Release Notes for theCatalyst 4500 Series Switch, Cisco IOS Releases 15.0(2)SG
Cisco IOS Software Packaging for the Cisco Catalyst 4500 Series Switch
Feature Support on the LAN Base vs IP Base Images
Features Unique to Supervisor Engines 6-E and 6L-E
Cisco Classic IOS Release Strategy for theCatalyst 4500 Series Switch
Cisco IOS Software Migration Guide
Supported Hardware on Catalyst 4500 Series Switch
Supported Hardware on Catalyst 4500 E-Series Switch
New Hardware Features in Release15.0(2)SG1
New Software Features in Release15.0(2)SG1
New Hardware Features in Release15.0(2)SG
New Software Features in Release15.0(2)SG
Identifying an +E Chassis and ROMMON
Guidelines for Upgrading the ROMMON
Upgrading the Supervisor Engine ROMMON from the Console
Upgrading the Supervisor Engine ROMMON Remotely Using Telnet
Upgrading the Cisco IOS Software
For Supervisor Engines II+Plus through V-10GE
For Supervisor Engine 6-E and Supervisor Engine 6L-E
Resolved Caveats in Cisco IOS Release 15.0(2)SG11
Open Caveats for Cisco IOS Release 15.0(2)SG10
Resolved Caveats in Cisco IOS Release 15.0(2)SG10
Resolved Caveats for Cisco IOS Release 15.0(2)SG9
Resolved Caveats in Cisco IOS Release 15.0(2)SG8
Open Caveats for Cisco IOS Release 15.0(2)SG6
Resolved Caveats in Cisco IOS Release 15.0(2)SG6
Open Caveats for Cisco IOS Release 15.0(2)SG5
Resolved Caveats in Cisco IOS Release 15.0(2)SG5
Open Caveats for Cisco IOS Release 15.0(2)SG4
Resolved Caveats in Cisco IOS Release 15.0(2)SG4
Open Caveats for Cisco IOS Release 15.0(2)SG3
Resolved Caveats in Cisco IOS Release 15.0(2)SG3
Open Caveats for Cisco IOS Release 15.0(2)SG2
Resolved Caveats in Cisco IOS Release 15.0(2)SG2
Open Caveats for Cisco IOS Release 15.0(2)SG1
Resolved Caveats in Cisco IOS Release 15.0(2)SG1
Open Caveats for Cisco IOS Release 15.0(2)SG
Resolved Caveats in Cisco IOS Release 15.0(2)SG
Troubleshooting at the System Level
Obtaining Documentation and Submitting a Service Request
Current Release
15.0(2)SG11—October 18, 2016
Prior Release
15.0(2)SG10, 15.0(2)SG9, 15.0(2)SG8, 15.0(2)SG6, 15.0(2)SG5, 15.0(2)SG4, 15.0(2)SG3, 15.0(2)SG2, 15.0(2)SG1, 15.0(2)SG
These release notes describe the features, modifications, and caveats for Cisco IOS Release 15.0(2)SG on the Catalyst 4500 series switch.
Support for Cisco IOS Software Release 15.0(2)SG, the default image, follows the standard Cisco Systems® support policy, available at
http://www.cisco.com/en/US/products/products_end-of-life_policy.html
Note Although their Release Notes are unique, the 4 platforms (Catalyst 4500, Catalyst 4900,
Catalyst ME 4900, and Catalyst 4900M/4948E) use the same Software Configuration Guide, Command Reference Guide, and System Message Guide.
For more information on the Catalyst 4500 series switches, visit the following URL:
http://www.cisco.com/go/cat4500/docs
This publication consists of these sections:
The Enterprise Services image supports all Cisco Catalyst 4500 Series software features based on Cisco IOS Software, including enhanced routing. Customers planning to enable BGP for Supervisor Engine IV, V, or V-10GE will no longer need to purchase a separate BGP license (FR-IRC4) because BGP is included in the Enterprise Services package. Beginning with 12.2(53)SG2, we support the Enterprise Services image on Supervisor Engine 6L-E.
The IP Base image supports Open Shortest Path First (OSPF) for Routed Access and Enhanced Interior Gateway Routing Protocol (EIGRP) "limited" Stub Routing, and RIPv1/v2. The IP Base image does not support enhanced routing features such as Nonstop Forwarding/Stateful Switchover (NSF/SSO), BGP, Intermediate System-to-Intermediate System (IS-IS), Internetwork Packet Exchange (IPX), AppleTalk, Virtual Routing Forwarding (VRF-lite), GLBP, and policy-based routing (PBR).
Cisco IOS Release 12.2(46)SG1 introduced a new LAN Base software and an IP upgrade image. These complement the existing IP Base and Enterprise Services images. The LAN base image is supported on the Supervisor Engine II-Plus-10GE and Supervisor Engine 6L-E starting with Cisco IOS Release 12.2(52)XO. LAN Base image is primarily focused on customer access and Layer 2 requirements and therefore many of the IP Base features are not required. The IP upgrade image is available if at a later date you require some of those features.
Starting with Cisco IOS Release 15.0(2)SG, on the Catalyst 4500 Series Switch, support for NEAT feature has been extended from IP Base to LAN Base and support for HSRP v2 IPV6 has been extended from Enterprise Services to IP Base.
Table 1 is a detailed list of features supported on Catalyst 4500 Series Switch running Cisco IOS Software Release 15.0(2)SG. For the full list of supported features, check the Feature Navigator application:
http://tools.cisco.com/ITDIT/CFN/
For information on MiBs support, please refer to this URL:
http://ftp.cisco.com/pub/mibs/supportlists/cat4000/cat4000-supportlist.html
Crashdump Enhancement1 |
|||
Ethernet Management Port (Fa1 interface)2 |
|||
IEEE 802.1ag D8.1 standard Compliant CFM, Y.1731 multicast LBM / AIS / RDI / LCK, IP SLA for Ethernet |
|||
IEEE 802.1s - Multiple Spanning Tree (MST) Standard Compliance |
|||
IEEE 802.3ad Link Aggregation (LACP) Port-Channel Standalone Disable |
|||
IPv6 Multicast: Multicast Listener Discovery (MLD) Protocol, Versions 1 and 2 |
|||
NEAT Enhancement: Re-Enabling BPDU Guard Based on User Configuration |
|||
Yes3 |
|||
Yes4 |
|||
Yes5 |
|||
Yes6 |
|||
Yes7 |
|||
Yes8 |
|||
Yes9 |
|||
Yes10 |
|||
Yes11 |
|||
Yes12 |
|||
Yes13 |
|||
Yes14 |
|||
RADIUS Attribute 44 (Accounting Session ID) in Access Requests |
|||
Source Specific Multicast (SSM) - IGMPv3,IGMP v3lite, and URD |
|||
Note You can purchase a special license to enable the 10 Gigabit uplinks in the LAN Base image without moving to IP Base.
With Cisco IOS Release 15.0(2)SG, the following features are available only with
Supervisor Engine 6-E and Supervisor Engine 6L-E:
– IPv6 Addressing Architecture
– DNS resolver for AAAA over an IPv4 transport
– DNS resolver for AAAA over an IPv6 transport
– ISATAP (supported in software only)
– MLD Snooping (supported in software and hardware on Catalyst 4900M, Catalyst 4948E, Supervisor Engine 6-E, and Catalyst 6L-E)
– Two Rate three Color Policing
– Table map support for marking
– Class based queuing actions (shaping/bandwidth/queue-limit/dbl/strict priority)
For all Supervisor Engines (II-Plus thru 6-E), the following features are not supported in Cisco IOS Release 15.0(2)SG for the Catalyst 4500 series switches:
– Standard Xerox Network System (XNS) access list
– Protocol type-code access list
– <1200-1299> IPX summary address access list
Cisco IOS Release 15.0SG train offers the latest features for the Catalyst 4500 Series supervisor engines. If you need the latest hardware support and software features you should migrate to Cisco IOS Release 15.0(2)SG.
Catalyst 4500 Series has two maintenance trains. Cisco IOS Release 12.2(53)SG4 is the recommended release for customers who require a release with a maintenance train. This release includes support for the WS-X45-Sup6L-E supervisor engine and OSPF for routed Access. Cisco IOS Release 15.0(2)SG is the latest maintenance train base.
For more information on the Catalyst 4500 series switches, visit the following URL:
http://www.cisco.com/go/cat4500/docs
Figure 1 displays the two active trains, 12.2(53)SG and 15.0(2)SG.
Figure 1 Software Release Strategy for the Catalyst 4500 Series Switch
Support for Cisco IOS Software Release 15.0(2)SG follows the standard Cisco Systems® support policy, available at
http://www.cisco.com/en/US/products/products_end-of-life_policy.html
This section describes the system requirements:
Table 3 lists the hardware supported on the Catalyst 4500 Series Switch.
For Catalyst 4500 transciever module compatibility information, see the URL:
http://www.cisco.com/en/US/products/hw/modules/ps5455/products_device_support_tables_list.html
Table 4 briefly describes the four chassis in the Catalyst 4500 Series Switch. For the chassis listed in the table, refer to Table 7 for software release information.
In addition to the classic line cards and supervisor engines, Cisco IOS Software Release 15.0(2)SG supports the next-generation high-performance E-Series Supervisor Engine 6-E with CenterFlex technology and E-Series line cards and chassis. A brief list of primary E-Series hardware supported on Catalyst 4500 series switch ( Table 6 ).
Table 7 outlines the chassis and supervisor engine compatibility.
(M=Minimum release, R=Recommended release)
These sections describe the new and changed information for the Catalyst 4500 series switch running Cisco IOS software:
Release 15.0(2)SG1 provides no new hardware on the Catalyst 4500 series switch.
Release 15.0(2)SG1 provides the following new software feature on the Catalyst 4500 series switch.
Release 15.0(2)SG provides the following new hardware on the Catalyst 4500 series switch:
– DWDM-SFP-6141= (Cisco 1000BASE-DWDM SFP 1561.42 nm)
– DWDM-SFP-5736= (Cisco 1000BASE-DWDM SFP 1557.36 nm)
– DWDM-SFP-5332= (Cisco 1000BASE-DWDM SFP 1553.33 nm)
– DWDM-SFP-4931= (Cisco 1000BASE-DWDM SFP 1549.32 nm)
– DWDM-SFP-4532= (Cisco 1000BASE-DWDM SFP 1545.32 nm)
– DWDM-SFP-4134= (Cisco 1000BASE-DWDM SFP 1541.35 nm)
Release 15.0(2)SG provides the following new software features on the Catalyst 4500 series switch.
For information on the reporting issue, refer to the following URL:
http://www.cisco.com/en/US/docs/ios/ netmgmt/configuration/guide/nm_cdp_discover.html
For information on configuring CDP Location TLV, refer to the following URL:
http://www.cisco.com/en/US/docs/ios/ netmgmt/configuration/guide/nm_cdp_discover.html
In most cases, upgrading the switch to a newer release of Cisco IOS software does not require a ROMMON upgrade. However, if you are running an early release of Cisco IOS software and plan to upgrade, refer to the following tables for the minimum Cisco IOS image and the recommended ROMMON release, respectively.
Note You must upgrade to at leaset ROMMON Release 12.2(44r)SG5 to run Cisco IOS Release 15.0(2)SG on the Supervisor Engine 6-E and Supervisor Engine 6L-E. 12.2(44r)SG9 is recommended.
The following sections describe how to upgrade your switch software:
An +E chassis is identified by a FRU minor value in the chassis' idprom.
When supervisor engine 1 (sup1) is in ROMMON and supervisor engine 2 (sup2) is in IOS, only sup2 can read the idprom contents of chassis’ idprom. Chassis type is displayed as “+E” in the output of the show version command. Conversely, sup1 can only display the chassis type as “E.”
When both sup1 and sup2 are in ROMMON, both engines can read the chassis’ idprom. Chassis type is displayed correctly as “+E” in the output of the show version command.
When both sup1 and sup2 are in IOS, both engines can read the chassis’ idprom. Chassis type is displayed correctly as “+E” in the output of the show version command.
Note The examples in this section use the programmable read-only memory (PROM) upgrade version 12.2(44r)SG9 and Cisco IOS Release 12.2(50)SG. For other software releases, replace the ROMMON release and Cisco IOS software release with the appropriate release and filename. This document describes the procedure for a single supervisor engine system. In a dual supervisor engine system, you must perform the process on each supervisor engine.
Follow this procedure to upgrade your supervisor engine ROMMON:
Step 1 Directly connect a serial cable to the console port of the supervisor engine.
Note This section assumes that the console baud rate is set to 9600 (default). If you want to use a different baud rate, change the configuration register value for your switch.
Step 2 Download the cat4500-e-ios-promupgrade-122_44r_SG9 program from Cisco.com, and place it on a TFTP server in a directory that is accessible from the switch to be upgraded.
The cat4500-e-ios-promupgrade-122_44r_SG9 program is available on Cisco.com at the same location from which Catalyst 4500 system images are downloaded.
Step 3 Use the dir bootflash: command to ensure that sufficient space exists in Flash memory to store the PROM upgrade image. If you are using a CompactFlash card, replace bootflash: with slot0:
Note Because of CSCsu36751, you should use bootflash for this upgrade if your current ROMMON version is prior to 12.2(44r)SG3. Else, you might need to reseat the compact flash after rebooting.
Step 4 Download the cat4500-e-ios-promupgrade-122_44r_SG9 program into Flash memory using the copy tftp command.
The following example shows how to download the PROM upgrade image cat4500-e-ios-promupgrade-122_44r_SG9 from the remote host 172.20.58.78 to bootflash:
Step 5 On a dual-supervisor system, copy the same ROMMON image to the standby supervisor engine with the copy bootflash:cat4500-e-ios-promupgrade-122_44r_SG9 slavebootflash command
Step 6 Enter the reload command to reset the switch, press Ctrl-C to stop the boot process, and re-enter ROMMON.
Note On a redundant system, this action causes a switchover.
The following example shows the output after a reset into ROMMON:
Step 7 Run the PROM upgrade program by entering this command:
boot bootflash:cat4500-e-ios-promupgrade-122_44r_SG9
The following example shows the output from a successful upgrade, followed by a system reset:
Step 8 Boot the Cisco IOS software image. This may happen automatically if the system is configured to auto-boot.
Step 9 On a redundant system, hook up a console to the now-active supervisor engine. After the system achieves an SSO state, repeat steps 6-8.
Step 10 Use the show module command to verify that you have upgraded the ROMMON:
Step 11 Use the delete command on the active supervisor to delete the PROM upgrade program from bootflash
The following example shows how to delete the cat4500-e-ios-promupgrade-122_44r_SG9 image from bootflash:
Step 12 On a redundant system, also delete the upgrade file from the standby supervisor engine:
The ROMMON has now been upgraded.
See the “Upgrading the Cisco IOS Software” section for instructions on how to upgrade the Cisco IOS software on your switch.
Follow this procedure to upgrade your supervisor engine ROMMON to Release 12.2(44r)SG9. This procedure can be used when console access is not available and when the ROMMON upgrade must be performed remotely.
Note In the following section, use the PROM upgrade version bootflash:cat4500-e-ios-promupgrade-122_44r_SG9.
Step 1 Establish a Telnet session to the supervisor engine.
Note In the following discussion, we assume that at least one IP address has been assigned to either an SVI or a routed port.
Step 2 Download the bootflash:cat4500-e-ios-promupgrade-122_44r_SG9 program from Cisco.com, and place it on a TFTP server in a directory that is accessible from the switch to be upgraded.
The bootflash:cat4500-e-ios-promupgrade-122_44r_SG9 programs are available on Cisco.com at the same location from which you download Catalyst 4500 system images.
Step 3 Use the dir bootflash: command to ensure that there is sufficient space in Flash memory to store the PROM upgrade image. If there is insufficient space, delete one or more images, and then enter the
squeeze bootflash: command to reclaim the space.
If you are using a CompactFlash card, replace bootflash: with slot0:.
Step 4 Download the bootflash:cat4500-e-ios-promupgrade-122_44r_SG9 program into Flash memory using the copy tftp command.
The following example shows how to download the PROM upgrade image bootflash:cat4500-e-ios-promupgrade-122_44r_SG9 from the remote host 172.20.58.78 to bootflash:
Step 5 Use the no boot system flash bootflash: file_name command to clear all BOOT variable commands in the configuration file. In this example, the BOOT variable was set to boot the image cat4000-i5s-mz.121-19.EW1.bin from bootflash:
Note The config-register must be set to autoboot.
Step 6 Use the show bootvar command to verify the boot string. The BOOT variable in this example will first run the PROM upgrade to upgrade ROMMON. Then, the upgrade software will reload and the supervisor engine will load the Cisco IOS software image.
Step 7 Run the PROM upgrade program by issuing the reload command. Issuing this command will terminate your Telnet session.
The following example shows the console port output from a successful ROMMON upgrade followed by a system reset. Your Telnet session is disconnected during the ROMMON upgrade, so you will not see this output. This step could take 2-3 minutes to complete. You will need to reconnect your Telnet session after 2-3 minutes when the Cisco IOS software image and the interfaces are loaded.
Step 8 Use the no boot system flash bootflash: file_name command to clear the BOOT command used to upgrade the ROMMON.
Step 9 Use the show version command to verify that the ROMMON has been upgraded.
Step 10 Use the delete command to delete the PROM upgrade program from bootflash and the squeeze command to reclaim unused space.
The following example shows how to delete the cat4000-ios-promupgrade-121_20r_EW1 image from bootflash and reclaim unused space:
Step 11 Use the show bootvar command to verify that the ROMMON upgrade program has been removed from the BOOT variable.
The ROMMON has now been upgraded.
See the “Upgrading the Cisco IOS Software” section for instructions on how to upgrade the Cisco IOS software on your switch.
Before you proceed, observe the following rules for hostname:
Uppercase and lowercase characters look the same to many internet software applications. It may seem appropriate to capitalize a name the same way you might do in English, but conventions dictate that computer names appear all lowercase. For more information, refer to RFC 1178, Choosing a Name for Your Computer.
To upgrade the Cisco IOS software on your Catalyst 4500 series switch, use this procedure:
Step 1 Download Cisco IOS Release 15.01(2) from Cisco.com, and place the image on a TFTP server in a directory that is accessible from the supervisor engine that is upgraded.
Step 2 Use the dir bootflash: command to ensure that there is sufficient space in Flash memory to store the promupgrade image. If there is insufficient space, delete one or more images, and then enter the squeeze bootflash: command to reclaim the space.
If you are using a CompactFlash card, use slot0: instead of bootflash.
Step 3 Download the software image into Flash memory using the copy tftp command.
The following example shows how to download the Cisco IOS software image cat4000-is-mz.121-12c.EW from the remote host 172.20.58.78 to bootflash:
Step 4 Use the no boot system flash bootflash: file_name command to clear the cat4000-is-mz.121-8a.EW file and to save the BOOT variable.
The following example shows how to clear the BOOT variable:
Step 5 Use the boot system flash command to add the Cisco IOS software image to the BOOT variable.
The following example shows how to add the cat4000-is-mz.121-12c.EW image to the BOOT variable:
Step 6 Use the config-register command to set the configuration register to 0x2102.
The following example show how to set the second least significant bit in the configuration register:
Step 7 Enter the reload command to reset the switch and load the software.
The following example shows the output from a successful upgrade followed by a system reset:
Step 8 Use the show version command to verify that the new Cisco IOS release is operating on the switch.
These sections list the limitations and restrictions for the current release of Cisco IOS software on the Catalyst 4500 series switch.
– Fast UDLD is disabled by default.
– Configure fast UDLD only on point-to-point links between network devices that support fast UDLD.
– You can configure fast UDLD in either normal or aggressive mode.
– Do not enter the link debounce command on fast UDLD ports.
– Configure fast UDLD on at least two links between each connected network device. This reduces the likelihood of fast UDLD incorrectly error disabling a link due to false positives.
– Fast UDLD does not report a unidirectional link if the same error occurs simultaneously on more than one link to the same neighbor device.
The outputs of certain commands, such as show ip route and show access-lists, contain non-deterministic text. While the output is easily understood, the output text does not contain strings that are consistently output. A general purpose specification file entry is unable to parse all possible output.
While a general purpose specification file entry may not be possible, a specification file entry might be created that returns the desired text by searching for text that is guaranteed to be in the output. If a string is guaranteed to be in the output, it can be used for parsing.
For example, the output of the show ip access-lists SecWiz_Gi3_17_out_ip command is this:
The first line is easily parsed because access list is guaranteed to be in the output:
The remaining lines all contain the term host. As a result, the specification file may report the desired values by specifying that string. For example, this line
will produce the following for the first and second rules
and the following for the third statement
Request the output of the show running-config command using NETCONF and parse that output for the desired strings. This is useful when the desired lines contain nothing in common. For example, the rules in this access list do not contain a common string and the order (three permits, then a deny, then another permit), prevent the spec file entry from using permit as a search string, as in the following example:
The XML output of show running-config command includes the following, which can then be parsed programmatically, as desired:
This only affects a switch that has any of the following queues configured as SPAN source in releases prior to 12.2(31)SG and saved to the startup configuration. The SPAN destination would not get the same traffic after upgrading to 12.2(31)SG.
Workaround: After upgrading to 12.2(31)SG and later releases, remove the old SPAN source configuration and reconfigure with the new queue names/IDs. For example:
This configuration had been removed erroneously in a prior release.
provided the following conditions apply:
– A switchport is configured with the following:
authentication event server dead action authorize...
authenticaton event server alive action reinitalize
– The RADIUS server was down previously, and a port without traffic (for example, a hub with no devices attached) was authorized into the inaccessible authentication bypass (IAB) VLAN without an associated MAC address.
The RADIUS server becomes available again, and the IAB-authorized port transitions to another state.
– Unnumbered interface and numbered interface in different VRFs
– GRE encapsulation forwarding method
– Hash bucket based assignment method
– Redirection on an egress interface (redirection out)
– NHRP (Next Hop Resolution Protocol)
– AppleTalk Control Protocol for PPP
– Netflow will not account for control packets, packets that encountered link-level errors, and ARP/RARP packets.
– The software cache for Netflow is fixed, users cannot change the size.
– The statistical distribution row that displays the distribution across various packet sizes is not available.
– Packet length-based matching policies are not supported.
– IP Precedence, TOS and Qos groups are fixed.
– ACL/Route-map statistics are not updated.
Workaround: Configure the NSF interval timer to 0 minutes, or delay entering the issu runversion command until the NSF interval timer expires and NSF restarts.
For example, if the active supervisor engine is in slot 1, and you have configured interface Gi1/1, the supervisor engine in slot 2 becomes active if you remove the active supervisor engine from the chassis. In addition, while the startup configuration file is being parsed, you will receive an error message indicating that interface Gi1/1 is no longer present. This behavior is correct. When the formerly active supervisor engine is reinserted into slot 1, there is no configuration for interface Gi1/1.
This situation does not occur when both supervisor engines are present in the chassis.
Workaround: Copy the startup configuration file into the running configuration:
Workaround: Display the configuration with the show standby command, then remove the CLI. Here is an example of the show standby GigabitEthernet1/1 command output:
Use the standby delay reload option if the router is rebooting after reloading the image.
Workaround: Because the problem is caused by mismatched MTUs, you should change the MTU on either router to match the other’s MTU.
Workaround: Remove and reinsert the standby supervisor engine after the active supervisor engine boots. (CSCsa66509)
If this message appears, verify that the switch is connected to the ACS. You should also ensure that the switch has been properly configured as an AAA client on the ACS.
Workaround: Disable idle timeouts. (CSCec30214)
1. Disable inline power on the switch ports using the power inline never command.
2. Configure the media converter to autonegotiate the speed and duplex instead of running them at 100 Mbps and full duplex. (CSCee62109)
– It supports Layer 2 access port and PVLAN host port (isolated or community port).
– It does not support trunk port, Layer 3 port, or EtherChannel.
– Allow for at least three MAC addresses to access the switch: two for the phone (the MAC address of a phone gets registered to the Data domain and Voice domain), and one for the PC.
– Ensure that the data and voice VLAN IDs differ.
– As IPSG learns the static hosts on each interface, the switch CPU may achieve 100 percent if there are a large number of hosts to learn. CPU usage will drop after the hosts are learned.
– IPSG violations for static hosts are printed as they occur. If multiple violations occur simultaneously on different interfaces, the CLI displays the last violation. For example, if IPSG is configured for 10 ports and violations exist on ports 3, 6, and 9, the violation messages are printed only for port 9.
– Inactive host bindings will appear in the device tracking table when either a VLAN is associated with another port or a port is removed from a VLAN. So, as hosts are moved across subnets, the hosts appear in the device tracking table as Inactive.
– Autostate SVI does not work on EtherChannel.
– Chassis WS-C4507R-E, WS-C4510R-E
– Dual supervisor WS-X45-Sup6-E
– One or more of the models WS-X4448-GB-RJ45 or WS-X4148-FX-MT
To maximize the 10/100/1000 port density of 7- and 10-slot chassis when using redundant Supervisor Engine 6-E, install WS-X4548-GB-RJ45 instead of WS-X4448-GB-RJ45 line cards. If you require WS-X4448-GB-RJ45 line cards, two options are available:
Only four line card slots can be used on the Catalyst 4507R and six line card slots on the
Catalyst 4510R chassis.
When all slots are required, only one model WS-X4448-GB-RJ45 line card can be used.
To maximize the 100-BASE-FX port density of 7 and 10 slot chassis when using Supervisor Engine 6-E install WS-4248-FE-SFP line cards with FX optics instead of WS-X4148-FX-MT line cards. If WS-X4148-FX-MT line cards are required, two options are available:
You can use only 4 linecard slots on the Cat4507R chassis and 6 line card slots on the Cat4510R chassis.
When all slots are required, you can only use one WS-X4448-GB-RJ45 line card.
In such a scenario, the IPv6 MTU value programmed in hardware differs from the IPv6 interface MTU value. This will happen if no room exists in the hardware MTU table to store additional values.
To create room in the table, unconfigure some unused MTU values. Then, either disable or reenable IPv6 on the interface, or reapply the MTU configuration.
To enable IPSG with static hosts on a port, enter the following commands:
Note The preceding condition also applies to IPSG with static hosts on a PVLAN host port.
For example, if the active supervisor engine is in slot 1, and you have configured interface Gi1/1, the supervisor engine in slot 2 becomes active if you remove the active supervisor engine from the chassis. In addition, while the startup configuration file is being parsed, you will receive an error message indicating that interface Gi1/1 is no longer present. This behavior is correct. When the formerly active supervisor engine is reinserted into slot 1, there is no configuration for interface Gi1/1.
This situation will not occur when both supervisor engines are physically in the chassis.
Workaround: Copy the startup configuration file into the running configuration:
Workaround: Display the configuration with the show standby command, then remove the CLI. Here is an example of show standby GigabitEthernet1/1 command output:
Use the standby delay reload option if the router is rebooting after reloading the image.
Workaround: Ensure that the MTUs match.
– The verify and squeeze commands are not supported.
– The rename command is supported in FAT file system.
For Supervisor Engine 6-E, the rename command is available for bootflash and slot0. For all other supervisor engines, the rename command is supported for nvram devices only.
– The fsck command is supported for slot0 device. It is not supported in the file systems on supervisor engines other than 6-E.
– In the FAT file system, the IOS format bootflash: command erases user files only. It does not erase system configuration.
– The FAT file system supports a maximum of 63 characters for file/directory name. The maximum for path length is 127 characters.
– The FAT file system does not support the following characters in file/directory names:{}#%^ and space characters.
– The FAT file system honors the Microsoft Windows file attribute of read-only and read-write, but it does not support the Windows file hidden attribute.
– Supervisor Engine 6-E uses the FAT file system for compact flash (slot0). If a compact flash is not formatted in FAT file system (such as compact flash on a supervisor engine other than 6-E), the switch does not recognize it.
Workaround: Remove and reinsert the standby supervisor engine after the active supervisor engine boots. (CSCsa66509)
If this message appears, ensure network connectivity exists between the switch and the ACS. Also check that the switch has been properly configured as an AAA client on the ACS.
– As IPSG learns the static hosts on each interface, the switch CPU may achieve 100 percent if there are a large number of hosts to learn. The CPU usage will drop after the hosts are learned.
– IPSG violations for static hosts are printed as they occur. If multiple violations occur simultaneously on different interfaces, the CLI displays the last violation. For example, if IPSG is configured for 10 ports and violations exist on ports 3,6, and 9, the violation messages are printed only for port 9.
– Inactive host bindings will appear in the device tracking table when either a VLAN is associated with another port or a port is removed from a VLAN. So, as hosts are moved across subnets, the hosts appear in the device tracking table as inactive.
– Autostate SVI does not work on EtherChannel.
In such a scenario, the IPv6 MTU value programmed in hardware differs from the IPv6 interface MTU value. This occurs if no room exists in the hardware MTU table to store additional values.
To create room, unconfigure some unused MTU values. Then, either disable or re-enable IPv6 on the interface, or reapply the MTU configuration.
To enable IPSG with static hosts on a port, enter the following commands:
Note The preceding condition also applies to IPSG with static hosts on a PVLAN host port.
– WS-X4148-FX-MT Cisco Catalyst 4500 Fast Ethernet Switching Module, 48-port 100BASE-FX (MT-RJ)
– WS-X4448-GB-RJ45 Cisco Catalyst 4500 48-port 10/100/1000 Module (RJ-45)
The Catalyst 4503-E and Catalyst 4506-E have no caveats. The Catalyst 4507R-E configurations that use power supplies rated at 1400 W or above also have no caveats.
The following replacement switching modules will not exceed the power supply capacity for any Catalyst 4500-E chassis:
Refer to the Catalyst 4500 Series Module Installation Guide to determine the power requirements for all of the Catalyst 4500 linecards and the power capacities of the Catalyst 4500 power supplies.
This situation only occurs if a switch reached SSO before you removed the line card.
Caveats describe unexpected behavior in Cisco IOS releases. Caveats listed as open in a prior release are carried forward to the next release as either open or resolved.
Note All caveats in Release 12.4 also apply to the corresponding 12.1 E releases. Refer to the Caveats for Cisco IOS Release 12.4 publication at the following URL:
http://www.cisco.com/en/US/docs/ios/12_4/release/notes/124MCAVS.html
Note For the latest information on PSIRTS, refer to the Security Advisories on CCO at the following URL:
http://tools.cisco.com/security/center/publicationListing
The Bug Search Tool (BST), which is the online successor to Bug Toolkit, is designed to improve the effectiveness in network risk management and device troubleshooting. The BST allows partners and customers to search for software bugs based on product, release, and keyword, and aggregates key data such as bug details, product, and version. The tool has a provision to filter bugs based on credentials to provide external and internal bug views for the search input.
To view the details of a caveat listed in this document:
1. Access the BST (use your Cisco user ID and password) at https://tools.cisco.com/bugsearch/.
Use the Bug Search Tool to view the details of a caveat listed in this section:
Cisco has analyzed this vulnerability and concluded that while the previously listed products may run a vulnerable version of Bash, there are no exploitation vectors present - therefore, those products are not impacted.
Additional details about those vulnerabilities can be found at http://cve.mitre.org/cve/cve.html
– If such a certificate does not exist and the device's hostname and default_domain are set, then a persistent self-signed certificate is generated.
– If such a certificate exists, the FQDN in the certificate is compared with the current device's hostname and default_domain. If either differs from the FQDN in the certificate, the existing persistent self-signed certificate is replaced with a new one with the updated FQDN. Be aware that the existing key pair is used in the new certificate.
On a switch that supports redundancy, the generation of the self-signed certificate occurs independently on the active and the standby supervisor engines, and the certificates differ. After switchover, the HTTP client that holds the old certificate cannot connect to the HTTPS server.
Workaround: Reconnect. CSCsb11964
This does not affect performance.
Workaround: Enter the no shutdown command. CSCsg27395
Workaround: Remove the transceiver from the new port and place it in the old port. After the SFP is recognized in the old port, remove it slowly and insert it in the new port. (CSCse34693)
Workaround: None. This is an informational message. CSCsi60898
Workarounds: Do one of the following:
– After a reload, copy the startup-config to the running-config.
– Use a loopback interface as the target of the ip unnumbered command.
– Change the CLI configuration so that during bootup the router port is created first.
Workaround: When the port channel starts to flap, enter shut and no shut on the port channel. After the first switchover and after deleting the port channel, create a new channel. CSCsr00333
Workaround: Configure an ISL/dot1q trunk port. CSCsu43445
Workaround: Do one of the following:
– Reload the standby switch again with the line card in place.
– Remove and reenter the commands on the active supervisor engine. The standby supervisor engine will acquire this change. CSCsv44866
This applies to classic or E-series Catalyst 4500 supervisor engines running
Cisco IOS Release 12.2(50)SG
If the switch were to run a supervisor switchover while in this state, the host's MAC address would not be present in the new active supervisor engine’s MAC address table, causing possible connectivity interruption on the host.
Workaround: Enter the shutdown command, followed by the no shutdown command on the interface. This triggers relearning and synchronizing of the host's MAC to the standby supervisor engine. CSCsw91661
This only happens when the switch is running network mobility service protocol (nmsp). It does not happen if the phone is CDP enabled.
Workaround: Use the VLAN ID or name to differentiate the IP phone and the PC sitting behind the phone on the WCS.
The IP phone is detected on the voice VLAN, and the displayed information of serial number, model number, and software version is correct. However, a PC sitting behind the phone is detected on a data VLAN, and the displayed device information is wrong and should be ignored.
Workaround: When interface mode is changed from Layer2 to Layer3, manually change interface trust state by enter the cos trust dscp command. CSCta16492
Prior to Cisco IOS Release 12.2(53)SG1 and 12.2(50)SG6, the switchport block multicast command blocks IP Multicast, Layer 2 multicast, and broadcast traffic. CSCta61825
Despite the different default value, you can configure any value in the time range.
Workarounds: The Cisco switch default link-flap detection value is 5 flaps in 10 seconds. Use the default value or larger numbers. CSCtg07677
Similarly, the show epm sessions command always displays the authentication method as DOT1X.
Workaround: To view the authentication method used for a client, enter the
show authentication sessions command. CSCsx42157
Workaround: Configure both dead-criteria and deadtime.
Workaround: Enter shut, and then no shut on the ports. CSCtn88228
Workaround: After the switch reloads, enter shut, and then no shut on the port channel interface.
Workaround: Shut down the CE-facing interface. After all of the mask-value entries point to the target CE, unshut the CE-facing interface. CSCtl09941
Workaround: Remove these operators from any dynamic ACLs. CSCts05302
Workaround: Reinsert the X2. CSCsk43618
Workaround: Enter the show policy-map interface command to find the actual burst value programmed. CSCsi71036
If you enter the show policy-map name, however, the unconditional marking actions appear. CSCsi94144
This behavior occurs in a redundant switch when the active supervisor engine is running Cisco IOS, the standby supervisor engine is in ROMMON, and the standby supervisor engine’s ROMMON is upgraded from version 0.34 or to a later version. The upgrade process causes the uplinks on the standby supervisor engine to go down but the active supervisor engine is unaware of this.
Workarounds: To resume normal operation, do one of the following:
– Reload both supervisor engines with the redundancy reload shelf command.
– Power-cycle the standby supervisor engine by briefly pulling it from the chassis.
There is no workaround for the link flap issue. CSCsm81875
This problem can happen when pause frames are sent to a switch port and the flow control receive configuration is toggled on a 10-Gigabit Ethernet port.
Workaround: Change the flow control receive configuration when no traffic exists. CSCso71647
You only see this behavior if you initially did not allocate a VLAN before you configure the IFM, and then later allocate the same VLAN.
Workaround: Unconfigure, and then reconfigure the IFM on the port.
Workaround: Disable native VLAN tagging on the trunk port of the switch by entering the
no switchport trunk native vlan tag command. CSCsz12611
Workaround: No functional impact.
You must wait for the ACLs to be programmed before performing other TCAM related changes. CSCtd57063
Workaround: Reduce the number of VLAN mappings. CSCtn56208
Workaround: Configure IP multicast routing globally and establish IP PIM sparse dense mode on the CE-facing interface. CSCtl97692
Workaround: Unconfigure and reconfigure the service group. CSCtn88087
Workaround: Enable a Layer 3 interface in the running configuration. CSCsc88636.
– Links flap for various Layer 3 protocols.
– A traffic loss of several seconds occurs during the upgrade process.
Workaround: Do not use the quick option with the issu changeversion command.
The problem is seen only on modules running Cisco IOS Release IOS-XE 03.02.n.SG.
Certain revisions of the X4748 module display this behavior when running on IOS-XE version 03.02.n.SG. Not all X4748 modules will present this behavior, and it will not show up on newer versions of IOS-XE like 03.04.n.SG or 03.06.n.E.
Workaround : Increasing the MTU on an affected interface to 1518 or higher will allow the traffic through. Upgrading to an IOS-XE version where this issue is not present will resolve the issue. CSCus15382
– NetMeeting Directory (Lightweight Directory Access Protocol, LDAP)
– Session Initiation Protocol (Multiple vulnerabilities)
All the vulnerabilities described in this document are caused by packets in transit on the affected devices when those packets require application layer translation. Cisco has released free software updates that address these vulnerabilities. This advisory is posted at http://www.cisco.com/warp/public/707/cisco-sa-20110928-nat.shtml CSCtd10712
Cisco has released free software updates that address this vulnerability. Workarounds that mitigate this vulnerability are not available.
This advisory is available at the following link: http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130327-nat
Note The March 27, 2013, Cisco IOS Software Security Advisory bundled publication includes seven Cisco Security Advisories. All advisories address vulnerabilities in Cisco IOS Software. Each Cisco IOS Software Security Advisory lists the Cisco IOS Software releases that correct the vulnerability or vulnerabilities detailed in the advisory as well as the Cisco IOS Software releases that correct all Cisco IOS Software vulnerabilities in the March 2013 bundled publication.
Individual publication links are in the Cisco Event Response: Semiannual Cisco IOS Software Security Advisory Bundled Publication at the following link: http://www.cisco.com/web/about/security/intelligence/Cisco_ERP_mar13.html CSCtg47129
Workaround. None - You cannot configure the event4 exit-value CSCtl70569"
Note The March 28, 2012, Cisco IOS Software Security Advisory bundled publication includes nine Cisco Security Advisories. Each advisory lists the Cisco IOS Software releases that correct the vulnerability or vulnerabilities detailed in the advisory as well as the Cisco IOS Software releases that correct all vulnerabilities in the March 2012 bundled publication.
Individual publication links are in Cisco Event Response: Semi-Annual Cisco IOS Software Security Advisory Bundled Publication at the following link: http://www.cisco.com/web/about/security/intelligence/Cisco_ERP_mar12.html CSCts38429"
– router reload / LC OIR with images after RLS10.
– traffic flows through the ES20 interface
– mac-address-table limit CLI is configured.
Workaround: mac-address-table limit is removed.
Note The March 28, 2012, Cisco IOS Software Security Advisory bundled publication includes nine Cisco Security Advisories. Each advisory lists the Cisco IOS Software releases that correct the vulnerability or vulnerabilities detailed in the advisory as well as the Cisco IOS Software releases that correct all vulnerabilities in the March 2012 bundled publication.
Individual publication links are in the Cisco Event Response: Semi-Annual Cisco IOS Software Security Advisory Bundled Publication at the following link: http://www.cisco.com/web/about/security/intelligence/Cisco_ERP_mar12.html CSCtt28573
Cisco has released free software updates that address these vulnerabilities. There are no workarounds to mitigate these vulnerabilities.
This advisory is available at the following link: http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140326-nat
Note The March 26, 2014, Cisco IOS Software Security Advisory bundled publication includes six Cisco Security Advisories. All advisories address vulnerabilities in Cisco IOS Software. Each Cisco IOS Software Security Advisory lists the Cisco IOS Software releases that correct the vulnerability or vulnerabilities detailed in the advisory as well as the Cisco IOS Software releases that correct all Cisco IOS Software vulnerabilities in the March 2014 bundled publication.
Individual publication links are in the Cisco Event Response: Semiannual Cisco IOS Software Security Advisory Bundled Publication at the following link: http://www.cisco.com/web/about/security/intelligence/Cisco_ERP_mar14.html. See published Cisco Security Advisory CSCue00996
The symptom is observed on ES+ series linecards of Cisco 7600 Series Routers.
This happens when you continuously reload the standby switch. The client, that is, the active side cannot reach the standby side, and while returning an error, the FD is not released and exhausts FDs. The maximum number of allowed FDs is 128. When this limit is reached, additional files cannot be opened.
Workaround: Reload the switch. CSCug77784
– The show process cpu privileged EXEC command for 'Cat4k Mgmt LoPri'
– The show platform health privileged EXEC command under KxAclPathMan update
The increase is observed when configuring input and output service policies on trunk links that carry numerous VLANs, which, in turn, are enabled with other ACL based features (For examplem access-groups and PBR).
Workaround: Reduce CPU utilization by removing unnecessary service policies from the trunk links. CSCui19835
Workaround: Avoid custom pages. CSCui71349
– If you want to remove VLAN mapping on 12, but you need mapping on 13 to work, perform these steps:
a. Enter the interface gigabitethernet 2/1 interface configuration command
b. Enter the no switchport vlan mapping 12 dot1q-tunnel 200 interface configuration command
c. Enter the no switchport vlan mapping 13 dot1q-tunnel 200 interface configuration command
d. Enter the switchport vlan mapping 13 dot1q-tunnel 200 interface configuration command
– If you want to restore the original VLAN mapping statement, perform these steps
a. Enter the i nterface gigabitethernet 2/1 interface configuration command
b. Enter the no switchport vlan mapping 12 dot1q-tunnel 200 interface configuration command
c. Enter the switchport vlan mapping 12 dot1q-tunnel 200 interface configuration command
– Enter the shutdown interface configuration command to shut down the port, remove configuration, and then enter the no shutdown interface configuration command.
Workaround: Reapply the configuration when the switch reboots. CSCum71764
Workaround: None. The license MIB value for the permanent license type is 4 for all Cisco Catalyst 4000 series products. CSCuo90172
Workaround: Issue clear mac address dynamic to clear the MAC addresses on the switch and cause MAB to trigger when the MAC address is re-learned. CSCul32730
This section lists the resolved caveats in Release 15.0(2)SG8:
Workaround: Enter shut, and then no shut on the port to synchronize the STP state. CSCtf52437
Workaround: Retain the trunk native V LAN as 1. CSCud05521
Workaround: Shorten the dACL name. CSCug78653
Workaround: Return a dACL in the authorization profile with successful guest authentication.
– A fast stream of traffic matches the URL redirect ACL as IPDT clears an address.
– A traffic stream matches the URL redirect ACL and no URL redirect policy is installed for that IP address.
If memory leak occurs repeatedly, IPDT and other control packet processing ultimately ceases.
Workaround: If this behavior completely fills the CPU buffer, the switch must be reloaded. However, the frequency of encountering a stuck queue can be reduced to nearly zero by modifying the URL redirect ACL to permit only 80/443 traffic. CSCug56646
Workaround: Configure RADIUS test and dead criteria.
Workaround: Enter the show platform software interface Gix/xx statistic command.
This section lists the open caveats for Cisco IOS Release 15.0(2)SG6:
– If such a certificate does not exist and the device's hostname and default_domain are set, then a persistent self-signed certificate is generated.
– If such a certificate exists, the FQDN in the certificate is compared with the current device's hostname and default_domain. If either differs from the FQDN in the certificate, the existing persistent self-signed certificate is replaced with a new one with the updated FQDN. Be aware that the existing key pair is used in the new certificate.
On a switch that supports redundancy, the generation of the self-signed certificate occurs independently on the active and the standby supervisor engines, and the certificates differ. After switchover, the HTTP client that holds the old certificate cannot connect to the HTTPS server.
Workaround: Reconnect. CSCsb11964
This does not affect performance.
Workaround: Enter the no shutdown command. CSCsg27395
Workaround: Remove the transceiver from the new port and place it in the old port. After the SFP is recognized in the old port, remove it slowly and insert it in the new port. (CSCse34693)
Workaround: None. This is an informational message. CSCsi60898
Workarounds: Do one of the following:
– After a reload, copy the startup-config to the running-config.
– Use a loopback interface as the target of the ip unnumbered command.
– Change the CLI configuration so that during bootup the router port is created first.
Workaround: When the port channel starts to flap, enter shut and no shut on the port channel. After the first switchover and after deleting the port channel, create a new channel. CSCsr00333
Workaround: Configure an ISL/dot1q trunk port. CSCsu43445
Workaround: Do one of the following:
– Reload the standby switch again with the line card in place.
– Remove and reenter the commands on the active supervisor engine. The standby supervisor engine will acquire this change. CSCsv44866
This applies to classic or E-series Catalyst 4500 supervisor engines running
Cisco IOS Release 12.2(50)SG
If the switch were to run a supervisor switchover while in this state, the host's MAC address would not be present in the new active supervisor engine’s MAC address table, causing possible connectivity interruption on the host.
Workaround: Enter the shutdown command, followed by the no shutdown command on the interface. This triggers relearning and synchronizing of the host's MAC to the standby supervisor engine. CSCsw91661
The queue transmit counters as well as the policing statistics (if any) are correct. CSCsz20149
This only happens when the switch is running network mobility service protocol (nmsp). It does not happen if the phone is CDP enabled.
Workaround: Use the VLAN ID or name to differentiate the IP phone and the PC sitting behind the phone on the WCS.
The IP phone is detected on the voice VLAN, and the displayed information of serial number, model number, and software version is correct. However, a PC sitting behind the phone is detected on a data VLAN, and the displayed device information is wrong and should be ignored.
Workaround: When interface mode is changed from Layer2 to Layer3, manually change interface trust state by enter the cos trust dscp command. CSCta16492
Prior to Cisco IOS Release 12.2(53)SG1 and 12.2(50)SG6, the switchport block multicast command blocks IP Multicast, Layer 2 multicast, and broadcast traffic. CSCta61825
Despite the different default value, you can configure any value in the time range.
Workarounds: The Cisco switch default link-flap detection value is 5 flaps in 10 seconds. Use the default value or larger numbers. CSCtg07677
Similarly, the show epm sessions command always displays the authentication method as DOT1X.
Workaround: To view the authentication method used for a client, enter the
show authentication sessions command. CSCsx42157
Workaround: Configure both dead-criteria and deadtime.
Workaround: Enter shut, and then no shut on the ports. CSCtn88228
Workaround: Enter shut, and then no shut on the port to synchronize the STP state. CSCtf52437
Workaround: Shut down the CE-facing interface. After all of the mask-value entries point to the target CE, unshut the CE-facing interface. CSCtl09941
Workaround: Retain the trunk native V LAN as 1. CSCud05521
Workaround: Shorten the dACL name. CSCug78653
Workaround: Return a dACL in the authorization profile with successful guest authentication.
– A fast stream of traffic matches the URL redirect ACL as IPDT clears an address.
– A traffic stream matches the URL redirect ACL and no URL redirect policy is installed for that IP address.
If memory leak occurs repeatedly, IPDT and other control packet processing ultimately ceases.
Workaround: If this behavior completely fills the CPU buffer, the switch must be reloaded. However, the frequency of encountering a stuck queue can be reduced to nearly zero by modifying the URL redirect ACL to permit only 80/443 traffic. CSCug56646
Workaround: Reinsert the X2. CSCsk43618
Workaround: Enter the show policy-map interface command to find the actual burst value programmed. CSCsi71036
If you enter the show policy-map name, however, the unconditional marking actions appear. CSCsi94144
This behavior occurs in a redundant switch when the active supervisor engine is running Cisco IOS, the standby supervisor engine is in ROMMON, and the standby supervisor engine’s ROMMON is upgraded from version 0.34 or to a later version. The upgrade process causes the uplinks on the standby supervisor engine to go down but the active supervisor engine is unaware of this.
Workarounds: To resume normal operation, do one of the following:
– Reload both supervisor engines with the redundancy reload shelf command.
– Power-cycle the standby supervisor engine by briefly pulling it from the chassis.
There is no workaround for the link flap issue. CSCsm81875
This problem can happen when pause frames are sent to a switch port and the flow control receive configuration is toggled on a 10-Gigabit Ethernet port.
Workaround: Change the flow control receive configuration when no traffic exists. CSCso71647
You only see this behavior if you initially did not allocate a VLAN before you configure the IFM, and then later allocate the same VLAN.
Workaround: Unconfigure, and then reconfigure the IFM on the port.
Workaround: Disable native VLAN tagging on the trunk port of the switch by entering the
no switchport trunk native vlan tag command. CSCsz12611
Workaround: No functional impact.
You must wait for the ACLs to be programmed before performing other TCAM related changes. CSCtd57063
Workaround: Reduce the number of VLAN mappings. CSCtn56208
Workaround: Configure IP multicast routing globally and establish IP PIM sparse dense mode on the CE-facing interface. CSCtl97692
Workaround: Unconfigure and reconfigure the service group. CSCtn88087
Workaround: Enable a Layer 3 interface in the running configuration. CSCsc88636.
– Links flap for various Layer 3 protocols.
– A traffic loss of several seconds occurs during the upgrade process.
Workaround: Do not use the quick option with the issu changeversion command.
Workaround: Enter the show platform software interface Gix/xx statistic command.
This section lists the resolved caveats in Release 15.0(2)SG6:
Workaround: Reduce MAC aging time or modify Layer 2 topology so that the root is within the square. CSCtx86107
provided the following conditions apply:
– A switchport is configured with the following:
authentication event server dead action authorize
authenticaton event server alive action reinitalize
– The RADIUS server was down previously, and a port without traffic (for example, a hub with no devices attached) was authorized into the inaccessible authentication bypass (IAB) VLAN without an associated MAC address.
The RADIUS server becomes available again, and the IAB-authorized port transitions to another state.
This section lists the open caveats for Cisco IOS Release 15.0(2)SG5:
– If such a certificate does not exist and the device's hostname and default_domain are set, then a persistent self-signed certificate is generated.
– If such a certificate exists, the FQDN in the certificate is compared with the current device's hostname and default_domain. If either differs from the FQDN in the certificate, the existing persistent self-signed certificate is replaced with a new one with the updated FQDN. Be aware that the existing key pair is used in the new certificate.
On a switch that supports redundancy, the generation of the self-signed certificate occurs independently on the active and the standby supervisor engines, and the certificates differ. After switchover, the HTTP client that holds the old certificate cannot connect to the HTTPS server.
Workaround: Reconnect. CSCsb11964
This does not affect performance.
Workaround: Enter the no shutdown command. CSCsg27395
Workaround: Remove the transceiver from the new port and place it in the old port. After the SFP is recognized in the old port, remove it slowly and insert it in the new port. (CSCse34693)
Workaround: None. This is an informational message. CSCsi60898
Workarounds: Do one of the following:
– After a reload, copy the startup-config to the running-config.
– Use a loopback interface as the target of the ip unnumbered command.
– Change the CLI configuration so that during bootup the router port is created first.
Workaround: When the port channel starts to flap, enter shut and no shut on the port channel. After the first switchover and after deleting the port channel, create a new channel. CSCsr00333
Workaround: Configure an ISL/dot1q trunk port. CSCsu43445
Workaround: Do one of the following:
– Reload the standby switch again with the line card in place.
– Remove and reenter the commands on the active supervisor engine. The standby supervisor engine will acquire this change. CSCsv44866
This applies to classic or E-series Catalyst 4500 supervisor engines running
Cisco IOS Release 12.2(50)SG
If the switch were to run a supervisor switchover while in this state, the host's MAC address would not be present in the new active supervisor engine’s MAC address table, causing possible connectivity interruption on the host.
Workaround: Enter the shutdown command, followed by the no shutdown command on the interface. This triggers relearning and synchronizing of the host's MAC to the standby supervisor engine. CSCsw91661
The queue transmit counters as well as the policing statistics (if any) are correct. CSCsz20149
This only happens when the switch is running network mobility service protocol (nmsp). It does not happen if the phone is CDP enabled.
Workaround: Use the VLAN ID or name to differentiate the IP phone and the PC sitting behind the phone on the WCS.
The IP phone is detected on the voice VLAN, and the displayed information of serial number, model number, and software version is correct. However, a PC sitting behind the phone is detected on a data VLAN, and the displayed device information is wrong and should be ignored.
Workaround: When interface mode is changed from Layer2 to Layer3, manually change interface trust state by enter the cos trust dscp command. CSCta16492
Prior to Cisco IOS Release 12.2(53)SG1 and 12.2(50)SG6, the switchport block multicast command blocks IP Multicast, Layer 2 multicast, and broadcast traffic. CSCta61825
Despite the different default value, you can configure any value in the time range.
Workarounds: The Cisco switch default link-flap detection value is 5 flaps in 10 seconds. Use the default value or larger numbers. CSCtg07677
Similarly, the show epm sessions command always displays the authentication method as DOT1X.
Workaround: To view the authentication method used for a client, enter the
show authentication sessions command. CSCsx42157
Workaround: Configure both dead-criteria and deadtime.
Workaround: Enter shut, and then no shut on the ports. CSCtn88228
Workaround: Enter shut, and then no shut on the port to synchronize the STP state. CSCtf52437
Workaround: After the switch reloads, enter shut, and then no shut on the port channel interface.
Workaround: Shut down the CE-facing interface. After all of the mask-value entries point to the target CE, unshut the CE-facing interface. CSCtl09941
Workaround: Remove these operators from any dynamic ACLs. CSCts05302
Workaround: Retain the trunk native V LAN as 1. CSCud05521
Workaround: Shorten the dACL name. CSCug78653
Workaround: Return a dACL in the authorization profile with successful guest authentication.
– A fast stream of traffic matches the URL redirect ACL as IPDT clears an address.
– A traffic stream matches the URL redirect ACL and no URL redirect policy is installed for that IP address.
If memory leak occurs repeatedly, IPDT and other control packet processing ultimately ceases.
Workaround: If this behavior completely fills the CPU buffer, the switch must be reloaded. However, the frequency of encountering a stuck queue can be reduced to nearly zero by modifying the URL redirect ACL to permit only 80/443 traffic. CSCug56646
Workaround: Reinsert the X2. CSCsk43618
Workaround: Enter the show policy-map interface command to find the actual burst value programmed. CSCsi71036
If you enter the show policy-map name, however, the unconditional marking actions appear. CSCsi94144
This behavior occurs in a redundant switch when the active supervisor engine is running Cisco IOS, the standby supervisor engine is in ROMMON, and the standby supervisor engine’s ROMMON is upgraded from version 0.34 or to a later version. The upgrade process causes the uplinks on the standby supervisor engine to go down but the active supervisor engine is unaware of this.
Workarounds: To resume normal operation, do one of the following:
– Reload both supervisor engines with the redundancy reload shelf command.
– Power-cycle the standby supervisor engine by briefly pulling it from the chassis.
There is no workaround for the link flap issue. CSCsm81875
This problem can happen when pause frames are sent to a switch port and the flow control receive configuration is toggled on a 10-Gigabit Ethernet port.
Workaround: Change the flow control receive configuration when no traffic exists. CSCso71647
You only see this behavior if you initially did not allocate a VLAN before you configure the IFM, and then later allocate the same VLAN.
Workaround: Unconfigure, and then reconfigure the IFM on the port.
Workaround: Disable native VLAN tagging on the trunk port of the switch by entering the
no switchport trunk native vlan tag command. CSCsz12611
Workaround: No functional impact.
You must wait for the ACLs to be programmed before performing other TCAM related changes. CSCtd57063
Workaround: Reduce the number of VLAN mappings. CSCtn56208
Workaround: Configure IP multicast routing globally and establish IP PIM sparse dense mode on the CE-facing interface. CSCtl97692
Workaround: Unconfigure and reconfigure the service group. CSCtn88087
Workaround: Enable a Layer 3 interface in the running configuration. CSCsc88636.
– Links flap for various Layer 3 protocols.
– A traffic loss of several seconds occurs during the upgrade process.
Workaround: Do not use the quick option with the issu changeversion command.
Workaround: Enter the show platform software interface Gix/xx statistic command.
This section lists the resolved caveats in Release 15.0(2)SG5:
Workaround: Enter shut then no shut the port to restore connectivity. CSCtz94862
– Enter shut then no shut on the port. CSCua63562
Workaround: Unconfigure the following from the switch: aaa accounting send stop-record authentication failure. CSCtj69212
This section lists the open caveats for Cisco IOS Release 15.0(2)SG4:
– If such a certificate does not exist and the device's hostname and default_domain are set, then a persistent self-signed certificate is generated.
– If such a certificate exists, the FQDN in the certificate is compared with the current device's hostname and default_domain. If either differs from the FQDN in the certificate, the existing persistent self-signed certificate is replaced with a new one with the updated FQDN. Be aware that the existing key pair is used in the new certificate.
On a switch that supports redundancy, the generation of the self-signed certificate occurs independently on the active and the standby supervisor engines, and the certificates differ. After switchover, the HTTP client that holds the old certificate cannot connect to the HTTPS server.
Workaround: Reconnect. CSCsb11964
This does not affect performance.
Workaround: Enter the no shutdown command. CSCsg27395
Workaround: Remove the transceiver from the new port and place it in the old port. After the SFP is recognized in the old port, remove it slowly and insert it in the new port. (CSCse34693)
Workaround: None. This is an informational message. CSCsi60898
Workarounds: Do one of the following:
– After a reload, copy the startup-config to the running-config.
– Use a loopback interface as the target of the ip unnumbered command.
– Change the CLI configuration so that during bootup the router port is created first.
Workaround: When the port channel starts to flap, enter shut and no shut on the port channel. After the first switchover and after deleting the port channel, create a new channel. CSCsr00333
Workaround: Configure an ISL/dot1q trunk port. CSCsu43445
Workaround: Do one of the following:
– Reload the standby switch again with the line card in place.
– Remove and reenter the commands on the active supervisor engine. The standby supervisor engine will acquire this change. CSCsv44866
This applies to classic or E-series Catalyst 4500 supervisor engines running
Cisco IOS Release 12.2(50)SG
If the switch were to run a supervisor switchover while in this state, the host's MAC address would not be present in the new active supervisor engine’s MAC address table, causing possible connectivity interruption on the host.
Workaround: Enter the shutdown command, followed by the no shutdown command on the interface. This triggers relearning and synchronizing of the host's MAC to the standby supervisor engine. CSCsw91661
The queue transmit counters as well as the policing statistics (if any) are correct. CSCsz20149
This only happens when the switch is running network mobility service protocol (nmsp). It does not happen if the phone is CDP enabled.
Workaround: Use the VLAN ID or name to differentiate the IP phone and the PC sitting behind the phone on the WCS.
The IP phone is detected on the voice VLAN, and the displayed information of serial number, model number, and software version is correct. However, a PC sitting behind the phone is detected on a data VLAN, and the displayed device information is wrong and should be ignored.
Workaround: When interface mode is changed from Layer2 to Layer3, manually change interface trust state by enter the cos trust dscp command. CSCta16492
Prior to Cisco IOS Release 12.2(53)SG1 and 12.2(50)SG6, the switchport block multicast command blocks IP Multicast, Layer 2 multicast, and broadcast traffic. CSCta61825
Despite the different default value, you can configure any value in the time range.
Workarounds: The Cisco switch default link-flap detection value is 5 flaps in 10 seconds. Use the default value or larger numbers. CSCtg07677
Similarly, the show epm sessions command always displays the authentication method as DOT1X.
Workaround: To view the authentication method used for a client, enter the
show authentication sessions command. CSCsx42157
Workaround: Configure both dead-criteria and deadtime.
Workaround: Enter shut, and then no shut on the ports. CSCtn88228
Workaround: Enter shut, and then no shut on the port to synchronize the STP state. CSCtf52437
Workaround: After the switch reloads, enter shut, and then no shut on the port channel interface.
Workaround: Shut down the CE-facing interface. After all of the mask-value entries point to the target CE, unshut the CE-facing interface. CSCtl09941
Workaround: Remove these operators from any dynamic ACLs. CSCts05302
Workaround: Unconfigure the following from the switch: aaa accounting send stop-record authentication failure. CSCtj69212
Workaround: Retain the trunk native V LAN as 1. CSCud05521
Workaround: Shorten the dACL name. CSCug78653
Workaround: Return a dACL in the authorization profile with successful guest authentication.
– A fast stream of traffic matches the URL redirect ACL as IPDT clears an address.
– A traffic stream matches the URL redirect ACL and no URL redirect policy is installed for that IP address.
If memory leak occurs repeatedly, IPDT and other control packet processing ultimately ceases.
Workaround: If this behavior completely fills the CPU buffer, the switch must be reloaded. However, the frequency of encountering a stuck queue can be reduced to nearly zero by modifying the URL redirect ACL to permit only 80/443 traffic. CSCug56646
Workaround: Reinsert the X2. CSCsk43618
Workaround: Enter the show policy-map interface command to find the actual burst value programmed. CSCsi71036
If you enter the show policy-map name, however, the unconditional marking actions appear. CSCsi94144
This behavior occurs in a redundant switch when the active supervisor engine is running Cisco IOS, the standby supervisor engine is in ROMMON, and the standby supervisor engine’s ROMMON is upgraded from version 0.34 or to a later version. The upgrade process causes the uplinks on the standby supervisor engine to go down but the active supervisor engine is unaware of this.
Workarounds: To resume normal operation, do one of the following:
– Reload both supervisor engines with the redundancy reload shelf command.
– Power-cycle the standby supervisor engine by briefly pulling it from the chassis.
There is no workaround for the link flap issue. CSCsm81875
This problem can happen when pause frames are sent to a switch port and the flow control receive configuration is toggled on a 10-Gigabit Ethernet port.
Workaround: Change the flow control receive configuration when no traffic exists. CSCso71647
You only see this behavior if you initially did not allocate a VLAN before you configure the IFM, and then later allocate the same VLAN.
Workaround: Unconfigure, and then reconfigure the IFM on the port.
Workaround: Disable native VLAN tagging on the trunk port of the switch by entering the
no switchport trunk native vlan tag command. CSCsz12611
Workaround: No functional impact.
You must wait for the ACLs to be programmed before performing other TCAM related changes. CSCtd57063
Workaround: Reduce the number of VLAN mappings. CSCtn56208
Workaround: Configure IP multicast routing globally and establish IP PIM sparse dense mode on the CE-facing interface. CSCtl97692
Workaround: Unconfigure and reconfigure the service group. CSCtn88087
Workaround: Enable a Layer 3 interface in the running configuration. CSCsc88636.
– Links flap for various Layer 3 protocols.
– A traffic loss of several seconds occurs during the upgrade process.
Workaround: Do not use the quick option with the issu changeversion command.
Workaround: Enter shut then no shut the port to restore connectivity. CSCtz94862
– Enter shut then no shut on the port. CSCua63562
Workaround: Enter the show platform software interface Gix/xx statistic command.
This section lists the resolved caveats in Release 15.0(2)SG4:
Workaround: Clear the MAC address. CSCtn24046
Workaround: Do not use the broadcast keyword in the aaa accounting configuration. CSCts56125
The occurs under the following conditions:
– Multi-auth (or multi-host) and MAB dot1x are configured on a port.
– A voice VLAN is not configured on the port.
– The device authenticates through 802.1X.
– The connected device sends no traffic, falls over to MAB, and then successfully authenticates through 802.1X.
– A dynamic VLAN is assigned to the port following 802.1X authorization.
– Enter shut then no shut on the port to halt the high CPU and log messages.
– Enter the switchport voice vlan command on the port. CSCtw73754
This section lists the open caveats for Cisco IOS Release 15.0(2)SG3:
– If such a certificate does not exist and the device's hostname and default_domain are set, then a persistent self-signed certificate is generated.
– If such a certificate exists, the FQDN in the certificate is compared with the current device's hostname and default_domain. If either differs from the FQDN in the certificate, the existing persistent self-signed certificate is replaced with a new one with the updated FQDN. Be aware that the existing key pair is used in the new certificate.
On a switch that supports redundancy, the generation of the self-signed certificate occurs independently on the active and the standby supervisor engines, and the certificates differ. After switchover, the HTTP client that holds the old certificate cannot connect to the HTTPS server.
Workaround: Reconnect. CSCsb11964
This does not affect performance.
Workaround: Enter the no shutdown command. CSCsg27395
Workaround: Remove the transceiver from the new port and place it in the old port. After the SFP is recognized in the old port, remove it slowly and insert it in the new port. (CSCse34693)
Workaround: None. This is an informational message. CSCsi60898
Workarounds: Do one of the following:
– After a reload, copy the startup-config to the running-config.
– Use a loopback interface as the target of the ip unnumbered command.
– Change the CLI configuration so that during bootup the router port is created first.
Workaround: When the port channel starts to flap, enter shut and no shut on the port channel. After the first switchover and after deleting the port channel, create a new channel. CSCsr00333
Workaround: Configure an ISL/dot1q trunk port. CSCsu43445
Workaround: Do one of the following:
– Reload the standby switch again with the line card in place.
– Remove and reenter the commands on the active supervisor engine. The standby supervisor engine will acquire this change. CSCsv44866
This applies to classic or E-series Catalyst 4500 supervisor engines running
Cisco IOS Release 12.2(50)SG
If the switch were to run a supervisor switchover while in this state, the host's MAC address would not be present in the new active supervisor engine’s MAC address table, causing possible connectivity interruption on the host.
Workaround: Enter the shutdown command, followed by the no shutdown command on the interface. This triggers relearning and synchronizing of the host's MAC to the standby supervisor engine. CSCsw91661
The queue transmit counters as well as the policing statistics (if any) are correct. CSCsz20149
This only happens when the switch is running network mobility service protocol (nmsp). It does not happen if the phone is CDP enabled.
Workaround: Use the VLAN ID or name to differentiate the IP phone and the PC sitting behind the phone on the WCS.
The IP phone is detected on the voice VLAN, and the displayed information of serial number, model number, and software version is correct. However, a PC sitting behind the phone is detected on a data VLAN, and the displayed device information is wrong and should be ignored.
Workaround: When interface mode is changed from Layer2 to Layer3, manually change interface trust state by enter the cos trust dscp command. CSCta16492
Prior to Cisco IOS Release 12.2(53)SG1 and 12.2(50)SG6, the switchport block multicast command blocks IP Multicast, Layer 2 multicast, and broadcast traffic. CSCta61825
Despite the different default value, you can configure any value in the time range.
Workarounds: The Cisco switch default link-flap detection value is 5 flaps in 10 seconds. Use the default value or larger numbers. CSCtg07677
Similarly, the show epm sessions command always displays the authentication method as DOT1X.
Workaround: To view the authentication method used for a client, enter the
show authentication sessions command. CSCsx42157
Workaround: Configure both dead-criteria and deadtime.
Workaround: Enter shut, and then no shut on the ports. CSCtn88228
Workaround: Enter shut, and then no shut on the port to synchronize the STP state. CSCtf52437
Workaround: After the switch reloads, enter shut, and then no shut on the port channel interface.
Workaround: Shut down the CE-facing interface. After all of the mask-value entries point to the target CE, unshut the CE-facing interface. CSCtl09941
Workaround: Remove these operators from any dynamic ACLs. CSCts05302
Workaround: Do not use the broadcast keyword in the aaa accounting configuration. CSCts56125
The occurs under the following conditions:
– Multi-auth (or multi-host) and MAB dot1x are configured on a port.
– A voice VLAN is not configured on the port.
– The device authenticates through 802.1X.
– The connected device sends no traffic, falls over to MAB, and then successfully authenticates through 802.1X.
– A dynamic VLAN is assigned to the port following 802.1X authorization.
– Enter shut then no shut on the port to halt the high CPU and log messages.
– Enter the switchport voice vlan command on the port. CSCtw73754
Workaround: Unconfigure the following from the switch: aaa accounting send stop-record authentication failure. CSCtj69212
Workaround: Retain the trunk native V LAN as 1. CSCud05521
Workaround: Shorten the dACL name. CSCug78653
Workaround: Return a dACL in the authorization profile with successful guest authentication.
– A fast stream of traffic matches the URL redirect ACL as IPDT clears an address.
– A traffic stream matches the URL redirect ACL and no URL redirect policy is installed for that IP address.
If memory leak occurs repeatedly, IPDT and other control packet processing ultimately ceases.
Workaround: If this behavior completely fills the CPU buffer, the switch must be reloaded. However, the frequency of encountering a stuck queue can be reduced to nearly zero by modifying the URL redirect ACL to permit only 80/443 traffic. CSCug56646
Workaround: Reinsert the X2. CSCsk43618
Workaround: Enter the show policy-map interface command to find the actual burst value programmed. CSCsi71036
If you enter the show policy-map name, however, the unconditional marking actions appear. CSCsi94144
This behavior occurs in a redundant switch when the active supervisor engine is running Cisco IOS, the standby supervisor engine is in ROMMON, and the standby supervisor engine’s ROMMON is upgraded from version 0.34 or to a later version. The upgrade process causes the uplinks on the standby supervisor engine to go down but the active supervisor engine is unaware of this.
Workarounds: To resume normal operation, do one of the following:
– Reload both supervisor engines with the redundancy reload shelf command.
– Power-cycle the standby supervisor engine by briefly pulling it from the chassis.
There is no workaround for the link flap issue. CSCsm81875
This problem can happen when pause frames are sent to a switch port and the flow control receive configuration is toggled on a 10-Gigabit Ethernet port.
Workaround: Change the flow control receive configuration when no traffic exists. CSCso71647
You only see this behavior if you initially did not allocate a VLAN before you configure the IFM, and then later allocate the same VLAN.
Workaround: Unconfigure, and then reconfigure the IFM on the port.
Workaround: Disable native VLAN tagging on the trunk port of the switch by entering the
no switchport trunk native vlan tag command. CSCsz12611
Workaround: No functional impact.
You must wait for the ACLs to be programmed before performing other TCAM related changes. CSCtd57063
Workaround: Reduce the number of VLAN mappings. CSCtn56208
Workaround: Configure IP multicast routing globally and establish IP PIM sparse dense mode on the CE-facing interface. CSCtl97692
Workaround: Unconfigure and reconfigure the service group. CSCtn88087
Workaround: Enable a Layer 3 interface in the running configuration. CSCsc88636.
– Links flap for various Layer 3 protocols.
– A traffic loss of several seconds occurs during the upgrade process.
Workaround: Do not use the quick option with the issu changeversion command.
Workaround: Clear the MAC address. CSCtn24046
Workaround: Enter the show platform software interface Gix/xx statistic command.
This section lists the resolved caveats in Release 15.0(2)SG3:
Only WS-C4900M uplink ports (Te1/1-8), WS-X45-SUP6L-E uplink ports, and WS-X4904-10GE are affected.
Workaround: Use a non-affected module for REP ports such as WS-X4908-10GE. CSCtr76579
Cisco has released free software updates that address this vulnerability. Workarounds that mitigate this vulnerability are available. This advisory is available at the following link:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120328-msdp
Note The March 28, 2012, Cisco IOS Software Security Advisory bundled publication includes nine Cisco Security Advisories. Each advisory lists the Cisco IOS Software releases that correct the vulnerability or vulnerabilities detailed in the advisory as well as the Cisco IOS Software releases that correct all vulnerabilities in the March 2012 bundled publication.
Individual publication links are in ''Cisco Event Response: Semiannual Cisco IOS Software Security Advisory Bundled Publication'' at the following link:
http://www.cisco.com/web/about/security/intelligence/Cisco_ERP_mar12.html
Products that are not running Cisco IOS Software are not vulnerable.
Cisco has released free software updates that address these vulnerabilities.
The HTTP server may be disabled as a workaround for the vulnerability described in this advisory.
This advisory is available at the following link:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120328-pai
This section lists the open caveats for Cisco IOS Release 15.0(2)SG2:
– If such a certificate does not exist and the device's hostname and default_domain are set, then a persistent self-signed certificate is generated.
– If such a certificate exists, the FQDN in the certificate is compared with the current device's hostname and default_domain. If either differs from the FQDN in the certificate, the existing persistent self-signed certificate is replaced with a new one with the updated FQDN. Be aware that the existing key pair is used in the new certificate.
On a switch that supports redundancy, the generation of the self-signed certificate occurs independently on the active and the standby supervisor engines, and the certificates differ. After switchover, the HTTP client that holds the old certificate cannot connect to the HTTPS server.
Workaround: Reconnect. CSCsb11964
This does not affect performance.
Workaround: Enter the no shutdown command. CSCsg27395
Workaround: Remove the transceiver from the new port and place it in the old port. After the SFP is recognized in the old port, remove it slowly and insert it in the new port. (CSCse34693)
Workaround: None. This is an informational message. CSCsi60898
Workarounds: Do one of the following:
– After a reload, copy the startup-config to the running-config.
– Use a loopback interface as the target of the ip unnumbered command.
– Change the CLI configuration so that during bootup the router port is created first.
Workaround: When the port channel starts to flap, enter shut and no shut on the port channel. After the first switchover and after deleting the port channel, create a new channel. CSCsr00333
Workaround: Configure an ISL/dot1q trunk port. CSCsu43445
Workaround: Do one of the following:
– Reload the standby switch again with the line card in place.
– Remove and reenter the commands on the active supervisor engine. The standby supervisor engine will acquire this change. CSCsv44866
This applies to classic or E-series Catalyst 4500 supervisor engines running
Cisco IOS Release 12.2(50)SG
If the switch were to run a supervisor switchover while in this state, the host's MAC address would not be present in the new active supervisor engine’s MAC address table, causing possible connectivity interruption on the host.
Workaround: Enter the shutdown command, followed by the no shutdown command on the interface. This triggers relearning and synchronizing of the host's MAC to the standby supervisor engine. CSCsw91661
The queue transmit counters as well as the policing statistics (if any) are correct. CSCsz20149
This only happens when the switch is running network mobility service protocol (nmsp). It does not happen if the phone is CDP enabled.
Workaround: Use the VLAN ID or name to differentiate the IP phone and the PC sitting behind the phone on the WCS.
The IP phone is detected on the voice VLAN, and the displayed information of serial number, model number, and software version is correct. However, a PC sitting behind the phone is detected on a data VLAN, and the displayed device information is wrong and should be ignored.
Workaround: When interface mode is changed from Layer2 to Layer3, manually change interface trust state by enter the cos trust dscp command. CSCta16492
Prior to Cisco IOS Release 12.2(53)SG1 and 12.2(50)SG6, the switchport block multicast command blocks IP Multicast, Layer 2 multicast, and broadcast traffic. CSCta61825
Despite the different default value, you can configure any value in the time range.
Workarounds: The Cisco switch default link-flap detection value is 5 flaps in 10 seconds. Use the default value or larger numbers. CSCtg07677
Similarly, the show epm sessions command always displays the authentication method as DOT1X.
Workaround: To view the authentication method used for a client, enter the
show authentication sessions command. CSCsx42157
Workaround: Configure both dead-criteria and deadtime.
Workaround: Enter shut, and then no shut on the ports. CSCtn88228
Workaround: Enter shut, and then no shut on the port to synchronize the STP state. CSCtf52437
Workaround: After the switch reloads, enter shut, and then no shut on the port channel interface.
Workaround: Shut down the CE-facing interface. After all of the mask-value entries point to the target CE, unshut the CE-facing interface. CSCtl09941
Workaround: Remove these operators from any dynamic ACLs. CSCts05302
Workaround: Do not use the broadcast keyword in the aaa accounting configuration. CSCts56125
The occurs under the following conditions:
– Multi-auth (or multi-host) and MAB dot1x are configured on a port.
– A voice VLAN is not configured on the port.
– The device authenticates through 802.1X.
– The connected device sends no traffic, falls over to MAB, and then successfully authenticates through 802.1X.
– A dynamic VLAN is assigned to the port following 802.1X authorization.
– Enter shut then no shut on the port to halt the high CPU and log messages.
– Enter the switchport voice vlan command on the port. CSCtw73754
Workaround: Unconfigure the following from the switch: aaa accounting send stop-record authentication failure. CSCtj69212
Workaround: Retain the trunk native V LAN as 1. CSCud05521
Workaround: Shorten the dACL name. CSCug78653
Workaround: Return a dACL in the authorization profile with successful guest authentication.
– A fast stream of traffic matches the URL redirect ACL as IPDT clears an address.
– A traffic stream matches the URL redirect ACL and no URL redirect policy is installed for that IP address.
If memory leak occurs repeatedly, IPDT and other control packet processing ultimately ceases.
Workaround: If this behavior completely fills the CPU buffer, the switch must be reloaded. However, the frequency of encountering a stuck queue can be reduced to nearly zero by modifying the URL redirect ACL to permit only 80/443 traffic. CSCug56646
Workaround: Reinsert the X2. CSCsk43618
Workaround: Enter the show policy-map interface command to find the actual burst value programmed. CSCsi71036
If you enter the show policy-map name, however, the unconditional marking actions appear. CSCsi94144
This behavior occurs in a redundant switch when the active supervisor engine is running Cisco IOS, the standby supervisor engine is in ROMMON, and the standby supervisor engine’s ROMMON is upgraded from version 0.34 or to a later version. The upgrade process causes the uplinks on the standby supervisor engine to go down but the active supervisor engine is unaware of this.
Workarounds: To resume normal operation, do one of the following:
– Reload both supervisor engines with the redundancy reload shelf command.
– Power-cycle the standby supervisor engine by briefly pulling it from the chassis.
There is no workaround for the link flap issue. CSCsm81875
This problem can happen when pause frames are sent to a switch port and the flow control receive configuration is toggled on a 10-Gigabit Ethernet port.
Workaround: Change the flow control receive configuration when no traffic exists. CSCso71647
You only see this behavior if you initially did not allocate a VLAN before you configure the IFM, and then later allocate the same VLAN.
Workaround: Unconfigure, and then reconfigure the IFM on the port.
Workaround: Disable native VLAN tagging on the trunk port of the switch by entering the
no switchport trunk native vlan tag command. CSCsz12611
Workaround: No functional impact.
You must wait for the ACLs to be programmed before performing other TCAM related changes. CSCtd57063
Workaround: Reduce the number of VLAN mappings. CSCtn56208
Workaround: Configure IP multicast routing globally and establish IP PIM sparse dense mode on the CE-facing interface. CSCtl97692
Workaround: Unconfigure and reconfigure the service group. CSCtn88087
Workaround: Enable a Layer 3 interface in the running configuration. CSCsc88636.
– Links flap for various Layer 3 protocols.
– A traffic loss of several seconds occurs during the upgrade process.
Workaround: Do not use the quick option with the issu changeversion command. CSCto51562
Only WS-C4900M uplink ports (Te1/1-8), WS-X45-SUP6L-E uplink ports, and WS-X4904-10GE are affected.
Workaround: Use a non-affected module for REP ports such as WS-X4908-10GE. CSCtr76579
Workaround: Clear the MAC address. CSCtn24046
Workaround: Enter the show platform software interface Gix/xx statistic command.
This section lists the resolved caveats in Release 15.0(2)SG2:
The primary flex link interface comes up correctly.
Workaround: Configure static MAC address for the MAC address that must be learned dynamically on the backup flex link interface. CSCtr40070
– Configure the switch port for mab rather than mab eap.
– Configure the AAA server to propose EAP-MD5 first rather than EAP-TLS for MAB EAP requests. CSCti78674
1. Delete, then add the affected VLAN with no vlan vlan_ID, then lan vlan_ID.
2. Flap the impacted port-channel with shutdown, then no shutdown. CSCtr17251
Workaround: Attach the console to collect additional crash data. CSCtu05426
Workaround: Re-enter the rep preempt segment command. CSCtr89862
Cisco has released free software updates that address this vulnerability. Workarounds that mitigate this vulnerability are available. This advisory is available at the following link:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120328-msdp
Note The March 28, 2012, Cisco IOS Software Security Advisory bundled publication includes nine Cisco Security Advisories. Each advisory lists the Cisco IOS Software releases that correct the vulnerability or vulnerabilities detailed in the advisory as well as the Cisco IOS Software releases that correct all vulnerabilities in the March 2012 bundled publication.
Individual publication links are in ''Cisco Event Response: Semiannual Cisco IOS Software Security Advisory Bundled Publication'' at the following link:
http://www.cisco.com/web/about/security/intelligence/Cisco_ERP_mar12.html
Products that are not running Cisco IOS Software are not vulnerable.
Cisco has released free software updates that address these vulnerabilities.
The HTTP server may be disabled as a workaround for the vulnerability described in this advisory.
This advisory is available at the following link:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120328-pai
This section lists the open caveats for Cisco IOS Release 15.0(2)SG1:
– If such a certificate does not exist and the device's hostname and default_domain are set, then a persistent self-signed certificate is generated.
– If such a certificate exists, the FQDN in the certificate is compared with the current device's hostname and default_domain. If either differs from the FQDN in the certificate, the existing persistent self-signed certificate is replaced with a new one with the updated FQDN. Be aware that the existing key pair is used in the new certificate.
On a switch that supports redundancy, the generation of the self-signed certificate occurs independently on the active and the standby supervisor engines, and the certificates differ. After switchover, the HTTP client that holds the old certificate cannot connect to the HTTPS server.
Workaround: Reconnect. CSCsb11964
This does not affect performance.
Workaround: Enter the no shutdown command. CSCsg27395
Workaround: Remove the transceiver from the new port and place it in the old port. After the SFP is recognized in the old port, remove it slowly and insert it in the new port. (CSCse34693)
Workaround: None. This is an informational message. CSCsi60898
Workarounds: Do one of the following:
– After a reload, copy the startup-config to the running-config.
– Use a loopback interface as the target of the ip unnumbered command.
– Change the CLI configuration so that during bootup the router port is created first.
Workaround: When the port channel starts to flap, enter shut and no shut on the port channel. After the first switchover and after deleting the port channel, create a new channel. CSCsr00333
Workaround: Configure an ISL/dot1q trunk port. CSCsu43445
Workaround: Do one of the following:
– Reload the standby switch again with the line card in place.
– Remove and reenter the commands on the active supervisor engine. The standby supervisor engine will acquire this change. CSCsv44866
This applies to classic or E-series Catalyst 4500 supervisor engines running
Cisco IOS Release 12.2(50)SG
If the switch were to run a supervisor switchover while in this state, the host's MAC address would not be present in the new active supervisor engine’s MAC address table, causing possible connectivity interruption on the host.
Workaround: Enter the shutdown command, followed by the no shutdown command on the interface. This triggers relearning and synchronizing of the host's MAC to the standby supervisor engine. CSCsw91661
The queue transmit counters as well as the policing statistics (if any) are correct. CSCsz20149
This only happens when the switch is running network mobility service protocol (nmsp). It does not happen if the phone is CDP enabled.
Workaround: Use the VLAN ID or name to differentiate the IP phone and the PC sitting behind the phone on the WCS.
The IP phone is detected on the voice VLAN, and the displayed information of serial number, model number, and software version is correct. However, a PC sitting behind the phone is detected on a data VLAN, and the displayed device information is wrong and should be ignored.
Workaround: When interface mode is changed from Layer2 to Layer3, manually change interface trust state by enter the cos trust dscp command. CSCta16492
Prior to Cisco IOS Release 12.2(53)SG1 and 12.2(50)SG6, the switchport block multicast command blocks IP Multicast, Layer 2 multicast, and broadcast traffic. CSCta61825
Despite the different default value, you can configure any value in the time range.
Workarounds: The Cisco switch default link-flap detection value is 5 flaps in 10 seconds. Use the default value or larger numbers. CSCtg07677
Similarly, the show epm sessions command always displays the authentication method as DOT1X.
Workaround: To view the authentication method used for a client, enter the
show authentication sessions command. CSCsx42157
Workaround: Configure both dead-criteria and deadtime.
Workaround: Enter shut, and then no shut on the ports. CSCtn88228
Workaround: Enter shut, and then no shut on the port to synchronize the STP state. CSCtf52437
Workaround: After the switch reloads, enter shut, and then no shut on the port channel interface.
Workaround: Shut down the CE-facing interface. After all of the mask-value entries point to the target CE, unshut the CE-facing interface. CSCtl09941
The primary flex link interface comes up correctly.
Workaround: Configure static MAC address for the MAC address that must be learned dynamically on the backup flex link interface. CSCtr40070
Workaround: Remove these operators from any dynamic ACLs. CSCts05302
– Configure the switch port for mab rather than mab eap.
– Configure the AAA server to propose EAP-MD5 first rather than EAP-TLS for MAB EAP requests. CSCti78674
1. Delete, then add the affected VLAN with no vlan vlan_ID, then lan vlan_ID.
2. Flap the impacted port-channel with shutdown, then no shutdown. CSCtr17251
Workaround: Re-enter the rep preempt segment command. CSCtr89862
Workaround: Do not use the broadcast keyword in the aaa accounting configuration. CSCts56125
The occurs under the following conditions:
– Multi-auth (or multi-host) and MAB dot1x are configured on a port.
– A voice VLAN is not configured on the port.
– The device authenticates through 802.1X.
– The connected device sends no traffic, falls over to MAB, and then successfully authenticates through 802.1X.
– A dynamic VLAN is assigned to the port following 802.1X authorization.
– Enter shut then no shut on the port to halt the high CPU and log messages.
– Enter the switchport voice vlan command on the port. CSCtw73754
Workaround: Unconfigure the following from the switch: aaa accounting send stop-record authentication failure. CSCtj69212
Workaround: Retain the trunk native V LAN as 1. CSCud05521
Workaround: Shorten the dACL name. CSCug78653
Workaround: Return a dACL in the authorization profile with successful guest authentication.
– A fast stream of traffic matches the URL redirect ACL as IPDT clears an address.
– A traffic stream matches the URL redirect ACL and no URL redirect policy is installed for that IP address.
If memory leak occurs repeatedly, IPDT and other control packet processing ultimately ceases.
Workaround: If this behavior completely fills the CPU buffer, the switch must be reloaded. However, the frequency of encountering a stuck queue can be reduced to nearly zero by modifying the URL redirect ACL to permit only 80/443 traffic. CSCug56646
Workaround: Attach the console to collect additional crash data. CSCtu05426
Workaround: Reinsert the X2. CSCsk43618
Workaround: Enter the show policy-map interface command to find the actual burst value programmed. CSCsi71036
If you enter the show policy-map name, however, the unconditional marking actions appear. CSCsi94144
This behavior occurs in a redundant switch when the active supervisor engine is running Cisco IOS, the standby supervisor engine is in ROMMON, and the standby supervisor engine’s ROMMON is upgraded from version 0.34 or to a later version. The upgrade process causes the uplinks on the standby supervisor engine to go down but the active supervisor engine is unaware of this.
Workarounds: To resume normal operation, do one of the following:
– Reload both supervisor engines with the redundancy reload shelf command.
– Power-cycle the standby supervisor engine by briefly pulling it from the chassis.
There is no workaround for the link flap issue. CSCsm81875
This problem can happen when pause frames are sent to a switch port and the flow control receive configuration is toggled on a 10-Gigabit Ethernet port.
Workaround: Change the flow control receive configuration when no traffic exists. CSCso71647
You only see this behavior if you initially did not allocate a VLAN before you configure the IFM, and then later allocate the same VLAN.
Workaround: Unconfigure, and then reconfigure the IFM on the port.
Workaround: Disable native VLAN tagging on the trunk port of the switch by entering the
no switchport trunk native vlan tag command. CSCsz12611
Workaround: No functional impact.
You must wait for the ACLs to be programmed before performing other TCAM related changes. CSCtd57063
Workaround: Reduce the number of VLAN mappings. CSCtn56208
Workaround: Configure IP multicast routing globally and establish IP PIM sparse dense mode on the CE-facing interface. CSCtl97692
Workaround: Unconfigure and reconfigure the service group. CSCtn88087
Workaround: Enable a Layer 3 interface in the running configuration. CSCsc88636.
– Links flap for various Layer 3 protocols.
– A traffic loss of several seconds occurs during the upgrade process.
Workaround: Do not use the quick option with the issu changeversion command. CSCto51562
Only WS-C4900M uplink ports (Te1/1-8), WS-X45-SUP6L-E uplink ports, and WS-X4904-10GE are affected.
Workaround: Use a non-affected module for REP ports such as WS-X4908-10GE. CSCtr76579
Workaround: Clear the MAC address. CSCtn24046
Workaround: Enter the show platform software interface Gix/xx statistic command.
This section lists the resolved caveats in Release 15.0(2)SG1:
– Force the supplicant to use multicast EAPOL.
– Do not use authentication open mode.
Workaround: Configure an ACL on the port. CSCte18760
Workaround: Configure a port ACL on the interface. CSCtl89389
Workaround: Do not configure open directive on the switch.
Workaround: Disable gratuitous ARP on the Windows device. CSCtn27420
In this output, sequence 40 is the unexpected command that appears in front of the entry.
Workaround: Delete the access list and reconfigure all entries, rather than deleting or reconfiguring the access list. CSCtn83348
Workaround: Enter the interface range command to configure all member ports to use a new port channel that is created automatically. CSCtn52362
Workaround: Enter shut, and then no shut on the member port. CSCtn52404
Workaround: Add the following permit ACEs to the ACL:
Workaround: None. Use a different IGMP group address. CSCtq15982
Workaround: Remove the logging filter. CSCto76709
Workaround: Cut and paste the configuration. Then apply rapidly to PVLAN isolated trunk port. CSCtq04058
The CDP TLV generated to indicate that a data device has disconnected is ignored. This is done to avoid disconnecting other connected data clients, if any. (Refer to CSCta47293.)
Workarounds: Enter either of the following commands:
– clear authentication session interface
– authentication timer inactivity
Workaround: Modify filter ID or fallback ACLs only when they are not in use. CSCto79274
This section lists the open caveats for Cisco IOS Release 15.0(2)SG:
– If such a certificate does not exist and the device's hostname and default_domain are set, then a persistent self-signed certificate is generated.
– If such a certificate exists, the FQDN in the certificate is compared with the current device's hostname and default_domain. If either differs from the FQDN in the certificate, the existing persistent self-signed certificate is replaced with a new one with the updated FQDN. Be aware that the existing key pair is used in the new certificate.
On a switch that supports redundancy, the generation of the self-signed certificate occurs independently on the active and the standby supervisor engines, and the certificates differ. After switchover, the HTTP client that holds the old certificate cannot connect to the HTTPS server.
Workaround: Reconnect. CSCsb11964
This does not affect performance.
Workaround: Enter the no shutdown command. CSCsg27395
Workaround: Remove the transceiver from the new port and place it in the old port. After the SFP is recognized in the old port, remove it slowly and insert it in the new port. CSCse34693
Workaround: None. This is an informational message. (CSCsi60898)
Workarounds: Do one of the following:
– After a reload, copy the startup-config to the running-config.
– Use a loopback interface as the target of the ip unnumbered command.
– Change the CLI configuration so that during bootup the router port is created first.
Workaround: When the port channel starts to flap, enter shut and no shut on the port channel. After the first switchover and after deleting the port channel, create a new channel. CSCsr00333
Workaround: Configure an ISL/dot1q trunk port. CSCsu43445
Workaround: Do one of the following:
– Reload the standby switch again with the line card in place.
– Remove and reenter the commands on the active supervisor engine. The standby supervisor engine will acquire this change. CSCsv44866
This applies to classic or E-series Catalyst 4500 supervisor engines running
Cisco IOS Release 12.2(50)SG
If the switch were to run a supervisor switchover while in this state, the host's MAC address would not be present in the new active supervisor engine’s MAC address table, causing possible connectivity interruption on the host.
Workaround: Enter the shutdown command, followed by the no shutdown command on the interface. This triggers relearning and synchronizing of the host's MAC to the standby supervisor engine. CSCsw91661
The queue transmit counters as well as the policing statistics (if any) are correct. CSCsz20149
This only happens when the switch is running network mobility service protocol (nmsp). It does not happen if the phone is CDP enabled.
Workaround: Use the VLAN ID or name to differentiate the IP phone and the PC sitting behind the phone on the WCS.
The IP phone is detected on the voice VLAN, and the displayed information of serial number, model number, and software version is correct. However, a PC sitting behind the phone is detected on a data VLAN, and the displayed device information is wrong and should be ignored.
Workaround: When interface mode is changed from Layer2 to Layer3, manually change interface trust state by enter the cos trust dscp command. CSCta16492
Prior to Cisco IOS Release 12.2(53)SG1 and 12.2(50)SG6, the switchport block multicast command blocks IP Multicast, Layer 2 multicast, and broadcast traffic. CSCta61825
Despite the different default value, you can configure any value in the time range.
Workarounds: The Cisco switch default link-flap detection value is 5 flaps in 10 seconds. Use the default value or larger numbers. CSCtg07677
The CDP TLV generated to indicate that a data device has disconnected is ignored. This is done to avoid disconnecting other connected data clients, if any. (Refer to CSCta47293.)
Workarounds: Enter either of the following commands:
– clear authentication session interface
– authentication timer inactivity
Workaround: Configure an ACL on the port. CSCte18760
Similarly, the show epm sessions command always displays the authentication method as DOT1X.
Workaround: To view the authentication method used for a client, enter the
show authentication sessions command. CSCsx42157
Workaround: Configure both dead-criteria and deadtime.
Workaround: Configure a port ACL on the interface. CSCtl89389
Workaround: Enter shut, and then no shut on the ports. CSCtn88228
Workaround: Enter shut, and then no shut on the port to synchronize the STP state. CSCtf52437
Workaround: Do not configure open directive on the switch.
Workaround: Disable gratuitous ARP on the Windows device. CSCtn27420
Workaround: After the switch reloads, enter shut, and then no shut on the port channel interface.
In this output, sequence 40 is the unexpected command that appears in front of the entry.
Workaround: Delete the access list and reconfigure all entries, rather than deleting or reconfiguring the access list. CSCtn83348
Workaround: Shut down the CE-facing interface. After all of the mask-value entries point to the target CE, unshut the CE-facing interface. CSCtl09941
Workaround: Enter the interface range command to configure all member ports to use a new port channel that is created automatically. CSCtn52362
Workaround: Enter shut, and then no shut on the member port. CSCtn52404
Workaround: Modify filter ID or fallback ACLs only when they are not in use. CSCto79274
1. Delete, then add the affected VLAN with no vlan vlan_ID, then lan vlan_ID.
2. Flap the impacted port-channel with shutdown, then no shutdown. CSCtr17251
The primary flex link interface comes up correctly.
Workaround: Configure static MAC address for the MAC address that must be learned dynamically on the backup flex link interface. CSCtr40070
Workaround: Re-enter the rep preempt segment command. CSCtr89862
– Configure the switch port for mab rather than mab eap.
– Configure the AAA server to propose EAP-MD5 first rather than EAP-TLS for MAB EAP requests. CSCti78674
Workaround: Do not use the broadcast keyword in the aaa accounting configuration. CSCts56125
The occurs under the following conditions:
– Multi-auth (or multi-host) and MAB dot1x are configured on a port.
– A voice VLAN is not configured on the port.
– The device authenticates through 802.1X.
– The connected device sends no traffic, falls over to MAB, and then successfully authenticates through 802.1X.
– A dynamic VLAN is assigned to the port following 802.1X authorization.
– Enter shut then no shut on the port to halt the high CPU and log messages.
– Enter the switchport voice vlan command on the port. CSCtw73754
Workaround: Unconfigure the following from the switch: aaa accounting send stop-record authentication failure. CSCtj69212
Workaround: Retain the trunk native V LAN as 1. CSCud05521
Workaround: Shorten the dACL name. CSCug78653
Workaround: Return a dACL in the authorization profile with successful guest authentication.
– A fast stream of traffic matches the URL redirect ACL as IPDT clears an address.
– A traffic stream matches the URL redirect ACL and no URL redirect policy is installed for that IP address.
If memory leak occurs repeatedly, IPDT and other control packet processing ultimately ceases.
Workaround: If this behavior completely fills the CPU buffer, the switch must be reloaded. However, the frequency of encountering a stuck queue can be reduced to nearly zero by modifying the URL redirect ACL to permit only 80/443 traffic. CSCug56646
Workaround: Attach the console to collect additional crash data. CSCtu05426
Workaround: Reinsert the X2. (CSCsk43618)
Workaround: Enter the show policy-map interface command to find the actual burst value programmed. CSCsi71036
If you enter the show policy-map name, however, the unconditional marking actions appear. CSCsi94144
This behavior occurs in a redundant switch when the active supervisor engine is running Cisco IOS, the standby supervisor engine is in ROMMON, and the standby supervisor engine’s ROMMON is upgraded from version 0.34 or to a later version. The upgrade process causes the uplinks on the standby supervisor engine to go down but the active supervisor engine is unaware of this.
Workarounds: To resume normal operation, do one of the following:
– Reload both supervisor engines with the redundancy reload shelf command.
– Power-cycle the standby supervisor engine by briefly pulling it from the chassis.
There is no workaround for the link flap issue. CSCsm81875
This problem can happen when pause frames are sent to a switch port and the flow control receive configuration is toggled on a 10-Gigabit Ethernet port.
Workaround: Change the flow control receive configuration when no traffic exists. CSCso71647
You only see this behavior if you initially did not allocate a VLAN before you configure the IFM, and then later allocate the same VLAN.
Workaround: Unconfigure, and then reconfigure the IFM on the port.
Workaround: Disable native VLAN tagging on the trunk port of the switch by entering the
no switchport trunk native vlan tag command. CSCsz12611
Workaround: No functional impact.
You must wait for the ACLs to be programmed before performing other TCAM related changes. CSCtd57063
Workaround: Add the following permit ACEs to the ACL:
Workaround: Shut the member port. CSCtn49832
Workaround: Reduce the number of VLAN mappings. CSCtn56208
Workaround: Configure IP multicast routing globally and establish IP PIM sparse dense mode on the CE-facing interface. CSCtl97692
Workaround: Unconfigure and reconfigure the service group. CSCtn88087
Workaround: Enable a Layer 3 interface in the running configuration. CSCsc88636.
– Links flap for various Layer 3 protocols.
– A traffic loss of several seconds occurs during the upgrade process.
Workaround: Do not use the quick option with the issu changeversion command. CSCto51562
Only WS-C4900M uplink ports (Te1/1-8), WS-X45-SUP6L-E uplink ports, and WS-X4904-10GE are affected.
Workaround: Use a non-affected module for REP ports such as WS-X4908-10GE. CSCtr76579
Workaround: Clear the MAC address. CSCtn24046
Workaround: Enter the show platform software interface Gix/xx statistic command.
This section lists the resolved caveats in Release 15.0(2)SG:
Workaround: Reconfigure VLAN load balancing with a different configuration, by performing the following task:
a. Reconfigure the VLAN load balancing configuration on the desired REP ports.
b. Use the shut command on any one REP port in the segment to cause a failure in that segment.
c. Use the no shut command on the same port to restore normal REP topology with one ALT port.
d. Invoke manual preemption on a primary edge port to obtain VLAN load balancing with the new configuration.
Workaround: When a log message appears indicating that the SFP+ has been removed, do one of the following:
– Enter any commands for that port.
– Insert an SFP+ in that port.
– Reinsert the removed SFP+ in another port. CSCsv90044
Workaround: Enter shut, and then no shut on the SVI. CSCtg72559
Workaround: Remove the X2 or SFP from the port. CSCth08212
Workaround: Disable the ip cef accounting non-recursive command. CSCtn68186
Workaround: Use tablemap-based marking. CSC99836
Workaround: Enter shut, and then no shut on the alternate port. CSCtn26322
– Create the VLANs manually. CSCtl94096
Workaround: Enter shut, and then no shut on the alternate interface. CSCtn03533
Workaround: Use the default native VLAN (VLAN of 1) for the trunks. CSCtn29321
This behavior is observed when you use IBM Cable Systems Type 1A/2A or any two-pair cable, including Cat5e.
These sections provide troubleshooting guidelines for the Catalyst 4000 family running IOS supervisor engines:
Netbooting using a boot loader image is not supported. Instead, use one of the following options to boot an image:
1. Boot from a CompactFlash card by entering the following command:
The ROMMON TFTP boot is very similar to the BOOTLDR TFTP boot, except that:
– the BOOTLDR variable should not be set
– the TFTP server must be accessible from the Ethernet management port on the supervisor engine.
To boot from ROMMON, perform the following tasks while in ROMMON mode:
a. Ensure that the Ethernet management port on the supervisor engine is physically connected to the network.
b. Verify that bootloader environment is not set by entering the unset bootldr command.
c. Set IP address of the Ethernet management port on the supervisor engine by entering the following command: set interface fa1 ip_address > < ip_mask
For example, to set the supervisor engine Ethernet port with an IP address 172.16.1.5 and IP mask 255.255.255.0, enter the following command:
d. Set default gateway for the Ethernet management port on the supervisor engine by entering the following command: set ip route default gateway_ip_address. The default gateway should be directly connected to the supervisor engine Ethernet management port subnet.
e. Ping the TFTP server to ensure that there is connectivity to the server from the Ethernet management port on the supervisor engine by entering the following command: ping < tftp_server_ip_address >.
f. Once the ping is successful, boot the image from the TFTP server by entering the following command: boot tftp:// tftp_server_ip_address > / < image_path_and_file_name
For example, to boot the image name cat4000-is-mz.160 located on the TFTP server 172.16.1.8, enter the following command:
This section contains troubleshooting guidelines for system-level problems:
This section contains troubleshooting guidelines for modules:
For general information on MIBs, RMON groups, and traps, refer to the Cisco public MIB directory ( http://www.cisco.com/public/sw-center/netmgmt/cmtk/mibs.shtml). For information on the specific MIBs supported by the Catalyst 4500 series switches, refer to the Catalyst 4000 MIB Support List located at ftp://ftp.cisco.com/pub/mibs/supportlists/cat4000/cat4000-supportlist.html.
Although their Release Notes are unique, the 4 platforms (Catalyst 4500, Catalyst 4900, Catalyst ME 4900, and Catalyst 4900M) use the same Software Configuration Guide, Command Reference Guide, and System Message Guide. Refer to the following home pages for additional information:
http://www.cisco.com/go/cat4500/docs
http://www.cisco.com/go/cat4900/docs
http://www.cisco.com/en/US/products/ps7009/tsd_products_support_series_home.html
Installation guides and notes including specifications and relevant safety information are available at the following URLs:
http://www.cisco.com/en/US/docs/switches/lan/catalyst4500/hardware/installation/guide/78-14409-08/4500inst.html
http://www.cisco.com/en/US/docs/switches/lan/catalyst4500/hardware/catalyst4500e/installation/guide/Eseries.html
http://www.cisco.com/en/US/products/hw/switches/ps4324/prod_installation_guides_list.html
http://www.cisco.com/en/US/docs/switches/lan/catalyst4500/hardware/regulatory/compliance/78_13233.html
http://www.cisco.com/en/US/products/hw/switches/ps4324/prod_installation_guides_list.html
http://www.cisco.com/en/US/products/ps6021/prod_installation_guides_list.html
http://www.cisco.com/en/US/products/ps7009/prod_installation_guides_list.html
Software release notes, configuration guides, command references, and system message guides are available at the following URLs:
http://www.cisco.com/en/US/products/hw/switches/ps4324/prod_release_notes_list.html
http://www.cisco.com/en/US/products/ps6021/prod_release_notes_list.html
http://www.cisco.com/en/US/docs/switches/lan/catalyst4500/release/note/OL_11511.html
Software documents for the Catalyst 4500 Classic, Catalyst 4500 E-Series, Catalyst 4900, and
Cisco ME 4900 Series Ethernet Switches are available at the following URLs:
http://www.cisco.com/en/US/products/hw/switches/ps4324/products_installation_and_configuration_guides_list.html
http://www.cisco.com/en/US/products/hw/switches/ps4324/prod_command_reference_list.html
http://www.cisco.com/en/US/products/hw/switches/ps4324/products_system_message_guides_list.html
Platform-independent Cisco IOS documentation may also apply to the Catalyst 4500 and 4900 switches. These documents are available at the following URLs:
http://www.cisco.com/en/US/products/ps6350/products_installation_and_configuration_guides_list.html
http://www.cisco.com/en/US/products/ps6350/prod_command_reference_list.html
You can also use the Command Lookup Tool at:
http://tools.cisco.com/Support/CLILookup/cltSearchAction.do
http://www.cisco.com/en/US/products/ps6350/products_system_message_guides_list.html
You can also use the Error Message Decoder tool at:
http://www.cisco.com/pcgi-bin/Support/Errordecoder/index.cgi
http://www.cisco.com/public/sw-center/netmgmt/cmtk/mibs.shtml
The following notices pertain to this software license.
This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit ( http://www.openssl.org/).
This product includes cryptographic software written by Eric Young (eay@cryptsoft.com).
This product includes software written by Tim Hudson (tjh@cryptsoft.com).
The OpenSSL toolkit stays under a dual license, i.e. both the conditions of the OpenSSL License and the original SSLeay license apply to the toolkit. See below for the actual license texts. Actually both licenses are BSD-style Open Source licenses. In case of any license issues related to OpenSSL please contact openssl-core@openssl.org.
Copyright © 1998-2007 The OpenSSL Project. All rights reserved.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:
1. Redistributions of source code must retain the copyright notice, this list of conditions and the following disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions, and the following disclaimer in the documentation or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgment: “This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit ( http://www.openssl.org/)”.
4. The names “OpenSSL Toolkit” and “OpenSSL Project” must not be used to endorse or promote products derived from this software without prior written permission. For written permission, please contact openssl-core@openssl.org.
5. Products derived from this software may not be called “OpenSSL” nor may “OpenSSL” appear in their names without prior written permission of the OpenSSL Project.
6. Redistributions of any form whatsoever must retain the following acknowledgment:
“This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit ( http://www.openssl.org/)”.
THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT “AS IS”' AND ANY EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
This product includes cryptographic software written by Eric Young (eay@cryptsoft.com). This product includes software written by Tim Hudson (tjh@cryptsoft.com).
Copyright © 1995-1998 Eric Young (eay@cryptsoft.com). All rights reserved.
This package is an SSL implementation written by Eric Young (eay@cryptsoft.com).
The implementation was written so as to conform with Netscapes SSL.
This library is free for commercial and non-commercial use as long as the following conditions are adhered to. The following conditions apply to all code found in this distribution, be it the RC4, RSA, lhash, DES, etc., code; not just the SSL code. The SSL documentation included with this distribution is covered by the same copyright terms except that the holder is Tim Hudson (tjh@cryptsoft.com).
Copyright remains Eric Young’s, and as such any Copyright notices in the code are not to be removed. If this package is used in a product, Eric Young should be given attribution as the author of the parts of the library used. This can be in the form of a textual message at program startup or in documentation (online or textual) provided with the package.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:
1. Redistributions of source code must retain the copyright notice, this list of conditions and the following disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
“This product includes cryptographic software written by Eric Young (eay@cryptsoft.com)”.
The word ‘cryptographic’ can be left out if the routines from the library being used are not cryptography-related.
4. If you include any Windows specific code (or a derivative thereof) from the apps directory (application code) you must include an acknowledgement: “This product includes software written by Tim Hudson (tjh@cryptsoft.com)”.
THIS SOFTWARE IS PROVIDED BY ERIC YOUNG “AS IS” AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
The license and distribution terms for any publicly available version or derivative of this code cannot be changed. i.e. this code cannot simply be copied and put under another distribution license [including the GNU Public License].
For information on obtaining documentation, submitting a service request, and gathering additional information, see the monthly What’s New in Cisco Product Documentation, which also lists all new and revised Cisco technical documentation, at:
http://www.cisco.com/en/US/docs/general/whatsnew/whatsnew.html
Subscribe to the What’s New in Cisco Product Documentation as a Really Simple Syndication (RSS) feed and set content to be delivered directly to your desktop using a reader application. The RSS feeds are a free service and Cisco currently supports RSS Version 2.0.