Table of Contents
Release Notes for the Catalyst 4500-E Series Switch, Cisco IOS XE Release 3.7.xE
Supported Hardware on the Catalyst 4500E Series Switch
Supported E-Series Hardware on Cisco IOS XE Release 3.7.xE
Wired Web UI (Device Manager) System Requirements
OpenFlow Version and Cisco IOS Release Support
Features Not Supported on the Cisco Catalyst 4500-E Series Switch
New Hardware Features in Release IOS XE 3.7.2E
New Software Features (Wired) in Release IOS XE 3.7.2E
New Hardware Features in Release IOS XE 3.7.1E
New Software Features (Wired) in Release IOS XE 3.7.1E
New Software Features (Wireless) in Release IOS XE 3.7.1E
New Hardware Features in Release IOS XE 3.7.0E
New Software Features (Wireless) in Release IOS XE 3.7.0E
New Software Features (Wired) in Release IOS XE 3.7.0E
Wireless Web UI Software Requirements
Access Points and Mobility Services Engine
Interoperability with Other Client Devices
Identifying Hardware Revisions on the Switch Chassis
Upgrading ROMMON Image for Supervisor Engine 8-E
Identifying an +E Chassis and ROMMON
Open Caveats for Cisco IOS XE Release 3.7.xE
Resolved Caveats for Cisco IOS XE Release 3.7.3E
Resolved Caveats for Cisco IOS XE Release 3.7.2E
Resolved Caveats for Cisco IOS XE Release 3.7.1E
Resolved Caveats for Cisco IOS XE Release 3.7.0E
Release Notes for the Catalyst 4500-E Series Switch, Cisco IOS XE Release 3.7.xE
Current release
IOS XE 3.7.3E—Januray 15, 2016IOS XE 3.7.2E, IOS XE 3.7.1E, IOS XE 3.7.0E
This release note describes the features, modifications, and caveats for the Cisco IOS XE 3.7.0E software on the Catalyst 4500E series switch with Supervisor Engine 7-E, 7L-E, and 8-E.
Note For the Supervisor Engine 8-E to support IOS XE 3.7.0E, the ROMMON version must be upgraded to 15.1(1r)SG5. (Refer to Upgrading the System Software).
Cisco IOS XE 3.7.0E is a feature rich new software feature release for IOS and IOS-XE based Catalyst Access Switching products (Cat4500E/X, 3850/3650, 3K-X, Cat2K and 2K/3K Compact switches) which brings new innovations for Converged Access in wired and wireless topologies, IT Simplicity, Application Experience, and Mobility. This release will provide standard maintenance.
Support for Cisco IOS XE Release 3.7.0E follows the standard Cisco Systems® support policy, available at
http://www.cisco.com/en/US/products/products_end-of-life_policy.htmlFor more information on the Catalyst 4500E series switches, visit the following URL:
http://www.cisco.com//en/US/products/hw/switches/ps4324/index.html
Note Although this release note and those for the Catalyst 4900M, Catalyst 4948E, Catalyst 4948E-F Series Switches, Catalyst 4500 Series Switches, and the Catalyst 4500-X Series Switches differ, each leverages the same Software Configuration Guide, Command Reference Guide, and System Message Guide.
Cisco IOS Software Packaging
The Enterprise Services image supports all Cisco Catalyst 4500E Series software features based on Cisco IOS Software, including enhanced routing.
The IP Base image supports Open Shortest Path First (OSPF) for Routed Access, Enhanced Interior Gateway Routing Protocol (EIGRP) "limited" Stub Rout ing, Nonstop Forwarding/Stateful Switchover (NSF/SSO), and RIPv1/v2. The IP Base image does not support enhanced routing features such as BGP, Intermediate System-to-Intermediate System (IS-IS), Full OSPF, Full Enhanced Interior Gateway Routing Protocol (EIGRP) & Virtual Routing Forwarding (VRF-lite).
The LAN Base image complements the existing IP Base and Enterprise Services images. It is focused on customer access and Layer 2 requirements and therefore many of the IP Base features are not required.
Starting with Cisco IOS Release XE 3.5.0E, OSPF Routed Access in IP Base support rose to 1000 routes.
Cisco XE Release Strategy
Customers with Catalyst 4500 Series Switches who need the latest hardware and software features should migrate to Cisco IOS Release XE 3.7.0E.
IOS XE 3.2.xSG is an active maintenance train that supports Sup7E only. IOS XE 3.4.xSG is a maintenance train supporting Sup7E and Sup7L-E. IOS XE 3.6.xSG is a maintenance train supporting Sup7E, Sup7L-E and Sup8-E. IOS XE 3.6.xE, 3.4.xSG, and 3.2.xSG are extended maintenance (EM) releases. IOS XE 3.5.xE and 3.3.0SG are standard releases (SM).
Figure 1 displays the release strategy.
Figure 1 Software Release Strategy for the Catalyst 4500E Series Switch
Support
Support for Cisco IOS Software Release XE 3.7.0E follows the standard Cisco Systems® support policy, available at
http://www.cisco.com/en/US/products/products_end-of-life_policy.htmlSystem Requirements
This section describes the system requirements:
- Supported Hardware on the Catalyst 4500E Series Switch
- Supported E-Series Hardware on Cisco IOS XE Release 3.7.xE
- Feature Support by Image Type
- OpenFlow Version and Cisco IOS Release Support
- Features Not Supported on the Cisco Catalyst 4500-E Series Switch
- Orderable Product Numbers
Note For information about wireless web UI requirements, see “Wireless Web UI Software Requirements” section
Supported Hardware on the Catalyst 4500E Series Switch
Supported Hardware on Cisco Catalyst 4500E
Supported Pluggable Transceiver Modules
Power over Ethernet on Cisco Catalyst 4500-E
Catalyst 4500-E series switch Supervisor Engine 7-E
Note This engine is supported on E-series, R-E, and R+E chassis.
Catalyst 4500-E series switch Supervisor Engine 7L-E
Note This engine is supported on E-series, R-E, and R+E chassis.
Catalyst 4500-E series switch Supervisor Engine 8-E
This engine is supported on E-series and R+E and R-E1 chassis.
Catalyst 4500E 48-Port UPOE with 12 Multigigabit ports and 36 10/100/1000 ports. This module supports the Cisco Multigigabit technology for 802.11ac Wave2 and 10GBASE-T speeds.
12-port 1000BASE-T Gigabit Ethernet and 2-GBIC ports switching module
24-port 10/100/1000BASE-T Gigabit Ethernet RJ-45 switching module
48-port 1000BASE-LX (small form-factor pluggable) Gigabit Ethernet fiber optic interface switching module
6-port Alternately-Wired 10/100/1000BASE-T Catalyst 4500 series Power over Ethernet (PoE) 802.3af or 1000BASE-X SFP
24-port 10/100/1000BASE-T RJ-45 Catalyst 4500 series PoE 802.3af
12-port 1000BASE-X (small form factor pluggable) module with jumbo frame support
Non-blocking 24-port 1000BASEX (small form factor pluggable) module
80 ports with Gigabit compact SFP (4:1 oversubscribed); 40 modules of Gigabit SFP line card (1000BaseX), providing 24 gigabits per-slot capacity (SFP optional) (2:1 oversubscribed)
48 port 10/100/1000BT with 2 to 1 oversubscription and jumbo frame support
48 port 10/100/1000 Mb with 2 to 1 oversubscription PoE 802.3af providing up to 20 Watts power/port
48 port 10/100/1000 Mb with 2 to 1 oversubscription PoE 802.3at providing up to 30 Watts power/port
48-port 10/100/1000 line card nonblocking PoE 802.3at providing up to 30 Watts power/port
48-port 10/100/1000 line card nonblocking PoE 802.3at and 60 watt UPoE PoE linecard with Ethernet Energy Efficient feature.
48-port 10/100/1000 nonblocking line card with the Ethernet Energy Efficient feature
48-port 1000Base-X SFP (small form factor pluggable) line card
24-port 1000Base-X SFP (small form factor pluggable) line card
12-port 1000Base-X SFP (small form factor pluggable) line card
24-port 100BASE-FX Fast Ethernet MT-RJ multimode fiber switching module
48-port 100BASE-FX Fast Ethernet MT-RJ multimode fiber switching module
48-port 100BASE-LX10 Fast Ethernet MT-RJ single-mode fiber switching module
24-port 10/100BASE-TX RJ-45 Cisco Catalyst 4500 series PoE 802.3af
32-port 10/100 Fast Ethernet RJ-45, plus 2-port 1000BASE-X (GBIC) Gigabit Ethernet switching module
48-port 10/100 Fast Ethernet RJ-21 Cisco Catalyst 4500 series PoE 802.3af telco
32-port 10/100 Fast Ethernet RJ-45 modular uplink switching module
1.The Cisco Catalyst 4507R-E Switch chassis that has hardware revision 2.0 or higher supports Supervisor Engine 8-E. For information about identifying the revision numbers see the “Identifying Hardware Revisions on the Switch Chassis” section.
Cisco 10-Gigabit Ethernet Transceiver Modules Compatibility Matrix
http://www.cisco.com/c/en/us/td/docs/interfaces_modules/transceiver_modules/compatibility/matrix/10GE_Tx_Matrix.html
Cisco Gigabit Ethernet Transceiver Modules Compatibility Matrix
http://www.cisco.com/c/en/us/td/docs/interfaces_modules/transceiver_modules/compatibility/matrix/GE_Tx_Matrix.html
http://www.cisco.com/c/en/us/td/docs/interfaces_modules/transceiver_modules/compatibility/matrix/100MB_Tx_Matrix.html
Cisco Wavelength Division Multiplexing Transceivers Compatibility Matrix
http://www.cisco.com/c/en/us/td/docs/interfaces_modules/transceiver_modules/compatibility/matrix/OL_6982.html
Cisco 40-Gigabit Ethernet Transceiver Modules Compatibility Matrix
http://www.cisco.com/c/en/us/td/docs/interfaces_modules/transceiver_modules/compatibility/matrix/40GE_Tx_Matrix.html
Table 3 Power over Ethernet on Cisco Catalyst 4500-E
Power over Ethernet on the Cisco Catalyst 4500E Series Platform Data Sheet
http://www.cisco.com/c/en/us/products/collateral/switches/catalyst-4500-series-switches/product_data_sheet09186a00801f3dd9.html
Supported E-Series Hardware on Cisco IOS XE Release 3.7.xE
A brief list of primary E-Series hardware supported by Cisco IOS XE Release 3.7.xE is shown in Table 4 .
Wired Web UI (Device Manager) System Requirements
– Windows 2000, Windows 2003, Windows XP, Windows Vista, or Windows 7
– With JavaScript enabled: Internet Explorer 6.0 and 7.0, or Firefox 26.0
Feature Support by Image Type
Table 5 is a detailed list of features supported on Catalyst 4500-E Supervisor Engine 7-E, Supervisor Engine 7L-E, and Supervisor Engine 8-E running Cisco IOS XE Software Release 3.7.xE categorized by image type. Please visit Feature Navigator for package details:
http://tools.cisco.com/ITDIT/CFN/
Note Wireless features supported on Supervisor Engine 8-E are available only on IP Base and Enterprise Services images.
Table 5 LAN Base, IP Base, and Enterprise Services Image Support on Cisco Catalyst 4500E Supervisor Engine 7-E, Supervisor Engine 7L-E, and Supervisor Engine 8-E
BGP Increased Support of Numbered as-path Access Lists to 500
CFM/IEEE 802.1ag - D8.1 standard Compliant CFM, Y.1731 multicast LBM / AIS / RDI / LCK, IP SLA for Ethernet
Class Based Ethernet CoS Matching & Marking (802.1p & ISL CoS)
Easy VSS2
IEEE 802.1s Multiple Spanning Tree (MST) Standard Compliance
IEEE 802.1t3
IEEE 802.3ad Link Aggregation (LACP) Port-Channel Standalone Disable
IGMP Version 3 - Explicit Tracking of Hosts, Groups, and Channels
IP Multicast Load Splitting - Equal Cost Multipath (ECMP) using S, G and Next-hop
IPv6 First Hop Security (FHS):
IPv6 Snooping (Data Gleaning, per-limit Address Limit)
IPv6 Neighbor Discovery (ND) Inspection
IPv6 First Hop Security (FHS) Phase 2:
Lightweight DHCPv6 Relay Agent (LDRA)
Neighbor Discovery (ND) Multicast Suppress
Source and Prefix Guard4
IPv6 Multicast: Multicast Listener Discovery (MLD) Protocol, Versions 1 and 2
IPv6 Multicast: RPF Flooding of Bootstrap Router (BSR) Packets
Yes 4
Yes 4
Yes5
IPv6 Services: Cisco Discovery Protocol (CDP) - IPv6 Address Family Support for Neighbor Information
IPv6 Switching: CEFv6 Switched Automatic IPv4-compatible Tunnels (in software)
IPv6 Tunneling: Automatic IPv4-compatible Tunnels (in software)
IPv6 Tunneling: Manually Configured IPv6 over IPv4 Tunnels (in software)
Medianet: Integrated Video Traffic Simulator (hardware-assisted IP SLA); IPSLA generator and responder
Medianet: Media Monitoring (Performance Monitoring and Mediatrace)
NEAT Enhancement: Re-Enabling BPDU Guard Based on User Configuration
Yes 4
Yes 4
Yes 4
OSPF for Routed Access6
Yes 4
Yes 4
Yes 4
Yes 4
Yes 4
Yes 4
Yes 4
Yes 4
Yes 4
Yes 4
RADIUS Attribute 44 (Accounting Session ID) in Access Requests
Smart Install Director—Configuration-only Deployment and Smooth Upgrade
Source Specific Multicast (SSM) - IGMPv3,IGMP v3lite, and URD
Time Domain Reflectometry (TDR)7
TrustSec: IEEE 802.1ae MACSec encryption on user facing ports
TrustSec: IEEE 802.1ae MACSec encryption on user facing ports SSO
TrustSec: IEEE 802.1ae MACSec encryption between switch-to-switch links using Cisco SAP (Security Association Protocol)
Virtual Switching System (VSS): Layer 2 Protocol Tunneling, VLAN Translation, and Q-in-Q
Wired Guest Access8
OpenFlow Version and Cisco IOS Release Support
The following table provides OpenFlow compatibility information for the Cisco Catalyst 4500-E Series Switches. The OVA package is available for download in the same location as your system image (.bin) file, on cisco.com
Note The OVA package is compatible only with its corresponding system image file name - as listed in the table below. Do not use an older version of the OVA package with a newer system image file, or a newer OVA package with an older system image file.
Table 6 Image Support for OpenFlow Version and Cisco IOS Release Support for Cisco OpenFlow Plug-In
MIB Support
For information on MIB support, please refer to this URL:
ftp://ftp.cisco.com/pub/mibs/supportlists/cat4000/cat4000-supportlist.html
Features Not Supported on the Cisco Catalyst 4500-E Series Switch
The following features are not supported on a Catalyst 4500-E series switch with Supervisor Engine 7-E and Supervisor Engine 7L-E:
New and Changed Information
These sections describe the new and changed information for the Catalyst 4500 series switch running Cisco IOS XE software:
- New Features in IOS XE 3.7.3E
- New Features in IOS XE 3.7.2E
- New Features in IOS XE 3.7.1E
- New Features in IOS XE 3.7.0E
New Features in IOS XE 3.7.3E
Note In IOS XE Release 3.7.2 and earlier, the clients were not able to get DHCP on the guest anchored WLAN, which is configured on the 4500 MA Foreign Controller. This issue was resolved on IOS XE Release 3.7.3.
New Features in IOS XE 3.7.2E
The Cisco IOS XE Release 3.7.xE Documentation Roadmap provides quick and easy access to all relevant documentation for specific platforms. Look for Quick Links to Platform Documentation on the respective platform documentation pages. For more information, see http://www.cisco.com/c/en/us/support/ios-nx-os-software/ios-xe-3e/tsd-products-support-series-home.html.
New Hardware Features in Release IOS XE 3.7.2E
New Software Features (Wired) in Release IOS XE 3.7.2E
New Hardware Features in Release IOS XE 3.7.1E
New Software Features (Wired) in Release IOS XE 3.7.1E
Support for Cisco Plug-in for OpenFlow (Cisco Plug-in for OpenFlow, Version 2.0.0) provides better control over networks making them more open, programmable, and application-aware.
The Cisco plug-in supports a subset of OpenFlow 1.3 and OpenFlow 1.0 functions. For the list of supported functions and configuration information, see the Cisco Plug-in for OpenFlow Configuration Guide for Catalyst 4500 Series Switches .
For compatibility information, see OpenFlow Version and Cisco IOS Release Support
CTS Fields Support for Cisco TrustSec (CTS) fields, to monitor and troubleshoot the CTS network, and to segregate traffic based on source group tag (SGT) values.
Support for forwarding GRE tunneled packets on the Catalyst 4500 series switches hardware.
Support for point-to-point protocol tunneling of LACP and PAgP protocols.
Support for Layer 2 tunneling of the UDLD protocol. This can be used in conjunction with the LACP or PAgP point-to-point tunneling or by itself, for unidirectional tunnel detection.
Support for the new lacp rate command, to set the rate at which Link Aggregation Control Packets (LACP) packets are sent to LACP-supported interfaces.You can change the timeout rate from30 seconds (default rate) to 1 second (fast rate).
Support for Object Group ACLs (OGACLs), to group ACE entries, and add or remove entries, while keeping your ACL structure more readable.
Support for MAC address filtering.You can prevent the switch from learning specific MAC addresses, by forbidding the MAC addresses on all interfaces, globally, or on a specific port-security enabled interface.
Support for VRF copy commands. You can specify a VRF for copy commands (FTP, TFTP, SCP etc.), when copying files to and from the switch.
Support for WCCP Version 2 on VSS, on the Enterprise Services image only.
New Software Features (Wireless) in Release IOS XE 3.7.1E
New Hardware Features in Release IOS XE 3.7.0E
Support for WS-X45-Sup8-E on the Cisco Catalyst 4507R-E and Cisco Catalyst 4510R-E switch chassis.
Note The Cisco Catalyst 4507R-E Switch chassis requires hardware revision 2.0 or higher to support Supervisor Engine 8-E. For information about identifying the hardware revision number see the“Identifying Hardware Revisions on the Switch Chassis” section.
Support for USB ports on Supervisor Engine 8-E, with hardware revision 1.1 or higher.
Support for line cards other than 47xx line cards, in slot 10.
New Software Features (Wireless) in Release IOS XE 3.7.0E
Wireless capability is added to Catalyst 4500E series switch with Supervisor Engine 8-E (Sup 8-E). The wireless feature parity is with the Cisco Catalyst 3850 and Catalyst 3650 Switch platforms.
Note The MC managing MA feature introduced in this release on the Catalyst 3850 and Catalyst 3650 features is not supported on Sup 8-E.
The following table lists the new wireless features for Release IOS XE 3.7.0E:
In this release, support is added to the following access points:
- Cisco Aironet 1700 Series Access Point
- Cisco Aironet 1570 Series Access Point (supported only in Local mode)
VLAN tagging is supported on Cisco Aironet 700W Series Access Points
This feature enables you to know network usage information on a per user basis within an application. This feature is enabled by default and is available if AVC is enabled.
Regulatory domains for India (–D), Indonesia (–F), Brazil (–Z), Honk Kong (–S) are supported.
New CLI support to view AFD statistics information.
Switch# show platform qos wireless stats ssid { ssid-value | all } client all
New CLI support to check whether an access point model is supported.
Allows successfully authenticated devices to stay logged in for a configured period without reauthentication.
The following CLI is added under the webauth parameter map:
sleeping-client timeout timeout-in-minutes
– There is one-to-one mapping between device MAC and username/password. Once an entry is added to sleeping-client cache, the device/user gets policies for the user stored in the cache. Therefore, any other user using the device also gets the same policies as the user stored in the sleeping-client cache. The user can force normal authentication by logging out. To do that, the user must explicitly enter the following URL:
– Mobility is not supported. If the client roams from one controller to another, the client undergoes normal authentication on the foreign controller.
Support is added for Control Plane Protection on Wireless (applicable only to Supervisor Engine 8-E)
For more information about wireless functionality on the Supervisor Engine 8-E, see http://www.cisco.com/c/en/us/products/collateral/switches/catalyst-4500-series-switches/data_sheet_c78-728191.html .
For more wireless related information, see “Wireless Related Information” section
New Software Features (Wired) in Release IOS XE 3.7.0E
The following table list the new features for Release IOS XE 3.7.0E:
Generates auto-QoS configuration that is hidden from running configuration.
Authentication sessions are established in single and multi-host modes for IP Phones. However, if voice VLAN and 802.1x on an interface port is enabled, then CDP Bypass is enabled when the host mode is set to single or multi-host mode.
Note By default the host mode is set to single mode in legacy mode and multi-authentication in the eedge mode.
Support for all IPv6 First Hop Security Features over EtherChannel. You can apply these features either directly to EtherChannel interface, or over a VLAN that the EtherChannel belongs to.
Support for IPv6 wild card masking when specifying the Layer 3 address of a IPv6 ACL entry
Support for Policy-Based Routing, on IPv4 and IPv6 traffic, on multiple virtual routing instances.
Software support for USB ports on Supervisor Engine 8-E9.
Increases the maximum characters supported in a VLAN name from 32 to 128.
VSS: Layer 2 Protocol Tunneling, VLAN Translation, and Q-in-Q
Support for Dot1q Tunnel (“legacy/classic” dot1q tunnel), Dot1q tunneling and L2PT (Layer 2 Protocol Tunneling), and VLAN Translation (1:1 and 1:2-Selective QinQ).
Uses Ethernet in IP (RFC3378) within the centralized architecture to create a tunnel across a Layer 3 topology between two WLC endpoints. No additional protocols or segmentation techniques are needed to isolate guest traffic from the enterprise.
Cisco IOS XE to Cisco IOS
As Table 8 shows, each version of Cisco IOS XE has an associated Cisco IOS version:
Wireless Related Information
- Wireless Web UI Software Requirements
- Access Points and Mobility Services Engine
- Compatibility Matrix
- Interoperability with Other Client Devices
- Important Notes
Access Points and Mobility Services Engine
Table 9 lists the supported products for the wireless features.
Table 10 lists the specific supported Cisco access point models.
Compatibility Matrix
Table 11 lists the software compatibility matrix.
For more information on the compatibility of wireless software components across releases, see the Cisco Wireless Solutions Software Compatibility Matrix .
Interoperability with Other Client Devices
This section describes the interoperability of this version of the switch software release with other client devices.
Table 12 lists the client types on which the tests were conducted. The clients included laptops, handheld devices, phones, and printers.
Important Notes
- Software expand running command is not available. We recommend that you use software expand file command instead.
- Redundancy mode rpr is not available in wireless enabled mode.
- Location keyword to fetch the data from active/active-dc/stby/stby-dc
- Wireless mode shows dc boot status and errors (if any) during boot up.
No configuration is allowed on internal interfaces.
Status/Stats of internal ports are visible under service internal command.
– Supported only in ipbase and entservices license.
– Supported only in install mode.
– Supported only in cat4500es8-universalk9* (Crypto) images
– Requires rommon version 15.1(1r)SG5 or later
– DC bootup logs are stored in bootflash (max 5 files, 1 per reload) with dc_console_log-yyyymmdd-hhmmss-UTC format.
– After DC becomes operational, the logs are forwarded to BB's syslog. DC logs have a prefix of DC-SLOT<slot-no>:
– DC crash info and system reports are stored at crashinfo-dc: and slavecrshinfo-dc: for active-dc and stby-dc respectively
- DC can be disabled in install boot via “hw-module daughtercard disable” configuration. However, you must save the configuration and reload the system for this to take effect.
- AP Joining the WLC:
– A new AP, which has only factory default configurations, sends an L3 Broadcast Discovery message to learn and discover a WLC. Then the WLCs in the broadcast domain respond to this request. This request also has the number of APs they can support and how many APs are currently connected. The AP then would send a Join message to the least loaded WLC among the list.
– When there is an explicit primary WLC IP address configured on the AP, the AP sends a unicast WLC discovery message to this specific WLC. There could also be WLCs that the AP learned about in its past associations with the WLCs and it would send a Unicast Discovery to these WLCs too. After the WLCs respond to this query, it matches with the primary WLC name and IP address and if the match is found, it will join the WLC. If there is an invalid WLC name or IP, then it will not match and it will join the other WLCs that would have responded to the unicast query. If no other WLC responded to the AP, it would send an L3 broadcast discovery message again.
– There is a difference in behavior between how the Sup 8-E based MA or MC handles the Unicast L3 Discovery packet as compared to the Catalyst 3850 Switch in MA or MC mode.
On Catalyst 3850 Switches—Any packet received on the management VLAN is terminated and not forwarded to the unicast IP address in the discovery even if the address does not belong to itself. When a primary base IP of the WLC is configured, the MA does not forward the unicast packets and the AP therefore falls back to sending a broadcast discovery packet which terminates on the Catalyst 3850 Switch.
On Sup 8-E—On the Sup 8-E MA, however, the unicast discovery packet, if received on the management VLAN, is forwarded to the right destination based on the IP address in the discovery packet. Therefore, it reaches the destined WLC and joins it and not the SUP 8-E if the destination IP address is other than the SUP 8-E itself. This results in AP joining the MC and not the MA.
Upgrading the System Software
If you are upgrading to Cisco IOS XE Version 3.7.xE and plan to use VSS, you must upgrade your ROMMON to version 15.0(1r)SG10. Otherwise, you must upgrade your ROMMON to at least Version 15.0(1r)SG2.
For details on how to upgrade ROMMON, refer to:
If you are upgrading to Cisco IOS XE 3.7.xE and using Supervisor Engine 7-E or 7L-E, you must use ROMMON version 15.0(1r)SG10 or a higher version (if available).
If you are upgrading to Cisco IOS XE 3.7.xE and using Supervisor Engine 8-E, you must use ROMMON version 15.1(1r) SG5 or later, version or a higher version (if available).
Note If dual supervisor engines are present, first upgrade your software to Cisco IOS XE 3.2.0SG or higher, then upgrade your ROMMON to version 15.0(1r)SG7 to avoid an uplinks issue (CSCtj54375).
Note When you upgrade to Cisco IOS XE Release 3.7.5E, SSH access is lost, because it cannot use the CISCO_IDEVID_SUDI_LEGACY RSA server key. Before upgrade, generate the server key using the crypto key generate rsa command in global configuration mode. To verify whether the RSA server key is available on your device, run the show crypto key command.
Identifying Hardware Revisions on the Switch Chassis
The Cisco Catalyst 4507R-E Switch chassis that has hardware revision 2.0 or higher supports Supervisor Engine 8-E. Before you install Supervisor Engine 8-E on the Catalyst 4507R-E Switch chassis, enter the show idprom chassis privileged EXEC command on the existing switch chassis to know its current revision number.
The following is a sample output of the show idprom chassis command on a Catalyst 4507R-E Switch. Note the “
Hardware Revision
” field here is “2.0
”:Upgrading ROMMON Image for Supervisor Engine 8-E
For IOS XE Release 3.7.xE, the ROMMON image must be upgraded to use version 15.1(1r)SG5. The IOS XE Bundle format for Supervisor Engine 8-E has changed, necessitating a new ROMMON image.
The following [error] messages might be observed if IOS XE 3.7.xE images are booted with older ROMMON images:
Identifying an +E Chassis and ROMMON
When supervisor engine 1 (sup1) is in ROMMON and supervisor engine 2 (sup2) is in IOS, only sup2 can read the idprom contents of chassis’ idprom. Chassis type is displayed as “+E” in the output of the show version command. Conversely, sup1 can only display the chassis type as “E.”
When both sup1 and sup2 are in ROMMON, both engines can read the chassis’ idprom. Chassis type is displayed correctly as “+E” in the output of the show version command.
When both sup1 and sup2 are in IOS, both engines can read the chassis’ idprom. Chassis type is displayed correctly as “+E” in the output of the show version command.
Limitations and Restrictions
- If WLAN applied client policy is invalid, the client is excluded with the exclusion reason being 'Client QoS Policy failure'.
- The maximum MTE supported on Catalyst 4500 switches is 8000, per direction.
- Although the show memory command is supported on Catalyst 4500 series switches, the CLI output for the command shows the value 0 for conf ig total, on Catalyst 4500 series switches using a daughter card on Supervisor Engine 7-E. This issue is, however, not seen on switches with Supervisor Engine 7-E baseboard. (CSCup28930)
- The system allows you to delete policy maps related to these Auto QoS profiles:
The problem is seen on a Catalyst 4500 series switch running Cisco IOS-XE release 3.7.0E, when you configure QoS using Auto Qos and you try to delete an Auto QoS profile related policy map.
Workaround : To recover the deleted policy-map, remove all the policies related to that profile, remove Auto QoS configuration from the WLAN, and then reconfigure Auto QoS.
- Dot1x PEAP based authentication for wireless clients on Supervisor Engine 8-E is 3 auths/sec.
- Indirectly connected access points are not supported. Only access points directly connected to a trunk or access port is supported. On connecting more than one AP the following error message will be seen:
3. Dec 5 03:57:24.121: %CAPWAP-3-ONE_AP_PER_PORT: AP (mac:6c20.56a6.4fc4) is not allowed on port:Po2. Only one AP per port is allowed.
- RPR mode cannot be configured when Supervisor Engine 8-E is booted in wireless mode.
- Flow Sampling is not supported on Supervisor Engine 8-E.
- Supported QoS features on wireless targets: The detailed QoS policy is the same as mentioned here: http://www.cisco.com/c/en/us/td/docs/wireless/controller/5700/software/release/3e/qos/configuration_guide/b_qos_3e_5700_cg/b_qos_3e_5700_cg_chapter_011.html#concept_47CC8E2ACA2E44489B9BB7068FCD0649 ), except that the port policy cannot be changed because it is a DC-interconnect port.
- VSS: Do not use SVLAN for routing in SP network on ingress switch (where the mapping is present). This is not an valid scenario.
- VSS is not supported in Wireless mode, on Supervisor Engine 8-E.
- Wired guest access does not work on Supervisor Engine 8-E, in multi-host or multi-authentication mode.
- The show exception files all command lists only crashinfo files from the active supervisor engine. You must issue the dir slavecrashinfo: and dir slvecrashinfo-dc: commands to obtain lists of crashinfo files from the standby supervisor engine.
- Performing an ISSU from a prior release to IOS XE 3.6.0E is not supported.
- The WS-X4712-SFP+E module is not supported in the WS-C4507R-E or WS-C4510R-E chassis and does not boot. This module is supported in the WS-C4503-E, WS-C4506-E, WS-C4507R+E, and WS-C4510R+E chassis.
- More than 16K QoS policies can be configured in software. Only the first 16K are installed in hardware.
- Adjacency learning (through ARP response frames) is restricted to roughly 1000 new adjacencies per second, depending on CPU utilization. This should only impact large networks on the first bootup. After adjacencies are learned they are installed in hardware.
- Multicast fastdrop entries are not created when RPF failure occurs with IPv6 multicast traffic. In a topology where reverse path check failure occurs with IPv6 multicast, this may cause high CPU utilization on the switch.
- The SNMP ceImageFeature object returns a similar feature list for all the three license levels (LAN Base, IP Base, and EntServices). Although the activated feature set for a universal image varies based on the installed feature license, the value displayed by this object is fixed and is not based on the feature license level.
- Standard TFTP implementation limits the maximum size of a file that can be transferred to 32 MB. If ROMMON is used to boot an IOS image that is larger than 32 MB, the TFTP transfer fails at the 65,xxx datagram.
TFTP numbers its datagrams with a 16 bit field, resulting in a maximum of 65,536 datagrams. Because each TFTP datagram is 512 bytes long, the maximum transferable file is 65536 x 512 = 32 MB. If both the TFTP client (ROMMON) and the TFTP server support block number wraparound, no size limitation exists.
Cisco has modified the TFTP client to support block number wraparound. So, if you encounter a transfer failure, use a TFTP server that supports TFTP block number wraparound. Because most implementations of TFTP support block number wraparound, updating the TFTP daemon should fix the issue.
The outputs of certain commands, such as show ip route and show access-lists, contain non-deterministic text. While the output is easily understood, the output text does not contain strings that are consistently output. A general purpose specification file entry is unable to parse all possible output.
While a general purpose specification file entry may not be possible, a specification file entry might be created that returns the desired text by searching for text that is guaranteed to be in the output. If a string is guaranteed to be in the output, it can be used for parsing.
For example, the output of the show ip access-lists SecWiz_Gi3_17_out_ip command is this:
The first line is easily parsed because access list is guaranteed to be in the output:
The remaining lines all contain the term host. As a result, the specification file may report the desired values by specifying that string. For example, this line
will produce the following for the first and second rules
and the following for the third statement
Request the output of the show running-config command using NETCONF and parse that output for the desired strings. This is useful when the desired lines contain nothing in common. For example, the rules in this access list do not contain a common string and the order (three permits, then a deny, then another permit), prevent the spec file entry from using permit as a search string, as in the following example:
The XML output of show running-config command includes the following, which can then be parsed programmatically, as desired:
<X-Interface> permit 0000.0000.ffef ffff.ffff.0000 0000.00af.bcef ffff.ff00.0000 appletalk</X-Interface>
- When attaching a existing policy-map (that is already applied to a control-port) to another front-panel port, the following message displays:
The policymap <policy-map name> is already attached to control-plane and cannot be shared with other targets.Workaround: Define a policy-map with a different name and then reattach. CSCti26172
- If the number of unique FNF monitors attached to target exceeds 2048 (one per target), a switch responds slowly:
– Decrease the number of monitors.
– Attach the same monitor to multiple targets. CSCti43798
- ciscoFlashPartitionFileCount object returns an incorrect file count for bootflash:, usb0:, slot0:, slaveslot0:, slavebootflash:, and slaveusb0:.
Workaround: Use the dir device command (for example, dir bootflash:) to obtain the correct file count. CSCti74130
- If multicast is configured and you make changes to the configuration, Traceback and CPUHOG messages are displayed if the following conditions exist:
– At least 10K groups and roughly 20K mroutes exist.
– IGMP joins with source traffic transit to all the multicast groups.
This is caused by the large number of updates generating SPI messages that must be processed by the CPU to ensure that the platform is updated with the changes in all the entries.
- With traffic running, entering clear ip mroute * with larger number of mroutes and over 6 OIFs will cause Malloc Fail messages to display.
You cannot clear a large number of mroutes at one time when traffic is still running.
Workaround: Do not clear all mroutes at once.
- Although you can configure subsecond PIM query intervals on Catalyst 4500 platforms, such an action represents a compromise between convergence (reaction time) and a number of other factors (number of mroutes, base line of CPU utilization, CPU speed, processing overhead per 1 m-route, etc.). You must account for those factors when configuring subsecond PIM timers. We recommend that you set the PIM query interval to a minimum of 2 seconds. By adjusting the available parameters, you can achieve flawless operation; that is, a top number of multicast routes per given convergence time on a specific setup.
- Energywise WOL is not “waking up” a PC in hibernate or standby mode.
Workaround: Use the show version command. CSCtr30294
Workaround: Select an alternate destination or source port. CSCty05405
– 10/100/1000BaseT Premium POE E Series WS-X4648-RJ45V+E (JAE1348OY52)
– 4 Sup 7-E 10GE (SFP+), 1000BaseX (SFP) WS-X45-SUP7-E (CAT1434L0G4)
the following restrictions apply:
– Sub-interfaces are not supported on 1 Gigabit and Ten-Gigabit interfaces.
– Port-channel members do not support multiple classification criteria for a QoS policy.
– CEF is disabled automatically when uRFP is enabled and TCAM is fully utilized.
- When either the RADIUS-server test feature is enabled or RADIUS-server dead-criteria is configured, and either RADIUS-server deadtime is set to 0 or not configured, the RADIUS-server status is not properly relayed to AAA.
Workaround: Configure both dead-criteria and deadtime.
– Links flap for various Layer 3 protocols.
– A traffic loss of several seconds is observed during the upgrade process.
Workaround: Do not use the quick option with the issu changeversion command. CSCto51562
- While configuring an IPv6 access-list, if you specify hardware statistics as the first statement in v6 access-list mode (i.e. before issuing any other v6 ACE statement), it will not take effect. Similarly, your hardware statistics configuration will be missing from the output of the show running command.
You will not experience this behavior with IPv4 access lists.
Workaround: During IPv6 access-list configuration, configure at least one IPv6 ACE before the "hardware statistics" statement. CSCuc53234
- Routed packets that are fragmented are not policed if the egress interface is on the VSS Standby switch. However, if the egress interface is on the VSS Active switch, these packets are policed.
This applies to QoS policing only. QoS marking, shaping and sharing behave as expected.
- When an IPv6 FHS policy is applied on a VLAN and an EtherChannel port is part of that VLAN, packets received by EtherChannel (from neighbors) are not bridged across the local switch.
Workaround: Apply FHS policies on a non EtherChannel port rather than a VLAN. CSCua53148
- During VSS conversion, the switch intended as the Standby device may require up to 9 minutes to reach an SSO state. The boot up time depends on the configuration and on the number of line cards in the system.
- Dual connectors (like, an SFP+ transceiver inserted into a CVR-X2-SFP10G module) on the WS-X4606-X2-E line card are not supported as a VSL.
Workaround: Use any X2-pluggable module on its own in the WS-X4606-X2-E line card. CSCuc70321
Workaround: Observe the show module command output. CSCua79513
- Beginning with IOS Release XE 3.5.0E, error messages that occur when a QoS policy is applied will no longer appear directly on the console when no logging console is configured. They will appear only when a logging method is active (e.g., logging buffered, logging console, …).
Workaround: None. QoS groups are not supported in VSS. CSCuc84739
- Auto negotiation cannot be disabled on the Fa1 port. It must be set to auto/auto, or fixed speed with duplex auto.
- The following messages are seen during boot up after POST check.
These messages are cosmetic only, and no ssh services are available unless configured within IOS.
- When a logging discriminator is configured and applied to a device, memory leak is seen under heavy syslog or debug output. The rate of the leak is dependent on the quantity of logs produced. In extreme cases, the device may crash. As a workaround, disable the logging discriminator on the device (CSCur45606, CSCur28336).
Caveats
Caveats describe unexpected behavior in Cisco IOS releases. Caveats listed as open in a prior release are carried forward to the next release as either open or resolved.
Note For the latest information on PSIRTS, refer to the Security Advisories on CCO at the following URL:
http://www.cisco.com/en/US/products/products_security_advisories_listing.html
Cisco Bug Search Tool
The Bug Search Tool (BST), which is the online successor to Bug Toolkit, is designed to improve the effectiveness in network risk management and device troubleshooting. The BST allows partners and customers to search for software bugs based on product, release, and keyword, and aggregates key data such as bug details, product, and version. The tool has a provision to filter bugs based on credentials to provide external and internal bug views for the search input.
To view the details of a caveat listed in this document:
1. Access the BST (use your Cisco user ID and password) at https://tools.cisco.com/bugsearch/ .
Open Caveats for Cisco IOS XE Release 3.7.xE
Resolved Caveats for Cisco IOS XE Release 3.7.3E
Use the Bug Search Tool to view the details of a caveat listed in this section:
Resolved Caveats for Cisco IOS XE Release 3.7.2E
Use the Bug Search Tool to view the details of a caveat listed in this section:
Resolved Caveats for Cisco IOS XE Release 3.7.1E
Use the Bug Search Tool to view the details of a caveat listed in this section:
Resolved Caveats for Cisco IOS XE Release 3.7.0E
Use the Bug Search Tool to view the details of a caveat listed in this section:
Related Documentation
Refer to the following documents for additional Catalyst 4500 series information:
http://www.cisco.com//en/US/products/hw/switches/ps4324/index.html
http://www.cisco.com/c/en/us/support/ios-nx-os-software/ios-xe-3e/products-documentation-roadmaps-list.html
Hardware Documents
Installation guides and notes including specifications and relevant safety information are available at the following URLs:
http://www.cisco.com/en/US/docs/switches/lan/catalyst4500/hardware/catalyst4500e/installation/guide/Eseries.html
- For information about individual switching modules and supervisors, refer to the Catalyst 4500 Series Module Installation Guide at:
http://www.cisco.com/en/US/docs/switches/lan/catalyst4500/hardware/configuration/notes/OL_25315.html
http://www.cisco.com/en/US/docs/switches/lan/catalyst4500/hardware/regulatory/compliance/78_13233.html
http://www.cisco.com/en/US/products/hw/switches/ps4324/prod_installation_guides_list.html
Software Documentation
Software release notes, configuration guides, command references, and system message guides are available at the following URLs:
http://www.cisco.com/en/US/products/hw/switches/ps4324/prod_release_notes_list.html
Software documents for the Catalyst 4500 Classic, Catalyst 4500 E-Series, Catalyst 4900 Series, and Catalyst 4500-X Series switches are available at the following URLs:
http://www.cisco.com/en/US/products/hw/switches/ps4324/products_installation_and_configuration_guides_list.html
http://www.cisco.com/en/US/products/hw/switches/ps4324/prod_command_reference_list.html
http://www.cisco.com/en/US/products/hw/switches/ps4324/products_system_message_guides_list.html
Cisco IOS Documentation
Platform- independent Cisco IOS documentation may also apply to the Catalyst 4500 and 4900 switches. These documents are available at the following URLs:
http://www.cisco.com/en/US/products/ps6350/products_installation_and_configuration_guides_list.html
http://www.cisco.com/en/US/products/ps6350/prod_command_reference_list.html
You can also use the Command Lookup Tool at:
http://tools.cisco.com/Support/CLILookup/cltSearchAction.do
http://www.cisco.com/en/US/products/ps6350/products_system_message_guides_list.html
You can also use the Error Message Decoder tool at:
http://www.cisco.com/pcgi-bin/Support/Errordecoder/index.cgi
Notices
The following notices pertain to this software license.
OpenSSL/Open SSL Project
This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit ( http://www.openssl.org/ ).
This product includes cryptographic software written by Eric Young (eay@cryptsoft.com).
This product includes software written by Tim Hudson (tjh@cryptsoft.com).
License Issues
The OpenSSL toolkit stays under a dual license, i.e. both the conditions of the OpenSSL License and the original SSLeay license apply to the toolkit. See below for the actual license texts. Actually both licenses are BSD-style Open Source licenses. In case of any license issues related to OpenSSL please contact openssl-core@openssl.org.
Copyright © 1998-2007 The OpenSSL Project. All rights reserved.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:
1. Redistributions of source code must retain the copyright notice, this list of conditions and the following disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions, and the following disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgment: “This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit ( http://www.openssl.org/ )”.
4. The names “OpenSSL Toolkit” and “OpenSSL Project” must not be used to endorse or promote products derived from this software without prior written permission. For written permission, please contact openssl-core@openssl.org.
5. Products derived from this software may not be called “OpenSSL” nor may “OpenSSL” appear in their names without prior written permission of the OpenSSL Project.
6. Redistributions of any form whatsoever must retain the following acknowledgment:
“This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit ( http://www.openssl.org/ )”.
THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT “AS IS”' AND ANY EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
This product includes cryptographic software written by Eric Young (eay@cryptsoft.com). This product includes software written by Tim Hudson (tjh@cryptsoft.com).
Copyright © 1995-1998 Eric Young (eay@cryptsoft.com). All rights reserved.
This package is an SSL implementation written by Eric Young (eay@cryptsoft.com).
The implementation was written so as to conform with Netscapes SSL.
This library is free for commercial and non-commercial use as long as the following conditions are adhered to. The following conditions apply to all code found in this distribution, be it the RC4, RSA, lhash, DES, etc., code; not just the SSL code. The SSL documentation included with this distribution is covered by the same copyright terms except that the holder is Tim Hudson (tjh@cryptsoft.com).
Copyright remains Eric Young’s, and as such any Copyright notices in the code are not to be removed. If this package is used in a product, Eric Young should be given attribution as the author of the parts of the library used. This can be in the form of a textual message at program startup or in documentation (online or textual) provided with the package.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:
1. Redistributions of source code must retain the copyright notice, this list of conditions and the following disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following acknowledgment:
“This product includes cryptographic software written by Eric Young (eay@cryptsoft.com)”.
The word ‘cryptographic’ can be left out if the routines from the library being used are not cryptography-related.
4. If you include any Windows specific code (or a derivative thereof) from the apps directory (application code) you must include an acknowledgement: “This product includes software written by Tim Hudson (tjh@cryptsoft.com)”.
THIS SOFTWARE IS PROVIDED BY ERIC YOUNG “AS IS” AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
The license and distribution terms for any publicly available version or derivative of this code cannot be changed. i.e. this code cannot simply be copied and put under another distribution license [including the GNU Public License].
“Notices” section.CCVP, the Cisco logo, and Welcome to the Human Network are trademarks of Cisco Systems, Inc.; Changing the Way We Work, Live, Play, and Learn is a service mark of Cisco Systems, Inc.; and Access Registrar, Aironet, Catalyst, CCDA, CCDP, CCIE, CCIP, CCNA, CCNP, CCSP, Cisco, the Cisco Certified Internetwork Expert logo, Cisco IOS, Cisco Press, Cisco Systems, Cisco Systems Capital, the Cisco Systems logo, Cisco Unity, Enterprise/Solver, EtherChannel, EtherFast, EtherSwitch, Fast Step, Follow Me Browsing, FormShare, GigaDrive, HomeLink, Internet Quotient, IOS, iPhone, IP/TV, iQ Expertise, the iQ logo, iQ Net Readiness Scorecard, iQuick Study, LightStream, Linksys, MeetingPlace, MGX, Networkers, Networking Academy, Network Registrar, PIX, ProConnect, ScriptShare, SMARTnet, StackWise, The Fastest Way to Increase Your Internet Quotient, and TransPath are registered trademarks of Cisco Systems, Inc. and/or its affiliates in the United States and certain other countries.