Full Cisco Trademarks with Software License
THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS.
THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY.
The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB's public domain version of the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California.
NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS" WITH ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE.
IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be actual addresses and phone numbers. Any examples, command display output, network topology diagrams, and other figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses or phone numbers in illustrative content is unintentional and coincidental.
All printed copies and duplicate soft copies of this document are considered uncontrolled. See the current online version for the latest version.
Cisco has more than 200 offices worldwide. Addresses and phone numbers are listed on the Cisco website at www.cisco.com/go/offices.
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL: https://www.cisco.com/c/en/us/about/legal/trademarks.html. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (1721R)
About The Cisco Catalyst 8200 and Catalyst 8300 Series Edge Platforms
The Cisco Catalyst 8200 and Catalyst 8300 Series Edge Platforms are best-of-breed, 5G-ready, cloud edge platforms designed for accelerated services, multi-layer security, cloud-native agility, and edge intelligence to accelerate your journey to cloud.
Cisco Catalyst 8200 and Catalyst 8300 Series Edge Platforms with Cisco IOS XE SD-WAN Software deliver Cisco’s secure, cloud-scale SD-WAN solution for the branch. The Cisco Catalyst 8200 and Catalyst 8300 Series Edge Platforms are built for high performance and integrated SD-WAN Services along with flexibility to deliver security and networking services together from the cloud or on premises. It provides higher WAN port density and a redundant power supply capability. The Cisco Catalyst 8200 and Catalyst 8300 Series Edge Platforms have a wide variety of interface options to choose from—ranging from lower and higher module density with backward compatibility to a variety of existing WAN, LAN, voice, and compute modules. Powered by Cisco IOS XE, fully programmable software architecture, and API support, these platforms can facilitate automation at scale to achieve zero-touch IT capability while migrating workloads to the cloud. The Cisco Catalyst 8200 and Catalyst 8300 Series Edge Platforms also come with Trustworthy Solutions 2.0 infrastructure that secures the platforms against threats and vulnerabilities with integrity verification and remediation of threats.
The Cisco Catalyst 8200 and Catalyst 8300 Series Edge Platforms are well suited for medium-sized and large enterprise branch offices for high WAN IPSec performance with integrated SD-WAN services.
For more information on the features and specifications of Cisco Catalyst 8200 and Catalyst 8300 Series Edge Platforms, refer to the Cisco Catalyst 8300 Series Edge platforms datasheet.
Note |
Sections in this documentation apply to all models of Cisco Catalyst 8200 and Catalyst 8300 Series Edge Platforms unless a reference to a specific model is made explicitly. |
Note |
Cisco IOS XE Dublin 17.12.1a is the first release for the Cisco Catalyst 8200 and Catalyst 8300 Series Edge Platforms in the Cisco IOS XE Dublin 17.12.x release series. |
Product Field Notice
Cisco publishes Field Notices to notify customers and partners about significant issues in Cisco products that typically require an upgrade, workaround or other user action. For more information, see https://www.cisco.com/c/en/us/support/web/field-notice-overview.html.
We recommend that you review the field notices to determine whether your software or hardware platforms are affected. You can access the field notices from https://www.cisco.com/c/en/us/support/web/tsd-products-field-notice-summary.html#%7Etab-product-categories.
New and Changed Hardware and Software Features
Feature Navigator
You can use Cisco Feature Navigator (CFN) to find information about the software features, platform, and software image support on Cisco Catalyst 8200 and Catalyst 8300 Series Edge Platforms. To access Cisco Feature Navigator, go to https://cfnng.cisco.com/.
Note |
To access CFN, you do not require an account on cisco.com. |
New and Changed Hardware Features
Hardware |
Description |
---|---|
The C-NIM-8M are the next generation LAN/WAN NIM modules that provide enhanced security, reliability, and performance. The Cisco C-NIM-8M module provides 2.5 Gbps mGig connectivity and supports UPoE+. Also, Cisco C-NIM-8M supports Layer 2 and Layer 3 configurable Ethernet network. |
New and Changed Software Features in Cisco IOS XE 17.12.2
This release provides a fix for CSCwh87343: Cisco IOS XE Software Web UI Privilege Escalation Vulnerability. For more information, see the Security Advisory: cisco-sa-iosxe-webui-privesc-j22SaA4z.
Feature |
Description |
||||
---|---|---|---|---|---|
The Managed Cellular Activation solution provides a programmable subscriber identity module (SIM), called an eSIM, a physical SIM card that you can configure with a cellular service plan of your choice. When ordering a pluggable interface module (PIM) to provide cellular connectivity for your router, choose a PIM model with a preinstalled eSIM. The Managed Cellular Activation solution comes with a “bootstrap” cellular plan to provide internet connectivity with a limited amount of data intended only for Day 0 onboarding of the device to your cellular plan. For information about configuring Cisco SD-WAN Manager with the details of your cellular plan in preparation for onboarding the device, see the Cisco Managed Cellular Activation Configuration Guide. Prepare the configuration in Cisco SD-WAN Manager before powering on and onboarding the device, to avoid running out of the limited data in the bootstrap cellular plan. Added Cisco Managed Cellular Activation (eSIM) support for the following Pluggable Interface Module (PIM) models:
|
New and Changed Software Features in Cisco IOS XE 17.12.1a
Feature |
Description |
---|---|
The IPv6 Unicast Support feature introduces support for IPv6 dataplane to RAR Dynamic Link Exchange Protocol. |
|
This feature allows you to perform management operations for SD-Routing devices using Cisco Catalyst SD-WAN Manager. You can use a single network management system (Cisco Catalyst SD-WAN Manager) to monitor all the SD-Routing devices and therefore help in simplifying solution deployments. |
|
This enhancement introduces support for Quantum-Safe Encryption using Post-Quantum Preshared Keys for the following platforms:
|
|
Segment Routing (SR) can currently be applied on Multiprotocol Label Switching (MPLS) dataplane. From Cisco IOS XE 17.12.1a, SR is supported over the IPv6 dataplane for the following protocols:
In addition, the following functionalities are available for Segment Routing over IPv6 dataplane:
|
|
This feature allows you to delete the entries from the logging buffer. You can configure the local syslog retention period after which the entries are purged from the device automatically. To enable this feature, use the logging purge-log buffer days command. |
|
TrustSec and Software-Defined Access Scale Measurement |
With this feature, the scale numbers for TrustSec and Software-Defined Access (SDA) are measured for the following:
|
ROMMON Compatibility Matrix
The following table lists the ROMMON releases supported in Cisco IOS XE 17.12.x releases.
Platforms |
Cisco IOS XE Release |
Minimum ROMMON Release Supported for IOS XE |
Recommended ROMMON Release Supported for IOS XE |
---|---|---|---|
Catalyst 8300 Series Edge Platforms |
|||
C8300-1N1S-4T2X|6T |
17.12.1a |
17.3(1r) |
17.6(6r) |
C8300-2N2S-4T2X|6T |
17.12.1a |
17.3(1.2r) |
17.6(6.1r) |
Catalyst 8200 Series Edge Platforms |
|||
C8200-1N-4T |
17.12.1a |
17.4(1r) |
17.6(6r) |
C8200L-1N-4T |
17.12.1a |
17.5(1.1r) |
17.6(6r) |
Resolved and Open Bugs for Cisco IOS XE 17.12.x
Resolved Bugs in Cisco IOS XE 17.12.3
Identifier |
Headline |
---|---|
Device keeps crashing when processing a firewall feature. |
|
IKEv2 - diagnose feature is taking 11% CPU during the session bring up. |
|
Platform USB disable will not work once USB is removed and inserted in a device. |
|
NAT HSL logging vrf-filter does not work on the device. |
|
Warning and critical CPU utilization thresholds not recomputed when using data-plane-heavy mode. |
|
PoE module is not providing enough power to bring the ports after an unexpected reload. |
|
SNMP unable to poll SD-WAN tunnel data after a minute. |
|
SKA_PUBKEY_DB leak in TDL. |
|
Security policy w/IPS external syslog config failing generation for specific device models. |
|
Endpoint tracker triggers a CPU hog. |
|
ZBFW is not able to detect packets on TenGig interface. |
|
Adding verbose log to indicate grant ra-auto un configures grant auto in PKI server. |
|
C-NIM-2T cannot boot up in full configuration: 6x C-NIM-2T + IOS 17.12.02. |
|
When two or more IP phones located on the NAT outside network register with the same server, the device generates incorrect or malformed NAT entries. |
|
Mobile-app causing excessive authorization attempts with a Null Username. |
|
The system experienced an unexpected reboot after setting up the control plane for EVPN MPLS and is starting to receive packets. |
|
Device may crash due to Crypto IKMP process. |
|
VG410 audio loss for 4 seconds. |
|
PKI crash after failing a CRL fetch. |
|
Device crash with segmentation fault(11), Process = NHRP when processing NHRP traffic. |
|
CUBE device unexpectedly reloads while fetching certificate trustpool for SIP TLS. |
|
Epbr will generate error when the policy is added and deleted multiple times. |
|
One-way RTP issue including DSP Timeout Messages. |
|
Unexpected reboot while dispalying information from cleared SSS session . |
|
PMTUD incorrectly converging without attempting to learn a higher MTU. |
|
Cannot disable DMVPN logging in IOS-XE 17.8 and higher. |
|
Device should discard IKE notification messages with incorrect DOI. |
|
Device dropping IPsec traffic when SVI is used as source for DMVPN tunnel. |
|
Race condition crash on device. |
|
Frame Relay DTE router crashes due to EXMEM exhaustion. |
|
cpp_mcplo_ucode crash with port-channel and NAT. |
|
ftmd crash observed in ENCS platform while running PWK suite. |
|
When attempting an ATO (Assured Tactical Operations), the session fails to establish through the tunnel after repeatedly shutting down and re-enabling the connection in a loop, which simulates unplugging and plugging back in the cable on the customer's end. |
|
IPsec traffic is being dropped on Strongswan when PPK is implemented. |
|
Packet drops observed between LISP EID over GRE tunnel. |
|
Failed to upgrade device via Cisco SD-WAN Manager due to error: system config has been modified. |
|
C-NIM-2T w/SwitzerCC in unable to boot up in IOS. |
|
AAA:Template push fail when aaa authorization is set to local. |
Open Bugs in Cisco IOS XE 17.12.3
Identifier |
Headline |
---|---|
Creating a CLI to push at#enadis=0 followed with at#reboot to FN980 is required when configuring Multi-PDN. |
|
Device SFP interface shut down, but opposing device interface is still up. |
|
Critical process cpp_ha_top_level_server fault on fp_0_0 (rc=69). |
|
Device: L2TP xconnect stops forwarding traffic after a new subinterface is added. |
|
NAT command is not readable after the system is reloaded. |
|
Device: Shared HSRP vMAC between multiple interfaces causes a data plane problem. |
|
After deleting and reconfiguring the IPv6 TCP adjust-MSS setting, it is not functioning correctly. |
|
The system unexpectedly restarts when executing the command 'show running-config full | format'. |
|
When the peer device restarts, the device, which uses a QSFP fiber connection for 100G/40G, reports a link-flap error. |
|
The UCS-E160S module is stuck in the booting state while being used in a device. |
|
The device has a limitation of storing only 64 Fully Qualified Domain Name (FQDN) patterns, yet the configuration allows the input of more than 64 FQDNs. |
Resolved Bugs in Cisco IOS XE 17.12.2
Identifier |
Headline |
---|---|
Cisco IOS XE Software Web UI Privilege Escalation Vulnerability. For more information, see Security Advisory: cisco-sa-iosxe-webui-privesc-j22SaA4z. |
|
Device uses the NIM-1T/4T card for interconnection, and NAT+ GRE over IPsec cannot be applied. |
|
Using special characters in the password while generating TP generates an invalid TP. |
|
Crypto PKI-CRL-IO_0 process crash when PKI trustpoint is requested and deleted. |
|
DDNS update retransmission timer fails to work with a traceback error. |
|
Device HSRP received unexpected active hello packet when the interface is recovered. |
|
Device crashes@crypto_map_unlock_map_head. |
|
Device data plane crash in Umbrella/OpenDNS processing due to incorrect UDP length. |
|
Crashed by track client thread at access invalid memory location. |
|
CPU usage mismatch in show sdwan system status vs show process cpu platform |
|
EVPN: BUM traffic is not flooded to bridge domain interface. |
|
Flowspec on device does not revoke. |
|
Crash when modifying tunnel after running show crypto command. |
|
Device observes memory leak at process "SSS Manager". |
|
Memory leak with pubd. |
|
ip name-server command not pushed. |
|
IOS process crash during VRRP hash table lookup. |
|
Device running IOS-XE crashes when removing FQDN ACL. |
|
NTP authentication removed after reload using more than 16 bytes. |
|
Segmentation fault at IPv6 BGP backup route notification. |
|
Cisco IOx application hosting environment privilege escalation vulnerability. |
|
WLC unexpected ueload due to segmentation fault in WNCD process. |
|
Unable to migrate from ADSL to VDSL without reboot. |
|
Extranet multicast code improvements for better handling of data structure. |
|
VC down due to control-word negotiation. |
|
BDI + NTP configuration puts DMI process in degraded mode. |
|
Carrier Grade NAT reaching max host entries and failing to translate due to gatekeeper |
Open Bugs in Cisco IOS XE 17.12.2
Identifier |
Headline |
---|---|
Router keeps crashing when processing a firewall feature. |
|
Segmentation fault crash with Network Mobility Services Protocol (NMSP). |
|
The platform USB disable will not work once USB is removed and inserted. |
|
Warning and critical CPU utilization thresholds not recomputed when using data-plane-heavy mode. |
|
Displays faulty Output for show int te0/0/0 transceiver command. |
|
HSEC license installation from the workflow does not complete. |
|
SNMP unable to poll Cisco SD-WAN tunnel data after a minute. |
|
Add verbose log to indicate grant ra-auto un configures grant auto in PKI server. |
|
Unexpected reboot after establishing control plane of EVPN MPLS and receiving packets. |
|
Device requires Shut/No Shut to populate IP address from modem to host. |
|
Router unexpectedly reloads while fetching certificate trustpool for SIP TLS. |
|
Silent reload due to LocalSoftADR causes crash without core file. |
|
PoE module is not providing enough power to bring the ports after an unexpected reload. |
|
Router crash with segmentation fault (11), Process = NHRP when processing NHRP traffic |
|
Device driver is not sending NGIO packets to UCSE after the router reload. |
|
NAT Pool does not working under prefix 16. Available address = zero. |
|
Carrier Grade NAT reaching max host entries and failing to translate due to gatekeeper. |
|
Unexpected reboot while dispalying information from cleared SSS session. |
|
PMTUD incorrectly converging without attempting to learn a higher MTU. |
|
Device crashed unexpectedly after a successful WGB/AP config deployment from OD. |
|
Packets with L2TP headers cause device to crash. |
|
NHRP phase 3 spoke-spoke cache got purged after 5-6 hours with always on traffic running. |
|
After removing the USB from the device, the files copied to it will be deleted. |
|
IOS XE:Traffic not encrypted and droped over PSec SVTI tunnel. |
|
Unable to disable DMVPN logging. |
|
Enable SoS/ROC feature for DSL. |
|
Frame relay DTE router crashes due to EXMEM exhaustion. |
|
IPv6 SPD min/max defaulting to values 1 and 2. |
|
High CPU due to MPLS MIB poll. |
|
WNCD process crashes. |
|
VPLS IRB not working when traffic came from VPNv4 and next-hop is learned over VPLS. |
|
pubd process showing high CPU utilization. |
|
1Gig int on device using GLC-SX-MMD are down/down after changing connection. |
|
Memory leak with pubd. |
|
Convergence improvement after device reboot with mVPN profile 14. |
|
NETCONF: DMI enters degraded mode caused by BGP neighbor configured under the SCOPE command. |
|
FIB/LFIB inconsistency after BGP flap. |
|
IOS XE router may experience "%FMANRP_QOS-4-MPOLCHECKDETAIL:" errors. |
|
EEM is running daily instead of weekly or monthly if special strings @weekly or @monthly are used. |
|
Mismatch between the resource allocation and "app-resource profile custom" configuration. |
|
Incorrect local MPLS label in CEF after BGP flap. |
|
Cisco IOS-XE IPv6 based subscription telemetry does not work. |
|
Guestshell connectivity not working with NAT overload. |
|
SDA - using "spt-threshold infinity" and having LHR+FHR can cause the S,G to be pruned on the RP. |
|
Unexpected reload when using rsh/rcmd. |
|
Locally generated traffic received on incorrect interface inbound and dropped by ACL. |
|
WLC unable to get telemetry data due to pubd unexpected reload and fail. |
|
Device crash due to dhcpd_binding_check. |
|
Site tag change wncd working/failing EAP-TLS. |
|
ARP incomplete in VRF Mgmt-intf - G0/0/0 - Switch -G0. |
|
LLDP location information not sent when configured. |
|
clear bgp command does not consider AFIs when used with update-group option. |
|
Device sending incomplete SGT to ISE. |
|
Only portion of HSRP config being pushed via CLI ADDON template. |
|
"match pktlen-range" does not work with GRE/IPSEC GRE. |
|
In the show tech file, "enable secret" does not get hidden. |
|
Unexpected reload on device ucode core @l2_dst_output_goto_output_feature_ext_path. |
|
ISIS crash in local uloop. |
|
Wrong /32 self, complete map-cache entry for fabric hosts on iBN when overlapping summary exists. |
|
Member interface config not applied with mis-match in pcakages.conf files. |
|
WLC not sending accounting start for user auth after machine auth on 9105AXW RLAN dot1x port. |
|
Router unexpectedly reloads while using DHCP for ISG. |
|
IOS-XE router not installing classless-static-routes from DHCP option 121. |
|
SVL, 10G link on the active chassis will go down after reload. |
|
Device sync fails when device prompt comes along with device banner and TACACS is used. |
|
Unexpected reboot in device due to SISF and STP initialization. |
|
Crash on device polling SPA sensor data. |
|
VLAN name mismatch when authorizing vlan name from radius server and enable vlan fallback. |
|
Password getting visible for the mask-secret in show logging. |
|
Upgrade failing with config check track-id-name. |
|
CTS CORE process crash after configuring role based ACL. |
|
IPv6 traffic is passing through when the client is in Webauth Pending state (CWA). |
|
Option 121 never requested by IOS-XE client. |
|
[IPv6 BGP] multiple sourced paths present for the same prefix. |
|
IP SPD queue thresholds are out of range. |
|
CBQoS polling for the object cbQosCMPostPolicyBitRate returns incorrect value. |
|
Device unexpected reload. |
|
After migration MAC/IP only MAC is advertised. |
|
"BGP Router" process crash. |
|
Memory leak under MallocLite/AAA proxy with NETCONF/RESTCONF. |
|
Memory leak in linux_iosd-imag due to SNMP. |
|
After a reboot, EAP-FAST/PEAP does not authenticate unless credentials are changed. |
Resolved Bugs in Cisco IOS XE 17.12.1a
Identifier |
Headline |
---|---|
Not all HSL entries get pushed to device if more than 1 HSL entries are configured. |
|
Issues/discrepancies around CPU alarms generated and sent to device. |
|
FHRP stay in active/active state after physical interface flap. |
|
TLS control-connections down, traffic from controller dropped with SDWAN Implicit ACL Drop. |
|
MACsec remains marked as secured, but randomly the traffic stops working. |
|
Route-map not getting effect when its applied in OMP for BGP routes. |
|
Unexpected behavior due to unstable power source. |
|
(EPC, packet-trace) for IPsec running COFF (Crypto Offload). |
|
Certificate output is not getting changed on renew when Cloud Certificate Authorization is Automated. |
|
NAT ALG is changing the Call-ID within SIP message header causing calls to fail. |
|
Router upgrade fails due to advertise aggregate with VRF. |
|
AAR: BoW feature ignoring color preference from Tiered Transport preference configuration. |
|
VPN is established although the peer is using a revoked certificate for authentication. |
|
ROMMON for auto-upgrade. |
|
Crash seen when umbrella/zscaler template pushed to device when name_lookup takes > 30 sec. |
|
NAT entries expire on Standby Router. |
|
Dataplane memory utilization issue - 97% QFP DRAM memory utilization. |
|
Unexpected reboot due to IOSXE-WATCHDOG: Process = Crypto IKMP. |
|
Platform punt-policer is not configurable. |
|
For some error condition platform_properties may double free. |
|
Same label is assigned to different VRFs. |
|
Crypto PKI-CRL-IO_0 process crash when PKI trustpoint is being deleted. |
|
Auto-Update Cycle incorrectly deletes certificates. |
|
All usb internal communcation is closed when using platform usb disable command. |
|
%CRYPTO_SL_TP_LEVELS-6-VAR_NEW_VALUE message is observed in each write config with same crypto value. |
|
Device BFD Session Down with interface flap. |
|
Double GR_Additional log enablement defect. |
|
Segmentation fault in PB rx when per-tunnel qos config withdraw. |
|
No way audio when using secure Hardware conference with secure endpoints. |
|
IOS-XE cpp crash when entering no ip nat create flow-entries. |
|
AAR overlay actions are applied to DIA traffic. |
|
Configuring entity-information xpath filter causes syslogs to print, does not return data. |
|
Device unexpected reload when doing ips test with UTD IPS engine. |
|
Autotunnel Ipsec tracker: Tracker does not come up at all on vedge. |
|
AppNav-XE: Policy-map edit on cluster with multiple service context fails to program TCAM. |
|
Non-fabric- Load the minimal bootstrap configs again if device rebooted without saving the configs. |
|
Port-channel DPI Load-Balancing not utilizing all the member-links. |
|
GARP on port up/up status from router is not received by remote peer device. |
|
Enable VFR CLI. |
|
Telstra Cert: FN980 modem (P-5GS6-GL) is showing 4 additional NR bands support - 1, 3, 7, and 28. |
Open Bugs in Cisco IOS XE 17.12.1a
Identifier |
Headline |
---|---|
Changes to speed on the interface via CLI/GUI dont go through unless first done via shell access. |
|
Unable to configure crypto map on a physical interface due to which crypto map-based VPN's cannot be formed. |
|
Router unexpectedly reloads due to 'LocalSoft'. |
|
Using special characters in the password while generating TP generates an invalid TP. |
|
APN password in plain text when Cellular controller profile is configured. |
|
Punt keep alive failure crash on controller managed device apparently due to data packets. |
|
With Pure IPV6, minimal bootstrap unable to onboard Non-Fabric - ipv6 config missing in wan int G1. |
|
Misprograming during vpn-list change under data policy. |
|
Router Silent Reload due to CpuCatastrophicError. |
|
SFP transceiver DOM not working after some time, however interface forwards the traffic as expected. |
|
BFD going down for newly onboarded device. |
|
Rapid memory leak on ngiolite process. |
|
No licenses in use after upgrading from Traditional to Smart licensing IOS-XE versions. | |
Speed tests to internet from device triggered will fail sometimes. |
|
Unexpected reboot due QFP UCode due to IPSec functions. |
|
Show run and other show commands not in sync after removing GigabitEthernet3. |
|
NAT64 prefix is not originated into OMP. |
|
Crash when modifying tunnel after running show crypto commands. |
|
SIP calls not working on device with ZBFW enabled. |
|
Could not access any device show commands at all. |
|
RP3 observes Memory Leak at process SSS Manager. |
|
Configure replace command fails due to the license udi PID XXX SN:XXXX line on IOS-XE devices. |
|
ITU channel configuration seems not working on router. |
|
Unable to migrate from ADSL to VDSL without reboot on device. |
|
SDRA-SSLVPN : The SSLVPN session closes with re-authentication error after some interval of time. |
|
Traffic forwarded to wrong VPN hence traffic gets wrong zonepair matched and gets dropped. |
|
IPv4 connectivity over PPP not restored after reload. |
|
OMP to BGP Redistribution Leads to Incorrect AS_Path Installation on Chosen Next-Hop. |
|
Unexpected reboot due qfp Ucode due to IPsec functions. |
|
BFD Entries Removed. |
|
Router has Local Soft ADR crash, writes flat core, and reloads. |
|
Multiple Crashes observed on device platform due to Memory Exhaustion. |
|
Static route keep advertising via OMP even though there is no route. |
|
Static NAT entry gets deleted from running config; but remains in startup config. |
|
B2B NAT: when configration ip nat inside/outside on VASI intereface,ack/seq number abnormal. |
|
Device crashes with crypto map unlock map head. |
|
Device uses the NIM-1T/4T card for interconnection, and NAT with GRE over IPsec cannot be applied. |
|
C-NIM-2T: LED L remains green after port shutdown. |
Related Documentation
Communications, Services, and Additional Information
-
To receive timely, relevant information from Cisco, sign up at Cisco Profile Manager.
-
To get the business impact you’re looking for with the technologies that matter, visit Cisco Services.
-
To submit a service request, visit Cisco Support.
-
To discover and browse secure, validated enterprise-class apps, products, solutions and services, visit Cisco Marketplace.
-
To obtain general networking, training, and certification titles, visit Cisco Press.
-
To find warranty information for a specific product or product family, access Cisco Warranty Finder.
Cisco Bug Search Tool
Cisco Bug Search Tool (BST) is a web-based tool that acts as a gateway to the Cisco bug tracking system that maintains a comprehensive list of defects and vulnerabilities in Cisco products and software. BST provides you with detailed defect information about your products and software.
Cisco Bug Search Tool
Cisco Bug Search Tool (BST) is a gateway to the Cisco bug-tracking system, which maintains a comprehensive list of defects and vulnerabilities in Cisco products and software. The BST provides you with detailed defect information about your products and software.
Documentation Feedback
To provide feedback about Cisco technical documentation, use the feedback form available in the right pane of every online document.
Troubleshooting
For the most up-to-date, detailed troubleshooting information, see the Cisco TAC website at https://www.cisco.com/en/US/support/index.html.
Go to Products by Category and choose your product from the list, or enter the name of your product. Look under Troubleshoot and Alerts to find information for the issue that you are experiencing.