Release Notes for the Catalyst 4900 Series Switch, Cisco IOS Release 15.0(2)SG
Cisco IOS Software Packaging for the Cisco Catalyst 4900 Series Switch
Feature Support on the LAN Base vs IP Base Images
Cisco IOS Release Strategy for the Catalyst 4900 Series Switch
New Hardware Features in Release15.0(2)SG1
New Software Features in Release15.0(2)SG1
New Hardware Features in Release15.0(2)SG
New Software Features in Release15.0(2)SG
Upgrading the ROMMON from the Console
Upgrading the ROMMON Remotely Using Telnet
Upgrading the Cisco IOS Software
Resolved Caveats in Cisco IOS Release 15.0(2)SG11
Open Caveats in Cisco IOS Release 15.0(2)SG10
Resolved Caveats in Cisco IOS Release 15.0(2)SG10
Resolved Caveats in Cisco IOS Release 15.0(2)SG9
Resolved Caveats in Cisco IOS Release 15.0(2)SG8
Open Caveats in Cisco IOS Release 15.0(2)SG7
Resolved Caveats in Cisco IOS Release 15.0(2)SG7
Open Caveats in Cisco IOS Release 15.0(2)SG6
Resolved Caveats in Cisco IOS Release 15.0(2)SG6
Open Caveats in Cisco IOS Release 15.0(2)SG5
Resolved Caveats in Cisco IOS Release 15.0(2)SG5
Open Caveats in Cisco IOS Release 15.0(2)SG4
Resolved Caveats in Cisco IOS Release 15.0(2)SG4
Open Caveats in Cisco IOS Release 15.0(2)SG3
Resolved Caveats in Cisco IOS Release 15.0(2)SG3
Open Caveats in Cisco IOS Release 15.0(2)SG2
Resolved Caveats in Cisco IOS Release 15.0(2)SG2
Open Caveats in Cisco IOS Release 15.0(2)SG1
Resolved Caveats in Cisco IOS Release 15.0(2)SG1
Open Caveats in Cisco IOS Release 15.0(2)SG
Resolved Caveats in Cisco IOS Release 15.0(2)SG
Troubleshooting at the System Level
Obtaining Documentation and Submitting a Service Request
Current Release
15.0(2)SG11—October 18, 2016
Prior Release
15.0(2)SG10, 15.0(2)SG9 15.0(2)SG8, 15.0(2)SG7, 15.0(2)SG6, 15.0(2)SG5, 15.0(2)SG4, 15.0(2)SG3, 15.0(2)SG2, 15.0(2)SG1, 15.0(2)SG
These release notes describe the features, modifications, and caveats for the Cisco IOS Release 15.0(2)SG on the Catalyst 4900 series switch (WS-C4928-10GE, WS-C4948, and WS-C4948-10GE).
To view the release notes for WS-C4900M, WS-C4948E, and WS-C4948E-F, see the URL:
http://www.cisco.com/en/US/docs/switches/lan/catalyst4500/release/note/OL_24730.html
Support for Cisco IOS Software Release 15.0(2)SG, the default image, follows the standard Cisco Systems® support policy, available at
http://www.cisco.com/en/US/products/products_end-of-life_policy.html
Note Although their Release Notes are unique, the 4 platforms (Catalyst 4500, Catalyst 4900,
Catalyst ME 4900, and Catalyst 4900M/4948E) use the same Software Configuration Guide, Command Reference Guide, and System Message Guide.
For more information on the Catalyst 4500 series switches, visit the following URL:
http://www.cisco.com/go/cat4500/docs
This publication consists of these sections:
The Enterprise Services image supports all Cisco Catalyst 4500 Series software features based on Cisco IOS Software, including enhanced routing.
The IP Base image supports Open Shortest Path First (OSPF) for Routed Access and Enhanced Interior Gateway Routing Protocol (EIGRP) "limited" Stub Routing, and RIPv1/v2. The IP Base image does not support enhanced routing features such as Nonstop Forwarding/Stateful Switchover (NSF/SSO), BGP, Intermediate System-to-Intermediate System (IS-IS), Internetwork Packet Exchange (IPX), AppleTalk, Virtual Routing Forwarding (VRF-lite), GLBP, and policy-based routing (PBR).
Cisco IOS Release 12.2(46)SG1 introduced a new LAN Base software and an IP upgrade image. These complement the existing IP Base and Enterprise Services images. LAN Base image is primarily focused on customer access and Layer 2 requirements and therefore many of the IP Base features are not required. The IP upgrade image is available if at a later date you require some of those features.
Starting with Cisco IOS Release 15.0(2)SG, on the Catalyst 4900 Series Switch, support for Network Edge Access Topology (NEAT) has been extended from IP Base to LAN Base and support for HSRPv2 for IPv6 has been extended from Enterprise Services to IP Base.
For more information about the Cisco Catalyst 4900 series switch, visit
http://www.cisco.com/en/US/products/ps6021/index.html
Table 1 is a detailed list of features supported on Catalyst 4900 Series Switch running Cisco IOS Software Release 15.0(2)SG. For the full list of supported features, check the Feature Navigator application:
http://tools.cisco.com/ITDIT/CFN/
For information on MiBs support, please refer to this URL:
http://ftp.cisco.com/pub/mibs/supportlists/cat4000/cat4000-supportlist.html
Crashdump Enhancement1 |
|||
DHCP - DHCPv6 Relay Agent notification for Prefix Delegation |
|||
IEEE 802.1ag D8.1 standard Compliant CFM, Y.1731 multicast LBM / AIS / RDI / LCK, IP SLA for Ethernet |
|||
IEEE 802.1s - Multiple Spanning Tree (MST) Standard Compliance |
|||
IEEE 802.1x Multi-Domain Authentication with Voice VLAN Assignment |
|||
IEEE 802.3ad Link Aggregation (LACP) Port-Channel Standalone Disable |
|||
IPv6 Multicast: Multicast Listener Discovery (MLD) Protocol, Versions 1 and 2 |
|||
NEAT Enhancement: Re-Enabling BPDU Guard Based on User Configuration |
|||
Yes2 |
|||
Yes 2 |
|||
Yes 2 |
|||
Yes 2 |
|||
Yes 2 |
|||
Yes 2 |
|||
Yes 2 |
|||
Yes 2 |
|||
Yes 2 |
|||
Yes 2 |
|||
Yes 2 |
|||
Yes 2 |
|||
RADIUS Attribute 44 (Accounting Session ID) in Access Requests |
|||
Source Specific Multicast (SSM) - IGMPv3,IGMP v3lite, and URD |
|||
Note With the LAN Base image, 10GbE uplinks are supported on the Catalyst 4948-10GE switch but not the Catalyst 4948 switch.
These features are not supported in Cisco IOS Release 15.0(2)SG for the 4900 series switches:
– cpmCPUMemoryKernelReservedOvrflw
– cpmCPUMemoryHCKernelReserved
– Standard Xerox Network System (XNS) access list
– Protocol type-code access list
– <1200-1299> IPX summary address access list
Customers with Catalyst 4900 series switches who need the latest hardware support and software features should migrate to Cisco IOS Release 15.0(2)SG. Cisco IOS Release 15.0(2)SG is the latest maintenance train base.
Cisco IOS Release 12.2(53)SG4 is the recommended release for customers who require a release with a maintenance train. The Cisco IOS Release 12.2(53)SG train includes support for OSPF for routed Access.
Figure 1 displays the two active trains.
Figure 1 Software Release Strategy for the Catalyst 4900 Series Switch
Support for Cisco IOS Software Release 15.0(2)SG follows the standard Cisco Systems® support policy, available at
http://www.cisco.com/en/US/products/products_end-of-life_policy.html
This section describes the system requirements:
This section describes the hardware supported on the Catalyst 4900 series switch.
For Catalyst 4900 series switch transceiver module compatibility information, see the url:
http://www.cisco.com/en/US/products/hw/modules/ps5455/products_device_support_tables_list.html
Table 2 briefly describes the Catalyst 4900 series switch product set.
These sections describe the new and changed information for the Catalyst 4900 series switch running Cisco IOS software:
Release 15.0(2)SG1 provides no new hardware on the Catalyst 4900 series switch.
Release 15.0(2)SG1 provides the following new software feature on the Catalyst 4900 series switch:
Release 15.0(2)SG provides the following hardware on the Catalyst 4900 series switch:
Release 15.0(2)SG provides the following new software features on the Catalyst 4900 series switch:
For information on the reporting issue, refer to the following URL:
http://www.cisco.com/en/US/docs/ios/ netmgmt/configuration/guide/nm_cdp_discover.html
For information on configuring CDP Location TLV, refer to the following URL:
http://www.cisco.com/en/US/docs/ios/ netmgmt/configuration/guide/nm_cdp_discover.html
In most cases, upgrading the switch to a newer release of Cisco IOS software does not require a ROMMON upgrade. However, if you are running an early release of Cisco IOS software and plan to upgrade, the following tables list the recommended ROMMON release.
The following sections describe how to upgrade your switch software:
Note The examples in this section use the programmable read-only memory (PROM) upgrade version 12.2(31r)SGA4 and Cisco IOS Release 12.2(25)EWA. For other releases, replace the ROMMON release and Cisco IOS software release with the appropriate releases and filenames.
Follow this procedure to upgrade your supervisor engine ROMMON:
Step 1 Directly connect a serial cable to the console port.
Note This section assumes that the console baud rate is set to 9600 (default). If you want to use a different baud rate, change the configuration register value for your switch.
Step 2 Download the cat4500-ios-promupgrade-122_31r_SGA1SGA4 program from Cisco.com, and place it on a TFTP server in a directory that is accessible from the switch that will be upgraded.
The cat4500-ios-promupgrade-122_31r_SGA1SGA4 programs are available on Cisco.com at the same location from which you download Catalyst 4500 system images.
Step 3 Use the dir bootflash: command to ensure that there is sufficient space in Flash memory to store the PROM upgrade image. If there is insufficient space, delete one or more images, and then issue the
squeeze bootflash: command to reclaim the space.
Step 4 Download the cat4500-ios-promupgrade-122_31r_SGA1SGA4 program into Flash memory using the copy tftp command.
The following example shows how to download the PROM upgrade image cat4500-ios-promupgrade-122_31r_SGA1 from the remote host 172.20.58.78 to bootflash::
Step 5 Enter the reload command to reset the switch, press Ctrl-C to stop the boot process, and re-enter ROMMON.
The following example shows the output after a reset into ROMMON:
Step 6 Run the PROM upgrade program by entering this command:?boot bootflash:cat4500-ios-promupgrade-122_31r_SGA1SGA4
The following example shows the output from a successful upgrade, followed by a system reset:
Step 7 Boot the Cisco IOS software image, and enter the show version command to verify that ROMMON has been upgraded to 12.2(31r)SGA4.
Step 8 Use the delete command to delete the PROM upgrade program from bootflash and the squeeze command to reclaim unused space.
The following example shows how to delete the cat4500-ios-promupgrade-122_31r_SGA1SGA4 image from bootflash and reclaim unused space:
Step 9 Use the show version command to verify that the ROMMON has been upgraded
The ROMMON has now been upgraded.
See the “Upgrading the Cisco IOS Software” section for instructions on how to upgrade the Cisco IOS software on your switch.
Follow this procedure to upgrade your supervisor engine ROMMON to Release 12.2(31r)SGA4. This procedure can be used when console access is not available and when the ROMMON upgrade must be performed remotely.
Note In the following section, use the PROM upgrade version on the following section, use the PROM upgrade version cat4500-ios-promupgrade-122_31r_SGA1SGA4.
Step 1 Establish a Telnet session to the supervisor engine.
Note In the following discussion, we assume that at least one IP address has been assigned to either an SVI or a routed port.
Step 2 Download the cat4500-ios-promupgrade-122_31r_SGA1SGA4 program from Cisco.com, and place it on a TFTP server in a directory that is accessible from the switch to be upgraded.
The cat4500-ios-promupgrade-122_31r_SGA1SGA4 programs are available on Cisco.com at the same location from which you download Catalyst 4500 system images.
Step 3 Use the dir bootflash: command to ensure that there is sufficient space in Flash memory to store the PROM upgrade image. If there is insufficient space, delete one or more images, and then issue the
squeeze bootflash: command to reclaim the space.
Step 4 Download the cat4500-ios-promupgrade-122_31r_SGA1SGA4 program into Flash memory using the copy tftp command.
The following example shows how to download the PROM upgrade image cat4500-ios-promupgrade-122_31r_SGA1SGA4 from the remote host 10.5.5.5 to bootflash:
Step 5 Use the no boot system flash bootflash: file_name command to clear all BOOT variable commands in the configuration file. In this example, the BOOT variable was set to boot the image cat4500-ios-promupgrade-122_31r_SGA1SGA4 from bootflash:
Note The config-register must be set to autoboot.
Step 6 Use the show bootvar command to verify the boot string. The BOOT variable in this example will first run the PROM upgrade to upgrade ROMMON. Then, the upgrade software will reload and the supervisor engine will load the Cisco IOS software image.
Step 7 Run the PROM upgrade program by issuing the reload command. Issuing this command will terminate your Telnet session.
The following example shows the console port output from a successful ROMMON upgrade followed by a system reset. Your Telnet session will be disconnected during the ROMMON upgrade, so you will not see this output. This step could take 2-3 minutes to complete. You will need to reconnect your Telnet session after 2-3 minutes when the Cisco IOS software image and the interfaces are loaded.
Step 8 Use the no boot system flash bootflash: file_name command to clear the BOOT command used to upgrade the ROMMON.
Step 9 Use the show version command to verify that the ROMMON has been upgraded.
Step 10 Use the delete command to delete the PROM upgrade program from bootflash and the squeeze command to reclaim unused space.
The following example shows how to delete the cat4500-ios-promupgrade-122_31r_SGA1SGA4 image from bootflash and reclaim unused space:
Step 11 Use the show bootvar command to verify that the ROMMON upgrade program has been removed from the BOOT variable.
The ROMMON has now been upgraded.
See the “Upgrading the Cisco IOS Software” section for instructions on how to upgrade the Cisco IOS software on your switch.
Before you proceed, observe the following rules for hostname:
Uppercase and lowercase characters look the same to many internet software applications. It may seem appropriate to capitalize a name the same way you might do in English, but conventions dictate that computer names appear all lowercase. For more information, refer to RFC 1178, Choosing a Name for Your Computer.
To upgrade the Cisco IOS software on your Catalyst 4900 series switch, use this procedure:
Step 1 Download Cisco IOS Release 12.2(25)EWA from Cisco.com, and place the image on a TFTP server in a directory that is accessible from the supervisor engine that will be upgraded.
Step 2 Use the dir bootflash: command to ensure that there is sufficient space in Flash memory to store the promupgrade image. If there is insufficient space, delete one or more images, and then enter the squeeze bootflash: command to reclaim the space.
Step 3 Download the software image into Flash memory using the copy tftp command.
The following example shows how to download the Cisco IOS software image cat4500-ipbase-mz.122-25.EWA from the remote host 172.20.58.78 to bootflash:
Step 4 Use the no boot system flash bootflash: file_name command to clear the cat4500-ipbase-mz.122-25.EWA file and to save the BOOT variable.
The following example shows how to clear the BOOT variable:
Step 5 Use the boot system flash command to add the Cisco IOS software image to the BOOT variable.
The following example shows how to add the cat4500-ipbase-mz.122-25.EWA image to the BOOT variable:
Step 6 Use the config-register command to set the configuration register to 0x2102.
The following example show how to set the second least significant bit in the configuration register:
Step 7 Enter the reload command to reset the switch and load the software.
The following example shows the output from a successful upgrade followed by a system reset:
Step 8 Use the show version command to verify that the new Cisco IOS release is operating on the switch.
These sections list the limitations and restrictions for the current release of Cisco IOS software on the Catalyst 4900 series switch.
– Unnumbered interface and Numbered interface in different VRFs
– GRE encapsulation forwarding method
– Hash bucket based assignment method
– Redirection on an egress interface (redirection out)
– Redirect-list ACLis not supported on “Classic” supervisors. However, WCCP redirect ACLs are supported on Supervisor Engine 6-E, Supervisor Engine 6L-E, Catalyst 4900M and Catalyst 4948E from Cisco IOS 15.0(2)SG onwards and on Supervisor Engine 7-E, Supervisor Engine 7L-E, and Catalyst 4500X from Cisco IOS XE 3.3.0(SG) onwards.
– NHRP (Next Hop Resolution Protocol)
– AppleTalk Control Protocol for PPP
– Matching cannot be performed on packet lengths
– IP precedence, TOS, and QoS group are fixed
– ACL or route-map statistics cannot be updated
Workaround: Display the configuration with the show standby command, then remove the CLI. Here is sample output of the show standby GigabitEthernet1/1 command:
Use the standby delay reload option if the router is rebooting after reloading the image.
Workaround: Since the problem is caused by mismatched MTUs, the solution is to change the MTU on either router to match the neighbor’s MTU.
Workaround: Verify whether or not the Neighbor discovery cache has an entry, separate from regular troubleshooting areas of IPv6 address configurations and other configurations.
If this message appears, check that there is network connectivity between the switch and the ACS. You should also check that the switch has been properly configured as an AAA client on the ACS.
Workaround: Disable idle timeouts. (CSCec30214)
– It supports Layer 2 access port and PVLAN host port (isolated or community port).
– It does not support trunk port, Layer 3 port or EtherChannel.
– You must allow for at least 3 MAC addresses to access the switch: 2 for the phone (the MAC address of a phone gets registered to the Data domain and Voice domain), and one for the PC.
– The data and voice VLAN IDs must differ.
– As IPSG learns the static hosts on each interface, the switch CPU may hit 100 per cent if there are a large number of hosts to learn. The CPU usage will drop once the hosts are learned.
– IPSG violations for static hosts are printed as they occur. If multiple violations occur simultaneously on different interfaces, the CLI displays the last violation. For example, if IPSG is configured for 10 ports and violations exist on ports 3,6 and 9, the violation messages are printed only for port 9.
– Inactive host bindings will appear in the device tracking table when either a VLAN is associated with another port or a port is removed from a VLAN. So, as hosts are moved across subnets, the hosts are displayed in the device tracking table as INACTIVE.
– Autostate SVI does not work on EtherChannel.
In such a scenario, the ipv6 MTU value programmed in hardware will be different from the ipv6 interface MTU value. This will happen if there is no room in the hw MTU table to store additional values.
You must free up some space in the table by unconfiguring some unused MTU values and subsequently disable/re-enable ipv6 on the interface or reapply the MTU configuration.
To enable IPSG with Static Hosts on a port, issue the following commands:
Note The issue above also applies to IPSG with Static Hosts on a PVLAN Host port.
– Fast UDLD is disabled by default.
– Configure fast UDLD only on point-to-point links between network devices that support fast UDLD.
– You can configure fast UDLD in either normal or aggressive mode.
– Do not enter the link debounce command on fast UDLD ports.
– Configure fast UDLD on at least two links between each connected network device. This reduces the likelihood of fast UDLD incorrectly error disabling a link due to false positives.
– Fast UDLD does not report a unidirectional link if the same error occurs simultaneously on more than one link to the same neighbor device.
The outputs of certain commands, such as show ip route and show access-lists, contain non-deterministic text. While the output is easily understood, the output text does not contain strings that are consistently output. A general purpose specification file entry is unable to parse all possible output.
While a general purpose specification file entry may not be possible, a specification file entry might be created that returns the desired text by searching for text that is guaranteed to be in the output. If a string is guaranteed to be in the output, it can be used for parsing.
For example, the output of the show ip access-lists SecWiz_Gi3_17_out_ip command is this:
The first line is easily parsed because access list is guaranteed to be in the output:
The remaining lines all contain the term host. As a result, the specification file may report the desired values by specifying that string. For example, this line
will produce the following for the first and second rules
and the following for the third statement
Request the output of the show running-config command using NETCONF and parse that output for the desired strings. This is useful when the desired lines contain nothing in common. For example, the rules in this access list do not contain a common string and the order (three permits, then a deny, then another permit), prevent the spec file entry from using permit as a search string, as in the following example:
The XML output of show running-config command includes the following, which can then be parsed programmatically, as desired:
This only impacts a switch that has any of the following queues are configured as SPAN source in releases prior to 12.2(31)SG and saved to startup-config. The SPAN destination would not get the same traffic after upgrading to 12.2(31)SG and later releases.
Workaround: After upgrading to 12.2(31)SG and later releases, remove the old SPAN source configuration and reconfigure with the new queue names/IDs. For example:
– Force the supplicant to use multicast EAPOL.
– Avoid authentication open mode
This configuration had been removed erroneously in a prior release.
Caveats describe unexpected behavior in Cisco IOS releases. Caveats listed as open in a prior release are carried forward to the next release as either open or resolved.
Note For the latest information on PSIRTS, refer to the Security Advisories on CCO at the following URL:
http://tools.cisco.com/security/center/publicationListing
The Bug Search Tool (BST), which is the online successor to Bug Toolkit, is designed to improve the effectiveness in network risk management and device troubleshooting. The BST allows partners and customers to search for software bugs based on product, release, and keyword, and aggregates key data such as bug details, product, and version. The tool has a provision to filter bugs based on credentials to provide external and internal bug views for the search input.
To view the details of a caveat listed in this document:
1. Access the BST (use your Cisco user ID and password) at https://tools.cisco.com/bugsearch/.
Use the Bug Search Tool to view the details of a caveat listed in this section:
Cisco has analyzed this vulnerability and concluded that while the previously listed products may run a vulnerable version of Bash, there are no exploitation vectors present - therefore, those products are not impacted.Additional details about those vulnerabilities can be found at http://cve.mitre.org/cve/cve.html
– If such a certificate does not exist and the device's hostname and default_domain have been set, then a persistent self-signed certificate will be generated.
– If such a certificate exists, the FQDN in the certificate is compared with the current device's hostname and default_domain. If either of these differs from the FQDN in the certificate, then the existing persistent self-signed certificate is replaced with a new one with the updated FQDN. Be aware that the existing key pair is used in the new certificate.
On a switch that support redundancy, the generation of the self-signed certificate is performed independently on the active and the standby supervisor engines. So, the certificates differ. After switchover, the HTTP client that holds the old certificate can not connect to the HTTPS server.
Workaround: Re-connect. CSCsb11964
This does not impact performance.
Workaround: Issue the no shutdown command. CSCsg27395
Workaround: Remove the transceiver from the new port and place it in the old port. Once the SFP is recognized in the old port, remove it slowly and insert it in the new port. CSCse34693
Workarounds: Do one of the following:
– After a reload, copy the startup-config to the running-config.
– Use a loopback interface as the target of the ip unnumbered command
– Change the CLI configuration such that during bootup, the router port is created first.
Workaround: When the port channel starts to flap, enter shut and no shut on the port channel. After the first switchover and after deleting the portchannel, create a new channel. (CSCsr00333)
Workaround: For VTP database propagation, configure ISL/dot1q trunk port. CSCsu43445
This applies to classic or E-series Catalyst 4500 supervisor engines running
Cisco IOS Release 12.2(50)SG
If the switch were to run a supervisor switchover while in this state, the host's MAC address would not be present in the new active supervisor engine’s MAC address table, causing possible connectivity interruption on the host.
Workaround: Enter the shutdown command, followed by the no shutdown command on the interface. This triggers relearning and synchronizing of the host's MAC to the standby supervisor engine. CSCsw91661
This only happens when the switch is running network mobility service protocol (nmsp). It does not happen if the phone is CDP enabled.
Workaround: Use VLAN ID or name to differentiate the IP phone and the PC sitting behind the phone on the WCS. Specifically, the IP phone is detected on the voice VLAN, and the displayed information of serial number, model number, and software version is correct. However, a PC sitting behind the phone is detected on a data VLAN, and the displayed device information is wrong and should be ignored. CSCsz34522
Workaround: When interface mode is changed from Layer2 to Layer3, manually change interface trust state by enter the cos trust dscp command. CSCta16492
Despite the different default value, you can configure any value in the time range. CSCte51948
Workarounds: The Cisco switch default link-flap detection value is 5 flaps in 10 seconds. Use the default value or larger numbers. CSCtg07677
Similarly, the show epm sessions command always displays the authentication method as DOT1X.
Workaround: To view the authentication method used for a client, enter the show authentication sessions command. CSCsx42157
– The SVI (network) is unreachable. If an SVI exists on the ASW, because of the STP flap in the setup as well as the CISP operations, the SVI MAC configuration on the ASW is incorrect.
Workaround: Configure the ASW or any other switch upstream as the root-bridge for all the VLANs. CSCtg71030
Workaround: Configure both dead-criteria and deadtime.
Workaround: Enter shut, and then no shut on the ports. CSCtn88228
Workaround: Shut down the CE-facing interface. After all of the mask-value entries point to the target CE, unshut the CE-facing interface. CSCtl09941
Workaround: Enable a Layer 3 interface in the running configuration. CSCsc88636.
The problem is seen only on modules running Cisco IOS Release IOS-XE 03.02.n.SG.
Certain revisions of the X4748 module display this behavior when running on IOS-XE version 03.02.n.SG. Not all X4748 modules will present this behavior, and it will not show up on newer versions of IOS-XE like 03.04.n.SG or 03.06.n.E.
Workaround : Increasing the MTU on an affected interface to 1518 or higher will allow the traffic through. Upgrading to an IOS-XE version where this issue is not present will resolve the issue. CSCus15382
This section lists the resolved caveats in Cisco IOS Release 15.0(2)SG9:
NetMeeting Directory (Lightweight Directory Access Protocol, LDAP)
Session Initiation Protocol (Multiple vulnerabilities)
All the vulnerabilities described in this document are caused by packets in transit on the affected devices when those packets require application layer translation. Cisco has released free software updates that address these vulnerabilities. This advisory is posted at http://www.cisco.com/warp/public/707/cisco-sa-20110928-nat.shtml CSCtd10712
Cisco has released free software updates that address this vulnerability. Workarounds that mitigate this vulnerability are not available.
This advisory is available at the following link: http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130327-nat
Note: The March 27, 2013, Cisco IOS Software Security Advisory bundled publication includes seven Cisco Security Advisories. All advisories address vulnerabilities in Cisco IOS Software. Each Cisco IOS Software Security Advisory lists the Cisco IOS Software releases that correct the vulnerability or vulnerabilities detailed in the advisory as well as the Cisco IOS Software releases that correct all Cisco IOS Software vulnerabilities in the March 2013 bundled publication.
Individual publication links are in "Cisco Event Response: Semiannual Cisco IOS Software Security Advisory Bundled Publication" at the following link:
http://www.cisco.com/web/about/security/intelligence/Cisco_ERP_mar13.html CSCtg47129
Workaround. None - You cannot configure the event4 exit-value CSCtl70569
Note: The March 28, 2012, Cisco IOS Software Security Advisory bundled publication includes nine Cisco Security Advisories. Each advisory lists the Cisco IOS Software releases that correct the vulnerability or vulnerabilities detailed in the advisory as well as the Cisco IOS Software releases that correct all vulnerabilities in the March 2012 bundled publication.
Individual publication links are in "Cisco Event Response: Semi-Annual Cisco IOS Software Security Advisory Bundled Publication" at the following link: http://www.cisco.com/web/about/security/intelligence/Cisco_ERP_mar12.html CSCts38429
Crash is observed in the following conditions -
– router reload / LC OIR with images after RLS10.
– traffic flows through the ES20 interface
– mac-address-table limit CLI is configured.
Workaround: mac-address-table limit is removed.
Note: The March 28, 2012, Cisco IOS Software Security Advisory bundled publication includes nine Cisco Security Advisories. Each advisory lists the Cisco IOS Software releases that correct the vulnerability or vulnerabilities detailed in the advisory as well as the Cisco IOS Software releases that correct all vulnerabilities in the March 2012 bundled publication.
Individual publication links are in "Cisco Event Response: Semi-Annual Cisco IOS Software Security Advisory Bundled Publication" at the following link: http://www.cisco.com/web/about/security/intelligence/Cisco_ERP_mar12.html CSCtt28573
Cisco has released free software updates that address these vulnerabilities.
There are no workarounds to mitigate these vulnerabilities.
This advisory is available at the following link: http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140326-nat
Note: The March 26, 2014, Cisco IOS Software Security Advisory bundled publication includes six Cisco Security Advisories. All advisories address vulnerabilities in Cisco IOS Software. Each Cisco IOS Software Security Advisory lists the Cisco IOS Software releases that correct the vulnerability or vulnerabilities detailed in the advisory as well as the Cisco IOS Software releases that correct all Cisco IOS Software vulnerabilities in the March 2014 bundled publication.
Individual publication links are in Cisco Event Response: Semiannual Cisco IOS Software Security Advisory Bundled Publication at the following link: http://www.cisco.com/web/about/security/intelligence/Cisco_ERP_mar14.html. See published Cisco Security Advisory CSCue00996
This happens when you continuously reload the standby switch. The client, that is, the active side cannot reach the standby side, and while returning an error, the FD is not released and exhausts FDs. The maximum number of allowed FDs is 128. When this limit is reached, additional files cannot be opened.
Workaround: Reload the switch. CSCug77784
– The show process cpu privileged EXEC command for 'Cat4k Mgmt LoPri'
– The show platform health privileged EXEC command under KxAclPathMan update
The increase is observed when configuring input and output service policies on trunk links that carry numerous VLANs, which, in turn, are enabled with other ACL based features (For examplem access-groups and PBR).
Workaround: Reduce cpu utilization by removing unnecessary service policies from the trunk links. CSCui19835
Workaround: Issue clear mac address dynamic to clear the MAC addresses on the switch and cause MAB to trigger when the MAC address is re-learned. CSCul32730
– If you want to remove VLAN mapping on 12, but you need mapping on 13 to work, perform these steps:
a. Enter the interface gigabitethernet 2/1 interface configuration command
b. Enter the no switchport vlan mapping 12 dot1q-tunnel 200 interface configuration command
c. Enter the no switchport vlan mapping 13 dot1q-tunnel 200 interface configuration command
d. Enter the switchport vlan mapping 13 dot1q-tunnel 200 interface configuration command
– If you want to restore the original VLAN mapping statement, perform these steps:
a. Enter the interface gigabitethernet 2/1 interface configuration command
b. Enter the no switchport vlan mapping 12 dot1q-tunnel 200 interface configuration command
c. Enter the switchport vlan mapping 12 dot1q-tunnel 200 interface configuration command
– Enter the shutdown interface configuration command to shut down the port, remove configuration, and then enter the no shutdown interface configuration command.
Workaround: Reapply the configuration when the switch reboots. CSCum71764
IXIA(01/02) ------ (Gi1/2)C4948E(Ten1/49) ------ (05/02)IXIA
It is more likely that you will see drops with smaller, randomly sized packets, where COS is set to 0.
AUTH-FEAT-MDA-EVENT (Fa3/6): Deleting all clients in domain DATA
Workaround: None. The license MIB value for the permanent license type is 4 for all Cisco Catalyst 4000 series products. CSCuo90172
This section lists the resolved caveats in Release 15.0(2)SG8:
Workaround: Enter shut, and then no shut on the port to synchronize the STP state. CSCtf52437
Workaround: Retain the trunk native V LAN as 1. CSCud05521
Workaround: Shorten the dACL name. CSCug78653
Workaround: Return a dACL in the authorization profile with successful guest authentication.
– A fast stream of traffic matches the URL redirect ACL as IPDT clears an address.
– A traffic stream matches the URL redirect ACL and no URL redirect policy is installed for that IP address.
If memory leak occurs repeatedly, IPDT and other control packet processing ultimately ceases.
Workaround: If this behavior completely fills the CPU buffer, the switch must be reloaded. However, the frequency of encountering a stuck queue can be reduced to nearly zero by modifying the URL redirect ACL to permit only 80/443 traffic. CSCug56646
Workaround: Configure RADIUS test and dead criteria.
Workaround: Reconfigure ACLs on all affected interfaces or reload the switch. CSCuf93866
To see a SPAN-induced crash, SPAN destination ports must receive pause frames from the remote side of the SPAN destination port.
Catalyst 4900M, Catalyst 4948E, Supervisor Engine 6-E, and Supervisor Engine 6L-E are impacted.
Workaround: If the problem is triggered by pause frames from remote SPAN destination ports, disable flow control on those ports.
This section lists the open caveats in Cisco IOS Release 15.0(2)SG7:
– If such a certificate does not exist and the device's hostname and default_domain have been set, then a persistent self-signed certificate will be generated.
– If such a certificate exists, the FQDN in the certificate is compared with the current device's hostname and default_domain. If either of these differs from the FQDN in the certificate, then the existing persistent self-signed certificate is replaced with a new one with the updated FQDN. Be aware that the existing key pair is used in the new certificate.
On a switch that support redundancy, the generation of the self-signed certificate is performed independently on the active and the standby supervisor engines. So, the certificates differ. After switchover, the HTTP client that holds the old certificate can not connect to the HTTPS server.
Workaround: Re-connect. CSCsb11964
This does not impact performance.
Workaround: Issue the no shutdown command. CSCsg27395
Workaround: Remove the transceiver from the new port and place it in the old port. Once the SFP is recognized in the old port, remove it slowly and insert it in the new port. CSCse34693
Workarounds: Do one of the following:
– After a reload, copy the startup-config to the running-config.
– Use a loopback interface as the target of the ip unnumbered command
– Change the CLI configuration such that during bootup, the router port is created first.
Workaround: When the port channel starts to flap, enter shut and no shut on the port channel. After the first switchover and after deleting the portchannel, create a new channel. (CSCsr00333)
Workaround: For VTP database propagation, configure ISL/dot1q trunk port. CSCsu43445
This applies to classic or E-series Catalyst 4500 supervisor engines running
Cisco IOS Release 12.2(50)SG
If the switch were to run a supervisor switchover while in this state, the host's MAC address would not be present in the new active supervisor engine’s MAC address table, causing possible connectivity interruption on the host.
Workaround: Enter the shutdown command, followed by the no shutdown command on the interface. This triggers relearning and synchronizing of the host's MAC to the standby supervisor engine. CSCsw91661
The queue transmit counters as well as the policing statistics (if any) are correct. CSCsz20149
This only happens when the switch is running network mobility service protocol (nmsp). It does not happen if the phone is CDP enabled.
Workaround: Use VLAN ID or name to differentiate the IP phone and the PC sitting behind the phone on the WCS. Specifically, the IP phone is detected on the voice VLAN, and the displayed information of serial number, model number, and software version is correct. However, a PC sitting behind the phone is detected on a data VLAN, and the displayed device information is wrong and should be ignored. CSCsz34522
Workaround: When interface mode is changed from Layer2 to Layer3, manually change interface trust state by enter the cos trust dscp command. CSCta16492
Despite the different default value, you can configure any value in the time range. CSCte51948
Workarounds: The Cisco switch default link-flap detection value is 5 flaps in 10 seconds. Use the default value or larger numbers. CSCtg07677
Similarly, the show epm sessions command always displays the authentication method as DOT1X.
Workaround: To view the authentication method used for a client, enter the show authentication sessions command. CSCsx42157
– The SVI (network) is unreachable. If an SVI exists on the ASW, because of the STP flap in the setup as well as the CISP operations, the SVI MAC configuration on the ASW is incorrect.
Workaround: Configure the ASW or any other switch upstream as the root-bridge for all the VLANs. CSCtg71030
Workaround: Configure both dead-criteria and deadtime.
Workaround: Enter shut, and then no shut on the ports. CSCtn88228
Workaround: After the switch reloads, enter shut, and then no shut on the port channel interface.
Workaround: Shut down the CE-facing interface. After all of the mask-value entries point to the target CE, unshut the CE-facing interface. CSCtl09941
Workaround: Enable a Layer 3 interface in the running configuration. CSCsc88636.
Workaround: Enter shut, and then no shut on the port to synchronize the STP state. CSCtf52437
Workaround: Retain the trunk native V LAN as 1. CSCud05521
Workaround: Shorten the dACL name. CSCug78653
Workaround: Return a dACL in the authorization profile with successful guest authentication.
– A fast stream of traffic matches the URL redirect ACL as IPDT clears an address.
– A traffic stream matches the URL redirect ACL and no URL redirect policy is installed for that IP address.
If memory leak occurs repeatedly, IPDT and other control packet processing ultimately ceases.
Workaround: If this behavior completely fills the CPU buffer, the switch must be reloaded. However, the frequency of encountering a stuck queue can be reduced to nearly zero by modifying the URL redirect ACL to permit only 80/443 traffic. CSCug56646
Workaround: Configure RADIUS test and dead criteria.
Workaround: Reconfigure ACLs on all affected interfaces or reload the switch.
This section lists the resolved caveats in Release 15.0(2)SG7:
Workaround: Retain the default setting (VLAN 1) for the native VLAN on trunks ports. CSCud05521
This section lists the open caveats in Cisco IOS Release 15.0(2)SG6:
– If such a certificate does not exist and the device's hostname and default_domain have been set, then a persistent self-signed certificate will be generated.
– If such a certificate exists, the FQDN in the certificate is compared with the current device's hostname and default_domain. If either of these differs from the FQDN in the certificate, then the existing persistent self-signed certificate is replaced with a new one with the updated FQDN. Be aware that the existing key pair is used in the new certificate.
On a switch that support redundancy, the generation of the self-signed certificate is performed independently on the active and the standby supervisor engines. So, the certificates differ. After switchover, the HTTP client that holds the old certificate can not connect to the HTTPS server.
Workaround: Re-connect. CSCsb11964
This does not impact performance.
Workaround: Issue the no shutdown command. CSCsg27395
Workaround: Remove the transceiver from the new port and place it in the old port. Once the SFP is recognized in the old port, remove it slowly and insert it in the new port. CSCse34693
Workarounds: Do one of the following:
– After a reload, copy the startup-config to the running-config.
– Use a loopback interface as the target of the ip unnumbered command
– Change the CLI configuration such that during bootup, the router port is created first.
Workaround: When the port channel starts to flap, enter shut and no shut on the port channel. After the first switchover and after deleting the portchannel, create a new channel. (CSCsr00333)
Workaround: For VTP database propagation, configure ISL/dot1q trunk port. CSCsu43445
This applies to classic or E-series Catalyst 4500 supervisor engines running
Cisco IOS Release 12.2(50)SG
If the switch were to run a supervisor switchover while in this state, the host's MAC address would not be present in the new active supervisor engine’s MAC address table, causing possible connectivity interruption on the host.
Workaround: Enter the shutdown command, followed by the no shutdown command on the interface. This triggers relearning and synchronizing of the host's MAC to the standby supervisor engine. CSCsw91661
The queue transmit counters as well as the policing statistics (if any) are correct. CSCsz20149
This only happens when the switch is running network mobility service protocol (nmsp). It does not happen if the phone is CDP enabled.
Workaround: Use VLAN ID or name to differentiate the IP phone and the PC sitting behind the phone on the WCS. Specifically, the IP phone is detected on the voice VLAN, and the displayed information of serial number, model number, and software version is correct. However, a PC sitting behind the phone is detected on a data VLAN, and the displayed device information is wrong and should be ignored. CSCsz34522
Workaround: When interface mode is changed from Layer2 to Layer3, manually change interface trust state by enter the cos trust dscp command. CSCta16492
Despite the different default value, you can configure any value in the time range. CSCte51948
Workarounds: The Cisco switch default link-flap detection value is 5 flaps in 10 seconds. Use the default value or larger numbers. CSCtg07677
Similarly, the show epm sessions command always displays the authentication method as DOT1X.
Workaround: To view the authentication method used for a client, enter the show authentication sessions command. CSCsx42157
– The SVI (network) is unreachable. If an SVI exists on the ASW, because of the STP flap in the setup as well as the CISP operations, the SVI MAC configuration on the ASW is incorrect.
Workaround: Configure the ASW or any other switch upstream as the root-bridge for all the VLANs. CSCtg71030
Workaround: Configure both dead-criteria and deadtime.
Workaround: Enter shut, and then no shut on the ports. CSCtn88228
Workaround: After the switch reloads, enter shut, and then no shut on the port channel interface.
Workaround: Shut down the CE-facing interface. After all of the mask-value entries point to the target CE, unshut the CE-facing interface. CSCtl09941
Workaround: Enable a Layer 3 interface in the running configuration. CSCsc88636.
Workaround: Retain the default setting (VLAN 1) for the native VLAN on trunks ports. CSCud05521
Workaround: Enter shut, and then no shut on the port to synchronize the STP state. CSCtf52437
Workaround: Retain the trunk native V LAN as 1. CSCud05521
Workaround: Shorten the dACL name. CSCug78653
Workaround: Return a dACL in the authorization profile with successful guest authentication.
– A fast stream of traffic matches the URL redirect ACL as IPDT clears an address.
– A traffic stream matches the URL redirect ACL and no URL redirect policy is installed for that IP address.
If memory leak occurs repeatedly, IPDT and other control packet processing ultimately ceases.
Workaround: If this behavior completely fills the CPU buffer, the switch must be reloaded. However, the frequency of encountering a stuck queue can be reduced to nearly zero by modifying the URL redirect ACL to permit only 80/443 traffic. CSCug56646
Workaround: Configure RADIUS test and dead criteria.
Workaround: Reconfigure ACLs on all affected interfaces or reload the switch.
This section lists the resolved caveats in Release 15.0(2)SG6:
Workaround: Reduce MAC aging time or modify Layer 2 topology so that the root is within the square. CSCtx86107
provided the following conditions apply:
– A switchport is configured with the following:
authentication event server dead action authorize
authenticaton event server alive action reinitalize
– The RADIUS server was down previously, and a port without traffic (for example, a hub with no devices attached) was authorized into the inaccessible authentication bypass (IAB) VLAN without an associated MAC address.
The RADIUS server becomes available again, and the IAB-authorized port transitions to another state.
This section lists the open caveats in Cisco IOS Release 15.0(2)SG5:
– If such a certificate does not exist and the device's hostname and default_domain have been set, then a persistent self-signed certificate will be generated.
– If such a certificate exists, the FQDN in the certificate is compared with the current device's hostname and default_domain. If either of these differs from the FQDN in the certificate, then the existing persistent self-signed certificate is replaced with a new one with the updated FQDN. Be aware that the existing key pair is used in the new certificate.
On a switch that support redundancy, the generation of the self-signed certificate is performed independently on the active and the standby supervisor engines. So, the certificates differ. After switchover, the HTTP client that holds the old certificate can not connect to the HTTPS server.
Workaround: Re-connect. CSCsb11964
This does not impact performance.
Workaround: Issue the no shutdown command. CSCsg27395
Workaround: Remove the transceiver from the new port and place it in the old port. Once the SFP is recognized in the old port, remove it slowly and insert it in the new port. CSCse34693
Workarounds: Do one of the following:
– After a reload, copy the startup-config to the running-config.
– Use a loopback interface as the target of the ip unnumbered command
– Change the CLI configuration such that during bootup, the router port is created first.
Workaround: When the port channel starts to flap, enter shut and no shut on the port channel. After the first switchover and after deleting the portchannel, create a new channel. (CSCsr00333)
Workaround: For VTP database propagation, configure ISL/dot1q trunk port. CSCsu43445
This applies to classic or E-series Catalyst 4500 supervisor engines running
Cisco IOS Release 12.2(50)SG
If the switch were to run a supervisor switchover while in this state, the host's MAC address would not be present in the new active supervisor engine’s MAC address table, causing possible connectivity interruption on the host.
Workaround: Enter the shutdown command, followed by the no shutdown command on the interface. This triggers relearning and synchronizing of the host's MAC to the standby supervisor engine. CSCsw91661
The queue transmit counters as well as the policing statistics (if any) are correct. CSCsz20149
This only happens when the switch is running network mobility service protocol (nmsp). It does not happen if the phone is CDP enabled.
Workaround: Use VLAN ID or name to differentiate the IP phone and the PC sitting behind the phone on the WCS. Specifically, the IP phone is detected on the voice VLAN, and the displayed information of serial number, model number, and software version is correct. However, a PC sitting behind the phone is detected on a data VLAN, and the displayed device information is wrong and should be ignored. CSCsz34522
Workaround: When interface mode is changed from Layer2 to Layer3, manually change interface trust state by enter the cos trust dscp command. CSCta16492
Despite the different default value, you can configure any value in the time range. CSCte51948
Workarounds: The Cisco switch default link-flap detection value is 5 flaps in 10 seconds. Use the default value or larger numbers. CSCtg07677
Similarly, the show epm sessions command always displays the authentication method as DOT1X.
Workaround: To view the authentication method used for a client, enter the show authentication sessions command. CSCsx42157
– The SVI (network) is unreachable. If an SVI exists on the ASW, because of the STP flap in the setup as well as the CISP operations, the SVI MAC configuration on the ASW is incorrect.
Workaround: Configure the ASW or any other switch upstream as the root-bridge for all the VLANs. CSCtg71030
Workaround: Configure both dead-criteria and deadtime.
Workaround: Enter shut, and then no shut on the ports. CSCtn88228
Workaround: After the switch reloads, enter shut, and then no shut on the port channel interface.
Workaround: Shut down the CE-facing interface. After all of the mask-value entries point to the target CE, unshut the CE-facing interface. CSCtl09941
Workaround: Enable a Layer 3 interface in the running configuration. CSCsc88636.
Workaround: Retain the default setting (VLAN 1) for the native VLAN on trunks ports. CSCud05521
Workaround: Enter shut, and then no shut on the port to synchronize the STP state. CSCtf52437
Workaround: Retain the trunk native V LAN as 1. CSCud05521
Workaround: Shorten the dACL name. CSCug78653
Workaround: Return a dACL in the authorization profile with successful guest authentication.
– A fast stream of traffic matches the URL redirect ACL as IPDT clears an address.
– A traffic stream matches the URL redirect ACL and no URL redirect policy is installed for that IP address.
If memory leak occurs repeatedly, IPDT and other control packet processing ultimately ceases.
Workaround: If this behavior completely fills the CPU buffer, the switch must be reloaded. However, the frequency of encountering a stuck queue can be reduced to nearly zero by modifying the URL redirect ACL to permit only 80/443 traffic. CSCug56646
Workaround: Configure RADIUS test and dead criteria.
Workaround: Reconfigure ACLs on all affected interfaces or reload the switch.
This section lists the resolved caveats in Release 15.0(2)SG5:
Workaround: Unconfigure the following from the switch: aaa accounting send stop-record authentication failure. CSCtj69212
This section lists the open caveats in Cisco IOS Release 15.0(2)SG4:
– If such a certificate does not exist and the device's hostname and default_domain have been set, then a persistent self-signed certificate will be generated.
– If such a certificate exists, the FQDN in the certificate is compared with the current device's hostname and default_domain. If either of these differs from the FQDN in the certificate, then the existing persistent self-signed certificate is replaced with a new one with the updated FQDN. Be aware that the existing key pair is used in the new certificate.
On a switch that support redundancy, the generation of the self-signed certificate is performed independently on the active and the standby supervisor engines. So, the certificates differ. After switchover, the HTTP client that holds the old certificate can not connect to the HTTPS server.
Workaround: Re-connect. CSCsb11964
This does not impact performance.
Workaround: Issue the no shutdown command. CSCsg27395
Workaround: Remove the transceiver from the new port and place it in the old port. Once the SFP is recognized in the old port, remove it slowly and insert it in the new port. CSCse34693
Workarounds: Do one of the following:
– After a reload, copy the startup-config to the running-config.
– Use a loopback interface as the target of the ip unnumbered command
– Change the CLI configuration such that during bootup, the router port is created first.
Workaround: When the port channel starts to flap, enter shut and no shut on the port channel. After the first switchover and after deleting the portchannel, create a new channel. (CSCsr00333)
Workaround: For VTP database propagation, configure ISL/dot1q trunk port. CSCsu43445
This applies to classic or E-series Catalyst 4500 supervisor engines running
Cisco IOS Release 12.2(50)SG
If the switch were to run a supervisor switchover while in this state, the host's MAC address would not be present in the new active supervisor engine’s MAC address table, causing possible connectivity interruption on the host.
Workaround: Enter the shutdown command, followed by the no shutdown command on the interface. This triggers relearning and synchronizing of the host's MAC to the standby supervisor engine. CSCsw91661
The queue transmit counters as well as the policing statistics (if any) are correct. CSCsz20149
This only happens when the switch is running network mobility service protocol (nmsp). It does not happen if the phone is CDP enabled.
Workaround: Use VLAN ID or name to differentiate the IP phone and the PC sitting behind the phone on the WCS. Specifically, the IP phone is detected on the voice VLAN, and the displayed information of serial number, model number, and software version is correct. However, a PC sitting behind the phone is detected on a data VLAN, and the displayed device information is wrong and should be ignored. CSCsz34522
Workaround: When interface mode is changed from Layer2 to Layer3, manually change interface trust state by enter the cos trust dscp command. CSCta16492
Despite the different default value, you can configure any value in the time range. CSCte51948
Workarounds: The Cisco switch default link-flap detection value is 5 flaps in 10 seconds. Use the default value or larger numbers. CSCtg07677
Similarly, the show epm sessions command always displays the authentication method as DOT1X.
Workaround: To view the authentication method used for a client, enter the show authentication sessions command. CSCsx42157
– The SVI (network) is unreachable. If an SVI exists on the ASW, because of the STP flap in the setup as well as the CISP operations, the SVI MAC configuration on the ASW is incorrect.
Workaround: Configure the ASW or any other switch upstream as the root-bridge for all the VLANs. CSCtg71030
Workaround: Configure both dead-criteria and deadtime.
Workaround: Enter shut, and then no shut on the ports. CSCtn88228
Workaround: After the switch reloads, enter shut, and then no shut on the port channel interface.
Workaround: Shut down the CE-facing interface. After all of the mask-value entries point to the target CE, unshut the CE-facing interface. CSCtl09941
Workaround: Enable a Layer 3 interface in the running configuration. CSCsc88636.
Workaround: Unconfigure the following from the switch: aaa accounting send stop-record authentication failure. CSCtj69212
Workaround: Retain the default setting (VLAN 1) for the native VLAN on trunks ports. CSCud05521
Workaround: Enter shut, and then no shut on the port to synchronize the STP state. CSCtf52437
Workaround: Retain the trunk native V LAN as 1. CSCud05521
Workaround: Shorten the dACL name. CSCug78653
Workaround: Return a dACL in the authorization profile with successful guest authentication.
– A fast stream of traffic matches the URL redirect ACL as IPDT clears an address.
– A traffic stream matches the URL redirect ACL and no URL redirect policy is installed for that IP address.
If memory leak occurs repeatedly, IPDT and other control packet processing ultimately ceases.
Workaround: If this behavior completely fills the CPU buffer, the switch must be reloaded. However, the frequency of encountering a stuck queue can be reduced to nearly zero by modifying the URL redirect ACL to permit only 80/443 traffic. CSCug56646
Workaround: Configure RADIUS test and dead criteria.
Workaround: Reconfigure ACLs on all affected interfaces or reload the switch.
This section lists the resolved caveats in Release 15.0(2)SG4:
Workaround: Do not use the broadcast keyword in the aaa accounting configuration. CSCts56125
The occurs under the following conditions:
– Multi-auth (or multi-host) and MAB dot1x are configured on a port.
– A voice VLAN is not configured on the port.
– The device authenticates through 802.1X.
– The connected device sends no traffic, falls over to MAB, and then successfully authenticates through 802.1X.
– A dynamic VLAN is assigned to the port following 802.1X authorization.
– Enter shut then no shut on the port to halt the high CPU and log messages.
– Enter the switchport voice vlan command on the port. CSCtw73754
This section lists the open caveats in Cisco IOS Release 15.0(2)SG3:
– If such a certificate does not exist and the device's hostname and default_domain have been set, then a persistent self-signed certificate will be generated.
– If such a certificate exists, the FQDN in the certificate is compared with the current device's hostname and default_domain. If either of these differs from the FQDN in the certificate, then the existing persistent self-signed certificate is replaced with a new one with the updated FQDN. Be aware that the existing key pair is used in the new certificate.
On a switch that support redundancy, the generation of the self-signed certificate is performed independently on the active and the standby supervisor engines. So, the certificates differ. After switchover, the HTTP client that holds the old certificate can not connect to the HTTPS server.
Workaround: Re-connect. CSCsb11964
This does not impact performance.
Workaround: Issue the no shutdown command. CSCsg27395
Workaround: Remove the transceiver from the new port and place it in the old port. Once the SFP is recognized in the old port, remove it slowly and insert it in the new port. CSCse34693
Workarounds: Do one of the following:
– After a reload, copy the startup-config to the running-config.
– Use a loopback interface as the target of the ip unnumbered command
– Change the CLI configuration such that during bootup, the router port is created first.
Workaround: When the port channel starts to flap, enter shut and no shut on the port channel. After the first switchover and after deleting the portchannel, create a new channel. (CSCsr00333)
Workaround: For VTP database propagation, configure ISL/dot1q trunk port. CSCsu43445
This applies to classic or E-series Catalyst 4500 supervisor engines running
Cisco IOS Release 12.2(50)SG
If the switch were to run a supervisor switchover while in this state, the host's MAC address would not be present in the new active supervisor engine’s MAC address table, causing possible connectivity interruption on the host.
Workaround: Enter the shutdown command, followed by the no shutdown command on the interface. This triggers relearning and synchronizing of the host's MAC to the standby supervisor engine. CSCsw91661
The queue transmit counters as well as the policing statistics (if any) are correct. CSCsz20149
This only happens when the switch is running network mobility service protocol (nmsp). It does not happen if the phone is CDP enabled.
Workaround: Use VLAN ID or name to differentiate the IP phone and the PC sitting behind the phone on the WCS. Specifically, the IP phone is detected on the voice VLAN, and the displayed information of serial number, model number, and software version is correct. However, a PC sitting behind the phone is detected on a data VLAN, and the displayed device information is wrong and should be ignored. CSCsz34522
Workaround: When interface mode is changed from Layer2 to Layer3, manually change interface trust state by enter the cos trust dscp command. CSCta16492
Despite the different default value, you can configure any value in the time range. CSCte51948
Workarounds: The Cisco switch default link-flap detection value is 5 flaps in 10 seconds. Use the default value or larger numbers. CSCtg07677
Similarly, the show epm sessions command always displays the authentication method as DOT1X.
Workaround: To view the authentication method used for a client, enter the show authentication sessions command. CSCsx42157
– The SVI (network) is unreachable. If an SVI exists on the ASW, because of the STP flap in the setup as well as the CISP operations, the SVI MAC configuration on the ASW is incorrect.
Workaround: Configure the ASW or any other switch upstream as the root-bridge for all the VLANs. CSCtg71030
Workaround: Configure both dead-criteria and deadtime.
Workaround: Enter shut, and then no shut on the ports. CSCtn88228
Workaround: After the switch reloads, enter shut, and then no shut on the port channel interface.
Workaround: Shut down the CE-facing interface. After all of the mask-value entries point to the target CE, unshut the CE-facing interface. CSCtl09941
Workaround: Enable a Layer 3 interface in the running configuration. CSCsc88636.
Workaround: Do not use the broadcast keyword in the aaa accounting configuration. CSCts56125
The occurs under the following conditions:
– Multi-auth (or multi-host) and MAB dot1x are configured on a port.
– A voice VLAN is not configured on the port.
– The device authenticates through 802.1X.
– The connected device sends no traffic, falls over to MAB, and then successfully authenticates through 802.1X.
– A dynamic VLAN is assigned to the port following 802.1X authorization.
– Enter shut then no shut on the port to halt the high CPU and log messages.
– Enter the switchport voice vlan command on the port. CSCtw73754
Workaround: Unconfigure the following from the switch: aaa accounting send stop-record authentication failure. CSCtj69212
Workaround: Retain the default setting (VLAN 1) for the native VLAN on trunks ports. CSCud05521
Workaround: Enter shut, and then no shut on the port to synchronize the STP state. CSCtf52437
Workaround: Retain the trunk native V LAN as 1. CSCud05521
Workaround: Shorten the dACL name. CSCug78653
Workaround: Return a dACL in the authorization profile with successful guest authentication.
– A fast stream of traffic matches the URL redirect ACL as IPDT clears an address.
– A traffic stream matches the URL redirect ACL and no URL redirect policy is installed for that IP address.
If memory leak occurs repeatedly, IPDT and other control packet processing ultimately ceases.
Workaround: If this behavior completely fills the CPU buffer, the switch must be reloaded. However, the frequency of encountering a stuck queue can be reduced to nearly zero by modifying the URL redirect ACL to permit only 80/443 traffic. CSCug56646
Workaround: Configure RADIUS test and dead criteria.
Workaround: Reconfigure ACLs on all affected interfaces or reload the switch.
These are the new resolved caveats in Cisco IOS Release 15.0(2)SG3 for Catalyst 4900 Series Switch:
Cisco has released free software updates that address this vulnerability. Workarounds that mitigate this vulnerability are available. This advisory is available at the following link:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120328-msdp
Note The March 28, 2012, Cisco IOS Software Security Advisory bundled publication includes nine Cisco Security Advisories. Each advisory lists the Cisco IOS Software releases that correct the vulnerability or vulnerabilities detailed in the advisory as well as the Cisco IOS Software releases that correct all vulnerabilities in the March 2012 bundled publication.
Individual publication links are in ''Cisco Event Response: Semiannual Cisco IOS Software Security Advisory Bundled Publication'' at the following link:
http://www.cisco.com/web/about/security/intelligence/Cisco_ERP_mar12.html
Products that are not running Cisco IOS Software are not vulnerable.
Cisco has released free software updates that address these vulnerabilities.
The HTTP server may be disabled as a workaround for the vulnerability described in this advisory.
This advisory is available at the following link:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120328-pai
This section lists the open caveats in Cisco IOS Release 15.0(2)SG2:
– If such a certificate does not exist and the device's hostname and default_domain have been set, then a persistent self-signed certificate will be generated.
– If such a certificate exists, the FQDN in the certificate is compared with the current device's hostname and default_domain. If either of these differs from the FQDN in the certificate, then the existing persistent self-signed certificate is replaced with a new one with the updated FQDN. Be aware that the existing key pair is used in the new certificate.
On a switch that support redundancy, the generation of the self-signed certificate is performed independently on the active and the standby supervisor engines. So, the certificates differ. After switchover, the HTTP client that holds the old certificate can not connect to the HTTPS server.
Workaround: Re-connect. CSCsb11964
This does not impact performance.
Workaround: Issue the no shutdown command. CSCsg27395
Workaround: Remove the transceiver from the new port and place it in the old port. Once the SFP is recognized in the old port, remove it slowly and insert it in the new port. CSCse34693
Workarounds: Do one of the following:
– After a reload, copy the startup-config to the running-config.
– Use a loopback interface as the target of the ip unnumbered command
– Change the CLI configuration such that during bootup, the router port is created first.
Workaround: When the port channel starts to flap, enter shut and no shut on the port channel. After the first switchover and after deleting the portchannel, create a new channel. (CSCsr00333)
Workaround: For VTP database propagation, configure ISL/dot1q trunk port. CSCsu43445
This applies to classic or E-series Catalyst 4500 supervisor engines running
Cisco IOS Release 12.2(50)SG
If the switch were to run a supervisor switchover while in this state, the host's MAC address would not be present in the new active supervisor engine’s MAC address table, causing possible connectivity interruption on the host.
Workaround: Enter the shutdown command, followed by the no shutdown command on the interface. This triggers relearning and synchronizing of the host's MAC to the standby supervisor engine. CSCsw91661
The queue transmit counters as well as the policing statistics (if any) are correct. CSCsz20149
This only happens when the switch is running network mobility service protocol (nmsp). It does not happen if the phone is CDP enabled.
Workaround: Use VLAN ID or name to differentiate the IP phone and the PC sitting behind the phone on the WCS. Specifically, the IP phone is detected on the voice VLAN, and the displayed information of serial number, model number, and software version is correct. However, a PC sitting behind the phone is detected on a data VLAN, and the displayed device information is wrong and should be ignored. CSCsz34522
Workaround: When interface mode is changed from Layer2 to Layer3, manually change interface trust state by enter the cos trust dscp command. CSCta16492
Despite the different default value, you can configure any value in the time range. CSCte51948
Workarounds: The Cisco switch default link-flap detection value is 5 flaps in 10 seconds. Use the default value or larger numbers. CSCtg07677
Similarly, the show epm sessions command always displays the authentication method as DOT1X.
Workaround: To view the authentication method used for a client, enter the show authentication sessions command. CSCsx42157
– The SVI (network) is unreachable. If an SVI exists on the ASW, because of the STP flap in the setup as well as the CISP operations, the SVI MAC configuration on the ASW is incorrect.
Workaround: Configure the ASW or any other switch upstream as the root-bridge for all the VLANs. CSCtg71030
Workaround: Configure both dead-criteria and deadtime.
Workaround: Enter shut, and then no shut on the ports. CSCtn88228
Workaround: After the switch reloads, enter shut, and then no shut on the port channel interface.
Workaround: Shut down the CE-facing interface. After all of the mask-value entries point to the target CE, unshut the CE-facing interface. CSCtl09941
Workaround: Enable a Layer 3 interface in the running configuration. CSCsc88636.
Workaround: Do not use the broadcast keyword in the aaa accounting configuration. CSCts56125
The occurs under the following conditions:
– Multi-auth (or multi-host) and MAB dot1x are configured on a port.
– A voice VLAN is not configured on the port.
– The device authenticates through 802.1X.
– The connected device sends no traffic, falls over to MAB, and then successfully authenticates through 802.1X.
– A dynamic VLAN is assigned to the port following 802.1X authorization.
– Enter shut then no shut on the port to halt the high CPU and log messages.
– Enter the switchport voice vlan command on the port. CSCtw73754
Workaround: Unconfigure the following from the switch: aaa accounting send stop-record authentication failure. CSCtj69212
Workaround: Retain the default setting (VLAN 1) for the native VLAN on trunks ports. CSCud05521
Workaround: Enter shut, and then no shut on the port to synchronize the STP state. CSCtf52437
Workaround: Retain the trunk native V LAN as 1. CSCud05521
Workaround: Shorten the dACL name. CSCug78653
Workaround: Return a dACL in the authorization profile with successful guest authentication.
– A fast stream of traffic matches the URL redirect ACL as IPDT clears an address.
– A traffic stream matches the URL redirect ACL and no URL redirect policy is installed for that IP address.
If memory leak occurs repeatedly, IPDT and other control packet processing ultimately ceases.
Workaround: If this behavior completely fills the CPU buffer, the switch must be reloaded. However, the frequency of encountering a stuck queue can be reduced to nearly zero by modifying the URL redirect ACL to permit only 80/443 traffic. CSCug56646
Workaround: Configure RADIUS test and dead criteria.
Workaround: Reconfigure ACLs on all affected interfaces or reload the switch.
This section lists the resolved caveats in Release 15.0(2)SG2:
The primary flex link interface comes up correctly.
Workaround: Configure static MAC address for the MAC address that must be learned dynamically on the backup flex link interface. CSCtr40070
1. Delete, then add the affected VLAN with no vlan vlan_ID, then lan vlan_ID.
2. Flap the impacted port-channel with shutdown then no shutdown. CSCtr17251
– Configure the switch port for mab rather than mab eap.
– Configure the AAA server to propose EAP-MD5 first rather than EAP-TLS for MAB EAP requests. CSCti78674
Workaround: Attach the console to collect additional crash data. CSCtu05426
Workaround: Re-enter the rep preempt segment command. CSCtr89862
Cisco has released free software updates that address this vulnerability. Workarounds that mitigate this vulnerability are available. This advisory is available at the following link:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120328-msdp
Note The March 28, 2012, Cisco IOS Software Security Advisory bundled publication includes nine Cisco Security Advisories. Each advisory lists the Cisco IOS Software releases that correct the vulnerability or vulnerabilities detailed in the advisory as well as the Cisco IOS Software releases that correct all vulnerabilities in the March 2012 bundled publication.
Individual publication links are in ''Cisco Event Response: Semiannual Cisco IOS Software Security Advisory Bundled Publication'' at the following link:
http://www.cisco.com/web/about/security/intelligence/Cisco_ERP_mar12.html
Products that are not running Cisco IOS Software are not vulnerable.
Cisco has released free software updates that address these vulnerabilities.
The HTTP server may be disabled as a workaround for the vulnerability described in this advisory.
This advisory is available at the following link:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120328-pai
This section lists the open caveats in Cisco IOS Release 15.0(2)SG1:
– If such a certificate does not exist and the device's hostname and default_domain have been set, then a persistent self-signed certificate will be generated.
– If such a certificate exists, the FQDN in the certificate is compared with the current device's hostname and default_domain. If either of these differs from the FQDN in the certificate, then the existing persistent self-signed certificate is replaced with a new one with the updated FQDN. Be aware that the existing key pair is used in the new certificate.
On a switch that support redundancy, the generation of the self-signed certificate is performed independently on the active and the standby supervisor engines. So, the certificates differ. After switchover, the HTTP client that holds the old certificate can not connect to the HTTPS server.
Workaround: Re-connect. CSCsb11964
This does not impact performance.
Workaround: Issue the no shutdown command. CSCsg27395
Workaround: Remove the transceiver from the new port and place it in the old port. Once the SFP is recognized in the old port, remove it slowly and insert it in the new port. (CSCse34693).
Workarounds: Do one of the following:
– After a reload, copy the startup-config to the running-config.
– Use a loopback interface as the target of the ip unnumbered command
– Change the CLI configuration such that during bootup, the router port is created first.
Workaround: When the port channel starts to flap, enter shut and no shut on the port channel. After the first switchover and after deleting the portchannel, create a new channel. CSCsr00333
Workaround: For VTP database propagation, configure ISL/dot1q trunk port. CSCsu43445
This applies to classic or E-series Catalyst 4500 supervisor engines running
Cisco IOS Release 12.2(50)SG
If the switch were to run a supervisor switchover while in this state, the host's MAC address would not be present in the new active supervisor engine’s MAC address table, causing possible connectivity interruption on the host.
Workaround: Enter the shutdown command, followed by the no shutdown command on the interface. This triggers relearning and synchronizing of the host's MAC to the standby supervisor engine. CSCsw91661
The queue transmit counters as well as the policing statistics (if any) are correct. CSCsz20149
This only happens when the switch is running network mobility service protocol (nmsp). It does not happen if the phone is CDP enabled.
Workaround: Use VLAN ID or name to differentiate the IP phone and the PC sitting behind the phone on the WCS. Specifically, the IP phone is detected on the voice VLAN, and the displayed information of serial number, model number, and software version is correct. However, a PC sitting behind the phone is detected on a data VLAN, and the displayed device information is wrong and should be ignored. CSCsz34522
Workaround: When interface mode is changed from Layer2 to Layer3, manually change interface trust state by enter the cos trust dscp command. CSCta16492
Despite the different default value, you can configure any value in the time range. CSCte51948
Workarounds: The Cisco switch default link-flap detection value is 5 flaps in 10 seconds. Use the default value or larger numbers. CSCtg07677
Similarly, the show epm sessions command always displays the authentication method as DOT1X.
Workaround: To view the authentication method used for a client, enter the
show authentication sessions command. CSCsx42157
– The SVI (network) is unreachable. If an SVI exists on the ASW, because of the STP flap in the setup as well as the CISP operations, the SVI MAC configuration on the ASW is incorrect.
Workaround: Configure the ASW or any other switch upstream as the root-bridge for all the VLANs. CSCtg71030
Workaround: Configure both dead-criteria and deadtime.
Workaround: Enter shut, and then no shut on the ports. CSCtn88228
Workaround: After the switch reloads, enter shut, and then no shut on the port channel interface.
Workaround: Shut down the CE-facing interface. After all of the mask-value entries point to the target CE, unshut the CE-facing interface. CSCtl09941
Workaround: Enable a Layer 3 interface in the running configuration. CSCsc88636.
The primary flex link interface comes up correctly.
Workaround: Configure static MAC address for the MAC address that must be learned dynamically on the backup flex link interface. (CSCtr40070)
Workaround: None. (CSCtr52740)
1. Delete, then add the affected VLAN with no vlan vlan_ID, then lan vlan_ID.
2. Flap the impacted port-channel with shutdown then no shutdown. CSCtr17251
– Configure the switch port for mab rather than mab eap.
– Configure the AAA server to propose EAP-MD5 first rather than EAP-TLS for MAB EAP requests. CSCti78674
Workaround: Attach the console to collect additional crash data. CSCtu05426
Workaround: Re-enter the rep preempt segment command. CSCtr89862
Workaround: Do not use the broadcast keyword in the aaa accounting configuration. CSCts56125
The occurs under the following conditions:
– Multi-auth (or multi-host) and MAB dot1x are configured on a port.
– A voice VLAN is not configured on the port.
– The device authenticates through 802.1X.
– The connected device sends no traffic, falls over to MAB, and then successfully authenticates through 802.1X.
– A dynamic VLAN is assigned to the port following 802.1X authorization.
– Enter shut then no shut on the port to halt the high CPU and log messages.
– Enter the switchport voice vlan command on the port. CSCtw73754
Workaround: Unconfigure the following from the switch: aaa accounting send stop-record authentication failure. CSCtj69212
Workaround: Retain the default setting (VLAN 1) for the native VLAN on trunks ports. CSCud05521
Workaround: Enter shut, and then no shut on the port to synchronize the STP state. CSCtf52437
Workaround: Retain the trunk native V LAN as 1. CSCud05521
Workaround: Shorten the dACL name. CSCug78653
Workaround: Return a dACL in the authorization profile with successful guest authentication.
– A fast stream of traffic matches the URL redirect ACL as IPDT clears an address.
– A traffic stream matches the URL redirect ACL and no URL redirect policy is installed for that IP address.
If memory leak occurs repeatedly, IPDT and other control packet processing ultimately ceases.
Workaround: If this behavior completely fills the CPU buffer, the switch must be reloaded. However, the frequency of encountering a stuck queue can be reduced to nearly zero by modifying the URL redirect ACL to permit only 80/443 traffic. CSCug56646
Workaround: Configure RADIUS test and dead criteria.
Workaround: Reconfigure ACLs on all affected interfaces or reload the switch.
This section lists the resolved caveats in Release 15.0(2)SG1:
Workaround: Configure an ACL on the port. CSCte18760
Workaround: Configure a port ACL on the interface. CSCtl89389
Workaround: Do not configure open directive on the switch. CSCto48824
Workaround: Disable gratuitous ARP on the Windows device. CSCtn27420
In this output, sequence 40 is the unexpected command that appears in front of the entry.
Workaround: Delete the access list and reconfigure all entries, rather than deleting or reconfiguring the access list. CSCtn83348
Workaround: Enter the interface range command to configure all member ports to use a new port channel that is created automatically. CSCtn52362
Workaround: Enter shut, and then no shut on the member port. CSCtn52404
Workaround: None. Use a different IGMP group address. CSCtq15982
Workaround: Remove the logging filter. CSCto76709
Workaround: Cut and paste the configuration. Then apply rapidly to PVLAN isolated trunk port. CSCtq04058
Workaround: Modify filter ID or fallback ACLs only when they are not in use. CSCto79274
This section lists the open caveats in Cisco IOS Release 15.0(2)SG:
– If such a certificate does not exist and the device's hostname and default_domain have been set, then a persistent self-signed certificate will be generated.
– If such a certificate exists, the FQDN in the certificate is compared with the current device's hostname and default_domain. If either of these differs from the FQDN in the certificate, then the existing persistent self-signed certificate is replaced with a new one with the updated FQDN. Be aware that the existing key pair is used in the new certificate.
On a switch that support redundancy, the generation of the self-signed certificate is performed independently on the active and the standby supervisor engines. So, the certificates differ. After switchover, the HTTP client that holds the old certificate can not connect to the HTTPS server.
Workaround: Re-connect. CSCsb11964
This does not impact performance.
Workaround: Issue the no shutdown command. CSCsg27395
Workaround: Remove the transceiver from the new port and place it in the old port. Once the SFP is recognized in the old port, remove it slowly and insert it in the new port. CSCse34693
Workarounds: Do one of the following:
– After a reload, copy the startup-config to the running-config.
– Use a loopback interface as the target of the ip unnumbered command
– Change the CLI configuration such that during bootup, the router port is created first.
Workaround: When the port channel starts to flap, enter shut and no shut on the port channel. After the first switchover and after deleting the portchannel, create a new channel. CSCsr00333
Workaround: For VTP database propagation, configure ISL/dot1q trunk port. CSCsu43445
This applies to classic or E-series Catalyst 4500 supervisor engines running
Cisco IOS Release 12.2(50)SG
If the switch were to run a supervisor switchover while in this state, the host's MAC address would not be present in the new active supervisor engine’s MAC address table, causing possible connectivity interruption on the host.
Workaround: Enter the shutdown command, followed by the no shutdown command on the interface. This triggers relearning and synchronizing of the host's MAC to the standby supervisor engine. CSCsw91661
The queue transmit counters as well as the policing statistics (if any) are correct. CSCsz20149
This only happens when the switch is running network mobility service protocol (nmsp). It does not happen if the phone is CDP enabled.
Workaround: Use VLAN ID or name to differentiate the IP phone and the PC sitting behind the phone on the WCS. Specifically, the IP phone is detected on the voice VLAN, and the displayed information of serial number, model number, and software version is correct. However, a PC sitting behind the phone is detected on a data VLAN, and the displayed device information is wrong and should be ignored. CSCsz34522
Workaround: When interface mode is changed from Layer2 to Layer3, manually change interface trust state by enter the cos trust dscp command. CSCta16492
Despite the different default value, you can configure any value in the time range. CSCte51948
Workarounds: The Cisco switch default link-flap detection value is 5 flaps in 10 seconds. Use the default value or larger numbers. CSCtg07677
Similarly, the show epm sessions command always displays the authentication method as DOT1X.
Workaround: To view the authentication method used for a client, enter the
show authentication sessions command. CSCsx42157
Workaround: Configure an ACL on the port. CSCte18760
– The SVI (network) is unreachable. If an SVI exists on the ASW, because of the STP flap in the setup as well as the CISP operations, the SVI MAC configuration on the ASW is incorrect.
Workaround: Configure the ASW or any other switch upstream as the root-bridge for all the VLANs. CSCtg71030
Workaround: Configure both dead-criteria and deadtime.
Workaround: Configure a port ACL on the interface. CSCtl89389
Workaround: Enter shut, and then no shut on the ports. CSCtn88228
Workaround: Disable gratuitous ARP on the Windows device. CSCtn27420
In this output, sequence 40 is the unexpected command that appears in front of the entry.
Workaround: Delete the access list and reconfigure all entries, rather than deleting or reconfiguring the access list. CSCtn83348
Workaround: After the switch reloads, enter shut, and then no shut on the port channel interface.
Workaround: Do not configure open directive on the switch.
Workaround: Shut down the CE-facing interface. After all of the mask-value entries point to the target CE, unshut the CE-facing interface. CSCtl09941
Workaround: Enter the interface range command to configure all member ports to use a new port channel that is created automatically. CSCtn52362
Workaround: Enter shut, and then no shut on the member port. CSCtn52404
Workaround: Enable a Layer 3 interface in the running configuration. CSCsc88636.
Workaround: Modify filter ID or fallback ACLs only when they are not in use. CSCto79274
The primary flex link interface comes up correctly.
Workaround: Configure static MAC address for the MAC address that must be learned dynamically on the backup flex link interface. CSCtr40070
1. Delete, then add the affected VLAN with no vlan vlan_ID, then lan vlan_ID.
2. Flap the impacted port-channel with shutdown then no shutdown. CSCtr17251
– Configure the switch port for mab rather than mab eap.
– Configure the AAA server to propose EAP-MD5 first rather than EAP-TLS for MAB EAP requests. CSCti78674
Workaround: Attach the console to collect additional crash data. CSCtu05426
Workaround: Re-enter the rep preempt segment command. CSCtr89862
Workaround: Do not use the broadcast keyword in the aaa accounting configuration. CSCts56125
The occurs under the following conditions:
– Multi-auth (or multi-host) and MAB dot1x are configured on a port.
– A voice VLAN is not configured on the port.
– The device authenticates through 802.1X.
– The connected device sends no traffic, falls over to MAB, and then successfully authenticates through 802.1X.
– A dynamic VLAN is assigned to the port following 802.1X authorization.
– Enter shut then no shut on the port to halt the high CPU and log messages.
– Enter the switchport voice vlan command on the port. CSCtw73754
Workaround: Unconfigure the following from the switch: aaa accounting send stop-record authentication failure. CSCtj69212
Workaround: Retain the default setting (VLAN 1) for the native VLAN on trunks ports. CSCud05521
Workaround: Enter shut, and then no shut on the port to synchronize the STP state. CSCtf52437
Workaround: Retain the trunk native V LAN as 1. CSCud05521
Workaround: Shorten the dACL name. CSCug78653
Workaround: Return a dACL in the authorization profile with successful guest authentication.
– A fast stream of traffic matches the URL redirect ACL as IPDT clears an address.
– A traffic stream matches the URL redirect ACL and no URL redirect policy is installed for that IP address.
If memory leak occurs repeatedly, IPDT and other control packet processing ultimately ceases.
Workaround: If this behavior completely fills the CPU buffer, the switch must be reloaded. However, the frequency of encountering a stuck queue can be reduced to nearly zero by modifying the URL redirect ACL to permit only 80/443 traffic. CSCug56646
Workaround: Configure RADIUS test and dead criteria.
Workaround: Reconfigure ACLs on all affected interfaces or reload the switch.
This section lists the resolved caveats in Release 15.0(2)SG:
Workaround: Reconfigure VLAN load balancing with a different configuration, by performing the following task:
a. Reconfigure the VLAN load balancing configuration on the desired REP ports.
b. Use the shut command on any one REP port in the segment to cause a failure in that segment.
c. Use the no shut command on the same port to restore normal REP topology with one ALT port.
d. Invoke manual preemption on a primary edge port to obtain VLAN load balancing with the new configuration. CSCsv69853
Workaround: When a log message appears indicating that the SFP+ has been removed, do one of the following:
– Enter any commands for that port.
– Insert an SFP+ in that port.
– Reinsert the removed SFP+ in another port. CSCsv90044
Workaround: Enter shut, and then no shut on the SVI. CSCtg72559
Workaround: Disable the ip cef accounting non-recursive command. (CSCtn68186)
Workaround: Enter shut, and then no shut on the alternate port. CSCtn26322
– Create the VLANs manually. CSCtl94096
Workaround: Enter shut, and then no shut on the alternate interface. CSCtn03533
Workaround: Use the default native VLAN (VLAN of 1) for the trunks. CSCtn29321
These sections provide troubleshooting guidelines for the Catalyst 4900 family running IOS supervisor engines:
Netbooting using a boot loader image is not supported. Instead, use one of the following options to boot an image:
1. Boot from a CompactFlash card by entering the following command:
The ROMMON TFTP boot is very similar to the BOOTLDR TFTP boot, except that:
– the BOOTLDR variable should not be set
– the TFTP server must be accessible from the Ethernet management port on the supervisor engine.
To boot from ROMMON, perform the following tasks while in ROMMON mode:
a. Ensure that the Ethernet management port is physically connected to the network.
b. Verify that bootloader environment is not set by entering the unset bootldr command.
c. Set IP address of the Ethernet management port on the supervisor engine by entering the following command: set interface fa1 ip_address > < ip_mask
For example, to set the supervisor engine Ethernet port with an IP address 172.16.1.5 and IP mask 255.255.255.0, enter the following command:
d. Set default gateway for the Ethernet management port on the supervisor engine by entering the following command: set ip route default gateway_ip_address. The default gateway should be directly connected to the supervisor engine Ethernet management port subnet.
e. Ping the TFTP server to ensure that there is connectivity to the server from the Ethernet management port on the supervisor engine by entering the following command: ping < tftp_server_ip_address >.
f. Once the ping is successful, boot the image from the TFTP server by entering the following command: boot tftp:// tftp_server_ip_address > / < image_path_and_file_name
For example, to boot the image name cat4500-is-mz located on the TFTP server 172.16.1.8, enter the following command:
This section contains troubleshooting guidelines for system-level problems:
This section contains troubleshooting guidelines for the Catalyst 4900 series switch:
For general information on MIBs, RMON groups, and traps, refer to the Cisco public MIB directory ( http://www.cisco.com/public/sw-center/netmgmt/cmtk/mibs.shtml). For information on the specific MIBs supported by the Catalyst 4900 series switches, refer to the Catalyst 4000 MIB Support List located at ftp://ftp.cisco.com/pub/mibs/supportlists/cat4000/cat4000-supportlist.html.
Although their Release Notes are unique, the 4 platforms (Catalyst 4500, Catalyst 4900, Catalyst ME 4900, and Catalyst 4900M) use the same Software Configuration Guide, Command Reference Guide, and System Message Guide. Refer to the following home pages for additional information:
http://www.cisco.com/go/cat4500/docs
http://www.cisco.com/go/cat4900/docs
http://www.cisco.com/en/US/products/ps7009/tsd_products_support_series_home.html
Installation guides and notes including specifications and relevant safety information are available at the following URLs:
http://www.cisco.com/en/US/docs/switches/lan/catalyst4500/hardware/installation/guide/78-14409-08/4500inst.html
http://www.cisco.com/en/US/docs/switches/lan/catalyst4500/hardware/catalyst4500e/installation/guide/Eseries.html
http://www.cisco.com/en/US/products/hw/switches/ps4324/prod_installation_guides_list.html
http://www.cisco.com/en/US/docs/switches/lan/catalyst4500/hardware/regulatory/compliance/78_13233.html
http://www.cisco.com/en/US/products/hw/switches/ps4324/prod_installation_guides_list.html
http://www.cisco.com/en/US/products/ps6021/prod_installation_guides_list.html
http://www.cisco.com/en/US/products/ps7009/prod_installation_guides_list.html
Software release notes, configuration guides, command references, and system message guides are available at the following URLs:
http://www.cisco.com/en/US/products/hw/switches/ps4324/prod_release_notes_list.html
http://www.cisco.com/en/US/products/ps6021/prod_release_notes_list.html
http://www.cisco.com/en/US/docs/switches/lan/catalyst4500/release/note/OL_11511.html
Software documents for the Catalyst 4500 Classic, Catalyst 4500 E-Series, Catalyst 4900, and
Cisco ME 4900 Series Ethernet Switches are available at the following URLs:
http://www.cisco.com/en/US/products/hw/switches/ps4324/products_installation_and_configuration_guides_list.html
http://www.cisco.com/en/US/products/hw/switches/ps4324/prod_command_reference_list.html
http://www.cisco.com/en/US/products/hw/switches/ps4324/products_system_message_guides_list.html
Platform-independent Cisco IOS documentation may also apply to the Catalyst 4500 and 4900 switches. These documents are available at the following URLs:
http://www.cisco.com/en/US/products/ps6350/products_installation_and_configuration_guides_list.html
http://www.cisco.com/en/US/products/ps6350/prod_command_reference_list.html
You can also use the Command Lookup Tool at:
http://tools.cisco.com/Support/CLILookup/cltSearchAction.do
http://www.cisco.com/en/US/products/ps6350/products_system_message_guides_list.html
You can also use the Error Message Decoder tool at:
http://www.cisco.com/pcgi-bin/Support/Errordecoder/index.cgi
http://www.cisco.com/public/sw-center/netmgmt/cmtk/mibs.shtml
The following notices pertain to this software license.
This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit ( http://www.openssl.org/).
This product includes cryptographic software written by Eric Young (eay@cryptsoft.com).
This product includes software written by Tim Hudson (tjh@cryptsoft.com).
The OpenSSL toolkit stays under a dual license, i.e. both the conditions of the OpenSSL License and the original SSLeay license apply to the toolkit. See below for the actual license texts. Actually both licenses are BSD-style Open Source licenses. In case of any license issues related to OpenSSL please contact openssl-core@openssl.org.
Copyright © 1998-2007 The OpenSSL Project. All rights reserved.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:
1. Redistributions of source code must retain the copyright notice, this list of conditions and the following disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions, and the following disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgment: “This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit ( http://www.openssl.org/)”.
4. The names “OpenSSL Toolkit” and “OpenSSL Project” must not be used to endorse or promote products derived from this software without prior written permission. For written permission, please contact openssl-core@openssl.org.
5. Products derived from this software may not be called “OpenSSL” nor may “OpenSSL” appear in their names without prior written permission of the OpenSSL Project.
6. Redistributions of any form whatsoever must retain the following acknowledgment:
“This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit ( http://www.openssl.org/)”.
THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT “AS IS”' AND ANY EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
This product includes cryptographic software written by Eric Young (eay@cryptsoft.com). This product includes software written by Tim Hudson (tjh@cryptsoft.com).
Copyright © 1995-1998 Eric Young (eay@cryptsoft.com). All rights reserved.
This package is an SSL implementation written by Eric Young (eay@cryptsoft.com).
The implementation was written so as to conform with Netscapes SSL.
This library is free for commercial and non-commercial use as long as the following conditions are adhered to. The following conditions apply to all code found in this distribution, be it the RC4, RSA, lhash, DES, etc., code; not just the SSL code. The SSL documentation included with this distribution is covered by the same copyright terms except that the holder is Tim Hudson (tjh@cryptsoft.com).
Copyright remains Eric Young’s, and as such any Copyright notices in the code are not to be removed. If this package is used in a product, Eric Young should be given attribution as the author of the parts of the library used. This can be in the form of a textual message at program startup or in documentation (online or textual) provided with the package.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:
1. Redistributions of source code must retain the copyright notice, this list of conditions and the following disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
“This product includes cryptographic software written by Eric Young (eay@cryptsoft.com)”.
The word ‘cryptographic’ can be left out if the routines from the library being used are not cryptography-related.
4. If you include any Windows specific code (or a derivative thereof) from the apps directory (application code) you must include an acknowledgement: “This product includes software written by Tim Hudson (tjh@cryptsoft.com)”.
THIS SOFTWARE IS PROVIDED BY ERIC YOUNG “AS IS” AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
The license and distribution terms for any publicly available version or derivative of this code cannot be changed. i.e. this code cannot simply be copied and put under another distribution license [including the GNU Public License].
For information on obtaining documentation, submitting a service request, and gathering additional information, see the monthly What’s New in Cisco Product Documentation, which also lists all new and revised Cisco technical documentation, at:
http://www.cisco.com/en/US/docs/general/whatsnew/whatsnew.html
Subscribe to the What’s New in Cisco Product Documentation as a Really Simple Syndication (RSS) feed and set content to be delivered directly to your desktop using a reader application. The RSS feeds are a free service and Cisco currently supports RSS Version 2.0.