Release Notes for the Catalyst 4500 Series Switch, Cisco IOS Releases 15.1(1)SG
Features Not Supported on the Cisco Catalyst 4500 Series Switch
Cisco Classic IOS Release Strategy
Supported Hardware on Catalyst 4500 Series Switch
Supported Hardware on Catalyst 4500 E-Series Switch
New Hardware Features in Release 15.1(1)SG1
New Software Features in Release 15.1(1)SG1
New Hardware Features in Release15.1(1)SG
New Software Features in Release15.1(1)SG
Identifying an +E Chassis and ROMMON
Guidelines for Upgrading the ROMMON
Upgrading the Supervisor Engine ROMMON from the Console
Upgrading the Supervisor Engine ROMMON Remotely Using Telnet
Upgrading the Cisco IOS Software
Open Caveats for Cisco IOS Release 15.1(1)SG2
Resolved Caveats in Cisco IOS Release 15.1(1)SG2
Open Caveats for Cisco IOS Release 15.1(1)SG1
Resolved Caveats in Cisco IOS Release 15.1(1)SG1
Open Caveats for Cisco IOS Release 15.1(1)SG
Resolved Caveats in Cisco IOS Release 15.1(1)SG
Troubleshooting at the System Level
Obtaining Documentation and Submitting a Service Request
Current Release
IOS 15.1(1)SG2—November 1, 2012
Previous Release
IOS 15.1(1)SG1 and IOS 15.1(1)SG
These release notes describe the features, modifications, and caveats for Cisco IOS Release 15.1(1)SG on the Catalyst 4500 series switch.
Support for Cisco IOS Software Release 15.1(1)SG, the default image, follows the standard Cisco Systems® support policy, available at
http://www.cisco.com/en/US/products/products_end-of-life_policy.html
Note Although their Release Notes are unique, the 4 platforms (Catalyst 4500, Catalyst 4900,
Catalyst ME 4900, and Catalyst 4900M/4948E) use the same Software Configuration Guide, Command Reference Guide, and System Message Guide.
For more information on the Catalyst 4500 series switches, visit the following URL:
http://www.cisco.com/go/cat4500/docs
The Enterprise Services image supports all Cisco Catalyst 4500 Series software features based on Cisco IOS Software, including enhanced routing. Customers planning to enable BGP for Supervisor Engine IV, V, or V-10GE will no longer need to purchase a separate BGP license (FR-IRC4) because BGP is included in the Enterprise Services package. Beginning with 12.2(53)SG2, we support the Enterprise Services image on Supervisor Engine 6L-E.
The IP Base image supports Open Shortest Path First (OSPF) for Routed Access, Enhanced Interior Gateway Routing Protocol (EIGRP) "limited" Stub Routing, Nonstop Forwarding/Stateful Switchover (NSF/SSO), and RIPv1/v2. The IP Base image does not support enhanced routing features such as BGP, Intermediate System-to-Intermediate System (IS-IS), Internetwork Packet Exchange (IPX), AppleTalk, Virtual Routing Forwarding (VRF-lite), GLBP, and policy-based routing (PBR).
Cisco IOS Release 12.2(46)SG1 introduced a new LAN Base software and an IP upgrade image. These complement the existing IP Base and Enterprise Services images. The LAN base image is supported on Supervisor Engine 6L-E starting with Cisco IOS Release 12.2(52)XO. LAN Base image is primarily focused on customer access and Layer 2 requirements and therefore many of the IP Base features are not required. The IP upgrade image is available if at a later date you require some of those features.
Starting with Cisco IOS Release 15.0(2)SG, on the Catalyst 4500 Series Switch, support for NEAT feature has been extended from IP Base to LAN Base and support for HSRP v2 IPV6 has been extended from Enterprise Services to IP Base.
Starting with Cisco IOS Release (3.3.0SG or 15.1(1)SG), support for IP SLAs and NSF have been extended from Enterprise Services to IP Base.
Table 1 is a detailed list of features supported on Catalyst 4500 Series Switch running Cisco IOS Software Release 15.0(2)SG. For the full list of supported features, check the Feature Navigator application:
http://tools.cisco.com/ITDIT/CFN/
For information on MiBs support, please refer to this URL:
http://ftp.cisco.com/pub/mibs/supportlists/cat4000/cat4000-supportlist.html
Crashdump Enhancement1 |
|||
Ethernet Management Port (Fa1 interface)2 |
|||
IEEE 802.1ag D8.1 standard Compliant CFM, Y.1731 multicast LBM / AIS / RDI / LCK, IP SLA for Ethernet |
|||
IEEE 802.1s Multiple Spanning Tree (MST) Standard Compliance |
|||
IEEE 802.3ad Link Aggregation (LACP) Port-Channel Standalone Disable |
|||
IPv6 Multicast: Multicast Listener Discovery (MLD) Protocol, Versions 1 and 2 |
|||
Yes3 |
|||
Yes 3 |
|||
Yes 3 |
|||
IPv6 Switching: CEFv6 Switched Automatic IPv4-compatible Tunnels (in software) |
|||
IPv6 Switching: CEFv6 Switched Configured IPv6 over IPv4 Tunnels (in software) |
|||
IPv6 Tunneling: Automatic IPv4-compatible Tunnels (in software) |
|||
IPv6 Tunneling: Manually Configured IPv6 over IPv4 Tunnels (in software) |
|||
Medianet 2.0: Integrated Video Traffic Simulator (hardware-assisted IP SLA); IPSLA responder only |
|||
Medianet 2.0: Media Monitoring (Performance Monitoring and Mediatrace) |
|||
NEAT Enhancement: Re-Enabling BPDU Guard Based on User Configuration |
|||
Yes 3 |
|||
Yes 3 |
|||
Yes 3 |
|||
Yes 3 |
|||
Yes 3 |
|||
Yes 3 |
|||
Yes 3 |
|||
Yes 3 |
|||
Yes 3 |
|||
Yes 3 |
|||
Yes 3 |
|||
Yes 3 |
|||
Yes 3 |
|||
RADIUS Attribute 44 (Accounting Session ID) in Access Requests |
|||
Source Specific Multicast (SSM) - IGMPv3,IGMP v3lite, and URD |
|||
Time Domain Reflectometry (TDR)4 |
|||
TrustSec: IEEE 802.1ae MACSec encryption on user facing ports |
|||
TrustSec: IEEE 802.1ae MACSec encryption on user facing ports SSO |
|||
TrustSec: IEEE 802.1ae MACSec encryption between switch-to-switch links using Cisco SAP (Security Association Protocol) |
|||
Note You can purchase a special license to enable the 10 Gigabit uplinks in the LAN Base image without moving to IP Base.
The following features are not supported in Cisco IOS Release 15.1(1)SG on the Catalyst 4500 series switches:
– Standard Xerox Network System (XNS) access list
– Protocol type-code access list
– <1200-1299> IPX summary address access list
Customers using Supervisor Engine 6-E or 6L-E with Catalyst 4500 Series Switches who need the latest hardware and software features should migrate to Cisco IOS Release 15.1(1)SG.
Note This release does not support older Supervisor Engines, including II+, III, IV, V, and V-10GE.
The Catalyst 4500 Series Switch has two maintenance trains. Cisco IOS Release 15.0(2)SG is the recommended release for customers who require a release with a maintenance train.
For more information on the Catalyst 4500 series switches, visit the following URL:
http://www.cisco.com/go/cat4500/docs
Figure 1 displays the two active trains, 12.2(53)SG and 15.0(2)SG.
Figure 1 Software Release Strategy for the Catalyst 4500 Series Switch
Support for Cisco IOS Software Release 15.1(1)SG follows the standard Cisco Systems® support policy, available at
http://www.cisco.com/en/US/products/products_end-of-life_policy.html
This section describes the system requirements:
Table 3 lists the hardware supported on the Catalyst 4500 Series Switch.
For Catalyst 4500 transciever module compatibility information, see the URL:
http://www.cisco.com/en/US/products/hw/modules/ps5455/products_device_support_tables_list.html
Table 3 briefly describes the four chassis in the Catalyst 4500 Series Switch. For the chassis listed in the table, refer to Table 6 for software release information.
For information on the minimum supported release for each pluggable module please refer to:
http://www.cisco.com/en/US/products/hw/modules/ps5455/products_device_support_tables_list.html
In addition to the classic line cards and supervisor engines, Cisco IOS Software Release 15.0(2)SG supports the next-generation high-performance E-Series Supervisor Engine 6-E with CenterFlex technology and E-Series line cards and chassis. A brief list of primary E-Series hardware supported on Catalyst 4500 series switch ( Table 5 ).
Table 6 outlines the chassis and supervisor engine compatibility.
(M=Minimum release, R=Recommended release)
These sections describe the new and changed information for the Catalyst 4500 series switch running Cisco IOS software:
Release 15.1(1)SG1 provides no new hardware on the Catalyst 4500 series switch.
Release 15.1(1)SG1 provides no new new software on the Catalyst 4500 series switch:
Release 15.1(1)SG provides the following new hardware on the Catalyst 4500 series switch:
Note Although GLC-GE-100FX plugs in Gigabit Ethernet SFP port, it provides 100M bandwidth
Release 15.1(1)SG provides the following new software features on the Catalyst 4500 series switch.
– Monitoring (includes Performance Monitoring and Mediatrace)
– Integrated video traffic simulator ( hardware assisted IP SLA)
For details refer to the URLs:
http://www.cisco.com/en/US/docs/net_mgmt/cisco_configuration_professional/v2_5/olh/ccp.pdf
http://www.cisco.com/en/US/docs/switches/lan/energywise/phase2_5/ios/release/notes/ol23554.html
In most cases, upgrading the switch to a newer release of Cisco IOS software does not require a ROMMON upgrade. However, if you are running an early release of Cisco IOS software and plan to upgrade, refer to the following tables for the minimum Cisco IOS image and the recommended ROMMON release, respectively.
Note You must upgrade to at leaset ROMMON Release 12.2(44r)SG5 to run Cisco IOS Release 15.0(2)SG on the Supervisor Engine 6-E and Supervisor Engine 6L-E. 12.2(44r)SG9 is recommended.
The following sections describe how to upgrade your switch software:
An +E chassis is identified by a FRU minor value in the chassis' idprom.
When supervisor engine 1 (sup1) is in ROMMON and supervisor engine 2 (sup2) is in IOS, only sup2 can read the idprom contents of chassis’ idprom. Chassis type is displayed as “+E” in the output of the show version command. Conversely, sup1 can only display the chassis type as “E.”
When both sup1 and sup2 are in ROMMON, both engines can read the chassis’ idprom. Chassis type is displayed correctly as “+E” in the output of the show version command.
When both sup1 and sup2 are in IOS, both engines can read the chassis’ idprom. Chassis type is displayed correctly as “+E” in the output of the show version command.
Note The examples in this section use the programmable read-only memory (PROM) upgrade version 12.2(44r)SG9 and Cisco IOS Release 12.2(50)SG. For other software releases, replace the ROMMON release and Cisco IOS software release with the appropriate release and filename. This document describes the procedure for a single supervisor engine system. In a dual supervisor engine system, you must perform the process on each supervisor engine.
Follow this procedure to upgrade your supervisor engine ROMMON:
Step 1 Directly connect a serial cable to the console port of the supervisor engine.
Note This section assumes that the console baud rate is set to 9600 (default). If you want to use a different baud rate, change the configuration register value for your switch.
Step 2 Download the cat4500-e-ios-promupgrade-122_44r_SG9 program from Cisco.com, and place it on a TFTP server in a directory that is accessible from the switch to be upgraded.
The cat4500-e-ios-promupgrade-122_44r_SG9 program is available on Cisco.com at the same location from which Catalyst 4500 system images are downloaded.
Step 3 Use the dir bootflash: command to ensure that sufficient space exists in Flash memory to store the PROM upgrade image. If you are using a CompactFlash card, replace bootflash: with slot0:
Note Because of CSCsu36751, you should use bootflash for this upgrade if your current ROMMON version is prior to 12.2(44r)SG3. Else, you might need to reseat the compact flash after rebooting.
Step 4 Download the cat4500-e-ios-promupgrade-122_44r_SG9 program into Flash memory using the copy tftp command.
The following example shows how to download the PROM upgrade image cat4500-e-ios-promupgrade-122_44r_SG9 from the remote host 172.20.58.78 to bootflash:
Step 5 On a dual-supervisor system, copy the same ROMMON image to the standby supervisor engine with the copy bootflash:cat4500-e-ios-promupgrade-122_44r_SG9 slavebootflash command
Step 6 Enter the reload command to reset the switch, press Ctrl-C to stop the boot process, and re-enter ROMMON.
Note On a redundant system, this action causes a switchover.
The following example shows the output after a reset into ROMMON:
Step 7 Run the PROM upgrade program by entering this command:
boot bootflash:cat4500-e-ios-promupgrade-122_44r_SG9
The following example shows the output from a successful upgrade, followed by a system reset:
Step 8 Boot the Cisco IOS software image. This may happen automatically if the system is configured to auto-boot.
Step 9 On a redundant system, hook up a console to the now-active supervisor engine. After the system achieves an SSO state, repeat steps 6-8.
Step 10 Use the show module command to verify that you have upgraded the ROMMON:
Step 11 Use the delete command on the active supervisor to delete the PROM upgrade program from bootflash
The following example shows how to delete the cat4500-e-ios-promupgrade-122_44r_SG9 image from bootflash:
Step 12 On a redundant system, also delete the upgrade file from the standby supervisor engine:
The ROMMON has now been upgraded.
See the “Upgrading the Cisco IOS Software” section for instructions on how to upgrade the Cisco IOS software on your switch.
Follow this procedure to upgrade your supervisor engine ROMMON to Release 12.2(44r)SG9. This procedure can be used when console access is not available and when the ROMMON upgrade must be performed remotely.
Note In the following section, use the PROM upgrade version bootflash:cat4500-e-ios-promupgrade-122_44r_SG9.
Step 1 Establish a Telnet session to the supervisor engine.
Note In the following discussion, we assume that at least one IP address has been assigned to either an SVI or a routed port.
Step 2 Download the bootflash:cat4500-e-ios-promupgrade-122_44r_SG9 program from Cisco.com, and place it on a TFTP server in a directory that is accessible from the switch to be upgraded.
The bootflash:cat4500-e-ios-promupgrade-122_44r_SG9 programs are available on Cisco.com at the same location from which you download Catalyst 4500 system images.
Step 3 Use the dir bootflash: command to ensure that there is sufficient space in Flash memory to store the PROM upgrade image. If there is insufficient space, delete one or more images, and then enter the
squeeze bootflash: command to reclaim the space.
If you are using a CompactFlash card, replace bootflash: with slot0:.
Step 4 Download the bootflash:cat4500-e-ios-promupgrade-122_44r_SG9 program into Flash memory using the copy tftp command.
The following example shows how to download the PROM upgrade image bootflash:cat4500-e-ios-promupgrade-122_44r_SG9 from the remote host 172.20.58.78 to bootflash:
Step 5 Use the no boot system flash bootflash: file_name command to clear all BOOT variable commands in the configuration file. In this example, the BOOT variable was set to boot the image cat4000-i5s-mz.121-19.EW1.bin from bootflash:
Note The config-register must be set to autoboot.
Step 6 Use the show bootvar command to verify the boot string. The BOOT variable in this example will first run the PROM upgrade to upgrade ROMMON. Then, the upgrade software will reload and the supervisor engine will load the Cisco IOS software image.
Step 7 Run the PROM upgrade program by issuing the reload command. Issuing this command will terminate your Telnet session.
The following example shows the console port output from a successful ROMMON upgrade followed by a system reset. Your Telnet session is disconnected during the ROMMON upgrade, so you will not see this output. This step could take 2-3 minutes to complete. You will need to reconnect your Telnet session after 2-3 minutes when the Cisco IOS software image and the interfaces are loaded.
Step 8 Use the no boot system flash bootflash: file_name command to clear the BOOT command used to upgrade the ROMMON.
Step 9 Use the show version command to verify that the ROMMON has been upgraded.
Step 10 Use the delete command to delete the PROM upgrade program from bootflash and the squeeze command to reclaim unused space.
The following example shows how to delete the cat4000-ios-promupgrade-121_20r_EW1 image from bootflash and reclaim unused space:
Step 11 Use the show bootvar command to verify that the ROMMON upgrade program has been removed from the BOOT variable.
The ROMMON has now been upgraded.
See the “Upgrading the Cisco IOS Software” section for instructions on how to upgrade the Cisco IOS software on your switch.
Before you proceed, observe the following rules for hostname:
Uppercase and lowercase characters look the same to many internet software applications. It may seem appropriate to capitalize a name the same way you might do in English, but conventions dictate that computer names appear all lowercase. For more information, refer to RFC 1178, Choosing a Name for Your Computer.
To upgrade the Cisco IOS software on your Catalyst 4500 series switch, use this procedure:
Step 1 Download Cisco IOS Release 15.01(2) from Cisco.com, and place the image on a TFTP server in a directory that is accessible from the supervisor engine that is upgraded.
Step 2 Use the dir bootflash: command to ensure that there is sufficient space in Flash memory to store the promupgrade image. If there is insufficient space, delete one or more images, and then enter the squeeze bootflash: command to reclaim the space.
If you are using a CompactFlash card, use slot0: instead of bootflash.
Step 3 Download the software image into Flash memory using the copy tftp command.
The following example shows how to download the Cisco IOS software image cat4000-is-mz.121-12c.EW from the remote host 172.20.58.78 to bootflash:
Step 4 Use the no boot system flash bootflash: file_name command to clear the cat4000-is-mz.121-8a.EW file and to save the BOOT variable.
The following example shows how to clear the BOOT variable:
Step 5 Use the boot system flash command to add the Cisco IOS software image to the BOOT variable.
The following example shows how to add the cat4000-is-mz.121-12c.EW image to the BOOT variable:
Step 6 Use the config-register command to set the configuration register to 0x2102.
The following example show how to set the second least significant bit in the configuration register:
Step 7 Enter the reload command to reset the switch and load the software.
The following example shows the output from a successful upgrade followed by a system reset:
Step 8 Use the show version command to verify that the new Cisco IOS release is operating on the switch.
These sections list the limitations and restrictions for the current release of Cisco IOS software on the Catalyst 4500 series switch.
– Fast UDLD is disabled by default.
– Configure fast UDLD only on point-to-point links between network devices that support fast UDLD.
– You can configure fast UDLD in either normal or aggressive mode.
– Do not enter the link debounce command on fast UDLD ports.
– Configure fast UDLD on at least two links between each connected network device. This reduces the likelihood of fast UDLD incorrectly error disabling a link due to false positives.
– Fast UDLD does not report a unidirectional link if the same error occurs simultaneously on more than one link to the same neighbor device.
The outputs of certain commands, such as show ip route and show access-lists, contain non-deterministic text. While the output is easily understood, the output text does not contain strings that are consistently output. A general purpose specification file entry is unable to parse all possible output.
While a general purpose specification file entry may not be possible, a specification file entry might be created that returns the desired text by searching for text that is guaranteed to be in the output. If a string is guaranteed to be in the output, it can be used for parsing.
For example, the output of the show ip access-lists SecWiz_Gi3_17_out_ip command is this:
The first line is easily parsed because access list is guaranteed to be in the output:
The remaining lines all contain the term host. As a result, the specification file may report the desired values by specifying that string. For example, this line
will produce the following for the first and second rules
and the following for the third statement
Request the output of the show running-config command using NETCONF and parse that output for the desired strings. This is useful when the desired lines contain nothing in common. For example, the rules in this access list do not contain a common string and the order (three permits, then a deny, then another permit), prevent the spec file entry from using permit as a search string, as in the following example:
The XML output of show running-config command includes the following, which can then be parsed programmatically, as desired:
This only affects a switch that has any of the following queues configured as SPAN source in releases prior to 12.2(31)SG and saved to the startup configuration. The SPAN destination would not get the same traffic after upgrading to 12.2(31)SG.
Workaround: After upgrading to 12.2(31)SG and later releases, remove the old SPAN source configuration and reconfigure with the new queue names/IDs. For example:
This configuration had been removed erroneously in a prior release.
For example, if the active supervisor engine is in slot 1, and you have configured interface Gi1/1, the supervisor engine in slot 2 becomes active if you remove the active supervisor engine from the chassis. In addition, while the startup configuration file is being parsed, you will receive an error message indicating that interface Gi1/1 is no longer present. This behavior is correct. When the formerly active supervisor engine is reinserted into slot 1, there is no configuration for interface Gi1/1.
This situation will not occur when both supervisor engines are physically in the chassis.
Workaround: Copy the startup configuration file into the running configuration:
Workaround: Display the configuration with the show standby command, then remove the CLI. Here is an example of show standby GigabitEthernet1/1 command output:
Use the standby delay reload option if the router is rebooting after reloading the image.
Workaround: Ensure that the MTUs match.
– The verify and squeeze commands are not supported.
– The rename command is supported in FAT file system.
For Supervisor Engine 6-E, the rename command is available for bootflash and slot0. For all other supervisor engines, the rename command is supported for nvram devices only.
– The fsck command is supported for slot0 device. It is not supported in the file systems on supervisor engines other than 6-E.
– In the FAT file system, the IOS format bootflash: command erases user files only. It does not erase system configuration.
– The FAT file system supports a maximum of 63 characters for file/directory name. The maximum for path length is 127 characters.
– The FAT file system does not support the following characters in file/directory names:{}#%^ and space characters.
– The FAT file system honors the Microsoft Windows file attribute of read-only and read-write, but it does not support the Windows file hidden attribute.
– Supervisor Engine 6-E uses the FAT file system for compact flash (slot0). If a compact flash is not formatted in FAT file system (such as compact flash on a supervisor engine other than 6-E), the switch does not recognize it.
Workaround: Remove and reinsert the standby supervisor engine after the active supervisor engine boots. (CSCsa66509)
If this message appears, ensure network connectivity exists between the switch and the ACS. Also check that the switch has been properly configured as an AAA client on the ACS.
– As IPSG learns the static hosts on each interface, the switch CPU may achieve 100 percent if there are a large number of hosts to learn. The CPU usage will drop after the hosts are learned.
– IPSG violations for static hosts are printed as they occur. If multiple violations occur simultaneously on different interfaces, the CLI displays the last violation. For example, if IPSG is configured for 10 ports and violations exist on ports 3,6, and 9, the violation messages are printed only for port 9.
– Inactive host bindings will appear in the device tracking table when either a VLAN is associated with another port or a port is removed from a VLAN. So, as hosts are moved across subnets, the hosts appear in the device tracking table as inactive.
– Autostate SVI does not work on EtherChannel.
In such a scenario, the IPv6 MTU value programmed in hardware differs from the IPv6 interface MTU value. This occurs if no room exists in the hardware MTU table to store additional values.
To create room, unconfigure some unused MTU values. Then, either disable or re-enable IPv6 on the interface, or reapply the MTU configuration.
To enable IPSG with static hosts on a port, enter the following commands:
Note The preceding condition also applies to IPSG with static hosts on a PVLAN host port.
– WS-X4148-FX-MT Cisco Catalyst 4500 Fast Ethernet Switching Module, 48-port 100BASE-FX (MT-RJ)
– WS-X4448-GB-RJ45 Cisco Catalyst 4500 48-port 10/100/1000 Module (RJ-45)
The Catalyst 4503-E and Catalyst 4506-E have no caveats. The Catalyst 4507R-E configurations that use power supplies rated at 1400 W or above also have no caveats.
The following replacement switching modules will not exceed the power supply capacity for any Catalyst 4500-E chassis:
Refer to the Catalyst 4500 Series Module Installation Guide to determine the power requirements for all of the Catalyst 4500 linecards and the power capacities of the Catalyst 4500 power supplies.
This situation only occurs if a switch reached SSO before you removed the line card.
Workaround: Use the show version command. CSCtr30294
Workaround: Select an alternate destination or source port. CSCty05405
– 48 10/100/1000BaseT Premium POE E Series WS-X4648-RJ45V+E (JAE14310RHU)
– 6 Sup 6-E 10GE (X2), 1000BaseX (SFP) WS-X45-SUP6-E (JAE13104VVY)
the following restrictions apply:
– Sub-interrfaces are not supported on 1 Gigabit and Ten-Gigabit interfaces.
– Port-channel members do not support multiple classification criteria for a QoS policy.
– CEF is disabled automatically when uRFP is enabled and TCAM is fully utilized.
Workaround: During IPv6 access-list configuration, configure at least one IPv6 ACE before the "hardware statistics" statement. CSCuc53234
Caveats describe unexpected behavior in Cisco IOS releases. Caveats listed as open in a prior release are carried forward to the next release as either open or resolved.
Note All caveats in Release 12.4 also apply to the corresponding 12.1 E releases. Refer to the Caveats for Cisco IOS Release 12.4 publication at the following URL:
http://www.cisco.com/en/US/docs/ios/12_4/release/notes/124MCAVS.html
Note For the latest information on PSIRTS, refer to the Security Advisories on CCO at the following URL:
http://tools.cisco.com/security/center/publicationListing
This section lists the open caveats for Cisco IOS Release 15.1(1)SG2:
– If such a certificate does not exist and the device's hostname and default_domain are set, then a persistent self-signed certificate is generated.
– If such a certificate exists, the FQDN in the certificate is compared with the current device's hostname and default_domain. If either differs from the FQDN in the certificate, the existing persistent self-signed certificate is replaced with a new one with the updated FQDN. Be aware that the existing key pair is used in the new certificate.
On a switch that supports redundancy, the generation of the self-signed certificate occurs independently on the active and the standby supervisor engines, and the certificates differ. After switchover, the HTTP client that holds the old certificate cannot connect to the HTTPS server.
Workaround: Reconnect. CSCsb11964
This does not affect performance.
Workaround: Enter the no shutdown command. CSCsg27395
Workaround: Remove the transceiver from the new port and place it in the old port. After the SFP is recognized in the old port, remove it slowly and insert it in the new port. (CSCse34693)
Workaround: None. This is an informational message. CSCsi60898
Workarounds: Do one of the following:
– After a reload, copy the startup-config to the running-config.
– Use a loopback interface as the target of the ip unnumbered command.
– Change the CLI configuration so that during bootup the router port is created first.
Workaround: When the port channel starts to flap, enter shut and no shut on the port channel. After the first switchover and after deleting the port channel, create a new channel. CSCsr00333
Workaround: Configure an ISL/dot1q trunk port. CSCsu43445
Workaround: Do one of the following:
– Reload the standby switch again with the line card in place.
– Remove and reenter the commands on the active supervisor engine. The standby supervisor engine will acquire this change. CSCsv44866
This applies to classic or E-series Catalyst 4500 supervisor engines running
Cisco IOS Release 12.2(50)SG
If the switch were to run a supervisor switchover while in this state, the host's MAC address would not be present in the new active supervisor engine’s MAC address table, causing possible connectivity interruption on the host.
Workaround: Enter the shutdown command, followed by the no shutdown command on the interface. This triggers relearning and synchronizing of the host's MAC to the standby supervisor engine. CSCsw91661
The queue transmit counters as well as the policing statistics (if any) are correct. CSCsz20149
This only happens when the switch is running network mobility service protocol (nmsp). It does not happen if the phone is CDP enabled.
Workaround: Use the VLAN ID or name to differentiate the IP phone and the PC sitting behind the phone on the WCS.
The IP phone is detected on the voice VLAN, and the displayed information of serial number, model number, and software version is correct. However, a PC sitting behind the phone is detected on a data VLAN, and the displayed device information is wrong and should be ignored.
Prior to Cisco IOS Release 12.2(53)SG1 and 12.2(50)SG6, the switchport block multicast command blocks IP Multicast, Layer 2 multicast, and broadcast traffic. CSCta61825
Despite the different default value, you can configure any value in the time range.
Workarounds: The Cisco switch default link-flap detection value is 5 flaps in 10 seconds. Use the default value or larger numbers. CSCtg07677
Similarly, the show epm sessions command always displays the authentication method as DOT1X.
Workaround: To view the authentication method used for a client, enter the
show authentication sessions command. CSCsx42157
Workaround: Configure both dead-criteria and deadtime.
Workaround: Enter shut and no shut on the port to synchronize the STP state. CSCtf52437
Workaround: After the switch reloads, enter shut and no shut on the port-channel interface.
Workaround: Shut down the CE-facing interface. After all of the mask-value entries point to the target CE, unshut the CE-facing interface. CSCtl09941
Workaround: Remove these operators from any dynamic ACLs. CSCts05302
Workaround: Reinsert the X2. CSCsk43618
Workaround: Enter the show policy-map interface command to find the actual burst value programmed. CSCsi71036
If you enter the show policy-map name, however, the unconditional marking actions appear. CSCsi94144
This behavior occurs in a redundant switch when the active supervisor engine is running Cisco IOS, the standby supervisor engine is in ROMMON, and the standby supervisor engine’s ROMMON is upgraded from version 0.34 or to a later version. The upgrade process causes the uplinks on the standby supervisor engine to go down but the active supervisor engine is unaware of this.
Workarounds: To resume normal operation, do one of the following:
– Reload both supervisor engines with the redundancy reload shelf command.
– Power-cycle the standby supervisor engine by briefly pulling it from the chassis.
There is no workaround for the link flap issue. CSCsm81875
This problem can happen when pause frames are sent to a switch port and the flow control receive configuration is toggled on a 10-Gigabit Ethernet port.
Workaround: Change the flow control receive configuration when no traffic exists. CSCso71647
You only see this behavior if you initially did not allocate a VLAN before you configure the IFM, and then later allocate the same VLAN.
Workaround: Unconfigure, and then reconfigure the IFM on the port.
Workaround: Disable native VLAN tagging on the trunk port of the switch by entering the
no switchport trunk native vlan tag command. CSCsz12611
Workaround: No functional impact.
You must wait for the ACLs to be programmed before performing other TCAM related changes. CSCtd57063
Workaround: Reduce the number of VLAN mappings. CSCtn56208
Workaround: Configure IP multicast routing globally and establish IP PIM sparse dense mode on the CE-facing interface. CSCtl97692
Workaround: Unconfigure and reconfigure the service group. CSCtn88087
Workaround: Enable a Layer 3 interface in the running configuration. CSCsc88636.
– Links flap for various Layer 3 protocols.
– A traffic loss of several seconds is observed during the upgrade process.
Workaround: Do not use the quick option with the issu changeversion command. CSCto51562
Workaround: Enter shut and no shut on the port. CSCts29515
A Cisco IOS AAA client uses the PAC secret to compute the authenticator; Cisco Secure ACS 5.2 uses the shared secret. This behavior causes a mismatch that results in a rejection of the accounting message, and the client marks the server as unresponsive.
Workaround: None. You must disable 802.1X accounting. CSCts26844
Mediatrace cannot find the correct inbound interface and applies the dynamic policy on a different interface from the one used for media flow.
The impact of stale dynamic access lists is to monitor unwanted traffic.
– If the switchover is scheduled, remove the scheduled session on the initiator. Reschedule the session after the new active supervisor engine boots on the responder.
– If the Mediatrace responder SSO is not planned, after the new active supervisor engine boots, manually delete the stale dynamic access lists. CSCty75070
Workaround: Do not specify a "bfd" suffix with the snmp-server host x.x.x.x configuration command. CSCtx51561
Workaround: Configure hw-module uplink shared-backplane from the console or vty, and enter write mem. CSCtx43568
This message is not observed during a system bootup.
Workaround: None required. This message is information only. CSCtz15738
Workaround: Disable IGMP snooping. CSCuc65538
Workaround: Disable CDP on interfaces that may flap frequently. CSCub85948
This section lists the resolved caveats in Cisco Release 15.1(1)SG2:
Workaround: Reset the linecard either with the hw-module module m reset command or through a manual OIR. CSCuc64146
The power supply or power supply inputs are incorrectly listed as 110V when they should be list as 220V. The power supply may go into an err-disable state if only one power supply has the issue. If both power supplies have the issue and are both recognized as 110V, they will not go into an err-disable state. Additionally, other modules in the switch might be denied power and will not power on.
Workaround: Remove the power supply inputs, remove or reinsert the power supply, then restore the power supply inputs. CSCuc07562
This section lists the open caveats for Cisco IOS Release 15.1(1)SG1:
– If such a certificate does not exist and the device's hostname and default_domain are set, then a persistent self-signed certificate is generated.
– If such a certificate exists, the FQDN in the certificate is compared with the current device's hostname and default_domain. If either differs from the FQDN in the certificate, the existing persistent self-signed certificate is replaced with a new one with the updated FQDN. Be aware that the existing key pair is used in the new certificate.
On a switch that supports redundancy, the generation of the self-signed certificate occurs independently on the active and the standby supervisor engines, and the certificates differ. After switchover, the HTTP client that holds the old certificate cannot connect to the HTTPS server.
Workaround: Reconnect. CSCsb11964
This does not affect performance.
Workaround: Enter the no shutdown command. CSCsg27395
Workaround: Remove the transceiver from the new port and place it in the old port. After the SFP is recognized in the old port, remove it slowly and insert it in the new port. (CSCse34693)
Workaround: None. This is an informational message. CSCsi60898
Workarounds: Do one of the following:
– After a reload, copy the startup-config to the running-config.
– Use a loopback interface as the target of the ip unnumbered command.
– Change the CLI configuration so that during bootup the router port is created first.
Workaround: When the port channel starts to flap, enter shut and no shut on the port channel. After the first switchover and after deleting the port channel, create a new channel. CSCsr00333
Workaround: Configure an ISL/dot1q trunk port. CSCsu43445
Workaround: Do one of the following:
– Reload the standby switch again with the line card in place.
– Remove and reenter the commands on the active supervisor engine. The standby supervisor engine will acquire this change. CSCsv44866
This applies to classic or E-series Catalyst 4500 supervisor engines running
Cisco IOS Release 12.2(50)SG
If the switch were to run a supervisor switchover while in this state, the host's MAC address would not be present in the new active supervisor engine’s MAC address table, causing possible connectivity interruption on the host.
Workaround: Enter the shutdown command, followed by the no shutdown command on the interface. This triggers relearning and synchronizing of the host's MAC to the standby supervisor engine. CSCsw91661
The queue transmit counters as well as the policing statistics (if any) are correct. CSCsz20149
This only happens when the switch is running network mobility service protocol (nmsp). It does not happen if the phone is CDP enabled.
Workaround: Use the VLAN ID or name to differentiate the IP phone and the PC sitting behind the phone on the WCS.
The IP phone is detected on the voice VLAN, and the displayed information of serial number, model number, and software version is correct. However, a PC sitting behind the phone is detected on a data VLAN, and the displayed device information is wrong and should be ignored.
Prior to Cisco IOS Release 12.2(53)SG1 and 12.2(50)SG6, the switchport block multicast command blocks IP Multicast, Layer 2 multicast, and broadcast traffic. CSCta61825
Despite the different default value, you can configure any value in the time range.
Workarounds: The Cisco switch default link-flap detection value is 5 flaps in 10 seconds. Use the default value or larger numbers. CSCtg07677
Similarly, the show epm sessions command always displays the authentication method as DOT1X.
Workaround: To view the authentication method used for a client, enter the
show authentication sessions command. CSCsx42157
Workaround: Configure both dead-criteria and deadtime.
Workaround: Enter shut and no shut on the port to synchronize the STP state. CSCtf52437
Workaround: After the switch reloads, enter shut and no shut on the port-channel interface.
Workaround: Shut down the CE-facing interface. After all of the mask-value entries point to the target CE, unshut the CE-facing interface. CSCtl09941
Workaround: Remove these operators from any dynamic ACLs. CSCts05302
Workaround: Reinsert the X2. CSCsk43618
Workaround: Enter the show policy-map interface command to find the actual burst value programmed. CSCsi71036
If you enter the show policy-map name, however, the unconditional marking actions appear. CSCsi94144
This behavior occurs in a redundant switch when the active supervisor engine is running Cisco IOS, the standby supervisor engine is in ROMMON, and the standby supervisor engine’s ROMMON is upgraded from version 0.34 or to a later version. The upgrade process causes the uplinks on the standby supervisor engine to go down but the active supervisor engine is unaware of this.
Workarounds: To resume normal operation, do one of the following:
– Reload both supervisor engines with the redundancy reload shelf command.
– Power-cycle the standby supervisor engine by briefly pulling it from the chassis.
There is no workaround for the link flap issue. CSCsm81875
This problem can happen when pause frames are sent to a switch port and the flow control receive configuration is toggled on a 10-Gigabit Ethernet port.
Workaround: Change the flow control receive configuration when no traffic exists. CSCso71647
You only see this behavior if you initially did not allocate a VLAN before you configure the IFM, and then later allocate the same VLAN.
Workaround: Unconfigure, and then reconfigure the IFM on the port.
Workaround: Disable native VLAN tagging on the trunk port of the switch by entering the
no switchport trunk native vlan tag command. CSCsz12611
Workaround: No functional impact.
You must wait for the ACLs to be programmed before performing other TCAM related changes. CSCtd57063
Workaround: Reduce the number of VLAN mappings. CSCtn56208
Workaround: Configure IP multicast routing globally and establish IP PIM sparse dense mode on the CE-facing interface. CSCtl97692
Workaround: Unconfigure and reconfigure the service group. CSCtn88087
Workaround: Enable a Layer 3 interface in the running configuration. CSCsc88636.
– Links flap for various Layer 3 protocols.
– A traffic loss of several seconds is observed during the upgrade process.
Workaround: Do not use the quick option with the issu changeversion command. CSCto51562
Workaround: Enter shut and no shut on the port. CSCts29515
A Cisco IOS AAA client uses the PAC secret to compute the authenticator; Cisco Secure ACS 5.2 uses the shared secret. This behavior causes a mismatch that results in a rejection of the accounting message, and the client marks the server as unresponsive.
Workaround: None. You must disable 802.1X accounting. CSCts26844
Mediatrace cannot find the correct inbound interface and applies the dynamic policy on a different interface from the one used for media flow.
The impact of stale dynamic access lists is to monitor unwanted traffic.
– If the switchover is scheduled, remove the scheduled session on the initiator. Reschedule the session after the new active supervisor engine boots on the responder.
– If the Mediatrace responder SSO is not planned, after the new active supervisor engine boots, manually delete the stale dynamic access lists. CSCty75070
Workaround: Do not specify a "bfd" suffix with the snmp-server host x.x.x.x configuration command. CSCtx51561
Workaround: Configure hw-module uplink shared-backplane from the console or vty, and enter write mem. CSCtx43568
This message is not observed during a system bootup.
Workaround: None required. This message is information only. CSCtz15738
Workaround: Reset the linecard either with the hw-module module m reset command or through a manual OIR. CSCuc64146
The power supply or power supply inputs are incorrectly listed as 110V when they should be list as 220V. The power supply may go into an err-disable state if only one power supply has the issue. If both power supplies have the issue and are both recognized as 110V, they will not go into an err-disable state. Additionally, other modules in the switch might be denied power and will not power on.
Workaround: Remove the power supply inputs, remove or reinsert the power supply, then restore the power supply inputs. CSCuc07562
However, you can perform an upgrade from Cisco IOS 15.0(2)SG5 to 15.1(1)SG2 or from Cisco IOS 15.0(2)SG5 to 15.1(2)SG.
– Use RPR for Cisco IOS 15.0(2)SG5 or 15.1(1)SG1 combinations (upgrade or downgrade).
– Downgrade from Cisco IOS 15.1(1)SG1; using 15.0(2)SG4 or an earlier release.
– Upgrade from Cisco IOS 15.0(2)SG5; use 15.1(1)SG2 instead.
Workaround: Disable IGMP snooping. CSCuc65538
Workaround: Disable CDP on interfaces that may flap frequently. CSCub85948
This section lists the resolved caveats in Cisco Release 15.1(1)SG1:
Workaround: None. Consider using a physical interface pointing towards RP upstream.
Workaround: None. The message is information only. CSCtw93140
– A switchport is configured with both of the following:
authentication event server dead action authorize...
authentication event server alive action reinitalize
– The RADIUS server was down previously, and a port without traffic (for example: a hub with no devices attached) was authorized into the inaccessible authentication bypass (IAB) VLAN without an associated MAC address.
– The RADIUS server becomes available again, and a dot1x client attempts to authenticate.
The show platform software interface tx-queue command will display an incorrect number of configured queues (compare to EtherChannel members that are not dropping traffic).
Workaround: Enter shut then no shut on the port. CSCua66962
Workaround: Downgrade or upgrade the supervisor engine by either temporarily removing the other supervisor engine or relocating the supervisor engine to another chassis. CSCtz44577
Workaround: Enter shut then no shut on the port. CSCtz94862
– Connect a non-PoE device to the port
– Enter shut then no shut on the port. CSCua63562
Cisco has released free software updates that address this vulnerability.
Workarounds that mitigate this vulnerability are not available.
This advisory is available at the following link:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120926-ecc
Cisco has released free software updates that address this vulnerability. A workaround that mitigates this vulnerability is available. This advisory is available at the following link:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120926-dhcp
This section lists the open caveats for Cisco IOS Release 15.1(1)SG:
– If such a certificate does not exist and the device's hostname and default_domain are set, then a persistent self-signed certificate is generated.
– If such a certificate exists, the FQDN in the certificate is compared with the current device's hostname and default_domain. If either differs from the FQDN in the certificate, the existing persistent self-signed certificate is replaced with a new one with the updated FQDN. Be aware that the existing key pair is used in the new certificate.
On a switch that supports redundancy, the generation of the self-signed certificate occurs independently on the active and the standby supervisor engines, and the certificates differ. After switchover, the HTTP client that holds the old certificate cannot connect to the HTTPS server.
Workaround: Reconnect. CSCsb11964
This does not affect performance.
Workaround: Enter the no shutdown command. CSCsg27395
Workaround: Remove the transceiver from the new port and place it in the old port. After the SFP is recognized in the old port, remove it slowly and insert it in the new port. (CSCse34693)
Workaround: None. This is an informational message. CSCsi60898
Workarounds: Do one of the following:
– After a reload, copy the startup-config to the running-config.
– Use a loopback interface as the target of the ip unnumbered command.
– Change the CLI configuration so that during bootup the router port is created first.
Workaround: When the port channel starts to flap, enter shut and no shut on the port channel. After the first switchover and after deleting the port channel, create a new channel. CSCsr00333
Workaround: Configure an ISL/dot1q trunk port. CSCsu43445
Workaround: Do one of the following:
– Reload the standby switch again with the line card in place.
– Remove and reenter the commands on the active supervisor engine. The standby supervisor engine will acquire this change. CSCsv44866
This applies to classic or E-series Catalyst 4500 supervisor engines running
Cisco IOS Release 12.2(50)SG
If the switch were to run a supervisor switchover while in this state, the host's MAC address would not be present in the new active supervisor engine’s MAC address table, causing possible connectivity interruption on the host.
Workaround: Enter the shutdown command, followed by the no shutdown command on the interface. This triggers relearning and synchronizing of the host's MAC to the standby supervisor engine. CSCsw91661
The queue transmit counters as well as the policing statistics (if any) are correct. CSCsz20149
This only happens when the switch is running network mobility service protocol (nmsp). It does not happen if the phone is CDP enabled.
Workaround: Use the VLAN ID or name to differentiate the IP phone and the PC sitting behind the phone on the WCS.
The IP phone is detected on the voice VLAN, and the displayed information of serial number, model number, and software version is correct. However, a PC sitting behind the phone is detected on a data VLAN, and the displayed device information is wrong and should be ignored.
Prior to Cisco IOS Release 12.2(53)SG1 and 12.2(50)SG6, the switchport block multicast command blocks IP Multicast, Layer 2 multicast, and broadcast traffic. CSCta61825
Despite the different default value, you can configure any value in the time range.
Workarounds: The Cisco switch default link-flap detection value is 5 flaps in 10 seconds. Use the default value or larger numbers. CSCtg07677
Similarly, the show epm sessions command always displays the authentication method as DOT1X.
Workaround: To view the authentication method used for a client, enter the
show authentication sessions command. CSCsx42157
Workaround: Configure both dead-criteria and deadtime.
Workaround: Enter shut and no shut on the port to synchronize the STP state. CSCtf52437
Workaround: After the switch reloads, enter shut and no shut on the port-channel interface.
Workaround: Shut down the CE-facing interface. After all of the mask-value entries point to the target CE, unshut the CE-facing interface. CSCtl09941
Workaround: Remove these operators from any dynamic ACLs. CSCts05302
Workaround: Reinsert the X2. CSCsk43618
Workaround: Enter the show policy-map interface command to find the actual burst value programmed. CSCsi71036
If you enter the show policy-map name, however, the unconditional marking actions appear. CSCsi94144
This behavior occurs in a redundant switch when the active supervisor engine is running Cisco IOS, the standby supervisor engine is in ROMMON, and the standby supervisor engine’s ROMMON is upgraded from version 0.34 or to a later version. The upgrade process causes the uplinks on the standby supervisor engine to go down but the active supervisor engine is unaware of this.
Workarounds: To resume normal operation, do one of the following:
– Reload both supervisor engines with the redundancy reload shelf command.
– Power-cycle the standby supervisor engine by briefly pulling it from the chassis.
There is no workaround for the link flap issue. CSCsm81875
This problem can happen when pause frames are sent to a switch port and the flow control receive configuration is toggled on a 10-Gigabit Ethernet port.
Workaround: Change the flow control receive configuration when no traffic exists. CSCso71647
You only see this behavior if you initially did not allocate a VLAN before you configure the IFM, and then later allocate the same VLAN.
Workaround: Unconfigure, and then reconfigure the IFM on the port.
Workaround: Disable native VLAN tagging on the trunk port of the switch by entering the
no switchport trunk native vlan tag command. CSCsz12611
Workaround: No functional impact.
You must wait for the ACLs to be programmed before performing other TCAM related changes. CSCtd57063
Workaround: Reduce the number of VLAN mappings. CSCtn56208
Workaround: Configure IP multicast routing globally and establish IP PIM sparse dense mode on the CE-facing interface. CSCtl97692
Workaround: Unconfigure and reconfigure the service group. CSCtn88087
Workaround: Enable a Layer 3 interface in the running configuration. CSCsc88636.
– Links flap for various Layer 3 protocols.
– A traffic loss of several seconds is observed during the upgrade process.
Workaround: Do not use the quick option with the issu changeversion command. CSCto51562
Workaround: Enter shut and no shut on the port. CSCts29515
A Cisco IOS AAA client uses the PAC secret to compute the authenticator; Cisco Secure ACS 5.2 uses the shared secret. This behavior causes a mismatch that results in a rejection of the accounting message, and the client marks the server as unresponsive.
Workaround: None. You must disable 802.1X accounting. CSCts26844
Mediatrace cannot find the correct inbound interface and applies the dynamic policy on a different interface from the one used for media flow.
The impact of stale dynamic access lists is to monitor unwanted traffic.
– If the switchover is scheduled, remove the scheduled session on the initiator. Reschedule the session after the new active supervisor engine boots on the responder.
– If the Mediatrace responder SSO is not planned, after the new active supervisor engine boots, manually delete the stale dynamic access lists. CSCty75070
Workaround: Do not specify a "bfd" suffix with the snmp-server host x.x.x.x configuration command. CSCtx51561
Workaround: Configure hw-module uplink shared-backplane from the console or vty, and enter write mem. CSCtx43568
Workaround: None. Consider using a physical interface pointing towards RP upstream.
This message is not observed during a system bootup.
Workaround: None required. This message is information only. CSCtz15738
Workaround: None. The message is information only. CSCtw93140
– A switchport is configured with both of the following:
authentication event server dead action authorize...
authentication event server alive action reinitalize
– The RADIUS server was down previously, and a port without traffic (for example: a hub with no devices attached) was authorized into the inaccessible authentication bypass (IAB) VLAN without an associated MAC address.
– The RADIUS server becomes available again, and a dot1x client attempts to authenticate.
The show platform software interface tx-queue command will display an incorrect number of configured queues (compare to EtherChannel members that are not dropping traffic).
Workaround: Enter shut then no shut on the port. CSCua66962
Workaround: Downgrade or upgrade the supervisor engine by either temporarily removing the other supervisor engine or relocating the supervisor engine to another chassis. CSCtz44577
Workaround: Enter shut then no shut on the port. CSCtz94862
– Connect a non-PoE device to the port
– Enter shut then no shut on the port. CSCua63562
Workaround: Reset the linecard either with the hw-module module m reset command or through a manual OIR. CSCuc64146
Workaround: Disable IGMP snooping. CSCuc65538
Workaround: Disable CDP on interfaces that may flap frequently. CSCub85948
This section lists the resolved caveats in Release 15.1(1)SG:
These sections provide troubleshooting guidelines for the Catalyst 4000 family running IOS supervisor engines:
Netbooting using a boot loader image is not supported. Instead, use one of the following options to boot an image:
1. Boot from a CompactFlash card by entering the following command:
The ROMMON TFTP boot is very similar to the BOOTLDR TFTP boot, except that:
– the BOOTLDR variable should not be set
– the TFTP server must be accessible from the Ethernet management port on the supervisor engine.
To boot from ROMMON, perform the following tasks while in ROMMON mode:
a. Ensure that the Ethernet management port on the supervisor engine is physically connected to the network.
b. Verify that bootloader environment is not set by entering the unset bootldr command.
c. Set IP address of the Ethernet management port on the supervisor engine by entering the following command: set interface fa1 ip_address > < ip_mask
For example, to set the supervisor engine Ethernet port with an IP address 172.16.1.5 and IP mask 255.255.255.0, enter the following command:
d. Set default gateway for the Ethernet management port on the supervisor engine by entering the following command: set ip route default gateway_ip_address. The default gateway should be directly connected to the supervisor engine Ethernet management port subnet.
e. Ping the TFTP server to ensure that there is connectivity to the server from the Ethernet management port on the supervisor engine by entering the following command: ping < tftp_server_ip_address >.
f. Once the ping is successful, boot the image from the TFTP server by entering the following command: boot tftp:// tftp_server_ip_address > / < image_path_and_file_name
For example, to boot the image name cat4000-is-mz.160 located on the TFTP server 172.16.1.8, enter the following command:
This section contains troubleshooting guidelines for system-level problems:
This section contains troubleshooting guidelines for modules:
For general information on MIBs, RMON groups, and traps, refer to the Cisco public MIB directory ( http://www.cisco.com/public/sw-center/netmgmt/cmtk/mibs.shtml). For information on the specific MIBs supported by the Catalyst 4500 series switches, refer to the Catalyst 4000 MIB Support List located at ftp://ftp.cisco.com/pub/mibs/supportlists/cat4000/cat4000-supportlist.html.
Although their Release Notes are unique, the 4 platforms (Catalyst 4500, Catalyst 4900, Catalyst ME 4900, and Catalyst 4900M) use the same Software Configuration Guide, Command Reference Guide, and System Message Guide. Refer to the following home pages for additional information:
http://www.cisco.com/go/cat4500/docs
http://www.cisco.com/go/cat4900/docs
http://www.cisco.com/en/US/products/ps7009/tsd_products_support_series_home.html
Installation guides and notes including specifications and relevant safety information are available at the following URLs:
http://www.cisco.com/en/US/docs/switches/lan/catalyst4500/hardware/installation/guide/78-14409-08/4500inst.html
http://www.cisco.com/en/US/docs/switches/lan/catalyst4500/hardware/catalyst4500e/installation/guide/Eseries.html
http://www.cisco.com/en/US/products/hw/switches/ps4324/prod_installation_guides_list.html
http://www.cisco.com/en/US/docs/switches/lan/catalyst4500/hardware/regulatory/compliance/78_13233.html
http://www.cisco.com/en/US/products/hw/switches/ps4324/prod_installation_guides_list.html
http://www.cisco.com/en/US/products/ps6021/prod_installation_guides_list.html
http://www.cisco.com/en/US/products/ps7009/prod_installation_guides_list.html
Software release notes, configuration guides, command references, and system message guides are available at the following URLs:
http://www.cisco.com/en/US/products/hw/switches/ps4324/prod_release_notes_list.html
http://www.cisco.com/en/US/products/ps6021/prod_release_notes_list.html
http://www.cisco.com/en/US/docs/switches/lan/catalyst4500/release/note/OL_11511.html
Software documents for the Catalyst 4500 Classic, Catalyst 4500 E-Series, Catalyst 4900, and
Cisco ME 4900 Series Ethernet Switches are available at the following URLs:
http://www.cisco.com/en/US/products/hw/switches/ps4324/products_installation_and_configuration_guides_list.html
http://www.cisco.com/en/US/products/hw/switches/ps4324/prod_command_reference_list.html
http://www.cisco.com/en/US/products/hw/switches/ps4324/products_system_message_guides_list.html
Platform-independent Cisco IOS documentation may also apply to the Catalyst 4500 and 4900 switches. These documents are available at the following URLs:
http://www.cisco.com/en/US/products/ps6350/products_installation_and_configuration_guides_list.html
http://www.cisco.com/en/US/products/ps6350/prod_command_reference_list.html
You can also use the Command Lookup Tool at:
http://tools.cisco.com/Support/CLILookup/cltSearchAction.do
http://www.cisco.com/en/US/products/ps6350/products_system_message_guides_list.html
You can also use the Error Message Decoder tool at:
http://www.cisco.com/pcgi-bin/Support/Errordecoder/index.cgi
http://www.cisco.com/public/sw-center/netmgmt/cmtk/mibs.shtml
The following notices pertain to this software license.
This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit ( http://www.openssl.org/).
This product includes cryptographic software written by Eric Young (eay@cryptsoft.com).
This product includes software written by Tim Hudson (tjh@cryptsoft.com).
The OpenSSL toolkit stays under a dual license, i.e. both the conditions of the OpenSSL License and the original SSLeay license apply to the toolkit. See below for the actual license texts. Actually both licenses are BSD-style Open Source licenses. In case of any license issues related to OpenSSL please contact openssl-core@openssl.org.
Copyright © 1998-2007 The OpenSSL Project. All rights reserved.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:
1. Redistributions of source code must retain the copyright notice, this list of conditions and the following disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions, and the following disclaimer in the documentation or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgment: “This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit ( http://www.openssl.org/)”.
4. The names “OpenSSL Toolkit” and “OpenSSL Project” must not be used to endorse or promote products derived from this software without prior written permission. For written permission, please contact openssl-core@openssl.org.
5. Products derived from this software may not be called “OpenSSL” nor may “OpenSSL” appear in their names without prior written permission of the OpenSSL Project.
6. Redistributions of any form whatsoever must retain the following acknowledgment:
“This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit ( http://www.openssl.org/)”.
THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT “AS IS”' AND ANY EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
This product includes cryptographic software written by Eric Young (eay@cryptsoft.com). This product includes software written by Tim Hudson (tjh@cryptsoft.com).
Copyright © 1995-1998 Eric Young (eay@cryptsoft.com). All rights reserved.
This package is an SSL implementation written by Eric Young (eay@cryptsoft.com).
The implementation was written so as to conform with Netscapes SSL.
This library is free for commercial and non-commercial use as long as the following conditions are adhered to. The following conditions apply to all code found in this distribution, be it the RC4, RSA, lhash, DES, etc., code; not just the SSL code. The SSL documentation included with this distribution is covered by the same copyright terms except that the holder is Tim Hudson (tjh@cryptsoft.com).
Copyright remains Eric Young’s, and as such any Copyright notices in the code are not to be removed. If this package is used in a product, Eric Young should be given attribution as the author of the parts of the library used. This can be in the form of a textual message at program startup or in documentation (online or textual) provided with the package.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:
1. Redistributions of source code must retain the copyright notice, this list of conditions and the following disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
“This product includes cryptographic software written by Eric Young (eay@cryptsoft.com)”.
The word ‘cryptographic’ can be left out if the routines from the library being used are not cryptography-related.
4. If you include any Windows specific code (or a derivative thereof) from the apps directory (application code) you must include an acknowledgement: “This product includes software written by Tim Hudson (tjh@cryptsoft.com)”.
THIS SOFTWARE IS PROVIDED BY ERIC YOUNG “AS IS” AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
The license and distribution terms for any publicly available version or derivative of this code cannot be changed. i.e. this code cannot simply be copied and put under another distribution license [including the GNU Public License].
For information on obtaining documentation, submitting a service request, and gathering additional information, see the monthly What’s New in Cisco Product Documentation, which also lists all new and revised Cisco technical documentation, at:
http://www.cisco.com/en/US/docs/general/whatsnew/whatsnew.html
Subscribe to the What’s New in Cisco Product Documentation as a Really Simple Syndication (RSS) feed and set content to be delivered directly to your desktop using a reader application. The RSS feeds are a free service and Cisco currently supports RSS Version 2.0.