Release Notes for the Catalyst 4500E Series Switch, Cisco IOS XE 3.3.xXO
Features Not Supported on the Cisco Catalyst 4500E Series Switch,IOS Release XE 3.3.0XO
Supported Hardware on the Catalyst 4500E Series Switch
Supported E Series Hardware on Cisco IOS XE Release 3.3.0XO
Cisco IOS XE to Cisco IOS Version Number Mapping
Open Caveats for Cisco IOS XE Release 3.3.2XO
Resolved Caveats for Cisco IOS XE Release 3.3.2XO
Open Caveats for Cisco IOS XE Release 3.3.1XO
Resolved Caveats for Cisco IOS XE Release 3.3.1XO
Open Caveats for Cisco IOS XE Release 3.3.0XO
Resolved Caveats for Cisco IOS XE Release 3.3.0XO
Troubleshooting at the System Level
Obtaining Documentation and Submitting a Service Request
Current release: IOS XE 3.3.2XO—August 20, 2014
Prior release: IOS XE 3.3.1XO, IOS XE 3.3.0XO—August 14, 2013
This release note describes the features, modifications, and caveats for the Cisco IOS XE 3.3.xXO software on the Catalyst 4500E series switch with Supervisor Engine 8-E.
The new Cisco® Catalyst® 4500E Supervisor Engine 8-E extends one policy, one management, one network to the world's most widely deployed modular access switch. This brings convergence of wired and wireless (not available in the first release of convergence, IOS XE 3.3.0XO in networks on a single platform while providing unprecedented investment protection. It ushers in a new converged architecture that is simple, resilient, and secure.
The Cisco Catalyst 4500E Switch with Supervisor Engine 8-E is an extremely scalable and feature-rich modular access platform built to meet current and future network demand, and including gigabit desktop:
Investment Protection and Reduced Total Cost of Ownership
Support for Cisco IOS XE Release 3.3.0XO follows the standard Cisco Systems® support policy, available at
http://www.cisco.com/en/US/products/products_end-of-life_policy.html
For more information on the Catalyst 4500E series switches, visit the following URL:
http://www.cisco.com/go/cat4500/docs
This publication consists of these sections:
The Enterprise Services image supports all Cisco Catalyst 4500 Series software features based on Cisco IOS Software, including enhanced routing.
The IP Base image supports Open Shortest Path First (OSPF) for Routed Access, Enhanced Interior Gateway Routing Protocol (EIGRP) "limited" Stub Routing, Nonstop Forwarding/Stateful Switchover (NSF/SSO), and RIPv1/v2. The IP Base image does not support enhanced routing features such as BGP, Intermediate System-to-Intermediate System (IS-IS), Internetwork Packet Exchange (IPX), AppleTalk, Virtual Routing Forwarding (VRF-lite), GLBP, and policy-based routing (PBR).
The LAN Base image complements the existing IP Base and Enterprise Services images. It is focused on customer access and Layer 2 requirements and therefore many of the IP Base features are not required. The IP upgrade image is available if at a later date you require some of those features.
Sup8-E is introduced with Cisco IOS Release XE 3.3.0XO, which has feature parity with Release XE 3.3.0SG. Sup8-E support will be integrated into XE 3.6.0E, which will be an extended maintenance release.
Note Sup8-E is not supported on Release XE 3.3.nSG, XE 3.4.nSG, or XE 3.5.0E.
Figure 1 displays the one active train, 3.4.0SG.
Figure 1 Software Release Strategy for Catalyst 4500 Series Switch, Release XE 3.3.0XO
Table 1 is a detailed list of features supported on Catalyst 4500E Supervisor Engine 8-E running Cisco IOS XE Release 3.3.0XO categorized by image type.
Note Feature parity exists between this release and Release 3.3.0SG.
Please visit Feature Navigator for package details:
http://tools.cisco.com/ITDIT/CFN/
BGP Increased Support of Numbered as-path Access Lists to 500 |
|||
CFM/IEEE 802.1ag - D8.1 standard Compliant CFM, Y.1731 multicast LBM / AIS / RDI / LCK, IP SLA for Ethernet |
|||
Class Based Ethernet CoS Matching & Marking (802.1p & ISL CoS) |
|||
IEEE 802.1s Multiple Spanning Tree (MST) Standard Compliance |
|||
IEEE 802.1t1 |
|||
IEEE 802.3ad Link Aggregation (LACP) Port-Channel Standalone Disable |
|||
IGMP Version 3 - Explicit Tracking of Hosts, Groups, and Channels |
|||
IP Multicast Load Splitting - Equal Cost Multipath (ECMP) using S, G and Next-hop |
|||
IPv6 Multicast: Multicast Listener Discovery (MLD) Protocol, Versions 1 and 2 |
|||
IPv6 Multicast: RPF Flooding of Bootstrap Router (BSR) Packets |
|||
Yes2 |
|||
IPv6 Services: Cisco Discovery Protocol (CDP) - IPv6 Address Family Support for Neighbor Information |
|||
IPv6 Switching: CEFv6 Switched Automatic IPv4-compatible Tunnels (in software) |
|||
IPv6 Tunneling: Automatic IPv4-compatible Tunnels (in software) |
|||
IPv6 Tunneling: Manually Configured IPv6 over IPv4 Tunnels (in software) |
|||
Medianet: Integrated Video Traffic Simulator (hardware-assisted IP SLA); IPSLA generator and responder |
|||
Medianet: Media Monitoring (Performance Monitoring and Mediatrace) |
|||
NEAT Enhancement: Re-Enabling BPDU Guard Based on User Configuration |
|||
RADIUS Attribute 44 (Accounting Session ID) in Access Requests |
|||
Source Specific Multicast (SSM) - IGMPv3,IGMP v3lite, and URD |
|||
Time Domain Reflectometry (TDR)3 |
|||
TrustSec: IEEE 802.1ae MACSec encryption on user facing ports |
|||
TrustSec: IEEE 802.1ae MACSec encryption on user facing ports SSO |
|||
TrustSec: IEEE 802.1ae MACSec encryption between switch-to-switch links using Cisco SAP (Security Association Protocol) |
|||
1.EEE 802.1t—An IEEE amendment to IEEE 802.1D that includes extended system ID, long path cost, and PortFast. |
For information on MiBs support, please refer to this URL:
http://ftp.cisco.com/pub/mibs/supportlists/cat4000/cat4000-supportlist.html
The following features are not supported on a Catalyst 4500E Series Switch with Supervisor Engine 8-E:
– Smart Install with Configuration-only Deployment and Smooth Upgrade
Cisco OnPlus™ Service Network Agent
Different Organizations across the world have standards for compliance - some related to security, some related to IPv6 and so on (like USGv6, JITC, Common Criteria, and FIPS140).
Flexible NetFlow IPFIX (an IETF standard based on NetFlow v9) Export Format feature
non-key field supports Username, Device Type, Application Id, and Power Reading
Support for EIGRP Wide Metrics
– IPv6 First Hop Security (FHS):
Neighbor Discovery (ND) Multicast Suppress
– Trustsec Support and Enhancements:
Cisco TrustSec VLAN to SGT mapping: to co-relate source SGT with source VLAN in VLAN based environments
IP address to SGT mapping: to co-relate source SGT with source IP address enforcing appropriate SGACL
Port to SGT mapping: tag all traffic from a specific interface/ port
Configurable username and password for MAB: to permit easy interoperability with RADIUS Servers/ MAC databases
Support for Cisco IOS XE Release 3.3.0XO follows the standard Cisco Systems® support policy, available at
http://www.cisco.com/en/US/products/products_end-of-life_policy.html
For more information on the Catalyst 4500 series switches, visit the following URL:
http://www.cisco.com/go/cat4500/docs
This section describes the system requirements:
For information on the minimum supported release for each pluggable module please refer to:
http://www.cisco.com/en/US/products/hw/modules/ps5455/products_device_support_tables_list.html
Table 3 lists the hardware supported on the Catalyst 4500E Series Switch.
Table 4 briefly describes the supported CWDM wavelengths in the Catalyst 4500E Series Switch.
Table 5 briefly describes the supported DWDM wavelengths in the Catalyst 4500E Series Switch.
Table 6 briefly describes the DOM support on the Catalyst 4500E Series Switch.
As Table 8 shows, each version of Cisco IOS XE has an associated Cisco IOS version:
These sections list the limitations and restrictions for the current release of Cisco IOS software on the Catalyst 4500E series switch.
TFTP numbers its datagrams with a 16 bit field, resulting in a maximum of 65,536 datagrams. Because each TFTP datagram is 512 bytes long, the maximum transferable file is 65536 x 512 = 32 MB. If both the TFTP client (ROMMON) and the TFTP server support block number wraparound, no size limitation exists.
Cisco has modified the TFTP client to support block number wraparound. So, if you encounter a transfer failure, use a TFTP server that supports TFTP block number wraparound. Because most implementations of TFTP support block number wraparound, updating the TFTP daemon should fix the issue.
The outputs of certain commands, such as show ip route and show access-lists, contain non-deterministic text. While the output is easily understood, the output text does not contain strings that are consistently output. A general purpose specification file entry is unable to parse all possible output.
While a general purpose specification file entry may not be possible, a specification file entry might be created that returns the desired text by searching for text that is guaranteed to be in the output. If a string is guaranteed to be in the output, it can be used for parsing.
For example, the output of the show ip access-lists SecWiz_Gi3_17_out_ip command is this:
The first line is easily parsed because access list is guaranteed to be in the output:
The remaining lines all contain the term host. As a result, the specification file may report the desired values by specifying that string. For example, this line
will produce the following for the first and second rules
and the following for the third statement
Request the output of the show running-config command using NETCONF and parse that output for the desired strings. This is useful when the desired lines contain nothing in common. For example, the rules in this access list do not contain a common string and the order (three permits, then a deny, then another permit), prevent the spec file entry from using permit as a search string, as in the following example:
The XML output of show running-config command includes the following, which can then be parsed programmatically, as desired:
Workaround: Define a policy-map with a different name and then reattach. CSCti26172
– Decrease the number of monitors.
– Attach the same monitor to multiple targets. CSCti43798
Workaround: Use the dir device command (for example, dir bootflash:) to obtain the correct file count. CSCti74130
– At least 10K groups and roughly 20K mroutes exist.
– IGMP joins with source traffic transit to all the multicast groups.
This is caused by the large number of updates generating SPI messages that must be processed by the CPU to ensure that the platform is updated with the changes in all the entries.
Workaround: Define a policy-map with a different name and then reattach. CSCti26172
You cannot clear a large number of mroutes at one time when traffic is still running.
Workaround: Do not clear all mroutes at once.
This configuration had been removed erroneously in a prior release.
Workaround: Use the show version command. CSCtr30294
Workaround: Select an alternate destination or source port. CSCty05405
– mux-buffer for each linecard slot
On sup1, when the sprom read.. command is entered for any of the above components, the SEEPROM contents are displayed as all “0”s.
When sup1 and sup2 are both in ROMMON (or both in IOS (SSO state)), they can read all SEEPROMs.
– 10/100/1000BaseT Premium POE E Series WS-X4648-RJ45V+E (JAE1348OY52)
the following restrictions apply:
– Sub-interfaces are not supported.
– Port-channel members do not support multiple classification criteria for a QoS policy.
– CEF is disabled automatically when uRFP is enabled and TCAM is fully utilized.
Workaround: During IPv6 access-list configuration, configure at least one IPv6 ACE before the "hardware statistics" statement. CSCuc53234
These messages are cosmetic only, and no ssh services are available unless configured within IOS.
Caveats describe unexpected behavior in Cisco IOS releases. Caveats listed as open in a prior release are carried forward to the next release as either open or resolved.
Note For the latest information on PSIRTS, refer to the Security Advisories on CCO at the following URL:
http://www.cisco.com/en/US/products/products_security_advisories_listing.html
This section lists the open caveats for Cisco IOS XE Release 3.3.2XO:
Mediatrace cannot find the correct inbound interface and applies the dynamic policy on a different interface from the one used for media flow.
A Cisco IOS AAA client uses the PAC secret to compute the authenticator; Cisco Secure ACS 5.2 uses the shared secret. This behavior causes a mismatch that results in a rejection of the accounting message, and the client marks the server as unresponsive.
Workaround: None. You must disable 802.1X accounting. CSCts26844
Workaround: Do not specify a "bfd" suffix with the snmp-server host x.x.x.x configuration command. CSCtx51561
Workaround: Configure a policer with only conform-action and exceed-action and not with violate-action. CSCug49778.
This error is informational only.
Workaround: Do not configure the application name field as a key or non-key field of a flow record.
Workaround: Use PEAP-GTC or any other method. CSCud66899
The error message is information only.
This message is not observed during a system bootup.
Workaround: None required. This message is information only. CSCtz15738
The impact of stale dynamic access lists is to monitor unwanted traffic.
– If the switchover is scheduled, remove the scheduled session on the initiator. Reschedule the session after the new active supervisor engine boots on the responder.
– If the Mediatrace responder SSO is not planned, after the new active supervisor engine boots, manually delete the stale dynamic access lists. CSCty75070
Workaround: Increase the queue limit to at least 256. CSCto57602
– Links flap for various Layer 3 protocols.
– A traffic loss of several seconds is observed during the upgrade process.
Workaround: Do not use the quick option with the issu changeversion command. CSCto51562
Workaround: Shut then no shut the interface.
Applying the workaround preemptively (i.e., entering shut then no shut on the interfaces after first switchover) prevents a failure on the subsequent switchover. CSCui49000
Workaround: Shut then no shut the interface.
Applying the workaround preemptively (i.e., entering shut then no shut on the interfaces after first switchover) prevents a failure on the subsequent switchover. CSCui49000
Workaround: After the switch reloads, enter shut and no shut on the port-channel interface.
Workaround: Configure both dead-criteria and deadtime.
This section lists the resolved caveats for Cisco IOS XE Release 3.3.2XO:
*Feb 4 10:05:46.648: %C4K_CHASSIS-5-PORTSPOERESTARTED: Poe restarted for interfaces on slot 5 (count=1)
Workaround: Unconfigure the reconfigure the ip unnumbered command. CSCtb14871
Workaround: Issue either sh run or write memory. CSCui35423
GLC-GE-100FX was tested with WS-X4624-SFP-E(HW 1.2(VID V02) and HW 2.0(VID V03)), the problem happened on GLC-GE-100FX V02 only. There was no problem with GLC-GE-100FX V01.
This issue is triggered by one of the following:
– consistent rapid flapping of mroute(s)
– constant traffic toward a group on a VLAN where SVI is configured with PIM sparse mode but an RP is disallowed [for the group]
– For flapping mroutes, find the source of the flapping mroute and prevent it.
– For a missing RP scenario, either turn off PIM on the VLAN or allow the multicast group associate with an RP. CSCul44174
With a different community or without snmp-server host 192.168.131.13 vrf mgmtVrf version 2c, the config line remains intact.
Workaround: Re-apply this configuration. CSCsh92025
Removing or adding the NTP configuration doesn't fix the issue.
In the following example, show clock is executed on ASR, then on a Catalyst 4500 switch. Notice that the Catalyst 4500 switch is nearly eight second behind:
test cable-diagnostics tdr interface <int> CSCui45222
New: (VLAN 1024 is renamed with the old name for VLAN 1022)
Workaround: Exit the VLAN config mode before changing the second VLAN name. CSCuj42720
This means that NMS systems cannot gather information about files on the other partitions.
If performance monitoring is configured with the service-policy type performance-monitor input/output < > command, your will notice that the memory held by Chunk Manager / List Headers continues to grow:
Workaround: Change to multi-domain or single host with CDP bypass (enable cdp/lldp on the switch). CSCuo79422
Workaround: Configure control plane policy to deny Multicast SSM traffic hitting CPU.
1. Apply ACL on ingress interface deny the non-interested PIM SM multicast stream:
2. Have a dummy loopback interface enabled with PIM-SM. Configure ip igmp static-group x.x.x.x on this Loopback interface (where x.x.x.x is non-interested multicast group ip address). CSCui64652
Workaround: Disable PIM SSM on the interface. CSCum47920
Moreover, mroute is improperly programmed on the switch, which is connected to multicast source.
– Apply ACL on ingress interface denying the non-interested multicast stream. Below is the example.
– Use a dummy loopback interface enabled with PIM-SM. Configure ip igmp static-group x.x.x.x on this Loopback interface (where x.x.x.x is the non-interested multicast group ip address).
This section lists the open caveats for Cisco IOS XE Release 3.3.0XO:
Workaround: Configure both dead-criteria and deadtime.
Workaround: After the switch reloads, enter shut and no shut on the port-channel interface.
Workaround: Increase the queue limit to at least 256. CSCto57602
– Links flap for various Layer 3 protocols.
– A traffic loss of several seconds is observed during the upgrade process.
Workaround: Do not use the quick option with the issu changeversion command. CSCto51562
A Cisco IOS AAA client uses the PAC secret to compute the authenticator; Cisco Secure ACS 5.2 uses the shared secret. This behavior causes a mismatch that results in a rejection of the accounting message, and the client marks the server as unresponsive.
Workaround: None. You must disable 802.1X accounting. CSCts26844
Mediatrace cannot find the correct inbound interface and applies the dynamic policy on a different interface from the one used for media flow.
The impact of stale dynamic access lists is to monitor unwanted traffic.
– If the switchover is scheduled, remove the scheduled session on the initiator. Reschedule the session after the new active supervisor engine boots on the responder.
– If the Mediatrace responder SSO is not planned, after the new active supervisor engine boots, manually delete the stale dynamic access lists. CSCty75070
Workaround: Do not specify a "bfd" suffix with the snmp-server host x.x.x.x configuration command. CSCtx51561
This message is not observed during a system bootup.
Workaround: None required. This message is information only. CSCtz15738
The error message is information only.
This error is informational only.
Workaround: Configure a policer with only conform-action and exceed-action and not with violate-action. CSCug49778.
Workaround: Do not configure the application name field as a key or non-key field of a flow record.
Workaround: Use PEAP-GTC or any other method. CSCud66899
Workaround: Shut then no shut the interface.
Applying the workaround preemptively (i.e., entering shut then no shut on the interfaces after first switchover) prevents a failure on the subsequent switchover. CSCui49000
There is no functional impact when this message is printed.
– Apply ACL on an ingress interface to deny the non-interested multicast stream, as follows:
– Enable PIM-SM on a dummy loopback interface by configuring ip igmp static-group x.x.x.x (where x.x.x.x is the non-interested multicast group IP address)
Mediatrace cannot find the correct inbound interface and applies the dynamic policy on a different interface from the one used for media flow.
This section lists the resolved caveats for Cisco IOS XE Release 3.3.1XO:
When polling the device to get an instance for CafSessionEntry object, as follows:
In redundant scenarios, switchover occurs repeatedly.
Workaround: Create SNMP view and exclude the OID, as follows:
The following error message is observed in the output of the debug ip admission api command:
Workaround: Assign different names for the ACLs on each port. CSCuj88557
– Configured tags (anywhere in topology) are received by a router operating with EIGRP Rel. 12 and later.
– Query received for the route updated with tags.
To confirm that you are affected by this bug, issue the following:
The output lists the entries in the flowmgr table. When this issue is seen, the flowmgr entries continue to increment (i.e., flow details are still present even after the connection is closed.)
Reloading is required to clean up the flowmgr entries that are present in the flowmgr table. Replace tftp with ftp, if possible. CSCuh09324
Workaround: Restore the default config of the monitor session id filter packet-type good rx command and issue shut then no shut on the 'err-disabled' ports. CSCui56867
Cisco has released free software updates that address this vulnerability. There are no workarounds to mitigate this vulnerability.
This advisory is available at the following link:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140326-ipv6
Note: The March 26, 2014, Cisco IOS Software Security Advisory bundled publication includes six Cisco Security Advisories. All advisories address vulnerabilities in Cisco IOS Software. Each Cisco IOS Software Security Advisory lists the Cisco IOS Software releases that correct the vulnerability or vulnerabilities detailed in the advisory as well as the Cisco IOS Software releases that correct all Cisco IOS Software vulnerabilities in the March 2014 bundled publication.
Individual publication links are in Cisco Event Response: Semiannual Cisco IOS Software Security Advisory Bundled Publication at the following link: http://www.cisco.com/web/about/security/intelligence/Cisco_ERP_mar14.html
Workaround: See published Cisco Security Advisory CSCui59540
The vulnerability is due to how an affected device processes certain malformed IKEv2 packets. An attacker could exploit this vulnerability by sending malformed IKEv2 packets to an affected device to be processed. An exploit could allow the attacker to cause a reload of the affected device that would lead to a DoS condition.
Although IKEv2 is automatically enabled on a Cisco IOS Software and Cisco IOS XE Software devices when the Internet Security Association and Key Management Protocol (ISAKMP) is enabled, the vulnerability can be triggered only by sending a malformed IKEv2 packet.
Only IKEv2 packets can trigger this vulnerability.
Cisco has released free software updates that address this vulnerability. There are no workarounds to mitigate this vulnerability.
This advisory is available at the following link: http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140326-ikev2
Note: The March 26, 2014, Cisco IOS Software Security Advisory bundled publication includes six Cisco Security Advisories. All advisories address vulnerabilities in Cisco IOS Software. Each Cisco IOS Software Security Advisory lists the Cisco IOS Software releases that correct the vulnerability or vulnerabilities detailed in the advisory as well as the Cisco IOS Software releases that correct all Cisco IOS Software vulnerabilities in the March 2014 bundled publication.
Individual publication links are in Cisco Event Response: Semiannual Cisco IOS Software Security Advisory Bundled Publication at the following link: http://www.cisco.com/web/about/security/intelligence/Cisco_ERP_mar14.html
Workaround: See published Cisco Security Advisory CSCui88426
Alternatively, the input queue on the interface may be stuck at the maximum size and starts to drop further traffic. This can cause pings to fail and protocols like HSRP,OSPF etc to not establish.
This symptom occurs when mDNS traffic is sent to the switch.
Workaround: Apply an ACL to the inbound interface. This will drop the traffic and buffers will not leak. CSCuj58950
– When the switch boots, toggle "ipv6 snooping" under "vlan configuration 1" soon after switch bootup CSCuj73571
This advisory is posted at http://www.cisco.com/warp/public/707/cisco-sa-20090923-acl.shtml.
Note: The September 23, 2009, Cisco IOS Security Advisory bundled publication includes eleven Security Advisories. Ten of the advisories address vulnerabilities in Cisco IOS Software, and one advisory addresses a vulnerability in Cisco Unified Communications Manager. Each advisory lists the releases that correct the vulnerability or vulnerabilities detailed in the advisory. The following table lists releases that correct all Cisco IOS Software vulnerabilities that have been published on September 23, 2009, or earlier.
http://www.cisco.com/warp/public/707/cisco-sa-20090923-bundle.shtml
Individual publication links are in "Cisco Event Response: Semiannual Cisco IOS Software Advisory Bundled Publication" at the following link:
http://www.cisco.com/web/about/security/intelligence/Cisco_ERP_ sep09.html CSCsu70214
Workaround: Don’t enable the device-sensor accounting. :CSCuj56845
Workaround: Apply the following SNMP view to restrict polling of the MIB:
Workaround: Use either the authentication control-direction both or authentication open command. CSCuo50590
This error does not impact functionality. However, the uplink ports of the standby supervisor engine loses functionality if the standby supervisor engine becomes the active supervisor engine.
Workaround: Reinsert the standby supervisor engine. CSCui25419
This section lists the open caveats for Cisco IOS XE Release 3.3.0XO:
Workaround: Configure both dead-criteria and deadtime.
Workaround: After the switch reloads, enter shut and no shut on the port-channel interface.
Workaround: Increase the queue limit to at least 256. CSCto57602
– Links flap for various Layer 3 protocols.
– A traffic loss of several seconds is observed during the upgrade process.
Workaround: Do not use the quick option with the issu changeversion command. CSCto51562
A Cisco IOS AAA client uses the PAC secret to compute the authenticator; Cisco Secure ACS 5.2 uses the shared secret. This behavior causes a mismatch that results in a rejection of the accounting message, and the client marks the server as unresponsive.
Workaround: None. You must disable 802.1X accounting. CSCts26844
Mediatrace cannot find the correct inbound interface and applies the dynamic policy on a different interface from the one used for media flow.
The impact of stale dynamic access lists is to monitor unwanted traffic.
– If the switchover is scheduled, remove the scheduled session on the initiator. Reschedule the session after the new active supervisor engine boots on the responder.
– If the Mediatrace responder SSO is not planned, after the new active supervisor engine boots, manually delete the stale dynamic access lists. CSCty75070
Workaround: Do not specify a "bfd" suffix with the snmp-server host x.x.x.x configuration command. CSCtx51561
This message is not observed during a system bootup.
Workaround: None required. This message is information only. CSCtz15738
The error message is information only.
This error is informational only.
Workaround: Configure a policer with only conform-action and exceed-action and not with violate-action. CSCug49778.
Workaround: Do not configure the application name field as a key or non-key field of a flow record.
Workaround: Use PEAP-GTC or any other method. CSCud66899
This error does not impact functionality. However, the uplink ports of the standby supervisor engine loses functionality if the standby supervisor engine becomes the active supervisor engine.
Workaround: Reinsert the standby supervisor engine. CSCui25419
Workaround: Shut then no shut the interface.
Applying the workaround preemptively (i.e., entering shut then no shut on the interfaces after first switchover) prevents a failure on the subsequent switchover. CSCui49000
This section lists the resolved caveats for Cisco IOS XE Release 3.3.0XO:
Workaround: Disable CDP on interfaces that may flap frequently. CSCub85948
These sections provide troubleshooting guidelines for the Catalyst 4500 series switches running IOS supervisor engines:
Netbooting using a boot loader image is not supported. Instead, use one of the following options to boot an image:
1. Boot from an SD card by entering the following command:
The ROMMON TFTP boot is very similar to the BOOTLDR TFTP boot, except that:
– the BOOTLDR variable should not be set
– the TFTP server must be accessible from the Ethernet management port on the supervisor engine.
To boot from ROMMON, perform the following tasks while in ROMMON mode:
a. Ensure that the Ethernet management port on the supervisor engine is physically connected to the network.
b. Verify that bootloader environment is not set by entering the unset bootldr command.
c. Set IP address of the Ethernet management port on the supervisor engine by entering the following command: set interface fa1 ip_address ip_mask
For example, to set the supervisor engine Ethernet port with an IP address 172.16.1.5 and IP mask 255.255.255.0, enter the following command:
d. Set default gateway for the Ethernet management port on the supervisor engine by entering the following command: set ip route default gateway_ip_address. The default gateway should be directly connected to the supervisor engine Ethernet management port subnet.
e. Ping the TFTP server to ensure that there is connectivity to the server from the Ethernet management port on the supervisor engine by entering the following command: ping tftp_server_ip_address.
f. Once the ping is successful, boot the image from the TFTP server by entering the following command: boot tftp:// tftp_server_ip_address / image_path_and_file_name
For example, to boot the Cisco IOS XE image cat4500e-universalk9.03.01.00.SG.150-1.XO.bin located on the TFTP server 172.16.1.8, enter the following command:
This section contains troubleshooting guidelines for system-level problems:
This section contains troubleshooting guidelines for modules:
For general information on MIBs, RMON groups, and traps, refer to the Cisco public MIB directory ( http://www.cisco.com/public/sw-center/netmgmt/cmtk/mibs.shtml). For information on the specific MIBs supported by the Catalyst 4500 series switches, refer to the Catalyst 4000 MIB Support List located at ftp://ftp.cisco.com/pub/mibs/supportlists/cat4000/cat4000-supportlist.html.
The following notices pertain to this software license.
This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit ( http://www.openssl.org/).
This product includes cryptographic software written by Eric Young (eay@cryptsoft.com).
This product includes software written by Tim Hudson (tjh@cryptsoft.com).
The OpenSSL toolkit stays under a dual license, i.e. both the conditions of the OpenSSL License and the original SSLeay license apply to the toolkit. See below for the actual license texts. Actually both licenses are BSD-style Open Source licenses. In case of any license issues related to OpenSSL please contact openssl-core@openssl.org.
Copyright © 1998-2007 The OpenSSL Project. All rights reserved.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:
1. Redistributions of source code must retain the copyright notice, this list of conditions and the following disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions, and the following disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgment: “This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit ( http://www.openssl.org/)”.
4. The names “OpenSSL Toolkit” and “OpenSSL Project” must not be used to endorse or promote products derived from this software without prior written permission. For written permission, please contact openssl-core@openssl.org.
5. Products derived from this software may not be called “OpenSSL” nor may “OpenSSL” appear in their names without prior written permission of the OpenSSL Project.
6. Redistributions of any form whatsoever must retain the following acknowledgment:
“This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit ( http://www.openssl.org/)”.
THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT “AS IS”' AND ANY EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
This product includes cryptographic software written by Eric Young (eay@cryptsoft.com). This product includes software written by Tim Hudson (tjh@cryptsoft.com).
Copyright © 1995-1998 Eric Young (eay@cryptsoft.com). All rights reserved.
This package is an SSL implementation written by Eric Young (eay@cryptsoft.com).
The implementation was written so as to conform with Netscapes SSL.
This library is free for commercial and non-commercial use as long as the following conditions are adhered to. The following conditions apply to all code found in this distribution, be it the RC4, RSA, lhash, DES, etc., code; not just the SSL code. The SSL documentation included with this distribution is covered by the same copyright terms except that the holder is Tim Hudson (tjh@cryptsoft.com).
Copyright remains Eric Young’s, and as such any Copyright notices in the code are not to be removed. If this package is used in a product, Eric Young should be given attribution as the author of the parts of the library used. This can be in the form of a textual message at program startup or in documentation (online or textual) provided with the package.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:
1. Redistributions of source code must retain the copyright notice, this list of conditions and the following disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgement:
“This product includes cryptographic software written by Eric Young (eay@cryptsoft.com)”.
The word ‘cryptographic’ can be left out if the routines from the library being used are not cryptography-related.
4. If you include any Windows specific code (or a derivative thereof) from the apps directory (application code) you must include an acknowledgement: “This product includes software written by Tim Hudson (tjh@cryptsoft.com)”.
THIS SOFTWARE IS PROVIDED BY ERIC YOUNG “AS IS” AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
The license and distribution terms for any publicly available version or derivative of this code cannot be changed. i.e. this code cannot simply be copied and put under another distribution license [including the GNU Public License].
For information on obtaining documentation, submitting a service request, and gathering additional information, see the monthly What’s New in Cisco Product Documentation, which also lists all new and revised Cisco technical documentation, at:
http://www.cisco.com/en/US/docs/general/whatsnew/whatsnew.html
Subscribe to the What’s New in Cisco Product Documentation as a Really Simple Syndication (RSS) feed and set content to be delivered directly to your desktop using a reader application. The RSS feeds are a free service and Cisco currently supports RSS Version 2.0.