Supported Hardware on the Catalyst 4900M Switchand Catalyst 4948E Ethernet Switch
New Hardware Features in Release15.0(2)SG1
New Software Features in Release15.0(2)SG1
New Hardware Features in Release15.0(2)SG
New Software Features in Release15.0(2)SG
Minimum and Recommended ROMMON Release
Open Caveats in Cisco IOS Release 15.0(2)SG8
Resolved Caveats in Cisco IOS Release 15.0(2)SG8
Open Caveats in Cisco IOS Release 15.0(2)SG7
Resolved Caveats in Cisco IOS Release 15.0(2)SG7
Open Caveats in Cisco IOS Release 15.0(2)SG6
Resolved Caveats in Cisco IOS Release 15.0(2)SG6
Open Caveats in Cisco IOS Release 15.0(2)SG5
Resolved Caveats in Cisco IOS Release 15.0(2)SG5
Open Caveats in Cisco IOS Release 15.0(2)SG4
Resolved Caveats in Cisco IOS Release 15.0(2)SG4
Open Caveats in Cisco IOS Release 15.0(2)SG3
Resolved Caveats in Cisco IOS Release 15.0(2)SG3
Open Caveats in Cisco IOS Release 15.0(2)SG2
Resolved Caveats in Cisco IOS Release 15.0(2)SG2
Open Caveats in Cisco IOS Release 15.0(2)SG1
Resolved Caveats in Cisco IOS Release 15.0(2)SG1
Open Caveats in Cisco IOS Release 15.0(2)SG
Resolved Caveats in Cisco IOS Release 15.0(2)SG
Troubleshooting at the System Level
Obtaining Documentation and Submitting a Service Request
Current Release
15.0(2)SG8—December 9, 2013
Prior Release
15.0(2)SG7, 15.0(2)SG6, 15.0(2)SG5, 15.0(2)SG4, 15.0(2)SG3, 15.0(2)SG2, 15.0(2)SG1, 15.0(2)SG
These release notes describe the features, modifications, and caveats for Cisco IOS Release 15.0(2)SG on the Catalyst 4900M switch and the Catalyst 4948E Ethernet Switch.
Cisco Catalyst 4900M Series is a premium extension to the widely deployed Catalyst 4948 Series top of rack Ethernet switches for data center server racks. Optimized for ultimate deployment flexibility, the Catalyst 4900M Series can be deployed for 10/100/1000 server access with 1:1 uplink to downlink oversubscription, mix of 10/100/1000 and 10 Gigabit Ethernet servers or all 10 Gigabit Ethernet servers in the same rack. The Catalyst 4900M is a 320Gbps, 250Mpps, 2RU fixed configuration switch with
8 fixed wire speed X2 ports on the base unit and 2 optional half card slots for deployment flexibility and investment protection. Low latency, scalable buffer memory and high availability with 1+1 hot swappable AC or DC power supplies and field replaceable fans optimize the Catalyst 4900M for any size of data center.
With Cisco IOS Release 12.2(54)XO, we Cisco introduced the Catalyst® 4948E Ethernet Switch, which is the first Cisco Catalyst E-Series data center switch built from the start to deliver class-leading, full-featured server-access switching. The switch offers forty-eight 10/100/1000-Gbps RJ45 downlink ports and four 1/10 Gigabit Ethernet uplink ports and is designed to simplify data center architecture and operations by offering service provider-grade hardware and software in a one rack unit (1RU) form factor optimized for full-featured top-of-rack (ToR) data center deployments.
The Cisco Catalyst 4948E Ethernet Switch builds on the advanced technology of the Cisco Catalyst 4948 Switches, the most deployed ToR switch in the industry, with more than 10 million ports deployed worldwide. The Cisco Catalyst E-Series doubles the uplink bandwidth and offers true front-to-back airflow with no side or top venting. Stringent airflow management reduces data center operating costs by providing strict hot-aisle and cold-aisle isolation. Exceptional reliability and serviceability are delivered with optional internal AC and DC 1+1 hot-swappable power supplies and a hot-swappable fan tray with redundant fans.
For more information on Catalyst 4900M and Catalyst 4948E Ethernet Switch, visit:
http://www.cisco.com/en/US/products/ps6021/index.html .
Note Although this release note and those for Catalyst 4500 Series Switch, the Catalyst 4900 Series Switch, the Catalyst ME 4900 Switch, are unique, they each refer to the same Software Configuration Guide, Command Reference Guide, and System Message Guide.
This publication consists of these sections:
The Enterprise Services image supports Cisco Catalyst 4948E Ethernet Switch and Cisco Catalyst 4900M Series software features based on Cisco IOS Software 15.0(2)SG, including enhanced routing. BGP capability is included in the Enterprises Services package.
The IP Base image supports Open Shortest Path First (OSPF) for Routed Access and Enhanced Interior Gateway Routing Protocol (EIGRP) "limited" Stub Routing. The IP Base image does not support enhanced routing features such as Nonstop Forwarding/Stateful Switchover (NSF/SSO), BGP, Intermediate System-to-Intermediate System (IS-IS), Internetwork Packet Exchange (IPX), AppleTalk, Virtual Routing Forwarding (VRF-lite), GLBP, and policy-based routing (PBR).
The LAN Base image complements the existing IP Base and Enterprise Services images. It is focused on customer access and Layer 2 requirements and therefore many of the IP Base features are not required. The IP upgrade image is available if at a later date you require some of those features.
Starting with Cisco IOS Release 15.0(2)SG, on Catalyst 4900M and Catalyst 4948E, support for NEAT feature has been extended from IP Base to LAN Base and support for HSRP v2 IPV6 has been extended from Enterprise Services to IP Base.
Note The default image for WS-C4948E is LAN Base.
Customers with Catalyst 4948E Ethernet Switch and Catalyst 4900M series switches who need the latest hardware support and software features should migrate to Cisco IOS Release 15.0(2)SG. Cisco IOS Release 15.0(2)SG is the latest maintenance train base.
Cisco IOS Release 12.2(53)SG4 is the recommended release for customers who require a release with a maintenance train. The Cisco IOS Release 12.2(53)SG train includes support for OSPF for routed Access.
Support for the Catalyst 4900M platform was introduced in 12.2(40)XO. Moving forward, the Cisco Catalyst 4900M platform has two maintenance trains.
Figure 1 displays the two active trains.
Figure 1 Software Release Strategy for the Catalyst 4900M Series Switch
Support for Cisco IOS Software Release 15.0(2)SG follows the standard Cisco Systems® support policy, available at http://www.cisco.com/en/US/products/products_end-of-life_policy.html
This section describes the system requirements:
For Catalyst 4900, 4948E, and 4948E-F switch transceiver module compatibility information, see the url:
http://www.cisco.com/en/US/products/hw/modules/ps5455/products_device_support_tables_list.html
The following table lists the hardware supported on the Catalyst 4900M series switch.
8-Port Wire-Speed 10 Gigabit Ethernet (RJ-45) Note This linecard is not supported on the Catalyst 4948E Ethernet Switch. |
|
The following table lists the hardware supported on the Catalyst 4948E Ethernet Switch.
The following table lists the hardware supported on the Catalyst 4948E-F Ethernet Switch.
Note The default image for the Catalyst 4900M series switch is Cisco IOS Release 12.2(53)SG2.
Table 4 lists the Cisco IOS software features for the Catalyst 4948E Ethernet Switch and Catalyst 4900M series switches. For the full list of supported features, check the Feature Navigator application:
http://tools.cisco.com/ITDIT/CFN/
For information on MiBs support, please refer to this URL:
http://ftp.cisco.com/pub/mibs/supportlists/cat4000/cat4000-supportlist.html
Layer 2 transparent bridging1 |
Layer 2 MAC2 learning, aging, and switching by software |
VMPS3 Client |
Layer 2 Control Policing (Not supported on Supervisor Engine 6-E) |
NEAT Enhancement: Re-Enabling BPDU Guard Based on User Configuration |
802.1X Multiple Domain Authentication and Multiple Authorization |
802.1X Supplicant and Authenticator Switches with Network Edge Access Topology |
No. of VLAN support per switch: 2048 (for LAN Base) and 4096 (for IP Base) |
IEEE 802.1ag - D8.1 standard Compliant CFM, Y.1731 multicast LBM / AIS / RDI / LCK, IP SLA for Ethernet |
DTP4 |
RIPv15 and RIPv2, Static Routing |
EIGRP6 |
EIGRP Service Advertisement Framework7 |
OSPF8 |
BGP49 |
MBGP10 |
MSDP11 |
ICMP12 Router Discovery Protocol |
DVMRP13 |
NTP14 |
SCP15 |
Load balancing for routed traffic, based on source and destination IP addresses |
Link Layer Discovery Protocol Media Endpoint Discovery (LLDP-MED) |
Authentication, authorization, and accounting using TACACS+ and RADIUS protocol |
HSRP16 over Ethernet, EtherChannels - 10/100/1000Mbps, 10 Gbps |
IGMP17 snooping version1, version 2, and version 3 (Full Support) |
802.3ad Link Aggregation (LACP) Port-Channel Standalone Disable |
SSH version 1 and version 218 |
SNMP19 version 1, version 2, and version 3 |
Router standard and extended ACLs 20on all ports with no performance penalty |
PACL21 |
PBR22 |
Per-port QoS23 rate-limiting and shaping |
Identity ACL Policy Enforcement24 |
IPv6 Host support (- IPv6 support: Addressing; IPv6: Option processing, Fragmentation, ICMPv6, |
TCP/UDP over IPv6; Applications: Ping/Traceroute/VTY/SSH/TFTP, SNMP for IPv6 objects) |
Non-stop Forwarding Awareness for EIGRP-stub in IP base for all supervisor engines |
OSPF Fast Convergence25 |
EEM 3.226 |
PIM Accept Register - Rogue Multicast Server Protection27 |
IP Multicast Load Splitting (Equal Cost Multipath (ECMP) using S, G and Next-hop) |
VLAN Mapping (VLAN Translation)28 |
Netflow-lite (on Catalyst 4948E and Catalyst 4948E-F in IP Base or higher) |
These features are not supported in Cisco IOS Release 15.0(2)SG for the Cisco Catalyst 4948E Ethernet Switch and the Catalyst 4900M series switch:
– Standard Xerox Network System (XNS) access list
– Protocol type-code access list
– <1200-1299> IPX summary address access list
These sections describe the new and changed information for the Catalyst 4948E Ethernet Switch and the Catalyst 4900M series switch running Cisco IOS software:
Release 15.0(2)SG1 provides no new hardware on the Catalyst 4500 series switch.
Release 15.0(2)SG1 provides the following new software feature on the Catalyst 4500 series switch.
Release 15.0(2)SG provides the following new hardware for Catalyst 4900M, Catalyst 4948E Ethernet Switch, and Catalyst 4948E-F Ethernet Switch:
Release 15.0(2)SG provides the following new hardware for Catalyst 4948E Ethernet Switch, and Catalyst 4948E-F Ethernet Switch:
– DWDM-SFP-6141= (Cisco 1000BASE-DWDM SFP 1561.42 nm)
– DWDM-SFP-5736= (Cisco 1000BASE-DWDM SFP 1557.36 nm)
– DWDM-SFP-5332= (Cisco 1000BASE-DWDM SFP 1553.33 nm)
– DWDM-SFP-4931= (Cisco 1000BASE-DWDM SFP 1549.32 nm)
– DWDM-SFP-4532= (Cisco 1000BASE-DWDM SFP 1545.32 nm)
– DWDM-SFP-4134= (Cisco 1000BASE-DWDM SFP 1541.35 nm)
Release 15.0(2)SG provides the following Cisco IOS software features for Catalyst 4900M and Catalyst 4948E Ethernet Switch:
For information on the reporting issue, refer to the following URL:
http://www.cisco.com/en/US/docs/ios/ netmgmt/configuration/guide/nm_cdp_discover.html
For information on configuring CDP Location TLV, refer to the following URL:
http://www.cisco.com/en/US/docs/ios/ netmgmt/configuration/guide/nm_cdp_discover.html
Table 5 lists the minimum and recommended ROMMON releases for Catalyst 4900M switch and Catalyst 4948E Ethernet Switch.
Note ROMMON Release 12.2(44r)SG5 is the minimum required to run Cisco IOS Release 15.0(2)SG and is recommended for other releases.
Following limitations and restrictions apply to the Cisco Catalyst 4948E Ethernet Switch and the Catalyst 4900M series switch:
Workaround: Display the configuration with the show standby command, then remove the CLI. Here is sample output of the show standby GigabitEthernet1/1 command:
Use the standby delay reload option if the router is rebooting after reloading the image.
– The verify and squeeze commands are not supported.
– The rename command is supported in FAT file system.
For the Catalyst 4948E Ethernet Switch and the Catalyst 4900M series switch, the rename command has been added for bootflash and slot0. For all other supervisor engines, the rename command is supported for nvram devices only.
– the fsck command is supported for slot0 device. It is not supported in the file systems on supervisor engines other than 6-E.
– In the FAT file system, the IOS format bootflash: command erases user files only. It does not erase system configuration.
– The FAT file system supports a maximum of 63 characters for file/directory name. The maximum for path length is 127 characters.
– The FAT file system does not support the following characters in file/directory names:{}#%^ and space characters.
– The FAT file system honors the Microsoft Windows file attribute of "read-only" and "read-write", but it does not support the Windows file "hidden" attribute.
– Supervisor Engine 6-E uses the FAT file system for compact flash (slot0). If a compact flash is not formatted in FAT file system (such as compact flash on a supervisor engine other than 6-E), the switch does not recognize it.
If this message appears, check that there is network connectivity between the switch and the ACS. You should also check that the switch has been properly configured as an AAA client on the ACS.
– As IPSG learns the static hosts on each interface, the switch CPU may hit 100 per cent if there are a large number of hosts to learn. The CPU usage will drop once the hosts are learned.
– IPSG violations for static hosts are printed as they occur. If multiple violations occur simultaneously on different interfaces, the CLI displays the last violation. For example, if IPSG is configured for 10 ports and violations exist on ports 3,6 and 9, the violation messages are printed only for port 9.
– Inactive host bindings will appear in the device tracking table when either a VLAN is associated with another port or a port is removed from a VLAN. So, as hosts are moved across subnets, the hosts are displayed in the device tracking table as INACTIVE.
– Autostate SVI does not work on EtherChannel.
In such a scenario, the ipv6 MTU value programmed in hardware will be different from the ipv6 interface MTU value. This will happen if there is no room in the hw MTU table to store additional values.
You must free up some space in the table by unconfiguring some unused MTU values and subsequently disable/re-enable ipv6 on the interface or reapply the MTU configuration.
To enable IPSG with Static Hosts on a port, issue the following commands:
Note The issue above also applies to IPSG with Static Hosts on a PVLAN Host port.
– Fast UDLD is disabled by default.
– Configure fast UDLD only on point-to-point links between network devices that support fast UDLD.
– You can configure fast UDLD in either normal or aggressive mode.
– Do not enter the link debounce command on fast UDLD ports.
– Configure fast UDLD on at least two links between each connected network device. This reduces the likelihood of fast UDLD incorrectly error disabling a link due to false positives.
– Fast UDLD does not report a unidirectional link if the same error occurs simultaneously on more than one link to the same neighbor device.
– The Catalyst 4948E Ethernet Switch and the Catalyst 4900 Ethernet switch support fast UDLD on a maximum of 32 ports.
The outputs of certain commands, such as show ip route and show access-lists, contain non-deterministic text. While the output is easily understood, the output text does not contain strings that are consistently output. A general purpose specification file entry is unable to parse all possible output.
While a general purpose specification file entry may not be possible, a specification file entry might be created that returns the desired text by searching for text that is guaranteed to be in the output. If a string is guaranteed to be in the output, it can be used for parsing.
For example, the output of the show ip access-lists SecWiz_Gi3_17_out_ip command is this:
The first line is easily parsed because access list is guaranteed to be in the output:
The remaining lines all contain the term host. As a result, the specification file may report the desired values by specifying that string. For example, this line
will produce the following for the first and second rules
and the following for the third statement
Request the output of the show running-config command using NETCONF and parse that output for the desired strings. This is useful when the desired lines contain nothing in common. For example, the rules in this access list do not contain a common string and the order (three permits, then a deny, then another permit), prevent the spec file entry from using permit as a search string, as in the following example:
The XML output of show running-config command includes the following, which can then be parsed programmatically, as desired:
This configuration had been removed erroneously in a prior release.
Caveats describe unexpected behavior in Cisco IOS releases. Caveats listed as open in a prior release are carried forward to the next release as either open or resolved.
Note For the latest information on PSIRTS, refer to the Security Advisories on CCO at the following URL:
http://tools.cisco.com/security/center/publicationListing
This section lists the open caveats in Cisco IOS Release 15.0(2)SG8:
Workaround: Reinsert the X2. CSCsk43618
Workaround: If you plan to change a class-map action, such as exceed-action, you meed to remove the class-map with the no class c1 command under policy-map submode. Then, apply the new class-map with the updated changes. CSCsk70826)
Workaround: Enter the show policy-map interface command. CSCsi71036
Workaround: None. However, if you enter the show policy-map name, the unconditional marking actions are displayed. CSCsi94144
Workarounds: Disable IGMP snooping on all the relevant VLANs before disabling it globally.
Workaround: Unconfigure any generic QOS policies from the system. The QoS policies with the match any attribute cause IPv6 entries to become active. If the switch is a pure Layer 2 device, remove the generic protocol family attributes and narrow it to the protocol family.
You only see this symptom if you did not allocate a VLAN before you configure the IFM, then at a later time allocate the same VLAN.
Workaround: Unconfigure, then reconfigure the IFM on the port.
Workarounds: Do one of the following:
– After a reload, copy the startup-config to the running-config.
– Use a loopback interface as the target of the ip unnumbered command
– Change the CLI configuration such that during bootup, the router port is created first.
Workaround: When the port channel starts to flap, enter shut and no shut on the port channel. After the first switchover and after deleting the portchannel, create a new channel. CSCsr00333
This problem impacts X2, OneX converters, and SFP+ on the Supervisor Engine 6-E, and linecards.
Workaround: Remove and reinsert the One X Convertor with SFP+, SFP+ alone, or X2 after some perceivable delay. CSCsu43461
Workaround: For VTP database propagation, configure ISL/dot1q trunk port. CSCsu43445
This applies to classic or E-series Catalyst 4500 supervisor engines running
Cisco IOS Release 12.2(50)SG
If the switch were to run a supervisor switchover while in this state, the host's MAC address would not be present in the new active supervisor engine’s MAC address table, causing possible connectivity interruption on the host.
Workaround: Enter the shutdown command, followed by the no shutdown command on the interface. This triggers relearning and synchronizing of the host's MAC to the standby supervisor engine. CSCsw91661
To observe this issue, the following CLIs are configured with window size as the period for monitoring the errors and a low threshold equal to the number of CRC errored seconds seen/expected.
Workaround: Configure a lower value of low threshold such that the frame errors are seen divided into the expected number of frame errored seconds. CSCsy37181
The queue transmit counters as well as the policing statistics (if any) are correct. CSCsz20149
This only happens when the switch is running network mobility service protocol (nmsp). It does not happen if the phone is CDP enabled.
Workaround: Use VLAN ID or name to differentiate the IP phone and the PC sitting behind the phone on the WCS. Specifically, the IP phone is detected on the voice VLAN, and the displayed information of serial number, model number, and software version is correct. However, a PC sitting behind the phone is detected on a data VLAN, and the displayed device information is wrong and should be ignored. CSCsz34522
Prior to Cisco IOS Release 12.2(53)SG1, 12.2(50)SG6, the switchport block multicast command would block IP Multicast, Layer 2 multicast, and broadcast traffic (CSCta61825).
– Fast UDLD peer switch performs SSO.
– Fast UDLD peer switch is reloaded.
– One or more interfaces on a fast UDLD peer switch are shut down (or the port mode changes from switchport to routed, and vice versa).
Note To reduce the likelihood of this event, connect at least two physical interfaces between fast UDLD peer switches. You must configure the interfaces with the same neighbor fast hello interval.
– Reset the error disabled links with the udld reset command.
– Configure error disable recovery with the commands errdisable recovery cause udld and
errdisable recovery interval value (between 30 and 86400 sec).
– Manually clear errdisable on the local interface with a shutdown then a no shutdown.
Workarounds: The Cisco switch default link-flap detection value is 5 flaps in 10 seconds. Use the default value or larger numbers. CSCtg07677
This issue does not impact functionality.
You must wait for the ACLs to be programmed before performing other TCAM related changes. CSCtd57063
Similarly, the show epm sessions command always displays the authentication method as DOT1X.
Workaround: To view the authentication method used for a client, enter the
show authentication sessions command. CSCsx42157
– The SVI (network) is unreachable. If an SVI exists on the ASW, because of the STP flap in the setup as well as the CISP operations, the SVI MAC configuration on the ASW is incorrect.
Workaround: Configure the ASW or any other switch upstream as the root-bridge for all the VLANs. CSCtg71030
This issue only impacts Catalyst 4948E and Catalyst 4948E-F Ethernet Switches. It does not impact functionality.
Workarounds: Do one of the following:
– Change the interface to a Layer 2 switch port
– Do not configure an ACL access-list on the same Layer 3 interface where sampling monitor is enabled. CSCtn79032
Workaround: Configure both dead-criteria and deadtime.
Workaround: Shutdown the CE-facing interface. Once all the mask-value entries point to the target CE, unshut the CE-facing interface. CSCtl09941
Workaround: Enter shut, then no shut on the ports. CSCtn88228
Workaround: Reduce the number of VLAN mappings. CSCtn56208
Workaround: Configure ip multicast-routing globally and establish ip pim sparse-dense-mode on the CE-facing interface. CSCtl97692
Workaround: Unconfigure and reconfigure the service group. CSCtn88087
This issue only impacts Catalyst 4948E and Catalyst 4948E-F Ethernet Switches.
Workaround: After the switch reloads, enter shut, then no shut on the port-channel interface.
Workaround: Enable a Layer 3 interface in the running config. CSCsc88636.
Workaround: Remove these operators from any dynamic ACLs. CSCts05302
This section lists the resolved caveats in Release 15.0(2)SG8:
Workaround: Enter shut, and then no shut on the port to synchronize the STP state. CSCtf52437
Workaround: Retain the trunk native V LAN as 1. CSCud05521
Workaround: Shorten the dACL name. CSCug78653
Workaround: Return a dACL in the authorization profile with successful guest authentication.
– A fast stream of traffic matches the URL redirect ACL as IPDT clears an address.
– A traffic stream matches the URL redirect ACL and no URL redirect policy is installed for that IP address.
If memory leak occurs repeatedly, IPDT and other control packet processing ultimately ceases.
Workaround: If this behavior completely fills the CPU buffer, the switch must be reloaded. However, the frequency of encountering a stuck queue can be reduced to nearly zero by modifying the URL redirect ACL to permit only 80/443 traffic. CSCug56646
Workaround: Configure RADIUS test and dead criteria.
This issue applies to Cisco IOS Release 15.0(2)SG through 15.0(2)SG7, and 15.1(2)SG through 15.1(2)SG3.
Workaround: Downgrade to Cisco IOS Release 12.2(54)SG. CSCug68370
Workaround: Enter the show platform software interface Gix/xx statistic command.
This section lists the open caveats in Cisco IOS Release 15.0(2)SG7:
Workaround: Reinsert the X2. CSCsk43618
Workaround: If you plan to change a class-map action, such as exceed-action, you meed to remove the class-map with the no class c1 command under policy-map submode. Then, apply the new class-map with the updated changes. CSCsk70826)
Workaround: Enter the show policy-map interface command. CSCsi71036
Workaround: None. However, if you enter the show policy-map name, the unconditional marking actions are displayed. CSCsi94144
Workarounds: Disable IGMP snooping on all the relevant VLANs before disabling it globally.
Workaround: Unconfigure any generic QOS policies from the system. The QoS policies with the match any attribute cause IPv6 entries to become active. If the switch is a pure Layer 2 device, remove the generic protocol family attributes and narrow it to the protocol family.
You only see this symptom if you did not allocate a VLAN before you configure the IFM, then at a later time allocate the same VLAN.
Workaround: Unconfigure, then reconfigure the IFM on the port.
Workarounds: Do one of the following:
– After a reload, copy the startup-config to the running-config.
– Use a loopback interface as the target of the ip unnumbered command
– Change the CLI configuration such that during bootup, the router port is created first.
Workaround: When the port channel starts to flap, enter shut and no shut on the port channel. After the first switchover and after deleting the portchannel, create a new channel. CSCsr00333
This problem impacts X2, OneX converters, and SFP+ on the Supervisor Engine 6-E, and linecards.
Workaround: Remove and reinsert the One X Convertor with SFP+, SFP+ alone, or X2 after some perceivable delay. CSCsu43461
Workaround: For VTP database propagation, configure ISL/dot1q trunk port. CSCsu43445
This applies to classic or E-series Catalyst 4500 supervisor engines running
Cisco IOS Release 12.2(50)SG
If the switch were to run a supervisor switchover while in this state, the host's MAC address would not be present in the new active supervisor engine’s MAC address table, causing possible connectivity interruption on the host.
Workaround: Enter the shutdown command, followed by the no shutdown command on the interface. This triggers relearning and synchronizing of the host's MAC to the standby supervisor engine. CSCsw91661
To observe this issue, the following CLIs are configured with window size as the period for monitoring the errors and a low threshold equal to the number of CRC errored seconds seen/expected.
Workaround: Configure a lower value of low threshold such that the frame errors are seen divided into the expected number of frame errored seconds. CSCsy37181
The queue transmit counters as well as the policing statistics (if any) are correct. CSCsz20149
This only happens when the switch is running network mobility service protocol (nmsp). It does not happen if the phone is CDP enabled.
Workaround: Use VLAN ID or name to differentiate the IP phone and the PC sitting behind the phone on the WCS. Specifically, the IP phone is detected on the voice VLAN, and the displayed information of serial number, model number, and software version is correct. However, a PC sitting behind the phone is detected on a data VLAN, and the displayed device information is wrong and should be ignored. CSCsz34522
Prior to Cisco IOS Release 12.2(53)SG1, 12.2(50)SG6, the switchport block multicast command would block IP Multicast, Layer 2 multicast, and broadcast traffic (CSCta61825).
– Fast UDLD peer switch performs SSO.
– Fast UDLD peer switch is reloaded.
– One or more interfaces on a fast UDLD peer switch are shut down (or the port mode changes from switchport to routed, and vice versa).
Note To reduce the likelihood of this event, connect at least two physical interfaces between fast UDLD peer switches. You must configure the interfaces with the same neighbor fast hello interval.
– Reset the error disabled links with the udld reset command.
– Configure error disable recovery with the commands errdisable recovery cause udld and
errdisable recovery interval value (between 30 and 86400 sec).
– Manually clear errdisable on the local interface with a shutdown then a no shutdown.
Workarounds: The Cisco switch default link-flap detection value is 5 flaps in 10 seconds. Use the default value or larger numbers. CSCtg07677
This issue does not impact functionality.
You must wait for the ACLs to be programmed before performing other TCAM related changes. CSCtd57063
Similarly, the show epm sessions command always displays the authentication method as DOT1X.
Workaround: To view the authentication method used for a client, enter the
show authentication sessions command. CSCsx42157
– The SVI (network) is unreachable. If an SVI exists on the ASW, because of the STP flap in the setup as well as the CISP operations, the SVI MAC configuration on the ASW is incorrect.
Workaround: Configure the ASW or any other switch upstream as the root-bridge for all the VLANs. CSCtg71030
This issue only impacts Catalyst 4948E and Catalyst 4948E-F Ethernet Switches. It does not impact functionality.
Workarounds: Do one of the following:
– Change the interface to a Layer 2 switch port
– Do not configure an ACL access-list on the same Layer 3 interface where sampling monitor is enabled. CSCtn79032
Workaround: Configure both dead-criteria and deadtime.
Workaround: Shutdown the CE-facing interface. Once all the mask-value entries point to the target CE, unshut the CE-facing interface. CSCtl09941
Workaround: Enter shut, then no shut on the ports. CSCtn88228
Workaround: Reduce the number of VLAN mappings. CSCtn56208
Workaround: Configure ip multicast-routing globally and establish ip pim sparse-dense-mode on the CE-facing interface. CSCtl97692
Workaround: Unconfigure and reconfigure the service group. CSCtn88087
This issue only impacts Catalyst 4948E and Catalyst 4948E-F Ethernet Switches.
Workaround: After the switch reloads, enter shut, then no shut on the port-channel interface.
Workaround: Enable a Layer 3 interface in the running config. CSCsc88636.
Workaround: Remove these operators from any dynamic ACLs. CSCts05302
Workaround: Enter shut, and then no shut on the port to synchronize the STP state. CSCtf52437
Workaround: Retain the trunk native V LAN as 1. CSCud05521
Workaround: Shorten the dACL name. CSCug78653
Workaround: Return a dACL in the authorization profile with successful guest authentication.
– A fast stream of traffic matches the URL redirect ACL as IPDT clears an address.
– A traffic stream matches the URL redirect ACL and no URL redirect policy is installed for that IP address.
If memory leak occurs repeatedly, IPDT and other control packet processing ultimately ceases.
Workaround: If this behavior completely fills the CPU buffer, the switch must be reloaded. However, the frequency of encountering a stuck queue can be reduced to nearly zero by modifying the URL redirect ACL to permit only 80/443 traffic. CSCug56646
Workaround: Configure RADIUS test and dead criteria.
This issue applies to Cisco IOS Release 15.0(2)SG through 15.0(2)SG7, and 15.1(2)SG through 15.1(2)SG3.
Workaround: Downgrade to Cisco IOS Release 12.2(54)SG. CSCug68370
Workaround: Enter the show platform software interface Gix/xx statistic command.
This section lists the resolved caveats in Release 15.2(2)SG7:
Workaround: Retain the default setting (VLAN 1) for the native VLAN on trunks ports. CSCud05521
This section lists the open caveats in Cisco IOS Release 15.0(2)SG6:
Workaround: Reinsert the X2. CSCsk43618
Workaround: If you plan to change a class-map action, such as exceed-action, you meed to remove the class-map with the no class c1 command under policy-map submode. Then, apply the new class-map with the updated changes. CSCsk70826)
Workaround: Enter the show policy-map interface command. CSCsi71036
Workaround: None. However, if you enter the show policy-map name, the unconditional marking actions are displayed. CSCsi94144
Workarounds: Disable IGMP snooping on all the relevant VLANs before disabling it globally.
Workaround: Unconfigure any generic QOS policies from the system. The QoS policies with the match any attribute cause IPv6 entries to become active. If the switch is a pure Layer 2 device, remove the generic protocol family attributes and narrow it to the protocol family.
You only see this symptom if you did not allocate a VLAN before you configure the IFM, then at a later time allocate the same VLAN.
Workaround: Unconfigure, then reconfigure the IFM on the port.
Workarounds: Do one of the following:
– After a reload, copy the startup-config to the running-config.
– Use a loopback interface as the target of the ip unnumbered command
– Change the CLI configuration such that during bootup, the router port is created first.
Workaround: When the port channel starts to flap, enter shut and no shut on the port channel. After the first switchover and after deleting the portchannel, create a new channel. CSCsr00333
This problem impacts X2, OneX converters, and SFP+ on the Supervisor Engine 6-E, and linecards.
Workaround: Remove and reinsert the One X Convertor with SFP+, SFP+ alone, or X2 after some perceivable delay. CSCsu43461
Workaround: For VTP database propagation, configure ISL/dot1q trunk port. CSCsu43445
This applies to classic or E-series Catalyst 4500 supervisor engines running
Cisco IOS Release 12.2(50)SG
If the switch were to run a supervisor switchover while in this state, the host's MAC address would not be present in the new active supervisor engine’s MAC address table, causing possible connectivity interruption on the host.
Workaround: Enter the shutdown command, followed by the no shutdown command on the interface. This triggers relearning and synchronizing of the host's MAC to the standby supervisor engine. CSCsw91661
To observe this issue, the following CLIs are configured with window size as the period for monitoring the errors and a low threshold equal to the number of CRC errored seconds seen/expected.
Workaround: Configure a lower value of low threshold such that the frame errors are seen divided into the expected number of frame errored seconds. CSCsy37181
The queue transmit counters as well as the policing statistics (if any) are correct. CSCsz20149
This only happens when the switch is running network mobility service protocol (nmsp). It does not happen if the phone is CDP enabled.
Workaround: Use VLAN ID or name to differentiate the IP phone and the PC sitting behind the phone on the WCS. Specifically, the IP phone is detected on the voice VLAN, and the displayed information of serial number, model number, and software version is correct. However, a PC sitting behind the phone is detected on a data VLAN, and the displayed device information is wrong and should be ignored. CSCsz34522
Prior to Cisco IOS Release 12.2(53)SG1, 12.2(50)SG6, the switchport block multicast command would block IP Multicast, Layer 2 multicast, and broadcast traffic (CSCta61825).
– Fast UDLD peer switch performs SSO.
– Fast UDLD peer switch is reloaded.
– One or more interfaces on a fast UDLD peer switch are shut down (or the port mode changes from switchport to routed, and vice versa).
Note To reduce the likelihood of this event, connect at least two physical interfaces between fast UDLD peer switches. You must configure the interfaces with the same neighbor fast hello interval.
– Reset the error disabled links with the udld reset command.
– Configure error disable recovery with the commands errdisable recovery cause udld and
errdisable recovery interval value (between 30 and 86400 sec).
– Manually clear errdisable on the local interface with a shutdown then a no shutdown.
Workarounds: The Cisco switch default link-flap detection value is 5 flaps in 10 seconds. Use the default value or larger numbers. CSCtg07677
This issue does not impact functionality.
You must wait for the ACLs to be programmed before performing other TCAM related changes. CSCtd57063
Similarly, the show epm sessions command always displays the authentication method as DOT1X.
Workaround: To view the authentication method used for a client, enter the
show authentication sessions command. CSCsx42157
– The SVI (network) is unreachable. If an SVI exists on the ASW, because of the STP flap in the setup as well as the CISP operations, the SVI MAC configuration on the ASW is incorrect.
Workaround: Configure the ASW or any other switch upstream as the root-bridge for all the VLANs. CSCtg71030
This issue only impacts Catalyst 4948E and Catalyst 4948E-F Ethernet Switches. It does not impact functionality.
Workarounds: Do one of the following:
– Change the interface to a Layer 2 switch port
– Do not configure an ACL access-list on the same Layer 3 interface where sampling monitor is enabled. CSCtn79032
Workaround: Configure both dead-criteria and deadtime.
Workaround: Shutdown the CE-facing interface. Once all the mask-value entries point to the target CE, unshut the CE-facing interface. CSCtl09941
Workaround: Enter shut, then no shut on the ports. CSCtn88228
Workaround: Reduce the number of VLAN mappings. CSCtn56208
Workaround: Configure ip multicast-routing globally and establish ip pim sparse-dense-mode on the CE-facing interface. CSCtl97692
Workaround: Unconfigure and reconfigure the service group. CSCtn88087
This issue only impacts Catalyst 4948E and Catalyst 4948E-F Ethernet Switches.
Workaround: After the switch reloads, enter shut, then no shut on the port-channel interface.
Workaround: Enable a Layer 3 interface in the running config. CSCsc88636.
Workaround: Remove these operators from any dynamic ACLs. CSCts05302
Workaround: Retain the default setting (VLAN 1) for the native VLAN on trunks ports. CSCud05521
Workaround: Retain the trunk native V LAN as 1. CSCud05521
Workaround: Shorten the dACL name. CSCug78653
Workaround: Return a dACL in the authorization profile with successful guest authentication.
– A fast stream of traffic matches the URL redirect ACL as IPDT clears an address.
– A traffic stream matches the URL redirect ACL and no URL redirect policy is installed for that IP address.
If memory leak occurs repeatedly, IPDT and other control packet processing ultimately ceases.
Workaround: If this behavior completely fills the CPU buffer, the switch must be reloaded. However, the frequency of encountering a stuck queue can be reduced to nearly zero by modifying the URL redirect ACL to permit only 80/443 traffic. CSCug56646
Workaround: Configure RADIUS test and dead criteria.
This issue applies to Cisco IOS Release 15.0(2)SG through 15.0(2)SG7, and 15.1(2)SG through 15.1(2)SG3.
Workaround: Downgrade to Cisco IOS Release 12.2(54)SG. CSCug68370
Workaround: Enter the show platform software interface Gix/xx statistic command.
Workaround: Enter shut, and then no shut on the port to synchronize the STP state. CSCtf52437
This section lists the resolved caveats in Release 15.2(2)SG6:
Workaround: Reduce MAC aging time or modify Layer 2 topology so that the root is within the square. CSCtx86107
provided the following conditions apply:
– A switchport is configured with the following:
authentication event server dead action authorize
authenticaton event server alive action reinitalize
– The RADIUS server was down previously, and a port without traffic (for example, a hub with no devices attached) was authorized into the inaccessible authentication bypass (IAB) VLAN without an associated MAC address.
The RADIUS server becomes available again, and the IAB-authorized port transitions to another state.
This section lists the open caveats in Cisco IOS Release 15.0(2)SG5:
Workaround: Reinsert the X2. CSCsk43618
Workaround: If you plan to change a class-map action, such as exceed-action, you meed to remove the class-map with the no class c1 command under policy-map submode. Then, apply the new class-map with the updated changes. CSCsk70826)
Workaround: Enter the show policy-map interface command. CSCsi71036
Workaround: None. However, if you enter the show policy-map name, the unconditional marking actions are displayed. CSCsi94144
Workarounds: Disable IGMP snooping on all the relevant VLANs before disabling it globally.
Workaround: Unconfigure any generic QOS policies from the system. The QoS policies with the match any attribute cause IPv6 entries to become active. If the switch is a pure Layer 2 device, remove the generic protocol family attributes and narrow it to the protocol family.
You only see this symptom if you did not allocate a VLAN before you configure the IFM, then at a later time allocate the same VLAN.
Workaround: Unconfigure, then reconfigure the IFM on the port.
Workarounds: Do one of the following:
– After a reload, copy the startup-config to the running-config.
– Use a loopback interface as the target of the ip unnumbered command
– Change the CLI configuration such that during bootup, the router port is created first.
Workaround: When the port channel starts to flap, enter shut and no shut on the port channel. After the first switchover and after deleting the portchannel, create a new channel. CSCsr00333
This problem impacts X2, OneX converters, and SFP+ on the Supervisor Engine 6-E, and linecards.
Workaround: Remove and reinsert the One X Convertor with SFP+, SFP+ alone, or X2 after some perceivable delay. CSCsu43461
Workaround: For VTP database propagation, configure ISL/dot1q trunk port. CSCsu43445
This applies to classic or E-series Catalyst 4500 supervisor engines running
Cisco IOS Release 12.2(50)SG
If the switch were to run a supervisor switchover while in this state, the host's MAC address would not be present in the new active supervisor engine’s MAC address table, causing possible connectivity interruption on the host.
Workaround: Enter the shutdown command, followed by the no shutdown command on the interface. This triggers relearning and synchronizing of the host's MAC to the standby supervisor engine. CSCsw91661
To observe this issue, the following CLIs are configured with window size as the period for monitoring the errors and a low threshold equal to the number of CRC errored seconds seen/expected.
Workaround: Configure a lower value of low threshold such that the frame errors are seen divided into the expected number of frame errored seconds. CSCsy37181
The queue transmit counters as well as the policing statistics (if any) are correct. CSCsz20149
This only happens when the switch is running network mobility service protocol (nmsp). It does not happen if the phone is CDP enabled.
Workaround: Use VLAN ID or name to differentiate the IP phone and the PC sitting behind the phone on the WCS. Specifically, the IP phone is detected on the voice VLAN, and the displayed information of serial number, model number, and software version is correct. However, a PC sitting behind the phone is detected on a data VLAN, and the displayed device information is wrong and should be ignored. CSCsz34522
Prior to Cisco IOS Release 12.2(53)SG1, 12.2(50)SG6, the switchport block multicast command would block IP Multicast, Layer 2 multicast, and broadcast traffic (CSCta61825).
– Fast UDLD peer switch performs SSO.
– Fast UDLD peer switch is reloaded.
– One or more interfaces on a fast UDLD peer switch are shut down (or the port mode changes from switchport to routed, and vice versa).
Note To reduce the likelihood of this event, connect at least two physical interfaces between fast UDLD peer switches. You must configure the interfaces with the same neighbor fast hello interval.
– Reset the error disabled links with the udld reset command.
– Configure error disable recovery with the commands errdisable recovery cause udld and
errdisable recovery interval value (between 30 and 86400 sec).
– Manually clear errdisable on the local interface with a shutdown then a no shutdown.
Workarounds: The Cisco switch default link-flap detection value is 5 flaps in 10 seconds. Use the default value or larger numbers. CSCtg07677
This issue does not impact functionality.
You must wait for the ACLs to be programmed before performing other TCAM related changes. CSCtd57063
Similarly, the show epm sessions command always displays the authentication method as DOT1X.
Workaround: To view the authentication method used for a client, enter the
show authentication sessions command. CSCsx42157
– The SVI (network) is unreachable. If an SVI exists on the ASW, because of the STP flap in the setup as well as the CISP operations, the SVI MAC configuration on the ASW is incorrect.
Workaround: Configure the ASW or any other switch upstream as the root-bridge for all the VLANs. CSCtg71030
This issue only impacts Catalyst 4948E and Catalyst 4948E-F Ethernet Switches. It does not impact functionality.
Workarounds: Do one of the following:
– Change the interface to a Layer 2 switch port
– Do not configure an ACL access-list on the same Layer 3 interface where sampling monitor is enabled. CSCtn79032
Workaround: Configure both dead-criteria and deadtime.
Workaround: Shutdown the CE-facing interface. Once all the mask-value entries point to the target CE, unshut the CE-facing interface. CSCtl09941
Workaround: Enter shut, then no shut on the ports. CSCtn88228
Workaround: Reduce the number of VLAN mappings. CSCtn56208
Workaround: Configure ip multicast-routing globally and establish ip pim sparse-dense-mode on the CE-facing interface. CSCtl97692
Workaround: Unconfigure and reconfigure the service group. CSCtn88087
This issue only impacts Catalyst 4948E and Catalyst 4948E-F Ethernet Switches.
Workaround: After the switch reloads, enter shut, then no shut on the port-channel interface.
Workaround: Enable a Layer 3 interface in the running config. CSCsc88636.
Workaround: Remove these operators from any dynamic ACLs. CSCts05302
Workaround: Retain the default setting (VLAN 1) for the native VLAN on trunks ports. CSCud05521
Workaround: Retain the trunk native V LAN as 1. CSCud05521
Workaround: Shorten the dACL name. CSCug78653
Workaround: Return a dACL in the authorization profile with successful guest authentication.
– A fast stream of traffic matches the URL redirect ACL as IPDT clears an address.
– A traffic stream matches the URL redirect ACL and no URL redirect policy is installed for that IP address.
If memory leak occurs repeatedly, IPDT and other control packet processing ultimately ceases.
Workaround: If this behavior completely fills the CPU buffer, the switch must be reloaded. However, the frequency of encountering a stuck queue can be reduced to nearly zero by modifying the URL redirect ACL to permit only 80/443 traffic. CSCug56646
Workaround: Configure RADIUS test and dead criteria.
This issue applies to Cisco IOS Release 15.0(2)SG through 15.0(2)SG7, and 15.1(2)SG through 15.1(2)SG3.
Workaround: Downgrade to Cisco IOS Release 12.2(54)SG. CSCug68370
Workaround: Enter the show platform software interface Gix/xx statistic command.
Workaround: Enter shut, and then no shut on the port to synchronize the STP state. CSCtf52437
This section lists the resolved caveats in Release 15.2(2)SG5:
Workaround: Enter shut then no shut the port to restore connectivity. CSCtz94862
– Enter shut then no shut on the port. CSCua63562
Workaround: Unconfigure the following from the switch: aaa accounting send stop-record authentication failure. CSCtj69212
This section lists the open caveats in Cisco IOS Release 15.0(2)SG4:
Workaround: Reinsert the X2. CSCsk43618
Workaround: If you plan to change a class-map action, such as exceed-action, you meed to remove the class-map with the no class c1 command under policy-map submode. Then, apply the new class-map with the updated changes. CSCsk70826)
Workaround: Enter the show policy-map interface command. CSCsi71036
Workaround: None. However, if you enter the show policy-map name, the unconditional marking actions are displayed. CSCsi94144
Workarounds: Disable IGMP snooping on all the relevant VLANs before disabling it globally.
Workaround: Unconfigure any generic QOS policies from the system. The QoS policies with the match any attribute cause IPv6 entries to become active. If the switch is a pure Layer 2 device, remove the generic protocol family attributes and narrow it to the protocol family.
You only see this symptom if you did not allocate a VLAN before you configure the IFM, then at a later time allocate the same VLAN.
Workaround: Unconfigure, then reconfigure the IFM on the port.
Workarounds: Do one of the following:
– After a reload, copy the startup-config to the running-config.
– Use a loopback interface as the target of the ip unnumbered command
– Change the CLI configuration such that during bootup, the router port is created first.
Workaround: When the port channel starts to flap, enter shut and no shut on the port channel. After the first switchover and after deleting the portchannel, create a new channel. CSCsr00333
This problem impacts X2, OneX converters, and SFP+ on the Supervisor Engine 6-E, and linecards.
Workaround: Remove and reinsert the One X Convertor with SFP+, SFP+ alone, or X2 after some perceivable delay. CSCsu43461
Workaround: For VTP database propagation, configure ISL/dot1q trunk port. CSCsu43445
This applies to classic or E-series Catalyst 4500 supervisor engines running
Cisco IOS Release 12.2(50)SG
If the switch were to run a supervisor switchover while in this state, the host's MAC address would not be present in the new active supervisor engine’s MAC address table, causing possible connectivity interruption on the host.
Workaround: Enter the shutdown command, followed by the no shutdown command on the interface. This triggers relearning and synchronizing of the host's MAC to the standby supervisor engine. CSCsw91661
To observe this issue, the following CLIs are configured with window size as the period for monitoring the errors and a low threshold equal to the number of CRC errored seconds seen/expected.
Workaround: Configure a lower value of low threshold such that the frame errors are seen divided into the expected number of frame errored seconds. CSCsy37181
The queue transmit counters as well as the policing statistics (if any) are correct. CSCsz20149
This only happens when the switch is running network mobility service protocol (nmsp). It does not happen if the phone is CDP enabled.
Workaround: Use VLAN ID or name to differentiate the IP phone and the PC sitting behind the phone on the WCS. Specifically, the IP phone is detected on the voice VLAN, and the displayed information of serial number, model number, and software version is correct. However, a PC sitting behind the phone is detected on a data VLAN, and the displayed device information is wrong and should be ignored. CSCsz34522
Prior to Cisco IOS Release 12.2(53)SG1, 12.2(50)SG6, the switchport block multicast command would block IP Multicast, Layer 2 multicast, and broadcast traffic (CSCta61825).
– Fast UDLD peer switch performs SSO.
– Fast UDLD peer switch is reloaded.
– One or more interfaces on a fast UDLD peer switch are shut down (or the port mode changes from switchport to routed, and vice versa).
Note To reduce the likelihood of this event, connect at least two physical interfaces between fast UDLD peer switches. You must configure the interfaces with the same neighbor fast hello interval.
– Reset the error disabled links with the udld reset command.
– Configure error disable recovery with the commands errdisable recovery cause udld and
errdisable recovery interval value (between 30 and 86400 sec).
– Manually clear errdisable on the local interface with a shutdown then a no shutdown.
Workarounds: The Cisco switch default link-flap detection value is 5 flaps in 10 seconds. Use the default value or larger numbers. CSCtg07677
This issue does not impact functionality.
You must wait for the ACLs to be programmed before performing other TCAM related changes. CSCtd57063
Similarly, the show epm sessions command always displays the authentication method as DOT1X.
Workaround: To view the authentication method used for a client, enter the
show authentication sessions command. CSCsx42157
– The SVI (network) is unreachable. If an SVI exists on the ASW, because of the STP flap in the setup as well as the CISP operations, the SVI MAC configuration on the ASW is incorrect.
Workaround: Configure the ASW or any other switch upstream as the root-bridge for all the VLANs. CSCtg71030
This issue only impacts Catalyst 4948E and Catalyst 4948E-F Ethernet Switches. It does not impact functionality.
Workarounds: Do one of the following:
– Change the interface to a Layer 2 switch port
– Do not configure an ACL access-list on the same Layer 3 interface where sampling monitor is enabled. CSCtn79032
Workaround: Configure both dead-criteria and deadtime.
Workaround: Shutdown the CE-facing interface. Once all the mask-value entries point to the target CE, unshut the CE-facing interface. CSCtl09941
Workaround: Enter shut, then no shut on the ports. CSCtn88228
Workaround: Reduce the number of VLAN mappings. CSCtn56208
Workaround: Configure ip multicast-routing globally and establish ip pim sparse-dense-mode on the CE-facing interface. CSCtl97692
Workaround: Unconfigure and reconfigure the service group. CSCtn88087
This issue only impacts Catalyst 4948E and Catalyst 4948E-F Ethernet Switches.
Workaround: After the switch reloads, enter shut, then no shut on the port-channel interface.
Workaround: Enable a Layer 3 interface in the running config. CSCsc88636.
Workaround: Remove these operators from any dynamic ACLs. CSCts05302
Workaround: Enter shut then no shut the port to restore connectivity. CSCtz94862
– Enter shut then no shut on the port. CSCua63562
Workaround: Unconfigure the following from the switch: aaa accounting send stop-record authentication failure. CSCtj69212
Workaround: Retain the default setting (VLAN 1) for the native VLAN on trunks ports. CSCud05521
Workaround: Retain the trunk native V LAN as 1. CSCud05521
Workaround: Shorten the dACL name. CSCug78653
Workaround: Return a dACL in the authorization profile with successful guest authentication.
– A fast stream of traffic matches the URL redirect ACL as IPDT clears an address.
– A traffic stream matches the URL redirect ACL and no URL redirect policy is installed for that IP address.
If memory leak occurs repeatedly, IPDT and other control packet processing ultimately ceases.
Workaround: If this behavior completely fills the CPU buffer, the switch must be reloaded. However, the frequency of encountering a stuck queue can be reduced to nearly zero by modifying the URL redirect ACL to permit only 80/443 traffic. CSCug56646
Workaround: Configure RADIUS test and dead criteria.
This issue applies to Cisco IOS Release 15.0(2)SG through 15.0(2)SG7, and 15.1(2)SG through 15.1(2)SG3.
Workaround: Downgrade to Cisco IOS Release 12.2(54)SG. CSCug68370
Workaround: Enter the show platform software interface Gix/xx statistic command.
Workaround: Enter shut, and then no shut on the port to synchronize the STP state. CSCtf52437
This section lists the resolved caveats in Release 15.2(2)SG4:
Workaround: Clear the MAC address. CSCtn24046
Workaround: Do not use the broadcast keyword in the aaa accounting configuration. CSCts56125
The occurs under the following conditions:
– Multi-auth (or multi-host) and MAB dot1x are configured on a port.
– A voice VLAN is not configured on the port.
– The device authenticates through 802.1X.
– The connected device sends no traffic, falls over to MAB, and then successfully authenticates through 802.1X.
– A dynamic VLAN is assigned to the port following 802.1X authorization.
– Enter shut then no shut on the port to halt the high CPU and log messages.
– Enter the switchport voice vlan command on the port. CSCtw73754
This section lists the open caveats in Cisco IOS Release 15.0(2)SG3:
Workaround: Reinsert the X2. CSCsk43618
Workaround: If you plan to change a class-map action, such as exceed-action, you meed to remove the class-map with the no class c1 command under policy-map submode. Then, apply the new class-map with the updated changes. CSCsk70826)
Workaround: Enter the show policy-map interface command. CSCsi71036
Workaround: None. However, if you enter the show policy-map name, the unconditional marking actions are displayed. CSCsi94144
Workarounds: Disable IGMP snooping on all the relevant VLANs before disabling it globally.
Workaround: Unconfigure any generic QOS policies from the system. The QoS policies with the match any attribute cause IPv6 entries to become active. If the switch is a pure Layer 2 device, remove the generic protocol family attributes and narrow it to the protocol family.
You only see this symptom if you did not allocate a VLAN before you configure the IFM, then at a later time allocate the same VLAN.
Workaround: Unconfigure, then reconfigure the IFM on the port.
Workarounds: Do one of the following:
– After a reload, copy the startup-config to the running-config.
– Use a loopback interface as the target of the ip unnumbered command
– Change the CLI configuration such that during bootup, the router port is created first.
Workaround: When the port channel starts to flap, enter shut and no shut on the port channel. After the first switchover and after deleting the portchannel, create a new channel. CSCsr00333
This problem impacts X2, OneX converters, and SFP+ on the Supervisor Engine 6-E, and linecards.
Workaround: Remove and reinsert the One X Convertor with SFP+, SFP+ alone, or X2 after some perceivable delay. CSCsu43461
Workaround: For VTP database propagation, configure ISL/dot1q trunk port. CSCsu43445
This applies to classic or E-series Catalyst 4500 supervisor engines running
Cisco IOS Release 12.2(50)SG
If the switch were to run a supervisor switchover while in this state, the host's MAC address would not be present in the new active supervisor engine’s MAC address table, causing possible connectivity interruption on the host.
Workaround: Enter the shutdown command, followed by the no shutdown command on the interface. This triggers relearning and synchronizing of the host's MAC to the standby supervisor engine. CSCsw91661
To observe this issue, the following CLIs are configured with window size as the period for monitoring the errors and a low threshold equal to the number of CRC errored seconds seen/expected.
Workaround: Configure a lower value of low threshold such that the frame errors are seen divided into the expected number of frame errored seconds. CSCsy37181
The queue transmit counters as well as the policing statistics (if any) are correct. CSCsz20149
This only happens when the switch is running network mobility service protocol (nmsp). It does not happen if the phone is CDP enabled.
Workaround: Use VLAN ID or name to differentiate the IP phone and the PC sitting behind the phone on the WCS. Specifically, the IP phone is detected on the voice VLAN, and the displayed information of serial number, model number, and software version is correct. However, a PC sitting behind the phone is detected on a data VLAN, and the displayed device information is wrong and should be ignored. CSCsz34522
Prior to Cisco IOS Release 12.2(53)SG1, 12.2(50)SG6, the switchport block multicast command would block IP Multicast, Layer 2 multicast, and broadcast traffic (CSCta61825).
– Fast UDLD peer switch performs SSO.
– Fast UDLD peer switch is reloaded.
– One or more interfaces on a fast UDLD peer switch are shut down (or the port mode changes from switchport to routed, and vice versa).
Note To reduce the likelihood of this event, connect at least two physical interfaces between fast UDLD peer switches. You must configure the interfaces with the same neighbor fast hello interval.
– Reset the error disabled links with the udld reset command.
– Configure error disable recovery with the commands errdisable recovery cause udld and
errdisable recovery interval value (between 30 and 86400 sec).
– Manually clear errdisable on the local interface with a shutdown then a no shutdown.
Workarounds: The Cisco switch default link-flap detection value is 5 flaps in 10 seconds. Use the default value or larger numbers. CSCtg07677
This issue does not impact functionality.
You must wait for the ACLs to be programmed before performing other TCAM related changes. CSCtd57063
Similarly, the show epm sessions command always displays the authentication method as DOT1X.
Workaround: To view the authentication method used for a client, enter the
show authentication sessions command. CSCsx42157
– The SVI (network) is unreachable. If an SVI exists on the ASW, because of the STP flap in the setup as well as the CISP operations, the SVI MAC configuration on the ASW is incorrect.
Workaround: Configure the ASW or any other switch upstream as the root-bridge for all the VLANs. CSCtg71030
This issue only impacts Catalyst 4948E and Catalyst 4948E-F Ethernet Switches. It does not impact functionality.
Workarounds: Do one of the following:
– Change the interface to a Layer 2 switch port
– Do not configure an ACL access-list on the same Layer 3 interface where sampling monitor is enabled. CSCtn79032
Workaround: Configure both dead-criteria and deadtime.
Workaround: Shutdown the CE-facing interface. Once all the mask-value entries point to the target CE, unshut the CE-facing interface. CSCtl09941
Workaround: Enter shut, then no shut on the ports. CSCtn88228
Workaround: Clear the MAC address. CSCtn24046
Workaround: Reduce the number of VLAN mappings. CSCtn56208
Workaround: Configure ip multicast-routing globally and establish ip pim sparse-dense-mode on the CE-facing interface. CSCtl97692
Workaround: Unconfigure and reconfigure the service group. CSCtn88087
This issue only impacts Catalyst 4948E and Catalyst 4948E-F Ethernet Switches.
Workaround: After the switch reloads, enter shut, then no shut on the port-channel interface.
Workaround: Enable a Layer 3 interface in the running config. CSCsc88636.
Workaround: Remove these operators from any dynamic ACLs. CSCts05302
Workaround: Do not use the broadcast keyword in the aaa accounting configuration. CSCts56125
The occurs under the following conditions:
– Multi-auth (or multi-host) and MAB dot1x are configured on a port.
– A voice VLAN is not configured on the port.
– The device authenticates through 802.1X.
– The connected device sends no traffic, falls over to MAB, and then successfully authenticates through 802.1X.
– A dynamic VLAN is assigned to the port following 802.1X authorization.
– Enter shut then no shut on the port to halt the high CPU and log messages.
– Enter the switchport voice vlan command on the port. CSCtw73754
Workaround: Unconfigure the following from the switch: aaa accounting send stop-record authentication failure. CSCtj69212
Workaround: Retain the default setting (VLAN 1) for the native VLAN on trunks ports. CSCud05521
Workaround: Retain the trunk native V LAN as 1. CSCud05521
Workaround: Shorten the dACL name. CSCug78653
Workaround: Return a dACL in the authorization profile with successful guest authentication.
– A fast stream of traffic matches the URL redirect ACL as IPDT clears an address.
– A traffic stream matches the URL redirect ACL and no URL redirect policy is installed for that IP address.
If memory leak occurs repeatedly, IPDT and other control packet processing ultimately ceases.
Workaround: If this behavior completely fills the CPU buffer, the switch must be reloaded. However, the frequency of encountering a stuck queue can be reduced to nearly zero by modifying the URL redirect ACL to permit only 80/443 traffic. CSCug56646
Workaround: Configure RADIUS test and dead criteria.
This issue applies to Cisco IOS Release 15.0(2)SG through 15.0(2)SG7, and 15.1(2)SG through 15.1(2)SG3.
Workaround: Downgrade to Cisco IOS Release 12.2(54)SG. CSCug68370
Workaround: Enter the show platform software interface Gix/xx statistic command.
Workaround: Enter shut, and then no shut on the port to synchronize the STP state. CSCtf52437
This section lists the resolved caveats in Release 15.2(2)SG3:
Only WS-C4900M uplink ports (Te1/1-8), WS-X45-SUP6L-E uplink ports, and WS-X4904-10GE are affected.
Workaround: Use a non-affected module for REP ports such as WS-X4908-10GE. CSCtr76579
Cisco has released free software updates that address this vulnerability. Workarounds that mitigate this vulnerability are available. This advisory is available at the following link:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120328-msdp
Note The March 28, 2012, Cisco IOS Software Security Advisory bundled publication includes nine Cisco Security Advisories. Each advisory lists the Cisco IOS Software releases that correct the vulnerability or vulnerabilities detailed in the advisory as well as the Cisco IOS Software releases that correct all vulnerabilities in the March 2012 bundled publication.
Individual publication links are in ''Cisco Event Response: Semiannual Cisco IOS Software Security Advisory Bundled Publication'' at the following link:
http://www.cisco.com/web/about/security/intelligence/Cisco_ERP_mar12.html
Products that are not running Cisco IOS Software are not vulnerable.
Cisco has released free software updates that address these vulnerabilities.
The HTTP server may be disabled as a workaround for the vulnerability described in this advisory.
This advisory is available at the following link:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120328-pai
This section lists the open caveats in Cisco IOS Release 15.0(2)SG2:
Workaround: Reinsert the X2. CSCsk43618
Workaround: If you plan to change a class-map action, such as exceed-action, you meed to remove the class-map with the no class c1 command under policy-map submode. Then, apply the new class-map with the updated changes. CSCsk70826)
Workaround: Enter the show policy-map interface command. CSCsi71036
Workaround: None. However, if you enter the show policy-map name, the unconditional marking actions are displayed. CSCsi94144
Workarounds: Disable IGMP snooping on all the relevant VLANs before disabling it globally.
Workaround: Unconfigure any generic QOS policies from the system. The QoS policies with the match any attribute cause IPv6 entries to become active. If the switch is a pure Layer 2 device, remove the generic protocol family attributes and narrow it to the protocol family.
You only see this symptom if you did not allocate a VLAN before you configure the IFM, then at a later time allocate the same VLAN.
Workaround: Unconfigure, then reconfigure the IFM on the port.
Workarounds: Do one of the following:
– After a reload, copy the startup-config to the running-config.
– Use a loopback interface as the target of the ip unnumbered command
– Change the CLI configuration such that during bootup, the router port is created first.
Workaround: When the port channel starts to flap, enter shut and no shut on the port channel. After the first switchover and after deleting the portchannel, create a new channel. CSCsr00333
This problem impacts X2, OneX converters, and SFP+ on the Supervisor Engine 6-E, and linecards.
Workaround: Remove and reinsert the One X Convertor with SFP+, SFP+ alone, or X2 after some perceivable delay. CSCsu43461
Workaround: For VTP database propagation, configure ISL/dot1q trunk port. CSCsu43445
This applies to classic or E-series Catalyst 4500 supervisor engines running
Cisco IOS Release 12.2(50)SG
If the switch were to run a supervisor switchover while in this state, the host's MAC address would not be present in the new active supervisor engine’s MAC address table, causing possible connectivity interruption on the host.
Workaround: Enter the shutdown command, followed by the no shutdown command on the interface. This triggers relearning and synchronizing of the host's MAC to the standby supervisor engine. CSCsw91661
To observe this issue, the following CLIs are configured with window size as the period for monitoring the errors and a low threshold equal to the number of CRC errored seconds seen/expected.
Workaround: Configure a lower value of low threshold such that the frame errors are seen divided into the expected number of frame errored seconds. CSCsy37181
The queue transmit counters as well as the policing statistics (if any) are correct. CSCsz20149
This only happens when the switch is running network mobility service protocol (nmsp). It does not happen if the phone is CDP enabled.
Workaround: Use VLAN ID or name to differentiate the IP phone and the PC sitting behind the phone on the WCS. Specifically, the IP phone is detected on the voice VLAN, and the displayed information of serial number, model number, and software version is correct. However, a PC sitting behind the phone is detected on a data VLAN, and the displayed device information is wrong and should be ignored. CSCsz34522
Prior to Cisco IOS Release 12.2(53)SG1, 12.2(50)SG6, the switchport block multicast command would block IP Multicast, Layer 2 multicast, and broadcast traffic (CSCta61825).
– Fast UDLD peer switch performs SSO.
– Fast UDLD peer switch is reloaded.
– One or more interfaces on a fast UDLD peer switch are shut down (or the port mode changes from switchport to routed, and vice versa).
Note To reduce the likelihood of this event, connect at least two physical interfaces between fast UDLD peer switches. You must configure the interfaces with the same neighbor fast hello interval.
– Reset the error disabled links with the udld reset command.
– Configure error disable recovery with the commands errdisable recovery cause udld and
errdisable recovery interval value (between 30 and 86400 sec).
– Manually clear errdisable on the local interface with a shutdown then a no shutdown.
Workarounds: The Cisco switch default link-flap detection value is 5 flaps in 10 seconds. Use the default value or larger numbers. CSCtg07677
This issue does not impact functionality.
You must wait for the ACLs to be programmed before performing other TCAM related changes. CSCtd57063
Similarly, the show epm sessions command always displays the authentication method as DOT1X.
Workaround: To view the authentication method used for a client, enter the
show authentication sessions command. CSCsx42157
– The SVI (network) is unreachable. If an SVI exists on the ASW, because of the STP flap in the setup as well as the CISP operations, the SVI MAC configuration on the ASW is incorrect.
Workaround: Configure the ASW or any other switch upstream as the root-bridge for all the VLANs. CSCtg71030
This issue only impacts Catalyst 4948E and Catalyst 4948E-F Ethernet Switches. It does not impact functionality.
Workarounds: Do one of the following:
– Change the interface to a Layer 2 switch port
– Do not configure an ACL access-list on the same Layer 3 interface where sampling monitor is enabled. CSCtn79032
Workaround: Configure both dead-criteria and deadtime.
Workaround: Shutdown the CE-facing interface. Once all the mask-value entries point to the target CE, unshut the CE-facing interface. CSCtl09941
Workaround: Enter shut, then no shut on the ports. CSCtn88228
Workaround: Clear the MAC address. CSCtn24046
Workaround: Reduce the number of VLAN mappings. CSCtn56208
Workaround: Configure ip multicast-routing globally and establish ip pim sparse-dense-mode on the CE-facing interface. CSCtl97692
Workaround: Unconfigure and reconfigure the service group. CSCtn88087
This issue only impacts Catalyst 4948E and Catalyst 4948E-F Ethernet Switches.
Workaround: After the switch reloads, enter shut, then no shut on the port-channel interface.
Workaround: Enable a Layer 3 interface in the running config. CSCsc88636.
Workaround: Remove these operators from any dynamic ACLs. CSCts05302
Only WS-C4900M uplink ports (Te1/1-8), WS-X45-SUP6L-E uplink ports, and WS-X4904-10GE are affected.
Workaround: Use a non-affected module for REP ports such as WS-X4908-10GE. CSCtr76579
Workaround: Do not use the broadcast keyword in the aaa accounting configuration. CSCts56125
The occurs under the following conditions:
– Multi-auth (or multi-host) and MAB dot1x are configured on a port.
– A voice VLAN is not configured on the port.
– The device authenticates through 802.1X.
– The connected device sends no traffic, falls over to MAB, and then successfully authenticates through 802.1X.
– A dynamic VLAN is assigned to the port following 802.1X authorization.
– Enter shut then no shut on the port to halt the high CPU and log messages.
– Enter the switchport voice vlan command on the port. CSCtw73754
Workaround: Unconfigure the following from the switch: aaa accounting send stop-record authentication failure. CSCtj69212
Workaround: Retain the default setting (VLAN 1) for the native VLAN on trunks ports. CSCud05521
Workaround: Retain the trunk native V LAN as 1. CSCud05521
Workaround: Shorten the dACL name. CSCug78653
Workaround: Return a dACL in the authorization profile with successful guest authentication.
– A fast stream of traffic matches the URL redirect ACL as IPDT clears an address.
– A traffic stream matches the URL redirect ACL and no URL redirect policy is installed for that IP address.
If memory leak occurs repeatedly, IPDT and other control packet processing ultimately ceases.
Workaround: If this behavior completely fills the CPU buffer, the switch must be reloaded. However, the frequency of encountering a stuck queue can be reduced to nearly zero by modifying the URL redirect ACL to permit only 80/443 traffic. CSCug56646
Workaround: Configure RADIUS test and dead criteria.
This issue applies to Cisco IOS Release 15.0(2)SG through 15.0(2)SG7, and 15.1(2)SG through 15.1(2)SG3.
Workaround: Downgrade to Cisco IOS Release 12.2(54)SG. CSCug68370
Workaround: Enter the show platform software interface Gix/xx statistic command.
Workaround: Enter shut, and then no shut on the port to synchronize the STP state. CSCtf52437
This section lists the resolved caveats in Release 15.2(2)SG2:
The primary flex link interface comes up correctly.
Workaround: Configure static MAC address for the MAC address that must be learned dynamically on the backup flex link interface. CSCtr40070
1. Delete, then add the affected VLAN with no vlan vlan_ID, then lan vlan_ID.
2. Flap the impacted port-channel with shutdown, then no shutdown. CSCtr17251
– Configure the switch port for mab rather than mab eap.
– Configure the AAA server to propose EAP-MD5 first rather than EAP-TLS for MAB EAP requests. CSCti78674
Workaround: Re-enter the rep preempt segment command. CSCtr89862
Cisco has released free software updates that address this vulnerability. Workarounds that mitigate this vulnerability are available. This advisory is available at the following link:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120328-msdp
Note The March 28, 2012, Cisco IOS Software Security Advisory bundled publication includes nine Cisco Security Advisories. Each advisory lists the Cisco IOS Software releases that correct the vulnerability or vulnerabilities detailed in the advisory as well as the Cisco IOS Software releases that correct all vulnerabilities in the March 2012 bundled publication.
Individual publication links are in ''Cisco Event Response: Semiannual Cisco IOS Software Security Advisory Bundled Publication'' at the following link:
http://www.cisco.com/web/about/security/intelligence/Cisco_ERP_mar12.html
Products that are not running Cisco IOS Software are not vulnerable.
Cisco has released free software updates that address these vulnerabilities.
The HTTP server may be disabled as a workaround for the vulnerability described in this advisory.
This advisory is available at the following link:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120328-pai
This section lists the open caveats in Cisco IOS Release 15.0(2)SG1:
Workaround: Reinsert the X2. CSCsk43618
Workaround: If you plan to change a class-map action, such as exceed-action, you meed to remove the class-map with the no class c1 command under policy-map submode. Then, apply the new class-map with the updated changes. CSCsk70826)
Workaround: Enter the show policy-map interface command. CSCsi71036
Workaround: None. However, if you enter the show policy-map name, the unconditional marking actions are displayed. CSCsi94144
Workarounds: Disable IGMP snooping on all the relevant VLANs before disabling it globally.
Workaround: Unconfigure any generic QOS policies from the system. The QoS policies with the match any attribute cause IPv6 entries to become active. If the switch is a pure Layer 2 device, remove the generic protocol family attributes and narrow it to the protocol family. CSCsq84796
You only see this symptom if you did not allocate a VLAN before you configure the IFM, then at a later time allocate the same VLAN.
Workaround: Unconfigure, then reconfigure the IFM on the port.
Workarounds: Do one of the following:
– After a reload, copy the startup-config to the running-config.
– Use a loopback interface as the target of the ip unnumbered command
– Change the CLI configuration such that during bootup, the router port is created first.
Workaround: When the port channel starts to flap, enter shut and no shut on the port channel. After the first switchover and after deleting the portchannel, create a new channel. CSCsr00333
This problem impacts X2, OneX converters, and SFP+ on the Supervisor Engine 6-E, and linecards.
Workaround: Remove and reinsert the One X Convertor with SFP+, SFP+ alone, or X2 after some perceivable delay. CSCsu43461
Workaround: For VTP database propagation, configure ISL/dot1q trunk port. CSCsu43445
This applies to classic or E-series Catalyst 4500 supervisor engines running
Cisco IOS Release 12.2(50)SG
If the switch were to run a supervisor switchover while in this state, the host's MAC address would not be present in the new active supervisor engine’s MAC address table, causing possible connectivity interruption on the host.
Workaround: Enter the shutdown command, followed by the no shutdown command on the interface. This triggers relearning and synchronizing of the host's MAC to the standby supervisor engine. CSCsw91661
To observe this issue, the following CLIs are configured with window size as the period for monitoring the errors and a low threshold equal to the number of CRC errored seconds seen/expected.
Workaround: Configure a lower value of low threshold such that the frame errors are seen divided into the expected number of frame errored seconds. CSCsy37181
The queue transmit counters as well as the policing statistics (if any) are correct. CSCsz20149
This only happens when the switch is running network mobility service protocol (nmsp). It does not happen if the phone is CDP enabled.
Workaround: Use VLAN ID or name to differentiate the IP phone and the PC sitting behind the phone on the WCS. Specifically, the IP phone is detected on the voice VLAN, and the displayed information of serial number, model number, and software version is correct. However, a PC sitting behind the phone is detected on a data VLAN, and the displayed device information is wrong and should be ignored. CSCsz34522
Prior to Cisco IOS Release 12.2(53)SG1, 12.2(50)SG6, the switchport block multicast command would block IP Multicast, Layer 2 multicast, and broadcast traffic (CSCta61825).
– Fast UDLD peer switch performs SSO.
– Fast UDLD peer switch is reloaded.
– One or more interfaces on a fast UDLD peer switch are shut down (or the port mode changes from switchport to routed, and vice versa).
Note To reduce the likelihood of this event, connect at least two physical interfaces between fast UDLD peer switches. You must configure the interfaces with the same neighbor fast hello interval.
– Reset the error disabled links with the udld reset command.
– Configure error disable recovery with the commands errdisable recovery cause udld and
errdisable recovery interval value (between 30 and 86400 sec).
– Manually clear errdisable on the local interface with a shutdown then a no shutdown.
Workarounds: The Cisco switch default link-flap detection value is 5 flaps in 10 seconds. Use the default value or larger numbers. CSCtg07677
This issue does not impact functionality.
You must wait for the ACLs to be programmed before performing other TCAM related changes. CSCtd57063
Similarly, the show epm sessions command always displays the authentication method as DOT1X.
Workaround: To view the authentication method used for a client, enter the show authentication sessions command. CSCsx42157
– The SVI (network) is unreachable. If an SVI exists on the ASW, because of the STP flap in the setup as well as the CISP operations, the SVI MAC configuration on the ASW is incorrect.
Workaround: Configure the ASW or any other switch upstream as the root-bridge for all the VLANs. CSCtg71030
This issue only impacts Catalyst 4948E and Catalyst 4948E-F Ethernet Switches. It does not impact functionality.
Workarounds: Do one of the following:
– Change the interface to a Layer 2 switch port
– Do not configure an ACL access-list on the same Layer 3 interface where sampling monitor is enabled. CSCtn79032
Workaround: Configure both dead-criteria and deadtime.
Workaround: Shutdown the CE-facing interface. Once all the mask-value entries point to the target CE, unshut the CE-facing interface. CSCtl09941
Workaround: Enter shut, then no shut on the ports. CSCtn88228
Workaround: Clear the MAC address. CSCtn24046
Workaround: Reduce the number of VLAN mappings. CSCtn56208
Workaround: Configure ip multicast-routing globally and establish ip pim sparse-dense-mode on the CE-facing interface. CSCtl97692
Workaround: Unconfigure and reconfigure the service group. CSCtn88087
This issue only impacts Catalyst 4948E and Catalyst 4948E-F Ethernet Switches.
Workaround: After the switch reloads, enter shut, then no shut on the port-channel interface.
Workaround: Enable a Layer 3 interface in the running config. CSCsc88636.
The primary flex link interface comes up correctly.
Workaround: Configure static MAC address for the MAC address that must be learned dynamically on the backup flex link interface. (CSCtr40070)
Workaround: Remove these operators from any dynamic ACLs. (CSCts05302)
1. Delete, then add the affected VLAN with no vlan vlan_ID, then lan vlan_ID.
2. Flap the impacted port-channel with shutdown, then no shutdown. CSCtr17251
– Configure the switch port for mab rather than mab eap.
– Configure the AAA server to propose EAP-MD5 first rather than EAP-TLS for MAB EAP requests. CSCti78674
Workaround: Re-enter the rep preempt segment command. CSCtr89862
Only WS-C4900M uplink ports (Te1/1-8), WS-X45-SUP6L-E uplink ports, and WS-X4904-10GE are affected.
Workaround: Use a non-affected module for REP ports such as WS-X4908-10GE. CSCtr76579
Workaround: Do not use the broadcast keyword in the aaa accounting configuration. CSCts56125
The occurs under the following conditions:
– Multi-auth (or multi-host) and MAB dot1x are configured on a port.
– A voice VLAN is not configured on the port.
– The device authenticates through 802.1X.
– The connected device sends no traffic, falls over to MAB, and then successfully authenticates through 802.1X.
– A dynamic VLAN is assigned to the port following 802.1X authorization.
– Enter shut then no shut on the port to halt the high CPU and log messages.
– Enter the switchport voice vlan command on the port. CSCtw73754
Workaround: Unconfigure the following from the switch: aaa accounting send stop-record authentication failure. CSCtj69212
Workaround: Retain the default setting (VLAN 1) for the native VLAN on trunks ports. CSCud05521
Workaround: Retain the trunk native V LAN as 1. CSCud05521
Workaround: Shorten the dACL name. CSCug78653
Workaround: Return a dACL in the authorization profile with successful guest authentication.
– A fast stream of traffic matches the URL redirect ACL as IPDT clears an address.
– A traffic stream matches the URL redirect ACL and no URL redirect policy is installed for that IP address.
If memory leak occurs repeatedly, IPDT and other control packet processing ultimately ceases.
Workaround: If this behavior completely fills the CPU buffer, the switch must be reloaded. However, the frequency of encountering a stuck queue can be reduced to nearly zero by modifying the URL redirect ACL to permit only 80/443 traffic. CSCug56646
Workaround: Configure RADIUS test and dead criteria.
This issue applies to Cisco IOS Release 15.0(2)SG through 15.0(2)SG7, and 15.1(2)SG through 15.1(2)SG3.
Workaround: Downgrade to Cisco IOS Release 12.2(54)SG. CSCug68370
Workaround: Enter the show platform software interface Gix/xx statistic command.
Workaround: Enter shut, and then no shut on the port to synchronize the STP state. CSCtf52437
This section lists the resolved caveats in Release 15.2(2)SG1:
– Force the supplicant to use multicast EAPOL.
– Do not use authentication open mode. CSCtq33048
Workaround: Configure an ACL on the port. CSCte18760
Workaround: Configure a port ACL on the interface. CSCtl89389
Workaround: Do not configure open directive on the switch. CSCto48824
Workaround: Disable gratuitous ARP on the Windows device. CSCtn27420
In the output above, sequence 40 is the unexpected command that appears in front of the entry.
Workaround: Delete the access-list and reconfigure all entries, rather than deleting or reconfiguring the access-list. CSCtn83348
Workaround: Enter the interface range command to configure all member ports to use a new port channel that is created automatically. CSCtn52362
Workaround: Enter shut then no shut on the member port. CSCtn52404
Workaround: Add the following permit ACEs to the ACL:
Workaround: None. Use a different IGMP group address. (CSCtq15982)
Workaround: Remove the logging filter. (CSCto76709)
Workaround: Cut and paste the configuration. Then apply rapidly to PVLAN isolated trunk port. (CSCtq04058)
Workaround: None. (CSCtn77500)
Workaround: None. (CSCtg60011)
Workaround: Modify filter ID or fallback ACLs only when they are not in use. CSCto79274
This section lists the open caveats in Cisco IOS Release 15.0(2)SG:
Workaround: Reinsert the X2. CSCsk43618
Workaround: If you plan to change a class-map action, such as exceed-action, you meed to remove the class-map with the no class c1 command under policy-map submode. Then, apply the new class-map with the updated changes. CSCsk70826
Workaround: Enter the show policy-map interface command. CSCsi71036
Workaround: None. However, if you enter the show policy-map name, the unconditional marking actions are displayed. CSCsi94144
Workarounds: Disable IGMP snooping on all the relevant VLANs before disabling it globally.
Workaround: Unconfigure any generic QOS policies from the system. The QoS policies with the match any attribute cause IPv6 entries to become active. If the switch is a pure Layer 2 device, remove the generic protocol family attributes and narrow it to the protocol family. CSCsq84796
You only see this symptom if you did not allocate a VLAN before you configure the IFM, then at a later time allocate the same VLAN.
Workaround: Unconfigure, then reconfigure the IFM on the port.
Workarounds: Do one of the following:
– After a reload, copy the startup-config to the running-config.
– Use a loopback interface as the target of the ip unnumbered command
– Change the CLI configuration such that during bootup, the router port is created first.
Workaround: When the port channel starts to flap, enter shut and no shut on the port channel. After the first switchover and after deleting the portchannel, create a new channel. CSCsr00333
This problem impacts X2, OneX converters, and SFP+ on the Supervisor Engine 6-E, and linecards.
Workaround: Remove and reinsert the One X Convertor with SFP+, SFP+ alone, or X2 after some perceivable delay. CSCsu43461
Workaround: For VTP database propagation, configure ISL/dot1q trunk port. CSCsu43445
This applies to classic or E-series Catalyst 4500 supervisor engines running
Cisco IOS Release 12.2(50)SG
If the switch were to run a supervisor switchover while in this state, the host's MAC address would not be present in the new active supervisor engine’s MAC address table, causing possible connectivity interruption on the host.
Workaround: Enter the shutdown command, followed by the no shutdown command on the interface. This triggers relearning and synchronizing of the host's MAC to the standby supervisor engine. CSCsw91661
To observe this issue, the following CLIs are configured with window size as the period for monitoring the errors and a low threshold equal to the number of CRC errored seconds seen/expected.
Workaround: Configure a lower value of low threshold such that the frame errors are seen divided into the expected number of frame errored seconds. CSCsy37181
The queue transmit counters as well as the policing statistics (if any) are correct. CSCsz20149
This only happens when the switch is running network mobility service protocol (nmsp). It does not happen if the phone is CDP enabled.
Workaround: Use VLAN ID or name to differentiate the IP phone and the PC sitting behind the phone on the WCS. Specifically, the IP phone is detected on the voice VLAN, and the displayed information of serial number, model number, and software version is correct. However, a PC sitting behind the phone is detected on a data VLAN, and the displayed device information is wrong and should be ignored. CSCsz34522
Prior to Cisco IOS Release 12.2(53)SG1, 12.2(50)SG6, the switchport block multicast command would block IP Multicast, Layer 2 multicast, and broadcast traffic (CSCta61825).
– Fast UDLD peer switch performs SSO.
– Fast UDLD peer switch is reloaded.
– One or more interfaces on a fast UDLD peer switch are shut down (or the port mode changes from switchport to routed, and vice versa).
Note To reduce the likelihood of this event, connect at least two physical interfaces between fast UDLD peer switches. You must configure the interfaces with the same neighbor fast hello interval.
– Reset the error disabled links with the udld reset command.
– Configure error disable recovery with the commands errdisable recovery cause udld and
errdisable recovery interval value (between 30 and 86400 sec).
– Manually clear errdisable on the local interface with a shutdown then a no shutdown.
Workarounds: The Cisco switch default link-flap detection value is 5 flaps in 10 seconds. Use the default value or larger numbers. CSCtg07677
This issue does not impact functionality.
You must wait for the ACLs to be programmed before performing other TCAM related changes. CSCtd57063
Workaround: Add the following permit ACEs to the ACL:
Similarly, the show epm sessions command always displays the authentication method as DOT1X.
Workaround: To view the authentication method used for a client, enter the
show authentication sessions command. CSCsx42157
Workaround: Configure an ACL on the port. CSCte18760
– The SVI (network) is unreachable. If an SVI exists on the ASW, because of the STP flap in the setup as well as the CISP operations, the SVI MAC configuration on the ASW is incorrect.
Workaround: Configure the ASW or any other switch upstream as the root-bridge for all the VLANs. CSCtg71030
This issue only impacts Catalyst 4948E and Catalyst 4948E-F Ethernet Switches. It does not impact functionality.
Workarounds: Do one of the following:
– Change the interface to a Layer 2 switch port
– Do not configure an ACL access-list on the same Layer 3 interface where sampling monitor is enabled. CSCtn79032
Workaround: Configure both dead-criteria and deadtime.
Workaround: Shutdown the CE-facing interface. Once all the mask-value entries point to the target CE, unshut the CE-facing interface. CSCtl09941
Workaround: Configure a port ACL on the interface. CSCtl89389
Workaround: Enter shut, then no shut on the ports. CSCtn88228
Workaround: Clear the MAC address. CSCtn24046
Workaround: Shut the member port. CSCtn49832
Workaround: Enter the interface range command to configure all member ports to use a new port channel that is created automatically. CSCtn52362
Workaround: Enter shut then no shut on the member port. CSCtn52404
Workaround: Reduce the number of VLAN mappings. CSCtn56208
Workaround: Configure ip multicast-routing globally and establish ip pim sparse-dense-mode on the CE-facing interface. CSCtl97692
Workaround: Disable gratuitous ARP on the Windows device. CSCtn27420
In the output above, sequence 40 is the unexpected command that appears in front of the entry.
Workaround: Delete the access-list and reconfigure all entries, rather than deleting or reconfiguring the access-list. CSCtn83348
Workaround: Unconfigure and reconfigure the service group. CSCtn88087
This issue only impacts Catalyst 4948E and Catalyst 4948E-F Ethernet Switches.
Workaround: After the switch reloads, enter shut, then no shut on the port-channel interface.
Workaround: Do not configure open directive on the switch. CSCto48824
Workaround: Enable a Layer 3 interface in the running config. CSCsc88636.
Workaround: Modify filter ID or fallback ACLs only when they are not in use. CSCto79274
The primary flex link interface comes up correctly.
Workaround: Configure static MAC address for the MAC address that must be learned dynamically on the backup flex link interface. (CSCtr40070)
Workaround: None. (CSCtr52740)
1. Delete, then add the affected VLAN with no vlan vlan_ID, then lan vlan_ID.
2. Flap the impacted port-channel with shutdown, then no shutdown. CSCtr17251
– Configure the switch port for mab rather than mab eap.
– Configure the AAA server to propose EAP-MD5 first rather than EAP-TLS for MAB EAP requests. CSCti78674
Workaround: Re-enter the rep preempt segment command. CSCtr89862
Only WS-C4900M uplink ports (Te1/1-8), WS-X45-SUP6L-E uplink ports, and WS-X4904-10GE are affected.
Workaround: Use a non-affected module for REP ports such as WS-X4908-10GE. CSCtr76579
Workaround: Do not use the broadcast keyword in the aaa accounting configuration. CSCts56125
The occurs under the following conditions:
– Multi-auth (or multi-host) and MAB dot1x are configured on a port.
– A voice VLAN is not configured on the port.
– The device authenticates through 802.1X.
– The connected device sends no traffic, falls over to MAB, and then successfully authenticates through 802.1X.
– A dynamic VLAN is assigned to the port following 802.1X authorization.
– Enter shut then no shut on the port to halt the high CPU and log messages.
– Enter the switchport voice vlan command on the port. CSCtw73754
Workaround: Unconfigure the following from the switch: aaa accounting send stop-record authentication failure. CSCtj69212
Workaround: Retain the default setting (VLAN 1) for the native VLAN on trunks ports. CSCud05521
Workaround: Retain the trunk native V LAN as 1. CSCud05521
Workaround: Shorten the dACL name. CSCug78653
Workaround: Return a dACL in the authorization profile with successful guest authentication.
– A fast stream of traffic matches the URL redirect ACL as IPDT clears an address.
– A traffic stream matches the URL redirect ACL and no URL redirect policy is installed for that IP address.
If memory leak occurs repeatedly, IPDT and other control packet processing ultimately ceases.
Workaround: If this behavior completely fills the CPU buffer, the switch must be reloaded. However, the frequency of encountering a stuck queue can be reduced to nearly zero by modifying the URL redirect ACL to permit only 80/443 traffic. CSCug56646
Workaround: Configure RADIUS test and dead criteria.
This issue applies to Cisco IOS Release 15.0(2)SG through 15.0(2)SG7, and 15.1(2)SG through 15.1(2)SG3.
Workaround: Downgrade to Cisco IOS Release 12.2(54)SG. CSCug68370
Workaround: Enter the show platform software interface Gix/xx statistic command.
Workaround: Enter shut, and then no shut on the port to synchronize the STP state. CSCtf52437
This section lists the resolved caveats in Release 15.2(2)SG:
Workaround: Reconfigure VLAN load balancing with a different configuration, by performing the following task:
a. Reconfigure the VLAN load balancing configuration on the desired REP ports.
b. Use the shut command on any one REP port in the segment to cause a failure in that segment.
c. Use the no-shut on the same port to restore normal REP topology with one ALT port.
d. Invoke manual pre-emption on a primary edge port to obtain VLAN load balancing with the new configuration. CSCsv69853
Workaround: When a log message appears indicating that the SFP+ has been removed, do one of the following:
– Enter any commands for that port.
– Insert an SFP+ in that port.
– Reinsert the removed SFP+ in another port. CSCsv90044
Workaround: Do shut, then no shut on the SVI. CSCtg72559
Workaround: Disable the ip cef accounting non-recursive command. CSCtn68186
Workaround: Use tablemap-based marking. CSC99836
Workaround: Enter shut then no shut on the alternate port. CSCtn26322
– Create the VLANs manually. CSCtl94096
Workaround: Enter shut, then no shut on the alternate interface. CSCtn03533
Workaround: Use the default native VLAN (VLAN of 1) for the trunks. CSCtn29321
This behavior is not observed on 10 Gigabit Ethernet SFP+ uplink interfaces.
These sections provide troubleshooting guidelines for the Catalyst 4900M series switch running IOS supervisor engines:
Netbooting using a boot loader image is not supported. Instead, use one of the following options to boot an image:
1. Boot from a CompactFlash card by entering the following command:
Note The Catalyst 4948E does not contain a compact flash slot.
The ROMMON TFTP boot is very similar to the BOOTLDR TFTP boot, except that:
– the BOOTLDR variable should not be set
– the TFTP server must be accessible from the Ethernet management port on the supervisor engine.
To boot from ROMMON, perform the following tasks while in ROMMON mode:
a. Ensure that the Ethernet management port is physically connected to the network.
b. Verify that bootloader environment is not set by entering the unset bootldr command.
c. Set IP address of the Ethernet management port on the supervisor engine by entering the following command: set interface fa1 ip_address > < ip_mask
For example, to set the supervisor engine Ethernet port with an IP address 172.16.1.5 and IP mask 255.255.255.0, enter the following command:
d. Set default gateway for the Ethernet management port on the supervisor engine by entering the following command: set ip route default gateway_ip_address. The default gateway should be directly connected to the supervisor engine Ethernet management port subnet.
e. Ping the TFTP server to ensure that there is connectivity to the server from the Ethernet management port on the supervisor engine by entering the following command: ping < tftp_server_ip_address >.
f. Once the ping is successful, boot the image from the TFTP server by entering the following command: boot tftp:// tftp_server_ip_address > / < image_path_and_file_name
For example, to boot the image name cat4500-ipbase-mz located on the TFTP server 172.16.1.8, enter the following command:
This section contains troubleshooting guidelines for system-level problems:
This section contains troubleshooting guidelines for the Catalyst 4900M series switch:
For general information on MIBs, RMON groups, and traps, refer to the Cisco public MIB directory ( http://www.cisco.com/public/sw-center/netmgmt/cmtk/mibs.shtml). For information on the specific MIBs supported by the Catalyst 4900M series switches, refer to the Catalyst 4000 MIB Support List located at ftp://ftp.cisco.com/pub/mibs/supportlists/cat4000/cat4000-supportlist.html.
Although their Release Notes are unique, the 4 platforms (Catalyst 4500, Catalyst 4900, Catalyst ME 4900, and Catalyst 4900M) use the same Software Configuration Guide, Command Reference Guide, and System Message Guide. Refer to the following home pages for additional information:
http://www.cisco.com/go/cat4500/docs
http://www.cisco.com/go/cat4900/docs
http://www.cisco.com/en/US/products/ps7009/tsd_products_support_series_home.html
Installation guides and notes including specifications and relevant safety information are available at the following URLs:
http://www.cisco.com/en/US/docs/switches/lan/catalyst4500/hardware/installation/guide/78-14409-08/4500inst.html
http://www.cisco.com/en/US/docs/switches/lan/catalyst4500/hardware/catalyst4500e/installation/guide/Eseries.html
http://www.cisco.com/en/US/products/hw/switches/ps4324/prod_installation_guides_list.html
http://www.cisco.com/en/US/docs/switches/lan/catalyst4500/hardware/regulatory/compliance/78_13233.html
http://www.cisco.com/en/US/products/hw/switches/ps4324/prod_installation_guides_list.html
http://www.cisco.com/en/US/products/ps6021/prod_installation_guides_list.html
http://www.cisco.com/en/US/products/ps7009/prod_installation_guides_list.html
Software release notes, configuration guides, command references, and system message guides are available at the following URLs:
http://www.cisco.com/en/US/products/hw/switches/ps4324/prod_release_notes_list.html
http://www.cisco.com/en/US/products/ps6021/prod_release_notes_list.html
http://www.cisco.com/en/US/docs/switches/lan/catalyst4500/release/note/OL_11511.html
Software documents for the Catalyst 4500 Classic, Catalyst 4500 E-Series, Catalyst 4900, and
Cisco ME 4900 Series Ethernet Switches are available at the following URLs:
http://www.cisco.com/en/US/products/hw/switches/ps4324/products_installation_and_configuration_guides_list.html
http://www.cisco.com/en/US/products/hw/switches/ps4324/prod_command_reference_list.html
http://www.cisco.com/en/US/products/hw/switches/ps4324/products_system_message_guides_list.html
Platform-independent Cisco IOS documentation may also apply to the Catalyst 4500 and 4900 switches. These documents are available at the following URLs:
http://www.cisco.com/en/US/products/ps6350/products_installation_and_configuration_guides_list.html
http://www.cisco.com/en/US/products/ps6350/prod_command_reference_list.html
You can also use the Command Lookup Tool at:
http://tools.cisco.com/Support/CLILookup/cltSearchAction.do
http://www.cisco.com/en/US/products/ps6350/products_system_message_guides_list.html
You can also use the Error Message Decoder tool at:
http://www.cisco.com/pcgi-bin/Support/Errordecoder/index.cgi
http://www.cisco.com/public/sw-center/netmgmt/cmtk/mibs.shtml
The following notices pertain to this software license.
This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit ( http://www.openssl.org/).
This product includes cryptographic software written by Eric Young (eay@cryptsoft.com).
This product includes software written by Tim Hudson (tjh@cryptsoft.com).
The OpenSSL toolkit stays under a dual license, i.e. both the conditions of the OpenSSL License and the original SSLeay license apply to the toolkit. See below for the actual license texts. Actually both licenses are BSD-style Open Source licenses. In case of any license issues related to OpenSSL please contact openssl-core@openssl.org.
Copyright © 1998-2007 The OpenSSL Project. All rights reserved.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:
1. Redistributions of source code must retain the copyright notice, this list of conditions and the following disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions, and the following disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgment: “This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit ( http://www.openssl.org/)”.
4. The names “OpenSSL Toolkit” and “OpenSSL Project” must not be used to endorse or promote products derived from this software without prior written permission. For written permission, please contact openssl-core@openssl.org.
5. Products derived from this software may not be called “OpenSSL” nor may “OpenSSL” appear in their names without prior written permission of the OpenSSL Project.
6. Redistributions of any form whatsoever must retain the following acknowledgment:
“This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit ( http://www.openssl.org/)”.
THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT “AS IS”' AND ANY EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
This product includes cryptographic software written by Eric Young (eay@cryptsoft.com). This product includes software written by Tim Hudson (tjh@cryptsoft.com).
Copyright © 1995-1998 Eric Young (eay@cryptsoft.com). All rights reserved.
This package is an SSL implementation written by Eric Young (eay@cryptsoft.com).
The implementation was written so as to conform with Netscapes SSL.
This library is free for commercial and non-commercial use as long as the following conditions are adhered to. The following conditions apply to all code found in this distribution, be it the RC4, RSA, lhash, DES, etc., code; not just the SSL code. The SSL documentation included with this distribution is covered by the same copyright terms except that the holder is Tim Hudson (tjh@cryptsoft.com).
Copyright remains Eric Young’s, and as such any Copyright notices in the code are not to be removed. If this package is used in a product, Eric Young should be given attribution as the author of the parts of the library used. This can be in the form of a textual message at program startup or in documentation (online or textual) provided with the package.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:
1. Redistributions of source code must retain the copyright notice, this list of conditions and the following disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
“This product includes cryptographic software written by Eric Young (eay@cryptsoft.com)”.
The word ‘cryptographic’ can be left out if the routines from the library being used are not cryptography-related.
4. If you include any Windows specific code (or a derivative thereof) from the apps directory (application code) you must include an acknowledgement: “This product includes software written by Tim Hudson (tjh@cryptsoft.com)”.
THIS SOFTWARE IS PROVIDED BY ERIC YOUNG “AS IS” AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
The license and distribution terms for any publicly available version or derivative of this code cannot be changed. i.e. this code cannot simply be copied and put under another distribution license [including the GNU Public License].
For information on obtaining documentation, using the Cisco Bug Search Tool (BST), submitting a service request, and gathering additional information, see What’s New in Cisco Product Documentation.
To receive new and revised Cisco technical content directly to your desktop, you can subscribe to the What’s New in Cisco Product Documentation RSS feed. The RSS feeds are a free service.