the log indicate that the supervisor engine critical temperature exceeded the failure threshold.
On a switch running Cisco IOS Release 12.2(40)SG, all MTU values configured on a line card are set to default when the module is reset. MTU values are not retained for modules that are physically moved.
Workaround: None. (CSCsk52542)
Workaround: Reinsert the X2. (CSCsk43618)
When a packet is sent to the CPU it may get sent out on some other interface. If so, the original CoS value for a.1X packet cannot be matched by software QoS (according to CSCsk66449). The packet is transmitted with the CoS value it was generated with (7, for the MLDv1 packets described here).
Part of the root cause of this problem is captured in CSCsk66449, which indicates that the software QoS cannot match a.1X packet. (CSCsk72544)
Workaround: Enter the show policy-map interface command to find the actual burst value programmed. (CSCsi71036)
Workaround: None. If you enter the show policy-map name, however, the unconditional marking actions appear. (CSCsi94144)
Workaround: None. (CSCsl72868)
Workaround: To ensure that the DBL action operates on the default queue, use the queue-limit command to specify an explicit queue size. This command dictates the size range. (CSCso06422)
This behavior occurs in a redundant switch when the active supervisor engine is running Cisco IOS, the standby supervisor engine is in ROMMON, and the standby supervisor engine’s ROMMON is upgraded from version 0.34 or to a later version. The upgrade process causes the uplinks on the standby supervisor engine to go down but the active supervisor engine is unaware of this.
Workarounds: To resume normal operation, do one of the following:
– Reload both supervisor engines with the redundancy reload shelf command.
– Power-cycle the standby supervisor engine by briefly pulling it from the chassis.
There is no workaround for the link flap issue. (CSCsm81875)
This problem can happen when pause frames are sent to the switch port and the flow control receive configuration is toggled on 10-Gb port.
Workaround: Change the flow control receive configuration when no traffic exists. (CSCso71647)
The issue is observed only for packets that are logically switched but are internally controlled such that on egress the system is generated by the switch itself. This can happen for certain snooping features such as DAI, IGMP snooping, DHCP snooping, and MLD snooping. This can also happen for IPv4/v6 packets with IP options/ extension headers that need processing in software.
Workaround: Enter shut followed by no shut on any REP port (of the same segment in which VLB is configured) in the topology. (CSCsq75342)
Workaround: Define the backup EtherChannel before applying the flexlink command. (CSCsq13477)
Workaround: None. (CSCsq99468)
You only see this behavior if you initially did not allocate a VLAN before you configure the IFM, and then at a later time allocate the same VLAN.
Workaround: Unconfigure, and then reconfigure the IFM on the port.
Workaround: Disable native VLAN tagging on the trunk port of the switch using the
no switchport trunk native vlan tag command.
The following conditions may cause a RACL to malfunction:
– ACL are applied on the output direction of the interface.
– IPv6 ACL contain Ace to match on the ICMP option fields (ICMP Type or ICMP Code).
Here are two examples of such non-functioning RACL:
Workaround: Avoid lengthy bootflash operations, like copying large files in IOS.
This section lists the resolved caveats in Release 12.2(52)SG:
Workaround: Clear the errors with the clear ethernet cfm errors command. (CSCsv43819)
This behaviour is not observed with traffic passing through the switch.
In contrast, data plane classes (the classes that are configured manually by user written ACLs), the byte counter increments as expected, but the packet count remains 0.
This impacts Cisco IOS Releases 12.2(31)SGA08, 12.2(37)SG, 12.2(40)SG, 12.2(44)SG, 12.2(46)SG, 12.2(50)SG, and 12.2(50)SG1.
For a Classic Series Supervisor Engine, disable and configure QoS on the port.
For example, to configure Gig 2/1 as an isolated private VLAN trunk port, do the following:
You can configure the following EEM script to automate this workaround. QoS will be disabled and re-enabled whenever a port flaps.
On Supervisor Engine 6-E or a Catalyst 4900M switch, remove and reapply the QoS service policy on the impacted VLAN:
The problem occurs on redundant Catalyst 4500 series switches that run
Cisco IOS Releases 12.2(46)SG or 12.2(50)SG and use one of the following supervisor engines:
II Plus, II Plus+10GE, IV, V, or V-10GE.
Workaround: Configure each interface individually.
Explicitly enter the exit or end commands to exit the tx-queue configuration context illustrated above. The short form of the exit command (ex) does not work. Type the commands exit and end line by line, rather than copying and pasting a lot of commands.
The following linecards are affected:
E-series linecards with SFP, TenGigabit ports using HAMM modules, and WS-C4948 SFP uplinks do not exhibit this problem.
Workarounds: Do one of the following:
– Enter the shut then no shut commands.
Workaround: None, other than stopping the query.
Workaround: Disable the authentication control-direction in command.
If you require authentication control-direction in, configure the port for multi-authentication or Multi-Domain Authentication (MDA).
This problem is fixed in Cisco IOS Releases 12.2(50)SG2 and 12.2(52)SG.
Workaround: Turn off LLDP (on the switch) and the phone (from Call Manager).
This problem is fixed in 12.2(50)SG2 and 12.2(52)SG.
The key pieces of data are "VECTOR 0" and a MCSR value of 40000000, 20000000, or 10000000.
Workaround: Enter the show platform cpu cache command to lanuch an IOS algorithm that detects and recovers from parity errors in the CPU's cache. You will obtain a running count of the number of CPU cache parity errors that have been successfully detected and corrected on a running system:
This problem is seen only an interface configured with VRF.
Workaround: None. (CSCsr69187)
Workaround: Configure the native VLAN for the PVLAN isolated trunk. (CSCsv38137)
This problem occurs only when a port is configured with PVLAN and 802.1X multi-auth.
Workaround: Shut down, and then reopen the interface. (CSCsr58573)
Workaround: None. (CSCsr95941)
Workaround: None. (CSCsu42775)
Workaround: None. (CSCsv59929)
This symptom may occur when running Cisco IOS Release 12.2(40)SG or later.
Workaround: Verify the integrity of the image using the verify /md5 command. Compare the resultant MD5 signature with the signature posted on CCO for that image.
Workaround: Verify the integrity of the image with the verify /md5 command. Compare the resultant MD5 signature with the signature posted on CCO for that image.
Port-channel functionality is not supported on the fa1 management interface.
This is a configuration error.
Workaround: Configure every interface individually.
To avoid rebooting the standby supervisor engine, explicitly run the exit or end command to exit the tx-queue configuration context when working in an interface range. The short form of the exit command ex does not work. These commands should be typed line by line; copy/paste will not work.
This problem is first seen in 12.2(40)SG.
Workaround: Manually apply the configuration that is generated by AutoQoS. Do not use Auto Qos. CSCsv03316
Workaround: None. You cannot explicitly verify the trusted boundary state. However, you can indirectly ascertain this state:
The trusted boundary feature ensures that the packet’s CoS/DSCP value is trusted or not. When the interface is not in a trusted state, the CoS/DSCP fields are forced to zero on a received packet. Because one QoS policy on that interface uses that CoS/DSCP value for classification, if the packet classification is based on the packet value, you can infer that the interface is in a trusted state.
Workaround: Unconfigure the port channel and the associated physical port, and reconfigure them.
Workaround: None. (CSCsv17545)
The exception crashinfo file feature is not supported in RPR mode.
Workaround: None. (CSCsr66481)
Workaround: Disable IGMP snooping on all the relevant VLANs before disabling it globally.
Workaround: Ping the global and link local addresses of the neighbor to ascertain and reinstate reachability. (CSCsq77181)
– Enable link debouncing on the affected 10GE peer port.
– If link debouncing is not available in the current IOS revision, upgrade to
Cisco IOS Release 12.2(52)SG. Configuration of link debouncing is not required.
This problem is seen only an interface configured with VRF.
Workaround: None. (CSCsr69187)
Workaround: Reapply the identity policy on the interface with the permit icmp command. (CSCsu03507
Workaround: Configure the native VLAN for the PVLAN isolated trunk. (CSCsv38137)
This problem is seen on all Catalyst 4500 or 4900 chassis running Cisco IOS Release 12.2.(50)SG. The problem occurs when the following conditions are present:
– The router is configured with AAA authentication and authorization.
– The AAA server runs CiscoSecure ACS 2.4.
– The callback or callback-dialstring attribute is configured on the AAA server for the user.
Workaround: Do not configure the callback or callback-dialstring attribute for the user. If you use the callback-dialstring attribute in the TACACS+ profile, ensure that the NULL value is not configured. (CSCei62358)
This problem occurs only when a port is configured with PVLAN and 802.1X multi-auth.
Workaround: Shut down, and then reopen the interface. (CSCsr58573)
Workaround: Reapply the identity policy on the interface with the permit icmp command. CSCsu03507
This problem is first seen in 12.2(40)SG.
Workaround: Manually apply the configuration that is generated by AutoQoS. Do not use Auto Qos. CSCsv03316
Workaround: None. (CSCsv17545)
Port-channel functionality is not supported on the fa1 management interface.
This is a configuration error.
The problem occurs on redundant Catalyst 4500 series switches that run
Cisco IOS Releases 12.2(46)SG or 12.2(50)SG and use one of the following supervisor engines:
II Plus, II Plus+10GE, IV, V, or V-10GE.
Workaround: Configure each interface individually.
Explicitly enter the exit or end commands to exit the tx-queue configuration context illustrated above. The short form of the exit command (ex) does not work. Type the commands exit and end line by line, rather than copying and pasting a lot of commands.
Workaround: Remove the WCCP redirection.
If the WAAS device drops this unexpected GRE traffic, the WCCP service group with promiscuous mode cannot be used on the interface. Conversely, if the WAAS device returns the traffic to the switch, the switch routes it normally to the original destination.
This issue may occur on switches running Cisco IOS Releases 12.2(40)SG, 12.2(44)SG, 12.2(46)SG, 12.2(50)SG-SG5.
This issue is resolved in 12.2(52)SG (and later) and12.2(50)SG6 (and later) releases.
Workaround: Do not use the nested policy-map feature in Cisco IOS Release 12.2(40)SG and 12.2(44)SG. (CSCsy80664)
CFM is supported in default switch port mode. CFM is not supported on the PVLAN access modes (promiscuous, isolated, and community host ports) and the dot1q-tunnel modes. It is supported on all other switch port modes.
Workaround: Enable CFM on the interface with the Ethernet cfm enable command. (CSCsv67507)
Do not configure 802.1X with other per vp errdisable features.
You cannot restore the uplink by resetting the standby supervisor engine or by changing the interface configuration.
Workaround: Force another SSO switchover.
Occasionally, you might need to perform further switchovers.
This problem is first seen in Cisco IOS Release 12.2(40)SG.
Workaround: Manually apply the configuration that would be generated by Auto QoS.
Workaround: Enter the default interface command on the WS-X4503+ supervisor engines.
Workaround: Disable the debug management expression evaluator command. (CSCsu67323)
This section lists the open caveats for Cisco IOS Release 12.2(50)SG8:
Workaround: When using the access-list N permit host hostname command, specify the IP address of the host rather than the hostname (CSCef67489)
Workaround: Verify that the MAC addresses being transmitted through the system are learned.
Workaround: None. (CSCeg48586)
– If such a certificate does not exist and the device's hostname and default_domain are set, then a persistent self-signed certificate is generated.
– If such a certificate exists, the FQDN in the certificate is compared with the current device's hostname and default_domain. If either differs from the FQDN in the certificate, the existing persistent self-signed certificate is replaced with a new one with the updated FQDN. Be aware that the existing keypair is used in the new certificate.
On a switch that supports redundancy, the generation of the self-signed certificate occurs independently on the active and the standby supervisor engines, and the certificates differ. After switchover, the HTTP client that holds the old certificate cannot connect to the HTTPS server.
Workaround: Reconnect. (CSCsb11964)
This only affects a switch that has any of the following queues configured as SPAN source in releases prior to 12.2(31)SG and saved to the startup configuration. The SPAN destination would not get the same traffic after upgrading to 12.2(31)SG.
Workaround: After upgrading to 12.2(31)SG and later releases, remove the old SPAN source configuration and reconfigure with the new queue names/IDs. For example:
Workaround: None. (CSCsc11726)
This situtation could occur for these reasons:
– A packet requires an IP redirect to an IP unnumbered outgoing port within 3 minutes of booting the Catalyst 4500 series switch.
– The switch administrator enters the shutdown and no shutdown commands on an outgoing interface that has enabled IP unnumbered. The switch receives packets that require redirection; and the destination MAC address is already in ARP table.
– Do not inject packets that require an IP redirect sent out to an IP unnumbered port within 3 minutes of booting the Catalyst 4500 series switch.
– Configure the correct default gateway on the host side. (CSCse75660)
Workaround: None. (CSCsg58526)
This does not affect performance.
Workaround: Enter the no shutdown command. (CSCsg27395)
Workaround: Remove the transceiver from the new port and place it in the old port. After the SFP is recognized in the old port, remove it slowly and insert it in the new port. (CSCse34693).
Workaround: None. This message is an informational message. (CSCsi60913)
Workaround: None. This is an informational message. (CSCsi60898)
Workaround: None. (CSCsm30320)
Workarounds: Do one of the following:
– After a reload, copy the startup-config to the running-config.
– Use a loopback interface as the target of the ip unnumbered command.
– Change the CLI configuration so that during bootup the router port is created first.
Workaround: When the port channel starts to flap, enter shut and no shut on the port channel. After the first switchover and after deleting the port channel, create a new channel. (CSCsr00333)
Workaround: Before removing a line card, delete the statically configured ip source binding entries on any of the interfaces on the line card. (CSCsv54529)
Workaround: Clear the errors with the clear ethernet cfm errors command. (CSCsv43819)
This problem is seen only an interface configured with VRF.
Workaround: None. (CSCsr69187)
Workaround: Shut down, and then reopen the interface.
Workaround: Reconfigure tracking on the newly created interface. (CSCsr66876)
Workaround: None. (CSCsu42775)
Workaround: Configure an ISL/dot1q trunk port. (CSCsu43445)
Workaround: Disable the debug management expression evaluator command. (CSCsu67323)
Workaround: None. (CSCsv07019)
On a switch with multiple Layer 3 interfaces, if the CTS SXP connection is configured without specifying source IP address and no default SXP source IP address is configured on the box, different SXP connections may acquire different source IP address for each connection.
Workaround: Do one of the following:
– Ensure that only one active Layer 3 interface exists on the switch.
– Specify the source of the IP address in each SXP connection configuration to avoid ambiguity.
– Configure a default SXP source IP address so that the SXP connection without the source IP address will use this IP address.
Workaround: None. (CSCsv42869)
Workaround: Do one of the following:
– Reload the standby switch again with the line card in place.
– Remove and reenter the commands on the active supervisor engine. The standby supervisor engine will acquire this change.
CFM is supported in default switch port mode. CFM is not supported on the PVLAN access modes (promiscuous, isolated, and community host ports) and the dot1q-tunnel modes. It is supported on all other switch port modes.
Workaround: Enable CFM on the interface with the Ehernet cfm enable command. (CSCsv67507)
Workaround: Reconfigure VLAN load balancing with a different configuration, by performing the following task:
a. Reconfigure the VLAN load balancing configuration on the desired REP ports.
b. Use the shut command on any one REP port in the segment to cause a failure in that segment.
c. Use the no-shut on the same port to restore normal REP topology with one ALT port.
d. Invoke manual preemption on a primary edge port to obtain VLAN load balancing with the new configuration.
Workaround: When a log message appears indicating that the SFP+ has been removed, do one of the following:
– Enter any commands for that port.
– Insert an SFP+ in that port.
– Reinsert the removed SFP+ in any other port.
This symptom may occur when running Cisco IOS Release 12.2(40)SG or later.
Workaround: Verify the integrity of the image using the verify /md5 command. Compare the resultant MD5 signature with the signature posted on CCO for that image.
Workaround: Verify the integrity of the image with the verify /md5 command. Compare the resultant MD5 signature with the signature posted on CCO for that image. (CSCsu37068)
Workaround: Embed the graphic into the HTML file up to 256 kilobytes (according to RFC 2397).
The following browsers support RFC 2397:
This applies to classic or E-series Catalyst 4500 supervisor engines running
Cisco IOS Release 12.2(50)SG
Workaround: None. (CSCsw14005)
If the switch were to run a supervisor switchover while in this state, the host's MAC address would not be present in the new active supervisor engine’s MAC address table, causing possible connectivity interruption on the host.
Workaround: Enter the shutdown command, followed by the no shutdown command on the interface. This triggers relearning and synchronizing of the host's MAC to the standby supervisor engine. CSCsw91661
bWorkaround: Enter shutdown, then no shutdown on the interface. This triggers relearning to occur, and a synchronization of the host's MAC to the standby supervisor engine.
This occurs only if the following conditions are satisfied:
– Multi-host mode configured on the port with the authentication host-mode multi-host command.
– Default ACL (the IP access-list) configured on the interface specifies deny ip any any.
– Dynamic policy authorization for the client specifies permit ip any any.
Despite the different default value, you can configure any value in the time range.
Workaround: None. (CSCsk66449)
When an output service policy attaches to an interface and if the policy is configured to apply DBL on a queue, the flows that are enqueued are subjected to the DBL algorithm. One or more flows that are classified as belligerent (flows that do not back off in response to drops because of congestion in the queue) continue to be classified as belligerent even when DBL is disabled on that queue.
For this condition to persist, the transmit queues in question must remain congested for a long period of time, and that congestion must be caused by flows that remain belligerent.
Workaround: Provided the queue in question is nondefault (queuing actions are not configured in the class-default class of the policymap), detach and reattach the service policy.
If this happens on the default queue, modifying and resetting some queuing parameters such as bandwidth and shape resolves the problem. (CSCsk62457
Workarounds: Use the show log command to find the cause of the power-down.
– LogGalInsufficientFansDetected messages in the log indicate a fan-tray failure.
– LogRkiosModuleShutdownTemp messages in the log indicate that the supervisor engine critical temperature exceeded the failure threshold.
On a switch running Cisco IOS Release 12.2(40)SG, all MTU values configured on a line card are set to default when the module is reset. MTU values are not retained for modules that are physically moved.
Workaround: None. (CSCsk52542)
Workaround: Reinsert the X2. (CSCsk43618)
When a packet is sent to the CPU it may get sent out on some other interface. If so, the original CoS value for a.1X packet cannot be matched by software QoS (according to CSCsk66449). The packet is transmitted with the CoS value it was generated with (7, for the MLDv1 packets described here).
Part of the root cause of this problem is captured in CSCsk66449, which indicates that the software QoS cannot match a.1X packet. (CSCsk72544)
Workaround: None. You cannot explicitly verify the trusted boundary state. However, you can indirectly ascertain this state:
The trusted boundary feature ensures that the packet’s CoS/DSCP value is trusted or not. When the interface is not in a trusted state, the CoS/DSCP fields are forced to zero on a received packet. Because one QoS policy on that interface uses that CoS/DSCP value for classification, if the packet classification is based on the packet value, you can infer that the interface is in a trusted state.
Workaround: Enter the show policy-map interface command to find the actual burst value programmed. (CSCsi71036)
Workaround: None. If you enter the show policy-map name, however, the unconditional marking actions appear. (CSCsi94144)
Workaround: None. (CSCsl72868)
Workaround: To ensure that the DBL action operates on the default queue, use the queue-limit command to specify an explicit queue size. This command dictates the size range. (CSCso06422)
This behavior occurs in a redundant switch when the active supervisor engine is running Cisco IOS, the standby supervisor engine is in ROMMON, and the standby supervisor engine’s ROMMON is upgraded from version 0.34 or to a later version. The upgrade process causes the uplinks on the standby supervisor engine to go down but the active supervisor engine is unaware of this.
Workarounds: To resume normal operation, do one of the following:
– Reload both supervisor engines with the redundancy reload shelf command.
– Power-cycle the standby supervisor engine by briefly pulling it from the chassis.
There is no workaround for the link flap issue. (CSCsm81875)
This problem can happen when pause frames are sent to the switch port and the flow control receive configuration is toggled on 10-Gb port.
Workaround: Change the flow control receive configuration when no traffic exists. (CSCso71647)
Workaround: Disable IGMP snooping on all the relevant VLANs before disabling it globally.
The issue is observed only for packets that are logically switched but are internally controlled such that on egress the system is generated by the switch itself. This can happen for certain snooping features such as DAI, IGMP snooping, DHCP snooping, and MLD snooping. This can also happen for IPv4/v6 packets with IP options/ extension headers that need processing in software.
Workaround: Enter shut followed by no shut on any REP port (of the same segment in which VLB is configured) in the topology. (CSCsq75342)
Workaround: Define the backup EtherChannel before applying the flexlink command. (CSCsq13477)
Workaround: None. (CSCsq99468)
You only see this behavior if you initially did not allocate a VLAN before you configure the IFM, and then at a later time allocate the same VLAN.
Workaround: Unconfigure, and then reconfigure the IFM on the port.
This section lists the resolved caveats in Release 12.2(50)SG8:
Workaround: None. (CSCsr95941)
Workaround: Unconfigure 100/Full, execute shut/no shut, then reconfigure 100/Full on the local switch.
Workaround: Configure the route map to only match on ACL(s).
This section lists the open caveats for Cisco IOS Release 12.2(50)SG7:
Workaround: When using the access-list N permit host hostname command, specify the IP address of the host rather than the hostname (CSCef67489)
Workaround: Verify that the MAC addresses being transmitted through the system are learned.
Workaround: None. (CSCeg48586)
– If such a certificate does not exist and the device's hostname and default_domain are set, then a persistent self-signed certificate is generated.
– If such a certificate exists, the FQDN in the certificate is compared with the current device's hostname and default_domain. If either differs from the FQDN in the certificate, the existing persistent self-signed certificate is replaced with a new one with the updated FQDN. Be aware that the existing keypair is used in the new certificate.
On a switch that supports redundancy, the generation of the self-signed certificate occurs independently on the active and the standby supervisor engines, and the certificates differ. After switchover, the HTTP client that holds the old certificate cannot connect to the HTTPS server.
Workaround: Reconnect. (CSCsb11964)
This only affects a switch that has any of the following queues configured as SPAN source in releases prior to 12.2(31)SG and saved to the startup configuration. The SPAN destination would not get the same traffic after upgrading to 12.2(31)SG.
Workaround: After upgrading to 12.2(31)SG and later releases, remove the old SPAN source configuration and reconfigure with the new queue names/IDs. For example:
Workaround: None. (CSCsc11726)
This situtation could occur for these reasons:
– A packet requires an IP redirect to an IP unnumbered outgoing port within 3 minutes of booting the Catalyst 4500 series switch.
– The switch administrator enters the shutdown and no shutdown commands on an outgoing interface that has enabled IP unnumbered. The switch receives packets that require redirection; and the destination MAC address is already in ARP table.
– Do not inject packets that require an IP redirect sent out to an IP unnumbered port within 3 minutes of booting the Catalyst 4500 series switch.
– Configure the correct default gateway on the host side. (CSCse75660)
Workaround: None. (CSCsg58526)
This does not affect performance.
Workaround: Enter the no shutdown command. (CSCsg27395)
Workaround: Remove the transceiver from the new port and place it in the old port. After the SFP is recognized in the old port, remove it slowly and insert it in the new port. (CSCse34693).
Workaround: None. This message is an informational message. (CSCsi60913)
Workaround: None. This is an informational message. (CSCsi60898)
Workaround: None. (CSCsm30320)
Workarounds: Do one of the following:
– After a reload, copy the startup-config to the running-config.
– Use a loopback interface as the target of the ip unnumbered command.
– Change the CLI configuration so that during bootup the router port is created first.
Workaround: When the port channel starts to flap, enter shut and no shut on the port channel. After the first switchover and after deleting the port channel, create a new channel. (CSCsr00333)
Workaround: Before removing a line card, delete the statically configured ip source binding entries on any of the interfaces on the line card. (CSCsv54529)
Workaround: Clear the errors with the clear ethernet cfm errors command. (CSCsv43819)
This problem is seen only an interface configured with VRF.
Workaround: None. (CSCsr69187)
Workaround: Shut down, and then reopen the interface.
Workaround: Reconfigure tracking on the newly created interface. (CSCsr66876)
Workaround: None. (CSCsr95941)
Workaround: None. (CSCsu42775)
Workaround: Configure an ISL/dot1q trunk port. (CSCsu43445)
Workaround: Disable the debug management expression evaluator command. (CSCsu67323)
Workaround: None. (CSCsv07019)
On a switch with multiple Layer 3 interfaces, if the CTS SXP connection is configured without specifying source IP address and no default SXP source IP address is configured on the box, different SXP connections may acquire different source IP address for each connection.
Workaround: Do one of the following:
– Ensure that only one active Layer 3 interface exists on the switch.
– Specify the source of the IP address in each SXP connection configuration to avoid ambiguity.
– Configure a default SXP source IP address so that the SXP connection without the source IP address will use this IP address.
Workaround: None. (CSCsv42869)
Workaround: Do one of the following:
– Reload the standby switch again with the line card in place.
– Remove and reenter the commands on the active supervisor engine. The standby supervisor engine will acquire this change.
CFM is supported in default switch port mode. CFM is not supported on the PVLAN access modes (promiscuous, isolated, and community host ports) and the dot1q-tunnel modes. It is supported on all other switch port modes.
Workaround: Enable CFM on the interface with the Ehernet cfm enable command. (CSCsv67507)
Workaround: Reconfigure VLAN load balancing with a different configuration, by performing the following task:
a. Reconfigure the VLAN load balancing configuration on the desired REP ports.
b. Use the shut command on any one REP port in the segment to cause a failure in that segment.
c. Use the no-shut on the same port to restore normal REP topology with one ALT port.
d. Invoke manual preemption on a primary edge port to obtain VLAN load balancing with the new configuration.
Workaround: When a log message appears indicating that the SFP+ has been removed, do one of the following:
– Enter any commands for that port.
– Insert an SFP+ in that port.
– Reinsert the removed SFP+ in any other port.
This symptom may occur when running Cisco IOS Release 12.2(40)SG or later.
Workaround: Verify the integrity of the image using the verify /md5 command. Compare the resultant MD5 signature with the signature posted on CCO for that image.
Workaround: Verify the integrity of the image with the verify /md5 command. Compare the resultant MD5 signature with the signature posted on CCO for that image. (CSCsu37068)
Workaround: Embed the graphic into the HTML file up to 256 kilobytes (according to RFC 2397).
The following browsers support RFC 2397:
This applies to classic or E-series Catalyst 4500 supervisor engines running
Cisco IOS Release 12.2(50)SG
Workaround: None. (CSCsw14005)
If the switch were to run a supervisor switchover while in this state, the host's MAC address would not be present in the new active supervisor engine’s MAC address table, causing possible connectivity interruption on the host.
Workaround: Enter the shutdown command, followed by the no shutdown command on the interface. This triggers relearning and synchronizing of the host's MAC to the standby supervisor engine. CSCsw91661
bWorkaround: Enter shutdown, then no shutdown on the interface. This triggers relearning to occur, and a synchronization of the host's MAC to the standby supervisor engine.
This occurs only if the following conditions are satisfied:
– Multi-host mode configured on the port with the authentication host-mode multi-host command.
– Default ACL (the IP access-list) configured on the interface specifies deny ip any any.
– Dynamic policy authorization for the client specifies permit ip any any.
Despite the different default value, you can configure any value in the time range.
Workaround: None. (CSCso93282)
Workaround: None. (CSCso68331)
Workaround: Configure the route map to only match on ACL(s).
Workaround: None. (CSCsk66449)
When an output service policy attaches to an interface and if the policy is configured to apply DBL on a queue, the flows that are enqueued are subjected to the DBL algorithm. One or more flows that are classified as belligerent (flows that do not back off in response to drops because of congestion in the queue) continue to be classified as belligerent even when DBL is disabled on that queue.
For this condition to persist, the transmit queues in question must remain congested for a long period of time, and that congestion must be caused by flows that remain belligerent.
Workaround: Provided the queue in question is nondefault (queuing actions are not configured in the class-default class of the policymap), detach and reattach the service policy.
If this happens on the default queue, modifying and resetting some queuing parameters such as bandwidth and shape resolves the problem. (CSCsk62457
Workarounds: Use the show log command to find the cause of the power-down.
– LogGalInsufficientFansDetected messages in the log indicate a fan-tray failure.
– LogRkiosModuleShutdownTemp messages in the log indicate that the supervisor engine critical temperature exceeded the failure threshold.
On a switch running Cisco IOS Release 12.2(40)SG, all MTU values configured on a line card are set to default when the module is reset. MTU values are not retained for modules that are physically moved.
Workaround: None. (CSCsk52542)
Workaround: Reinsert the X2. (CSCsk43618)
When a packet is sent to the CPU it may get sent out on some other interface. If so, the original CoS value for a.1X packet cannot be matched by software QoS (according to CSCsk66449). The packet is transmitted with the CoS value it was generated with (7, for the MLDv1 packets described here).
Part of the root cause of this problem is captured in CSCsk66449, which indicates that the software QoS cannot match a.1X packet. (CSCsk72544)
Workaround: None. You cannot explicitly verify the trusted boundary state. However, you can indirectly ascertain this state:
The trusted boundary feature ensures that the packet’s CoS/DSCP value is trusted or not. When the interface is not in a trusted state, the CoS/DSCP fields are forced to zero on a received packet. Because one QoS policy on that interface uses that CoS/DSCP value for classification, if the packet classification is based on the packet value, you can infer that the interface is in a trusted state.
Workaround: Enter the show policy-map interface command to find the actual burst value programmed. (CSCsi71036)
Workaround: None. If you enter the show policy-map name, however, the unconditional marking actions appear. (CSCsi94144)
Workaround: None. (CSCsl72868)
Workaround: To ensure that the DBL action operates on the default queue, use the queue-limit command to specify an explicit queue size. This command dictates the size range. (CSCso06422)
This behavior occurs in a redundant switch when the active supervisor engine is running Cisco IOS, the standby supervisor engine is in ROMMON, and the standby supervisor engine’s ROMMON is upgraded from version 0.34 or to a later version. The upgrade process causes the uplinks on the standby supervisor engine to go down but the active supervisor engine is unaware of this.
Workarounds: To resume normal operation, do one of the following:
– Reload both supervisor engines with the redundancy reload shelf command.
– Power-cycle the standby supervisor engine by briefly pulling it from the chassis.
There is no workaround for the link flap issue. (CSCsm81875)
This problem can happen when pause frames are sent to the switch port and the flow control receive configuration is toggled on 10-Gb port.
Workaround: Change the flow control receive configuration when no traffic exists. (CSCso71647)
Workaround: Disable IGMP snooping on all the relevant VLANs before disabling it globally.
The issue is observed only for packets that are logically switched but are internally controlled such that on egress the system is generated by the switch itself. This can happen for certain snooping features such as DAI, IGMP snooping, DHCP snooping, and MLD snooping. This can also happen for IPv4/v6 packets with IP options/ extension headers that need processing in software.
Workaround: Enter shut followed by no shut on any REP port (of the same segment in which VLB is configured) in the topology. (CSCsq75342)
Workaround: Define the backup EtherChannel before applying the flexlink command. (CSCsq13477)
Workaround: None. (CSCsq99468)
You only see this behavior if you initially did not allocate a VLAN before you configure the IFM, and then at a later time allocate the same VLAN.
Workaround: Unconfigure, and then reconfigure the IFM on the port.
Workaround: Unconfigure 100/Full, execute shut/no shut, then reconfigure 100/Full on the local switch.
This section lists the resolved caveats in Release 12.2(50)SG7:
The problem occurs when the following three conditions are met:
– A software-generated or software-switched packet exits an interface (P), which is a member of a VLAN (V).
– The packet is not a high priority; PAK_PRIORITY is not set.
– Of the three possible targets, port P, VLAN V, and port-VLAN PV in the output direction, a qos policy-map is attached only to the VLAN V in the output direction.
– Provided the VLAN-only policy-map has only marking actions., replace the VLAN-only policy-map with a port-VLAN policy-map on all the ports in the VLAN.
– Provided the VLAN-only policy-map has a policing action, retain the VLAN output policymap and attach a queuing action-only output policymap to all the ports in that VLAN.
The port level policy-map should appear as follows.
This problem is observed on images later than Cisco IOS Release 12.2(46)SG.
This is a side effect of a heavily shared path.
Workarounds: Do one of the following
– Downgrade to Cisco IOS Release 12.2(46)SG.
– Upgrade to Cisco IOS Release 12.2(53)SG2 or 12.2(50)SG7.
The following conditions may cause a RACL to malfunction:
– ACL are applied on the output direction of the interface.
– IPv6 ACL contain Ace to match on the ICMP option fields (ICMP Type or ICMP Code).
Here are two examples of such non-functioning RACL:
Workaround: None. However, you cannot enter the switchport block unicast command on PVLAN trunk ports.
Workaround: Do one of the following:
– Do not attach routers to PVLAN isolated ports.
– Disable IGMP snooping (either globally or on the VLAN).
– Do not use a router connected to PVLAN isolated port as a multicast source.
Workarounds: Do one of the following:
– Enter spanning-tree portfast then authentication control-direction in on a 802.1X port.
– Enter shut then no shut on a 802.1X port.
Workaround: None. (CSCsv59929)
Do not enter this command if port security is not configured on the interface.
Do not enter this command on fa1.
Workaround: Do not use the nested policy-map feature in Cisco IOS Release 12.2(40)SG and 12.2(44)SG. (CSCsy80664)
This section lists the open caveats for Cisco IOS Release 12.2(50)SG6:
Workaround: When using the access-list N permit host hostname command, specify the IP address of the host rather than the hostname (CSCef67489)
Workaround: Verify that the MAC addresses being transmitted through the system are learned.
Workaround: None. (CSCeg48586)
– If such a certificate does not exist and the device's hostname and default_domain are set, then a persistent self-signed certificate is generated.
– If such a certificate exists, the FQDN in the certificate is compared with the current device's hostname and default_domain. If either differs from the FQDN in the certificate, the existing persistent self-signed certificate is replaced with a new one with the updated FQDN. Be aware that the existing keypair is used in the new certificate.
On a switch that supports redundancy, the generation of the self-signed certificate occurs independently on the active and the standby supervisor engines, and the certificates differ. After switchover, the HTTP client that holds the old certificate cannot connect to the HTTPS server.
Workaround: Reconnect. (CSCsb11964)
This only affects a switch that has any of the following queues configured as SPAN source in releases prior to 12.2(31)SG and saved to the startup configuration. The SPAN destination would not get the same traffic after upgrading to 12.2(31)SG.
Workaround: After upgrading to 12.2(31)SG and later releases, remove the old SPAN source configuration and reconfigure with the new queue names/IDs. For example:
Workaround: None. (CSCsc11726)
This situtation could occur for these reasons:
– A packet requires an IP redirect to an IP unnumbered outgoing port within 3 minutes of booting the Catalyst 4500 series switch.
– The switch administrator enters the shutdown and no shutdown commands on an outgoing interface that has enabled IP unnumbered. The switch receives packets that require redirection; and the destination MAC address is already in ARP table.
– Do not inject packets that require an IP redirect sent out to an IP unnumbered port within 3 minutes of booting the Catalyst 4500 series switch.
– Configure the correct default gateway on the host side. (CSCse75660)
Workaround: None. (CSCsg58526)
This does not affect performance.
Workaround: Enter the no shutdown command. (CSCsg27395)
Workaround: Remove the transceiver from the new port and place it in the old port. After the SFP is recognized in the old port, remove it slowly and insert it in the new port. (CSCse34693).
Workaround: None. This message is an informational message. (CSCsi60913)
Workaround: None. This is an informational message. (CSCsi60898)
Workaround: None. (CSCsm30320)
Workarounds: Do one of the following:
– After a reload, copy the startup-config to the running-config.
– Use a loopback interface as the target of the ip unnumbered command.
– Change the CLI configuration so that during bootup the router port is created first.
Workaround: When the port channel starts to flap, enter shut and no shut on the port channel. After the first switchover and after deleting the port channel, create a new channel. (CSCsr00333)
Workaround: Before removing a line card, delete the statically configured ip source binding entries on any of the interfaces on the line card. (CSCsv54529)
Workaround: Clear the errors with the clear ethernet cfm errors command. (CSCsv43819)
This problem is seen only an interface configured with VRF.
Workaround: None. (CSCsr69187)
Workaround: Shut down, and then reopen the interface.
Workaround: Reconfigure tracking on the newly created interface. (CSCsr66876)
Workaround: None. (CSCsr95941)
Workaround: Do one of the following:
– Do not attach routers to PVLAN isolated ports.
– Disable IGMP snooping (either globally or on the VLAN).
– Do not use a router connected to PVLAN isolated port as a multicast source.
Workaround: None. (CSCsu42775)
Workaround: Configure an ISL/dot1q trunk port. (CSCsu43445)
Workaround: Disable the debug management expression evaluator command. (CSCsu67323)
Workarounds: Do one of the following:
– Enter spanning-tree portfast then authentication control-direction in on a 802.1X port.
– Enter shut then no shut on a 802.1X port.
Workaround: None. (CSCsv07019)
On a switch with multiple Layer 3 interfaces, if the CTS SXP connection is configured without specifying source IP address and no default SXP source IP address is configured on the box, different SXP connections may acquire different source IP address for each connection.
Workaround: Do one of the following:
– Ensure that only one active Layer 3 interface exists on the switch.
– Specify the source of the IP address in each SXP connection configuration to avoid ambiguity.
– Configure a default SXP source IP address so that the SXP connection without the source IP address will use this IP address.
Workaround: None. (CSCsv42869)
Workaround: Do one of the following:
– Reload the standby switch again with the line card in place.
– Remove and reenter the commands on the active supervisor engine. The standby supervisor engine will acquire this change.
Workaround: None. (CSCsv59929)
CFM is supported in default switch port mode. CFM is not supported on the PVLAN access modes (promiscuous, isolated, and community host ports) and the dot1q-tunnel modes. It is supported on all other switch port modes.
Workaround: Enable CFM on the interface with the Ehernet cfm enable command. (CSCsv67507)
Workaround: Reconfigure VLAN load balancing with a different configuration, by performing the following task:
a. Reconfigure the VLAN load balancing configuration on the desired REP ports.
b. Use the shut command on any one REP port in the segment to cause a failure in that segment.
c. Use the no-shut on the same port to restore normal REP topology with one ALT port.
d. Invoke manual preemption on a primary edge port to obtain VLAN load balancing with the new configuration.
Workaround: When a log message appears indicating that the SFP+ has been removed, do one of the following:
– Enter any commands for that port.
– Insert an SFP+ in that port.
– Reinsert the removed SFP+ in any other port.
This symptom may occur when running Cisco IOS Release 12.2(40)SG or later.
Workaround: Verify the integrity of the image using the verify /md5 command. Compare the resultant MD5 signature with the signature posted on CCO for that image.
Workaround: Verify the integrity of the image with the verify /md5 command. Compare the resultant MD5 signature with the signature posted on CCO for that image. (CSCsu37068)
Workaround: Embed the graphic into the HTML file up to 256 kilobytes (according to RFC 2397).
The following browsers support RFC 2397:
This applies to classic or E-series Catalyst 4500 supervisor engines running
Cisco IOS Release 12.2(50)SG
Workaround: None. (CSCsw14005)
If the switch were to run a supervisor switchover while in this state, the host's MAC address would not be present in the new active supervisor engine’s MAC address table, causing possible connectivity interruption on the host.
Workaround: Enter the shutdown command, followed by the no shutdown command on the interface. This triggers relearning and synchronizing of the host's MAC to the standby supervisor engine. CSCsw91661
bWorkaround: Enter shutdown, then no shutdown on the interface. This triggers relearning to occur, and a synchronization of the host's MAC to the standby supervisor engine.
Do not enter this command if port security is not configured on the interface.
Do not enter this command on fa1.
This occurs only if the following conditions are satisfied:
– Multi-host mode configured on the port with the authentication host-mode multi-host command.
– Default ACL (the IP access-list) configured on the interface specifies deny ip any any.
– Dynamic policy authorization for the client specifies permit ip any any.
Despite the different default value, you can configure any value in the time range.
Workaround: None. (CSCsk66449)
When an output service policy attaches to an interface and if the policy is configured to apply DBL on a queue, the flows that are enqueued are subjected to the DBL algorithm. One or more flows that are classified as belligerent (flows that do not back off in response to drops because of congestion in the queue) continue to be classified as belligerent even when DBL is disabled on that queue.
For this condition to persist, the transmit queues in question must remain congested for a long period of time, and that congestion must be caused by flows that remain belligerent.
Workaround: Provided the queue in question is nondefault (queuing actions are not configured in the class-default class of the policymap), detach and reattach the service policy.
If this happens on the default queue, modifying and resetting some queuing parameters such as bandwidth and shape resolves the problem. (CSCsk62457
Workarounds: Use the show log command to find the cause of the power-down.
– LogGalInsufficientFansDetected messages in the log indicate a fan-tray failure.
– LogRkiosModuleShutdownTemp messages in the log indicate that the supervisor engine critical temperature exceeded the failure threshold.
On a switch running Cisco IOS Release 12.2(40)SG, all MTU values configured on a line card are set to default when the module is reset. MTU values are not retained for modules that are physically moved.
Workaround: None. (CSCsk52542)
Workaround: Reinsert the X2. (CSCsk43618)
When a packet is sent to the CPU it may get sent out on some other interface. If so, the original CoS value for a.1X packet cannot be matched by software QoS (according to CSCsk66449). The packet is transmitted with the CoS value it was generated with (7, for the MLDv1 packets described here).
Part of the root cause of this problem is captured in CSCsk66449, which indicates that the software QoS cannot match a.1X packet. (CSCsk72544)
Workaround: None. You cannot explicitly verify the trusted boundary state. However, you can indirectly ascertain this state:
The trusted boundary feature ensures that the packet’s CoS/DSCP value is trusted or not. When the interface is not in a trusted state, the CoS/DSCP fields are forced to zero on a received packet. Because one QoS policy on that interface uses that CoS/DSCP value for classification, if the packet classification is based on the packet value, you can infer that the interface is in a trusted state.
Workaround: Enter the show policy-map interface command to find the actual burst value programmed. (CSCsi71036)
Workaround: None. If you enter the show policy-map name, however, the unconditional marking actions appear. (CSCsi94144)
Workaround: None. (CSCsl72868)
Workaround: To ensure that the DBL action operates on the default queue, use the queue-limit command to specify an explicit queue size. This command dictates the size range. (CSCso06422)
This behavior occurs in a redundant switch when the active supervisor engine is running Cisco IOS, the standby supervisor engine is in ROMMON, and the standby supervisor engine’s ROMMON is upgraded from version 0.34 or to a later version. The upgrade process causes the uplinks on the standby supervisor engine to go down but the active supervisor engine is unaware of this.
Workarounds: To resume normal operation, do one of the following:
– Reload both supervisor engines with the redundancy reload shelf command.
– Power-cycle the standby supervisor engine by briefly pulling it from the chassis.
There is no workaround for the link flap issue. (CSCsm81875)
This problem can happen when pause frames are sent to the switch port and the flow control receive configuration is toggled on 10-Gb port.
Workaround: Change the flow control receive configuration when no traffic exists. (CSCso71647)
Workaround: Disable IGMP snooping on all the relevant VLANs before disabling it globally.
The issue is observed only for packets that are logically switched but are internally controlled such that on egress the system is generated by the switch itself. This can happen for certain snooping features such as DAI, IGMP snooping, DHCP snooping, and MLD snooping. This can also happen for IPv4/v6 packets with IP options/ extension headers that need processing in software.
Workaround: Enter shut followed by no shut on any REP port (of the same segment in which VLB is configured) in the topology. (CSCsq75342)
Workaround: Define the backup EtherChannel before applying the flexlink command. (CSCsq13477)
Workaround: None. (CSCsq99468)
Workaround: Ping the global and link local addresses of the neighbor to ascertain and reinstate reachability. (CSCsq77181)
Workaround: Unconfigure the port channel and the associated physical port, and reconfigure them.
You only see this behavior if you initially did not allocate a VLAN before you configure the IFM, and then at a later time allocate the same VLAN.
Workaround: Unconfigure, and then reconfigure the IFM on the port.
Workaround: Do not use the nested policy-map feature in Cisco IOS Release 12.2(40)SG and 12.2(44)SG. (CSCsy80664)
The following conditions may cause a RACL to malfunction:
– ACL are applied on the output direction of the interface.
– IPv6 ACL contain Ace to match on the ICMP option fields (ICMP Type or ICMP Code).
Here are two examples of such non-functioning RACL:
Workaround: None. However, you cannot enter the switchport block unicast command on PVLAN trunk ports.
This section lists the resolved caveats in Release 12.2(50)SG6:
The show processes cpu command indicates that Cat4k Mgmt LoPri consumes a significant amount of CPU. The show platform health command indicates that K5L3FlcMan FwdEntry, K5L3Unciast IFE Review, and K5L3UnicastRpf IFE Review processes are running above their target utilization.
Note that large amounts of incomplete ARP entries may result from a scanning device or virus.
– Reduce the number of Layer 3 routes.
– Prevent the ARP activity that triggers the high CPU utilization.
Certain applications such as IP Source Guard and QoS enable ACL statistics by default. Configuring such features trigger the high CPU.
High CPU usage is observed through the show proc cpu command. The output of
the show platform health command reveals that the process using a high percentage of CPU is "K5AclCamStatsMan hw".
This issue can occur in any release after Cisco IOS Release 12.2(40)SG.
This issue is resolved in Cisco IOS Release 12.2(53)SG1 and 12.2(50)SG6.
Workaround: Reduce the size of the ACL, IPSG, and QoS configurations. If statistics are enabled explicitly for ACLs, disable them with the CLI.
If the high CPU is due to ACLs and IPSG, upgrade to the new software.
If the high CPU is due to the QoS configuration, upgrade the IOS image and enter the
no qos statistics classification command.
Downgrade to Cisco IOS Release 12.2(50)SG3 if needed.
Workaround: Avoid lengthy bootflash operations, like copying large files in IOS.
ARP entries learned on normal SVIs are unaffected.
Workaround: Clear these ARP entries with the clear ip arp command.
Workaround: Disable port security.
Workarounds: Configure identical policy-maps with different names so that each EtherChannel has its own policy. This action restricts the effect of this link flap to a limited number of EtherChannels.
Workaround: Configure an access-list to permit the CPU generated packets and apply the ACL to the class-map.
This section lists the open caveats for Cisco IOS Release 12.2(50)SG5:
Workaround: When using the access-list N permit host hostname command, specify the IP address of the host rather than the hostname (CSCef67489)
Workaround: Verify that the MAC addresses being transmitted through the system are learned.
Workaround: None. (CSCeg48586)
– If such a certificate does not exist and the device's hostname and default_domain are set, then a persistent self-signed certificate is generated.
– If such a certificate exists, the FQDN in the certificate is compared with the current device's hostname and default_domain. If either differs from the FQDN in the certificate, the existing persistent self-signed certificate is replaced with a new one with the updated FQDN. Be aware that the existing keypair is used in the new certificate.
On a switch that supports redundancy, the generation of the self-signed certificate occurs independently on the active and the standby supervisor engines, and the certificates differ. After switchover, the HTTP client that holds the old certificate cannot connect to the HTTPS server.
Workaround: Reconnect. (CSCsb11964)
This only affects a switch that has any of the following queues configured as SPAN source in releases prior to 12.2(31)SG and saved to the startup configuration. The SPAN destination would not get the same traffic after upgrading to 12.2(31)SG.
Workaround: After upgrading to 12.2(31)SG and later releases, remove the old SPAN source configuration and reconfigure with the new queue names/IDs. For example:
Workaround: None. (CSCsc11726)
This situtation could occur for these reasons:
– A packet requires an IP redirect to an IP unnumbered outgoing port within 3 minutes of booting the Catalyst 4500 series switch.
– The switch administrator enters the shutdown and no shutdown commands on an outgoing interface that has enabled IP unnumbered. The switch receives packets that require redirection; and the destination MAC address is already in ARP table.
– Do not inject packets that require an IP redirect sent out to an IP unnumbered port within 3 minutes of booting the Catalyst 4500 series switch.
– Configure the correct default gateway on the host side. (CSCse75660)
Workaround: None. (CSCsg58526)
This does not affect performance.
Workaround: Enter the no shutdown command. (CSCsg27395)
Workaround: Remove the transceiver from the new port and place it in the old port. After the SFP is recognized in the old port, remove it slowly and insert it in the new port. (CSCse34693).
Workaround: None. This message is an informational message. (CSCsi60913)
Workaround: None. This is an informational message. (CSCsi60898)
Workaround: None. (CSCsm30320)
Workarounds: Do one of the following:
– After a reload, copy the startup-config to the running-config.
– Use a loopback interface as the target of the ip unnumbered command.
– Change the CLI configuration so that during bootup the router port is created first.
Workaround: When the port channel starts to flap, enter shut and no shut on the port channel. After the first switchover and after deleting the port channel, create a new channel. (CSCsr00333)
Workaround: Before removing a line card, delete the statically configured ip source binding entries on any of the interfaces on the line card. (CSCsv54529)
Workaround: Clear the errors with the clear ethernet cfm errors command. (CSCsv43819)
This problem is seen only an interface configured with VRF.
Workaround: None. (CSCsr69187)
Workaround: Shut down, and then reopen the interface.
Workaround: Reconfigure tracking on the newly created interface. (CSCsr66876)
Workaround: None. (CSCsr95941)
Workaround: Do one of the following:
– Do not attach routers to PVLAN isolated ports.
– Disable IGMP snooping (either globally or on the VLAN).
– Do not use a router connected to PVLAN isolated port as a multicast source.
Workaround: None. (CSCsu42775)
Workaround: Configure an ISL/dot1q trunk port. (CSCsu43445)
Workaround: Disable the debug management expression evaluator command. (CSCsu67323)
Workarounds: Do one of the following:
– Enter spanning-tree portfast then authentication control-direction in on a 802.1X port.
– Enter shut then no shut on a 802.1X port.
Workaround: None. (CSCsv07019)
On a switch with multiple Layer 3 interfaces, if the CTS SXP connection is configured without specifying source IP address and no default SXP source IP address is configured on the box, different SXP connections may acquire different source IP address for each connection.
Workaround: Do one of the following:
– Ensure that only one active Layer 3 interface exists on the switch.
– Specify the source of the IP address in each SXP connection configuration to avoid ambiguity.
– Configure a default SXP source IP address so that the SXP connection without the source IP address will use this IP address.
Workaround: None. (CSCsv42869)
Workaround: Do one of the following:
– Reload the standby switch again with the line card in place.
– Remove and reenter the commands on the active supervisor engine. The standby supervisor engine will acquire this change.
Workaround: None. (CSCsv59929)
CFM is supported in default switch port mode. CFM is not supported on the PVLAN access modes (promiscuous, isolated, and community host ports) and the dot1q-tunnel modes. It is supported on all other switch port modes.
Workaround: Enable CFM on the interface with the Ehernet cfm enable command. (CSCsv67507)
Workaround: Reconfigure VLAN load balancing with a different configuration, by performing the following task:
a. Reconfigure the VLAN load balancing configuration on the desired REP ports.
b. Use the shut command on any one REP port in the segment to cause a failure in that segment.
c. Use the no-shut on the same port to restore normal REP topology with one ALT port.
d. Invoke manual preemption on a primary edge port to obtain VLAN load balancing with the new configuration.
Workaround: When a log message appears indicating that the SFP+ has been removed, do one of the following:
– Enter any commands for that port.
– Insert an SFP+ in that port.
– Reinsert the removed SFP+ in any other port.
This symptom may occur when running Cisco IOS Release 12.2(40)SG or later.
Workaround: Verify the integrity of the image using the verify /md5 command. Compare the resultant MD5 signature with the signature posted on CCO for that image.
Workaround: Verify the integrity of the image with the verify /md5 command. Compare the resultant MD5 signature with the signature posted on CCO for that image. (CSCsu37068)
Workaround: Embed the graphic into the HTML file up to 256 kilobytes (according to RFC 2397).
The following browsers support RFC 2397:
This applies to classic or E-series Catalyst 4500 supervisor engines running
Cisco IOS Release 12.2(50)SG
Workaround: None. (CSCsw14005)
If the switch were to run a supervisor switchover while in this state, the host's MAC address would not be present in the new active supervisor engine’s MAC address table, causing possible connectivity interruption on the host.
Workaround: Enter the shutdown command, followed by the no shutdown command on the interface. This triggers relearning and synchronizing of the host's MAC to the standby supervisor engine. CSCsw91661
bWorkaround: Enter shutdown, then no shutdown on the interface. This triggers relearning to occur, and a synchronization of the host's MAC to the standby supervisor engine.
Do not enter this command if port security is not configured on the interface.
Do not enter this command on fa1.
This occurs only if the following conditions are satisfied:
– Multi-host mode configured on the port with the authentication host-mode multi-host command.
– Default ACL (the IP access-list) configured on the interface specifies deny ip any any.
– Dynamic policy authorization for the client specifies permit ip any any.
Workaround: None. (CSCsk66449)
When an output service policy attaches to an interface and if the policy is configured to apply DBL on a queue, the flows that are enqueued are subjected to the DBL algorithm. One or more flows that are classified as belligerent (flows that do not back off in response to drops because of congestion in the queue) continue to be classified as belligerent even when DBL is disabled on that queue.
For this condition to persist, the transmit queues in question must remain congested for a long period of time, and that congestion must be caused by flows that remain belligerent.
Workaround: Provided the queue in question is nondefault (queuing actions are not configured in the class-default class of the policymap), detach and reattach the service policy.
If this happens on the default queue, modifying and resetting some queuing parameters such as bandwidth and shape resolves the problem. (CSCsk62457
Workarounds: Use the show log command to find the cause of the power-down.
– LogGalInsufficientFansDetected messages in the log indicate a fan-tray failure.
– LogRkiosModuleShutdownTemp messages in the log indicate that the supervisor engine critical temperature exceeded the failure threshold.
On a switch running Cisco IOS Release 12.2(40)SG, all MTU values configured on a line card are set to default when the module is reset. MTU values are not retained for modules that are physically moved.
Workaround: None. (CSCsk52542)
Workaround: Reinsert the X2. (CSCsk43618)
When a packet is sent to the CPU it may get sent out on some other interface. If so, the original CoS value for a.1X packet cannot be matched by software QoS (according to CSCsk66449). The packet is transmitted with the CoS value it was generated with (7, for the MLDv1 packets described here).
Part of the root cause of this problem is captured in CSCsk66449, which indicates that the software QoS cannot match a.1X packet. (CSCsk72544)
Workaround: None. You cannot explicitly verify the trusted boundary state. However, you can indirectly ascertain this state:
The trusted boundary feature ensures that the packet’s CoS/DSCP value is trusted or not. When the interface is not in a trusted state, the CoS/DSCP fields are forced to zero on a received packet. Because one QoS policy on that interface uses that CoS/DSCP value for classification, if the packet classification is based on the packet value, you can infer that the interface is in a trusted state.
Workaround: Enter the show policy-map interface command to find the actual burst value programmed. (CSCsi71036)
Workaround: None. If you enter the show policy-map name, however, the unconditional marking actions appear. (CSCsi94144)
Workaround: None. (CSCsl72868)
Workaround: To ensure that the DBL action operates on the default queue, use the queue-limit command to specify an explicit queue size. This command dictates the size range. (CSCso06422)
This behavior occurs in a redundant switch when the active supervisor engine is running Cisco IOS, the standby supervisor engine is in ROMMON, and the standby supervisor engine’s ROMMON is upgraded from version 0.34 or to a later version. The upgrade process causes the uplinks on the standby supervisor engine to go down but the active supervisor engine is unaware of this.
Workarounds: To resume normal operation, do one of the following:
– Reload both supervisor engines with the redundancy reload shelf command.
– Power-cycle the standby supervisor engine by briefly pulling it from the chassis.
There is no workaround for the link flap issue. (CSCsm81875)
This problem can happen when pause frames are sent to the switch port and the flow control receive configuration is toggled on 10-Gb port.
Workaround: Change the flow control receive configuration when no traffic exists. (CSCso71647)
Workaround: Disable IGMP snooping on all the relevant VLANs before disabling it globally.
The issue is observed only for packets that are logically switched but are internally controlled such that on egress the system is generated by the switch itself. This can happen for certain snooping features such as DAI, IGMP snooping, DHCP snooping, and MLD snooping. This can also happen for IPv4/v6 packets with IP options/ extension headers that need processing in software.
Workaround: Enter shut followed by no shut on any REP port (of the same segment in which VLB is configured) in the topology. (CSCsq75342)
Workaround: Define the backup EtherChannel before applying the flexlink command. (CSCsq13477)
Workaround: None. (CSCsq99468)
Workaround: Ping the global and link local addresses of the neighbor to ascertain and reinstate reachability. (CSCsq77181)
Workaround: Unconfigure the port channel and the associated physical port, and reconfigure them.
You only see this behavior if you initially did not allocate a VLAN before you configure the IFM, and then at a later time allocate the same VLAN.
Workaround: Unconfigure, and then reconfigure the IFM on the port.
This log message is informational only; it does not reflect a potential problem with the linecard.
It only impacts the WS-X4648-GB-RJ45V and WS-X4648-GB-RJ45V+ line cards.
Workaround: Ignore the warning message; take no action to reset the linecard or port(s). You do not need to perform an RMA (Return to Manufacturing for Analysis) nor submit the line card for EFA (Engineering Failure Analysis).
Workaround: None. Regular functionality is unaffected.
Workaround: Do not use the nested policy-map feature in Cisco IOS Release 12.2(40)SG and 12.2(44)SG. (CSCsy80664)
The following conditions may cause a RACL to malfunction:
– ACL are applied on the output direction of the interface.
– IPv6 ACL contain Ace to match on the ICMP option fields (ICMP Type or ICMP Code).
This section lists the resolved caveats in Release 12.2(50)SG5:
This caveat occurs when a register value is corrupted and you subsequently enable a Layer 3 feature.
This section lists the open caveats for Cisco IOS Release 12.2(50)SG4:
Workaround: When using the access-list N permit host hostname command, specify the IP address of the host rather than the hostname (CSCef67489)
Workaround: Verify that the MAC addresses being transmitted through the system are learned.
Workaround: None. (CSCeg48586)
– If such a certificate does not exist and the device's hostname and default_domain are set, then a persistent self-signed certificate is generated.
– If such a certificate exists, the FQDN in the certificate is compared with the current device's hostname and default_domain. If either differs from the FQDN in the certificate, the existing persistent self-signed certificate is replaced with a new one with the updated FQDN. Be aware that the existing keypair is used in the new certificate.
On a switch that supports redundancy, the generation of the self-signed certificate occurs independently on the active and the standby supervisor engines, and the certificates differ. After switchover, the HTTP client that holds the old certificate cannot connect to the HTTPS server.
Workaround: Reconnect. (CSCsb11964)
This only affects a switch that has any of the following queues configured as SPAN source in releases prior to 12.2(31)SG and saved to the startup configuration. The SPAN destination would not get the same traffic after upgrading to 12.2(31)SG.
Workaround: After upgrading to 12.2(31)SG and later releases, remove the old SPAN source configuration and reconfigure with the new queue names/IDs. For example:
Workaround: None. (CSCsc11726)
This situtation could occur for these reasons:
– A packet requires an IP redirect to an IP unnumbered outgoing port within 3 minutes of booting the Catalyst 4500 series switch.
– The switch administrator enters the shutdown and no shutdown commands on an outgoing interface that has enabled IP unnumbered. The switch receives packets that require redirection; and the destination MAC address is already in ARP table.
– Do not inject packets that require an IP redirect sent out to an IP unnumbered port within 3 minutes of booting the Catalyst 4500 series switch.
– Configure the correct default gateway on the host side. (CSCse75660)
Workaround: None. (CSCsg58526)
This does not affect performance.
Workaround: Enter the no shutdown command. (CSCsg27395)
Workaround: Remove the transceiver from the new port and place it in the old port. After the SFP is recognized in the old port, remove it slowly and insert it in the new port. (CSCse34693).
Workaround: None. This message is an informational message. (CSCsi60913)
Workaround: None. This is an informational message. (CSCsi60898)
Workaround: None. (CSCsm30320)
Workarounds: Do one of the following:
– After a reload, copy the startup-config to the running-config.
– Use a loopback interface as the target of the ip unnumbered command.
– Change the CLI configuration so that during bootup the router port is created first.
Workaround: When the port channel starts to flap, enter shut and no shut on the port channel. After the first switchover and after deleting the port channel, create a new channel. (CSCsr00333)
Workaround: Before removing a line card, delete the statically configured ip source binding entries on any of the interfaces on the line card. (CSCsv54529)
Workaround: Clear the errors with the clear ethernet cfm errors command. (CSCsv43819)
This problem is seen only an interface configured with VRF.
Workaround: None. (CSCsr69187)
Workaround: Shut down, and then reopen the interface.
Workaround: Reconfigure tracking on the newly created interface. (CSCsr66876)
Workaround: None. (CSCsr95941)
Workaround: Do one of the following:
– Do not attach routers to PVLAN isolated ports.
– Disable IGMP snooping (either globally or on the VLAN).
– Do not use a router connected to PVLAN isolated port as a multicast source.
Workaround: None. (CSCsu42775)
Workaround: Configure an ISL/dot1q trunk port. (CSCsu43445)
Workaround: Disable the debug management expression evaluator command. (CSCsu67323)
Workarounds: Do one of the following:
– Enter spanning-tree portfast then authentication control-direction in on a 802.1X port.
– Enter shut then no shut on a 802.1X port.
Workaround: None. (CSCsv07019)
On a switch with multiple Layer 3 interfaces, if the CTS SXP connection is configured without specifying source IP address and no default SXP source IP address is configured on the box, different SXP connections may acquire different source IP address for each connection.
Workaround: Do one of the following:
– Ensure that only one active Layer 3 interface exists on the switch.
– Specify the source of the IP address in each SXP connection configuration to avoid ambiguity.
– Configure a default SXP source IP address so that the SXP connection without the source IP address will use this IP address.
Workaround: None. (CSCsv42869)
Workaround: Do one of the following:
– Reload the standby switch again with the line card in place.
– Remove and reenter the commands on the active supervisor engine. The standby supervisor engine will acquire this change.
Workaround: None. (CSCsv59929)
CFM is supported in default switch port mode. CFM is not supported on the PVLAN access modes (promiscuous, isolated, and community host ports) and the dot1q-tunnel modes. It is supported on all other switch port modes.
Workaround: Enable CFM on the interface with the Ehernet cfm enable command. (CSCsv67507)
Workaround: Reconfigure VLAN load balancing with a different configuration, by performing the following task:
a. Reconfigure the VLAN load balancing configuration on the desired REP ports.
b. Use the shut command on any one REP port in the segment to cause a failure in that segment.
c. Use the no-shut on the same port to restore normal REP topology with one ALT port.
d. Invoke manual preemption on a primary edge port to obtain VLAN load balancing with the new configuration.
Workaround: When a log message appears indicating that the SFP+ has been removed, do one of the following:
– Enter any commands for that port.
– Insert an SFP+ in that port.
– Reinsert the removed SFP+ in any other port.
This symptom may occur when running Cisco IOS Release 12.2(40)SG or later.
Workaround: Verify the integrity of the image using the verify /md5 command. Compare the resultant MD5 signature with the signature posted on CCO for that image.
Workaround: Verify the integrity of the image with the verify /md5 command. Compare the resultant MD5 signature with the signature posted on CCO for that image. (CSCsu37068)
Workaround: Embed the graphic into the HTML file up to 256 kilobytes (according to RFC 2397).
The following browsers support RFC 2397:
This applies to classic or E-series Catalyst 4500 supervisor engines running
Cisco IOS Release 12.2(50)SG
Workaround: None. (CSCsw14005)
If the switch were to run a supervisor switchover while in this state, the host's MAC address would not be present in the new active supervisor engine’s MAC address table, causing possible connectivity interruption on the host.
Workaround: Enter the shutdown command, followed by the no shutdown command on the interface. This triggers relearning and synchronizing of the host's MAC to the standby supervisor engine. CSCsw91661
bWorkaround: Enter shutdown, then no shutdown on the interface. This triggers relearning to occur, and a synchronization of the host's MAC to the standby supervisor engine.
Do not enter this command if port security is not configured on the interface.
Do not enter this command on fa1.
This occurs only if the following conditions are satisfied:
– Multi-host mode configured on the port with the authentication host-mode multi-host command.
– Default ACL (the IP access-list) configured on the interface specifies deny ip any any.
– Dynamic policy authorization for the client specifies permit ip any any.
Workaround: None. (CSCsk66449)
When an output service policy attaches to an interface and if the policy is configured to apply DBL on a queue, the flows that are enqueued are subjected to the DBL algorithm. One or more flows that are classified as belligerent (flows that do not back off in response to drops because of congestion in the queue) continue to be classified as belligerent even when DBL is disabled on that queue.
For this condition to persist, the transmit queues in question must remain congested for a long period of time, and that congestion must be caused by flows that remain belligerent.
Workaround: Provided the queue in question is nondefault (queuing actions are not configured in the class-default class of the policymap), detach and reattach the service policy.
If this happens on the default queue, modifying and resetting some queuing parameters such as bandwidth and shape resolves the problem. (CSCsk62457
Workarounds: Use the show log command to find the cause of the power-down.
– LogGalInsufficientFansDetected messages in the log indicate a fan-tray failure.
– LogRkiosModuleShutdownTemp messages in the log indicate that the supervisor engine critical temperature exceeded the failure threshold.
On a switch running Cisco IOS Release 12.2(40)SG, all MTU values configured on a line card are set to default when the module is reset. MTU values are not retained for modules that are physically moved.
Workaround: None. (CSCsk52542)
Workaround: Reinsert the X2. (CSCsk43618)
When a packet is sent to the CPU it may get sent out on some other interface. If so, the original CoS value for a.1X packet cannot be matched by software QoS (according to CSCsk66449). The packet is transmitted with the CoS value it was generated with (7, for the MLDv1 packets described here).
Part of the root cause of this problem is captured in CSCsk66449, which indicates that the software QoS cannot match a.1X packet. (CSCsk72544)
Workaround: None. You cannot explicitly verify the trusted boundary state. However, you can indirectly ascertain this state:
The trusted boundary feature ensures that the packet’s CoS/DSCP value is trusted or not. When the interface is not in a trusted state, the CoS/DSCP fields are forced to zero on a received packet. Because one QoS policy on that interface uses that CoS/DSCP value for classification, if the packet classification is based on the packet value, you can infer that the interface is in a trusted state.
Workaround: Enter the show policy-map interface command to find the actual burst value programmed. (CSCsi71036)
Workaround: None. If you enter the show policy-map name, however, the unconditional marking actions appear. (CSCsi94144)
Workaround: None. (CSCsl72868)
Workaround: To ensure that the DBL action operates on the default queue, use the queue-limit command to specify an explicit queue size. This command dictates the size range. (CSCso06422)
This behavior occurs in a redundant switch when the active supervisor engine is running Cisco IOS, the standby supervisor engine is in ROMMON, and the standby supervisor engine’s ROMMON is upgraded from version 0.34 or to a later version. The upgrade process causes the uplinks on the standby supervisor engine to go down but the active supervisor engine is unaware of this.
Workarounds: To resume normal operation, do one of the following:
– Reload both supervisor engines with the redundancy reload shelf command.
– Power-cycle the standby supervisor engine by briefly pulling it from the chassis.
There is no workaround for the link flap issue. (CSCsm81875)
This problem can happen when pause frames are sent to the switch port and the flow control receive configuration is toggled on 10-Gb port.
Workaround: Change the flow control receive configuration when no traffic exists. (CSCso71647)
Workaround: Disable IGMP snooping on all the relevant VLANs before disabling it globally.
The issue is observed only for packets that are logically switched but are internally controlled such that on egress the system is generated by the switch itself. This can happen for certain snooping features such as DAI, IGMP snooping, DHCP snooping, and MLD snooping. This can also happen for IPv4/v6 packets with IP options/ extension headers that need processing in software.
Workaround: Enter shut followed by no shut on any REP port (of the same segment in which VLB is configured) in the topology. (CSCsq75342)
Workaround: Define the backup EtherChannel before applying the flexlink command. (CSCsq13477)
Workaround: None. (CSCsq99468)
Workaround: Ping the global and link local addresses of the neighbor to ascertain and reinstate reachability. (CSCsq77181)
Workaround: Unconfigure the port channel and the associated physical port, and reconfigure them.
You only see this behavior if you initially did not allocate a VLAN before you configure the IFM, and then at a later time allocate the same VLAN.
Workaround: Unconfigure, and then reconfigure the IFM on the port.
This log message is informational only; it does not reflect a potential problem with the linecard.
It only impacts the WS-X4648-GB-RJ45V and WS-X4648-GB-RJ45V+ line cards.
Workaround: Ignore the warning message; take no action to reset the linecard or port(s). You do not need to perform an RMA (Return to Manufacturing for Analysis) nor submit the line card for EFA (Engineering Failure Analysis).
Workaround: None. Regular functionality is unaffected.
Workaround: Do not use the nested policy-map feature in Cisco IOS Release 12.2(40)SG and 12.2(44)SG. (CSCsy80664)
The following conditions may cause a RACL to malfunction:
– ACL are applied on the output direction of the interface.
– IPv6 ACL contain Ace to match on the ICMP option fields (ICMP Type or ICMP Code).
This section lists the resolved caveats in Release 12.2(50)SG4:
This problem is seen on all Catalyst 4500 or 4900 chassis running Cisco IOS Release 12.2.(50)SG. The problem occurs when the following conditions are present:
– The router is configured with AAA authentication and authorization.
– The AAA server runs CiscoSecure ACS 2.4.
– The callback or callback-dialstring attribute is configured on the AAA server for the user.
Workaround: Do not configure the callback or callback-dialstring attribute for the user. If you use the callback-dialstring attribute in the TACACS+ profile, ensure that the NULL value is not configured. (CSCei62358)
This problem occurs only when a port is configured with PVLAN and 802.1X multi-auth.
Workaround: Shut down, and then reopen the interface. (CSCsr58573)
Workaround: Reapply the identity policy on the interface with the permit icmp command. (CSCsu03507
This problem is first seen in 12.2(40)SG.
Workaround: Manually apply the configuration that is generated by AutoQoS. Do not use Auto Qos. CSCsv03316
They imply no impact to performance.
Workaround: None. (CSCsv17545)
Port-channel functionality is not supported on the fa1 management interface.
This is a configuration error.
Workaround: None. (CSCsv91302)
Workaround: None. (CSCsw32519)
Workaround: Configure every interface individually.
To avoid rebooting the standby supervisor engine, explicitly run the exit or end command to exit the tx-queue configuration context when working in an interface range. The short form of the exit command ex does not work. These commands should be typed line by line; copy/paste will not work.
Workaround: None. (CSCsy29140)
Similar behavior is observed with Supervisor Engine 6-E uplinks and the WS-X4706-10GE line card.
Similar behavior is observed with Supervisor Engine 6-E uplinks and the WS-X4706-10GE line card.
This behavior is seen in Cisco IOS Releases 12.2(50)SG thru 12.2(50)SG3 when the peer device sends a remote fault.
Workaround: Disable auto negotiation at both ends.
There are no workarounds that mitigate this vulnerability.
This advisory is posted at the following link:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20090923-auth-proxy
Cisco has released free software updates that address this vulnerability.
This problem is first seen in Cisco IOS Release 12.2(40)SG.
Workaround: Manually apply the configuration that would be generated by Auto QoS.
Workaround: Enter the default interface command on the WS-X4503+ supervisor engines.
This log message is informational only; it does not reflect a potential problem with the linecard.
It only impacts the WS-X4648-GB-RJ45V and WS-X4648-GB-RJ45V+ line cards.
Workaround: Ignore the warning message; take no action to reset the linecard or port(s). You do not need to perform an RMA (Return to Manufacturing for Analysis) nor submit the line card for EFA (Engineering Failure Analysis).
Note A SSO switchover using an earlier release might restore traffic but it would be temporary.
This section lists the open caveats for Cisco IOS Release 12.2(50)SG3:
Workaround: When using the access-list N permit host hostname command, specify the IP address of the host rather than the hostname (CSCef67489)
Workaround: Verify that the MAC addresses being transmitted through the system are learned.
Workaround: None. (CSCeg48586)
– If such a certificate does not exist and the device's hostname and default_domain are set, then a persistent self-signed certificate is generated.
– If such a certificate exists, the FQDN in the certificate is compared with the current device's hostname and default_domain. If either differs from the FQDN in the certificate, the existing persistent self-signed certificate is replaced with a new one with the updated FQDN. Be aware that the existing keypair is used in the new certificate.
On a switch that supports redundancy, the generation of the self-signed certificate occurs independently on the active and the standby supervisor engines, and the certificates differ. After switchover, the HTTP client that holds the old certificate cannot connect to the HTTPS server.
Workaround: Reconnect. (CSCsb11964)
This only affects a switch that has any of the following queues configured as SPAN source in releases prior to 12.2(31)SG and saved to the startup configuration. The SPAN destination would not get the same traffic after upgrading to 12.2(31)SG.
Workaround: After upgrading to 12.2(31)SG and later releases, remove the old SPAN source configuration and reconfigure with the new queue names/IDs. For example:
Workaround: None. (CSCsc11726)
This situtation could occur for these reasons:
– A packet requires an IP redirect to an IP unnumbered outgoing port within 3 minutes of booting the Catalyst 4500 series switch.
– The switch administrator enters the shutdown and no shutdown commands on an outgoing interface that has enabled IP unnumbered. The switch receives packets that require redirection; and the destination MAC address is already in ARP table.
– Do not inject packets that require an IP redirect sent out to an IP unnumbered port within 3 minutes of booting the Catalyst 4500 series switch.
– Configure the correct default gateway on the host side. (CSCse75660)
Workaround: None. (CSCsg58526)
This does not affect performance.
Workaround: Enter the no shutdown command. (CSCsg27395)
Workaround: Remove the transceiver from the new port and place it in the old port. After the SFP is recognized in the old port, remove it slowly and insert it in the new port. (CSCse34693).
Workaround: None. This message is an informational message. (CSCsi60913)
Workaround: None. This is an informational message. (CSCsi60898)
Workaround: None. (CSCsm30320)
Workarounds: Do one of the following:
– After a reload, copy the startup-config to the running-config.
– Use a loopback interface as the target of the ip unnumbered command.
– Change the CLI configuration so that during bootup the router port is created first.
Workaround: When the port channel starts to flap, enter shut and no shut on the port channel. After the first switchover and after deleting the port channel, create a new channel. (CSCsr00333)
Workaround: Before removing a line card, delete the statically configured ip source binding entries on any of the interfaces on the line card. (CSCsv54529)
Workaround: Clear the errors with the clear ethernet cfm errors command. (CSCsv43819)
This problem is seen only an interface configured with VRF.
Workaround: None. (CSCsr69187)
Workaround: Shut down, and then reopen the interface.
This problem occurs only when a port is configured with PVLAN and 802.1X multi-auth.
Workaround: Shut down, and then reopen the interface. (CSCsr58573)
Workaround: Reconfigure tracking on the newly created interface. (CSCsr66876)
Workaround: None. (CSCsr95941)
Workaround: Reapply the identity policy on the interface with the permit icmp command. (CSCsu03507
Workaround: Do one of the following:
– Do not attach routers to PVLAN isolated ports.
– Disable IGMP snooping (either globally or on the VLAN).
– Do not use a router connected to PVLAN isolated port as a multicast source.
Workaround: None. (CSCsu42775)
Workaround: Configure an ISL/dot1q trunk port. (CSCsu43445)
Workaround: Disable the debug management expression evaluator command. (CSCsu67323)
Workarounds: Do one of the following:
– Enter spanning-tree portfast then authentication control-direction in on a 802.1X port.
– Enter shut then no shut on a 802.1X port.
Workaround: None. (CSCsv07019)
On a switch with multiple Layer 3 interfaces, if the CTS SXP connection is configured without specifying source IP address and no default SXP source IP address is configured on the box, different SXP connections may acquire different source IP address for each connection.
Workaround: Do one of the following:
– Ensure that only one active Layer 3 interface exists on the switch.
– Specify the source of the IP address in each SXP connection configuration to avoid ambiguity.
– Configure a default SXP source IP address so that the SXP connection without the source IP address will use this IP address.
Workaround: None. (CSCsv42869)
Workaround: Do one of the following:
– Reload the standby switch again with the line card in place.
– Remove and reenter the commands on the active supervisor engine. The standby supervisor engine will acquire this change.
Workaround: None. (CSCsv59929)
CFM is supported in default switch port mode. CFM is not supported on the PVLAN access modes (promiscuous, isolated, and community host ports) and the dot1q-tunnel modes. It is supported on all other switch port modes.
Workaround: Enable CFM on the interface with the Ehernet cfm enable command. (CSCsv67507)
Workaround: Reconfigure VLAN load balancing with a different configuration, by performing the following task:
a. Reconfigure the VLAN load balancing configuration on the desired REP ports.
b. Use the shut command on any one REP port in the segment to cause a failure in that segment.
c. Use the no-shut on the same port to restore normal REP topology with one ALT port.
d. Invoke manual preemption on a primary edge port to obtain VLAN load balancing with the new configuration.
Workaround: When a log message appears indicating that the SFP+ has been removed, do one of the following:
– Enter any commands for that port.
– Insert an SFP+ in that port.
– Reinsert the removed SFP+ in any other port.
This symptom may occur when running Cisco IOS Release 12.2(40)SG or later.
Workaround: Verify the integrity of the image using the verify /md5 command. Compare the resultant MD5 signature with the signature posted on CCO for that image.
Workaround: Verify the integrity of the image with the verify /md5 command. Compare the resultant MD5 signature with the signature posted on CCO for that image. (CSCsu37068)
Workaround: Embed the graphic into the HTML file up to 256 kilobytes (according to RFC 2397).
The following browsers support RFC 2397:
This problem is seen on all Catalyst 4500 or 4900 chassis running Cisco IOS Release 12.2.(50)SG. The problem occurs when the following conditions are present:
– The router is configured with AAA authentication and authorization.
– The AAA server runs CiscoSecure ACS 2.4.
– The callback or callback-dialstring attribute is configured on the AAA server for the user.
Workaround: Do not configure the callback or callback-dialstring attribute for the user. If you use the callback-dialstring attribute in the TACACS+ profile, ensure that the NULL value is not configured. (CSCei62358)
Workaround: None. (CSCsw32519)
This applies to classic or E-series Catalyst 4500 supervisor engines running
Cisco IOS Release 12.2(50)SG
Workaround: None. (CSCsw14005)
Port-channel functionality is not supported on the fa1 management interface.
This is a configuration error.
Workaround: None. (CSCsv91302)
If the switch were to run a supervisor switchover while in this state, the host's MAC address would not be present in the new active supervisor engine’s MAC address table, causing possible connectivity interruption on the host.
Workaround: Enter the shutdown command, followed by the no shutdown command on the interface. This triggers relearning and synchronizing of the host's MAC to the standby supervisor engine. CSCsw91661
This occurs only if the following conditions are satisfied:
– Multi-host mode configured on the port with the authentication host-mode multi-host command.
– Default ACL (the IP access-list) configured on the interface specifies deny ip any any.
– Dynamic policy authorization for the client specifies permit ip any any.
Workaround: None. (CSCso93282)
Workaround: None. (CSCso68331)
This problem is first seen in Cisco IOS Release 12.2(40)SG.
Workaround: Manually apply the configuration that would be generated by Auto QoS.
Workaround: Configure every interface individually.
To avoid rebooting the standby supervisor engine, explicitly run the exit or end command to exit the tx-queue configuration context when working in an interface range. The short form of the exit command ex does not work. These commands should be typed line by line; copy/paste will not work.
This problem is first seen in 12.2(40)SG.
Workaround: Manually apply the configuration that is generated by AutoQoS. Do not use Auto Qos. CSCsv03316
Workaround: None. (CSCsk66449)
When an output service policy attaches to an interface and if the policy is configured to apply DBL on a queue, the flows that are enqueued are subjected to the DBL algorithm. One or more flows that are classified as belligerent (flows that do not back off in response to drops because of congestion in the queue) continue to be classified as belligerent even when DBL is disabled on that queue.
For this condition to persist, the transmit queues in question must remain congested for a long period of time, and that congestion must be caused by flows that remain belligerent.
Workaround: Provided the queue in question is nondefault (queuing actions are not configured in the class-default class of the policymap), detach and reattach the service policy.
If this happens on the default queue, modifying and resetting some queuing parameters such as bandwidth and shape resolves the problem. (CSCsk62457
Workarounds: Use the show log command to find the cause of the power-down.
– LogGalInsufficientFansDetected messages in the log indicate a fan-tray failure.
– LogRkiosModuleShutdownTemp messages in the log indicate that the supervisor engine critical temperature exceeded the failure threshold.
On a switch running Cisco IOS Release 12.2(40)SG, all MTU values configured on a line card are set to default when the module is reset. MTU values are not retained for modules that are physically moved.
Workaround: None. (CSCsk52542)
Workaround: Reinsert the X2. (CSCsk43618)
When a packet is sent to the CPU it may get sent out on some other interface. If so, the original CoS value for a.1X packet cannot be matched by software QoS (according to CSCsk66449). The packet is transmitted with the CoS value it was generated with (7, for the MLDv1 packets described here).
Part of the root cause of this problem is captured in CSCsk66449, which indicates that the software QoS cannot match a.1X packet. (CSCsk72544)
Workaround: None. You cannot explicitly verify the trusted boundary state. However, you can indirectly ascertain this state:
The trusted boundary feature ensures that the packet’s CoS/DSCP value is trusted or not. When the interface is not in a trusted state, the CoS/DSCP fields are forced to zero on a received packet. Because one QoS policy on that interface uses that CoS/DSCP value for classification, if the packet classification is based on the packet value, you can infer that the interface is in a trusted state.
Workaround: Enter the show policy-map interface command to find the actual burst value programmed. (CSCsi71036)
Workaround: None. If you enter the show policy-map name, however, the unconditional marking actions appear. (CSCsi94144)
Workaround: None. (CSCsl72868)
Workaround: To ensure that the DBL action operates on the default queue, use the queue-limit command to specify an explicit queue size. This command dictates the size range. (CSCso06422)
This behavior occurs in a redundant switch when the active supervisor engine is running Cisco IOS, the standby supervisor engine is in ROMMON, and the standby supervisor engine’s ROMMON is upgraded from version 0.34 or to a later version. The upgrade process causes the uplinks on the standby supervisor engine to go down but the active supervisor engine is unaware of this.
Workarounds: To resume normal operation, do one of the following:
– Reload both supervisor engines with the redundancy reload shelf command.
– Power-cycle the standby supervisor engine by briefly pulling it from the chassis.
There is no workaround for the link flap issue. (CSCsm81875)
This problem can happen when pause frames are sent to the switch port and the flow control receive configuration is toggled on 10-Gb port.
Workaround: Change the flow control receive configuration when no traffic exists. (CSCso71647)
Workaround: Disable IGMP snooping on all the relevant VLANs before disabling it globally.
The issue is observed only for packets that are logically switched but are internally controlled such that on egress the system is generated by the switch itself. This can happen for certain snooping features such as DAI, IGMP snooping, DHCP snooping, and MLD snooping. This can also happen for IPv4/v6 packets with IP options/ extension headers that need processing in software.
Workaround: Enter shut followed by no shut on any REP port (of the same segment in which VLB is configured) in the topology. (CSCsq75342)
Workaround: Define the backup EtherChannel before applying the flexlink command. (CSCsq13477)
Workaround: None. (CSCsq99468)
Workaround: Ping the global and link local addresses of the neighbor to ascertain and reinstate reachability. (CSCsq77181)
Workaround: Unconfigure the port channel and the associated physical port, and reconfigure them.
You only see this behavior if you initially did not allocate a VLAN before you configure the IFM, and then at a later time allocate the same VLAN.
Workaround: Unconfigure, and then reconfigure the IFM on the port.
This log message is information only; it does not indicate a potential problem with the line card.
It impacts only the Catalyst 4500-E chassis: the WS-X4648-GB-RJ45V and WS-X4648-GB-RJ45V+ linecards.
Workaround: Ignore the warning message; take no action to reset the line card or port(s). There is no need to perform an RMA or submit the line card for EFA.
This log message is informational only; it does not reflect a potential problem with the linecard.
It only impacts the WS-X4648-GB-RJ45V and WS-X4648-GB-RJ45V+ line cards.
Workaround: Ignore the warning message; take no action to reset the linecard or port(s). You do not need to perform an RMA (Return to Manufacturing for Analysis) nor submit the line card for EFA (Engineering Failure Analysis).
They imply no impact to performance.
Workaround: None. (CSCsv17545)
Note A SSO switchover using an earlier release might restore traffic but it would be temporary.
Similar behavior is observed with Supervisor Engine 6-E uplinks and the WS-X4706-10GE line card.
Similar behavior is observed with Supervisor Engine 6-E uplinks and the WS-X4706-10GE line card.
This behavior is seen in Cisco IOS Releases 12.2(50)SG thru 12.2(50)SG3 when the peer device sends a remote fault.
Workaround: Disable auto negotiation at both ends.
Workaround: Do not use the nested policy-map feature in Cisco IOS Release 12.2(40)SG and 12.2(44)SG. (CSCsy80664)
The following conditions may cause a RACL to malfunction:
– ACL are applied on the output direction of the interface.
– IPv6 ACL contain Ace to match on the ICMP option fields (ICMP Type or ICMP Code).
This section lists the resolved caveats in Release 12.2(50)SG3:
TwinGig converters are only supported on E-series supervisors and line cards. This bug does not affect systems without installed converters.
Once the switch has booted successfully and has detected all installed TwinGig converters, it is unlikely to crash unless you insert a converter. CSCsz49331
This section lists the open caveats for Cisco IOS Release 12.2(50)SG2:
Workaround: When using the access-list N permit host hostname command, specify the IP address of the host rather than the hostname (CSCef67489)
Workaround: Verify that the MAC addresses being transmitted through the system are learned.
Workaround: None. (CSCeg48586)
– If such a certificate does not exist and the device's hostname and default_domain are set, then a persistent self-signed certificate is generated.
– If such a certificate exists, the FQDN in the certificate is compared with the current device's hostname and default_domain. If either differs from the FQDN in the certificate, the existing persistent self-signed certificate is replaced with a new one with the updated FQDN. Be aware that the existing keypair is used in the new certificate.
On a switch that supports redundancy, the generation of the self-signed certificate occurs independently on the active and the standby supervisor engines, and the certificates differ. After switchover, the HTTP client that holds the old certificate cannot connect to the HTTPS server.
Workaround: Reconnect. (CSCsb11964)
This only affects a switch that has any of the following queues configured as SPAN source in releases prior to 12.2(31)SG and saved to the startup configuration. The SPAN destination would not get the same traffic after upgrading to 12.2(31)SG.
Workaround: After upgrading to 12.2(31)SG and later releases, remove the old SPAN source configuration and reconfigure with the new queue names/IDs. For example:
Workaround: None. (CSCsc11726)
This situtation could occur for these reasons:
– A packet requires an IP redirect to an IP unnumbered outgoing port within 3 minutes of booting the Catalyst 4500 series switch.
– The switch administrator enters the shutdown and no shutdown commands on an outgoing interface that has enabled IP unnumbered. The switch receives packets that require redirection; and the destination MAC address is already in ARP table.
– Do not inject packets that require an IP redirect sent out to an IP unnumbered port within 3 minutes of booting the Catalyst 4500 series switch.
– Configure the correct default gateway on the host side. (CSCse75660)
Workaround: None. (CSCsg58526)
This does not affect performance.
Workaround: Enter the no shutdown command. (CSCsg27395)
Workaround: Remove the transceiver from the new port and place it in the old port. After the SFP is recognized in the old port, remove it slowly and insert it in the new port. (CSCse34693).
Workaround: None. This message is an informational message. (CSCsi60913)
Workaround: None. This is an informational message. (CSCsi60898)
Workaround: None. (CSCsm30320)
Workarounds: Do one of the following:
– After a reload, copy the startup-config to the running-config.
– Use a loopback interface as the target of the ip unnumbered command.
– Change the CLI configuration so that during bootup the router port is created first.
Workaround: When the port channel starts to flap, enter shut and no shut on the port channel. After the first switchover and after deleting the port channel, create a new channel. (CSCsr00333)
Workaround: Before removing a line card, delete the statically configured ip source binding entries on any of the interfaces on the line card. (CSCsv54529)
Workaround: Clear the errors with the clear ethernet cfm errors command. (CSCsv43819)
This problem is seen only an interface configured with VRF.
Workaround: None. (CSCsr69187)
Workaround: Shut down, and then reopen the interface.
This problem occurs only when a port is configured with PVLAN and 802.1X multi-auth.
Workaround: Shut down, and then reopen the interface. (CSCsr58573)
Workaround: Reconfigure tracking on the newly created interface. (CSCsr66876)
Workaround: None. (CSCsr95941)
Workaround: Reapply the identity policy on the interface with the permit icmp command. (CSCsu03507
Workaround: Do one of the following:
– Do not attach routers to PVLAN isolated ports.
– Disable IGMP snooping (either globally or on the VLAN).
– Do not use a router connected to PVLAN isolated port as a multicast source.
Workaround: None. (CSCsu42775)
Workaround: Configure an ISL/dot1q trunk port. (CSCsu43445)
Workaround: Disable the debug management expression evaluator command. (CSCsu67323)
Workarounds: Do one of the following:
– Enter spanning-tree portfast then authentication control-direction in on a 802.1X port.
– Enter shut then no shut on a 802.1X port.
Workaround: None. (CSCsv07019)
On a switch with multiple Layer 3 interfaces, if the CTS SXP connection is configured without specifying source IP address and no default SXP source IP address is configured on the box, different SXP connections may acquire different source IP address for each connection.
Workaround: Do one of the following:
– Ensure that only one active Layer 3 interface exists on the switch.
– Specify the source of the IP address in each SXP connection configuration to avoid ambiguity.
– Configure a default SXP source IP address so that the SXP connection without the source IP address will use this IP address.
Workaround: None. (CSCsv42869)
Workaround: Do one of the following:
– Reload the standby switch again with the line card in place.
– Remove and reenter the commands on the active supervisor engine. The standby supervisor engine will acquire this change.
Workaround: None. (CSCsv59929)
CFM is supported in default switch port mode. CFM is not supported on the PVLAN access modes (promiscuous, isolated, and community host ports) and the dot1q-tunnel modes. It is supported on all other switch port modes.
Workaround: Enable CFM on the interface with the Ehernet cfm enable command. (CSCsv67507)
Workaround: Reconfigure VLAN load balancing with a different configuration, by performing the following task:
a. Reconfigure the VLAN load balancing configuration on the desired REP ports.
b. Use the shut command on any one REP port in the segment to cause a failure in that segment.
c. Use the no-shut on the same port to restore normal REP topology with one ALT port.
d. Invoke manual preemption on a primary edge port to obtain VLAN load balancing with the new configuration.
Workaround: When a log message appears indicating that the SFP+ has been removed, do one of the following:
– Enter any commands for that port.
– Insert an SFP+ in that port.
– Reinsert the removed SFP+ in any other port.
This symptom may occur when running Cisco IOS Release 12.2(40)SG or later.
Workaround: Verify the integrity of the image using the verify /md5 command. Compare the resultant MD5 signature with the signature posted on CCO for that image.
Workaround: Verify the integrity of the image with the verify /md5 command. Compare the resultant MD5 signature with the signature posted on CCO for that image. (CSCsu37068)
Workaround: Embed the graphic into the HTML file up to 256 kilobytes (according to RFC 2397).
The following browsers support RFC 2397:
This problem is seen on all Catalyst 4500 or 4900 chassis running Cisco IOS Release 12.2.(50)SG. The problem occurs when the following conditions are present:
– The router is configured with AAA authentication and authorization.
– The AAA server runs CiscoSecure ACS 2.4.
– The callback or callback-dialstring attribute is configured on the AAA server for the user.
Workaround: Do not configure the callback or callback-dialstring attribute for the user. If you use the callback-dialstring attribute in the TACACS+ profile, ensure that the NULL value is not configured. (CSCei62358)
Workaround: None. (CSCsw32519)
This applies to classic or E-series Catalyst 4500 supervisor engines running
Cisco IOS Release 12.2(50)SG
Workaround: None. (CSCsw14005)
Port-channel functionality is not supported on the fa1 management interface.
This is a configuration error.
Workaround: None. (CSCsv91302)
If the switch were to run a supervisor switchover while in this state, the host's MAC address would not be present in the new active supervisor engine’s MAC address table, causing possible connectivity interruption on the host.
Workaround: Enter the shutdown command, followed by the no shutdown command on the interface. This triggers relearning and synchronizing of the host's MAC to the standby supervisor engine. CSCsw91661
This occurs only if the following conditions are satisfied:
– Multi-host mode configured on the port with the authentication host-mode multi-host command.
– Default ACL (the IP access-list) configured on the interface specifies deny ip any any.
– Dynamic policy authorization for the client specifies permit ip any any.
Workaround: None. (CSCso93282)
Workaround: None. (CSCso68331)
This problem is first seen in Cisco IOS Release 12.2(40)SG.
Workaround: Manually apply the configuration that would be generated by Auto QoS.
Workaround: Configure every interface individually.
To avoid rebooting the standby supervisor engine, explicitly run the exit or end command to exit the tx-queue configuration context when working in an interface range. The short form of the exit command ex does not work. These commands should be typed line by line; copy/paste will not work.
This problem is first seen in 12.2(40)SG.
Workaround: Manually apply the configuration that is generated by AutoQoS. Do not use Auto Qos. CSCsv03316
Workaround: None. (CSCsk66449)
When an output service policy attaches to an interface and if the policy is configured to apply DBL on a queue, the flows that are enqueued are subjected to the DBL algorithm. One or more flows that are classified as belligerent (flows that do not back off in response to drops because of congestion in the queue) continue to be classified as belligerent even when DBL is disabled on that queue.
For this condition to persist, the transmit queues in question must remain congested for a long period of time, and that congestion must be caused by flows that remain belligerent.
Workaround: Provided the queue in question is nondefault (queuing actions are not configured in the class-default class of the policymap), detach and reattach the service policy.
If this happens on the default queue, modifying and resetting some queuing parameters such as bandwidth and shape resolves the problem. (CSCsk62457
Workarounds: Use the show log command to find the cause of the power-down.
– LogGalInsufficientFansDetected messages in the log indicate a fan-tray failure.
– LogRkiosModuleShutdownTemp messages in the log indicate that the supervisor engine critical temperature exceeded the failure threshold.
On a switch running Cisco IOS Release 12.2(40)SG, all MTU values configured on a line card are set to default when the module is reset. MTU values are not retained for modules that are physically moved.
Workaround: None. (CSCsk52542)
Workaround: Reinsert the X2. (CSCsk43618)
When a packet is sent to the CPU it may get sent out on some other interface. If so, the original CoS value for a.1X packet cannot be matched by software QoS (according to CSCsk66449). The packet is transmitted with the CoS value it was generated with (7, for the MLDv1 packets described here).
Part of the root cause of this problem is captured in CSCsk66449, which indicates that the software QoS cannot match a.1X packet. (CSCsk72544)
Workaround: None. You cannot explicitly verify the trusted boundary state. However, you can indirectly ascertain this state:
The trusted boundary feature ensures that the packet’s CoS/DSCP value is trusted or not. When the interface is not in a trusted state, the CoS/DSCP fields are forced to zero on a received packet. Because one QoS policy on that interface uses that CoS/DSCP value for classification, if the packet classification is based on the packet value, you can infer that the interface is in a trusted state.
Workaround: Enter the show policy-map interface command to find the actual burst value programmed. (CSCsi71036)
Workaround: None. If you enter the show policy-map name, however, the unconditional marking actions appear. (CSCsi94144)
Workaround: None. (CSCsl72868)
Workaround: To ensure that the DBL action operates on the default queue, use the queue-limit command to specify an explicit queue size. This command dictates the size range. (CSCso06422)
This behavior occurs in a redundant switch when the active supervisor engine is running Cisco IOS, the standby supervisor engine is in ROMMON, and the standby supervisor engine’s ROMMON is upgraded from version 0.34 or to a later version. The upgrade process causes the uplinks on the standby supervisor engine to go down but the active supervisor engine is unaware of this.
Workarounds: To resume normal operation, do one of the following:
– Reload both supervisor engines with the redundancy reload shelf command.
– Power-cycle the standby supervisor engine by briefly pulling it from the chassis.
There is no workaround for the link flap issue. (CSCsm81875)
This problem can happen when pause frames are sent to the switch port and the flow control receive configuration is toggled on 10-Gb port.
Workaround: Change the flow control receive configuration when no traffic exists. (CSCso71647)
Workaround: Disable IGMP snooping on all the relevant VLANs before disabling it globally.
The issue is observed only for packets that are logically switched but are internally controlled such that on egress the system is generated by the switch itself. This can happen for certain snooping features such as DAI, IGMP snooping, DHCP snooping, and MLD snooping. This can also happen for IPv4/v6 packets with IP options/ extension headers that need processing in software.
Workaround: Enter shut followed by no shut on any REP port (of the same segment in which VLB is configured) in the topology. (CSCsq75342)
Workaround: Define the backup EtherChannel before applying the flexlink command. (CSCsq13477)
Workaround: None. (CSCsq99468)
Workaround: Ping the global and link local addresses of the neighbor to ascertain and reinstate reachability. (CSCsq77181)
Workaround: Unconfigure the port channel and the associated physical port, and reconfigure them.
You only see this behavior if you initially did not allocate a VLAN before you configure the IFM, and then at a later time allocate the same VLAN.
Workaround: Unconfigure, and then reconfigure the IFM on the port.
This log message is information only; it does not indicate a potential problem with the line card.
It impacts only the Catalyst 4500-E chassis: the WS-X4648-GB-RJ45V and WS-X4648-GB-RJ45V+ linecards.
Workaround: Ignore the warning message; take no action to reset the line card or port(s). There is no need to perform an RMA or submit the line card for EFA.
This log message is informational only; it does not reflect a potential problem with the linecard.
It only impacts the WS-X4648-GB-RJ45V and WS-X4648-GB-RJ45V+ line cards.
Workaround: Ignore the warning message; take no action to reset the linecard or port(s). You do not need to perform an RMA (Return to Manufacturing for Analysis) nor submit the line card for EFA (Engineering Failure Analysis).
They imply no impact to performance.
Workaround: None. (CSCsv17545)
Note A SSO switchover using an earlier release might restore traffic but it would be temporary.
Similar behavior is observed with Supervisor Engine 6-E uplinks and the WS-X4706-10GE line card.
Similar behavior is observed with Supervisor Engine 6-E uplinks and the WS-X4706-10GE line card.
This behavior is seen in Cisco IOS Releases 12.2(50)SG thru 12.2(50)SG3 when the peer device sends a remote fault.
Workaround: Disable auto negotiation at both ends.
Workaround: Do not use the nested policy-map feature in Cisco IOS Release 12.2(40)SG and 12.2(44)SG. (CSCsy80664)
The following conditions may cause a RACL to malfunction:
– ACL are applied on the output direction of the interface.
– IPv6 ACL contain Ace to match on the ICMP option fields (ICMP Type or ICMP Code).
This section lists the resolved caveats in Release 12.2(50)SG2:
1. Configure a static ARPA entry for host.
2. Upgrade to a future IOS release containing the fix.
This issue is observed on platforms including WS-C4948 and WS-X4548-GB, and linecards including:
Workaround: Enable packet filtering so that the SPAN session passes only good packets using the command:
Workaround: Enable and disable global QoS, as follows:
Affected Cisco IOS releases include 12.2(31)SGA08, 12.2(37)SG, 12.2(40)SG, 12.2(46)SG, and 12.2(50)SG.
Workaround: Disable and configure QoS, as follows:
While the problem is happening, the following messages display:
Workaround: None. (CSCsw64001)
Traffic from the peer switch is received by the affected switch, but the peer switch will not receive any traffic from the affected switch. This can cause confusing results for protocols like CDP: the affected switch will report the expected CDP adjacencies while the peer switch will not. This can lead to a misdiagnosis of the problem on the peer switch.
You cannot restore the 10GE uplink by resetting the standby supervisor engine or by changing the interface configuration.
Workaround: Force another SSO switchover.
Though unlikely, the problem might recur on a second switchover. A further switchover would then be necessary.
Workarounds: Disable Wake-on-LAN with the no authentication control-direction in command.
Workaround: Turn off LLDP on the switch and Cisco IP phone from Call Manager.
Workaround: Reload the linecard with the hw-module reset command.
In contrast, the data plane classes (configured manually by user written ACLs) increment the byte counter, but not the packet count (remains 0).
This section lists the open caveats for Cisco IOS Release 12.2(50)SG1:
Workaround: When using the access-list N permit host hostname command, specify the IP address of the host rather than the hostname (CSCef67489)
Workaround: Verify that the MAC addresses being transmitted through the system are learned.
Workaround: None. (CSCeg48586)
– If such a certificate does not exist and the device's hostname and default_domain are set, then a persistent self-signed certificate is generated.
– If such a certificate exists, the FQDN in the certificate is compared with the current device's hostname and default_domain. If either differs from the FQDN in the certificate, the existing persistent self-signed certificate is replaced with a new one with the updated FQDN. Be aware that the existing keypair is used in the new certificate.
On a switch that supports redundancy, the generation of the self-signed certificate occurs independently on the active and the standby supervisor engines, and the certificates differ. After switchover, the HTTP client that holds the old certificate cannot connect to the HTTPS server.
Workaround: Reconnect. (CSCsb11964)
This only affects a switch that has any of the following queues configured as SPAN source in releases prior to 12.2(31)SG and saved to the startup configuration. The SPAN destination would not get the same traffic after upgrading to 12.2(31)SG.
Workaround: After upgrading to 12.2(31)SG and later releases, remove the old SPAN source configuration and reconfigure with the new queue names/IDs. For example:
Workaround: None. (CSCsc11726)
This situtation could occur for these reasons:
– A packet requires an IP redirect to an IP unnumbered outgoing port within 3 minutes of booting the Catalyst 4500 series switch.
– The switch administrator enters the shutdown and no shutdown commands on an outgoing interface that has enabled IP unnumbered. The switch receives packets that require redirection; and the destination MAC address is already in ARP table.
– Do not inject packets that require an IP redirect sent out to an IP unnumbered port within 3 minutes of booting the Catalyst 4500 series switch.
– Configure the correct default gateway on the host side. (CSCse75660)
Workaround: None. (CSCsg58526)
This does not affect performance.
Workaround: Enter the no shutdown command. (CSCsg27395)
Workaround: Remove the transceiver from the new port and place it in the old port. After the SFP is recognized in the old port, remove it slowly and insert it in the new port. (CSCse34693).
Workaround: None. This message is an informational message. (CSCsi60913)
Workaround: None. This is an informational message. (CSCsi60898)
Workaround: None. (CSCsm30320)
Workarounds: Do one of the following:
– After a reload, copy the startup-config to the running-config.
– Use a loopback interface as the target of the ip unnumbered command.
– Change the CLI configuration so that during bootup the router port is created first.
Workaround: When the port channel starts to flap, enter shut and no shut on the port channel. After the first switchover and after deleting the port channel, create a new channel. (CSCsr00333)
Workaround: Before removing a line card, delete the statically configured ip source binding entries on any of the interfaces on the line card. (CSCsv54529)
Workaround: Clear the errors with the clear ethernet cfm errors command. (CSCsv43819)
Workaround: Configure the native VLAN for the PVLAN isolated trunk. (CSCsv38137)
Workaround: Shut down, and then reopen the interface.
This problem occurs only when a port is configured with PVLAN and 802.1X multi-auth.
Workaround: Shut down, and then reopen the interface. (CSCsr58573)
Workaround: Reconfigure tracking on the newly created interface. (CSCsr66876)
Workaround: None. (CSCsr95941)
Workaround: Reapply the identity policy on the interface with the permit icmp command. (CSCsu03507
Workaround: Do one of the following:
– Do not attach routers to PVLAN isolated ports.
– Disable IGMP snooping (either globally or on the VLAN).
– Do not use a router connected to PVLAN isolated port as a multicast source.
Workaround: None. (CSCsu42775)
Workaround: Configure an ISL/dot1q trunk port. (CSCsu43445)
Workaround: Disable the debug management expression evaluator command. (CSCsu67323)
Workarounds: Do one of the following:
– Enter spanning-tree portfast then authentication control-direction in on a 802.1X port.
– Enter shut then no shut on a 802.1X port.
Workaround: None. (CSCsv07019)
On a switch with multiple Layer 3 interfaces, if the CTS SXP connection is configured without specifying source IP address and no default SXP source IP address is configured on the box, different SXP connections may acquire different source IP address for each connection.
Workaround: Do one of the following:
– Ensure that only one active Layer 3 interface exists on the switch.
– Specify the source of the IP address in each SXP connection configuration to avoid ambiguity.
– Configure a default SXP source IP address so that the SXP connection without the source IP address will use this IP address.
Workaround: None. (CSCsv42869)
Workaround: Do one of the following:
– Reload the standby switch again with the line card in place.
– Remove and reenter the commands on the active supervisor engine. The standby supervisor engine will acquire this change.
Workaround: None. (CSCsv59929)
CFM is supported in default switch port mode. CFM is not supported on the PVLAN access modes (promiscuous, isolated, and community host ports) and the dot1q-tunnel modes. It is supported on all other switch port modes.
Workaround: Enable CFM on the interface with the Ehernet cfm enable command. (CSCsv67507)
Workaround: Reconfigure VLAN load balancing with a different configuration, by performing the following task:
a. Reconfigure the VLAN load balancing configuration on the desired REP ports.
b. Use the shut command on any one REP port in the segment to cause a failure in that segment.
c. Use the no-shut on the same port to restore normal REP topology with one ALT port.
d. Invoke manual preemption on a primary edge port to obtain VLAN load balancing with the new configuration.
Workaround: When a log message appears indicating that the SFP+ has been removed, do one of the following:
– Enter any commands for that port.
– Insert an SFP+ in that port.
– Reinsert the removed SFP+ in any other port.
This symptom may occur when running Cisco IOS Release 12.2(40)SG or later.
Workaround: Verify the integrity of the image using the verify /md5 command. Compare the resultant MD5 signature with the signature posted on CCO for that image.
Workaround: Verify the integrity of the image with the verify /md5 command. Compare the resultant MD5 signature with the signature posted on CCO for that image. (CSCsu37068)
Workaround: Embed the graphic into the HTML file up to 256 kilobytes (according to RFC 2397).
The following browsers support RFC 2397:
This problem is seen on all Catalyst 4500 or 4900 chassis running Cisco IOS Release 12.2.(50)SG. The problem occurs when the following conditions are present:
– The router is configured with AAA authentication and authorization.
– The AAA server runs CiscoSecure ACS 2.4.
– The callback or callback-dialstring attribute is configured on the AAA server for the user.
Workaround: Do not configure the callback or callback-dialstring attribute for the user. If you use the callback-dialstring attribute in the TACACS+ profile, ensure that the NULL value is not configured. (CSCei62358)
Workaround: None. (CSCsw32519)
This applies to classic or E-series Catalyst 4500 supervisor engines running
Cisco IOS Release 12.2(50)SG
Workaround: None. (CSCsw14005)
Port-channel functionality is not supported on the fa1 management interface.
This is a configuration error.
Workaround: None. (CSCsv91302)
This occurs only if the following conditions are satisfied:
– Multi-host mode configured on the port with the authentication host-mode multi-host command.
– Default ACL (the IP access-list) configured on the interface specifies deny ip any any.
– Dynamic policy authorization for the client specifies permit ip any any.
Workaround: None. (CSCso93282)
Workaround: None. (CSCso68331)
Instead, the data plane classes (configured manually by user written ACLs) increment the byte counter, but not the packet count (remains 0).
Workaround: None. (CSCsk66449)
When an output service policy attaches to an interface and if the policy is configured to apply DBL on a queue, the flows that are enqueued are subjected to the DBL algorithm. One or more flows that are classified as belligerent (flows that do not back off in response to drops because of congestion in the queue) continue to be classified as belligerent even when DBL is disabled on that queue.
For this condition to persist, the transmit queues in question must remain congested for a long period of time, and that congestion must be caused by flows that remain belligerent.
Workaround: Provided the queue in question is nondefault (queuing actions are not configured in the class-default class of the policymap), detach and reattach the service policy.
If this happens on the default queue, modifying and resetting some queuing parameters such as bandwidth and shape resolves the problem. (CSCsk62457
Workarounds: Use the show log command to find the cause of the power-down.
– LogGalInsufficientFansDetected messages in the log indicate a fan-tray failure.
– LogRkiosModuleShutdownTemp messages in the log indicate that the supervisor engine critical temperature exceeded the failure threshold.
On a switch running Cisco IOS Release 12.2(40)SG, all MTU values configured on a line card are set to default when the module is reset. MTU values are not retained for modules that are physically moved.
Workaround: None. (CSCsk52542)
Workaround: Reinsert the X2. (CSCsk43618)
When a packet is sent to the CPU it may get sent out on some other interface. If so, the original CoS value for a.1X packet cannot be matched by software QoS (according to CSCsk66449). The packet is transmitted with the CoS value it was generated with (7, for the MLDv1 packets described here).
Part of the root cause of this problem is captured in CSCsk66449, which indicates that the software QoS cannot match a.1X packet. (CSCsk72544)
Workaround: None. You cannot explicitly verify the trusted boundary state. However, you can indirectly ascertain this state:
The trusted boundary feature ensures that the packet’s CoS/DSCP value is trusted or not. When the interface is not in a trusted state, the CoS/DSCP fields are forced to zero on a received packet. Because one QoS policy on that interface uses that CoS/DSCP value for classification, if the packet classification is based on the packet value, you can infer that the interface is in a trusted state.
Workaround: Enter the show policy-map interface command to find the actual burst value programmed. (CSCsi71036)
Workaround: None. If you enter the show policy-map name, however, the unconditional marking actions appear. (CSCsi94144)
Workaround: None. (CSCsl72868)
Workaround: To ensure that the DBL action operates on the default queue, use the queue-limit command to specify an explicit queue size. This command dictates the size range. (CSCso06422)
This behavior occurs in a redundant switch when the active supervisor engine is running Cisco IOS, the standby supervisor engine is in ROMMON, and the standby supervisor engine’s ROMMON is upgraded from version 0.34 or to a later version. The upgrade process causes the uplinks on the standby supervisor engine to go down but the active supervisor engine is unaware of this.
Workarounds: To resume normal operation, do one of the following:
– Reload both supervisor engines with the redundancy reload shelf command.
– Power-cycle the standby supervisor engine by briefly pulling it from the chassis.
There is no workaround for the link flap issue. (CSCsm81875)
This problem can happen when pause frames are sent to the switch port and the flow control receive configuration is toggled on 10-Gb port.
Workaround: Change the flow control receive configuration when no traffic exists. (CSCso71647)
Workaround: Disable IGMP snooping on all the relevant VLANs before disabling it globally.
The issue is observed only for packets that are logically switched but are internally controlled such that on egress the system is generated by the switch itself. This can happen for certain snooping features such as DAI, IGMP snooping, DHCP snooping, and MLD snooping. This can also happen for IPv4/v6 packets with IP options/ extension headers that need processing in software.
Workaround: Enter shut followed by no shut on any REP port (of the same segment in which VLB is configured) in the topology. (CSCsq75342)
Workaround: Define the backup EtherChannel before applying the flexlink command. (CSCsq13477)
Workaround: None. (CSCsq99468)
Workaround: Ping the global and link local addresses of the neighbor to ascertain and reinstate reachability. (CSCsq77181)
Workaround: Unconfigure the port channel and the associated physical port, and reconfigure them.
You only see this behavior if you initially did not allocate a VLAN before you configure the IFM, and then at a later time allocate the same VLAN.
Workaround: Unconfigure, and then reconfigure the IFM on the port.
This log message is information only; it does not indicate a potential problem with the line card.
It impacts only the Catalyst 4500-E chassis: the WS-X4648-GB-RJ45V and WS-X4648-GB-RJ45V+ linecards.
Workaround: Ignore the warning message; take no action to reset the line card or port(s). There is no need to perform an RMA or submit the line card for EFA.
This log message is informational only; it does not reflect a potential problem with the linecard.
It only impacts the WS-X4648-GB-RJ45V and WS-X4648-GB-RJ45V+ line cards.
Workaround: Ignore the warning message; take no action to reset the linecard or port(s). You do not need to perform an RMA (Return to Manufacturing for Analysis) nor submit the line card for EFA (Engineering Failure Analysis).
Workarounds: Disable Wake-on-LAN with the authentication control-direction in command.
Similar behavior is observed with Supervisor Engine 6-E uplinks and the WS-X4706-10GE line card.
Similar behavior is observed with Supervisor Engine 6-E uplinks and the WS-X4706-10GE line card.
This behavior is seen in Cisco IOS Releases 12.2(50)SG thru 12.2(50)SG3 when the peer device sends a remote fault.
Workaround: Disable auto negotiation at both ends.
Workaround: Do not use the nested policy-map feature in Cisco IOS Release 12.2(40)SG and 12.2(44)SG. (CSCsy80664)
The following conditions may cause a RACL to malfunction:
– ACL are applied on the output direction of the interface.
– IPv6 ACL contain Ace to match on the ICMP option fields (ICMP Type or ICMP Code).
This section lists the resolved caveats in Release 12.2(50)SG1:
Workaround: Disable NetFlow with one of the following commands on every subinterface for which NetFlow is configured:
Workaround: To remove the MAC address of the host from the port security MAC address table, unconfigure and reconfigure port security on the port. (CSCsr74097)
This section lists the open caveats in Cisco IOS Release 12.2(50)SG:
Workaround: When using the access-list N permit host hostname command, specify the IP address of the host rather than the hostname (CSCef67489)
Workaround: Verify that the MAC addresses being transmitted through the system are learned.
Workaround: None. (CSCeg48586)
– If such a certificate does not exist and the device's hostname and default_domain have been set, then a persistent self-signed certificate is generated.
– If such a certificate exists, the FQDN in the certificate is compared with the current device's hostname and default_domain. If either of these differs from the FQDN in the certificate, then the existing persistent self-signed certificate is replaced with a new one with the updated FQDN. Be aware that the existing keypair is used in the new certificate.
On a switch that support redundancy, the generation of the self-signed certificate is performed independently on the active and the standby supervisor engines. So, the certificates differ. After switchover, the HTTP client that holds the old certificate can not connect to the HTTPS server.
Workaround: Re-connect. (CSCsb11964)
This only affects a switch that has any of the following queues are configured as SPAN source in releases prior to 12.2(31)SG and saved to startup-config. The SPAN destination would not get the same traffic after upgrading to 12.2(31)SG.
Workaround: After upgrading to 12.2(31)SG and later releases, remove the old SPAN source configuration and reconfigure with the new queue names/IDs. For example:
Workaround: None. (CSCsc11726)
This could occur for these reasons:
– A packet requires an IP redirect to an IP unnumbered outgoing port within 3 minutes of booting the Catalyst 4500 series switch.
– This is also seen if the switch administrator issues the shutdown and no shutdown commands on an outgoing interface that has IP unnumbered enabled. The switch receives packets that require redirection and the destination MAC address is already in ARP table.
– Do not inject packets that require IP redirect sent out to an IP unnumbered port within 3 minutes of booting the Catalyst 4500 series switch.
– Configure the correct default gateway on the host side. (CSCse75660)
Workaround: None. (CSCsg58526)
This does not affect performance.
Workaround: Enter the no shutdown command. (CSCsg27395)
Workaround: Remove the transceiver from the new port and place it in the old port. After the SFP is recognized in the old port, remove it slowly and insert it in the new port. (CSCse34693).
Workaround: None. This message is an informational message. (CSCsi60913)
Workaround: None. This is an informational message. (CSCsi60898)
Workaround: None. (CSCsm30320)
Workarounds: Do one of the following:
– After a reload, copy the startup-config to the running-config.
– Use a loopback interface as the target of the ip unnumbered command.
– Change the CLI configuration so that during bootup the router port is created first.
Workaround: When the port channel starts to flap, enter shut and no shut on the port channel. After the first switchover and after deleting the portchannel, create a new channel. (CSCsr00333)
Workaround: Before removing a linecard, delete the statically configured ip source binding entries on any of the interfaces on the line-card. (CSCsv54529)
Workaround: Clear the errors with the clear ethernet cfm errors command in EXEC mode. (CSCsv43819)
Workaround: Configure the native VLAN for the PVLAN isolated trunk. (CSCsv38137)
This problem is seen only under a vrf configured interface.
Workaround: None. (CSCsr69187)
This problem occurs when an 802.1X client is authorized on a multi-auth port. After the access VLAN is deleted, then restored, the client is reauthorized but the spanning tree state of the access VLAN remains Disabled.
Workaround: Shut down then reopen the interface.
This problem occurs only when a port is configured with PVLAN and 802.1X multi-auth.
Workaround: Shut down then reopen the interface. (CSCsr58573)
Workaround: Reconfigure tracking on the newly created interface. (CSCsr66876)
Workaround: None. (CSCsr95941)
Workaround: Reapply the identity policy on the interface with the permit icmp command. (CSCsu03507
Workaround: Do one of the following:
– Do not attach routers to PVLAN isolated ports.
– Disable igmp snooping (either globally or on the VLAN).
– Do not use a router connected to PVLAN isolated port as a multicast source.
Workaround: None. (CSCsu42775)
Workaround: For VTP database propagation, configure ISL/dot1q trunk port. (CSCsu43445)
Workaround: Remove the above debug command. (CSCsu67323)
Workarounds: Do one of the following:
– Enter spanning-tree portfast then authentication control-direction in on a 802.1X port.
– Enter shut then no shut on a 802.1X port.
Workaround: None. (CSCsv07019)
On a switch with multiple Layer 3 interfaces, if the CTS SXP connection is configured without specifying source IP address and no default SXP source IP address is configured on the box, different SXP connections may pickup different source IP address for each connection.
Workaround: Do one of the following:
– Ensure that only one active Layer 3 interface exists on the switch.
– Specify source the IP address in each SXP connection configuration so there is no ambiguity
– Configure a default SXP source IP address so that the SXP connection without the source IP address will use this source IP address.
Workaround: None. (CSCsv42869)
Workaround: Do one of the following:
– Reload the standby switch again with the linecard in place.
– Remove and add the commands back on the active. The standby will pick up this change.
Workaround: None. (CSCsv59929)
CFM is supported in default switchport mode. CFM is not supported on the PVLAN access modes (promiscuous, isolated and community host ports) and the dot1q-tunnel modes. It is supported on all other switchport modes.
Workaround: Enable CFM on the interface with the ethernet cfm enable command. (CSCsv67507)
Workaround: To reconfigure VLAN Load Balancing with a different configuration, do the following:
a. Reconfigure the VLAN Load Balancing configuration on the desired REP ports.
b. Shut any one REP port in the segment to cause a failure in that segment.
c. No-shut that port to restore normal REP topology with one ALT port.
d. Invoke manual preemption on a primary edge port to obtain VLAN Load Balancing with the new configuration.
Workaround: When a log message appears indicating that the SFP+ has been removed, do one of the following:
– Enter any commands for that port.
– Insert an SFP+ in that port.
– Reinsert the removed SFP+ in any other port.
This symptom may occur when running 12.2(40)SG or later.
Workaround: Verify the integrity of the image using the <CmdBold>verify /md5<noCmdBold> command. Compare the resultant MD5 signature with the signature posted on CCO for that image.
Workaround: Verify the integrity of the image with the verify /md5 command. Compare the resultant MD5 signature with the signature posted on CCO for that image. (CSCsu37068)
Workaround: Embed the graphic into the HTML file up to 256 Kilobytes according to RFC 2397.
The following browsers support RFC 2397.
'This problem is seen on all Catalyst 4500 or 4900 chassis running CiscoIOS Release 12.2.(50)SG. The problem occurs when the following conditions are present:
– The router is configured with AAA authentication and authorization.
– The AAA server runs CiscoSecure ACS 2.4.
– The callback or callback-dialstring attribute is configured on the AAA server for the user.
Workarounds: Do not configure the callback or callback-dialstring attribute for the user. If you use the callback-dialstring attribute in the TACACS+ profile, ensure that the NULL value is not configured. (CSCei62358)
Workaround: None. (CSCsw32519)
This applies to classic or E-series Catalyst 4500 supervisor engines running
Cisco IOS Release 12.2(50)SG
Workaround: None. (CSCsw14005)
Port-channel functionality is not supported on the management interface.
This is a configuration error.
Workaround: None. (CSCsv91302)
This occurs only if the following conditions are satisfied:
– Multi-host mode configured on the port with the authentication host-mode multi-host command.
– Default ACL (the IP access-list) configured on the interface specifies deny ip any any.
– Dynamic policy authorization for the client specifies permit ip any any.
Workaround: None. (CSCso93282)
Workaround: None. (CSCso68331)
Instead, the data plane classes (configured manually by user written ACLs) increment the byte counter, but not the packet count (remains 0).
The support to handle.1Q packets for software QoS lookup unavailable in the Cisco IOS Release 12.2(40)SG release. (CSCsk66449)
When an output service-policy is attached to an interface and if the policy is configured to apply DBL on a queue, the flows that are enqueued to the queue are subjected to the DBL algorithm. If one or more flows are classified as belligerent (flows do not back-off in response to drops because of congestion in the queue), those flows continue to be classified as belligerent even when DBL is disabled on that queue.
For this condition to persist, the transmit queues in question must remain congested for a long period of time and that congestion must be caused by flows that remain belligerent.
Workaround: Provided the queue in question is non-default (queuing actions are not configured in the class-default class of the policy-map), detach and re-attach the service-policy.
If this happens on the default queue, modifying and resetting some queuing parameters like bandwidth/shape fixes the issue. (CSCsk62457
Workarounds: Use the show log command to determine the cause of the power-down.
– If the log has LogGalInsufficientFansDetected messages, the cause was a fan-tray failure.
– If the log has LogRkiosModuleShutdownTemp messages, the cause was that the supervisor critical temperature exceeded the failure threshold.
On a switch running Cisco IOS Release 12.2(40)SG, all MTU values configured on a line card are set to default when the module is reset. Furthermore, MTU values are not retained for modules that are physically moved.
Workaround: None. (CSCsk52542)
Workaround: Reinsert the X2. (CSCsk43618)
When a packet is sent to the CPU it may get sent out on some other interface. If so, the original COS value for a.1X packet cannot be matched by software QoS (as per CSCsk66449). The packet is transmitted with whatever COS value it was generated with (7, for the MLDv1 packets described here).
Part of the root cause of this problem is captured through CSCsk66449, which indicates that the software QoS cannot match against a.1X packet. (CSCsk72544)
Workaround: None. You cannot explicitly check the trusted boundary state. However, you can indirectly determine this state:
The trusted boundary feature ensures whether the packet’s COS/DSCP value will b e trusted or not. When the interface is not in a trusted state, the COS/DSCP fields are forced to zero on a received packet.
A QoS policy exists on that interface that uses that COS/DSCP value for classification. Therefore, if the packet classification is based on the packet value, you can infer that the interface is in a trusted state. (CSCsh72408)
Workaround: Enter the show policy-map interface command to find the actual burst value programmed. (CSCsi71036)
Workaround: None. However, if you enter the show policy-map name, the unconditional marking actions appear. (CSCsi94144)
Workaround: None. (CSCsl72868)
Workaround: To ensure that the DBL action operates on the default queue, use the queue-limit command to specify an explicit queue size. The size range is dictated by the queue-limit command. (CSCso06422)
This behavior occurs in a redundant switch when the ACTIVE supervisor engine is running IOS, the STANDBY supervisor engine is in rommon, and the STANDBY's rommon is upgraded from version 0.34 or to a later version. The upgrade process will cause the uplinks on the STANDBY supervisor engine to go down but the ACTIVE supervisor engine is unaware of this.
Workarounds: To resume normal operation, do one of the following:
– Reload both supervisors with the redundancy reload shelf command.
– Power-cycle the STANDBY supervisor engine by briefly pulling it from the chassis.
There is no workaround for the link flap issue. (CSCsm81875)
This problem can happen when pause frames are sent to the switchport and the flow control receive configuration is toggled on 10G port.
Workaround: Change the flow control receive configuration when no traffic exists. (CSCso71647)
Workaround: Disable IGMP snooping on all the relevant VLANs before disabling it globally.
The issue is observed only for packets that are logically switched through the switch but are internally controlled such that on egress the system generated by the switch itself. This can happen for certain snooping features like DAI, IGMP snooping, DHCP snooping, and MLD snooping. This can also happen for IPv4/v6 packets with IP options/ extension headers that need processing in software.
Workaround: Enter shut, then no-shut on any REP port (of the same segment in which VLB is configured) in the topology. (CSCsq75342)
Workaround: Define the backup etherchannel before applying the flexlink command. (CSCsq13477)
Workaround: None. (CSCsq99468)
Workaround: Ping the global and link local addresses of the neighbor to ascertain and reinstate reachability. (CSCsq77181)
Workaround: Unconfigure the port channel and the associated physical port, and reconfigure them.
You only see this symptom if you did not allocate a VLAN before you configure the IFM, then at a later time allocate the same VLAN.
Workaround: Unconfigure, then reconfigure the IFM on the port.
Similar behavior is observed with Supervisor Engine 6-E uplinks and the WS-X4706-10GE line card.
Similar behavior is observed with Supervisor Engine 6-E uplinks and the WS-X4706-10GE line card.
This behavior is seen in Cisco IOS Releases 12.2(50)SG thru 12.2(50)SG3 when the peer device sends a remote fault.
Workaround: Disable auto negotiation at both ends.
Workaround: Do not use the nested policy-map feature in Cisco IOS Release 12.2(40)SG and 12.2(44)SG. (CSCsy80664)
The following conditions may cause a RACL to malfunction:
– ACL are applied on the output direction of the interface.
– IPv6 ACL contain Ace to match on the ICMP option fields (ICMP Type or ICMP Code).
This section lists the resolved caveats in Release 12.2(50)SG:
Workaround: Enter the shutdown, then no shutdown commands on the interface after changing the access VLAN on the port. (CSCsk45969)
Configuring an inbound routemap on RTR3 to override the nexthop address advertised by RTR2 does not avoid this problem because the BGP update message is ignored.
Workaround: Configure an outbound rout emap on RTR2 to explicitly set the IPv4 nexthop address rather than allow the protocol to derive it implicitly. (CSCsk65139)
This behavior is only seen when VLAN is allocated after the IFM is configured.
Workaround: Unconfigure with the no ethernet cfm mep level mpid vlan command, then reconfigure the IFM with the ethernet cfm mep level mpid vlan command on the port after the VLAN is allocated. Verify that the C-Status of the IFM is Active with the
show ethernet cfm maintenance-points local command. (CSCsm85460)
Workaround: Authenticate the phone before plugging a PC behind the phone. (CSCsq92724)
Workarounds: Do one of the following:
– Reapply the CFM configuration; remove and re-add the MEPs configured on all the interfaces of the switch.
– Deallocate CFM service VLANs. Then reallocate them.
Workaround: None. (CSCsq63572)
Service policy has to be configured with percentage police, shape, or share values and the link speed is forced to a specific values. For example:
Workaround: Either use the speed auto 10/100/1000 command or the absolute policer, shape, or shape values rather than percentage values. For example:
The message may appear when a linecard boots, depending on how the hardware has powered-up.
Workaround: Reset the linecard. (CSCsq21215)
Workaround: Remove and re-apply the service-policy on the interface.
Workaround: Use either the speed auto 10/100/1000 command or the absolute policer or shape values instead of percentage values.
Workaround: None. (CSCso54096)
Workaround: Replace the default interface command with the following:
Workaround: Intentionally fail the link between two switches by physically pulling the cable or shutting down the interface. Then, return the links to a normal condition. This is followed by delayed preemption, which you might have already configured. (CSCsm91997)
Workaround: Unconfigure any generic QOS policies from the system. The QoS policies with the match any attribute cause IPv6 entries to become active. If the switch is a pure Layer 2 device, remove the generic protocol family attributes and narrow it to the protocol family.
Dual-sup upgrade (ISSU) - Between 12.2(46)SG and other releaes
Follow the ISSU process without any changes. Adhere to the following items during the upgrade:
1. Do not save the configuration file to nvram explicitly with write memory or an equivalent command. The issu commitversion command saves the configuration to nvram, which restores the ifIndices stored in nvram.
2. Do not enter the issu abortversion command during the upgrade process.
Single Supervisor Upgrade - Upgrade from Cisco IOS Release 12.2(44)SG1 or prior to 12.2(46)SG & Downgrade from 12.2(46)SG to 12.2(44)SG1 or prior
For the software versions described in the previous section, observe that the software version if changing from version-a to version-b, with the switch currently running version-a.
1. While running version-a, delete the file containing ifIndices with the
del nvram:ifIndex-table.gz command.
Note Ensure that you do not initiate saving of the configuration file with write nvram or a similar command after step 1):
2. Reload the switch so that it runs version-b after reloading.
3. While the switch is running version-b, regenerate the file containing ifIndices by saving the configuration with the write memory command.
Single Supervisor Upgrade - Upgrade from Cisco IOS Release 12.2(46)SG to 12.2(50)SG or later
1. While running 12.2(46)SG, save the configuration to a file in bootflash.
2. Erase the configuration stored in nvram.
3. Delete the file containing the ifIndices.
4. Reload the switch so that it runs Cisco IOS Release 12.2(44)SG1 or a prior release after reloading.
5. While the switch is running Cisco IOS Release 12.2(44)SG1, regenerate ifIndices by doing the following:
– Enable the ifIndex persistence feature.
– Enter the write memory command to save the generated ifIndices to nvram.
6. Upgrade to Cisco IOS Release 12.2(50)SG or a later release. While the switch is running release 12.2(50)SG or later, load the configuration saved in step 1 from bootflash with the
copy bootflash:oldconfig running-config command.
7. Save your configuration to nvram with the write memory command.
This issue if open in Cisco IOS Releases 12.2(40)SG, 12.2(44)SG and 12.2(46)SG.
This issue is resolved in 12.2(50)SG.
Workaround: Do not use the qos autoqos macro.
When a policy-map is shared on more than one target, it should not use any percentage based actions; police, shape, and bandwidth actions must use absolute values. This requires a different policy-map for each of the four interface speeds supported on the switch - 10M, 100M, 1G, and 10G. So, rather than having a single policy-map as enabled through percentage-based actions, you must create four distinct policy-maps. This applies to all shared policy-maps, independent of direction of service-policy.
Cisco has released free software updates that address this vulnerability.
Several mitigation strategies are outlined in the workarounds section of this advisory.
This advisory is posted at
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20090325-tcp
Cisco has released free software updates that address this vulnerability.
Workarounds that mitigate this vulnerability are available in the workarounds section of the advisory. This advisory is posted at the following link:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20090325-udp
Conditions: A device configured for SSLVPN may stop accepting any new SSLVPN connections, due to a vulnerability in the processing of new TCP connections for SSLVPN services. If “debug ip tcp transactions” is enabled and this vulnerability is triggered, debug messages with connection queue limit reached will be observed. This vulnerability is documented in two separate Cisco bug IDs, both of which are required for a full fix: CSCso04657 and CSCsg00102.
Workaround: Unconfigure all generic QOS policies from the system. (CSCsq84853)
a. Disable port security on the port, or connect the switch to the AAA server through a standard Layer 3 port.
b. Disable spanning-tree portfast.
Workaround: None. (CSCsk67395)
Workaround: Remove all service-policies from the interface before entering the
auto qos voip trust command.
In addition to these vulnerabilities, Cisco Nexus 5000 devices contain a TCP DoS vulnerability that may result in a system crash. This additional vulnerability was found as a result of testing the TCP state manipulation vulnerabilities.
Cisco has released free software updates for download from the Cisco website that address these vulnerabilities. Workarounds that mitigate these vulnerabilities are available.
This advisory is posted at
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20090908-tcp24
This section lists the open caveats in Cisco IOS Release 12.2(46)SG:
Workaround: When using the access-list N permit host hostname command, specify the IP address of the host rather than the hostname (CSCef67489)
Workaround: Verify that the MAC addresses being transmitted through the system are learned.
Workaround: None. (CSCeg48586)
– If such a certificate does not exist and the device's hostname and default_domain have been set, then a persistent self-signed certificate is generated.
– If such a certificate exists, the FQDN in the certificate is compared with the current device's hostname and default_domain. If either of these differs from the FQDN in the certificate, then the existing persistent self-signed certificate is replaced with a new one with the updated FQDN. Be aware that the existing keypair is used in the new certificate.
On a switch that support redundancy, the generation of the self-signed certificate is performed independently on the active and the standby supervisor engines. So, the certificates differ. After switchover, the HTTP client that holds the old certificate can not connect to the HTTPS server.
Workaround: Re-connect. (CSCsb11964)
This only affects a switch that has any of the following queues are configured as SPAN source in releases prior to 12.2(31)SG and saved to startup-config. The SPAN destination would not get the same traffic after upgrading to 12.2(31)SG.
Workaround: After upgrading to 12.2(31)SG and later releases, remove the old SPAN source configuration and reconfigure with the new queue names/IDs. For example:
Workaround: None. (CSCsc11726)
This could occur for these reasons:
– A packet requires an IP redirect to an IP unnumbered outgoing port within 3 minutes of booting the Catalyst 4500 series switch.
– This is also seen if the switch administrator issues the shutdown and no shutdown commands on an outgoing interface that has IP unnumbered enabled. The switch receives packets that require redirection and the destination MAC address is already in ARP table.
– Do not inject packets that require IP redirect sent out to an IP unnumbered port within 3 minutes of booting the Catalyst 4500 series switch.
– Configure the correct default gateway on the host side. (CSCse75660)
Workaround: None. (CSCsg58526)
This does not affect performance.
Workaround: Enter the no shutdown command. (CSCsg27395)
Workaround: Remove the transceiver from the new port and place it in the old port. After the SFP is recognized in the old port, remove it slowly and insert it in the new port. (CSCse34693).
Workaround: None. This message is an informational message. (CSCsi60913)
Workaround: None. This is an informational message. (CSCsi60898)
Problem is not observed if the phone is a stand alone device.
Workarounds: Powercycle the Cisco IP phone. (CSCsk81297)
Workaround: Enter the shutdoown, then no shutdown commands on the interface after changing the access VLAN on the port. (CSCsk45969)
Workaround: None. (CSCsm30320)
Workaround: Cause the link between two switches to fail by physically pulling the cable or shutting down the interface. Then, return the links to a normal condition. This is followed by delayed preemption, which you might have already configured. (CSCsm91997)
Workaround: Authenticate the phone before plugging a PC behind the phone. (CSCsq92724)
Workarounds: Do one of the following:
– After a reload, copy the startup-config to the running-config.
– Use a loopback interface as the target of the ip unnumbered command.
– Change the CLI configuration so that during bootup the router port is created first.
Workarounds: Do one of the following:
– Reapply the CFM configuration; remove and re-add the MEPs configured on all the interfaces of the switch.
– Deallocate CFM service VLANs. Then reallocate them.
Workaround: When the port channel starts to flap, enter shut and no shut on the port channel. After the first switchover and after deleting the portchannel, create a new channel. (CSCsr00333)
Workaround: Update the configuration during ISSU with issu commitversion. This is the normal process. Do not save the configuration explicitly with write nvram. (CSCsv85746)
Dual-sup upgrade (ISSU) - Between 12.2(46)SG and other releaes
Follow the ISSU process without any changes. Adhere to the following items during the upgrade:
8. Do not save the configuration file to nvram explicitly with write memory or an equivalent command. The issu commitversion command saves the configuration to nvram, which restores the ifIndices stored in nvram.
9. Do not enter the issu abortversion command during the upgrade process.
Single Supervisor Upgrade - Upgrade from Cisco IOS Release 12.2(44)SG1 or prior to 12.2(46)SG & Downgrade from 12.2(46)SG to 12.2(44)SG1 or prior
For the software versions described in the previous section, observe that the software version if changing from version-a to version-b, with the switch currently running version-a.
1. While running version-a, delete the file containing ifIndices with the
del nvram:ifIndex-table.gz command.
Note Ensure that you do not initiate saving of the configuration file with write nvram or a similar command after step 1):
2. Reload the switch so that it runs version-b after reloading.
3. While the switch is running version-b, regenerate the file containing ifIndices by saving the configuration with the write memory command.
Single Supervisor Upgrade - Upgrade from Cisco IOS Release 12.2(46)SG to 12.2(50)SG or later
1. While running 12.2(46)SG, save the configuration to a file in bootflash.
2. Erase the configuration stored in nvram.
3. Delete the file containing the ifIndices.
4. Reload the switch so that it runs Cisco IOS Release 12.2(44)SG1 or a prior release after reloading.
5. While the switch is running Cisco IOS Release 12.2(44)SG1, regenerate ifIndices by doing the following:
– Enable the ifIndex persistence feature.
– Enter the write memory command to save the generated ifIndices to nvram.
6. Upgrade to Cisco IOS Release 12.2(50)SG or a later release. While the switch is running release 12.2(50)SG or later, load the configuration saved in step 1 from bootflash with the
copy bootflash:oldconfig running-config command.
7. Save your configuration to nvram with the write memory command.
Workaround: None. (CSCso93282)
Workaround: None. (CSCsq63572)
Workaround: None. (CSCso68331)
Instead, the data plane classes (configured manually by user written ACLs) increment the byte counter, but not the packet count (remains 0).
The support to handle.1Q packets for software QoS lookup unavailable in the Cisco IOS Release 12.2(40)SG release. (CSCsk66449)
Service policy has to be configured with percentage police or shape or share values and the link speed is forced to a specific values. For example
Workaround: Either use the speed auto 10/100/1000 command or the absolute policer, shape or shape values rather than percentage values. For example,
When an output service-policy is attached to an interface and if the policy is configured to apply DBL on a queue, the flows that are enqueued to the queue are subjected to the DBL algorithm. If one or more flows are classified as belligerent (flows do not back-off in response to drops because of congestion in the queue), those flows continue to be classified as belligerent even when DBL is disabled on that queue.
For this condition to persist, the transmit queues in question must remain congested for a long period of time and that congestion must be caused by flows that remain belligerent.
Workaround: Provided the queue in question is non-default (queuing actions are not configured in the class-default class of the policy-map), detach and re-attach the service-policy.
If this happens on the default queue, modifying and resetting some queuing parameters like bandwidth/shape fixes the issue. (CSCsk62457
Workarounds: Use the show log command to determine the cause of the power-down.
– If the log has LogGalInsufficientFansDetected messages, the cause was a fan-tray failure.
– If the log has LogRkiosModuleShutdownTemp messages, the cause was that the supervisor critical temperature exceeded the failure threshold.
On a switch running Cisco IOS Release 12.2(40)SG, all MTU values configured on a line card are set to default when the module is reset. Furthermore, MTU values are not retained for modules that are physically moved.
Workaround: None. (CSCsk52542)
Workaround: Reinsert the X2. (CSCsk43618)
Workaround: None. (CSCsk67395)
When a packet is sent to the CPU it may get sent out on some other interface. If so, the original COS value for a.1X packet cannot be matched by software QoS (as per CSCsk66449). The packet is transmitted with whatever COS value it was generated with (7, for the MLDv1 packets described here).
Part of the root cause of this problem is captured through CSCsk66449, which indicates that the software QoS cannot match against a.1X packet. (CSCsk72544)
Workaround: None. You cannot explicitly check the trusted boundary state. However, you can indirectly determine this state:
The trusted boundary feature ensures whether the packet’s COS/DSCP value will b e trusted or not. When the interface is not in a trusted state, the COS/DSCP fields are forced to zero on a received packet.
A QoS policy exists on that interface that uses that COS/DSCP value for classification. Therefore, if the packet classification is based on the packet value, you can infer that the interface is in a trusted state. (CSCsh72408)
Workaround: Enter the show policy-map interface command to find the actual burst value programmed. (CSCsi71036)
Workaround: Remove the configuration line by line without entering the default interface command. (CSCsj23103)
Workaround: None. However, if you enter the show policy-map name, the unconditional marking actions appear. (CSCsi94144)
Workaround: None. (CSCsl72868)
Workaround: Do one of the following:
– Remove the service-policy from the interface and reapply the configuration with the
[no] service-policy {input|output}command.
– Enter the shutdown then noshutdown commands.
Workaround: To ensure that the DBL action operates on the default queue, use the queue-limit command to specify an explicit queue size. The size range is dictated by the queue-limit command. (CSCso06422)
Configuring an inbound routemap on RTR3 to override the nexthop advertised by RTR2 does not avoid this problem because the BGP update message is ignored.
Workaround: Configure a n outbound routemap on RTR2 to explicitly set the IPv4 nexthop rather than allow the protocol to derive it implicitly. (CSCsk65139)
Workaround: None. (CSCso30051)
This behavior occurs in a redundant switch when the active supervisor engine is running IOS, the standby supervisor engine is in ROMMON mode, and the standby supervisor engine’s ROMMON is upgraded from version 0.34 or to a later version. The upgrade process causes the uplinks on the standby supervisor engine to go down, but the active supervisor engine does not detect it.
Workarounds: To resume normal operation, do one of the following:
– Reload both supervisors with the redundancy reload shelf command.
– Power-cycle the STANDBY supervisor engine by briefly pulling it from the chassis.
There is no workaround for the link flap issue. (CSCsm81875)
The message may appear when a linecard boots, depending on how the hardware has powered-up.
Workaround: Reset the linecard. (CSCsq21215)
This problem can happen when pause frames are sent to the switchport and the flow control receive configuration is toggled on 10G port.
Workaround: Change the flow control receive configuration when no traffic exists. (CSCso71647)
Workaround: Disable IGMP snooping on all the relevant VLANs before disabling it globally.
a. Disable port security on the port, or connect the switch to the AAA server through a standard Layer 3 port.
b. Disable spanning-tree portfast.
Workaround: Remove and re-apply the service-policy on the interface.
The issue is observed only for packets that are logically switched through the switch but are internally controlled such that on egress the system generated by the switch itself. This can happen for certain snooping features like DAI, IGMP snooping, DHCP snooping, and MLD snooping. This can also happen for IPv4/v6 packets with IP options/ extension headers that need processing in software.
Workaround: Use either the speed auto 10/100/1000 command or the absolute policer or shape values instead of percentage values.
Workaround: None. (CSCso54096)
Workaround: Unconfigure all generic QOS policies from the system. (CSCsq84853)
Workaround: Unconfigure any generic QOS policies from the system. The QoS policies with the match any attribute cause IPv6 entries to become active. If the switch is a pure Layer 2 device, remove the generic protocol family attributes and narrow it to the protocol family.
Workaround: Enter shut, then no-shut on any REP port (of the same segment in which VLB is configured) in the topology. (CSCsq75342)
Workaround: Define the backup etherchannel before applying the flexlink command. (CSCsq13477)
Workaround: None. (CSCsq99468)
Workaround: Replace the default interface command with the following:
Workaround: Ping the global and link local addresses of the neighbor to ascertain and reinstate reachability. (CSCsq77181)
Workaround: Unconfigure the port channel and the associated physical port, and reconfigure them.
You only see this symptom if you did not allocate a VLAN before you configure the IFM, then at a later time allocate the same VLAN.
Workaround: Unconfigure, then reconfigure the IFM on the port.
This behavior is only seen when VLAN is allocated after the IFM is configured.
Workaround: Unconfigure with the no ethernet cfm mep level mpid vlan command, then reconfigure the IFM with the ethernet cfm mep level mpid vlan command on the port after the VLAN is allocated. Verify that the C-Status of the IFM is Active with the
show ethernet cfm maintenance-points local command. (CSCsm85460)
This issue if open in Cisco IOS Releases 12.2(40)SG, 12.2(44)SG and 12.2(46)SG.
This issue is resolved in 12.2(50)SG.
Workaround: Do not use the qos autoqos macro.
When a policy-map is shared on more than one target, it should not use any percentage based actions; police, shape, and bandwidth actions must use absolute values. This requires a different policy-map for each of the four interface speeds supported on the switch - 10M, 100M, 1G, and 10G. So, rather than having a single policy-map as enabled through percentage-based actions, you must create four distinct policy-maps. This applies to all shared policy-maps, independent of direction of service-policy.
Workaround: Do not use the nested policy-map feature in Cisco IOS Release 12.2(40)SG and 12.2(44)SG. (CSCsy80664)
The following conditions may cause a RACL to malfunction:
– ACL are applied on the output direction of the interface.
– IPv6 ACL contain Ace to match on the ICMP option fields (ICMP Type or ICMP Code).
This section lists the resolved caveats in Release 12.2(46)SG:
At this point, if you revert to the bgp dampening command on the active supervisor engine, the new command is not synchronized with the standby supervisor engine.
Workaround: First enter the no bgp dampening command, and the n enter the bgp dampening command. (CSCse12485)
Workaround: Ensure that the REP Admin VLAN and the RSPAN destination VLAN differ. (CSCso12495)
Workaround: None. (CSCsm61748)
One feature combination that can trigger this problem is a QoS policy that matches on the cos bits with an IPv6 ACL configuration, which in turn matches on IPv6 source addresses that partially mask in the lower 48 bits of the address. (IPv6 subnets ranging from /81 to /127 also trigger this behavior if IPv6 multicast routing is enabled.)
Workaround: Do not configure feature combinations that conflict. Currently the above conflict between QoS policies matching on COS bits and IPv6 configuration with partial masking of the lower 48 bits of the source address is the only known conflicting feature combination. If matching on COS bits is required by the QoS policy, design the IPv6 network using /80 subnets or larger. (CSCsk79791)
The first problem occurs on a dual Layer 3 interface where both IPv4 and IPv6 addresses are configured. The second problem occurs when all Layer 3 interfaces in a switch are configured with the IPv6 address only.
Workarounds: Avoid using a dual Layer 3 interface with both IPv6 and IPv4 addresses configured.
Avoid using a switch as a purely IPv6 Layer 3 interface-only router. Ensure that it has at least one Layer 3 interface per SVI with an IPv4 address configured. (CSCsk77234)
Workaround: Before switching a Layer 3 interface from a router port to a switch port, unconfigure the IPv6 ACL on the router interface. This ensures that the IPv6 ACL is cleaned up properly both in the IOS running configuration as well as in the TCAM hardware. (CSCsk60775)
This occurs on all E-series linecards that report critical or shutdown temperature alarms. The actual temperatures and the alarm states are visible in the output of the show environment temperature command.
Workarounds: None for LED colors. However, when an alarm is raised or cleared, console log messages and SNMP traps are entered. Also, the current status of any temperature alarms are visible in the output of the show environment temperature command. (CSCsk57143)
Workaround: If non-default duplex settings are in the running configuration, note them prior to upgrading, and reapply them after the upgrade completes. (CSCsk83670)
Workaround: Reapply the policy-map. (CSCsk75793
Currently, if auto-QoS is applied to a port that is already a member of a port channel, the application is rejected with an error message. However, the reverse is not true. If auto-QoS is applied first and then the port joins a port channel, the command is accepted.
The following example using port g2/1 shows the type of usage that should be avoided:
This example applies auto-QoS on a port (g2/1) and subsequently makes the port a member of portchannel (10).
Workaround: Do not make a port with auto-QoS enabled a member of a port channel. (CSCsi95018)
Workaround: Enter the show policy-map interface command to find the actual exceed burst value programmed. (CSCsj44237)
The QoS configuration is present in the running configuration but is not honored on the interface.
Workaround: Reapply the QoS configuration to the interface. (CSCsm58839)
Workarounds : Before configuring IPv6 MTU on an interface, you must enable IPv6 on the interface. To enable IPv6, use the ipv6 enable command.
If you encounter this problem, use the following commands to recover your switch:
1. At the ROMMON prompt, enter the confreg command to ignore the startup configuration.
2. Enter the reset command to reboot your switch.
3. Enter the copy startup-config running-config command to copy your startup configuration to your running configuration
4. Enter the ipv6 enable command to enable IPv6 on the interfaces.
5. Enter the ipv6 mtu mtu-value command to configure IPv6 MTU on your interface.
6. Enter the copy running-config startup-config command to save your recovered configuration.
7. Enter the reload command on the switch to return to ROMMON.
8. From ROMMON, enter the confreg command to process the startup config.
9. Reset the switch to resume normal operation. (CSCso42867)
Workaround: Shut down supervisor uplink ports prior to reload. (CSCsl34390)
This section lists the open caveats in Cisco IOS Release 12.2(44)SG1:
Workaround: When using the access-list N permit host hostname command, specify the IP address of the host rather than the hostname (CSCef67489)
Workaround: Verify that the MAC addresses being transmitted through the system are learned.
Workaround: None. (CSCeg48586)
– If such a certificate does not exist and the device's hostname and default_domain have been set, then a persistent self-signed certificate is generated.
– If such a certificate exists, the FQDN in the certificate is compared with the current device's hostname and default_domain. If either of these differs from the FQDN in the certificate, then the existing persistent self-signed certificate is replaced with a new one with the updated FQDN. Be aware that the existing keypair is used in the new certificate.
On a switch that support redundancy, the generation of the self-signed certificate is performed independently on the active and the standby supervisor engines. So, the certificates differ. After switchover, the HTTP client that holds the old certificate can not connect to the HTTPS server.
Workaround: Re-connect. (CSCsb11964)
This only affects a switch that has any of the following queues are configured as SPAN source in releases prior to 12.2(31)SG and saved to startup-config. The SPAN destination would not get the same traffic after upgrading to 12.2(31)SG.
Workaround: After upgrading to 12.2(31)SG and later releases, remove the old SPAN source configuration and reconfigure with the new queue names/IDs. For example:
Workaround: None. (CSCsc11726)
This could occur for these reasons:
– A packet requires an IP redirect to an IP unnumbered outgoing port within 3 minutes of booting the Catalyst 4500 series switch.
– This is also seen if the switch administrator enters the shutdown and no shutdown commands on an outgoing interface that has IP unnumbered enabled. The switch receives packets that require redirection and the destination MAC address is already in ARP table.
– Do not inject packets that require IP redirect sent out to an IP unnumbered port within 3 minutes of booting the Catalyst 4500 series switch.
– Configure the correct default gateway on the host side. (CSCse75660)
At this point, if you revert back to the bgp dampening command on the active supervisor engine, the new command is not synchronized with the standby supervisor engine.
Workarounds: Enter the no bgp dampening command, then the bgp dampening command. (CSCse12485)
Workaround: None. (CSCsg58526)
This does not affect performance.
Workaround: Enter the no shutdown command. (CSCsg27395)
Workaround: Remove the transceiver from the new port and place it in the old port. After the SFP is recognized in the old port, remove it slowly and insert it in the new port. (CSCse34693).
Workaround: None. This message is an informational message. (CSCsi60913)
Workaround: None. This is an informational message. (CSCsi60898)
This problem is not observed if the phone is a stand alone device.
Workarounds: Powercycle the Cisco IP phone. (CSCsk81297)
Workaround: Enter the shutdoown, then no shutdown commands on the interface after changing the access VLAN on the port. (CSCsk45969)
Workaround: Ensure that the REP Admin VLAN and the RSPAN destination VLAN differ. (CSCso12495)
Workaround: None. (CSCsm30320)
Workaround: Intentionally fail the link between two switches by physically pulling the cable or shutting down the interface. Then, return the links to a normal condition. This is followed by delayed preemption, which you might have already configured. (CSCsm91997)
The support to handle.1Q packets for software QoS lookup unavailable in the Cisco IOS Release 12.2(40)SG release. (CSCsk66449)
One feature combination that can trigger this problem is the attempt to combine a QoS policy that matches on cos bits with IPv6 ACL configuration that matches on IPv6 source addresses that partially mask in the lower 48 bits of the address. (IPv6 subnets in the /81 to /127 range will also trigger this behavior if IPv6 multicast routing is enabled.)
Workaround: Do not configure feature combinations that conflict. Currently the above conflict between QoS policies matching on COS bits and IPv6 configuration with partial masking of the lower 48 bits of the source address is the only known conflicting feature combination. If matching on COS bits is required by the QoS policy, architect the IPv6 network using /80 subnets or larger. (CSCsk79791)
Service policy has to be configured with percentage police or shape or share values and the link speed is forced to a specific values. For example
Workaround: Either use the speed auto 10/100/1000 command or the absolute policer, shape or shape values rather than percentage values. For example,
The first problem occurs on a dual Layer 3 interface where both IPv4 and IPv6 address are configured. The second problem occurs when all Layer 3 interfaces in a switch are configured with IPv6 address only.
Workarounds: Avoid using a dual Layer 3 interface with both IPv6 and IPv4 address configured.
Avoid using a switch as a purely IPv6 Layer 3 interface-only router. Ensure that it has at least one Layer 3 interface per SVI with IPv4 address configured. (CSCsk77234)
Workaround: Before switching a Layer 3 interface from a router port to a switch port, unconfigure the IPv6 ACL on the router interface. This will ensure that the IPv6 ACL is cleaned up properly both in the IOS running configuration as well as in the TCAM hardware. (CSCsk60775)
When an output service-policy is attached to an interface and if the policy is configured to apply DBL on a queue, the flows that are enqueued to the queue are subjected to the DBL algorithm. If one or more flows are classified as belligerent (flows do not back-off in response to drops because of congestion in the queue), those flows continue to be classified as belligerent even when DBL is disabled on that queue.
For this condition to persist, the transmit queues in question must remain congested for a long period of time and that congestion must be caused by flows that remain belligerent.
Workaround: Provided the queue in question is non-default (queuing actions are not configured in the class-default class of the policy-map), detach and re-attach the service-policy.
If this happens on the default queue, modifying and resetting some queuing parameters like bandwidth/shape fixes the issue. (CSCsk62457
Workarounds: Use the show log command to determine the cause of the power-down.
– If the log has LogGalInsufficientFansDetected messages, the cause was a fan-tray failure.
– If the log has LogRkiosModuleShutdownTemp messages, the cause was that the supervisor critical temperature exceeded the failure threshold.
This occurs on all E-series line cards that report critical or shutdown temperature alarms. The actual temperatures and the alarm states are visible in the output of show environment temperature command.
Workarounds: None for LED colors. However, when an alarm is raised or cleared, console log messages and SNMP traps are entered. Also, the current status of any temperature alarms are visible in the output of the show environment temperature command. (CSCsk57143)
Workaround: None. (CSCsh99124)
On a switch running Cisco IOS Release 12.2(40)SG, all MTU values configured on a line card are set to default when the module is reset. Furthermore, MTU values are not retained for modules that are physically moved.
Workaround: None. (CSCsk52542)
Workaround: If non-default duplex settings are in the running config, note them prior to upgrading, and reapply them after the upgrade completes. (CSCsk83670)
Workaround: Reinsert the X2. (CSCsk43618)
Workaround: Re-apply the policy-map. (CSCsk75793
When a packet is sent to the CPU it may get sent out on some other interface. If so, the original COS value for a.1X packet cannot be matched by software QoS (as per CSCsk66449). The packet is transmitted with whatever COS value it was generated with (7, for the MLDv1 packets described here).
Part of the root cause of this problem is captured through CSCsk66449, which indicates that the software QoS cannot match against a.1X packet. (CSCsk72544)
Workaround: None. You cannot explicitly check the trusted boundary state. However, you can indirectly determine this state:
The trusted boundary feature ensures whether the packet’s COS/DSCP value will b e trusted or not. When the interface is not in a trusted state, the COS/DSCP fields are forced to zero on a received packet.
A QoS policy exists on that interface that uses that COS/DSCP value for classification. Therefore, if the packet classification is based on the packet value, you can infer that the interface is in a trusted state. (CSCsh72408)
Currently, if auto-QoS is applied to a port that is already a member of a portchannel, the application is rejected with an error message. However, the reverse is not true. If auto-QoS is applied first and then the port joins a portchannel, the command is accepted.
The following example using port g2/1 shows the type of usage that should be avoided:
This example applies auto-QoS on a port (g2/1) and subsequently makes the port a member of portchannel (10).
Workaround: Do not make a port with auto-QoS enabled a member of a portchannel. (CSCsi95018)
Workaround: Enter the show policy-map interface command to find the actual exceed burst value programmed. (CSCsj44237)
Workaround: Enter the show policy-map interface command to find the actual burst value programmed. (CSCsi71036)
Workaround: Remove the configuration line by line without entering the default interface command. (CSCsj23103)
Workaround: None. However, if you enter the show policy-map name, the unconditional marking actions appear. (CSCsi94144)
Workaround: None. (CSCsl72868)
Workaround: Do one of the following:
– Remove the service-policy from the interface and reapply the configuration through the command [no] service-policy {input|output}.
– Enter the shutdown and noshutdown commands.
The QoS configuration is present in the running configuration but is not honored on the interface.
Workaround: Reapply the QoS configuration to the interface. (CSCsm58839)
Workaround: To ensure that the DBL action operates on the default queue, use the queue-limit command to specify an explicit queue size. The size range is dictated by the queue-limit command. (CSCso06422)
Configuring an inbound routemap on RTR3 to override the nexthop advertised by RTR2 does not avoid this problem because the BGP update message is ignored.
Workaround: Configure a n outbound routemap on RTR2 to explicitly set the IPv4 nexthop rather than allow the protocol to derive it implcitly. (CSCsk65139)
Workaround: None. (CSCso30051)
This behavior occurs in a redundant switch when the ACTIVE supervisor engine is running IOS, the STANDBY supervisor engine is in rommon, and the STANDBY's rommon is upgraded from version 0.34 or to a later version. The upgrade process will cause the uplinks on the STANDBY supervisor engine to go down but the ACTIVE supervisor engine is unaware of this.
Workarounds: To resume normal operation, do one of the following:
– Reload both supervisors with the redundancy reload shelf command.
– Power-cycle the STANDBY supervisor engine by briefly pulling it from the chassis.
There is no workaround for the link flap issue. (CSCsm81875)
Workarounds : Before configuring IPv6 MTU on an interface you must enable IPv6 on the interface. To enable IPv6, use the ipv6 enable command.
If you encounter this, enter tthe following commands in this order to recover your switch:
10. from the rommon prompt, use the confreg command to ignore the startup configuration
11. reset command to reboot your switch
12. copy startup-config running-config command to copy your startup configuration to your running configuration
13. ipv6 enable command to enable IPv6 on the interfaces
14. ipv6 mtu mtu-value command to configure IPv6 MTU on your interface
15. copy running-config startup-config command to save your recovered configuration
16. reload command on the switch to return to Rommon
17. from rommon, use the confreg command to process the startup config
18. reset the switch to resume normal operation. (CSCso42867)
This issue if open in Cisco IOS Releases 12.2(40)SG, 12.2(44)SG and 12.2(46)SG.
This issue is resolved in 12.2(50)SG.
Workaround: Do not use the qos autoqos macro.
When a policy-map is shared on more than one target, it should not use any percentage based actions; police, shape, and bandwidth actions must use absolute values. This requires a different policy-map for each of the four interface speeds supported on the switch - 10M, 100M, 1G, and 10G. So, rather than having a single policy-map as enabled through percentage-based actions, you must create four distinct policy-maps. This applies to all shared policy-maps, independent of direction of service-policy.
Workaround: Do not use the nested policy-map feature in Cisco IOS Release 12.2(40)SG and 12.2(44)SG. (CSCsy80664)
The following conditions may cause a RACL to malfunction:
– ACL are applied on the output direction of the interface.
– IPv6 ACL contain Ace to match on the ICMP option fields (ICMP Type or ICMP Code).
This section lists the resolved caveats in Release 12.2(44)SG1:
Workaround: Remove the EIGRP passive interface configuration.
Upgrading to Cisco IOS Release 12.2(44)SG1 or 12.2(46)SG for all supervisors eliminates the problem.
This defect is not present in the 12.2(31)SGA software train, which only supports classic supervisors. (CSCsk04287).
On ports with PoE devices connnected, you might also see:
The affected power supply experiences a temporary shut down and power supply redundancy is lost. Power for data and chassis is decremented and occasionally the linecard(s) shut down. Also, power for PoE will decrement, causing PDs to shut down and reset.
Note If both the units have 110V inputs, they are not affected. (the output current is lower with both 110V input connections, see Power Supply Calculator on CCO, http://tools.cisco.com/cpc/launch.jsp.)
This section lists the open caveats in Cisco IOS Release 12.2(44)SG:
Workaround: When using the access-list N permit host hostname command, specify the IP address of the host rather than the hostname (CSCef67489)
Workaround: Verify that the MAC addresses being transmitted through the system are learned.
Workaround: None. (CSCeg48586)
– If such a certificate does not exist and the device's hostname and default_domain have been set, then a persistent self-signed certificate is generated.
– If such a certificate exists, the FQDN in the certificate is compared with the current device's hostname and default_domain. If either of these differs from the FQDN in the certificate, then the existing persistent self-signed certificate is replaced with a new one with the updated FQDN. Be aware that the existing keypair is used in the new certificate.
On a switch that support redundancy, the generation of the self-signed certificate is performed independently on the active and the standby supervisor engines. So, the certificates differ. After switchover, the HTTP client that holds the old certificate can not connect to the HTTPS server.
Workaround: Re-connect. (CSCsb11964)
This only affects a switch that has any of the following queues are configured as SPAN source in releases prior to 12.2(31)SG and saved to startup-config. The SPAN destination would not get the same traffic after upgrading to 12.2(31)SG.
Workaround: After upgrading to 12.2(31)SG and later releases, remove the old SPAN source configuration and reconfigure with the new queue names/IDs. For example:
Workaround: None. (CSCsc11726)
This could occur for these reasons:
– A packet requires an IP redirect to an IP unnumbered outgoing port within 3 minutes of booting the Catalyst 4500 series switch.
– This is also seen if the switch administrator enters the shutdown and no shutdown commands on an outgoing interface that has IP unnumbered enabled. The switch receives packets that require redirection and the destination MAC address is already in ARP table.
– Do not inject packets that require IP redirect sent out to an IP unnumbered port within 3 minutes of booting the Catalyst 4500 series switch.
– Configure the correct default gateway on the host side. (CSCse75660)
At this point, if you revert back to the bgp dampening command on the active supervisor engine, the new command is not synchronized with the standby supervisor engine.
Workarounds: Enter the no bgp dampening command, then the bgp dampening command. (CSCse12485)
Workaround: None. (CSCsg58526)
This does not affect performance.
Workaround: Enter the no shutdown command. (CSCsg27395)
Workaround: Remove the transceiver from the new port and place it in the old port. After the SFP is recognized in the old port, remove it slowly and insert it in the new port. (CSCse34693).
Workaround: None. This message is an informational message. (CSCsi60913)
Workaround: None. This is an informational message. (CSCsi60898)
Problem is not observed if the phone is a stand alone device.
Workarounds: Powercycle the Cisco IP phone. (CSCsk81297)
Workaround: Enter the shutdoown and no shutdown commands on the interface after changing the access VLAN on the port. (CSCsk45969)
Workaround: Ensure that the REP Admin VLAN and the RSPAN destination VLAN differ. (CSCso12495)
Workaround: None. (CSCsm30320)
Workaround: Intentionally fail the link between two switches by physically pulling the cable or shutting down the interface. Then, return the links to a normal condition. This is followed by delayed preemption, which you might have already configured. (CSCsm91997)
The support to handle.1Q packets for software QoS lookup unavailable in the Cisco IOS Release 12.2(40)SG release. (CSCsk66449)
One feature combination that can trigger this problem is the attempt to combine a QoS policy that matches on cos bits with IPv6 ACL configuration that matches on IPv6 source addresses that partially mask in the lower 48 bits of the address. (IPv6 subnets in the /81 to /127 range will also trigger this behavior if IPv6 multicast routing is enabled.)
Workaround: Do not configure feature combinations that conflict. Currently the above conflict between QoS policies matching on COS bits and IPv6 configuration with partial masking of the lower 48 bits of the source address is the only known conflicting feature combination. If matching on COS bits is required by the QoS policy, architect the IPv6 network using /80 subnets or larger. (CSCsk79791)
Service policy has to be configured with percentage police or shape or share values and the link speed is forced to a specific values. For example
Workaround: Either use the speed auto 10/100/1000 command or the absolute policer, shape or shape values rather than percentage values. For example,
The first problem occurs on a dual Layer 3 interface where both IPv4 and IPv6 address are configured. The second problem occurs when all Layer 3 interfaces in a switch are configured with IPv6 address only.
Workarounds: Avoid using a dual Layer 3 interface with both IPv6 and IPv4 address configured.
Avoid using a switch as a purely IPv6 Layer 3 interface-only router. Ensure that it has at least one Layer 3 interface per SVI with IPv4 address configured. (CSCsk77234)
Workaround: Before switching a Layer 3 interface from a router port to a switch port, unconfigure the IPv6 ACL on the router interface. This will ensure that the IPv6 ACL is cleaned up properly both in the IOS running configuration as well as in the TCAM hardware. (CSCsk60775)
When an output service-policy is attached to an interface and if the policy is configured to apply DBL on a queue, the flows that are enqueued to the queue are subjected to the DBL algorithm. If one or more flows are classified as belligerent (flows do not back-off in response to drops because of congestion in the queue), those flows continue to be classified as belligerent even when DBL is disabled on that queue.
For this condition to persist, the transmit queues in question must remain congested for a long period of time and that congestion must be caused by flows that remain belligerent.
Workaround: Provided the queue in question is non-default (queuing actions are not configured in the class-default class of the policy-map), detach and re-attach the service-policy.
If this happens on the default queue, modifying and resetting some queuing parameters like bandwidth/shape fixes the issue. (CSCsk62457
Workarounds: Use the show log command to determine the cause of the power-down.
– If the log has LogGalInsufficientFansDetected messages, the cause was a fan-tray failure.
– If the log has LogRkiosModuleShutdownTemp messages, the cause was that the supervisor critical temperature exceeded the failure threshold.
This occurs on all E-series line cards that report critical or shutdown temperature alarms. The actual temperatures and the alarm states are visible in the output of show environment temperature command.
Workarounds: None for LED colors. However, when an alarm is raised or cleared, console log messages and SNMP traps are entered. Also, the current status of any temperature alarms are visible in the output of the show environment temperature command. (CSCsk57143)
Workaround: None. (CSCsh99124)
On a switch running Cisco IOS Release 12.2(40)SG, all MTU values configured on a line card are set to default when the module is reset. Furthermore, MTU values are not retained for modules that are physically moved.
Workaround: None. (CSCsk52542)
Workaround: If non-default duplex settings are in the running config, note them prior to upgrading, and reapply them after the upgrade completes. (CSCsk83670)
Workaround: Reinsert the X2. (CSCsk43618)
Workaround: Re-apply the policy-map. (CSCsk75793
When a packet is sent to the CPU it may get sent out on some other interface. If so, the original COS value for a.1X packet cannot be matched by software QoS (as per CSCsk66449). The packet is transmitted with whatever COS value it was generated with (7, for the MLDv1 packets described here).
Part of the root cause of this problem is captured through CSCsk66449, which indicates that the software QoS cannot match against a.1X packet. (CSCsk72544)
Workaround: None. You cannot explicitly check the trusted boundary state. However, you can indirectly determine this state:
The trusted boundary feature ensures whether the packet’s COS/DSCP value will b e trusted or not. When the interface is not in a trusted state, the COS/DSCP fields are forced to zero on a received packet.
A QoS policy exists on that interface that uses that COS/DSCP value for classification. Therefore, if the packet classification is based on the packet value, you can infer that the interface is in a trusted state. (CSCsh72408)
Currently, if auto-QoS is applied to a port that is already a member of a portchannel, the application is rejected with an error message. However, the reverse is not true. If auto-QoS is applied first and then the port joins a portchannel, the command is accepted.
The following example using port g2/1 shows the type of usage that should be avoided:
This example applies auto-QoS on a port (g2/1) and subsequently makes the port a member of portchannel (10).
Workaround: Do not make a port with auto-QoS enabled a member of a portchannel. (CSCsi95018)
Workaround: Enter the show policy-map interface command to find the actual exceed burst value programmed. (CSCsj44237)
Workaround: Enter the show policy-map interface command to find the actual burst value programmed. (CSCsi71036)
Workaround: Remove the configuration line by line without entering the default interface command. (CSCsj23103)
Workaround: None. However, if you enter the show policy-map name, the unconditional marking actions appear. (CSCsi94144)
Workaround: None. (CSCsl72868)
Workaround: Do one of the following:
– Remove the service-policy from the interface and reapply the configuration through the command [no] service-policy {input|output}.
– Enter shutdown then noshutdown.
The QoS configuration is present in the running configuration but is not honored on the interface.
Workaround: Reapply the QoS configuration to the interface. (CSCsm58839)
Workaround: To ensure that the DBL action operates on the default queue, use the queue-limit command to specify an explicit queue size. The size range is dictated by the queue-limit command. (CSCso06422)
Configuring an inbound routemap on RTR3 to override the nexthop advertised by RTR2 does not avoid this problem because the BGP update message is ignored.
Workaround: Configure a n outbound routemap on RTR2 to explicitly set the IPv4 nexthop rather than allow the protocol to derive it implcitly. (CSCsk65139)
Workaround: None. (CSCso30051)
This behavior occurs in a redundant switch when the ACTIVE supervisor engine is running IOS, the STANDBY supervisor engine is in rommon, and the STANDBY's rommon is upgraded from version 0.34 or to a later version. The upgrade process will cause the uplinks on the STANDBY supervisor engine to go down but the ACTIVE supervisor engine is unaware of this.
Workarounds: To resume normal operation, do one of the following:
– Reload both supervisors with the redundancy reload shelf command.
– Power-cycle the STANDBY supervisor engine by briefly pulling it from the chassis.
There is no workaround for the link flap issue. (CSCsm81875)
Workarounds : Before configuring IPv6 MTU on an interface you must enable IPv6 on the interface. To enable IPv6, use the ipv6 enable command.
If you encounter this enter the following commands to recover your switch:
19. from the rommon prompt, use the confreg command to ignore the startup configuration
20. reset command to reboot your switch
21. copy startup-config running-config command to copy your startup configuration to your running configuration
22. ipv6 enable command to enable IPv6 on the interfaces
23. ipv6 mtu mtu-value command to configure IPv6 MTU on your interface
24. copy running-config startup-config command to save your recovered configuration
25. reload command on the switch to return to Rommon
26. from rommon, use the confreg command to process the startup config
27. reset the switch to resume normal operation. (CSCso42867)
This issue if open in Cisco IOS Releases 12.2(40)SG, 12.2(44)SG and 12.2(46)SG.
This issue is resolved in 12.2(50)SG.
Workaround: Do not use the qos autoqos macro.
When a policy-map is shared on more than one target, it should not use any percentage based actions; police, shape, and bandwidth actions must use absolute values. This requires a different policy-map for each of the four interface speeds supported on the switch - 10M, 100M, 1G, and 10G. So, rather than having a single policy-map as enabled through percentage-based actions, you must create four distinct policy-maps. This applies to all shared policy-maps, independent of direction of service-policy.
Workaround: Do not use the nested policy-map feature in Cisco IOS Release 12.2(40)SG and 12.2(44)SG. (CSCsy80664)
The following conditions may cause a RACL to malfunction:
– ACL are applied on the output direction of the interface.
– IPv6 ACL contain Ace to match on the ICMP option fields (ICMP Type or ICMP Code).
This section lists the resolved caveats in Release 12.2(44)SG:
Workarounds: Before removing the service policy from a ether channel member, remove it from the channel. Then, return it to the channel. (CSCsk70568)
In a queuing QoS policy, there can be zero or more queuing classes that have an explicit, user specified, bandwidth share specified. There can be zero or more queuing classes that do not have such user specified bandwidth share. The system takes the unallocated bandwidth share and allocates it equally among the latter set of classes.
When using percentage-based bandwidth allocation, if the share comes to less than 1%, the queues corresponding to those classes do not get updated in hardware with the new bandwidth share. These queues get more than the expected share of bandwidth.
Workarounds: Ensure that the unallocated bandwidth percentage is at least equal to the number of queues that do not have the explicit bandwidth percentage command. This should include the default as well as priority queues. (CSCsk77757)
a. Un-configure the interface(s) on which this policy-map is attached from the portchannel.
c. Configure the interface(s) in the portchannel.
Similarly, if you Configure auto-QoS on a Layer 3 port, change the port to Layer 2, and then remove auto-QoS on the port, the process does not cleanly remove QoS service policies on the port.
A sequence similar to the following would lead to the problem on port g2/1
Workaround: Revert the port setting to the setting when auto-QoS was applied. If auto-QoS was enabled when the port was a Layer 2 port, it should be reverted to Layer 2 before auto-QoS is removed. Similarly, if the port was set to Layer 3 when auto-QoS was initially applied, it must be reverted to Layer 3 before auto-QoS is removed.
Referring to the problem sequence, first apply auto-QoS to a Layer 2 port, change it to layer 3, then revert to Layer 2 and remove auto-QoS:
Queuing policy is supported on a physical interface in the output direction only.
Workaround: After bootup, reattach a queuing policy on a physical interface. (CSCsk87548)
Workaround: Before deleting the port-channel, do the following:
1. Remove any per-port per-VLAN QoS policies, if any.
2. Remove the VLAN configuration on the port-channel with the no vlan-range command.
Workaround: None. (CSCsk45940)
Workaround: If you plan to change a class-map action, such as exceed-action, you meed to remove the class-map with the no class c1 command under policy-map submode. Then, apply the new class-map with the updated changes.
Cisco has released free software updates that address this vulnerability.
Aside from disabling affected services, there are no available workarounds to mitigate an exploit of this vulnerability.
This advisory is posted at
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20080924-ssl
Cisco has released free software updates that address this vulnerability.
This advisory is posted at
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20080924-mfi
This section lists the open caveats in Cisco IOS Release 12.2(40)SG:
Workaround: When using the access-list N permit host hostname command, specify the IP address of the host rather than the hostname (CSCef67489)
Workaround: Verify that the MAC addresses being transmitted through the system are learned.
Workaround: None. (CSCeg48586)
– If such a certificate does not exist and the device's hostname and default_domain have been set, then a persistent self-signed certificate is generated.
– If such a certificate exists, the FQDN in the certificate is compared with the current device's hostname and default_domain. If either of these differs from the FQDN in the certificate, then the existing persistent self-signed certificate is replaced with a new one with the updated FQDN. Be aware that the existing keypair is used in the new certificate.
On a switch that support redundancy, the generation of the self-signed certificate is performed independently on the active and the standby supervisor engines. So, the certificates differ. After switchover, the HTTP client that holds the old certificate can not connect to the HTTPS server.
Workaround: Re-connect. (CSCsb11964)
This only affects a switch that has any of the following queues are configured as SPAN source in releases prior to 12.2(31)SG and saved to startup-config. The SPAN destination would not get the same traffic after upgrading to 12.2(31)SG.
Workaround: After upgrading to 12.2(31)SG and later releases, remove the old SPAN source configuration and reconfigure with the new queue names/IDs. For example:
Workaround: None. (CSCsc11726)
This could occur for these reasons:
– A packet requires an IP redirect to an IP unnumbered outgoing port within 3 minutes of booting the Catalyst 4500 series switch.
– This is also seen if the switch administrator enters the shutdown and no shutdown commands on an outgoing interface that has IP unnumbered enabled. The switch receives packets that require redirection and the destination MAC address is already in ARP table.
– Do not inject packets that require IP redirect sent out to an IP unnumbered port within 3 minutes of booting the Catalyst 4500 series switch.
– Configure the correct default gateway on the host side. (CSCse75660)
At this point, if you revert back to the bgp dampening command on the active supervisor engine, the new command is not synchronized with the standby supervisor engine.
Workarounds: Enter the no bgp dampening command, then the bgp dampening command. (CSCse12485)
Workaround: None. (CSCsg58526)
This does not affect performance.
Workaround: Enter the no shutdown command. (CSCsg27395)
Workaround: Remove the transceiver from the new port and place it in the old port. After the SFP is recognized in the old port, remove it slowly and insert it in the new port. (CSCse34693).
Workaround: None. This message is an informational message. (CSCsi60913)
Workaround: None. This is an informational message. (CSCsi60898)
The support to handle.1Q packets for software QoS lookup unavailable in the Cisco IOS Release 12.2(40)SG release. (CSCsk66449)
Workarounds: Before removing the service policy from a ether channel member, remove it from the channel. Then, return it to the channel. (CSCsk70568)
In a queuing QoS policy, there can be zero or more queuing classes that have an explicit, user specified, bandwidth share specified. There can be zero or more queuing classes that do not have such user specified bandwidth share. The system takes the unallocated bandwidth share and allocates it equally among the latter set of classes.
When using percentage-based bandwidth allocation, if the share comes to less than 1%, the queues corresponding to those classes do not get updated in hardware with the new bandwidth share. These queues get more than the expected share of bandwidth.
Workarounds: Ensure that the unallocated bandwidth percentage is at least equal to the number of queues that do not have the explicit bandwidth percentage command. This should include the default as well as priority queues. (CSCsk77757)
One feature combination that can trigger this problem is the attempt to combine a QoS policy that matches on cos bits with IPv6 ACL configuration that matches on IPv6 source addresses that partially mask in the lower 48 bits of the address. (IPv6 subnets in the /81 to /127 range will also trigger this behavior if IPv6 multicast routing is enabled.)
Workaround: Do not configure feature combinations that conflict. Currently the above conflict between QoS policies matching on COS bits and IPv6 configuration with partial masking of the lower 48 bits of the source address is the only known conflicting feature combination. If matching on COS bits is required by the QoS policy, architect the IPv6 network using /80 subnets or larger. (CSCsk79791)
Service policy has to be configured with percentage police or shape or share values and the link speed is forced to a specific values. For example
Workaround: Either use the speed auto 10/100/1000 command or the absolute policer, shape or shape values rather than percentage values. For example,
The first problem occurs on a dual Layer 3 interface where both IPv4 and IPv6 address are configured. The second problem occurs when all Layer 3 interfaces in a switch are configured with IPv6 address only.
Workarounds: Avoid using a dual Layer 3 interface with both IPv6 and IPv4 address configured.
Avoid using a switch as a purely IPv6 Layer 3 interface-only router. Ensure that it has at least one Layer 3 interface per SVI with IPv4 address configured. (CSCsk77234)
Workaround: Before switching a Layer 3 interface from a router port to a switch port, unconfigure the IPv6 ACL on the router interface. This will ensure that the IPv6 ACL is cleaned up properly both in the IOS running configuration as well as in the TCAM hardware. (CSCsk60775)
When an output service-policy is attached to an interface and if the policy is configured to apply DBL on a queue, the flows that are enqueued to the queue are subjected to the DBL algorithm. If one or more flows are classified as belligerent (flows do not back-off in response to drops because of congestion in the queue), those flows continue to be classified as belligerent even when DBL is disabled on that queue.
For this condition to persist, the transmit queues in question must remain congested for a long period of time and that congestion must be caused by flows that remain belligerent.
Workaround: Provided the queue in question is non-default (queuing actions are not configured in the class-default class of the policy-map), detach and re-attach the service-policy.
If this happens on the default queue, modifying and resetting some queuing parameters like bandwidth/shape fixes the issue. (CSCsk62457
Workarounds: Use the show log command to determine the cause of the power-down.
– If the log has LogGalInsufficientFansDetected messages, the cause was a fan-tray failure.
– If the log has LogRkiosModuleShutdownTemp messages, the cause was that the supervisor critical temperature exceeded the failure threshold.
This occurs on all E-series line cards that report critical or shutdown temperature alarms. The actual temperatures and the alarm states are visible in the output of show environment temperature command.
Workarounds: None for LED colors. However, when an alarm is raised or cleared, console log messages and SNMP traps are issued. Also, the current status of any temperature alarms are visible in the output of the show environment temperature command. (CSCsk57143)
In this scenario, until the hardware is programmed with a new configuration (Detach -> Attach), non-default queues are inactive. So, until these queues are activated, traffic matching these non-default queues is dropped.
Workarounds: None. (CSCsk85379)
a. Un-configure the interface(s) on which this policy-map is attached from the portchannel.
c. Configure the interface(s) in the portchannel.
Workaround: None. (CSCsh99124)
On a switch running Cisco IOS Release 12.2(40)SG, all MTU values configured on a line card are set to default when the module is reset. Furthermore, MTU values are not retained for modules that are physically moved.
Workaround: None. (CSCsk52542)
Workaround: If non-default duplex settings are in the running config, note them prior to upgrading, and reapply them after the upgrade completes. (CSCsk83670)
Workaround: Reinsert the X2. (CSCsk43618)
Workaround: Re-apply the policy-map. (CSCsk75793
When a packet is sent to the CPU it may get sent out on some other interface. If so, the original COS value for a.1X packet cannot be matched by software QoS (as per CSCsk66449). The packet is transmitted with whatever COS value it was generated with (7, for the MLDv1 packets described here).
Part of the root cause of this problem is captured through CSCsk66449, which indicates that the software QoS cannot match against a.1X packet. (CSCsk72544)
Workaround: None. You cannot explicitly check the trusted boundary state. However, you can indirectly determine this state:
The trusted boundary feature ensures whether the packet’s COS/DSCP value will b e trusted or not. When the interface is not in a trusted state, the COS/DSCP fields are forced to zero on a received packet.
A QoS policy exists on that interface that uses that COS/DSCP value for classification. Therefore, if the packet classification is based on the packet value, you can infer that the interface is in a trusted state. (CSCsh72408)
Currently, if auto-QoS is applied to a port that is already a member of a portchannel, the application is rejected with an error message. However, the reverse is not true. If auto-QoS is applied first and then the port joins a portchannel, the command is accepted.
The following example using port g2/1 shows the type of usage that should be avoided:
This example applies auto-QoS on a port (g2/1) and subsequently makes the port a member of portchannel (10).
Workaround: Do not make a port with auto-QoS enabled a member of a portchannel. (CSCsi95018)
Similarly, if you Configure auto-QoS on a Layer 3 port, change the port to Layer 2, and then remove auto-QoS on the port, the process does not cleanly remove QoS service policies on the port.
A sequence similar to the following would lead to the problem on port g2/1
Workaround: Revert the port setting to the setting when auto-QoS was applied. If auto-QoS was enabled when the port was a Layer 2 port, it should be reverted to Layer 2 before auto-QoS is removed. Similarly, if the port was set to Layer 3 when auto-QoS was initially applied, it must be reverted to Layer 3 before auto-QoS is removed.
Referring to the problem sequence, first apply auto-QoS to a Layer 2 port, change it to layer 3, then revert to Layer 2 and remove auto-QoS:
Workaround: If you plan to change a class-map action, such as exceed-action, you meed to remove the class-map with the no class c1 command under policy-map submode. Then, apply the new class-map with the updated changes.
Workaround: Avoid creating a VLAN that has been allocated internally to a routed port. (CSCsh60244)
Workaround: Enter the show policy-map interface command. (CSCsj44237)
Workaround: Enter the show policy-map interface command. (CSCsi71036)
Queuing policy is supported on a physical interface in the output direction only.
Workaround: After bootup, reattach a queuing policy on a physical interface. (CSCsk87548)
Workaround: Before deleting the port-channel, do the following:
1. Remove any per-port per-VLAN QoS policies, if any.
2. Remove the VLAN configuration on the port-channel with the no vlan-range command.
Workaround: None. (CSCsk45940)
Workaround: Remove the configuration line by line without entering the default interface command. (CSCsj23103)
Workaround: None. However, if you enter the show policy-map name, the unconditional marking actions appear. (CSCsi94144)
Workaround: None. (CSCsl72868)
This issue if open in Cisco IOS Releases 12.2(40)SG, 12.2(44)SG and 12.2(46)SG.
This issue is resolved in 12.2(50)SG.
Workaround: Do not use the qos autoqos macro.
When a policy-map is shared on more than one target, it should not use any percentage based actions; police, shape, and bandwidth actions must use absolute values. This requires a different policy-map for each of the four interface speeds supported on the switch - 10M, 100M, 1G, and 10G. So, rather than having a single policy-map as enabled through percentage-based actions, you must create four distinct policy-maps. This applies to all shared policy-maps, independent of direction of service-policy.
Workaround: Do not use the nested policy-map feature in Cisco IOS Release 12.2(40)SG and 12.2(44)SG. (CSCsy80664)
The following conditions may cause a RACL to malfunction:
– ACL are applied on the output direction of the interface.
– IPv6 ACL contain Ace to match on the ICMP option fields (ICMP Type or ICMP Code).
This section lists the resolved caveats in Release 12.2(40)SG:
– Use a different copy protocol.
Workaround: Enter shut/no shut on the port to authorize the PC correctly. (CSCsi31362
The traffic loss only occurs when the interfaces, which the traffic travel through, are configured with HSRP and currently in HSRP Active state.
Workaround: None. (CSCsi40980)
Workaround: None. These are informative messages. (CSCsj89384)
Workaround: Re-apply user credentials with the snmp-server user command.
Cisco has released free software updates that address this vulnerability. Workarounds that mitigate this vulnerability are available.
This advisory is posted at
http://www.cisco.com/en/US/products/csa/cisco-sa-20080326-mvpn.html
These sections provide troubleshooting guidelines for the Catalyst 4000 family running IOS supervisor engines:
Netbooting using a boot loader image is not supported. Instead, use one of the following options to boot an image:
1. Boot from a CompactFlash card by entering the following command:
The ROMMON TFTP boot is very similar to the BOOTLDR TFTP boot, except that:
– the BOOTLDR variable should not be set
– the TFTP server must be accessible from the Ethernet management port on the supervisor engine.
To boot from ROMMON, perform the following tasks while in ROMMON mode:
a. Ensure that the Ethernet management port on the supervisor engine is physically connected to the network.
b. Verify that bootloader environment is not set by entering the unset bootldr command.
c. Set IP address of the Ethernet management port on the supervisor engine by entering the following command: set interface fa1 ip_address > < ip_mask
For example, to set the supervisor engine Ethernet port with an IP address 172.16.1.5 and IP mask 255.255.255.0, enter the following command:
d. Set default gateway for the Ethernet management port on the supervisor engine by entering the following command: set ip route default gateway_ip_address. The default gateway should be directly connected to the supervisor engine Ethernet management port subnet.
e. Ping the TFTP server to ensure that there is connectivity to the server from the Ethernet management port on the supervisor engine by entering the following command: ping < tftp_server_ip_address >.
f. Once the ping is successful, boot the image from the TFTP server by entering the following command: boot tftp:// tftp_server_ip_address > / < image_path_and_file_name
For example, to boot the image name cat4000-is-mz.160 located on the TFTP server 172.16.1.8, enter the following command:
This section contains troubleshooting guidelines for system-level problems:
This section contains troubleshooting guidelines for modules:
For general information on MIBs, RMON groups, and traps, refer to the Cisco public MIB directory ( http://www.cisco.com/public/sw-center/netmgmt/cmtk/mibs.shtml). For information on the specific MIBs supported by the Catalyst 4500 series switches, refer to the Catalyst 4000 MIB Support List located at ftp://ftp.cisco.com/pub/mibs/supportlists/cat4000/cat4000-supportlist.html.
Although their Release Notes are unique, the 4 platforms (Catalyst 4500, Catalyst 4900, Catalyst ME 4900, and Catalyst 4900M) use the same Software Configuration Guide, Command Reference Guide, and System Message Guide. Refer to the following home pages for additional information:
http://www.cisco.com/go/cat4500/docs
http://www.cisco.com/go/cat4900/docs
http://www.cisco.com/en/US/products/ps7009/tsd_products_support_series_home.html
Installation guides and notes including specifications and relevant safety information are available at the following URLs:
http://www.cisco.com/en/US/docs/switches/lan/catalyst4500/hardware/installation/guide/78-14409-08/4500inst.html
http://www.cisco.com/en/US/docs/switches/lan/catalyst4500/hardware/catalyst4500e/installation/guide/Eseries.html
http://www.cisco.com/en/US/products/hw/switches/ps4324/prod_installation_guides_list.html
http://www.cisco.com/en/US/docs/switches/lan/catalyst4500/hardware/regulatory/compliance/78_13233.html
http://www.cisco.com/en/US/products/hw/switches/ps4324/prod_installation_guides_list.html
http://www.cisco.com/en/US/products/ps6021/prod_installation_guides_list.html
http://www.cisco.com/en/US/products/ps7009/prod_installation_guides_list.html
Software release notes, configuration guides, command references, and system message guides are available at the following URLs:
http://www.cisco.com/en/US/products/hw/switches/ps4324/prod_release_notes_list.html
http://www.cisco.com/en/US/products/ps6021/prod_release_notes_list.html
http://www.cisco.com/en/US/docs/switches/lan/catalyst4500/release/note/OL_11511.html
Software documents for the Catalyst 4500 Classic, Catalyst 4500 E-Series, Catalyst 4900, and
Cisco ME 4900 Series Ethernet Switches are available at the following URLs:
http://www.cisco.com/en/US/products/hw/switches/ps4324/products_installation_and_configuration_guides_list.html
http://www.cisco.com/en/US/products/hw/switches/ps4324/prod_command_reference_list.html
http://www.cisco.com/en/US/products/hw/switches/ps4324/products_system_message_guides_list.html
Platform-independent Cisco IOS documentation may also apply to the Catalyst 4500 and 4900 switches. These documents are available at the following URLs:
http://www.cisco.com/en/US/products/ps6350/products_installation_and_configuration_guides_list.html
http://www.cisco.com/en/US/products/ps6350/prod_command_reference_list.html
You can also use the Command Lookup Tool at:
http://tools.cisco.com/Support/CLILookup/cltSearchAction.do
http://www.cisco.com/en/US/products/ps6350/products_system_message_guides_list.html
You can also use the Error Message Decoder tool at:
http://www.cisco.com/pcgi-bin/Support/Errordecoder/index.cgi
http://www.cisco.com/public/sw-center/netmgmt/cmtk/mibs.shtml
The following notices pertain to this software license.
This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit ( http://www.openssl.org/).
This product includes cryptographic software written by Eric Young (eay@cryptsoft.com).
This product includes software written by Tim Hudson (tjh@cryptsoft.com).
The OpenSSL toolkit stays under a dual license, i.e. both the conditions of the OpenSSL License and the original SSLeay license apply to the toolkit. See below for the actual license texts. Actually both licenses are BSD-style Open Source licenses. In case of any license issues related to OpenSSL please contact openssl-core@openssl.org.
Copyright © 1998-2007 The OpenSSL Project. All rights reserved.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:
1. Redistributions of source code must retain the copyright notice, this list of conditions and the following disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions, and the following disclaimer in the documentation or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgment: “This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit ( http://www.openssl.org/)”.
4. The names “OpenSSL Toolkit” and “OpenSSL Project” must not be used to endorse or promote products derived from this software without prior written permission. For written permission, please contact openssl-core@openssl.org.
5. Products derived from this software may not be called “OpenSSL” nor may “OpenSSL” appear in their names without prior written permission of the OpenSSL Project.
6. Redistributions of any form whatsoever must retain the following acknowledgment:
“This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit ( http://www.openssl.org/)”.
THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT “AS IS”' AND ANY EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
This product includes cryptographic software written by Eric Young (eay@cryptsoft.com). This product includes software written by Tim Hudson (tjh@cryptsoft.com).
Copyright © 1995-1998 Eric Young (eay@cryptsoft.com). All rights reserved.
This package is an SSL implementation written by Eric Young (eay@cryptsoft.com).
The implementation was written so as to conform with Netscapes SSL.
This library is free for commercial and non-commercial use as long as the following conditions are adhered to. The following conditions apply to all code found in this distribution, be it the RC4, RSA, lhash, DES, etc., code; not just the SSL code. The SSL documentation included with this distribution is covered by the same copyright terms except that the holder is Tim Hudson (tjh@cryptsoft.com).
Copyright remains Eric Young’s, and as such any Copyright notices in the code are not to be removed. If this package is used in a product, Eric Young should be given attribution as the author of the parts of the library used. This can be in the form of a textual message at program startup or in documentation (online or textual) provided with the package.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:
1. Redistributions of source code must retain the copyright notice, this list of conditions and the following disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
“This product includes cryptographic software written by Eric Young (eay@cryptsoft.com)”.
The word ‘cryptographic’ can be left out if the routines from the library being used are not cryptography-related.
4. If you include any Windows specific code (or a derivative thereof) from the apps directory (application code) you must include an acknowledgement: “This product includes software written by Tim Hudson (tjh@cryptsoft.com)”.
THIS SOFTWARE IS PROVIDED BY ERIC YOUNG “AS IS” AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
The license and distribution terms for any publicly available version or derivative of this code cannot be changed. i.e. this code cannot simply be copied and put under another distribution license [including the GNU Public License].
For information on obtaining documentation, submitting a service request, and gathering additional information, see the monthly What’s New in Cisco Product Documentation, which also lists all new and revised Cisco technical documentation, at:
http://www.cisco.com/en/US/docs/general/whatsnew/whatsnew.html
Subscribe to the What’s New in Cisco Product Documentation as a Really Simple Syndication (RSS) feed and set content to be delivered directly to your desktop using a reader application. The RSS feeds are a free service and Cisco currently supports RSS Version 2.0.