Supported Hardware on Catalyst 4948E, Catalyst 4948E-F, and Catalyst 4900M Series Switches
Features Not Supported on the Catalyst 4900M, Catalyst 4948E, and Catalyst 4948E-F Series Switches
New Hardware Features in Release 15.1(2)SG
New Software Features in Release 15.1(2)SG
Minimum and Recommended ROMMON Release
Resolved Caveats for Cisco IOS XE Release 15.1(2)SG8
Open Caveats for Cisco IOS XE Release 15.1(2)SG7
Resolved Caveats for Cisco IOS XE Release 15.1(2)SG7
Open Caveats for Cisco IOS XE Release 15.1(2)SG6
Resolved Caveats for Cisco IOS XE Release 15.1(2)SG6
Open Caveats for Cisco IOS Release 15.1(2)SG5
Resolved Caveats for Cisco IOS Release 15.1(2)SG5
Open Caveats in Cisco IOS Release 15.1(2)SG4
Resolved Caveats in Cisco IOS Release 15.1(2)SG4
Open Caveats in Cisco IOS Release 15.1(2)SG3
Resolved Caveats in Cisco IOS Release 15.1(2)SG3
Open Caveats in Cisco IOS Release 15.1(2)SG2
Resolved Caveats in Cisco IOS Release 15.1(2)SG2
Open Caveats in Cisco IOS Release 15.1(2)SG1
Resolved Caveats in Cisco IOS Release 15.1(2)SG1
Open Caveats in Cisco IOS Release 15.1(2)SG
Resolved Caveats in Cisco IOS Release 15.1(2)SG
Obtaining Documentation and Submitting a Service Request
Current Release
IOS 15.1(2)SG8—Nov 11, 2016
Prior release
15.1(2)SG7, 15.1(2)SG6, 15.1(2)SG5, IOS 15.1(2)SG4, IOS 15.1(2)SG3, 15.1(2)SG2, 15.1(2)SG1, 15.1(2)SG
These release notes describe the features, modifications, and caveats for Cisco IOS Release 15.1(2)SG on the Catalyst 4900M switch, the Catalyst 4948E Ethernet Switch, and the Catalyst 4948E-F Ethernet Switch.
Cisco IOS Software Release 15.1(2)SG delivers new software and hardware innovations in campus access and aggregation deployments that span across many technologies including Security, Video, High Availability, Network Virtualization, IP Multicast and Lower TCO as following:
– Lightweight DHCPv6 Relay Agent (LDRA)
– IPv6 Neighbor Discovery Multicast Suppression
– IPv6 Router Advertisement (RA) Guard
– Secure Shell SSH Version 2 Client Support
– Secure Shell SSH Version 2 Server Support
– SSH Keyboard Interactive Authentication
– SSHv2 Enhancements for RSA Keys
Lower Total Cost of Ownership and Ease of Use
Routing and Multicast Enhancements
Cisco Catalyst 4900M Series is a premium extension to the widely deployed Catalyst 4948 Series top of rack Ethernet switches for data center server racks. Optimized for ultimate deployment flexibility, the Catalyst 4900M Series can be deployed for 10/100/1000 server access with 1:1 uplink to downlink oversubscription, mix of 10/100/1000 and 10 Gigabit Ethernet servers or all 10 Gigabit Ethernet servers in the same rack. The Catalyst 4900M is a 320Gbps, 250Mpps, 2RU fixed configuration switch with
8 fixed wire speed X2 ports on the base unit and 2 optional half card slots for deployment flexibility and investment protection. Low latency, scalable buffer memory and high availability with 1+1 hot swappable AC or DC power supplies and field replaceable fans optimize the Catalyst 4900M for any size of data center.
With Cisco IOS Release 12.2(54)XO, Cisco introduced the Catalyst 4948E Ethernet Switch, which is the first Cisco Catalyst E-Series data center switch built from the start to deliver class-leading, full-featured server-access switching. The switch offers forty-eight 10/100/1000-Gbps RJ45 downlink ports and four 1/10 Gigabit Ethernet uplink ports and is designed to simplify data center architecture and operations by offering service provider-grade hardware and software in a one rack unit (1RU) form factor optimized for full-featured top-of-rack (ToR) data center deployments.
The Cisco Catalyst 4948E Ethernet Switch builds on the advanced technology of the Cisco Catalyst 4948 Switches, the most deployed ToR switch in the industry, with more than 10 million ports deployed worldwide. The Cisco Catalyst E-Series doubles the uplink bandwidth and offers true front-to-back airflow with no side or top venting. Stringent airflow management reduces data center operating costs by providing strict hot-aisle and cold-aisle isolation. Exceptional reliability and serviceability are delivered with optional internal AC and DC 1+1 hot-swappable power supplies and a hot-swappable fan tray with redundant fans.
With Cisco IOS Software Release 12.2(54)WO, Cisco extended the widely deployed Cisco Catalyst® 4948E Ethernet Switch to offer back-to-front airflow with the Cisco Catalyst 4948E-F Switch.
For more information on the Catalyst 4900M, Catalyst 4948E and Catalyst4948E-F Ethernet Switches, visit:
http://www.cisco.com/en/US/products/ps6021/index.html .
Note Although their Release Notes are unique, the platforms Catalyst 4900M/Catalyst 4948E/Catalyst 4948E-F and Catalyst 4500 leverage the same Software Configuration Guide, Command Reference Guide, and System Message Guide.
The Enterprise Services image supports Cisco Catalyst 4948E, Catalyst 4948E-F and Catalyst 4900M Ethernet Switch Series software features based on Cisco IOS Software 15.1(2)SG, including enhanced routing. BGP capability is included in the Enterprises Services package.
The IP Base image supports Open Shortest Path First (OSPF) for Routed Access, Enhanced Interior Gateway Routing Protocol (EIGRP) "limited" Stub Routing, Nonstop Forwarding/Stateful Switchover (NSF/SSO), and RIPv1/v2. The IP Base image does not support enhanced routing features such as BGP, Intermediate System-to-Intermediate System (IS-IS), Internetwork Packet Exchange (IPX), AppleTalk, Virtual Routing Forwarding (VRF-lite), GLBP, and policy-based routing (PBR).
The LAN Base image complements the existing IP Base and Enterprise Services images. It is focused on customer access and Layer 2 requirements and therefore many of the IP Base features are not required. The IP upgrade image is available if at a later date you require some of those features. The Cisco Catalyst 4900M Switch Series only supports the IP Base and Enterprise Services images.
Starting with Cisco IOS Release 15.0(2)SG, on Catalyst 4900M, Catalyst 4948E and Catalyst 4948E-F, support for NEAT feature has been extended from IP Base to LAN Base and support for HSRP v2 IPV6 has been extended from Enterprise Services to IP Base.
Starting with Cisco IOS Release 15.1(1)SG, support for IP SLAs and NSF has been extended from Enterprise Services to IP Base.
Note The default image for WS-4900M, WS-C4948E, and WS-C4948E-F is IP Base.
Customers with Catalyst 4948E, Catalyst 4948E-F and Catalyst 4900M series switches who need the latest hardware support and software features should migrate to Cisco IOS Release 15.1(2)SG.
The Catalyst 4900M Series Switch has three maintenance trains: 12.2(53)SGx, 15.0(2)SGx and 15.1(2)SGx. The Catalyst 4948E/E-F switches have two maintenance trains: 15.0(2)SGx and 15.1(2)SGx.
Figure 1 displays the three active trains, 12.2(53)SG, 15.0(2)SG and 15.1(2)SG.
Note Support for the Catalyst 4900M platform was introduced in Cisco IOS 12.2(40)XO. Support for the Catalyst 4948E platform was introduced in Cisco IOS 12.2(54)XO. Support for the Catalyst 4948E-F platform was introduced in Cisco IOS 12.2(54)SG1.
Figure 1 Software Release Strategy for the Catalyst 4900M, Catalyst 4948E, Catalyst 4948E-F Series Switches
Support for Cisco IOS Software Release 15.1(2)SG follows the standard Cisco Systems® support policy, available at
http://www.cisco.com/en/US/products/products_end-of-life_policy.html
This section describes the system requirements on the Catalyst 4948E, Catalyst 4948E-F, and Catalyst 4900M Series Switches:
For details on Catalyst 4900M, Catalyst 4948E, and Catalyst 4948E-F switch transceiver module compatibility, see the url:
http://www.cisco.com/en/US/products/hw/modules/ps5455/products_device_support_tables_list.html
The following table lists the hardware supported on the Catalyst 4900M, Catalyst 4948E, and Catalyst 4948E-F Series Switches.
8-Port Wire-Speed 10 Gigabit Ethernet (RJ-45) Note This linecard is not supported on the Catalyst 4948E Ethernet Switch. |
|
The following table lists the hardware supported on the Catalyst 4948E Ethernet Switch.
The following table lists the hardware supported on the Catalyst 4948E-F Ethernet Switch.
Note The default image for the Catalyst 4900M Series Switch is Cisco IOS Release 12.2(53)SG4. The default image for the Catalyst 4948E Ethernet Switch and the Catalyst 4948E-F Ethernet Switch is 12.2(54)SG1.
Table 4 lists the Cisco IOS software features for the Catalyst 4948E, Catalyst 4948E-F and Catalyst 4900M series switches. For the full list of supported features, check the Feature Navigator application:
http://tools.cisco.com/ITDIT/CFN/
Bidirectional Forwarding Detection (BFD) Hardware Offload Support |
|||
Crashdump Enhancement1 |
|||
IEEE 802.1ag D8.1 standard Compliant CFM, Y.1731 multicast LBM / AIS / RDI / LCK, IP SLA for Ethernet |
|||
IEEE 802.1s Multiple Spanning Tree (MST) Standard Compliance |
|||
IEEE 802.3ad Link Aggregation (LACP) Port-Channel Standalone Disable |
|||
IPv6 First Hop Security (FHS): Lightweight DHCPv6 Relay Agent |
|||
IPv6 Multicast: Multicast Listener Discovery (MLD) Protocol, Versions 1 and 2 |
|||
Yes2 |
|||
Yes 2 |
|||
Yes 2 |
|||
IPv6 Switching: CEFv6 Switched Automatic IPv4-compatible Tunnels (in software) |
|||
IPv6 Switching: CEFv6 Switched Configured IPv6 over IPv4 Tunnels (in software) |
|||
IPv6 Tunneling: Automatic IPv4-compatible Tunnels (in software) |
|||
IPv6 Tunneling: Manually Configured IPv6 over IPv4 Tunnels (in software) |
|||
Medianet 2.0: Integrated Video Traffic Simulator (hardware-assisted IP SLA); IPSLA responder only |
|||
Medianet 2.0: Media Monitoring (Performance Monitoring and Mediatrace) |
|||
NEAT Enhancement: Re-Enabling BPDU Guard Based on User Configuration |
|||
Yes 2 |
|||
Yes 2 |
|||
Yes 2 |
|||
Yes 2 |
|||
Yes 2 |
|||
Yes 2 |
|||
Yes 2 |
|||
Yes 2 |
|||
Yes 2 |
|||
Yes 2 |
|||
Yes 2 |
|||
Yes 2 |
|||
Yes 2 |
|||
Yes 2 |
|||
Yes 2 |
|||
RADIUS Attribute 44 (Accounting Session ID) in Access Requests |
|||
Source Specific Multicast (SSM) - IGMPv3,IGMP v3lite, and URD |
|||
Time Domain Reflectometry (TDR)3 |
|||
VLAN Mapping (VLAN Translation)4 |
|||
For information on MIB support, please refer to this URL:
http://ftp.cisco.com/pub/mibs/supportlists/cat4000/cat4000-supportlist.html
These features are not supported in Cisco IOS Release 15.1(2)SG on Catalyst 4900M, Catalyst 4948E, and Catalyst 4948E-L Series Switches:
– Standard Xerox Network System (XNS) access list
– Protocol type-code access list
– <1200-1299> IPX summary address access list
These sections describe the new and changed information for the Catalyst 4948E, Catalyst 4948E-F and the Catalyst 4900M series switches running Cisco IOS software:
Release 15.1(2)SG provides the following new hardware on the Catalyst 4948E, Catalyst 4948E-F and the Catalyst 4900M series switches:
Release 15.1(2)SG provides the following new software on the Catalyst 4948E, Catalyst 4948E-F and the Catalyst 4900M series switches:
– Lightweight DHCPv6 Relay Agent (LDRA)
– IPv6 Neighbor Discovery Multicast Suppression
– IPv6 Router Advertisement (RA) Guard
– Secure Shell SSH Version 2 Client Support
– Secure Shell SSH Version 2 Server Support
– SSH Keyboard Interactive Authentication
– SSHv2 Enhancements for RSA Keys
Lower Total Cost of Ownership and Ease of Use
Table 6 lists the minimum and recommended ROMMON releases for the Catalyst 4900M Series Switch, Catalyst 4948E Ethernet Switch, and Catalyst 4948E-F Ethernet Switch.
Note ROMMON Release 12.2(44r)SG5 is the minimum required to run Cisco IOS Release 15.0(2)SG and is recommended for other releases.
Following limitations and restrictions apply to the Cisco Catalyst 4948E, Catalyst 4948E-F and the Catalyst 4900M series switches:
Workaround: Display the configuration with the show standby command, then remove the CLI. Here is sample output of the show standby GigabitEthernet1/1 command:
Use the standby delay reload option if the router is rebooting after reloading the image.
– The verify and squeeze commands are not supported.
– The rename command is supported in FAT file system.
For the Cisco Catalyst 4948E, Catalyst 4948E-F and the Catalyst 4900M series switches, the rename command has been added for bootflash and slot0. For all other supervisor engines, the rename command is supported for nvram devices only.
– the fsck command is supported for slot0 device. It is not supported in the file systems on supervisor engines other than 6-E.
– In the FAT file system, the IOS format bootflash: command erases user files only. It does not erase system configuration.
– The FAT file system supports a maximum of 63 characters for file/directory name. The maximum for path length is 127 characters.
– The FAT file system does not support the following characters in file/directory names:{}#%^ and space characters.
– The FAT file system honors the Microsoft Windows file attribute of "read-only" and "read-write", but it does not support the Windows file "hidden" attribute.
– Supervisor Engine 6-E uses the FAT file system for compact flash (slot0). If a compact flash is not formatted in FAT file system (such as compact flash on a supervisor engine other than 6-E), the switch does not recognize it.
If this message appears, check that there is network connectivity between the switch and the ACS. You should also check that the switch has been properly configured as an AAA client on the ACS.
– As IPSG learns the static hosts on each interface, the switch CPU may hit 100 per cent if there are a large number of hosts to learn. The CPU usage will drop once the hosts are learned.
– IPSG violations for static hosts are printed as they occur. If multiple violations occur simultaneously on different interfaces, the CLI displays the last violation. For example, if IPSG is configured for 10 ports and violations exist on ports 3,6 and 9, the violation messages are printed only for port 9.
– Inactive host bindings will appear in the device tracking table when either a VLAN is associated with another port or a port is removed from a VLAN. So, as hosts are moved across subnets, the hosts are displayed in the device tracking table as INACTIVE.
– Autostate SVI does not work on EtherChannel.
In such a scenario, the ipv6 MTU value programmed in hardware will be different from the ipv6 interface MTU value. This will happen if there is no room in the hw MTU table to store additional values.
You must free up some space in the table by unconfiguring some unused MTU values and subsequently disable/re-enable ipv6 on the interface or reapply the MTU configuration.
To enable IPSG with Static Hosts on a port, issue the following commands:
Note The issue above also applies to IPSG with Static Hosts on a PVLAN Host port.
– Fast UDLD is disabled by default.
– Configure fast UDLD only on point-to-point links between network devices that support fast UDLD.
– You can configure fast UDLD in either normal or aggressive mode.
– Do not enter the link debounce command on fast UDLD ports.
– Configure fast UDLD on at least two links between each connected network device. This reduces the likelihood of fast UDLD incorrectly error disabling a link due to false positives.
– Fast UDLD does not report a unidirectional link if the same error occurs simultaneously on more than one link to the same neighbor device.
– The Cisco Catalyst 4948E, Catalyst 4948E-F and the Catalyst 4900M series switches support fast UDLD on a maximum of 32 ports.
The outputs of certain commands, such as show ip route and show access-lists, contain non-deterministic text. While the output is easily understood, the output text does not contain strings that are consistently output. A general purpose specification file entry is unable to parse all possible output.
While a general purpose specification file entry may not be possible, a specification file entry might be created that returns the desired text by searching for text that is guaranteed to be in the output. If a string is guaranteed to be in the output, it can be used for parsing.
For example, the output of the show ip access-lists SecWiz_Gi3_17_out_ip command is this:
The first line is easily parsed because access list is guaranteed to be in the output:
The remaining lines all contain the term host. As a result, the specification file may report the desired values by specifying that string. For example, this line
will produce the following for the first and second rules
and the following for the third statement
Request the output of the show running-config command using NETCONF and parse that output for the desired strings. This is useful when the desired lines contain nothing in common. For example, the rules in this access list do not contain a common string and the order (three permits, then a deny, then another permit), prevent the spec file entry from using permit as a search string, as in the following example:
The XML output of show running-config command includes the following, which can then be parsed programmatically, as desired:
Workaround: Use the show version command. CSCtr30294
Workaround: Select an alternate destination or source port. CSCty05405
Workaround: If you plan to change a class-map action, such as exceed-action, you meed to remove the class-map with the no class c1 command under policy-map submode. Then, apply the new class-map with the updated changes. CSCsk70826)
Workaround: None. However, if you enter the show policy-map name, the unconditional marking actions are displayed. CSCsi94144
Workarounds: Do one of the following:
– After a reload, copy the startup-config to the running-config.
– Use a loopback interface as the target of the ip unnumbered command
– Change the CLI configuration such that during bootup, the router port is created first.
This applies to classic or E-series Catalyst 4500 supervisor engines running
Cisco IOS Release 12.2(50)SG
If the switch were to run a supervisor switchover while in this state, the host's MAC address would not be present in the new active supervisor engine’s MAC address table, causing possible connectivity interruption on the host.
Workaround: Enter the shutdown command, followed by the no shutdown command on the interface. This triggers relearning and synchronizing of the host's MAC to the standby supervisor engine. CSCsw91661
To observe this issue, the following CLIs are configured with window size as the period for monitoring the errors and a low threshold equal to the number of CRC errored seconds seen/expected.
Workaround: Configure a lower value of low threshold such that the frame errors are seen divided into the expected number of frame errored seconds. CSCsy37181
– Fast UDLD peer switch performs SSO.
– Fast UDLD peer switch is reloaded.
– One or more interfaces on a fast UDLD peer switch are shut down (or the port mode changes from switchport to routed, and vice versa).
Note To reduce the likelihood of this event, connect at least two physical interfaces between fast UDLD peer switches. You must configure the interfaces with the same neighbor fast hello interval.
– Reset the error disabled links with the udld reset command.
– Configure error disable recovery with the commands errdisable recovery cause udld and
errdisable recovery interval value (between 30 and 86400 sec).
– Manually clear errdisable on the local interface with a shutdown then a no shutdown.
Workarounds: The Cisco switch default link-flap detection value is 5 flaps in 10 seconds. Use the default value or larger numbers. CSCtg07677
Similarly, the show epm sessions command always displays the authentication method as DOT1X.
Workaround: To view the authentication method used for a client, enter the
show authentication sessions command. CSCsx42157
Workaround: Configure both dead-criteria and deadtime.
Workaround: Reduce the number of VLAN mappings. CSCtn56208
Workaround: Unconfigure and reconfigure the service group. CSCtn88087
This issue only impacts Catalyst 4948E and Catalyst 4948E-F Ethernet Switches.
Workaround: Enable a Layer 3 interface in the running config. CSCsc88636.
Workaround: None. The ip pim register-rate-limit command does not function. CSCub32679
Workaround: Turn off ICMP redirect through the ip redirect command. CSCua71929
You will not experience this behavior with IPv4 access lists.
Workaround: During IPv6 access-list configuration, configure at least one IPv6 ACE before the "hardware statistics" statement. CSCuc53234
Workaround: Apply FHS policies on a non EtherChannel port rather than a VLAN. CSCua53148
Caveats describe unexpected behavior in Cisco IOS releases. Caveats listed as open in a prior release are carried forward to the next release as either open or resolved.
For the latest information on PSIRTS, refer to the Security Advisories on CCO at the following URL:
http://www.cisco.com/en/US/products/products_security_advisory09186a0080b4a315.shtml
The Bug Search Tool (BST) is the online successor to Bug Toolkit and is designed to improve the effectiveness in network risk management and device troubleshooting. The BST allows partners and customers to search for software bugs based on product, release, and keyword, and aggregates key data such as bug details, product, and version. The tool has a provision to filter bugs based on credentials to provide external and internal bug views for the search input. You can access the tool at: https://tools.cisco.com/bugsearch/.
To view the details of a caveat listed in this document:
This section lists the open caveats in Cisco IOS Release 15.1(2)SG4:
Cisco has analyzed this vulnerability and concluded that while the previously listed products may run a vulnerable version of Bash, there are no exploitation vectors present - therefore, those products are not impacted.
Additional details about these vulnerabilities can be found at http://cve.mitre.org/cve/cve.html
Mediatrace cannot find the correct inbound interface and applies the dynamic policy on a different interface from the one used for media flow.
Workaround: Do not specify a "bfd" suffix with the snmp-server host x.x.x.x configuration command. CSCtx51561
Workaround: Enter the show policy-map interface command. CSCsi71036
Workarounds: Disable IGMP snooping on all the relevant VLANs before disabling it globally.
You only see this symptom if you did not allocate a VLAN before you configure the IFM, then at a later time allocate the same VLAN.
Workaround: Unconfigure, then reconfigure the IFM on the port.
Workaround: For VTP database propagation, configure ISL/dot1q trunk port. CSCsu43445
Prior to Cisco IOS Release 12.2(53)SG1, 12.2(50)SG6, the switchport block multicast command would block IP Multicast, Layer 2 multicast, and broadcast traffic (CSCta61825).
Workaround: Configure ip multicast-routing globally and establish ip pim sparse-dense-mode on the CE-facing interface. CSCtl97692
A Cisco IOS AAA client uses the PAC secret to compute the authenticator; Cisco Secure ACS 5.2 uses the shared secret. This behavior causes a mismatch that results in a rejection of the accounting message, and the client marks the server as unresponsive.
Workaround: Remove the policy from the targets to which it is attached, modify the policy, and re-attach. CSCum58148
This caveat applies to IOS Release 3.04.02.SG, 3.04.03.SG, and 3.04.04SG.
LACP PDU requires OAM to start on the ASR9K side; OAM PDU requires LACP to start on the Catalyst 4500X side. With the above scenario, after a flap the link gets stuck in (Suspended) LACP state on the Catalyst 4500X and in Non-connected state on the ASR9K.
To avoid this behavior, you must manually reconfigure the particular sequence.
– Change the configuration sequence on the 4500X side, such that the LACP packet goes first, followed by OAM PDU:
– Disable EFD on the ASR9K side.
– Toggle OAM on ASR9K side. CSCun11927
Neither issuing shut then no shut nor disabling then re-enabling the NIC port resolves the problem.
– Configure power inline never on the PoE port.
IXIA(01/02) ------ (Gi1/2)C4948E(Ten1/49) ------ (05/02)IXIA
It's easier to observe this output drop with smaller random size packets.
Functionality is not impacted.
Workaround: Reapply the configurations after converting the port. CSCuo24626
Workaround: Remove Flexlink from the neighboring Catalyst 4500 switch. CSCun90931
The exact triggers are unknown.
Workaround: Reapply the configuration when the switch reboots. CSCum71764
This section lists the resolved caveats in Cisco Release 15.1(2)SG4:
This issue does not impact functionality.
You must wait for the ACLs to be programmed before performing other TCAM related changes. CSCtd57063
Workaround: Shutdown the CE-facing interface. Once all the mask-value entries point to the target CE, unshut the CE-facing interface. CSCtl09941
This section lists the open caveats in Cisco IOS Release 15.1(2)SG3:
Workaround: Enter the show policy-map interface command. CSCsi71036
Workarounds: Disable IGMP snooping on all the relevant VLANs before disabling it globally.
Workaround: Unconfigure any generic QOS policies from the system. The QoS policies with the match any attribute cause IPv6 entries to become active. If the switch is a pure Layer 2 device, remove the generic protocol family attributes and narrow it to the protocol family.
You only see this symptom if you did not allocate a VLAN before you configure the IFM, then at a later time allocate the same VLAN.
Workaround: Unconfigure, then reconfigure the IFM on the port.
Workaround: For VTP database propagation, configure ISL/dot1q trunk port. CSCsu43445
The queue transmit counters as well as the policing statistics (if any) are correct. CSCsz20149
Prior to Cisco IOS Release 12.2(53)SG1, 12.2(50)SG6, the switchport block multicast command would block IP Multicast, Layer 2 multicast, and broadcast traffic (CSCta61825).
This issue does not impact functionality.
You must wait for the ACLs to be programmed before performing other TCAM related changes. CSCtd57063
– The SVI (network) is unreachable. If an SVI exists on the ASW, because of the STP flap in the setup as well as the CISP operations, the SVI MAC configuration on the ASW is incorrect.
Workaround: Configure the ASW or any other switch upstream as the root-bridge for all the VLANs. CSCtg71030
Workaround: Shutdown the CE-facing interface. Once all the mask-value entries point to the target CE, unshut the CE-facing interface. CSCtl09941
Workaround: Configure ip multicast-routing globally and establish ip pim sparse-dense-mode on the CE-facing interface. CSCtl97692
Workaround: After the switch reloads, enter shut and no shut on the port-channel interface.
A Cisco IOS AAA client uses the PAC secret to compute the authenticator; Cisco Secure ACS 5.2 uses the shared secret. This behavior causes a mismatch that results in a rejection of the accounting message, and the client marks the server as unresponsive.
Mediatrace cannot find the correct inbound interface and applies the dynamic policy on a different interface from the one used for media flow.
Workaround: Do not specify a "bfd" suffix with the snmp-server host x.x.x.x configuration command. CSCtx51561
This message is not observed during a system bootup.
Workaround: None required. This message is information only. CSCtz15738
This section lists the resolved caveats in Cisco Release 15.1(2)SG3:
– Ensure that the dot1x supplicant always authenticates before MAB.
– Create MAB policies for dot1x hosts that do not supply a URL redirect. CSCui79988
This section lists the open caveats in Cisco IOS Release 15.1(2)SG2:
Workaround: Enter the show policy-map interface command. CSCsi71036
Workarounds: Disable IGMP snooping on all the relevant VLANs before disabling it globally.
Workaround: Unconfigure any generic QOS policies from the system. The QoS policies with the match any attribute cause IPv6 entries to become active. If the switch is a pure Layer 2 device, remove the generic protocol family attributes and narrow it to the protocol family.
You only see this symptom if you did not allocate a VLAN before you configure the IFM, then at a later time allocate the same VLAN.
Workaround: Unconfigure, then reconfigure the IFM on the port.
Workaround: For VTP database propagation, configure ISL/dot1q trunk port. CSCsu43445
The queue transmit counters as well as the policing statistics (if any) are correct. CSCsz20149
Prior to Cisco IOS Release 12.2(53)SG1, 12.2(50)SG6, the switchport block multicast command would block IP Multicast, Layer 2 multicast, and broadcast traffic (CSCta61825).
This issue does not impact functionality.
You must wait for the ACLs to be programmed before performing other TCAM related changes. CSCtd57063
– The SVI (network) is unreachable. If an SVI exists on the ASW, because of the STP flap in the setup as well as the CISP operations, the SVI MAC configuration on the ASW is incorrect.
Workaround: Configure the ASW or any other switch upstream as the root-bridge for all the VLANs. CSCtg71030
Workaround: Shutdown the CE-facing interface. Once all the mask-value entries point to the target CE, unshut the CE-facing interface. CSCtl09941
Workaround: Configure ip multicast-routing globally and establish ip pim sparse-dense-mode on the CE-facing interface. CSCtl97692
Workaround: After the switch reloads, enter shut and no shut on the port-channel interface.
A Cisco IOS AAA client uses the PAC secret to compute the authenticator; Cisco Secure ACS 5.2 uses the shared secret. This behavior causes a mismatch that results in a rejection of the accounting message, and the client marks the server as unresponsive.
Mediatrace cannot find the correct inbound interface and applies the dynamic policy on a different interface from the one used for media flow.
Workaround: Do not specify a "bfd" suffix with the snmp-server host x.x.x.x configuration command. CSCtx51561
This message is not observed during a system bootup.
Workaround: None required. This message is information only. CSCtz15738
– Ensure that the dot1x supplicant always authenticates before MAB.
– Create MAB policies for dot1x hosts that do not supply a URL redirect. CSCui79988
This section lists the resolved caveats in Cisco Release 15.1(2)SG2:
Workaround: Enter either the no ip http server or the no ip http secure-server command. This disables the http/s server. CSCui14525
This section lists the open caveats in Cisco IOS Release 15.1(2)SG1:
Workaround: Enter the show policy-map interface command. CSCsi71036
Workarounds: Disable IGMP snooping on all the relevant VLANs before disabling it globally.
Workaround: Unconfigure any generic QOS policies from the system. The QoS policies with the match any attribute cause IPv6 entries to become active. If the switch is a pure Layer 2 device, remove the generic protocol family attributes and narrow it to the protocol family.
You only see this symptom if you did not allocate a VLAN before you configure the IFM, then at a later time allocate the same VLAN.
Workaround: Unconfigure, then reconfigure the IFM on the port.
Workaround: For VTP database propagation, configure ISL/dot1q trunk port. CSCsu43445
The queue transmit counters as well as the policing statistics (if any) are correct. CSCsz20149
Prior to Cisco IOS Release 12.2(53)SG1, 12.2(50)SG6, the switchport block multicast command would block IP Multicast, Layer 2 multicast, and broadcast traffic (CSCta61825).
This issue does not impact functionality.
You must wait for the ACLs to be programmed before performing other TCAM related changes. CSCtd57063
– The SVI (network) is unreachable. If an SVI exists on the ASW, because of the STP flap in the setup as well as the CISP operations, the SVI MAC configuration on the ASW is incorrect.
Workaround: Configure the ASW or any other switch upstream as the root-bridge for all the VLANs. CSCtg71030
Workaround: Shutdown the CE-facing interface. Once all the mask-value entries point to the target CE, unshut the CE-facing interface. CSCtl09941
Workaround: Configure ip multicast-routing globally and establish ip pim sparse-dense-mode on the CE-facing interface. CSCtl97692
Workaround: After the switch reloads, enter shut and no shut on the port-channel interface.
A Cisco IOS AAA client uses the PAC secret to compute the authenticator; Cisco Secure ACS 5.2 uses the shared secret. This behavior causes a mismatch that results in a rejection of the accounting message, and the client marks the server as unresponsive.
Mediatrace cannot find the correct inbound interface and applies the dynamic policy on a different interface from the one used for media flow.
Workaround: Do not specify a "bfd" suffix with the snmp-server host x.x.x.x configuration command. CSCtx51561
This message is not observed during a system bootup.
Workaround: None required. This message is information only. CSCtz15738
Workaround: Enter either the no ip http server or the no ip http secure-server command. This disables the http/s server. CSCui14525
– Ensure that the dot1x supplicant always authenticates before MAB.
– Create MAB policies for dot1x hosts that do not supply a URL redirect. CSCui79988
This section lists the resolved caveats in Cisco Release 15.1(2)SG1:
Workaround: Disable IGMP snooping. CSCuc65538
Workaround: Disable these protocols on interfaces that might flap frequently. CSCub85948
Workaround: Retain the trunk native VLAN as 1. CSCud05521
Workaround: Clear sessions manually with the clear authentication sessions command. CSCtg15739
Workaround: Send any policy with the CoA from the RADIUS server. CSCue62019
– a fast stream of traffic matches the URL redirect ACL as IPDT clears an address,
– a traffic stream matches the URL redirect ACL and no URL redirect policy is installed for that IP address,
If this occurs repeatedly, IPDT and other control packet processing ultimately ceases.
Workaround: If this behavior completely fills the CPU buffer, the switch must be reloaded. However, the frequency of encountering a stuck queue can be reduced to nearly zero by modifying the URL redirect ACL to permit only 80/443 traffic. CSCug56646
This section lists the open caveats in Cisco IOS Release 15.1(2)SG:
Workaround: Enter the show policy-map interface command. CSCsi71036
Workarounds: Disable IGMP snooping on all the relevant VLANs before disabling it globally.
Workaround: Unconfigure any generic QOS policies from the system. The QoS policies with the match any attribute cause IPv6 entries to become active. If the switch is a pure Layer 2 device, remove the generic protocol family attributes and narrow it to the protocol family.
You only see this symptom if you did not allocate a VLAN before you configure the IFM, then at a later time allocate the same VLAN.
Workaround: Unconfigure, then reconfigure the IFM on the port.
Workaround: For VTP database propagation, configure ISL/dot1q trunk port. CSCsu43445
The queue transmit counters as well as the policing statistics (if any) are correct. CSCsz20149
Prior to Cisco IOS Release 12.2(53)SG1, 12.2(50)SG6, the switchport block multicast command would block IP Multicast, Layer 2 multicast, and broadcast traffic (CSCta61825).
This issue does not impact functionality.
You must wait for the ACLs to be programmed before performing other TCAM related changes. CSCtd57063
– The SVI (network) is unreachable. If an SVI exists on the ASW, because of the STP flap in the setup as well as the CISP operations, the SVI MAC configuration on the ASW is incorrect.
Workaround: Configure the ASW or any other switch upstream as the root-bridge for all the VLANs. CSCtg71030
Workaround: Shutdown the CE-facing interface. Once all the mask-value entries point to the target CE, unshut the CE-facing interface. CSCtl09941
Workaround: Configure ip multicast-routing globally and establish ip pim sparse-dense-mode on the CE-facing interface. CSCtl97692
Workaround: After the switch reloads, enter shut and no shut on the port-channel interface.
A Cisco IOS AAA client uses the PAC secret to compute the authenticator; Cisco Secure ACS 5.2 uses the shared secret. This behavior causes a mismatch that results in a rejection of the accounting message, and the client marks the server as unresponsive.
Mediatrace cannot find the correct inbound interface and applies the dynamic policy on a different interface from the one used for media flow.
Workaround: Do not specify a "bfd" suffix with the snmp-server host x.x.x.x configuration command. CSCtx51561
This message is not observed during a system bootup.
Workaround: None required. This message is information only. CSCtz15738
Workaround: Disable IGMP snooping. CSCuc65538
Workaround: Disable these protocols on interfaces that might flap frequently. CSCub85948
Workaround: Retain the trunk native VLAN as 1. CSCud05521
Workaround: Clear sessions manually with the clear authentication sessions command. CSCtg15739
Workaround: Return a dACL in the authorization profile with successful guest authentication.
– a fast stream of traffic matches the URL redirect ACL as IPDT clears an address,
– a traffic stream matches the URL redirect ACL and no URL redirect policy is installed for that IP address,
If this occurs repeatedly, IPDT and other control packet processing ultimately ceases.
Workaround: If this behavior completely fills the CPU buffer, the switch must be reloaded. However, the frequency of encountering a stuck queue can be reduced to nearly zero by modifying the URL redirect ACL to permit only 80/443 traffic. CSCug56646
Workaround: Shorten the dACL name. CSCug78653
This section lists the resolved caveats in Cisco Release 15.1(2)SG:
Workaround: Remove these operators from any dynamic ACLs. CSCts05302
Workaround: Enter shut and no shut on the port. CSCts29515
Cisco has released free software updates that address this vulnerability. Workarounds that mitigate this vulnerability are not available.
This advisory is available at the following link:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130327-nat
Note: The March 27, 2013, Cisco IOS Software Security Advisory bundled publication includes seven Cisco Security Advisories. All advisories address vulnerabilities in Cisco IOS Software. Each Cisco IOS Software Security Advisory lists the Cisco IOS Software releases that correct the vulnerability or vulnerabilities detailed in the advisory as well as the Cisco IOS Software releases that correct all Cisco IOS Software vulnerabilities in the March 2013 bundled publication.
Individual publication links are in “Cisco Event Response: Semiannual Cisco IOS Software Security Advisory Bundled Publication” at the following link:
http://www.cisco.com/web/about/security/intelligence/Cisco_ERP_mar13.html
Although their Release Notes are unique, the 4 platforms (Catalyst 4500, Catalyst 4900, Catalyst ME 4900, and Catalyst 4900M) use the same Software Configuration Guide, Command Reference Guide, and System Message Guide. Refer to the following home pages for additional information:
http://www.cisco.com//en/US/products/ps6021/index.html
Installation guides and notes including specifications and relevant safety information are available at the following URLs:
http://www.cisco.com/en/US/docs/switches/lan/catalyst4500/hardware/installation/guide/78-14409-08/4500inst.html
http://www.cisco.com/en/US/docs/switches/lan/catalyst4500/hardware/configuration/notes/OL_25315.html
http://www.cisco.com/en/US/docs/switches/lan/catalyst4500/hardware/regulatory/compliance/78_13233.html
http://www.cisco.com/en/US/products/hw/switches/ps4324/prod_installation_guides_list.html
http://www.cisco.com/en/US/products/ps6021/prod_installation_guides_list.html
Software release notes, configuration guides, command references, and system message guides are available at the following URLs:
http://www.cisco.com/en/US/products/ps6021/prod_release_notes_list.html
Software documents for the Catalyst 4500 Classic, Catalyst 4500 E-Series, Catalyst 4900 Series, and Catalyst 4500-X Series switches are available at the following URLs:
http://www.cisco.com/en/US/products/hw/switches/ps4324/products_installation_and_configuration_guides_list.html
http://www.cisco.com/en/US/products/hw/switches/ps4324/prod_command_reference_list.html
http://www.cisco.com/en/US/products/hw/switches/ps4324/products_system_message_guides_list.html
Platform- independent Cisco IOS documentation may also apply to the Catalyst 4500 and 4900 switches. These documents are available at the following URLs:
http://www.cisco.com/en/US/products/ps6350/products_installation_and_configuration_guides_list.html
http://www.cisco.com/en/US/products/ps6350/prod_command_reference_list.html
You can also use the Command Lookup Tool at:
http://tools.cisco.com/Support/CLILookup/cltSearchAction.do
http://www.cisco.com/en/US/products/ps6350/products_system_message_guides_list.html
You can also use the Error Message Decoder tool at:
http://www.cisco.com/pcgi-bin/Support/Errordecoder/index.cgi
The following notices pertain to this software license.
This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit ( http://www.openssl.org/).
This product includes cryptographic software written by Eric Young (eay@cryptsoft.com).
This product includes software written by Tim Hudson (tjh@cryptsoft.com).
The OpenSSL toolkit stays under a dual license, i.e. both the conditions of the OpenSSL License and the original SSLeay license apply to the toolkit. See below for the actual license texts. Actually both licenses are BSD-style Open Source licenses. In case of any license issues related to OpenSSL please contact openssl-core@openssl.org.
Copyright © 1998-2007 The OpenSSL Project. All rights reserved.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:
1. Redistributions of source code must retain the copyright notice, this list of conditions and the following disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions, and the following disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgment: “This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit ( http://www.openssl.org/)”.
4. The names “OpenSSL Toolkit” and “OpenSSL Project” must not be used to endorse or promote products derived from this software without prior written permission. For written permission, please contact openssl-core@openssl.org.
5. Products derived from this software may not be called “OpenSSL” nor may “OpenSSL” appear in their names without prior written permission of the OpenSSL Project.
6. Redistributions of any form whatsoever must retain the following acknowledgment:
“This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit ( http://www.openssl.org/)”.
THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT “AS IS”' AND ANY EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
This product includes cryptographic software written by Eric Young (eay@cryptsoft.com). This product includes software written by Tim Hudson (tjh@cryptsoft.com).
Copyright © 1995-1998 Eric Young (eay@cryptsoft.com). All rights reserved.
This package is an SSL implementation written by Eric Young (eay@cryptsoft.com).
The implementation was written so as to conform with Netscapes SSL.
This library is free for commercial and non-commercial use as long as the following conditions are adhered to. The following conditions apply to all code found in this distribution, be it the RC4, RSA, lhash, DES, etc., code; not just the SSL code. The SSL documentation included with this distribution is covered by the same copyright terms except that the holder is Tim Hudson (tjh@cryptsoft.com).
Copyright remains Eric Young’s, and as such any Copyright notices in the code are not to be removed. If this package is used in a product, Eric Young should be given attribution as the author of the parts of the library used. This can be in the form of a textual message at program startup or in documentation (online or textual) provided with the package.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:
1. Redistributions of source code must retain the copyright notice, this list of conditions and the following disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
“This product includes cryptographic software written by Eric Young (eay@cryptsoft.com)”.
The word ‘cryptographic’ can be left out if the routines from the library being used are not cryptography-related.
4. If you include any Windows specific code (or a derivative thereof) from the apps directory (application code) you must include an acknowledgement: “This product includes software written by Tim Hudson (tjh@cryptsoft.com)”.
THIS SOFTWARE IS PROVIDED BY ERIC YOUNG “AS IS” AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
The license and distribution terms for any publicly available version or derivative of this code cannot be changed. i.e. this code cannot simply be copied and put under another distribution license [including the GNU Public License].
For information on obtaining documentation, submitting a service request, and gathering additional information, see the monthly What’s New in Cisco Product Documentation, which also lists all new and revised Cisco technical documentation, at:
http://www.cisco.com/en/US/docs/general/whatsnew/whatsnew.html
Subscribe to the What’s New in Cisco Product Documentation as a Really Simple Syndication (RSS) feed and set content to be delivered directly to your desktop using a reader application. The RSS feeds are a free service and Cisco currently supports RSS Version 2.0.