sr
stringlengths 9
9
| prompt_software
stringlengths 815
57.9k
| prompt_product
stringlengths 807
36.2k
| Customer_Symptom__c
stringlengths 253
14.2k
| Description
stringlengths 33
14k
| Resolution_Summary__c
stringlengths 7
7.89k
| Problem_Description__c
stringlengths 3
5.37k
| Product_Name__c
stringlengths 8
22
| SW_Version__c
stringlengths 3
42
| Case_Close_SW_Version__c
stringlengths 3
18
| CXSAT_Score__c
stringlengths 3
5
| Priority
stringclasses 3
values | Health_Score__c
stringclasses 2
values | Underlying_Cause__c
stringclasses 9
values | Product_Family__c
stringclasses 11
values | Technology_Text__c
stringclasses 10
values | Sub_Technology_Text__c
stringlengths 3
89
| SW_Product__c
stringlengths 3
18
| Problem_Code_Description__c
stringclasses 7
values | Sub_Technology_Description__c
stringlengths 3
89
| Technology_Description__c
stringclasses 10
values | HW_Product__c
stringlengths 3
18
| Automation_Level__c
stringclasses 9
values |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
695109716 | Question: Which software version is principally discussed in these documents?
Answer "NONE" if you cannot find answer in the given documents.
The ONLY software version should be selected from the given software version list: 16.12.04/ NA - COMPONENT ONLY/ THIRD_PARTY_PRODUCT_SW/ NA - RMA/ 16.12.04/ 3.2.3o/ 15.0.2/ 16.06.07/ 16.12.03s/ 1/ 16.06.08/ 16.12.1s/ 17.03.05/ 16.12.4/ 16.9.5/ 16.12.01s/ PRODUCT_NOT_FOUND/ 16.3.5/ 16.12.3s/ 16.09.02/ 16.12.3a/ 16.12.1s/ 17.6.4 Response in this JSON format:
{"software_version": "","explanation": "", "summary": ""}
17.3.23 - - - -
+ as per discussion with rep, it is agreed upon for soft closure
10.3.23 - - - -
+ 2nd follow up
7.3.23 - - - -
+ 1st follow up
Based on the provided documentation,
------------------ show switch stack-ports summary ------------------
Sw#/Port# Port Status Neighbor Cable Length Link OK Link Active Sync OK #Changes to LinkOK In Loopback
-------------------------------------------------------------------------------------------------------------------
1/1 OK 2 100cm Yes Yes Yes 2 No
1/2 OK 6 300cm Yes Yes Yes 1 No
2/1 OK 3 100cm Yes Yes Yes 1 No
2/2 OK 1 100cm Yes Yes Yes 1 No
3/1 OK 4 100cm Yes Yes Yes 1 No
3/2 OK 2 100cm Yes Yes Yes 2 No
4/1 OK 5 100cm Yes Yes Yes 1 No
4/2 OK 3 100cm Yes Yes Yes 3 No
5/1 OK 6 100cm Yes Yes Yes 1 No
5/2 OK 4 100cm Yes Yes Yes 2 No
6/1 OK 1 300cm Yes Yes Yes 2 No
6/2 OK 5 100cm Yes Yes Yes 1 No
Stack ports of all 6 switches in the tsack seem stable. We should monitor them.
#show switch stack-ports summary – will display if there were any changes on that specific link.
The following defect was found On Cat9200(stack),trap ciscoStackWiseMIB.0.0.6 (cswStackMemberRemoved) unable created normally CSCvw90216
The switch is also affected by this defect https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwa14578 - realted to the memory leak and the reload of switch 2.
Unfortunately, all the logs are from Feb 22, however noted that a you have a logging server, if possible to provide me the logs for that date and the specific hour, for further investigation.
As this stack is affected by 2 defects, my recommendation would be to upgrade to golden fixed release https://www.cisco.com/c/en/us/support/docs/switches/catalyst-9300-series-switches/214814-recommended-releases-for-catalyst-9200-9.html
10.3.23 - - - -
+ 2nd follow up
7.3.23 - - - -
+ 1st follow up
Based on the provided documentation,
------------------ show switch stack-ports summary ------------------
Sw#/Port# Port Status Neighbor Cable Length Link OK Link Active Sync OK #Changes to LinkOK In Loopback
-------------------------------------------------------------------------------------------------------------------
1/1 OK 2 100cm Yes Yes Yes 2 No
1/2 OK 6 300cm Yes Yes Yes 1 No
2/1 OK 3 100cm Yes Yes Yes 1 No
2/2 OK 1 100cm Yes Yes Yes 1 No
3/1 OK 4 100cm Yes Yes Yes 1 No
3/2 OK 2 100cm Yes Yes Yes 2 No
4/1 OK 5 100cm Yes Yes Yes 1 No
4/2 OK 3 100cm Yes Yes Yes 3 No
5/1 OK 6 100cm Yes Yes Yes 1 No
5/2 OK 4 100cm Yes Yes Yes 2 No
6/1 OK 1 300cm Yes Yes Yes 2 No
6/2 OK 5 100cm Yes Yes Yes 1 No
Stack ports of all 6 switches in the tsack seem stable. We should monitor them.
#show switch stack-ports summary – will display if there were any changes on that specific link.
The following defect was found On Cat9200(stack),trap ciscoStackWiseMIB.0.0.6 (cswStackMemberRemoved) unable created normally CSCvw90216
The switch is also affected by this defect https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwa14578 - realted to the memory leak and the reload of switch 2.
Unfortunately, all the logs are from Feb 22, however noted that a you have a logging server, if possible to provide me the logs for that date and the specific hour, for further investigation.
As this stack is affected by 2 defects, my recommendation would be to upgrade to golden fixed release https://www.cisco.com/c/en/us/support/docs/switches/catalyst-9300-series-switches/214814-recommended-releases-for-catalyst-9200-9.html
Hope you are doing good.
After TAC analysis, below is the summary report:
//
As I understand it, you are observing stack issues.
Based on the provided documentation,
------------------ show switch stack-ports summary ------------------
Sw#/Port# Port Status Neighbor Cable Length Link OK Link Active Sync OK #Changes to LinkOK In Loopback
-------------------------------------------------------------------------------------------------------------------
1/1 OK 2 100cm Yes Yes Yes 2 No
1/2 OK 6 300cm Yes Yes Yes 1 No
2/1 OK 3 100cm Yes Yes Yes 1 No
2/2 OK 1 100cm Yes Yes Yes 1 No
3/1 OK 4 100cm Yes Yes Yes 1 No
3/2 OK 2 100cm Yes Yes Yes 2 No
4/1 OK 5 100cm Yes Yes Yes 1 No
4/2 OK 3 100cm Yes Yes Yes 3 No
5/1 OK 6 100cm Yes Yes Yes 1 No
5/2 OK 4 100cm Yes Yes Yes 2 No
6/1 OK 1 300cm Yes Yes Yes 2 No
6/2 OK 5 100cm Yes Yes Yes 1 No
Stack ports of all 6 switches in the tsack seem stable.
We should monitor them.
#show switch stack-ports summary - will display if there were any changes on that specific link.
The following defect was found On Cat9200(stack),trap ciscoStackWiseMIB.0.0.6 (cswStackMemberRemoved) unable created normally CSCvw90216<https://apc01.safelinks.protection.outlook.com/?url=http%3A%2F%2Fcdets.cisco.com%2Fapps%2Fdumpcr%3F%26content%3Dsummary%26format%3Dhtml%26identifier%3DCSCvw90216&data=05%7C01%7Cmohamedissam.niyamathullah%40ncs.com.sg%7Cf6f55778cc244ffe4fc508db160d5841%7Cca90d8f589634b6ebca99ac468bcc7a8%7C1%7C0%7C638128018828469927%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=05NTrndwFHh5jVSRghLnTcdCJ1hTAFhrdFN%2Fx4zDTn8%3D&reserved=0>
The switch is also affected by this defect https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwa14578<https://apc01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fbst.cloudapps.cisco.com%2Fbugsearch%2Fbug%2FCSCwa14578&data=05%7C01%7Cmohamedissam.niyamathullah%40ncs.com.sg%7Cf6f55778cc244ffe4fc508db160d5841%7Cca90d8f589634b6ebca99ac468bcc7a8%7C1%7C0%7C638128018828469927%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=zvPY6QbVsIwOwWwnuB9eVLPjVgNhr%2FiZnubXuyh93Mk%3D&reserved=0> - realted to the memory leak and the reload of switch 2.
Unfortunately, all the logs are from Feb 22, however noted that you have a logging server, if possible to provide me the logs for that date and the specific hour, for further investigation.
Regarding port 3/0/11, do observe it flapping,
Feb 22 2023 17:34:55.656 SGT: %LINK-3-UPDOWN: Interface GigabitEthernet3/0/11, changed state to up
Feb 22 2023 17:34:56.657 SGT: %LINEPROTO-5-UPDOWN: Line protocol on Interface GigabitEthernet3/0/11, changed state to up
Feb 22 2023 17:35:40.786 SGT: %LINEPROTO-5-UPDOWN: Line protocol on Interface GigabitEthernet3/0/11, changed state to down
Feb 22 2023 17:35:41.787 SGT: %LINK-3-UPDOWN: Interface GigabitEthernet3/0/11, changed state to down
Please investigate the cable and RJ45 connector on both sides.
As this stack is affected by 2 defects, my recommendation would be to upgrade to golden fixed release https://www.cisco.com/c/en/us/support/docs/switches/catalyst-9300-series-switches/214814-recommended-releases-for-catalyst-9200-9.html<https://apc01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.cisco.com%2Fc%2Fen%2Fus%2Fsupport%2Fdocs%2Fswitches%2Fcatalyst-9300-series-switches%2F214814-recommended-releases-for-catalyst-9200-9.html&data=05%7C01%7Cmohamedissam.niyamathullah%40ncs.com.sg%7Cf6f55778cc244ffe4fc508db160d5841%7Cca90d8f589634b6ebca99ac468bcc7a8%7C1%7C0%7C638128018828469927%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=1wfS1ak1q%2Bfy51GaG%2FUVjfsvOZ0h3B6xccBoWb3PH60%3D&reserved=0>
//
Please let us know if you need Webex to schedule with TAC now.
Based on the provided documentation,
------------------ show switch stack-ports summary ------------------
Sw#/Port# Port Status Neighbor Cable Length Link OK Link Active Sync OK #Changes to LinkOK In Loopback
-------------------------------------------------------------------------------------------------------------------
1/1 OK 2 100cm Yes Yes Yes 2 No
1/2 OK 6 300cm Yes Yes Yes 1 No
2/1 OK 3 100cm Yes Yes Yes 1 No
2/2 OK 1 100cm Yes Yes Yes 1 No
3/1 OK 4 100cm Yes Yes Yes 1 No
3/2 OK 2 100cm Yes Yes Yes 2 No
4/1 OK 5 100cm Yes Yes Yes 1 No
4/2 OK 3 100cm Yes Yes Yes 3 No
5/1 OK 6 100cm Yes Yes Yes 1 No
5/2 OK 4 100cm Yes Yes Yes 2 No
6/1 OK 1 300cm Yes Yes Yes 2 No
6/2 OK 5 100cm Yes Yes Yes 1 No
Stack ports of all 6 switches in the tsack seem stable. We should monitor them.
#show switch stack-ports summary – will display if there were any changes on that specific link.
The following defect was found On Cat9200(stack),trap ciscoStackWiseMIB.0.0.6 (cswStackMemberRemoved) unable created normally CSCvw90216
The switch is also affected by this defect https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwa14578 - realted to the memory leak and the reload of switch 2.
Unfortunately, all the logs are from Feb 22, however noted that a you have a logging server, if possible to provide me the logs for that date and the specific hour, for further investigation.
As this stack is affected by 2 defects, my recommendation would be to upgrade to golden fixed release https://www.cisco.com/c/en/us/support/docs/switches/catalyst-9300-series-switches/214814-recommended-releases-for-catalyst-9200-9.html
Technology: LAN Switching
Subtechnology: Cat9300
Problem Code: Error Messages, Logs, Debugs
Product: NA
Product Family: C9300
Software Version: N/A
Router/Node Name: N/A
Problem Details: Stack port disconnects and reconnects again on its own. Need assistance to find out cause of the issue
Stack port disconnects and reconnects again on its own. Need assistance to find out cause of the issue
timestamp : 2023-03-20T12:21:45.000+0000 || updatedby : gikeshav || type : RESOLUTION SUMMARY || visibility : External || details : closed after 3 strikes | Question: Which product is principally discussed in these documents?
Answer "NONE" if you cannot find answer in the given documents.
The ONLY product name should be selected from the given product name list: C9300-48U-A/ C9300-48U/ THIRD_PARTY_PRODUCT_HW/ UCS-FI-6454/ C9300-NM-8X/ PWR-C1-1100WAC Response in this JSON format:
{"product_name": "","explanation": "", "summary": ""}
17.3.23 - - - -
+ as per discussion with rep, it is agreed upon for soft closure
10.3.23 - - - -
+ 2nd follow up
7.3.23 - - - -
+ 1st follow up
Based on the provided documentation,
------------------ show switch stack-ports summary ------------------
Sw#/Port# Port Status Neighbor Cable Length Link OK Link Active Sync OK #Changes to LinkOK In Loopback
-------------------------------------------------------------------------------------------------------------------
1/1 OK 2 100cm Yes Yes Yes 2 No
1/2 OK 6 300cm Yes Yes Yes 1 No
2/1 OK 3 100cm Yes Yes Yes 1 No
2/2 OK 1 100cm Yes Yes Yes 1 No
3/1 OK 4 100cm Yes Yes Yes 1 No
3/2 OK 2 100cm Yes Yes Yes 2 No
4/1 OK 5 100cm Yes Yes Yes 1 No
4/2 OK 3 100cm Yes Yes Yes 3 No
5/1 OK 6 100cm Yes Yes Yes 1 No
5/2 OK 4 100cm Yes Yes Yes 2 No
6/1 OK 1 300cm Yes Yes Yes 2 No
6/2 OK 5 100cm Yes Yes Yes 1 No
Stack ports of all 6 switches in the tsack seem stable. We should monitor them.
#show switch stack-ports summary – will display if there were any changes on that specific link.
The following defect was found On Cat9200(stack),trap ciscoStackWiseMIB.0.0.6 (cswStackMemberRemoved) unable created normally CSCvw90216
The switch is also affected by this defect https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwa14578 - realted to the memory leak and the reload of switch 2.
Unfortunately, all the logs are from Feb 22, however noted that a you have a logging server, if possible to provide me the logs for that date and the specific hour, for further investigation.
As this stack is affected by 2 defects, my recommendation would be to upgrade to golden fixed release https://www.cisco.com/c/en/us/support/docs/switches/catalyst-9300-series-switches/214814-recommended-releases-for-catalyst-9200-9.html
10.3.23 - - - -
+ 2nd follow up
7.3.23 - - - -
+ 1st follow up
Based on the provided documentation,
------------------ show switch stack-ports summary ------------------
Sw#/Port# Port Status Neighbor Cable Length Link OK Link Active Sync OK #Changes to LinkOK In Loopback
-------------------------------------------------------------------------------------------------------------------
1/1 OK 2 100cm Yes Yes Yes 2 No
1/2 OK 6 300cm Yes Yes Yes 1 No
2/1 OK 3 100cm Yes Yes Yes 1 No
2/2 OK 1 100cm Yes Yes Yes 1 No
3/1 OK 4 100cm Yes Yes Yes 1 No
3/2 OK 2 100cm Yes Yes Yes 2 No
4/1 OK 5 100cm Yes Yes Yes 1 No
4/2 OK 3 100cm Yes Yes Yes 3 No
5/1 OK 6 100cm Yes Yes Yes 1 No
5/2 OK 4 100cm Yes Yes Yes 2 No
6/1 OK 1 300cm Yes Yes Yes 2 No
6/2 OK 5 100cm Yes Yes Yes 1 No
Stack ports of all 6 switches in the tsack seem stable. We should monitor them.
#show switch stack-ports summary – will display if there were any changes on that specific link.
The following defect was found On Cat9200(stack),trap ciscoStackWiseMIB.0.0.6 (cswStackMemberRemoved) unable created normally CSCvw90216
The switch is also affected by this defect https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwa14578 - realted to the memory leak and the reload of switch 2.
Unfortunately, all the logs are from Feb 22, however noted that a you have a logging server, if possible to provide me the logs for that date and the specific hour, for further investigation.
As this stack is affected by 2 defects, my recommendation would be to upgrade to golden fixed release https://www.cisco.com/c/en/us/support/docs/switches/catalyst-9300-series-switches/214814-recommended-releases-for-catalyst-9200-9.html
Hope you are doing good.
After TAC analysis, below is the summary report:
//
As I understand it, you are observing stack issues.
Based on the provided documentation,
------------------ show switch stack-ports summary ------------------
Sw#/Port# Port Status Neighbor Cable Length Link OK Link Active Sync OK #Changes to LinkOK In Loopback
-------------------------------------------------------------------------------------------------------------------
1/1 OK 2 100cm Yes Yes Yes 2 No
1/2 OK 6 300cm Yes Yes Yes 1 No
2/1 OK 3 100cm Yes Yes Yes 1 No
2/2 OK 1 100cm Yes Yes Yes 1 No
3/1 OK 4 100cm Yes Yes Yes 1 No
3/2 OK 2 100cm Yes Yes Yes 2 No
4/1 OK 5 100cm Yes Yes Yes 1 No
4/2 OK 3 100cm Yes Yes Yes 3 No
5/1 OK 6 100cm Yes Yes Yes 1 No
5/2 OK 4 100cm Yes Yes Yes 2 No
6/1 OK 1 300cm Yes Yes Yes 2 No
6/2 OK 5 100cm Yes Yes Yes 1 No
Stack ports of all 6 switches in the tsack seem stable.
We should monitor them.
#show switch stack-ports summary - will display if there were any changes on that specific link.
The following defect was found On Cat9200(stack),trap ciscoStackWiseMIB.0.0.6 (cswStackMemberRemoved) unable created normally CSCvw90216<https://apc01.safelinks.protection.outlook.com/?url=http%3A%2F%2Fcdets.cisco.com%2Fapps%2Fdumpcr%3F%26content%3Dsummary%26format%3Dhtml%26identifier%3DCSCvw90216&data=05%7C01%7Cmohamedissam.niyamathullah%40ncs.com.sg%7Cf6f55778cc244ffe4fc508db160d5841%7Cca90d8f589634b6ebca99ac468bcc7a8%7C1%7C0%7C638128018828469927%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=05NTrndwFHh5jVSRghLnTcdCJ1hTAFhrdFN%2Fx4zDTn8%3D&reserved=0>
The switch is also affected by this defect https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwa14578<https://apc01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fbst.cloudapps.cisco.com%2Fbugsearch%2Fbug%2FCSCwa14578&data=05%7C01%7Cmohamedissam.niyamathullah%40ncs.com.sg%7Cf6f55778cc244ffe4fc508db160d5841%7Cca90d8f589634b6ebca99ac468bcc7a8%7C1%7C0%7C638128018828469927%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=zvPY6QbVsIwOwWwnuB9eVLPjVgNhr%2FiZnubXuyh93Mk%3D&reserved=0> - realted to the memory leak and the reload of switch 2.
Unfortunately, all the logs are from Feb 22, however noted that you have a logging server, if possible to provide me the logs for that date and the specific hour, for further investigation.
Regarding port 3/0/11, do observe it flapping,
Feb 22 2023 17:34:55.656 SGT: %LINK-3-UPDOWN: Interface GigabitEthernet3/0/11, changed state to up
Feb 22 2023 17:34:56.657 SGT: %LINEPROTO-5-UPDOWN: Line protocol on Interface GigabitEthernet3/0/11, changed state to up
Feb 22 2023 17:35:40.786 SGT: %LINEPROTO-5-UPDOWN: Line protocol on Interface GigabitEthernet3/0/11, changed state to down
Feb 22 2023 17:35:41.787 SGT: %LINK-3-UPDOWN: Interface GigabitEthernet3/0/11, changed state to down
Please investigate the cable and RJ45 connector on both sides.
As this stack is affected by 2 defects, my recommendation would be to upgrade to golden fixed release https://www.cisco.com/c/en/us/support/docs/switches/catalyst-9300-series-switches/214814-recommended-releases-for-catalyst-9200-9.html<https://apc01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.cisco.com%2Fc%2Fen%2Fus%2Fsupport%2Fdocs%2Fswitches%2Fcatalyst-9300-series-switches%2F214814-recommended-releases-for-catalyst-9200-9.html&data=05%7C01%7Cmohamedissam.niyamathullah%40ncs.com.sg%7Cf6f55778cc244ffe4fc508db160d5841%7Cca90d8f589634b6ebca99ac468bcc7a8%7C1%7C0%7C638128018828469927%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=1wfS1ak1q%2Bfy51GaG%2FUVjfsvOZ0h3B6xccBoWb3PH60%3D&reserved=0>
//
Please let us know if you need Webex to schedule with TAC now.
This is regarding Case Number 695109716, which you opened with Cisco Systems.
My name is Georgi Borisov and I'm the Customer Support Engineer who owns your case.
I am sending this e-mail as the initial point of contact to let you know that I have accepted your case, and also to give you information on how to contact me.
As I understand it, you are observing stack issues.
Based on the provided documentation,
------------------ show switch stack-ports summary ------------------
Sw#/Port# Port Status Neighbor Cable Length Link OK Link Active Sync OK #Changes to LinkOK In Loopback
-------------------------------------------------------------------------------------------------------------------
1/1 OK 2 100cm Yes Yes Yes 2 No
1/2 OK 6 300cm Yes Yes Yes 1 No
2/1 OK 3 100cm Yes Yes Yes 1 No
2/2 OK 1 100cm Yes Yes Yes 1 No
3/1 OK 4 100cm Yes Yes Yes 1 No
3/2 OK 2 100cm Yes Yes Yes 2 No
4/1 OK 5 100cm Yes Yes Yes 1 No
4/2 OK 3 100cm Yes Yes Yes 3 No
5/1 OK 6 100cm Yes Yes Yes 1 No
5/2 OK 4 100cm Yes Yes Yes 2 No
6/1 OK 1 300cm Yes Yes Yes 2 No
6/2 OK 5 100cm Yes Yes Yes 1 No
Stack ports of all 6 switches in the tsack seem stable.
We should monitor them.
#show switch stack-ports summary - will display if there were any changes on that specific link.
The following defect was found On Cat9200(stack),trap ciscoStackWiseMIB.0.0.6 (cswStackMemberRemoved) unable created normally CSCvw90216<http://cdets.cisco.com/apps/dumpcr?&content=summary&format=html&identifier=CSCvw90216>
The switch is also affected by this defect https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwa14578 - realted to the memory leak and the reload of switch 2.
Unfortunately, all the logs are from Feb 22, however noted that you have a logging server, if possible to provide me the logs for that date and the specific hour, for further investigation.
Regarding port 3/0/11, do observe it flapping,
Feb 22 2023 17:34:55.656 SGT: %LINK-3-UPDOWN: Interface GigabitEthernet3/0/11, changed state to up
Feb 22 2023 17:34:56.657 SGT: %LINEPROTO-5-UPDOWN: Line protocol on Interface GigabitEthernet3/0/11, changed state to up
Feb 22 2023 17:35:40.786 SGT: %LINEPROTO-5-UPDOWN: Line protocol on Interface GigabitEthernet3/0/11, changed state to down
Feb 22 2023 17:35:41.787 SGT: %LINK-3-UPDOWN: Interface GigabitEthernet3/0/11, changed state to down
Please investigate the cable and RJ45 connector on both sides.
As this stack is affected by 2 defects, my recommendation would be to upgrade to golden fixed release https://www.cisco.com/c/en/us/support/docs/switches/catalyst-9300-series-switches/214814-recommended-releases-for-catalyst-9200-9.html
Apologize for not reaching out sooner, I was in a meeting that took longer than expected.
My shift is from Mon - Fri - 11am-7:00pm CST, if you need assistance in your time zone please contact our CIN agents to reuque the case to an available engineer in your timezone.
Please do not hesitate to contact me for any questions or concerns.
Based on the provided documentation,
------------------ show switch stack-ports summary ------------------
Sw#/Port# Port Status Neighbor Cable Length Link OK Link Active Sync OK #Changes to LinkOK In Loopback
-------------------------------------------------------------------------------------------------------------------
1/1 OK 2 100cm Yes Yes Yes 2 No
1/2 OK 6 300cm Yes Yes Yes 1 No
2/1 OK 3 100cm Yes Yes Yes 1 No
2/2 OK 1 100cm Yes Yes Yes 1 No
3/1 OK 4 100cm Yes Yes Yes 1 No
3/2 OK 2 100cm Yes Yes Yes 2 No
4/1 OK 5 100cm Yes Yes Yes 1 No
4/2 OK 3 100cm Yes Yes Yes 3 No
5/1 OK 6 100cm Yes Yes Yes 1 No
5/2 OK 4 100cm Yes Yes Yes 2 No
6/1 OK 1 300cm Yes Yes Yes 2 No
6/2 OK 5 100cm Yes Yes Yes 1 No
Stack ports of all 6 switches in the tsack seem stable. We should monitor them.
#show switch stack-ports summary – will display if there were any changes on that specific link.
The following defect was found On Cat9200(stack),trap ciscoStackWiseMIB.0.0.6 (cswStackMemberRemoved) unable created normally CSCvw90216
The switch is also affected by this defect https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwa14578 - realted to the memory leak and the reload of switch 2.
Unfortunately, all the logs are from Feb 22, however noted that a you have a logging server, if possible to provide me the logs for that date and the specific hour, for further investigation.
As this stack is affected by 2 defects, my recommendation would be to upgrade to golden fixed release https://www.cisco.com/c/en/us/support/docs/switches/catalyst-9300-series-switches/214814-recommended-releases-for-catalyst-9200-9.html
I did the analysis of the provided show tech, it seems that this is related to a bug.
Can you check if related?
On Cat9200(stack),trap ciscoStackWiseMIB.0.0.6 (cswStackMemberRemoved) unable created normally
CSCvw90216
Technology: LAN Switching
Subtechnology: Cat9300
Problem Code: Error Messages, Logs, Debugs
Product: NA
Product Family: C9300
Software Version: N/A
Router/Node Name: N/A
Problem Details: Stack port disconnects and reconnects again on its own. Need assistance to find out cause of the issue
Stack port disconnects and reconnects again on its own. Need assistance to find out cause of the issue
timestamp : 2023-03-20T12:21:45.000+0000 || updatedby : gikeshav || type : RESOLUTION SUMMARY || visibility : External || details : closed after 3 strikes | Technology: LAN Switching
Subtechnology: Cat9300
Problem Code: Error Messages, Logs, Debugs
Product: NA
Product Family: C9300
Software Version: N/A
Router/Node Name: N/A
Problem Details: Stack port disconnects and reconnects again on its own. Need assistance to find out cause of the issue | Stack port disconnects and reconnects again on its own. Need assistance to find out cause of the issue | timestamp : 2023-03-20T12:21:45.000+0000 || updatedby : gikeshav || type : RESOLUTION SUMMARY || visibility : External || details : closed after 3 strikes | nan | C9300-48U | cat9k_iosxe.16.12.04.SPA.bin | nan | nan | 3 | nan | Software Bug | C9300 | LAN Switching | Cat9300 | nan | nan | nan | nan | nan | nan |
693988553 | Question: Which software version is principally discussed in these documents?
Answer "NONE" if you cannot find answer in the given documents.
The ONLY software version should be selected from the given software version list: 16.12.04/ NA - COMPONENT ONLY/ THIRD_PARTY_PRODUCT_SW/ NA - RMA/ 16.12.04/ 3.2.3o/ 15.0.2/ 16.06.07/ 16.12.03s/ 1/ 16.06.08/ 16.12.1s/ 17.03.05/ 16.12.4/ 16.9.5/ 16.12.01s/ PRODUCT_NOT_FOUND/ 16.3.5/ 16.12.3s/ 16.09.02/ 16.12.3a/ 16.12.1s/ 17.6.4 Response in this JSON format:
{"software_version": "","explanation": "", "summary": ""}
Closed
Technology: LAN Switching
Subtechnology: Cat9300
Problem Code: Configuration Assistance
Product: NA
Product Family: C9300
Software Version: N/A
Router/Node Name: N/A
Problem Details: Configurations are different between running-config and startup-config after reboot the switch.
Configurations are different between running-config and startup-config after reboot the switch.
Advised to verify show run all output for default configuration. | Question: Which product is principally discussed in these documents?
Answer "NONE" if you cannot find answer in the given documents.
The ONLY product name should be selected from the given product name list: C9300-48U-A/ C9300-48U/ THIRD_PARTY_PRODUCT_HW/ UCS-FI-6454/ C9300-NM-8X/ PWR-C1-1100WAC Response in this JSON format:
{"product_name": "","explanation": "", "summary": ""}
Technology: LAN Switching
Subtechnology: Cat9300
Problem Code: Configuration Assistance
Product: NA
Product Family: C9300
Software Version: N/A
Router/Node Name: N/A
Problem Details: Configurations are different between running-config and startup-config after reboot the switch.
Configurations are different between running-config and startup-config after reboot the switch.
Advised to verify show run all output for default configuration. | Technology: LAN Switching
Subtechnology: Cat9300
Problem Code: Configuration Assistance
Product: NA
Product Family: C9300
Software Version: N/A
Router/Node Name: N/A
Problem Details: Configurations are different between running-config and startup-config after reboot the switch. | Configurations are different between running-config and startup-config after reboot the switch. | Advised to verify show run all output for default configuration. | Configurations are different between running-config and startup-config after reboot the c9300 switch. | C9300-48U-A | nan | nan | 82.0 | 3 | 100.0 | Configuration Assistance (process not intuitive, too complex, inconsistent...) | C9300 | LAN Switching | Cat9300 | 01tA0000000huG8IAI | Configuration Assistance | Cat9300 | LAN Switching | 01t15000005W1eHAAS | nan |
693929980 | Question: Which software version is principally discussed in these documents?
Answer "NONE" if you cannot find answer in the given documents.
The ONLY software version should be selected from the given software version list: THIRD_PARTY_PRODUCT_SW/ 16.03.01/ 16.07.02/ 122.33 Response in this JSON format:
{"software_version": "","explanation": "", "summary": ""}
Software Version: -- => 17.3.4a
Technology: Router and IOS-XE Architecture
Subtechnology: IOS-XE Memory Leaks
Problem Code: Error Messages, Logs, Debugs
Product: NA
Product Family: ASR1000
Software Version: N/A
Router/Node Name: N/A
Problem Details: OSPF and BGP reset on SDA Borders
OSPF and BGP reset on SDA Borders
timestamp : 2023-01-09T13:29:50.000+0000 || updatedby : akbashir || type : RESOLUTION SUMMARY || visibility : External || details : No Response from
Closing as per 3 strike | Question: Which product is principally discussed in these documents?
Answer "NONE" if you cannot find answer in the given documents.
The ONLY product name should be selected from the given product name list: THIRD_PARTY_PRODUCT_HW/ VS-C6509E-S720-10G/ CSR-ASR1K2-CHT1-1/ ASR1009-X Response in this JSON format:
{"product_name": "","explanation": "", "summary": ""}
Technology: Router and IOS-XE Architecture
Subtechnology: IOS-XE Memory Leaks
Problem Code: Error Messages, Logs, Debugs
Product: NA
Product Family: ASR1000
Software Version: N/A
Router/Node Name: N/A
Problem Details: OSPF and BGP reset on SDA Borders
OSPF and BGP reset on SDA Borders
timestamp : 2023-01-09T13:29:50.000+0000 || updatedby : akbashir || type : RESOLUTION SUMMARY || visibility : External || details : No Response from
Closing as per 3 strike | Technology: Router and IOS-XE Architecture
Subtechnology: IOS-XE Memory Leaks
Problem Code: Error Messages, Logs, Debugs
Product: NA
Product Family: ASR1000
Software Version: N/A
Router/Node Name: N/A
Problem Details: OSPF and BGP reset on SDA Borders | OSPF and BGP reset on SDA Borders | timestamp : 2023-01-09T13:29:50.000+0000 || updatedby : akbashir || type : RESOLUTION SUMMARY || visibility : External || details : No Response from
Closing as per 3 strike | nan | ASR1009-X | asr1001x-universalk9.16.07.02.SPA.bin | nan | nan | 3 | nan | Configuration Assistance (process not intuitive, too complex, inconsistent...) | ASR1000 | Routing Protocols (Includes NAT and HSRP) | BGP | nan | nan | nan | nan | nan | nan |
694642521 | Question: Which software version is principally discussed in these documents?
Answer "NONE" if you cannot find answer in the given documents.
The ONLY software version should be selected from the given software version list: 1/ 8.10.151.0/ 8.10.171.0/ 802.11AC/ 8.5.171.0/ 8.10.183.0/ 8.10.130.0/ 8.10.171.0/ THIRD_PARTY_PRODUCT_SW/ 8.5.135.0/ 8.3.143.0/ NA-CIN_CLOSE_SW/ 8.5.140.0/ 4.0.1a/ WLC CLIENT INTEROP/ 12.0.13/ 8.5.151.0/ 8.4/ 120.13/ 8.5.160.0/ 8.10.151.0/ 8.3.143.0/ 8.3.131.0/ 8.3.150.0/ 8.5.135.0/ 8.5.161.0/ 8.10.185.0/ 8.2.166.0/ 8.5.140.0/ 8.5.151.0/ 8.3.150.0/ 16.12.3s/ WLC RRM/RF/CLEANAIR/ 8.5.151.0/ 8.10.130.0/ NA - COMPONENT ONLY/ 8.10.162.0/ 8.3.140.0/ 8.10.150.0/ 8.10.183.0/ 8.10.161.0/ 8.10.185.0/ 8.5.151.0/ 16.12.4/ 17.3.5b/ 8.10.183.0/ 8.10.171.0/ 8.5.171.0 Response in this JSON format:
{"software_version": "","explanation": "", "summary": ""}
8.10.185.3 special image shared with customer with bug fixes for AP crash issue
Thank you for your email.
We received an update form our escalation team and we have opened two new bugs internally to further investigate and below is the status:
1
AP BIZ2-04-AP24
Kernel Panic/ PC is at __udelay+0x30/0x48
1.
0xffffffc000338900 __udelay + 0x30
2.
0xffffffbffc44d52c osl_delay + 0x2c
New bug - CSCwe91301 for further investigation
2
AP TB-02-AP04
Kernel Panic/ PC is at get_partial_node.isra.24+0x140/0x288
1.
0xffffffc000088d30 dump_backtrace + 0x150
2.
0xffffffc000088e94 show_stack + 0x20
3.
0xffffffc000668b30 dump_stack + 0xb0
4.
0xffffffc000156058 print_bad_pte + 0x1d0
5.
0xffffffc0001579cc unmap_single_vma + 0x5d0
6.
0xffffffc0001582d8 unmap_vmas + 0x68
7.
0xffffffc00015f9b4 exit_mmap + 0xf8
8.
0xffffffc00009c354 mmput + 0x118
9.
0xffffffc0000a0afc do_exit + 0x8e0
10.
0xffffffc0000a120c do_group_exit + 0xb0
11.
0xffffffc0000a1290 __wake_up_parent + 0x28
New bug - CSCwe91264 for further investigation
3
AP ERC-02-AP49
CALLBACK FULL Reset Radio
Unable to Decode
Collect all .txt from /storages/cores/
AP ERC-02-AP51
CALLBACK FULL Reset Radio
Unable to Decode
Collect all .txt from /storages/cores/
AP ERC-B1-AP03
CALLBACK FULL Reset Radio
Unable to Decode
Collect all .txt from /storages/cores/
The below 3 AP crashes belong to AP model 1810W, which is EOL.
I will further check with the team internally to see how we can proceed on this:
4
AP i4-05-AP55
Kernel Panic/ PC is at skb_recycler_alloc+0x84/0x2e4
1.
0xc039a954 skb_recycler_alloc + 0x84
2.
0xc037bbe0 dev_alloc_skb_poolid + 0x24
3.
0xbfbe9678 __adf_nbuf_alloc + 0x28
4.
0xbfccff54 wbuf_alloc + 0x5c
5.
0xbfd08e2c wmi_buf_alloc + 0x20
6.
0xbfcf8fb4 wmi_unified_set_qboost_param + 0x30
7.
0xbfcf904c qboost_config + 0x18
8.
0xbfcf92d8 ol_ath_net80211_newassoc + 0x288
9.
0xbfc6a65c ieee80211_mlme_recv_assoc_request + 0x418
10.
0xbfc1ed5c ieee80211_ucfg_splitmac_add_client + 0xc3c
11.
0xbfcb8d04 acfg_add_client + 0x280
12.
0xbfcb92dc acfg_handle_vap_ioctl + 0x10c
13.
0xbfca73b4 ieee80211_ioctl + 0x2720
14.
0xc038962c dev_ifsioc + 0x300
15.
0xc0389db8 dev_ioctl + 0x764
16.
0xc0372e80 sock_ioctl + 0x260
17.
0xc0104730 do_vfs_ioctl + 0x5a0
18.
0xc01047b8 sys_ioctl + 0x3c
19.
0xc000e680 ret_fast_syscall + 0x0
AP i4-05-AP55
Kernel Panic/ PC is at skb_recycler_alloc+0x84/0x2e4
1.
0xc039a954 skb_recycler_alloc + 0x84
2.
0xc037bbe0 dev_alloc_skb_poolid + 0x24
3.
0xbfbe9678 __adf_nbuf_alloc + 0x28
4.
0xbfccff54 wbuf_alloc + 0x5c
5.
0xbfd08e2c wmi_buf_alloc + 0x20
6.
0xbfcf8fb4 wmi_unified_set_qboost_param + 0x30
7.
0xbfcf904c qboost_config + 0x18
8.
0xbfcf92d8 ol_ath_net80211_newassoc + 0x288
9.
0xbfc6a65c ieee80211_mlme_recv_assoc_request + 0x418
10.
0xbfc1ed5c ieee80211_ucfg_splitmac_add_client + 0xc3c
11.
0xbfcb8d04 acfg_add_client + 0x280
12.
0xbfcb92dc acfg_handle_vap_ioctl + 0x10c
13.
0xbfca73b4 ieee80211_ioctl + 0x2720
14.
0xc038962c dev_ifsioc + 0x300
15.
0xc0389db8 dev_ioctl + 0x764
16.
0xc0372e80 sock_ioctl + 0x260
17.
0xc0104730 do_vfs_ioctl + 0x5a0
18.
0xc01047b8 sys_ioctl + 0x3c
19.
0xc000e680 ret_fast_syscall + 0x0
AP CELC-03-AP11
Kernel Panic/ PC is at skb_recycler_alloc+0x84/0x2e4
1.
0xc039a954 skb_recycler_alloc + 0x84
2.
0xc037bbe0 dev_alloc_skb_poolid + 0x24
3.
0xbfbe9678 __adf_nbuf_alloc + 0x28
4.
0xbfd34cac htt_h2t_dbg_stats_get + 0x6c
5.
0xbfd2c218 ol_txrx_fw_stats_get + 0x110
6.
0xbfcd94c0 ol_ath_fw_stats_timeout + 0xb0
7.
0xc006b664 run_timer_softirq + 0x168
8.
0xc0065ba0 __do_softirq + 0xf4
9.
0xc0066070 irq_exit + 0x54
10.
0xc000ef5c handle_IRQ + 0x88
11.
0xc00085ec gic_handle_irq + 0x94
12.
0xc000e340 __irq_svc + 0x40
The below two AP crashes are still being investigated upon and will have an update shortly.
5
AP IT-01-AP13
Kernel Panic/ PC is at misc_open+0x48/0x198
0xffffffc0003d01c8 misc_open + 0x48
0xffffffc0003d01b0 misc_open + 0x30
AP E1-05-AP08
Kernel Panic/ PC is at misc_open+0x48/0x198
1.
0xffffffc0003d01c8 misc_open + 0x48
2.
0xffffffc0003d01b0 misc_open + 0x30
Could you please help me collect all .txt files from /storages/cores/ from the 3 Aps (AP ERC-02-AP49, AP ERC-02-AP51 & AP ERC-B1-AP03) so I can share it with our team for further analysis.
Please let me know your availability so I can collect the required logs.
Please feel free to let me know if you have any further queries.
Findings from crash logs:
1. From the two AP crash logs, it looks like they have different crash signatures.
Decoding one of the crash signatures, we found it to be similar to bug CSCvz08781, for which the solution is to upgrade to 8.10.161.
2. Since we were not able to find a hit for the second crash, we will have a discussion internally to see if this is a new issue.
Recommended to upgrade the SDA WLC to 8.10.181 as well.
jan 27th : crash file of 9120 has
from crash file
PC is at rb_
next+0xc/0x6c
LR is at pick_next_task_fair+0x4
8/0x160.
CSCwa34136 Cisco 3802 FQI/NMI reset at rb_next+0xc
the fix is to upgrade to 8.10.171
During the upgrade customer was facing FN - 72524.
Customer will perform the upgrade from 6 PM SGT to next day 7 AM SGT. They plan to do reboots at 12 midnight of 24th feb and 25th feb.
Commsbridge - CRQ000002047334 - WLC (.13) Upgrade to 8.10.183
Hosted by Samuel Foo
https://techdynamicpteltd.my.webex.com/techdynamicpteltd.my/j.php?MTID=mb7f4582654ff010cfd61f959ef1cf2ed
Saturday, February 18, 2023 11:00 PM | 8 hours | (UTC+08:00) Kuala Lumpur, Singapore
Meeting number: 2550 952 0840
Password: iuMJ34W3bJR (48653493 from phones and video systems)
Join by video system
Dial [email protected]
You can also dial 173.243.2.68 and enter your meeting number.
Join by phone
+1-650-479-3208 United States Toll
Access code: 255 095 20840
Only CSCvz08781 is fixed on 8.5.171, though Wism2 is not mentioned under the list of products on this bug.
Please feel free to let me know if you have any further queries.
Thanks Sharath for an update.
Can you confirm if below bugs are fixed in 8.5.171.0
MPSH issue bug https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvz08781<https://ddec1-0-en-ctp.trendmicro.com:443/wis/clicktime/v1/query?url=https%3a%2f%2fbst.cloudapps.cisco.com%2fbugsearch%2fbug%2fCSCvz08781&umid=75439d08-7787-4ffb-a34a-787b5c768898&auth=32813f2e647ebb91b39d0b35ac97db1efa82dd64-04efa1002c98d5b739f3adb9e569602d457457fe>
Logs :-
Nov 22 11:08:12 kernel: [*11/22/2022 11:08:12.9134] Re-Tx Count=2, Max Re-Tx Value=5, SendSeqNum=5, NumofPendingMsgs=67
Nov 22 11:08:12 kernel: [*11/22/2022 11:08:12.9135]
Nov 22 11:08:15 kernel: [*11/22/2022 11:08:15.8115] Re-Tx Count=3, Max Re-Tx Value=5, SendSeqNum=8, NumofPendingMsgs=70
Nov 22 11:08:15 kernel: [*11/22/2022 11:08:15.8115]
Nov 22 11:08:18 kernel: [*11/22/2022 11:08:18.7069] Re-Tx Count=4, Max Re-Tx Value=5, SendSeqNum=11, NumofPendingMsgs=73
Nov 22 11:08:18 kernel: [*11/22/2022 11:08:18.7069]
Nov 22 11:08:21 kernel: [*11/22/2022 11:08:21.6039] Re-Tx Count=5, Max Re-Tx Value=5, SendSeqNum=11, NumofPendingMsgs=73
Nov 22 11:08:21 kernel: [*11/22/2022 11:08:21.6039]
Nov 22 11:08:24 kernel: [*11/22/2022 11:08:24.4998] Max retransmission count exceeded, going back to DISCOVER mode.
CLIB issue bug https://bst.cisco.com/bugsearch/bug/CSCvy37953
Logs :-
Feb 2 21:07:49 kernel: [*02/02/2023 21:07:49.0011] dtls_cssl_msg_cb: Received >>> DTLS 1.2 Handshake [Length 00ac] ClientHello
Feb 2 21:07:49 kernel: [*02/02/2023 21:07:49.0011] dtls_connectionDB_add_connection: Added Connection 0x54aaea00 Server [172.18.240.26]:5246 Client [10.253.159.139]:5256
Feb 2 21:07:49 kernel: [*02/02/2023 21:07:49.0011]
Feb 2 21:07:49 kernel: [*02/02/2023 21:07:49.0011] create_dtls_connection: Creating DTLS Ctrl Connection 0x54aaea00
Feb 2 21:07:49 kernel: [*02/02/2023 21:07:49.0012] DTLS connection created sucessfully local_ip: 10.253.159.139 local_port: 5256 peer_ip: 172.18.240.26 peer_port: 5246
Feb 2 21:07:49 kernel: [*02/02/2023 21:07:49.0022] local_in_addr_comp: Client and server addresses/port/version of 2 nodes are [10.253.159.139]:5256(0)--[172.18.240.26]:5246(0) [10.253.159.139]:5256--[172.18.240.26]:5246
Feb 2 21:07:49 kernel: [*02/02/2023 21:07:49.0022] dtls_connection_find_using_link_info: Searching connection [10.253.159.139]:5256--[172.18.240.26]:5246, result 0x54aaea00
Feb 2 21:07:49 kernel: [*02/02/2023 21:07:49.0023] dtls_cssl_msg_cb: Sent <<< DTLS Header [Length 000d]
Feb 2 21:07:49 kernel: [*02/02/2023 21:07:49.0023] dtls_cssl_msg_cb: Sent <<< DTLS 1.2 Handshake [Length 002f] HelloVerifyRequest
Feb 2 21:07:49 kernel: [*02/02/2023 21:07:49.0024] dtls_cssl_msg_cb: Received >>> DTLS Header [Length 000d]
Feb 2 21:07:49 kernel: [*02/02/2023 21:07:49.0024] dtls_cssl_msg_cb: Received >>> DTLS 1.2 Handshake [Length 00cc] ClientHello
Feb 2 21:07:49 kernel: [*02/02/2023 21:07:49.0025] dtls_process_packet: SSL get error rc 5
Feb 2 21:07:49 kernel: [*02/02/2023 21:07:49.0031] local_in_addr_comp: Client and server addresses/port/version of 2 nodes are [10.253.159.139]:5256(0)--[172.18.240.26]:5246(0) [10.253.159.139]:5256--[172.18.240.26]:5246
Feb 2 21:07:49 kernel: [*02/02/2023 21:07:49.0032] dtls_connection_find_using_link_info: Searching connection [10.253.159.139]:5256--[172.18.240.26]:5246, result 0x54aaea00
I had a check internally and found that Wism2 is EOL and end of support and hence 8.10.183 is not available.
The last version released for Wism2 was 8.5.171.
Please feel free to let me know if you have any further queries.
Can we get 8.10.183.0 for wism2.
Its urgent.
Findings from crash logs:
1. From the two AP crash logs, it looks like they have different crash signatures.
Decoding one of the crash signatures, we found it to be similar to bug CSCvz08781, for which the solution is to upgrade to 8.10.161.
2. Since we were not able to find a hit for the second crash, we will have a discussion internally to see if this is a new issue.
Recommended to upgrade the SDA WLC to 8.10.181 as well.
jan 27th : crash file of 9120 has
from crash file
PC is at rb_
next+0xc/0x6c
LR is at pick_next_task_fair+0x4
8/0x160.
CSCwa34136 Cisco 3802 FQI/NMI reset at rb_next+0xc
the fix is to upgrade to 8.10.171
During the upgrade customer was facing FN - 72524.
While uploading the image to the WLC.
We are observing that AP’s are taking too much of time in predownloading.
We are upgrading from 8.10.162.0 to 8.10.183.0.
(TLDC-WLC1) >show ap image all
Total number of APs..............................
1340
Number of APs
Initiated.......................................
2
Downloading.....................................
0
Predownloading..................................
1000
Completed predownloading........................
0
Not Supported...................................
0
Failed to Predownload...........................
0
Predownload Predownload Flexconnect
AP Name Primary Image Backup Image Status Version Next Retry Time Retry Count Predownload
------------------ -------------- -------------- --------------- -------------- ---------------- ------------ --------------
RC1_DH-02-AP07 8.10.162.0 8.10.130.0 Predownloading 8.10.183.0 NA 0
RC1_DH-02-AP08 8.10.162.0 8.10.130.0 Predownloading 8.10.183.0 NA 0
RC1-02-AP01 8.10.162.0 8.10.130.0 Predownloading 8.10.183.0 NA 0
SDE1-04-AP03 8.10.162.0 8.3.150.6 Waiting 8.10.183.0 01:12:02 2
RC1-02-AP10 8.10.162.0 8.10.130.0 Predownloading 8.10.183.0 NA 0
RC1-02-AP09 8.10.162.0 8.10.130.0 Predownloading 8.10.183.0 NA 0
RC1-02-AP06 8.10.162.0 8.10.130.0 Predownloading 8.10.183.0 NA 0
SDE3-03-AP16 8.10.162.0 8.10.130.0 Predownloading 8.10.183.0 NA 0
RC2-GF-AP14 8.10.162.0 8.10.130.0 Predownloading 8.10.183.0 NA 0
SDE3-02-AP06 8.10.162.0 8.10.130.0 Predownloading 8.10.183.0 NA 0
Please join zoom meeting.
Join Zoom Meeting
https://nus-sg.zoom.us/j/84695360268?pwd=Sng1Tk16R1dNZXVoaGhtSTFjUVZuQT09
Meeting ID: 846 9536 0268
Passcode: 239230
To join using H.323: https://wiki.nus.edu.sg/display/cit/Making+H.323+or+SIP+Calls
Please note that this website may contain links to other websites not maintained by NUS.
Such third party websites are subject to their own data protection and privacy practices and you are encouraged to examine the privacy policies of those websites.
The session may be recorded and the recordings will be distributed/published by the organiser to the participants.
If you have any concerns on the recordings, please contact the organiser.
Only email address, first/last name will automatically be recorded but other information such as company name, telephone and/or profile picture can also be recorded, if required, during the session recording.
My name is Juan Felipe, and I have ownership of Service Request 694642521.
I am sending this e-mail as an initial point of contact.
Problem Description:
Initial issue:
When we had more number of clients connected to the APs(around 70-80 clients), few of them stopped catering to clients and after a reboot clients connected fine.
The crash was generated after rebooting the Aps to restore the network.
You had a fabric setup with over 4000+ Aps.
jan 30th : pinged internal to DE to find out if bug is fixed for 8.10.183
Here is a brief summary of our call:
1.
There is a query from Biswajit.
Can we upgrade the WLC 8.10.181.4 to 8.10.183.0, since 8.10.181.0 is deferred.
I believe the answer is Yes but wanted to double confirm from Cisco TAC.
I just got a confirmation from the DE team that 8.10.183.0 will be supported with DNAC 2.2.2.9 .
Compatibility Matrix should be updated by this week.
Please feel free to let us know if you have any further queries.
You are right.
I have requested for compatibility between DNAC 2.2.2.9 and wlc 8.10.183.
I will keep you updated as soon as I hear from the DE team.
Please correct , we need compatibility conformation on DNAC 2.2.2.9 with 8.10.183.0 from Cisco.
I just had a call with TAC engineer.
TAC confirmed on 2802i CCLIB certificate issue under https://bst.cisco.com/bugsearch/bug/CSCvy37953 buggy behaviour.
This issue is fixed under 8.10.171.0 and expected to have fix on 8.10.183.0.
TAC will share the findings shortly with logs.
Yes, Testing was done on 26th JAN for POVWLC1 and 4.
Below is the snippet.
Conclusion :- No compatibility issues found between 2.2.2.9 and 8.10.183.0.
+Baby John
Hi Satyam, you have tested this OS 8.10.183 in POV environment with DNAC 2.2.2.9 , did you find any issues ? Pls share.
I apologize for the confusion.
Yes, are you right 8.10.183 is not in the list of supported release for DNAC 2.2.2.9.
Since, 8.10.181 has been deferred and is not available for download, please allow me a day time so I can check with DNAC DE team if they can include 8.10.183 in the compatibility matrix and also get a confirmation if they have done some testing so you can proceed with the upgrade.
Please feel free to let us know if you have any further queries.
I also just noticed the same.
Below screenshot shared is from 2.3.3.6 ( by TAC ) but I concur checking the same for 2.2.2.9 compatibility with 8.10.183.0.
I have reached out Cisco TM on the same and expected to get response in 30 mins from TAC.
Hi Satyam / Sharath
Do note that the current production DNAC is on ver 2.2.2.9.
however, 8.10.183 is not in the compatibility list with DNAC 2.2.2.9 officially.
Cisco team, please advise if we still can proceed with the WLC firmware upgrade.
[Icon Description automatically generated]
I have a discussion with the DE, and yes the fix for the bug Is integrated to release 8.10.183 as well.
AP crash issue
Initial issue:
When we had more number of clients connected to the APs(around 70-80 clients), few of them stopped catering to clients and after a reboot clients connected fine. The crash was generated after rebooting the Aps to restore the network.
You had a fabric setup with over 4000+ Aps.
jan 30th : pinged internal to DE to find out if bug is fixed for 8.10.183
Here is a brief summary of our call:
1. You had 4-5 Ap crashes which were 2802i AP modes and we collected the crash logs and tech support logs from the affected APs.
2. Since you wanted SDA team to look into the fabric part to figure out if the are any issues with the routing part, I involved my SDA team on call.
3. As per our SDA teams analysis, the fabric underlaying path is not a traditional design and my colleague will give you more details about his findings and next plan of action.
Can we say if the bug is fixed in earlier release i.e.
8.10.168.0 and 8.10.171.0 which both are deferred now, will be fixed in 8.10.183.0.
Urgently.
The code 8.10.183 is currently not listed in the integrated releases for this bug.
Thanks for your support !!
Can you also confirm that this fix is integrated in 8.10.183.0.
Findings from crash logs:
1. From the two AP crash logs, it looks like they have different crash signatures.
Decoding one of the crash signatures, we found it to be similar to bug CSCvz08781, for which the solution is to upgrade to 8.10.161.
2. Since we were not able to find a hit for the second crash, we will have a discussion internally to see if this is a new issue.
Recommended to upgrade the SDA WLC to 8.10.181 as well.
jan 27th : crash file of 9120 has
from crash file
PC is at rb_
next+0xc/0x6c
LR is at pick_next_task_fair+0x4
8/0x160.
CSCwa34136 Cisco 3802 FQI/NMI reset at rb_next+0xc
the fix is to upgrade to 8.10.171
the fix is to upgrade to 8.10.171 for the crash info seen for 9120 AP
Thank you for your email.
In this case I would recommend upgrading to 8.10.183 version which is the recommended version.
Here is the compatibility matrix for your reference:
Since the defect CSCvx96224 is fixed on 8.10.181.x, it is by default committed on 8.10.183.
Here is the link to 8.10.183 version:
https://software.cisco.com/download/home/286284728/type/280926587/release/8.10.183.0
Let me know if you are unable to download it, so I can publish it for you.
Please feel free to let me know if you have any further queries.
I can see that 8.10.181.0 is marked deferred now due to ongoing different bug CSCwd80290 <https://bst.cisco.com/bugsearch/bug/CSCwd80290> .
It is not available to download.
https://software.cisco.com/download/home/286284738/type/280926587/release/8.10.181.0?releaseIndicator=DEFERRED
Could you confirm that what can be done next ?
Hey Sharath,
Thanks for your confirmation and I hope everything is fine at your place.
In this case we can proceed with adoption of 8.10.181.0 instead escalation image 8.10.181.4.
Findings from crash logs:
1. From the two AP crash logs, it looks like they have different crash signatures.
Decoding one of the crash signatures, we found it to be similar to bug CSCvz08781, for which the solution is to upgrade to 8.10.161.
2. Since we were not able to find a hit for the second crash, we will have a discussion internally to see if this is a new issue
For CAPWAP traffic from WLC to AP takes path from Edge which might be the reason for CAPWAP keepalives to get dropped
Fro traffic from WLC to AP, we checked packet capture on AP connected port and we see source as a FE.
Frame 20642: 173 bytes on wire (1384 bits), 173 bytes captured (1384 bits) on interface \Device\NPF_{F90C5072-EDB0-4466-991E-486944B5A317}, id 0
Ethernet II, Src: Cisco_9a:32:c0 (70:79:b3:9a:32:c0), Dst: Cisco_36:70:e7 (f8:7a:41:36:70:e7)
Internet Protocol Version 4, Src: 172.18.1.2, Dst: 172.18.1.61
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x18 (DSCP: Unknown, ECN: Not-ECT)
Total Length: 159
Identification: 0x81b3 (33203)
010. .... = Flags: 0x2, Don't fragment
...0 0000 0000 0000 = Fragment Offset: 0
Time to Live: 250
Protocol: UDP (17)
Header Checksum: 0xa41e [validation disabled]
[Header checksum status: Unverified]
Source Address: 172.18.1.2
Destination Address: 172.18.1.61
User Datagram Protocol, Src Port: 65419, Dst Port: 4789
Virtual eXtensible Local Area Network
Ethernet II, Src: Cisco_9f:00:00 (00:00:0c:9f:00:00), Dst: ba:25:cd:f4:ad:38 (ba:25:cd:f4:ad:38)
Internet Protocol Version 4, Src: 172.18.240.13, Dst: 10.253.144.11
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x18 (DSCP: Unknown, ECN: Not-ECT)
Total Length: 109
Identification: 0x50bf (20671)
010. .... = Flags: 0x2, Don't fragment
...0 0000 0000 0000 = Fragment Offset: 0
Time to Live: 251
Protocol: UDP (17)
Header Checksum: 0xf77f [validation disabled]
[Header checksum status: Unverified]
Source Address: 172.18.240.13
Destination Address: 10.253.144.11
User Datagram Protocol, Src Port: 5246, Dst Port: 5252
Control And Provisioning of Wireless Access Points - Control
Preamble
Datagram Transport Layer Security
Dec 1st 2022:
radio reloaded: sensord cmd(0x03) failed slot 1
[cmd timeout] wifi1: 0x9184=unknown intCode:0x1184 last 0x801c=SetRadio
The crash signature matches the bug mentioned below which has a fix in 10.8.171.
https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx96224
Informed customer to upgrade WLC to 8.10.181 which is DNAC 2.3 compatible
Informed customer that bug on CSCvx96224 is fixed on 8.10.181.0
I apologize, I was on an emergency leave.
I had a check internally and I can confirm that the bug CSCvx96224<https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx96224> is fixed on 8.10.181.0.
Please feel free to let me know if you have any further queries and I will be glad to assist.
Can you confirm if the 8.10.181.0 has the fix of affected bug “bst.cloudapps.cisco.com/bugsearch/bug/CSCvx96224” because I cannot see this bug under resolved caveats in the release notes https://www.cisco.com/c/en/us/td/docs/wireless/controller/release/notes/crn810mr8.html
We need conformation form cisco that bug fix is in 8.10.181.0 before adoption.
Findings from crash logs:
1. From the two AP crash logs, it looks like they have different crash signatures.
Decoding one of the crash signatures, we found it to be similar to bug CSCvz08781, for which the solution is to upgrade to 8.10.161.
2. Since we were not able to find a hit for the second crash, we will have a discussion internally to see if this is a new issue
For CAPWAP traffic from WLC to AP takes path from Edge which might be the reason for CAPWAP keepalives to get dropped
Fro traffic from WLC to AP, we checked packet capture on AP connected port and we see source as a FE.
Frame 20642: 173 bytes on wire (1384 bits), 173 bytes captured (1384 bits) on interface \Device\NPF_{F90C5072-EDB0-4466-991E-486944B5A317}, id 0
Ethernet II, Src: Cisco_9a:32:c0 (70:79:b3:9a:32:c0), Dst: Cisco_36:70:e7 (f8:7a:41:36:70:e7)
Internet Protocol Version 4, Src: 172.18.1.2, Dst: 172.18.1.61
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x18 (DSCP: Unknown, ECN: Not-ECT)
Total Length: 159
Identification: 0x81b3 (33203)
010. .... = Flags: 0x2, Don't fragment
...0 0000 0000 0000 = Fragment Offset: 0
Time to Live: 250
Protocol: UDP (17)
Header Checksum: 0xa41e [validation disabled]
[Header checksum status: Unverified]
Source Address: 172.18.1.2
Destination Address: 172.18.1.61
User Datagram Protocol, Src Port: 65419, Dst Port: 4789
Virtual eXtensible Local Area Network
Ethernet II, Src: Cisco_9f:00:00 (00:00:0c:9f:00:00), Dst: ba:25:cd:f4:ad:38 (ba:25:cd:f4:ad:38)
Internet Protocol Version 4, Src: 172.18.240.13, Dst: 10.253.144.11
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x18 (DSCP: Unknown, ECN: Not-ECT)
Total Length: 109
Identification: 0x50bf (20671)
010. .... = Flags: 0x2, Don't fragment
...0 0000 0000 0000 = Fragment Offset: 0
Time to Live: 251
Protocol: UDP (17)
Header Checksum: 0xf77f [validation disabled]
[Header checksum status: Unverified]
Source Address: 172.18.240.13
Destination Address: 10.253.144.11
User Datagram Protocol, Src Port: 5246, Dst Port: 5252
Control And Provisioning of Wireless Access Points - Control
Preamble
Datagram Transport Layer Security
Dec 1st 2022:
radio reloaded: sensord cmd(0x03) failed slot 1
[cmd timeout] wifi1: 0x9184=unknown intCode:0x1184 last 0x801c=SetRadio
The crash signature matches the bug mentioned below which has a fix in 10.8.171.
https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx96224
Informed customer to upgrade WLC to 8.10.181 which is DNAC 2.3 compatible
Findings from crash logs:
1. From the two AP crash logs, it looks like they have different crash signatures.
Decoding one of the crash signatures, we found it to be similar to bug CSCvz08781, for which the solution is to upgrade to 8.10.161.
2. Since we were not able to find a hit for the second crash, we will have a discussion internally to see if this is a new issue.
Recommended to upgrade the SDA WLC to 8.10.181 as well.
Hope you are doing well!.
I just received a confirmation that you can upgrade the WLC to 8.10.181.
Our SDA team ran a sanity check with version 8.10.181.0 and everything works fine with DNAC.
I would request you to go ahead with upgrading to 8.10.181.0.
Please feel free to let me know if you have any further queries.
Findings from crash logs:
1. From the two AP crash logs, it looks like they have different crash signatures.
Decoding one of the crash signatures, we found it to be similar to bug CSCvz08781, for which the solution is to upgrade to 8.10.161.
2. Since we were not able to find a hit for the second crash, we will have a discussion internally to see if this is a new issue
For CAPWAP traffic from WLC to AP takes path from Edge which might be the reason for CAPWAP keepalives to get dropped
Fro traffic from WLC to AP, we checked packet capture on AP connected port and we see source as a FE.
Frame 20642: 173 bytes on wire (1384 bits), 173 bytes captured (1384 bits) on interface \Device\NPF_{F90C5072-EDB0-4466-991E-486944B5A317}, id 0
Ethernet II, Src: Cisco_9a:32:c0 (70:79:b3:9a:32:c0), Dst: Cisco_36:70:e7 (f8:7a:41:36:70:e7)
Internet Protocol Version 4, Src: 172.18.1.2, Dst: 172.18.1.61
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x18 (DSCP: Unknown, ECN: Not-ECT)
Total Length: 159
Identification: 0x81b3 (33203)
010. .... = Flags: 0x2, Don't fragment
...0 0000 0000 0000 = Fragment Offset: 0
Time to Live: 250
Protocol: UDP (17)
Header Checksum: 0xa41e [validation disabled]
[Header checksum status: Unverified]
Source Address: 172.18.1.2
Destination Address: 172.18.1.61
User Datagram Protocol, Src Port: 65419, Dst Port: 4789
Virtual eXtensible Local Area Network
Ethernet II, Src: Cisco_9f:00:00 (00:00:0c:9f:00:00), Dst: ba:25:cd:f4:ad:38 (ba:25:cd:f4:ad:38)
Internet Protocol Version 4, Src: 172.18.240.13, Dst: 10.253.144.11
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x18 (DSCP: Unknown, ECN: Not-ECT)
Total Length: 109
Identification: 0x50bf (20671)
010. .... = Flags: 0x2, Don't fragment
...0 0000 0000 0000 = Fragment Offset: 0
Time to Live: 251
Protocol: UDP (17)
Header Checksum: 0xf77f [validation disabled]
[Header checksum status: Unverified]
Source Address: 172.18.240.13
Destination Address: 10.253.144.11
User Datagram Protocol, Src Port: 5246, Dst Port: 5252
Control And Provisioning of Wireless Access Points - Control
Preamble
Datagram Transport Layer Security
Dec 1st 2022:
radio reloaded: sensord cmd(0x03) failed slot 1
[cmd timeout] wifi1: 0x9184=unknown intCode:0x1184 last 0x801c=SetRadio
The crash signature matches the bug mentioned below which has a fix in 10.8.171.
https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx96224
Requested SDWAN team to share the 8.10.181 compatible firmware for SDWAN
Hi Vaibhav / Sharath / Kishor / Ramya,
Greetings !
As per understand provided on below mail trail it seems that we cannot have a stable SDI environment due to compatibility issues due to https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx96224 bug is fixed in 8.10.181.4 which is not a SDI compatible.
@Kishorbabu C (kishobab)<mailto:[email protected]> and @Ramya M (ramym)<mailto:[email protected]> Please discuss internally and share an approach to get a fixed image from DE BU.
Suggestions :-
* Either 8.10.151.0 - which is SDA compatible image can have the SMU patch for this bug.
* Or 8.10.181.4 - can be engineered for SDA.
I checked and even for latest DNAC release 2.3.x ( 2.3.3.5 and 2.3.4) , I do not see 8.10.181.4 as supported/recommended image for SDA.
Thank you for the update.
Glad to hear that the Aps are stable now after the upgrade.
Let me request my colleague from SDA to assist with the compatible version.
@Vibhav Shinde (vibshind)<mailto:[email protected]>,
Could you please assist us with the 8.10.181.4 compatible versions for SDN?.
Thanks for your response.
I hope you would be doing well now.
As an update I would like to inform you that we have upgraded our on production WLC (TLDC-WLC2) to 8.10.181.4.
So far we have not received any issues of AP resetting capwap tunnel or radio resets causing client disconnections.
But upgrading WLC to fix code and migrating impacted site AP's to fixed WLC code is workaround approach which cannot be taken forward.
We require 8.10.181.4 compatible versions for SDN ( Fabric ) WLC's ( 8540's AirOS ) for long term solution.
Findings from crash logs:
1. From the two AP crash logs, it looks like they have different crash signatures.
Decoding one of the crash signatures, we found it to be similar to bug CSCvz08781, for which the solution is to upgrade to 8.10.161.
2. Since we were not able to find a hit for the second crash, we will have a discussion internally to see if this is a new issue
For CAPWAP traffic from WLC to AP takes path from Edge which might be the reason for CAPWAP keepalives to get dropped
Fro traffic from WLC to AP, we checked packet capture on AP connected port and we see source as a FE.
Frame 20642: 173 bytes on wire (1384 bits), 173 bytes captured (1384 bits) on interface \Device\NPF_{F90C5072-EDB0-4466-991E-486944B5A317}, id 0
Ethernet II, Src: Cisco_9a:32:c0 (70:79:b3:9a:32:c0), Dst: Cisco_36:70:e7 (f8:7a:41:36:70:e7)
Internet Protocol Version 4, Src: 172.18.1.2, Dst: 172.18.1.61
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x18 (DSCP: Unknown, ECN: Not-ECT)
Total Length: 159
Identification: 0x81b3 (33203)
010. .... = Flags: 0x2, Don't fragment
...0 0000 0000 0000 = Fragment Offset: 0
Time to Live: 250
Protocol: UDP (17)
Header Checksum: 0xa41e [validation disabled]
[Header checksum status: Unverified]
Source Address: 172.18.1.2
Destination Address: 172.18.1.61
User Datagram Protocol, Src Port: 65419, Dst Port: 4789
Virtual eXtensible Local Area Network
Ethernet II, Src: Cisco_9f:00:00 (00:00:0c:9f:00:00), Dst: ba:25:cd:f4:ad:38 (ba:25:cd:f4:ad:38)
Internet Protocol Version 4, Src: 172.18.240.13, Dst: 10.253.144.11
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x18 (DSCP: Unknown, ECN: Not-ECT)
Total Length: 109
Identification: 0x50bf (20671)
010. .... = Flags: 0x2, Don't fragment
...0 0000 0000 0000 = Fragment Offset: 0
Time to Live: 251
Protocol: UDP (17)
Header Checksum: 0xf77f [validation disabled]
[Header checksum status: Unverified]
Source Address: 172.18.240.13
Destination Address: 10.253.144.11
User Datagram Protocol, Src Port: 5246, Dst Port: 5252
Control And Provisioning of Wireless Access Points - Control
Preamble
Datagram Transport Layer Security
Dec 1st 2022:
radio reloaded: sensord cmd(0x03) failed slot 1
[cmd timeout] wifi1: 0x9184=unknown intCode:0x1184 last 0x801c=SetRadio
The crash signature matches the bug mentioned below which has a fix in 10.8.171.
https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx96224
Hi Ameera, we discussed the bug fixed engineering image is 8.10.181.4 (right ?)
We also discussed there is no fixed image for SDA, and Sharath shall help in getting engineering image for SDA WLC( presently running on 8.10.151.0 with DNAC 2.2.2.9).
Regarding packets drops against below logs, Cisco found this is happening when there is a load, which is causing the AP to go down.
That is the BUG.
Confirmed by Oliver( in CC) that when load is not there, packet drop also not there.
BUG description: Cisco Aironet Access Point (AP) radio may trigger a device to reload under certain conditions of high device data utilization leading to packet drops
Nov 22 11:08:24 kernel: [*11/22/2022 11:08:24.4998] Max retransmission count exceeded, going back to DISCOVER mode.
* Why are we saying that there is network issue (This could be due to packet drop between WLC and AP and suggested collecting caps.) ?
Is Cisco not convinced about the bug ? Pls clarify.
NCS maintenance team, Pls follow up with Cisco to get the image.
Thanks for the time on the call.
As summary:
* The logs from one AP is showing a wired side issue that the AP is losing the keep-alive packet and reached the max retransmissions.
* This could be due to packet drop between WLC and AP and suggested collecting caps.
* From WLC side we can increase the AP count and intervals :
* https://www.cisco.com/c/en/us/td/docs/wireless/controller/8-1/configuration-guide/b_cg81/b_cg81_chapter_01111001.pdf
Nov 22 11:08:12 kernel: [*11/22/2022 11:08:12.9134] Re-Tx Count=2, Max Re-Tx Value=5, SendSeqNum=5, NumofPendingMsgs=67
Nov 22 11:08:12 kernel: [*11/22/2022 11:08:12.9135]
Nov 22 11:08:15 kernel: [*11/22/2022 11:08:15.8115] Re-Tx Count=3, Max Re-Tx Value=5, SendSeqNum=8, NumofPendingMsgs=70
Nov 22 11:08:15 kernel: [*11/22/2022 11:08:15.8115]
Nov 22 11:08:18 kernel: [*11/22/2022 11:08:18.7069] Re-Tx Count=4, Max Re-Tx Value=5, SendSeqNum=11, NumofPendingMsgs=73
Nov 22 11:08:18 kernel: [*11/22/2022 11:08:18.7069]
Nov 22 11:08:21 kernel: [*11/22/2022 11:08:21.6039] Re-Tx Count=5, Max Re-Tx Value=5, SendSeqNum=11, NumofPendingMsgs=73
Nov 22 11:08:21 kernel: [*11/22/2022 11:08:21.6039]
Nov 22 11:08:24 kernel: [*11/22/2022 11:08:24.4998] Max retransmission count exceeded, going back to DISCOVER mode.
* Regarding the AP crash we can see we are hitting this bug https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvz08781 which is fixed on the latest on 8.10.
As we agreed @Sharath Chandrashekar (sharcha2)<mailto:[email protected]> will reach the escalation team to check the below thing related to the bug:
* What is the amount of data/clients that the AP can handle before it crash .
* We need a fixed version that is compatible with a fabric network and DNAC version 2.2.2.9.
Findings from crash logs:
1. From the two AP crash logs, it looks like they have different crash signatures.
Decoding one of the crash signatures, we found it to be similar to bug CSCvz08781, for which the solution is to upgrade to 8.10.161.
2. Since we were not able to find a hit for the second crash, we will have a discussion internally to see if this is a new issue.
For CAPWAP traffic from WLC to AP takes path from Edge which might be the reason for CAPWAP keepalives to get dropped
Fro traffic from WLC to AP, we checked packet capture on AP connected port and we see source as a FE.
Frame 20642: 173 bytes on wire (1384 bits), 173 bytes captured (1384 bits) on interface \Device\NPF_{F90C5072-EDB0-4466-991E-486944B5A317}, id 0
Ethernet II, Src: Cisco_9a:32:c0 (70:79:b3:9a:32:c0), Dst: Cisco_36:70:e7 (f8:7a:41:36:70:e7)
Internet Protocol Version 4, Src: 172.18.1.2, Dst: 172.18.1.61
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x18 (DSCP: Unknown, ECN: Not-ECT)
Total Length: 159
Identification: 0x81b3 (33203)
010. .... = Flags: 0x2, Don't fragment
...0 0000 0000 0000 = Fragment Offset: 0
Time to Live: 250
Protocol: UDP (17)
Header Checksum: 0xa41e [validation disabled]
[Header checksum status: Unverified]
Source Address: 172.18.1.2
Destination Address: 172.18.1.61
User Datagram Protocol, Src Port: 65419, Dst Port: 4789
Virtual eXtensible Local Area Network
Ethernet II, Src: Cisco_9f:00:00 (00:00:0c:9f:00:00), Dst: ba:25:cd:f4:ad:38 (ba:25:cd:f4:ad:38)
Internet Protocol Version 4, Src: 172.18.240.13, Dst: 10.253.144.11
0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x18 (DSCP: Unknown, ECN: Not-ECT)
Total Length: 109
Identification: 0x50bf (20671)
010. .... = Flags: 0x2, Don't fragment
...0 0000 0000 0000 = Fragment Offset: 0
Time to Live: 251
Protocol: UDP (17)
Header Checksum: 0xf77f [validation disabled]
[Header checksum status: Unverified]
Source Address: 172.18.240.13
Destination Address: 10.253.144.11
User Datagram Protocol, Src Port: 5246, Dst Port: 5252
Control And Provisioning of Wireless Access Points - Control
Preamble
Datagram Transport Layer Security
Findings from crash logs:
1. From the two AP crash logs, it looks like they have different crash signatures.
Decoding one of the crash signatures, we found it to be similar to bug CSCvz08781, for which the solution is to upgrade to 8.10.161.
2. Since we were not able to find a hit for the second crash, we will have a discussion internally to see if this is a new issue.
Findings from crash logs:
1. From the two AP crash logs, it looks like they have different crash signatures.
Decoding one of the crash signatures, we found it to be similar to bug CSCvz08781, for which the solution is to upgrade to 8.10.161.
2. Since we were not able to find a hit for the second crash, we will have a discussion internally to see if this is a new issue.
For CAPWAP traffic from WLC to AP takes path from Edge which might be the reason for CAPWAP keepalives to get dropped
Technology: Wireless
Subtechnology: 8540 Series Wireless LAN Controller (AIR-CT8540)
Problem Code: Software Failure
Product: NA
Product Family: AIRCTA2
Software Version: N/A
Router/Node Name: N/A
Problem Details: Problem Description :- Clients unable to connect to an AP suspecting AP crash.
Setup :- SDA
WLC :- 172.18.240.13 – 8.10.151.0
DNAC :- 172.18.12.35
Impacted Location :- Global/NUS_fabric1/KR-SCIYIH/SCIYIH-MPSH/SCIYIH-MPSH2
AP’s impacted :-
1. MPSH2-02-AP20 - 10.253.152.238
2. MPSH2-02-AP22 - 10.253.190.6
3. MPSH2-02-AP23
Observations :-
AT approximately 9:15 am SGT we got a complaint that client are not able to connect to NUS SSID.
We saw checked in Prime and found that AP 22 and AP 20 getting alert for crash.
Checked and collected logs for AP 10.253.152.238.
After checking further, we can see many AP’s got rebooted.
Technology: Wireless
Subtechnology: 8540 Series Wireless LAN Controller (AIR-CT8540)
Problem Code: Software Failure
Product: NA
Product Family: AIRCTA2
Software Version: N/A
Router/Node Name: N/A
Problem Details: Problem Description :- Clients unable to connect to an AP suspecting AP crash.
Setup :- SDA
WLC :- 172.18.240.13 – 8.10.151.0
DNAC :- 172.18.12.35
Impacted Location :- Global/NUS_fabric1/KR-SCIYIH/SCIYIH-MPSH/SCIYIH-MPSH2
AP’s impacted :-
1. MPSH2-02-AP20 - 10.253.152.238
2. MPSH2-02-AP22 - 10.253.190.6
3. MPSH2-02-AP23
Observations :-
AT approximately 9:15 am SGT we got a complaint that client are not able to connect to NUS SSID.
We saw checked in Prime and found that AP 22 and AP 20 getting alert for crash.
Checked and collected logs for AP 10.253.152.238.
After checking further, we can see many AP’s got rebooted.
Problem Description :- Clients unable to connect to an AP suspecting AP crash.
Setup :- SDA
WLC :- 172.18.240.13 – 8.10.151.0
DNAC :- 172.18.12.35
Impacted Location :- Global/NUS_fabric1/KR-SCIYIH/SCIYIH-MPSH/SCIYIH-MPSH2
AP’s impacted :-
1. MPSH2-02-AP20 - 10.253.152.238
2. MPSH2-02-AP22 - 10.253.190.6
3. MPSH2-02-AP23
Observations :-
AT approximately 9:15 am SGT we got a complaint that client are not able to connect to NUS SSID.
We saw checked in Prime and found that AP 22 and AP 20 getting alert for crash.
Checked and collected logs for AP 10.253.152.238.
After checking further, we can see many AP’s got rebooted.
timestamp : 2023-07-20T04:31:04.000+0000 || updatedby : sharcha2 || type : RESOLUTION SUMMARY || visibility : External || details : 8.10.185.3 special image shared with customer with bug fixes for AP crash issue | Question: Which product is principally discussed in these documents?
Answer "NONE" if you cannot find answer in the given documents.
The ONLY product name should be selected from the given product name list: AIR-CT8540-1K-K9/ AIR-CT8540-K9/ NA-CIN_CLOSE_HW/ C9120AXI-S/ THIRD_PARTY_PRODUCT_HW/ AIR-CT8540-CA-K9/ AIR-AP2802I-S-K9/ AIR-CT8540-K9Z/ AIR-BZL-C240M4/ DN2-HW-APL-XL/ WLC-AP-T/ AIR-CT8540-SW-8.2 Response in this JSON format:
{"product_name": "","explanation": "", "summary": ""}
Thank you for your email.
We received an update form our escalation team and we have opened two new bugs internally to further investigate and below is the status:
1
AP BIZ2-04-AP24
Kernel Panic/ PC is at __udelay+0x30/0x48
1.
0xffffffc000338900 __udelay + 0x30
2.
0xffffffbffc44d52c osl_delay + 0x2c
New bug - CSCwe91301 for further investigation
2
AP TB-02-AP04
Kernel Panic/ PC is at get_partial_node.isra.24+0x140/0x288
1.
0xffffffc000088d30 dump_backtrace + 0x150
2.
0xffffffc000088e94 show_stack + 0x20
3.
0xffffffc000668b30 dump_stack + 0xb0
4.
0xffffffc000156058 print_bad_pte + 0x1d0
5.
0xffffffc0001579cc unmap_single_vma + 0x5d0
6.
0xffffffc0001582d8 unmap_vmas + 0x68
7.
0xffffffc00015f9b4 exit_mmap + 0xf8
8.
0xffffffc00009c354 mmput + 0x118
9.
0xffffffc0000a0afc do_exit + 0x8e0
10.
0xffffffc0000a120c do_group_exit + 0xb0
11.
0xffffffc0000a1290 __wake_up_parent + 0x28
New bug - CSCwe91264 for further investigation
3
AP ERC-02-AP49
CALLBACK FULL Reset Radio
Unable to Decode
Collect all .txt from /storages/cores/
AP ERC-02-AP51
CALLBACK FULL Reset Radio
Unable to Decode
Collect all .txt from /storages/cores/
AP ERC-B1-AP03
CALLBACK FULL Reset Radio
Unable to Decode
Collect all .txt from /storages/cores/
The below 3 AP crashes belong to AP model 1810W, which is EOL.
I will further check with the team internally to see how we can proceed on this:
4
AP i4-05-AP55
Kernel Panic/ PC is at skb_recycler_alloc+0x84/0x2e4
1.
0xc039a954 skb_recycler_alloc + 0x84
2.
0xc037bbe0 dev_alloc_skb_poolid + 0x24
3.
0xbfbe9678 __adf_nbuf_alloc + 0x28
4.
0xbfccff54 wbuf_alloc + 0x5c
5.
0xbfd08e2c wmi_buf_alloc + 0x20
6.
0xbfcf8fb4 wmi_unified_set_qboost_param + 0x30
7.
0xbfcf904c qboost_config + 0x18
8.
0xbfcf92d8 ol_ath_net80211_newassoc + 0x288
9.
0xbfc6a65c ieee80211_mlme_recv_assoc_request + 0x418
10.
0xbfc1ed5c ieee80211_ucfg_splitmac_add_client + 0xc3c
11.
0xbfcb8d04 acfg_add_client + 0x280
12.
0xbfcb92dc acfg_handle_vap_ioctl + 0x10c
13.
0xbfca73b4 ieee80211_ioctl + 0x2720
14.
0xc038962c dev_ifsioc + 0x300
15.
0xc0389db8 dev_ioctl + 0x764
16.
0xc0372e80 sock_ioctl + 0x260
17.
0xc0104730 do_vfs_ioctl + 0x5a0
18.
0xc01047b8 sys_ioctl + 0x3c
19.
0xc000e680 ret_fast_syscall + 0x0
AP i4-05-AP55
Kernel Panic/ PC is at skb_recycler_alloc+0x84/0x2e4
1.
0xc039a954 skb_recycler_alloc + 0x84
2.
0xc037bbe0 dev_alloc_skb_poolid + 0x24
3.
0xbfbe9678 __adf_nbuf_alloc + 0x28
4.
0xbfccff54 wbuf_alloc + 0x5c
5.
0xbfd08e2c wmi_buf_alloc + 0x20
6.
0xbfcf8fb4 wmi_unified_set_qboost_param + 0x30
7.
0xbfcf904c qboost_config + 0x18
8.
0xbfcf92d8 ol_ath_net80211_newassoc + 0x288
9.
0xbfc6a65c ieee80211_mlme_recv_assoc_request + 0x418
10.
0xbfc1ed5c ieee80211_ucfg_splitmac_add_client + 0xc3c
11.
0xbfcb8d04 acfg_add_client + 0x280
12.
0xbfcb92dc acfg_handle_vap_ioctl + 0x10c
13.
0xbfca73b4 ieee80211_ioctl + 0x2720
14.
0xc038962c dev_ifsioc + 0x300
15.
0xc0389db8 dev_ioctl + 0x764
16.
0xc0372e80 sock_ioctl + 0x260
17.
0xc0104730 do_vfs_ioctl + 0x5a0
18.
0xc01047b8 sys_ioctl + 0x3c
19.
0xc000e680 ret_fast_syscall + 0x0
AP CELC-03-AP11
Kernel Panic/ PC is at skb_recycler_alloc+0x84/0x2e4
1.
0xc039a954 skb_recycler_alloc + 0x84
2.
0xc037bbe0 dev_alloc_skb_poolid + 0x24
3.
0xbfbe9678 __adf_nbuf_alloc + 0x28
4.
0xbfd34cac htt_h2t_dbg_stats_get + 0x6c
5.
0xbfd2c218 ol_txrx_fw_stats_get + 0x110
6.
0xbfcd94c0 ol_ath_fw_stats_timeout + 0xb0
7.
0xc006b664 run_timer_softirq + 0x168
8.
0xc0065ba0 __do_softirq + 0xf4
9.
0xc0066070 irq_exit + 0x54
10.
0xc000ef5c handle_IRQ + 0x88
11.
0xc00085ec gic_handle_irq + 0x94
12.
0xc000e340 __irq_svc + 0x40
The below two AP crashes are still being investigated upon and will have an update shortly.
5
AP IT-01-AP13
Kernel Panic/ PC is at misc_open+0x48/0x198
0xffffffc0003d01c8 misc_open + 0x48
0xffffffc0003d01b0 misc_open + 0x30
AP E1-05-AP08
Kernel Panic/ PC is at misc_open+0x48/0x198
1.
0xffffffc0003d01c8 misc_open + 0x48
2.
0xffffffc0003d01b0 misc_open + 0x30
Could you please help me collect all .txt files from /storages/cores/ from the 3 Aps (AP ERC-02-AP49, AP ERC-02-AP51 & AP ERC-B1-AP03) so I can share it with our team for further analysis.
Please let me know your availability so I can collect the required logs.
Please feel free to let me know if you have any further queries.
Findings from crash logs:
1. From the two AP crash logs, it looks like they have different crash signatures.
Decoding one of the crash signatures, we found it to be similar to bug CSCvz08781, for which the solution is to upgrade to 8.10.161.
2. Since we were not able to find a hit for the second crash, we will have a discussion internally to see if this is a new issue.
Recommended to upgrade the SDA WLC to 8.10.181 as well.
jan 27th : crash file of 9120 has
from crash file
PC is at rb_
next+0xc/0x6c
LR is at pick_next_task_fair+0x4
8/0x160.
CSCwa34136 Cisco 3802 FQI/NMI reset at rb_next+0xc
the fix is to upgrade to 8.10.171
During the upgrade customer was facing FN - 72524.
Customer will perform the upgrade from 6 PM SGT to next day 7 AM SGT. They plan to do reboots at 12 midnight of 24th feb and 25th feb.
I had a check internally and found that Wism2 is EOL and end of support and hence 8.10.183 is not available.
The last version released for Wism2 was 8.5.171.
Please feel free to let me know if you have any further queries.
Can we get 8.10.183.0 for wism2.
Its urgent.
Findings from crash logs:
1. From the two AP crash logs, it looks like they have different crash signatures.
Decoding one of the crash signatures, we found it to be similar to bug CSCvz08781, for which the solution is to upgrade to 8.10.161.
2. Since we were not able to find a hit for the second crash, we will have a discussion internally to see if this is a new issue.
Recommended to upgrade the SDA WLC to 8.10.181 as well.
jan 27th : crash file of 9120 has
from crash file
PC is at rb_
next+0xc/0x6c
LR is at pick_next_task_fair+0x4
8/0x160.
CSCwa34136 Cisco 3802 FQI/NMI reset at rb_next+0xc
the fix is to upgrade to 8.10.171
During the upgrade customer was facing FN - 72524.
There is a query from Biswajit.
Can we upgrade the WLC 8.10.181.4 to 8.10.183.0, since 8.10.181.0 is deferred.
I believe the answer is Yes but wanted to double confirm from Cisco TAC.
I just got a confirmation from the DE team that 8.10.183.0 will be supported with DNAC 2.2.2.9 .
Compatibility Matrix should be updated by this week.
Please feel free to let us know if you have any further queries.
You are right.
I have requested for compatibility between DNAC 2.2.2.9 and wlc 8.10.183.
I will keep you updated as soon as I hear from the DE team.
Please correct , we need compatibility conformation on DNAC 2.2.2.9 with 8.10.183.0 from Cisco.
Yes, Testing was done on 26th JAN for POVWLC1 and 4.
Below is the snippet.
Conclusion :- No compatibility issues found between 2.2.2.9 and 8.10.183.0.
+Baby John
Hi Satyam, you have tested this OS 8.10.183 in POV environment with DNAC 2.2.2.9 , did you find any issues ? Pls share.
I apologize for the confusion.
Yes, are you right 8.10.183 is not in the list of supported release for DNAC 2.2.2.9.
Since, 8.10.181 has been deferred and is not available for download, please allow me a day time so I can check with DNAC DE team if they can include 8.10.183 in the compatibility matrix and also get a confirmation if they have done some testing so you can proceed with the upgrade.
Please feel free to let us know if you have any further queries.
I also just noticed the same.
Below screenshot shared is from 2.3.3.6 ( by TAC ) but I concur checking the same for 2.2.2.9 compatibility with 8.10.183.0.
I have reached out Cisco TM on the same and expected to get response in 30 mins from TAC.
Hi Satyam / Sharath
Do note that the current production DNAC is on ver 2.2.2.9.
however, 8.10.183 is not in the compatibility list with DNAC 2.2.2.9 officially.
Cisco team, please advise if we still can proceed with the WLC firmware upgrade.
[Icon Description automatically generated]
Can we say if the bug is fixed in earlier release i.e.
8.10.168.0 and 8.10.171.0 which both are deferred now, will be fixed in 8.10.183.0.
Urgently.
Hope you are doing well!.
I just received a confirmation that you can upgrade the WLC to 8.10.181.
Our SDA team ran a sanity check with version 8.10.181.0 and everything works fine with DNAC.
I would request you to go ahead with upgrading to 8.10.181.0.
Please feel free to let me know if you have any further queries.
Hi Vaibhav / Sharath / Kishor / Ramya,
Greetings !
As per understand provided on below mail trail it seems that we cannot have a stable SDI environment due to compatibility issues due to https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx96224 bug is fixed in 8.10.181.4 which is not a SDI compatible.
@Kishorbabu C (kishobab)<mailto:[email protected]> and @Ramya M (ramym)<mailto:[email protected]> Please discuss internally and share an approach to get a fixed image from DE BU.
Suggestions :-
* Either 8.10.151.0 - which is SDA compatible image can have the SMU patch for this bug.
* Or 8.10.181.4 - can be engineered for SDA.
I checked and even for latest DNAC release 2.3.x ( 2.3.3.5 and 2.3.4) , I do not see 8.10.181.4 as supported/recommended image for SDA.
Thank you for the update.
Glad to hear that the Aps are stable now after the upgrade.
Let me request my colleague from SDA to assist with the compatible version.
@Vibhav Shinde (vibshind)<mailto:[email protected]>,
Could you please assist us with the 8.10.181.4 compatible versions for SDN?.
Thanks for your response.
I hope you would be doing well now.
As an update I would like to inform you that we have upgraded our on production WLC (TLDC-WLC2) to 8.10.181.4.
So far we have not received any issues of AP resetting capwap tunnel or radio resets causing client disconnections.
But upgrading WLC to fix code and migrating impacted site AP's to fixed WLC code is workaround approach which cannot be taken forward.
We require 8.10.181.4 compatible versions for SDN ( Fabric ) WLC's ( 8540's AirOS ) for long term solution.
I apologize for the delay.
I was on a medical leave for the past couple of days.
I analysed the AP13 crash logs and found that the reason the crash is radio slot 1 reload due to:
radio reloaded: sensord cmd(0x03) failed slot 1
[cmd timeout] wifi1: 0x9184=unknown intCode:0x1184 last 0x801c=SetRadio
The crash signature matches the bug mentioned below which has a fix in 10.8.171.
https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx96224
Could you please let me know if you upgraded the test WLC to the escalation image 8.10.181.4 and still see issues with crash or clients unable to connect?.
Please feel free to let me know if you have any further queries and I will be glad to assist you.
Hi Ameera, we discussed the bug fixed engineering image is 8.10.181.4 (right ?)
We also discussed there is no fixed image for SDA, and Sharath shall help in getting engineering image for SDA WLC( presently running on 8.10.151.0 with DNAC 2.2.2.9).
Regarding packets drops against below logs, Cisco found this is happening when there is a load, which is causing the AP to go down.
That is the BUG.
Confirmed by Oliver( in CC) that when load is not there, packet drop also not there.
BUG description: Cisco Aironet Access Point (AP) radio may trigger a device to reload under certain conditions of high device data utilization leading to packet drops
Nov 22 11:08:24 kernel: [*11/22/2022 11:08:24.4998] Max retransmission count exceeded, going back to DISCOVER mode.
* Why are we saying that there is network issue (This could be due to packet drop between WLC and AP and suggested collecting caps.) ?
Is Cisco not convinced about the bug ? Pls clarify.
NCS maintenance team, Pls follow up with Cisco to get the image.
Thanks for the time on the call.
As summary:
* The logs from one AP is showing a wired side issue that the AP is losing the keep-alive packet and reached the max retransmissions.
* This could be due to packet drop between WLC and AP and suggested collecting caps.
* From WLC side we can increase the AP count and intervals :
* https://www.cisco.com/c/en/us/td/docs/wireless/controller/8-1/configuration-guide/b_cg81/b_cg81_chapter_01111001.pdf
Nov 22 11:08:12 kernel: [*11/22/2022 11:08:12.9134] Re-Tx Count=2, Max Re-Tx Value=5, SendSeqNum=5, NumofPendingMsgs=67
Nov 22 11:08:12 kernel: [*11/22/2022 11:08:12.9135]
Nov 22 11:08:15 kernel: [*11/22/2022 11:08:15.8115] Re-Tx Count=3, Max Re-Tx Value=5, SendSeqNum=8, NumofPendingMsgs=70
Nov 22 11:08:15 kernel: [*11/22/2022 11:08:15.8115]
Nov 22 11:08:18 kernel: [*11/22/2022 11:08:18.7069] Re-Tx Count=4, Max Re-Tx Value=5, SendSeqNum=11, NumofPendingMsgs=73
Nov 22 11:08:18 kernel: [*11/22/2022 11:08:18.7069]
Nov 22 11:08:21 kernel: [*11/22/2022 11:08:21.6039] Re-Tx Count=5, Max Re-Tx Value=5, SendSeqNum=11, NumofPendingMsgs=73
Nov 22 11:08:21 kernel: [*11/22/2022 11:08:21.6039]
Nov 22 11:08:24 kernel: [*11/22/2022 11:08:24.4998] Max retransmission count exceeded, going back to DISCOVER mode.
* Regarding the AP crash we can see we are hitting this bug https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvz08781 which is fixed on the latest on 8.10.
As we agreed @Sharath Chandrashekar (sharcha2)<mailto:[email protected]> will reach the escalation team to check the below thing related to the bug:
* What is the amount of data/clients that the AP can handle before it crash .
* We need a fixed version that is compatible with a fabric network and DNAC version 2.2.2.9.
Technology: Wireless
Subtechnology: 8540 Series Wireless LAN Controller (AIR-CT8540)
Problem Code: Software Failure
Product: NA
Product Family: AIRCTA2
Software Version: N/A
Router/Node Name: N/A
Problem Details: Problem Description :- Clients unable to connect to an AP suspecting AP crash.
Setup :- SDA
WLC :- 172.18.240.13 – 8.10.151.0
DNAC :- 172.18.12.35
Impacted Location :- Global/NUS_fabric1/KR-SCIYIH/SCIYIH-MPSH/SCIYIH-MPSH2
AP’s impacted :-
1. MPSH2-02-AP20 - 10.253.152.238
2. MPSH2-02-AP22 - 10.253.190.6
3. MPSH2-02-AP23
Observations :-
AT approximately 9:15 am SGT we got a complaint that client are not able to connect to NUS SSID.
We saw checked in Prime and found that AP 22 and AP 20 getting alert for crash.
Checked and collected logs for AP 10.253.152.238.
After checking further, we can see many AP’s got rebooted.
Problem Description :- Clients unable to connect to an AP suspecting AP crash.
Setup :- SDA
WLC :- 172.18.240.13 – 8.10.151.0
DNAC :- 172.18.12.35
Impacted Location :- Global/NUS_fabric1/KR-SCIYIH/SCIYIH-MPSH/SCIYIH-MPSH2
AP’s impacted :-
1. MPSH2-02-AP20 - 10.253.152.238
2. MPSH2-02-AP22 - 10.253.190.6
3. MPSH2-02-AP23
Observations :-
AT approximately 9:15 am SGT we got a complaint that client are not able to connect to NUS SSID.
We saw checked in Prime and found that AP 22 and AP 20 getting alert for crash.
Checked and collected logs for AP 10.253.152.238.
After checking further, we can see many AP’s got rebooted.
timestamp : 2023-07-20T04:31:04.000+0000 || updatedby : sharcha2 || type : RESOLUTION SUMMARY || visibility : External || details : 8.10.185.3 special image shared with customer with bug fixes for AP crash issue | Technology: Wireless
Subtechnology: 8540 Series Wireless LAN Controller (AIR-CT8540)
Problem Code: Software Failure
Product: NA
Product Family: AIRCTA2
Software Version: N/A
Router/Node Name: N/A
Problem Details: Problem Description :- Clients unable to connect to an AP suspecting AP crash.
Setup :- SDA
WLC :- 172.18.240.13 – 8.10.151.0
DNAC :- 172.18.12.35
Impacted Location :- Global/NUS_fabric1/KR-SCIYIH/SCIYIH-MPSH/SCIYIH-MPSH2
AP’s impacted :-
1. MPSH2-02-AP20 - 10.253.152.238
2. MPSH2-02-AP22 - 10.253.190.6
3. MPSH2-02-AP23
Observations :-
AT approximately 9:15 am SGT we got a complaint that client are not able to connect to NUS SSID.
We saw checked in Prime and found that AP 22 and AP 20 getting alert for crash.
Checked and collected logs for AP 10.253.152.238.
After checking further, we can see many AP’s got rebooted. | Problem Description :- Clients unable to connect to an AP suspecting AP crash.
Setup :- SDA
WLC :- 172.18.240.13 – 8.10.151.0
DNAC :- 172.18.12.35
Impacted Location :- Global/NUS_fabric1/KR-SCIYIH/SCIYIH-MPSH/SCIYIH-MPSH2
AP’s impacted :-
1. MPSH2-02-AP20 - 10.253.152.238
2. MPSH2-02-AP22 - 10.253.190.6
3. MPSH2-02-AP23
Observations :-
AT approximately 9:15 am SGT we got a complaint that client are not able to connect to NUS SSID.
We saw checked in Prime and found that AP 22 and AP 20 getting alert for crash.
Checked and collected logs for AP 10.253.152.238.
After checking further, we can see many AP’s got rebooted. | timestamp : 2023-07-20T04:31:04.000+0000 || updatedby : sharcha2 || type : RESOLUTION SUMMARY || visibility : External || details : 8.10.185.3 special image shared with customer with bug fixes for AP crash issue | nan | AIR-AP2802I-S-K9 | ap3g3-ME-3800-k9w8-ubifs-8.10.185.0.img | nan | nan | 2 | nan | Software Bug | AIRCTA2 | Wireless | 8540 Series Wireless LAN Controller (AIR-CT8540) | nan | nan | nan | nan | nan | nan |
694907945 | Question: Which software version is principally discussed in these documents?
Answer "NONE" if you cannot find answer in the given documents.
The ONLY software version should be selected from the given software version list: 3.0.0.458/ 2.7.0.356/ 3.0.0.448/ 3.0.0.458/ 3.0.0 Response in this JSON format:
{"software_version": "","explanation": "", "summary": ""}
Good day!
I went through the support bundle you provided.
Please find my analysis below:
This device is showing evidence of encountering CSCwd45843<https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwd45843>: Java minimum heap value is to low which can lead to excessive garbage collection
Symptoms seen:
Authentication step latency on multiple policy evaluation steps.
High average request latency during times of peak load.
Authentication request latency does not recover until after the system is reloaded.
Mitigation:
Apply the universal hotfix to all nodes in the deployment and when available apply the patch with the fix for the installed ISE version.
The details of which are mentioned in my previous email to you as well.
Please find the log snippet below:
- ./ise-support-bundle-hsdc-pan-nac01-nusnggk-01-30-2023-23-17/support/showtech/showtech.out - The regex highlighted below detects the iseadminportal service starting with the low java Xms value:
32086: iseadminportal 39346 60.8 4.4 27227720 4319240 Sl Jan 18 7-07:12:48 \_ jsvc.exec -java-home /opt/CSCOcpm/jre -server -user iseadminportal -outfile /opt/CSCOcpm/appsrv/apache-tomcat-9.0.30/logs/catalina.out -errfile /opt/CSCOcpm/appsrv/apache-tomcat-9.0.30/logs/catalina.out -pidfile /var/run/catalina.pid -Xms256m -Xmx21474836480 -XX:MaxGCPauseMillis=500 -XX:MetaspaceSize=512M -XX:MaxMetaspaceSize=512M -XX:MaxDirectMemorySize=2g -XX:+DisableExplicitGC -XX:+HeapDumpOnOutOfMemoryError -XX:HeapDumpPath=/localdisk/corefiles -XX:OnOutOfMemoryError=/opt/CSCOcpm/bin/iseoomrestart.sh -XX:ErrorFile=/localdisk/corefiles/hs_err_pid%p.log -Dorg.apache.tomcat.util.buf.UDecoder.ALLOW_ENCODED_SLASH=true -verbose:gc -Xloggc:/localdisk/gc/gc_app.log.20230118232240 -XX:+PrintGCDetails -XX:+PrintGCDateStamps -XX:+UseGCLogFileRotation -XX:GCLogFileSize=3M -XX:NumberOfGCLogFiles=31 -XX:+PrintGCApplicationStoppedTime -Dsun.rmi.dgc.client.gcInterval=1800000 -Dsun.rmi.dgc.server.gcInterval=1800000 -Djdk.nio.maxCachedBufferSize=1000000 -Ddisable.logs.transaction=true -DisSSLEnabled=true -Ddb.configurations=/opt/CSCOcpm/appsrv/apache-tomcat-9.0.30/config/db.properties -Dlog4j.configuration=/opt/CSCOcpm/appsrv/apache-tomcat-9.0.30/config/log4j.xml -Doracle.jms.minSleepTime=200 -Doracle.jms.maxSleepTime=500 -DUSERTYPE_FILTER=NSFEndPointType -Dcom.cisco.cpm.provisioning.filesaverlocation=/tmp/download -Dpdp.heartbeat.cfg=/opt/CSCOcpm/appsrv/apache-tomcat-9.0.30/config/pdp_hb_config.xml -Dise.access.map=/opt/CSCOcpm/appsrv/apache-tomcat-9.0.30/config/access-map.xml -Drbac.superadmin.accesscheck.on=true -Dcom.cisco.cpm.version=3.0.0.458 -Dcom.cisco.cpm.udipid=SNS-3655-K9 -Dcom.cisco.cpm.udivid=A0 -Dcom.cisco.cpm.udisn=WZP23040NF3 -Dcom.cisco.cpm.udipt=UCS -Dcom.cisco.cpm.osversion=3.0.8.091 -DREPLIC_TRANSPORT_TYPE=JGroup -Dfake.pipmgr=true -DnoContextCopy=true -DlicenseSleepTime=24 -Djavax.net.ssl.keyStore=NONE -Djavax.net.ssl.keyStoreType=PKCS11 -Dise.fipsMode=false -Djdk.tls.ephemeralDHKeySize=2048 -Dorg.terracotta.quartz.skipUpdateCheck=true -Dreplication.monitor.on=true -Dorg.owasp.esapi.SecurityConfiguration=org.owasp.esapi.reference.DefaultSecurityConfiguration -Dcom.sun.xml.bind.v2.bytecode.ClassTailor.noOptimize=true -Dsmack.debugEnabled=true -Dsmack.debuggerClass=org.jivesoftware.smackx.debugger.slf4j.SLF4JSmackDebugger -Djgroups.logging.log_factory_class=com.cisco.epm.logging.CustomLoggerFactoryForJgroups -DsslEnabledProtocolsMediumSecurity=TLSv1,TLSv1.1,TLSv1.2 -DsslEnabledProtocolsHighSecurity=TLSv1.1,TLSv1.2 -Doracle.jdbc.autoCommitSpecCompliant=false -Dcom.sun.jndi.ldap.object.disableEndpointIdentification=true -Dorg.jboss.logging.provider=log4j -DMntSessionDirectory.fetchAmount=10000 -Dio.netty.noUnsafe=true -Dio.netty.noKeySetOptimization=true -Dio.netty.recycler.maxCapacityPerThread=0 -Dlog4j.shutdownHookEnabled=false -Dlog4j2.disable.jmx=true -Dlog4j.skipJansi=true -Dio.netty.allocator.numDirectArenas=0 -Dcom.sun.management.jmxremote -Dcom.sun.management.jmxremote.port=9999 -Dcom.sun.management.jmxremote.ssl=false -Dcom.sun.management.jmxremote.authenticate=false -Djava.rmi.server.hostname=127.0.0.1 -Dcom.sun.management.jmxremote.rmi.port=9999 -Dcom.sun.management.jmxremote.local.only=false -XX:OnError=/usr/bin/sudo /opt/CSCOcpm/bin/isegencore.sh %p -Djava.util.logging.manager=org.apache.juli.ClassLoaderLogManager -Djava.util.logging.config.file=/opt/CSCOcpm/appsrv/apache-tomcat-9.0.30/conf/logging.properties -Dfile.encoding=UTF-8 -Dorg.terracotta.quartz.skipUpdateCheck=true -Dnet.sf.ehcache.skipUpdateCheck=true -Dorg.quartz.scheduler.skipUpdateCheck=true -Dhttps.protocols=TLSv1,TLSv1.1,TLSv1.2 -DPROFILER_ROOT=/opt/CSCOcpm/appsrv/apache-tomcat-9.0.30 -javaagent:/opt/CSCOcpm/appsrv/apache-tomcat/lib/javaagent.jar -Djava.endorsed.dirs= -classpath /opt/system/java/lib/CARSJava-2.0-api.jar:/opt/system/java/lib/CARSJava-2.0-impl.jar:/opt/CSCOcpm/appsrv/apache-tomcat-9.0.30/bin/bootstrap.jar:/opt/CSCOcpm/prrt/lib/prrt-interface.jar:/opt/CSCOcpm/prrt/lib/prrt-flowapi.jar:/opt/CSCOcpm/appsrv/apache-tomcat-9.0.30/lib/log4j-rolling-appender-20131024-2017.jar:/opt/CSCOcpm/appsrv/apache-tomcat-9.0.30/lib/log4j-1.2.17.jar:/opt/TimesTen/tt1121/lib/ttjdbc6.jar:/opt/CSCOcpm/appsrv/apache-tomcat-9.0.30/bin/tomcat-juli.jar -Dcatalina.base=/opt/CSCOcpm/appsrv/apache-tomcat-9.0.30 -Dcatalina.home=/opt/CSCOcpm/appsrv/apache-tomcat-9.0.30 -Djava.io.tmpdir=/opt/CSCOcpm/temp -Dorg.apache.cxf.Logger=org.apache.cxf.common.logging.Log4jLogger org.apache.catalina.startup.Bootstrap start
This is a confirmation that you are still hitting the bug CSCwd45843<https://apc01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fbst.cloudapps.cisco.com%2Fbugsearch%2Fbug%2FCSCwd45843&data=05%7C01%7Cgeorgekingsley.paulsundararaj%40ncs.com.sg%7C9e66dfb8dca349ae8ab408daf9b8acd7%7Cca90d8f589634b6ebca99ac468bcc7a8%7C1%7C0%7C638096868815388131%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=c41EUSmTYxeI5W4su6ayOkPnH0BKumDN6gs68zO3GgY%3D&reserved=0>.
The hotfix available for this bug:
https://software.cisco.com/download/home/283801620/type/283802505/release/HP-CSCwd45843<https://apc01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fsoftware.cisco.com%2Fdownload%2Fhome%2F283801620%2Ftype%2F283802505%2Frelease%2FHP-CSCwd45843&data=05%7C01%7Cgeorgekingsley.paulsundararaj%40ncs.com.sg%7C9e66dfb8dca349ae8ab408daf9b8acd7%7Cca90d8f589634b6ebca99ac468bcc7a8%7C1%7C0%7C638096868815388131%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=C3zMOOmCfs%2BFFLKXys0s1mPQmal8tOhej1odqqEnOww%3D&reserved=0>.
Please do let me know if you have any further queries or concerns on the same.
Update 25th Jan:
Please find my analysis below:
From the tech top output we see a high CPU is consumed by the jsvc process:
hsdc-pan-nac01/admin# tech top
Invoking tech top. Press Control-C to interrupt.
top - 12:34:09 up 450 days, 15:44, 2 users, load average: 15.65, 16.77, 17.33
Tasks: 628 total, 1 running, 627 sleeping, 0 stopped, 0 zombie
%Cpu(s): 80.9 us, 1.1 sy, 0.0 ni, 17.6 id, 0.0 wa, 0.0 hi, 0.4 si, 0.0 st
KiB Mem : 97436048 total, 13726596 free, 38382248 used, 45327204 buff/cache
KiB Swap: 8191996 total, 7797512 free, 394484 used. 42646812 avail Mem
PID USER PR NI VIRT RES SHR S %CPU %MEM TIME+ COMMAND
80839 iseadmi+ 20 0 30.4g 9.3g 40464 S 1794 10.0 296801:20 jsvc
60426 iseelas+ 20 0 18.0g 16.3g 472868 S 100.0 17.5 71810:49 java
115925 iserabb+ 20 0 2884300 1.0g 2692 S 52.9 1.1 2961:51 beam.smp
3896 root 20 0 164760 2688 1576 R 11.8 0.0 0:00.03 top
1 root 20 0 195436 6776 3108 S 0.0 0.0 402:34.45 systemd
2 root 20 0 0 0 0 S 0.0 0.0 3:30.34 kthreadd
4 root 0 -20 0 0 0 S 0.0 0.0 0:00.00 kworker/0+
6 root 20 0 0 0 0 S 0.0 0.0 106:27.39 ksoftirqd+
7 root rt 0 0 0 0 S 0.0 0.0 0:50.52 migration+
8 root 20 0 0 0 0 S 0.0 0.0 0:00.00 rcu_bh
9 root 20 0 0 0 0 S 0.0 0.0 1720:11 rcu_sched
10 root 0 -20 0 0 0 S 0.0 0.0 0:00.00 lru-add-d+
11 root rt 0 0 0 0 S 0.0 0.0 2:12.02 watchdog/0
12 root rt 0 0 0 0 S 0.0 0.0 2:15.41 watchdog/1
13 root rt 0 0 0 0 S 0.0 0.0 0:51.29 migration+
14 root 20 0 0 0 0 S 0.0 0.0 87:25.21 ksoftirqd+
On further checking the sub process ID we see the following PIDs are consuming the CPU threads: (Omitted some lined for brevity)
sh-4.2# top -H -p 80839
top - 12:52:56 up 450 days, 16:03, 6 users, load average: 17.88, 16.67, 16.70
Threads: 1707 total, 18 running, 1689 sleeping, 0 stopped, 0 zombie
%Cpu(s): 64.8 us, 1.6 sy, 0.0 ni, 33.3 id, 0.0 wa, 0.0 hi, 0.4 si, 0.0 st
KiB Mem : 97436048 total, 13678112 free, 38274636 used, 45483300 buff/cache
KiB Swap: 8191996 total, 7797512 free, 394484 used. 42754628 avail Mem
PID USER PR NI VIRT RES SHR S %CPU %MEM TIME+ COMMAND
80854 iseadmi+ 20 0 30.4g 9.3g 40816 R 72.2 10.0 13611:41 jsvc
80846 iseadmi+ 20 0 30.4g 9.3g 40816 R 66.7 10.0 13612:51 jsvc
80847 iseadmi+ 20 0 30.4g 9.3g 40816 R 66.7 10.0 13612:17 jsvc
80848 iseadmi+ 20 0 30.4g 9.3g 40816 R 66.7 10.0 13612:29 jsvc
80849 iseadmi+ 20 0 30.4g 9.3g 40816 R 66.7 10.0 13612:12 jsvc
80850 iseadmi+ 20 0 30.4g 9.3g 40816 R 66.7 10.0 13612:25 jsvc
80851 iseadmi+ 20 0 30.4g 9.3g 40816 R 66.7 10.0 13612:12 jsvc
80852 iseadmi+ 20 0 30.4g 9.3g 40816 R 66.7 10.0 13611:47 jsvc
80853 iseadmi+ 20 0 30.4g 9.3g 40816 R 66.7 10.0 13613:02 jsvc
80855 iseadmi+ 20 0 30.4g 9.3g 40816 R 66.7 10.0 13612:11 jsvc
80856 iseadmi+ 20 0 30.4g 9.3g 40816 R 66.7 10.0 13611:31 jsvc
80857 iseadmi+ 20 0 30.4g 9.3g 40816 R 66.7 10.0 13611:00 jsvc
80858 iseadmi+ 20 0 30.4g 9.3g 40816 R 66.7 10.0 13612:45 jsvc
top - 12:52:59 up 450 days, 16:03, 6 users, load average: 17.88, 16.67, 16.70
Threads: 1710 total, 1 running, 1709 sleeping, 0 stopped, 0 zombie
%Cpu(s): 69.7 us, 0.6 sy, 0.0 ni, 29.4 id, 0.0 wa, 0.0 hi, 0.2 si, 0.0 st
KiB Mem : 97436048 total, 13669704 free, 38280428 used, 45485916 buff/cache
KiB Swap: 8191996 total, 7797512 free, 394484 used. 42749708 avail Mem
PID USER PR NI VIRT RES SHR S %CPU %MEM TIME+ COMMAND
80846 iseadmi+ 20 0 30.4g 9.3g 40816 S 83.9 10.0 13612:54 jsvc
80856 iseadmi+ 20 0 30.4g 9.3g 40816 S 83.9 10.0 13611:33 jsvc
80859 iseadmi+ 20 0 30.4g 9.3g 40816 S 83.9 10.0 13612:11 jsvc
80847 iseadmi+ 20 0 30.4g 9.3g 40816 S 83.6 10.0 13612:20 jsvc
80848 iseadmi+ 20 0 30.4g 9.3g 40816 S 83.6 10.0 13612:31 jsvc
80849 iseadmi+ 20 0 30.4g 9.3g 40816 S 83.6 10.0 13612:14 jsvc
80851 iseadmi+ 20 0 30.4g 9.3g 40816 S 83.6 10.0 13612:15 jsvc
80852 iseadmi+ 20 0 30.4g 9.3g 40816 S 83.6 10.0 13611:49 jsvc
80853 iseadmi+ 20 0 30.4g 9.3g 40816 S 83.6 10.0 13613:04 jsvc
80857 iseadmi+ 20 0 30.4g 9.3g 40816 S 83.6 10.0 13611:02 jsvc
80861 iseadmi+ 20 0 30.4g 9.3g 40816 S 83.6 10.0 13613:14 jsvc
80862 iseadmi+ 20 0 30.4g 9.3g 40816 S 83.6 10.0 13612:29 jsvc
80863 iseadmi+ 20 0 30.4g 9.3g 40816 S 83.6 10.0 13612:33 jsvc
80854 iseadmi+ 20 0 30.4g 9.3g 40816 S 83.2 10.0 13611:44 jsvc
top - 12:53:02 up 450 days, 16:03, 6 users, load average: 18.13, 16.74, 16.72
Threads: 1713 total, 18 running, 1695 sleeping, 0 stopped, 0 zombie
%Cpu(s): 67.5 us, 1.1 sy, 0.0 ni, 31.1 id, 0.0 wa, 0.0 hi, 0.3 si, 0.0 st
KiB Mem : 97436048 total, 13651640 free, 38298472 used, 45485936 buff/cache
KiB Swap: 8191996 total, 7797512 free, 394484 used. 42730576 avail Mem
PID USER PR NI VIRT RES SHR S %CPU %MEM TIME+ COMMAND
80850 iseadmi+ 20 0 30.4g 9.3g 41072 R 75.9 10.0 13612:30 jsvc
80846 iseadmi+ 20 0 30.4g 9.3g 41072 R 75.6 10.0 13612:56 jsvc
80847 iseadmi+ 20 0 30.4g 9.3g 41072 R 75.6 10.0 13612:22 jsvc
80848 iseadmi+ 20 0 30.4g 9.3g 41072 R 75.6 10.0 13612:33 jsvc
80849 iseadmi+ 20 0 30.4g 9.3g 41072 R 75.6 10.0 13612:17 jsvc
80851 iseadmi+ 20 0 30.4g 9.3g 41072 R 75.6 10.0 13612:17 jsvc
80852 iseadmi+ 20 0 30.4g 9.3g 41072 R 75.6 10.0 13611:52 jsvc
80855 iseadmi+ 20 0 30.4g 9.3g 41072 R 75.6 10.0 13612:16 jsvc
80859 iseadmi+ 20 0 30.4g 9.3g 41072 R 75.6 10.0 13612:13 jsvc
80860 iseadmi+ 20 0 30.4g 9.3g 41072 R 75.6 10.0 13611:56 jsvc
80861 iseadmi+ 20 0 30.4g 9.3g 41072 R 75.6 10.0 13613:17 jsvc
80862 iseadmi+ 20 0 30.4g 9.3g 41072 R 75.6 10.0 13612:32 jsvc
80863 iseadmi+ 20 0 30.4g 9.3g 41072 R 75.6 10.0 13612:35 jsvc
80853 iseadmi+ 20 0 30.4g 9.3g 41072 R 75.2 10.0 13613:06 jsvc
80854 iseadmi+ 20 0 30.4g 9.3g 41072 R 75.2 10.0 13611:46 jsvc
80856 iseadmi+ 20 0 30.4g 9.3g 41072 R 75.2 10.0 13611:36 jsvc
80857 iseadmi+ 20 0 30.4g 9.3g 41072 R 75.2 10.0 13611:04 jsvc
80858 iseadmi+ 20 0 30.4g 9.3g 41072 R 75.2 10.0 13612:50 jsvc
top - 12:53:05 up 450 days, 16:03, 6 users, load average: 18.20, 16.78, 16.74
Threads: 1713 total, 18 running, 1695 sleeping, 0 stopped, 0 zombie
%Cpu(s): 70.4 us, 0.6 sy, 0.0 ni, 28.8 id, 0.0 wa, 0.0 hi, 0.2 si, 0.0 st
KiB Mem : 97436048 total, 13647332 free, 38299860 used, 45488856 buff/cache
KiB Swap: 8191996 total, 7797512 free, 394484 used. 42729004 avail Mem
PID USER PR NI VIRT RES SHR S %CPU %MEM TIME+ COMMAND
80852 iseadmi+ 20 0 30.4g 9.3g 41072 R 84.8 10.0 13611:54 jsvc
80855 iseadmi+ 20 0 30.4g 9.3g 41072 R 84.8 10.0 13612:18 jsvc
80856 iseadmi+ 20 0 30.4g 9.3g 41072 R 84.8 10.0 13611:38 jsvc
80859 iseadmi+ 20 0 30.4g 9.3g 41072 R 84.8 10.0 13612:16 jsvc
80862 iseadmi+ 20 0 30.4g 9.3g 41072 R 84.8 10.0 13612:34 jsvc
80846 iseadmi+ 20 0 30.4g 9.3g 41072 R 84.5 10.0 13612:59 jsvc
80847 iseadmi+ 20 0 30.4g 9.3g 41072 R 84.5 10.0 13612:25 jsvc
80848 iseadmi+ 20 0 30.4g 9.3g 41072 R 84.5 10.0 13612:36 jsvc
80851 iseadmi+ 20 0 30.4g 9.3g 41072 R 84.5 10.0 13612:20 jsvc
80853 iseadmi+ 20 0 30.4g 9.3g 41072 R 84.5 10.0 13613:09 jsvc
80854 iseadmi+ 20 0 30.4g 9.3g 41072 R 84.5 10.0 13611:48 jsvc
80857 iseadmi+ 20 0 30.4g 9.3g 41072 R 84.5 10.0 13611:07 jsvc
80860 iseadmi+ 20 0 30.4g 9.3g 41072 R 84.5 10.0 13611:59 jsvc
80861 iseadmi+ 20 0 30.4g 9.3g 41072 R 84.5 10.0 13613:19 jsvc
80863 iseadmi+ 20 0 30.4g 9.3g 41072 R 84.5 10.0 13612:38 jsvc
80849 iseadmi+ 20 0 30.4g 9.3g 41072 R 84.2 10.0 13612:19 jsvc
top - 12:53:08 up 450 days, 16:03, 6 users, load average: 18.20, 16.78, 16.74
Threads: 1712 total, 18 running, 1694 sleeping, 0 stopped, 0 zombie
%Cpu(s): 66.5 us, 1.5 sy, 0.0 ni, 31.6 id, 0.1 wa, 0.0 hi, 0.4 si, 0.0 st
KiB Mem : 97436048 total, 13645540 free, 38302700 used, 45487808 buff/cache
KiB Swap: 8191996 total, 7797512 free, 394484 used. 42726808 avail Mem
From catalina.out we observed the following:
We see the that the following Garbage collector threads are consuming high CPU:
"main" #1 prio=5 os_prio=0 tid=0x0000000002313000 nid=0x13bc7 runnable [0x0000000000000000]
java.lang.Thread.State: RUNNABLE
"VM Thread" os_prio=0 tid=0x0000000002642000 nid=0x13be2 runnable
"GC task thread#0 (ParallelGC)" os_prio=0 tid=0x0000000002325800 nid=0x13bce runnable
"GC task thread#1 (ParallelGC)" os_prio=0 tid=0x0000000002327800 nid=0x13bcf runnable
"GC task thread#2 (ParallelGC)" os_prio=0 tid=0x0000000002329000 nid=0x13bd0 runnable
"GC task thread#3 (ParallelGC)" os_prio=0 tid=0x000000000232b000 nid=0x13bd1 runnable
"GC task thread#4 (ParallelGC)" os_prio=0 tid=0x000000000232d000 nid=0x13bd2 runnable
"GC task thread#5 (ParallelGC)" os_prio=0 tid=0x000000000232f000 nid=0x13bd3 runnable
"GC task thread#6 (ParallelGC)" os_prio=0 tid=0x0000000002330800 nid=0x13bd4 runnable
"GC task thread#7 (ParallelGC)" os_prio=0 tid=0x0000000002332800 nid=0x13bd5 runnable
"GC task thread#8 (ParallelGC)" os_prio=0 tid=0x0000000002334800 nid=0x13bd6 runnable
"GC task thread#9 (ParallelGC)" os_prio=0 tid=0x0000000002336000 nid=0x13bd7 runnable
"GC task thread#10 (ParallelGC)" os_prio=0 tid=0x0000000002338000 nid=0x13bd8 runnable
"GC task thread#11 (ParallelGC)" os_prio=0 tid=0x000000000233a000 nid=0x13bd9 runnable
"GC task thread#12 (ParallelGC)" os_prio=0 tid=0x000000000233b800 nid=0x13bda runnable
"GC task thread#13 (ParallelGC)" os_prio=0 tid=0x000000000233d800 nid=0x13bdb runnable
"GC task thread#14 (ParallelGC)" os_prio=0 tid=0x000000000233f800 nid=0x13bdc runnable
"GC task thread#15 (ParallelGC)" os_prio=0 tid=0x0000000002341000 nid=0x13bdd runnable
"GC task thread#16 (ParallelGC)" os_prio=0 tid=0x0000000002343000 nid=0x13bde runnable
"GC task thread#17 (ParallelGC)" os_prio=0 tid=0x0000000002345000 nid=0x13bdf runnable
"VM Periodic Task Thread" os_prio=0 tid=0x0000000002ac3800 nid=0x13cd6 waiting on condition
JNI global references: 3603
Heap
PSYoungGen total 79872K, used 288K [0x0000000635d80000, 0x000000063b280000, 0x00000007e0800000)
eden space 72704K, 0% used [0x0000000635d80000,0x0000000635dc8230,0x000000063a480000)
from space 7168K, 0% used [0x000000063ab80000,0x000000063ab80000,0x000000063b280000)
to space 7168K, 0% used [0x000000063a480000,0x000000063a480000,0x000000063ab80000)
ParOldGen total 2978304K, used 2963138K [0x00000002e0800000, 0x0000000396480000, 0x0000000635d80000)
object space 2978304K, 99% used [0x00000002e0800000,0x00000003955b0b70,0x0000000396480000)
Metaspace used 335348K, capacity 357063K, committed 358016K, reserved 1370112K
class space used 33786K, capacity 37225K, committed 37504K, reserved 1048576K
Garbage collector usage in RHEL: As long as an object is being referenced, the JVM considers it alive. Once an object is no longer referenced and therefore is not reachable by the application code, the garbage collector removes it and reclaims the unused memory. The reason GC is using more CPU cycles is that its aggressively reclaiming a huge amount of Objects which are not referenced anymore.
From the Catalina.out file we could see also the VCS threads being blocked:
"VCSPersistEventHandler-1-thread-1" #1920 prio=5 os_prio=0 tid=0x00007f42c5a27800 nid=0x185d7 waiting for monitor entry [0x00007f4224182000]
java.lang.Thread.State: BLOCKED (on object monitor)
at org.elasticsearch.action.bulk.BulkProcessor.internalAdd(BulkProcessor.java:287)
- waiting to lock <0x00000002ef9a1a28> (a org.elasticsearch.action.bulk.BulkProcessor)
at org.elasticsearch.action.bulk.BulkProcessor.add(BulkProcessor.java:272)
at org.elasticsearch.action.bulk.BulkProcessor.add(BulkProcessor.java:268)
at com.cisco.ise.vcs.crud.ESBulkProcessor.processRequest(ESBulkProcessor.java:122)
- locked <0x00000002ef51a570> (a com.cisco.ise.vcs.crud.ESBulkProcessor)
at com.cisco.ise.vcs.crud.VCSCrudProcessor.upsertBulkData(VCSCrudProcessor.java:98)
- locked <0x0000000308461c08> (a com.cisco.ise.vcs.crud.VCSCrudProcessor)
at com.cisco.ise.vcs.event.handler.VCSPersistEventHandler.updateContextRepository(VCSPersistEventHandler.java:147)
at com.cisco.ise.vcs.event.handler.VCSPersistEventHandler.handleEvent(VCSPersistEventHandler.java:113)
at com.cisco.ise.vcs.event.VCSEventHandler.run(VCSEventHandler.java:130)
at java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1149)
at java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:624)
at java.lang.Thread.run(Thread.java:748)
Because of the above observations we see that you are encountering the bug CSCwd45843<https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwd45843>;. There is a hotfix available for this bug:
https://software.cisco.com/download/home/283801620/type/283802505/release/HP-CSCwd45843
This is a generic HP and can be applied on any version and is available in CCO site, you could install it on all the nodes and monitor.
But we would suggests to install patch 6 first and then install this HP.
This bug is addressed in ISE 3.0 p7 which is yet to be released, until then you can install patch 6 first and then the HP over it.
Good day!
Thanks for the files you attached so far and I was able to come to a root cause of the issue.
Please find my analysis below:
From the tech top output we see a high CPU is consumed by the jsvc process:
hsdc-pan-nac01/admin# tech top
Invoking tech top.
Press Control-C to interrupt.
top - 12:34:09 up 450 days, 15:44, 2 users, load average: 15.65, 16.77, 17.33
Tasks: 628 total, 1 running, 627 sleeping, 0 stopped, 0 zombie
%Cpu(s): 80.9 us, 1.1 sy, 0.0 ni, 17.6 id, 0.0 wa, 0.0 hi, 0.4 si, 0.0 st
KiB Mem : 97436048 total, 13726596 free, 38382248 used, 45327204 buff/cache
KiB Swap: 8191996 total, 7797512 free, 394484 used.
42646812 avail Mem
PID USER PR NI VIRT RES SHR S %CPU %MEM TIME+ COMMAND
80839 iseadmi+ 20 0 30.4g 9.3g 40464 S 1794 10.0 296801:20 jsvc
60426 iseelas+ 20 0 18.0g 16.3g 472868 S 100.0 17.5 71810:49 java
115925 iserabb+ 20 0 2884300 1.0g 2692 S 52.9 1.1 2961:51 beam.smp
3896 root 20 0 164760 2688 1576 R 11.8 0.0 0:00.03 top
1 root 20 0 195436 6776 3108 S 0.0 0.0 402:34.45 systemd
2 root 20 0 0 0 0 S 0.0 0.0 3:30.34 kthreadd
4 root 0 -20 0 0 0 S 0.0 0.0 0:00.00 kworker/0+
6 root 20 0 0 0 0 S 0.0 0.0 106:27.39 ksoftirqd+
7 root rt 0 0 0 0 S 0.0 0.0 0:50.52 migration+
8 root 20 0 0 0 0 S 0.0 0.0 0:00.00 rcu_bh
9 root 20 0 0 0 0 S 0.0 0.0 1720:11 rcu_sched
10 root 0 -20 0 0 0 S 0.0 0.0 0:00.00 lru-add-d+
11 root rt 0 0 0 0 S 0.0 0.0 2:12.02 watchdog/0
12 root rt 0 0 0 0 S 0.0 0.0 2:15.41 watchdog/1
13 root rt 0 0 0 0 S 0.0 0.0 0:51.29 migration+
14 root 20 0 0 0 0 S 0.0 0.0 87:25.21 ksoftirqd+
On further checking the sub process ID we see the following PIDs are consuming the CPU threads: (Omitted some lined for brevity)
sh-4.2# top -H -p 80839
top - 12:52:56 up 450 days, 16:03, 6 users, load average: 17.88, 16.67, 16.70
Threads: 1707 total, 18 running, 1689 sleeping, 0 stopped, 0 zombie
%Cpu(s): 64.8 us, 1.6 sy, 0.0 ni, 33.3 id, 0.0 wa, 0.0 hi, 0.4 si, 0.0 st
KiB Mem : 97436048 total, 13678112 free, 38274636 used, 45483300 buff/cache
KiB Swap: 8191996 total, 7797512 free, 394484 used.
42754628 avail Mem
PID USER PR NI VIRT RES SHR S %CPU %MEM TIME+ COMMAND
80854 iseadmi+ 20 0 30.4g 9.3g 40816 R 72.2 10.0 13611:41 jsvc
80846 iseadmi+ 20 0 30.4g 9.3g 40816 R 66.7 10.0 13612:51 jsvc
80847 iseadmi+ 20 0 30.4g 9.3g 40816 R 66.7 10.0 13612:17 jsvc
80848 iseadmi+ 20 0 30.4g 9.3g 40816 R 66.7 10.0 13612:29 jsvc
80849 iseadmi+ 20 0 30.4g 9.3g 40816 R 66.7 10.0 13612:12 jsvc
80850 iseadmi+ 20 0 30.4g 9.3g 40816 R 66.7 10.0 13612:25 jsvc
80851 iseadmi+ 20 0 30.4g 9.3g 40816 R 66.7 10.0 13612:12 jsvc
80852 iseadmi+ 20 0 30.4g 9.3g 40816 R 66.7 10.0 13611:47 jsvc
80853 iseadmi+ 20 0 30.4g 9.3g 40816 R 66.7 10.0 13613:02 jsvc
80855 iseadmi+ 20 0 30.4g 9.3g 40816 R 66.7 10.0 13612:11 jsvc
80856 iseadmi+ 20 0 30.4g 9.3g 40816 R 66.7 10.0 13611:31 jsvc
80857 iseadmi+ 20 0 30.4g 9.3g 40816 R 66.7 10.0 13611:00 jsvc
80858 iseadmi+ 20 0 30.4g 9.3g 40816 R 66.7 10.0 13612:45 jsvc
top - 12:52:59 up 450 days, 16:03, 6 users, load average: 17.88, 16.67, 16.70
Threads: 1710 total, 1 running, 1709 sleeping, 0 stopped, 0 zombie
%Cpu(s): 69.7 us, 0.6 sy, 0.0 ni, 29.4 id, 0.0 wa, 0.0 hi, 0.2 si, 0.0 st
KiB Mem : 97436048 total, 13669704 free, 38280428 used, 45485916 buff/cache
KiB Swap: 8191996 total, 7797512 free, 394484 used.
42749708 avail Mem
PID USER PR NI VIRT RES SHR S %CPU %MEM TIME+ COMMAND
80846 iseadmi+ 20 0 30.4g 9.3g 40816 S 83.9 10.0 13612:54 jsvc
80856 iseadmi+ 20 0 30.4g 9.3g 40816 S 83.9 10.0 13611:33 jsvc
80859 iseadmi+ 20 0 30.4g 9.3g 40816 S 83.9 10.0 13612:11 jsvc
80847 iseadmi+ 20 0 30.4g 9.3g 40816 S 83.6 10.0 13612:20 jsvc
80848 iseadmi+ 20 0 30.4g 9.3g 40816 S 83.6 10.0 13612:31 jsvc
80849 iseadmi+ 20 0 30.4g 9.3g 40816 S 83.6 10.0 13612:14 jsvc
80851 iseadmi+ 20 0 30.4g 9.3g 40816 S 83.6 10.0 13612:15 jsvc
80852 iseadmi+ 20 0 30.4g 9.3g 40816 S 83.6 10.0 13611:49 jsvc
80853 iseadmi+ 20 0 30.4g 9.3g 40816 S 83.6 10.0 13613:04 jsvc
80857 iseadmi+ 20 0 30.4g 9.3g 40816 S 83.6 10.0 13611:02 jsvc
80861 iseadmi+ 20 0 30.4g 9.3g 40816 S 83.6 10.0 13613:14 jsvc
80862 iseadmi+ 20 0 30.4g 9.3g 40816 S 83.6 10.0 13612:29 jsvc
80863 iseadmi+ 20 0 30.4g 9.3g 40816 S 83.6 10.0 13612:33 jsvc
80854 iseadmi+ 20 0 30.4g 9.3g 40816 S 83.2 10.0 13611:44 jsvc
top - 12:53:02 up 450 days, 16:03, 6 users, load average: 18.13, 16.74, 16.72
Threads: 1713 total, 18 running, 1695 sleeping, 0 stopped, 0 zombie
%Cpu(s): 67.5 us, 1.1 sy, 0.0 ni, 31.1 id, 0.0 wa, 0.0 hi, 0.3 si, 0.0 st
KiB Mem : 97436048 total, 13651640 free, 38298472 used, 45485936 buff/cache
KiB Swap: 8191996 total, 7797512 free, 394484 used.
42730576 avail Mem
PID USER PR NI VIRT RES SHR S %CPU %MEM TIME+ COMMAND
80850 iseadmi+ 20 0 30.4g 9.3g 41072 R 75.9 10.0 13612:30 jsvc
80846 iseadmi+ 20 0 30.4g 9.3g 41072 R 75.6 10.0 13612:56 jsvc
80847 iseadmi+ 20 0 30.4g 9.3g 41072 R 75.6 10.0 13612:22 jsvc
80848 iseadmi+ 20 0 30.4g 9.3g 41072 R 75.6 10.0 13612:33 jsvc
80849 iseadmi+ 20 0 30.4g 9.3g 41072 R 75.6 10.0 13612:17 jsvc
80851 iseadmi+ 20 0 30.4g 9.3g 41072 R 75.6 10.0 13612:17 jsvc
80852 iseadmi+ 20 0 30.4g 9.3g 41072 R 75.6 10.0 13611:52 jsvc
80855 iseadmi+ 20 0 30.4g 9.3g 41072 R 75.6 10.0 13612:16 jsvc
80859 iseadmi+ 20 0 30.4g 9.3g 41072 R 75.6 10.0 13612:13 jsvc
80860 iseadmi+ 20 0 30.4g 9.3g 41072 R 75.6 10.0 13611:56 jsvc
80861 iseadmi+ 20 0 30.4g 9.3g 41072 R 75.6 10.0 13613:17 jsvc
80862 iseadmi+ 20 0 30.4g 9.3g 41072 R 75.6 10.0 13612:32 jsvc
80863 iseadmi+ 20 0 30.4g 9.3g 41072 R 75.6 10.0 13612:35 jsvc
80853 iseadmi+ 20 0 30.4g 9.3g 41072 R 75.2 10.0 13613:06 jsvc
80854 iseadmi+ 20 0 30.4g 9.3g 41072 R 75.2 10.0 13611:46 jsvc
80856 iseadmi+ 20 0 30.4g 9.3g 41072 R 75.2 10.0 13611:36 jsvc
80857 iseadmi+ 20 0 30.4g 9.3g 41072 R 75.2 10.0 13611:04 jsvc
80858 iseadmi+ 20 0 30.4g 9.3g 41072 R 75.2 10.0 13612:50 jsvc
top - 12:53:05 up 450 days, 16:03, 6 users, load average: 18.20, 16.78, 16.74
Threads: 1713 total, 18 running, 1695 sleeping, 0 stopped, 0 zombie
%Cpu(s): 70.4 us, 0.6 sy, 0.0 ni, 28.8 id, 0.0 wa, 0.0 hi, 0.2 si, 0.0 st
KiB Mem : 97436048 total, 13647332 free, 38299860 used, 45488856 buff/cache
KiB Swap: 8191996 total, 7797512 free, 394484 used.
42729004 avail Mem
PID USER PR NI VIRT RES SHR S %CPU %MEM TIME+ COMMAND
80852 iseadmi+ 20 0 30.4g 9.3g 41072 R 84.8 10.0 13611:54 jsvc
80855 iseadmi+ 20 0 30.4g 9.3g 41072 R 84.8 10.0 13612:18 jsvc
80856 iseadmi+ 20 0 30.4g 9.3g 41072 R 84.8 10.0 13611:38 jsvc
80859 iseadmi+ 20 0 30.4g 9.3g 41072 R 84.8 10.0 13612:16 jsvc
80862 iseadmi+ 20 0 30.4g 9.3g 41072 R 84.8 10.0 13612:34 jsvc
80846 iseadmi+ 20 0 30.4g 9.3g 41072 R 84.5 10.0 13612:59 jsvc
80847 iseadmi+ 20 0 30.4g 9.3g 41072 R 84.5 10.0 13612:25 jsvc
80848 iseadmi+ 20 0 30.4g 9.3g 41072 R 84.5 10.0 13612:36 jsvc
80851 iseadmi+ 20 0 30.4g 9.3g 41072 R 84.5 10.0 13612:20 jsvc
80853 iseadmi+ 20 0 30.4g 9.3g 41072 R 84.5 10.0 13613:09 jsvc
80854 iseadmi+ 20 0 30.4g 9.3g 41072 R 84.5 10.0 13611:48 jsvc
80857 iseadmi+ 20 0 30.4g 9.3g 41072 R 84.5 10.0 13611:07 jsvc
80860 iseadmi+ 20 0 30.4g 9.3g 41072 R 84.5 10.0 13611:59 jsvc
80861 iseadmi+ 20 0 30.4g 9.3g 41072 R 84.5 10.0 13613:19 jsvc
80863 iseadmi+ 20 0 30.4g 9.3g 41072 R 84.5 10.0 13612:38 jsvc
80849 iseadmi+ 20 0 30.4g 9.3g 41072 R 84.2 10.0 13612:19 jsvc
top - 12:53:08 up 450 days, 16:03, 6 users, load average: 18.20, 16.78, 16.74
Threads: 1712 total, 18 running, 1694 sleeping, 0 stopped, 0 zombie
%Cpu(s): 66.5 us, 1.5 sy, 0.0 ni, 31.6 id, 0.1 wa, 0.0 hi, 0.4 si, 0.0 st
KiB Mem : 97436048 total, 13645540 free, 38302700 used, 45487808 buff/cache
KiB Swap: 8191996 total, 7797512 free, 394484 used.
42726808 avail Mem
From catalina.out we observed the following:
We see the that the following Garbage collector threads are consuming high CPU:
"main" #1 prio=5 os_prio=0 tid=0x0000000002313000 nid=0x13bc7 runnable [0x0000000000000000]
java.lang.Thread.State: RUNNABLE
"VM Thread" os_prio=0 tid=0x0000000002642000 nid=0x13be2 runnable
"GC task thread#0 (ParallelGC)" os_prio=0 tid=0x0000000002325800 nid=0x13bce runnable
"GC task thread#1 (ParallelGC)" os_prio=0 tid=0x0000000002327800 nid=0x13bcf runnable
"GC task thread#2 (ParallelGC)" os_prio=0 tid=0x0000000002329000 nid=0x13bd0 runnable
"GC task thread#3 (ParallelGC)" os_prio=0 tid=0x000000000232b000 nid=0x13bd1 runnable
"GC task thread#4 (ParallelGC)" os_prio=0 tid=0x000000000232d000 nid=0x13bd2 runnable
"GC task thread#5 (ParallelGC)" os_prio=0 tid=0x000000000232f000 nid=0x13bd3 runnable
"GC task thread#6 (ParallelGC)" os_prio=0 tid=0x0000000002330800 nid=0x13bd4 runnable
"GC task thread#7 (ParallelGC)" os_prio=0 tid=0x0000000002332800 nid=0x13bd5 runnable
"GC task thread#8 (ParallelGC)" os_prio=0 tid=0x0000000002334800 nid=0x13bd6 runnable
"GC task thread#9 (ParallelGC)" os_prio=0 tid=0x0000000002336000 nid=0x13bd7 runnable
"GC task thread#10 (ParallelGC)" os_prio=0 tid=0x0000000002338000 nid=0x13bd8 runnable
"GC task thread#11 (ParallelGC)" os_prio=0 tid=0x000000000233a000 nid=0x13bd9 runnable
"GC task thread#12 (ParallelGC)" os_prio=0 tid=0x000000000233b800 nid=0x13bda runnable
"GC task thread#13 (ParallelGC)" os_prio=0 tid=0x000000000233d800 nid=0x13bdb runnable
"GC task thread#14 (ParallelGC)" os_prio=0 tid=0x000000000233f800 nid=0x13bdc runnable
"GC task thread#15 (ParallelGC)" os_prio=0 tid=0x0000000002341000 nid=0x13bdd runnable
"GC task thread#16 (ParallelGC)" os_prio=0 tid=0x0000000002343000 nid=0x13bde runnable
"GC task thread#17 (ParallelGC)" os_prio=0 tid=0x0000000002345000 nid=0x13bdf runnable
"VM Periodic Task Thread" os_prio=0 tid=0x0000000002ac3800 nid=0x13cd6 waiting on condition
JNI global references: 3603
Heap
PSYoungGen total 79872K, used 288K [0x0000000635d80000, 0x000000063b280000, 0x00000007e0800000)
eden space 72704K, 0% used [0x0000000635d80000,0x0000000635dc8230,0x000000063a480000)
from space 7168K, 0% used [0x000000063ab80000,0x000000063ab80000,0x000000063b280000)
to space 7168K, 0% used [0x000000063a480000,0x000000063a480000,0x000000063ab80000)
ParOldGen total 2978304K, used 2963138K [0x00000002e0800000, 0x0000000396480000, 0x0000000635d80000)
object space 2978304K, 99% used [0x00000002e0800000,0x00000003955b0b70,0x0000000396480000)
Metaspace used 335348K, capacity 357063K, committed 358016K, reserved 1370112K
class space used 33786K, capacity 37225K, committed 37504K, reserved 1048576K
Garbage collector usage in RHEL: As long as an object is being referenced, the JVM considers it alive.
Once an object is no longer referenced and therefore is not reachable by the application code, the garbage collector removes it and reclaims the unused memory.
The reason GC is using more CPU cycles is that its aggressively reclaiming a huge amount of Objects which are not referenced anymore.
From the Catalina.out file we could see also the VCS threads being blocked:
"VCSPersistEventHandler-1-thread-1" #1920 prio=5 os_prio=0 tid=0x00007f42c5a27800 nid=0x185d7 waiting for monitor entry [0x00007f4224182000]
java.lang.Thread.State: BLOCKED (on object monitor)
at org.elasticsearch.action.bulk.BulkProcessor.internalAdd(BulkProcessor.java:287)
- waiting to lock <0x00000002ef9a1a28> (a org.elasticsearch.action.bulk.BulkProcessor)
at org.elasticsearch.action.bulk.BulkProcessor.add(BulkProcessor.java:272)
at org.elasticsearch.action.bulk.BulkProcessor.add(BulkProcessor.java:268)
at com.cisco.ise.vcs.crud.ESBulkProcessor.processRequest(ESBulkProcessor.java:122)
- locked <0x00000002ef51a570> (a com.cisco.ise.vcs.crud.ESBulkProcessor)
at com.cisco.ise.vcs.crud.VCSCrudProcessor.upsertBulkData(VCSCrudProcessor.java:98)
- locked <0x0000000308461c08> (a com.cisco.ise.vcs.crud.VCSCrudProcessor)
at com.cisco.ise.vcs.event.handler.VCSPersistEventHandler.updateContextRepository(VCSPersistEventHandler.java:147)
at com.cisco.ise.vcs.event.handler.VCSPersistEventHandler.handleEvent(VCSPersistEventHandler.java:113)
at com.cisco.ise.vcs.event.VCSEventHandler.run(VCSEventHandler.java:130)
at java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1149)
at java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:624)
at java.lang.Thread.run(Thread.java:748)
Because of the above observations we see that you are encountering the bug CSCwd45843<https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwd45843>.
There is a hotfix available for this bug:
https://software.cisco.com/download/home/283801620/type/283802505/release/HP-CSCwd45843
This is a generic HP and can be applied on any version and is available in CCO site, you could install it on all the nodes and monitor.
But we would suggests to install patch 6 first and then install this HP.
This bug is addressed in ISE 3.0 p7 which is yet to be released, until then you can install patch 6 first and then the HP over it.
Do let me know if you have any further queries or concerns.
Technology: Identity Services Engine (ISE) - 3.0
Subtechnology: ISE Performance (High CPU / Memory / IO / GUI Slowness)
Problem Code: Error Messages, Logs, Debugs
Product: NA
Product Family: CISE
Software Version: N/A
Router/Node Name: N/A
Problem Details: ISE - High Load Average for ISE PAN node
ISE - High Load Average for ISE PAN node
timestamp : 2023-02-27T01:52:17.000+0000 || updatedby : rupespat || type : RESOLUTION SUMMARY || visibility : External || details : observations we see that CU is encountering the bug CSCwd45843<https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwd45843>;. There is a hotfix available for this bug:
https://software.cisco.com/download/home/283801620/type/283802505/release/HP-CSCwd45843
This is a generic HP and can be applied on any version and is available in CCO site, you could install it on all the nodes and monitor.
But we would suggests to install patch 6 first and then install this HP.
This bug is addressed in ISE 3.0 p7 which is yet to be released, until then you can install patch 6 first and then the HP over it.
======
No response from CU since 9th February 23, closing the case after 3 strike and manager followup | Question: Which product is principally discussed in these documents?
Answer "NONE" if you cannot find answer in the given documents.
The ONLY product name should be selected from the given product name list: SNS-3655-K9/ SNS-3695-K9 Response in this JSON format:
{"product_name": "","explanation": "", "summary": ""}
Good day!
I went through the support bundle you provided.
Please find my analysis below:
This device is showing evidence of encountering CSCwd45843<https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwd45843>: Java minimum heap value is to low which can lead to excessive garbage collection
Symptoms seen:
Authentication step latency on multiple policy evaluation steps.
High average request latency during times of peak load.
Authentication request latency does not recover until after the system is reloaded.
Mitigation:
Apply the universal hotfix to all nodes in the deployment and when available apply the patch with the fix for the installed ISE version.
The details of which are mentioned in my previous email to you as well.
Please find the log snippet below:
- ./ise-support-bundle-hsdc-pan-nac01-nusnggk-01-30-2023-23-17/support/showtech/showtech.out - The regex highlighted below detects the iseadminportal service starting with the low java Xms value:
32086: iseadminportal 39346 60.8 4.4 27227720 4319240 Sl Jan 18 7-07:12:48 \_ jsvc.exec -java-home /opt/CSCOcpm/jre -server -user iseadminportal -outfile /opt/CSCOcpm/appsrv/apache-tomcat-9.0.30/logs/catalina.out -errfile /opt/CSCOcpm/appsrv/apache-tomcat-9.0.30/logs/catalina.out -pidfile /var/run/catalina.pid -Xms256m -Xmx21474836480 -XX:MaxGCPauseMillis=500 -XX:MetaspaceSize=512M -XX:MaxMetaspaceSize=512M -XX:MaxDirectMemorySize=2g -XX:+DisableExplicitGC -XX:+HeapDumpOnOutOfMemoryError -XX:HeapDumpPath=/localdisk/corefiles -XX:OnOutOfMemoryError=/opt/CSCOcpm/bin/iseoomrestart.sh -XX:ErrorFile=/localdisk/corefiles/hs_err_pid%p.log -Dorg.apache.tomcat.util.buf.UDecoder.ALLOW_ENCODED_SLASH=true -verbose:gc -Xloggc:/localdisk/gc/gc_app.log.20230118232240 -XX:+PrintGCDetails -XX:+PrintGCDateStamps -XX:+UseGCLogFileRotation -XX:GCLogFileSize=3M -XX:NumberOfGCLogFiles=31 -XX:+PrintGCApplicationStoppedTime -Dsun.rmi.dgc.client.gcInterval=1800000 -Dsun.rmi.dgc.server.gcInterval=1800000 -Djdk.nio.maxCachedBufferSize=1000000 -Ddisable.logs.transaction=true -DisSSLEnabled=true -Ddb.configurations=/opt/CSCOcpm/appsrv/apache-tomcat-9.0.30/config/db.properties -Dlog4j.configuration=/opt/CSCOcpm/appsrv/apache-tomcat-9.0.30/config/log4j.xml -Doracle.jms.minSleepTime=200 -Doracle.jms.maxSleepTime=500 -DUSERTYPE_FILTER=NSFEndPointType -Dcom.cisco.cpm.provisioning.filesaverlocation=/tmp/download -Dpdp.heartbeat.cfg=/opt/CSCOcpm/appsrv/apache-tomcat-9.0.30/config/pdp_hb_config.xml -Dise.access.map=/opt/CSCOcpm/appsrv/apache-tomcat-9.0.30/config/access-map.xml -Drbac.superadmin.accesscheck.on=true -Dcom.cisco.cpm.version=3.0.0.458 -Dcom.cisco.cpm.udipid=SNS-3655-K9 -Dcom.cisco.cpm.udivid=A0 -Dcom.cisco.cpm.udisn=WZP23040NF3 -Dcom.cisco.cpm.udipt=UCS -Dcom.cisco.cpm.osversion=3.0.8.091 -DREPLIC_TRANSPORT_TYPE=JGroup -Dfake.pipmgr=true -DnoContextCopy=true -DlicenseSleepTime=24 -Djavax.net.ssl.keyStore=NONE -Djavax.net.ssl.keyStoreType=PKCS11 -Dise.fipsMode=false -Djdk.tls.ephemeralDHKeySize=2048 -Dorg.terracotta.quartz.skipUpdateCheck=true -Dreplication.monitor.on=true -Dorg.owasp.esapi.SecurityConfiguration=org.owasp.esapi.reference.DefaultSecurityConfiguration -Dcom.sun.xml.bind.v2.bytecode.ClassTailor.noOptimize=true -Dsmack.debugEnabled=true -Dsmack.debuggerClass=org.jivesoftware.smackx.debugger.slf4j.SLF4JSmackDebugger -Djgroups.logging.log_factory_class=com.cisco.epm.logging.CustomLoggerFactoryForJgroups -DsslEnabledProtocolsMediumSecurity=TLSv1,TLSv1.1,TLSv1.2 -DsslEnabledProtocolsHighSecurity=TLSv1.1,TLSv1.2 -Doracle.jdbc.autoCommitSpecCompliant=false -Dcom.sun.jndi.ldap.object.disableEndpointIdentification=true -Dorg.jboss.logging.provider=log4j -DMntSessionDirectory.fetchAmount=10000 -Dio.netty.noUnsafe=true -Dio.netty.noKeySetOptimization=true -Dio.netty.recycler.maxCapacityPerThread=0 -Dlog4j.shutdownHookEnabled=false -Dlog4j2.disable.jmx=true -Dlog4j.skipJansi=true -Dio.netty.allocator.numDirectArenas=0 -Dcom.sun.management.jmxremote -Dcom.sun.management.jmxremote.port=9999 -Dcom.sun.management.jmxremote.ssl=false -Dcom.sun.management.jmxremote.authenticate=false -Djava.rmi.server.hostname=127.0.0.1 -Dcom.sun.management.jmxremote.rmi.port=9999 -Dcom.sun.management.jmxremote.local.only=false -XX:OnError=/usr/bin/sudo /opt/CSCOcpm/bin/isegencore.sh %p -Djava.util.logging.manager=org.apache.juli.ClassLoaderLogManager -Djava.util.logging.config.file=/opt/CSCOcpm/appsrv/apache-tomcat-9.0.30/conf/logging.properties -Dfile.encoding=UTF-8 -Dorg.terracotta.quartz.skipUpdateCheck=true -Dnet.sf.ehcache.skipUpdateCheck=true -Dorg.quartz.scheduler.skipUpdateCheck=true -Dhttps.protocols=TLSv1,TLSv1.1,TLSv1.2 -DPROFILER_ROOT=/opt/CSCOcpm/appsrv/apache-tomcat-9.0.30 -javaagent:/opt/CSCOcpm/appsrv/apache-tomcat/lib/javaagent.jar -Djava.endorsed.dirs= -classpath /opt/system/java/lib/CARSJava-2.0-api.jar:/opt/system/java/lib/CARSJava-2.0-impl.jar:/opt/CSCOcpm/appsrv/apache-tomcat-9.0.30/bin/bootstrap.jar:/opt/CSCOcpm/prrt/lib/prrt-interface.jar:/opt/CSCOcpm/prrt/lib/prrt-flowapi.jar:/opt/CSCOcpm/appsrv/apache-tomcat-9.0.30/lib/log4j-rolling-appender-20131024-2017.jar:/opt/CSCOcpm/appsrv/apache-tomcat-9.0.30/lib/log4j-1.2.17.jar:/opt/TimesTen/tt1121/lib/ttjdbc6.jar:/opt/CSCOcpm/appsrv/apache-tomcat-9.0.30/bin/tomcat-juli.jar -Dcatalina.base=/opt/CSCOcpm/appsrv/apache-tomcat-9.0.30 -Dcatalina.home=/opt/CSCOcpm/appsrv/apache-tomcat-9.0.30 -Djava.io.tmpdir=/opt/CSCOcpm/temp -Dorg.apache.cxf.Logger=org.apache.cxf.common.logging.Log4jLogger org.apache.catalina.startup.Bootstrap start
This is a confirmation that you are still hitting the bug CSCwd45843<https://apc01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fbst.cloudapps.cisco.com%2Fbugsearch%2Fbug%2FCSCwd45843&data=05%7C01%7Cgeorgekingsley.paulsundararaj%40ncs.com.sg%7C9e66dfb8dca349ae8ab408daf9b8acd7%7Cca90d8f589634b6ebca99ac468bcc7a8%7C1%7C0%7C638096868815388131%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=c41EUSmTYxeI5W4su6ayOkPnH0BKumDN6gs68zO3GgY%3D&reserved=0>.
The hotfix available for this bug:
https://software.cisco.com/download/home/283801620/type/283802505/release/HP-CSCwd45843<https://apc01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fsoftware.cisco.com%2Fdownload%2Fhome%2F283801620%2Ftype%2F283802505%2Frelease%2FHP-CSCwd45843&data=05%7C01%7Cgeorgekingsley.paulsundararaj%40ncs.com.sg%7C9e66dfb8dca349ae8ab408daf9b8acd7%7Cca90d8f589634b6ebca99ac468bcc7a8%7C1%7C0%7C638096868815388131%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=C3zMOOmCfs%2BFFLKXys0s1mPQmal8tOhej1odqqEnOww%3D&reserved=0>.
Please do let me know if you have any further queries or concerns on the same.
Update 25th Jan:
Please find my analysis below:
From the tech top output we see a high CPU is consumed by the jsvc process:
hsdc-pan-nac01/admin# tech top
Invoking tech top. Press Control-C to interrupt.
top - 12:34:09 up 450 days, 15:44, 2 users, load average: 15.65, 16.77, 17.33
Tasks: 628 total, 1 running, 627 sleeping, 0 stopped, 0 zombie
%Cpu(s): 80.9 us, 1.1 sy, 0.0 ni, 17.6 id, 0.0 wa, 0.0 hi, 0.4 si, 0.0 st
KiB Mem : 97436048 total, 13726596 free, 38382248 used, 45327204 buff/cache
KiB Swap: 8191996 total, 7797512 free, 394484 used. 42646812 avail Mem
PID USER PR NI VIRT RES SHR S %CPU %MEM TIME+ COMMAND
80839 iseadmi+ 20 0 30.4g 9.3g 40464 S 1794 10.0 296801:20 jsvc
60426 iseelas+ 20 0 18.0g 16.3g 472868 S 100.0 17.5 71810:49 java
115925 iserabb+ 20 0 2884300 1.0g 2692 S 52.9 1.1 2961:51 beam.smp
3896 root 20 0 164760 2688 1576 R 11.8 0.0 0:00.03 top
1 root 20 0 195436 6776 3108 S 0.0 0.0 402:34.45 systemd
2 root 20 0 0 0 0 S 0.0 0.0 3:30.34 kthreadd
4 root 0 -20 0 0 0 S 0.0 0.0 0:00.00 kworker/0+
6 root 20 0 0 0 0 S 0.0 0.0 106:27.39 ksoftirqd+
7 root rt 0 0 0 0 S 0.0 0.0 0:50.52 migration+
8 root 20 0 0 0 0 S 0.0 0.0 0:00.00 rcu_bh
9 root 20 0 0 0 0 S 0.0 0.0 1720:11 rcu_sched
10 root 0 -20 0 0 0 S 0.0 0.0 0:00.00 lru-add-d+
11 root rt 0 0 0 0 S 0.0 0.0 2:12.02 watchdog/0
12 root rt 0 0 0 0 S 0.0 0.0 2:15.41 watchdog/1
13 root rt 0 0 0 0 S 0.0 0.0 0:51.29 migration+
14 root 20 0 0 0 0 S 0.0 0.0 87:25.21 ksoftirqd+
On further checking the sub process ID we see the following PIDs are consuming the CPU threads: (Omitted some lined for brevity)
sh-4.2# top -H -p 80839
top - 12:52:56 up 450 days, 16:03, 6 users, load average: 17.88, 16.67, 16.70
Threads: 1707 total, 18 running, 1689 sleeping, 0 stopped, 0 zombie
%Cpu(s): 64.8 us, 1.6 sy, 0.0 ni, 33.3 id, 0.0 wa, 0.0 hi, 0.4 si, 0.0 st
KiB Mem : 97436048 total, 13678112 free, 38274636 used, 45483300 buff/cache
KiB Swap: 8191996 total, 7797512 free, 394484 used. 42754628 avail Mem
PID USER PR NI VIRT RES SHR S %CPU %MEM TIME+ COMMAND
80854 iseadmi+ 20 0 30.4g 9.3g 40816 R 72.2 10.0 13611:41 jsvc
80846 iseadmi+ 20 0 30.4g 9.3g 40816 R 66.7 10.0 13612:51 jsvc
80847 iseadmi+ 20 0 30.4g 9.3g 40816 R 66.7 10.0 13612:17 jsvc
80848 iseadmi+ 20 0 30.4g 9.3g 40816 R 66.7 10.0 13612:29 jsvc
80849 iseadmi+ 20 0 30.4g 9.3g 40816 R 66.7 10.0 13612:12 jsvc
80850 iseadmi+ 20 0 30.4g 9.3g 40816 R 66.7 10.0 13612:25 jsvc
80851 iseadmi+ 20 0 30.4g 9.3g 40816 R 66.7 10.0 13612:12 jsvc
80852 iseadmi+ 20 0 30.4g 9.3g 40816 R 66.7 10.0 13611:47 jsvc
80853 iseadmi+ 20 0 30.4g 9.3g 40816 R 66.7 10.0 13613:02 jsvc
80855 iseadmi+ 20 0 30.4g 9.3g 40816 R 66.7 10.0 13612:11 jsvc
80856 iseadmi+ 20 0 30.4g 9.3g 40816 R 66.7 10.0 13611:31 jsvc
80857 iseadmi+ 20 0 30.4g 9.3g 40816 R 66.7 10.0 13611:00 jsvc
80858 iseadmi+ 20 0 30.4g 9.3g 40816 R 66.7 10.0 13612:45 jsvc
top - 12:52:59 up 450 days, 16:03, 6 users, load average: 17.88, 16.67, 16.70
Threads: 1710 total, 1 running, 1709 sleeping, 0 stopped, 0 zombie
%Cpu(s): 69.7 us, 0.6 sy, 0.0 ni, 29.4 id, 0.0 wa, 0.0 hi, 0.2 si, 0.0 st
KiB Mem : 97436048 total, 13669704 free, 38280428 used, 45485916 buff/cache
KiB Swap: 8191996 total, 7797512 free, 394484 used. 42749708 avail Mem
PID USER PR NI VIRT RES SHR S %CPU %MEM TIME+ COMMAND
80846 iseadmi+ 20 0 30.4g 9.3g 40816 S 83.9 10.0 13612:54 jsvc
80856 iseadmi+ 20 0 30.4g 9.3g 40816 S 83.9 10.0 13611:33 jsvc
80859 iseadmi+ 20 0 30.4g 9.3g 40816 S 83.9 10.0 13612:11 jsvc
80847 iseadmi+ 20 0 30.4g 9.3g 40816 S 83.6 10.0 13612:20 jsvc
80848 iseadmi+ 20 0 30.4g 9.3g 40816 S 83.6 10.0 13612:31 jsvc
80849 iseadmi+ 20 0 30.4g 9.3g 40816 S 83.6 10.0 13612:14 jsvc
80851 iseadmi+ 20 0 30.4g 9.3g 40816 S 83.6 10.0 13612:15 jsvc
80852 iseadmi+ 20 0 30.4g 9.3g 40816 S 83.6 10.0 13611:49 jsvc
80853 iseadmi+ 20 0 30.4g 9.3g 40816 S 83.6 10.0 13613:04 jsvc
80857 iseadmi+ 20 0 30.4g 9.3g 40816 S 83.6 10.0 13611:02 jsvc
80861 iseadmi+ 20 0 30.4g 9.3g 40816 S 83.6 10.0 13613:14 jsvc
80862 iseadmi+ 20 0 30.4g 9.3g 40816 S 83.6 10.0 13612:29 jsvc
80863 iseadmi+ 20 0 30.4g 9.3g 40816 S 83.6 10.0 13612:33 jsvc
80854 iseadmi+ 20 0 30.4g 9.3g 40816 S 83.2 10.0 13611:44 jsvc
top - 12:53:02 up 450 days, 16:03, 6 users, load average: 18.13, 16.74, 16.72
Threads: 1713 total, 18 running, 1695 sleeping, 0 stopped, 0 zombie
%Cpu(s): 67.5 us, 1.1 sy, 0.0 ni, 31.1 id, 0.0 wa, 0.0 hi, 0.3 si, 0.0 st
KiB Mem : 97436048 total, 13651640 free, 38298472 used, 45485936 buff/cache
KiB Swap: 8191996 total, 7797512 free, 394484 used. 42730576 avail Mem
PID USER PR NI VIRT RES SHR S %CPU %MEM TIME+ COMMAND
80850 iseadmi+ 20 0 30.4g 9.3g 41072 R 75.9 10.0 13612:30 jsvc
80846 iseadmi+ 20 0 30.4g 9.3g 41072 R 75.6 10.0 13612:56 jsvc
80847 iseadmi+ 20 0 30.4g 9.3g 41072 R 75.6 10.0 13612:22 jsvc
80848 iseadmi+ 20 0 30.4g 9.3g 41072 R 75.6 10.0 13612:33 jsvc
80849 iseadmi+ 20 0 30.4g 9.3g 41072 R 75.6 10.0 13612:17 jsvc
80851 iseadmi+ 20 0 30.4g 9.3g 41072 R 75.6 10.0 13612:17 jsvc
80852 iseadmi+ 20 0 30.4g 9.3g 41072 R 75.6 10.0 13611:52 jsvc
80855 iseadmi+ 20 0 30.4g 9.3g 41072 R 75.6 10.0 13612:16 jsvc
80859 iseadmi+ 20 0 30.4g 9.3g 41072 R 75.6 10.0 13612:13 jsvc
80860 iseadmi+ 20 0 30.4g 9.3g 41072 R 75.6 10.0 13611:56 jsvc
80861 iseadmi+ 20 0 30.4g 9.3g 41072 R 75.6 10.0 13613:17 jsvc
80862 iseadmi+ 20 0 30.4g 9.3g 41072 R 75.6 10.0 13612:32 jsvc
80863 iseadmi+ 20 0 30.4g 9.3g 41072 R 75.6 10.0 13612:35 jsvc
80853 iseadmi+ 20 0 30.4g 9.3g 41072 R 75.2 10.0 13613:06 jsvc
80854 iseadmi+ 20 0 30.4g 9.3g 41072 R 75.2 10.0 13611:46 jsvc
80856 iseadmi+ 20 0 30.4g 9.3g 41072 R 75.2 10.0 13611:36 jsvc
80857 iseadmi+ 20 0 30.4g 9.3g 41072 R 75.2 10.0 13611:04 jsvc
80858 iseadmi+ 20 0 30.4g 9.3g 41072 R 75.2 10.0 13612:50 jsvc
top - 12:53:05 up 450 days, 16:03, 6 users, load average: 18.20, 16.78, 16.74
Threads: 1713 total, 18 running, 1695 sleeping, 0 stopped, 0 zombie
%Cpu(s): 70.4 us, 0.6 sy, 0.0 ni, 28.8 id, 0.0 wa, 0.0 hi, 0.2 si, 0.0 st
KiB Mem : 97436048 total, 13647332 free, 38299860 used, 45488856 buff/cache
KiB Swap: 8191996 total, 7797512 free, 394484 used. 42729004 avail Mem
PID USER PR NI VIRT RES SHR S %CPU %MEM TIME+ COMMAND
80852 iseadmi+ 20 0 30.4g 9.3g 41072 R 84.8 10.0 13611:54 jsvc
80855 iseadmi+ 20 0 30.4g 9.3g 41072 R 84.8 10.0 13612:18 jsvc
80856 iseadmi+ 20 0 30.4g 9.3g 41072 R 84.8 10.0 13611:38 jsvc
80859 iseadmi+ 20 0 30.4g 9.3g 41072 R 84.8 10.0 13612:16 jsvc
80862 iseadmi+ 20 0 30.4g 9.3g 41072 R 84.8 10.0 13612:34 jsvc
80846 iseadmi+ 20 0 30.4g 9.3g 41072 R 84.5 10.0 13612:59 jsvc
80847 iseadmi+ 20 0 30.4g 9.3g 41072 R 84.5 10.0 13612:25 jsvc
80848 iseadmi+ 20 0 30.4g 9.3g 41072 R 84.5 10.0 13612:36 jsvc
80851 iseadmi+ 20 0 30.4g 9.3g 41072 R 84.5 10.0 13612:20 jsvc
80853 iseadmi+ 20 0 30.4g 9.3g 41072 R 84.5 10.0 13613:09 jsvc
80854 iseadmi+ 20 0 30.4g 9.3g 41072 R 84.5 10.0 13611:48 jsvc
80857 iseadmi+ 20 0 30.4g 9.3g 41072 R 84.5 10.0 13611:07 jsvc
80860 iseadmi+ 20 0 30.4g 9.3g 41072 R 84.5 10.0 13611:59 jsvc
80861 iseadmi+ 20 0 30.4g 9.3g 41072 R 84.5 10.0 13613:19 jsvc
80863 iseadmi+ 20 0 30.4g 9.3g 41072 R 84.5 10.0 13612:38 jsvc
80849 iseadmi+ 20 0 30.4g 9.3g 41072 R 84.2 10.0 13612:19 jsvc
top - 12:53:08 up 450 days, 16:03, 6 users, load average: 18.20, 16.78, 16.74
Threads: 1712 total, 18 running, 1694 sleeping, 0 stopped, 0 zombie
%Cpu(s): 66.5 us, 1.5 sy, 0.0 ni, 31.6 id, 0.1 wa, 0.0 hi, 0.4 si, 0.0 st
KiB Mem : 97436048 total, 13645540 free, 38302700 used, 45487808 buff/cache
KiB Swap: 8191996 total, 7797512 free, 394484 used. 42726808 avail Mem
From catalina.out we observed the following:
We see the that the following Garbage collector threads are consuming high CPU:
"main" #1 prio=5 os_prio=0 tid=0x0000000002313000 nid=0x13bc7 runnable [0x0000000000000000]
java.lang.Thread.State: RUNNABLE
"VM Thread" os_prio=0 tid=0x0000000002642000 nid=0x13be2 runnable
"GC task thread#0 (ParallelGC)" os_prio=0 tid=0x0000000002325800 nid=0x13bce runnable
"GC task thread#1 (ParallelGC)" os_prio=0 tid=0x0000000002327800 nid=0x13bcf runnable
"GC task thread#2 (ParallelGC)" os_prio=0 tid=0x0000000002329000 nid=0x13bd0 runnable
"GC task thread#3 (ParallelGC)" os_prio=0 tid=0x000000000232b000 nid=0x13bd1 runnable
"GC task thread#4 (ParallelGC)" os_prio=0 tid=0x000000000232d000 nid=0x13bd2 runnable
"GC task thread#5 (ParallelGC)" os_prio=0 tid=0x000000000232f000 nid=0x13bd3 runnable
"GC task thread#6 (ParallelGC)" os_prio=0 tid=0x0000000002330800 nid=0x13bd4 runnable
"GC task thread#7 (ParallelGC)" os_prio=0 tid=0x0000000002332800 nid=0x13bd5 runnable
"GC task thread#8 (ParallelGC)" os_prio=0 tid=0x0000000002334800 nid=0x13bd6 runnable
"GC task thread#9 (ParallelGC)" os_prio=0 tid=0x0000000002336000 nid=0x13bd7 runnable
"GC task thread#10 (ParallelGC)" os_prio=0 tid=0x0000000002338000 nid=0x13bd8 runnable
"GC task thread#11 (ParallelGC)" os_prio=0 tid=0x000000000233a000 nid=0x13bd9 runnable
"GC task thread#12 (ParallelGC)" os_prio=0 tid=0x000000000233b800 nid=0x13bda runnable
"GC task thread#13 (ParallelGC)" os_prio=0 tid=0x000000000233d800 nid=0x13bdb runnable
"GC task thread#14 (ParallelGC)" os_prio=0 tid=0x000000000233f800 nid=0x13bdc runnable
"GC task thread#15 (ParallelGC)" os_prio=0 tid=0x0000000002341000 nid=0x13bdd runnable
"GC task thread#16 (ParallelGC)" os_prio=0 tid=0x0000000002343000 nid=0x13bde runnable
"GC task thread#17 (ParallelGC)" os_prio=0 tid=0x0000000002345000 nid=0x13bdf runnable
"VM Periodic Task Thread" os_prio=0 tid=0x0000000002ac3800 nid=0x13cd6 waiting on condition
JNI global references: 3603
Heap
PSYoungGen total 79872K, used 288K [0x0000000635d80000, 0x000000063b280000, 0x00000007e0800000)
eden space 72704K, 0% used [0x0000000635d80000,0x0000000635dc8230,0x000000063a480000)
from space 7168K, 0% used [0x000000063ab80000,0x000000063ab80000,0x000000063b280000)
to space 7168K, 0% used [0x000000063a480000,0x000000063a480000,0x000000063ab80000)
ParOldGen total 2978304K, used 2963138K [0x00000002e0800000, 0x0000000396480000, 0x0000000635d80000)
object space 2978304K, 99% used [0x00000002e0800000,0x00000003955b0b70,0x0000000396480000)
Metaspace used 335348K, capacity 357063K, committed 358016K, reserved 1370112K
class space used 33786K, capacity 37225K, committed 37504K, reserved 1048576K
Garbage collector usage in RHEL: As long as an object is being referenced, the JVM considers it alive. Once an object is no longer referenced and therefore is not reachable by the application code, the garbage collector removes it and reclaims the unused memory. The reason GC is using more CPU cycles is that its aggressively reclaiming a huge amount of Objects which are not referenced anymore.
From the Catalina.out file we could see also the VCS threads being blocked:
"VCSPersistEventHandler-1-thread-1" #1920 prio=5 os_prio=0 tid=0x00007f42c5a27800 nid=0x185d7 waiting for monitor entry [0x00007f4224182000]
java.lang.Thread.State: BLOCKED (on object monitor)
at org.elasticsearch.action.bulk.BulkProcessor.internalAdd(BulkProcessor.java:287)
- waiting to lock <0x00000002ef9a1a28> (a org.elasticsearch.action.bulk.BulkProcessor)
at org.elasticsearch.action.bulk.BulkProcessor.add(BulkProcessor.java:272)
at org.elasticsearch.action.bulk.BulkProcessor.add(BulkProcessor.java:268)
at com.cisco.ise.vcs.crud.ESBulkProcessor.processRequest(ESBulkProcessor.java:122)
- locked <0x00000002ef51a570> (a com.cisco.ise.vcs.crud.ESBulkProcessor)
at com.cisco.ise.vcs.crud.VCSCrudProcessor.upsertBulkData(VCSCrudProcessor.java:98)
- locked <0x0000000308461c08> (a com.cisco.ise.vcs.crud.VCSCrudProcessor)
at com.cisco.ise.vcs.event.handler.VCSPersistEventHandler.updateContextRepository(VCSPersistEventHandler.java:147)
at com.cisco.ise.vcs.event.handler.VCSPersistEventHandler.handleEvent(VCSPersistEventHandler.java:113)
at com.cisco.ise.vcs.event.VCSEventHandler.run(VCSEventHandler.java:130)
at java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1149)
at java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:624)
at java.lang.Thread.run(Thread.java:748)
Because of the above observations we see that you are encountering the bug CSCwd45843<https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwd45843>;. There is a hotfix available for this bug:
https://software.cisco.com/download/home/283801620/type/283802505/release/HP-CSCwd45843
This is a generic HP and can be applied on any version and is available in CCO site, you could install it on all the nodes and monitor.
But we would suggests to install patch 6 first and then install this HP.
This bug is addressed in ISE 3.0 p7 which is yet to be released, until then you can install patch 6 first and then the HP over it.
Good day!
Thanks for the files you attached so far and I was able to come to a root cause of the issue.
Please find my analysis below:
From the tech top output we see a high CPU is consumed by the jsvc process:
hsdc-pan-nac01/admin# tech top
Invoking tech top.
Press Control-C to interrupt.
top - 12:34:09 up 450 days, 15:44, 2 users, load average: 15.65, 16.77, 17.33
Tasks: 628 total, 1 running, 627 sleeping, 0 stopped, 0 zombie
%Cpu(s): 80.9 us, 1.1 sy, 0.0 ni, 17.6 id, 0.0 wa, 0.0 hi, 0.4 si, 0.0 st
KiB Mem : 97436048 total, 13726596 free, 38382248 used, 45327204 buff/cache
KiB Swap: 8191996 total, 7797512 free, 394484 used.
42646812 avail Mem
PID USER PR NI VIRT RES SHR S %CPU %MEM TIME+ COMMAND
80839 iseadmi+ 20 0 30.4g 9.3g 40464 S 1794 10.0 296801:20 jsvc
60426 iseelas+ 20 0 18.0g 16.3g 472868 S 100.0 17.5 71810:49 java
115925 iserabb+ 20 0 2884300 1.0g 2692 S 52.9 1.1 2961:51 beam.smp
3896 root 20 0 164760 2688 1576 R 11.8 0.0 0:00.03 top
1 root 20 0 195436 6776 3108 S 0.0 0.0 402:34.45 systemd
2 root 20 0 0 0 0 S 0.0 0.0 3:30.34 kthreadd
4 root 0 -20 0 0 0 S 0.0 0.0 0:00.00 kworker/0+
6 root 20 0 0 0 0 S 0.0 0.0 106:27.39 ksoftirqd+
7 root rt 0 0 0 0 S 0.0 0.0 0:50.52 migration+
8 root 20 0 0 0 0 S 0.0 0.0 0:00.00 rcu_bh
9 root 20 0 0 0 0 S 0.0 0.0 1720:11 rcu_sched
10 root 0 -20 0 0 0 S 0.0 0.0 0:00.00 lru-add-d+
11 root rt 0 0 0 0 S 0.0 0.0 2:12.02 watchdog/0
12 root rt 0 0 0 0 S 0.0 0.0 2:15.41 watchdog/1
13 root rt 0 0 0 0 S 0.0 0.0 0:51.29 migration+
14 root 20 0 0 0 0 S 0.0 0.0 87:25.21 ksoftirqd+
On further checking the sub process ID we see the following PIDs are consuming the CPU threads: (Omitted some lined for brevity)
sh-4.2# top -H -p 80839
top - 12:52:56 up 450 days, 16:03, 6 users, load average: 17.88, 16.67, 16.70
Threads: 1707 total, 18 running, 1689 sleeping, 0 stopped, 0 zombie
%Cpu(s): 64.8 us, 1.6 sy, 0.0 ni, 33.3 id, 0.0 wa, 0.0 hi, 0.4 si, 0.0 st
KiB Mem : 97436048 total, 13678112 free, 38274636 used, 45483300 buff/cache
KiB Swap: 8191996 total, 7797512 free, 394484 used.
42754628 avail Mem
PID USER PR NI VIRT RES SHR S %CPU %MEM TIME+ COMMAND
80854 iseadmi+ 20 0 30.4g 9.3g 40816 R 72.2 10.0 13611:41 jsvc
80846 iseadmi+ 20 0 30.4g 9.3g 40816 R 66.7 10.0 13612:51 jsvc
80847 iseadmi+ 20 0 30.4g 9.3g 40816 R 66.7 10.0 13612:17 jsvc
80848 iseadmi+ 20 0 30.4g 9.3g 40816 R 66.7 10.0 13612:29 jsvc
80849 iseadmi+ 20 0 30.4g 9.3g 40816 R 66.7 10.0 13612:12 jsvc
80850 iseadmi+ 20 0 30.4g 9.3g 40816 R 66.7 10.0 13612:25 jsvc
80851 iseadmi+ 20 0 30.4g 9.3g 40816 R 66.7 10.0 13612:12 jsvc
80852 iseadmi+ 20 0 30.4g 9.3g 40816 R 66.7 10.0 13611:47 jsvc
80853 iseadmi+ 20 0 30.4g 9.3g 40816 R 66.7 10.0 13613:02 jsvc
80855 iseadmi+ 20 0 30.4g 9.3g 40816 R 66.7 10.0 13612:11 jsvc
80856 iseadmi+ 20 0 30.4g 9.3g 40816 R 66.7 10.0 13611:31 jsvc
80857 iseadmi+ 20 0 30.4g 9.3g 40816 R 66.7 10.0 13611:00 jsvc
80858 iseadmi+ 20 0 30.4g 9.3g 40816 R 66.7 10.0 13612:45 jsvc
top - 12:52:59 up 450 days, 16:03, 6 users, load average: 17.88, 16.67, 16.70
Threads: 1710 total, 1 running, 1709 sleeping, 0 stopped, 0 zombie
%Cpu(s): 69.7 us, 0.6 sy, 0.0 ni, 29.4 id, 0.0 wa, 0.0 hi, 0.2 si, 0.0 st
KiB Mem : 97436048 total, 13669704 free, 38280428 used, 45485916 buff/cache
KiB Swap: 8191996 total, 7797512 free, 394484 used.
42749708 avail Mem
PID USER PR NI VIRT RES SHR S %CPU %MEM TIME+ COMMAND
80846 iseadmi+ 20 0 30.4g 9.3g 40816 S 83.9 10.0 13612:54 jsvc
80856 iseadmi+ 20 0 30.4g 9.3g 40816 S 83.9 10.0 13611:33 jsvc
80859 iseadmi+ 20 0 30.4g 9.3g 40816 S 83.9 10.0 13612:11 jsvc
80847 iseadmi+ 20 0 30.4g 9.3g 40816 S 83.6 10.0 13612:20 jsvc
80848 iseadmi+ 20 0 30.4g 9.3g 40816 S 83.6 10.0 13612:31 jsvc
80849 iseadmi+ 20 0 30.4g 9.3g 40816 S 83.6 10.0 13612:14 jsvc
80851 iseadmi+ 20 0 30.4g 9.3g 40816 S 83.6 10.0 13612:15 jsvc
80852 iseadmi+ 20 0 30.4g 9.3g 40816 S 83.6 10.0 13611:49 jsvc
80853 iseadmi+ 20 0 30.4g 9.3g 40816 S 83.6 10.0 13613:04 jsvc
80857 iseadmi+ 20 0 30.4g 9.3g 40816 S 83.6 10.0 13611:02 jsvc
80861 iseadmi+ 20 0 30.4g 9.3g 40816 S 83.6 10.0 13613:14 jsvc
80862 iseadmi+ 20 0 30.4g 9.3g 40816 S 83.6 10.0 13612:29 jsvc
80863 iseadmi+ 20 0 30.4g 9.3g 40816 S 83.6 10.0 13612:33 jsvc
80854 iseadmi+ 20 0 30.4g 9.3g 40816 S 83.2 10.0 13611:44 jsvc
top - 12:53:02 up 450 days, 16:03, 6 users, load average: 18.13, 16.74, 16.72
Threads: 1713 total, 18 running, 1695 sleeping, 0 stopped, 0 zombie
%Cpu(s): 67.5 us, 1.1 sy, 0.0 ni, 31.1 id, 0.0 wa, 0.0 hi, 0.3 si, 0.0 st
KiB Mem : 97436048 total, 13651640 free, 38298472 used, 45485936 buff/cache
KiB Swap: 8191996 total, 7797512 free, 394484 used.
42730576 avail Mem
PID USER PR NI VIRT RES SHR S %CPU %MEM TIME+ COMMAND
80850 iseadmi+ 20 0 30.4g 9.3g 41072 R 75.9 10.0 13612:30 jsvc
80846 iseadmi+ 20 0 30.4g 9.3g 41072 R 75.6 10.0 13612:56 jsvc
80847 iseadmi+ 20 0 30.4g 9.3g 41072 R 75.6 10.0 13612:22 jsvc
80848 iseadmi+ 20 0 30.4g 9.3g 41072 R 75.6 10.0 13612:33 jsvc
80849 iseadmi+ 20 0 30.4g 9.3g 41072 R 75.6 10.0 13612:17 jsvc
80851 iseadmi+ 20 0 30.4g 9.3g 41072 R 75.6 10.0 13612:17 jsvc
80852 iseadmi+ 20 0 30.4g 9.3g 41072 R 75.6 10.0 13611:52 jsvc
80855 iseadmi+ 20 0 30.4g 9.3g 41072 R 75.6 10.0 13612:16 jsvc
80859 iseadmi+ 20 0 30.4g 9.3g 41072 R 75.6 10.0 13612:13 jsvc
80860 iseadmi+ 20 0 30.4g 9.3g 41072 R 75.6 10.0 13611:56 jsvc
80861 iseadmi+ 20 0 30.4g 9.3g 41072 R 75.6 10.0 13613:17 jsvc
80862 iseadmi+ 20 0 30.4g 9.3g 41072 R 75.6 10.0 13612:32 jsvc
80863 iseadmi+ 20 0 30.4g 9.3g 41072 R 75.6 10.0 13612:35 jsvc
80853 iseadmi+ 20 0 30.4g 9.3g 41072 R 75.2 10.0 13613:06 jsvc
80854 iseadmi+ 20 0 30.4g 9.3g 41072 R 75.2 10.0 13611:46 jsvc
80856 iseadmi+ 20 0 30.4g 9.3g 41072 R 75.2 10.0 13611:36 jsvc
80857 iseadmi+ 20 0 30.4g 9.3g 41072 R 75.2 10.0 13611:04 jsvc
80858 iseadmi+ 20 0 30.4g 9.3g 41072 R 75.2 10.0 13612:50 jsvc
top - 12:53:05 up 450 days, 16:03, 6 users, load average: 18.20, 16.78, 16.74
Threads: 1713 total, 18 running, 1695 sleeping, 0 stopped, 0 zombie
%Cpu(s): 70.4 us, 0.6 sy, 0.0 ni, 28.8 id, 0.0 wa, 0.0 hi, 0.2 si, 0.0 st
KiB Mem : 97436048 total, 13647332 free, 38299860 used, 45488856 buff/cache
KiB Swap: 8191996 total, 7797512 free, 394484 used.
42729004 avail Mem
PID USER PR NI VIRT RES SHR S %CPU %MEM TIME+ COMMAND
80852 iseadmi+ 20 0 30.4g 9.3g 41072 R 84.8 10.0 13611:54 jsvc
80855 iseadmi+ 20 0 30.4g 9.3g 41072 R 84.8 10.0 13612:18 jsvc
80856 iseadmi+ 20 0 30.4g 9.3g 41072 R 84.8 10.0 13611:38 jsvc
80859 iseadmi+ 20 0 30.4g 9.3g 41072 R 84.8 10.0 13612:16 jsvc
80862 iseadmi+ 20 0 30.4g 9.3g 41072 R 84.8 10.0 13612:34 jsvc
80846 iseadmi+ 20 0 30.4g 9.3g 41072 R 84.5 10.0 13612:59 jsvc
80847 iseadmi+ 20 0 30.4g 9.3g 41072 R 84.5 10.0 13612:25 jsvc
80848 iseadmi+ 20 0 30.4g 9.3g 41072 R 84.5 10.0 13612:36 jsvc
80851 iseadmi+ 20 0 30.4g 9.3g 41072 R 84.5 10.0 13612:20 jsvc
80853 iseadmi+ 20 0 30.4g 9.3g 41072 R 84.5 10.0 13613:09 jsvc
80854 iseadmi+ 20 0 30.4g 9.3g 41072 R 84.5 10.0 13611:48 jsvc
80857 iseadmi+ 20 0 30.4g 9.3g 41072 R 84.5 10.0 13611:07 jsvc
80860 iseadmi+ 20 0 30.4g 9.3g 41072 R 84.5 10.0 13611:59 jsvc
80861 iseadmi+ 20 0 30.4g 9.3g 41072 R 84.5 10.0 13613:19 jsvc
80863 iseadmi+ 20 0 30.4g 9.3g 41072 R 84.5 10.0 13612:38 jsvc
80849 iseadmi+ 20 0 30.4g 9.3g 41072 R 84.2 10.0 13612:19 jsvc
top - 12:53:08 up 450 days, 16:03, 6 users, load average: 18.20, 16.78, 16.74
Threads: 1712 total, 18 running, 1694 sleeping, 0 stopped, 0 zombie
%Cpu(s): 66.5 us, 1.5 sy, 0.0 ni, 31.6 id, 0.1 wa, 0.0 hi, 0.4 si, 0.0 st
KiB Mem : 97436048 total, 13645540 free, 38302700 used, 45487808 buff/cache
KiB Swap: 8191996 total, 7797512 free, 394484 used.
42726808 avail Mem
From catalina.out we observed the following:
We see the that the following Garbage collector threads are consuming high CPU:
"main" #1 prio=5 os_prio=0 tid=0x0000000002313000 nid=0x13bc7 runnable [0x0000000000000000]
java.lang.Thread.State: RUNNABLE
"VM Thread" os_prio=0 tid=0x0000000002642000 nid=0x13be2 runnable
"GC task thread#0 (ParallelGC)" os_prio=0 tid=0x0000000002325800 nid=0x13bce runnable
"GC task thread#1 (ParallelGC)" os_prio=0 tid=0x0000000002327800 nid=0x13bcf runnable
"GC task thread#2 (ParallelGC)" os_prio=0 tid=0x0000000002329000 nid=0x13bd0 runnable
"GC task thread#3 (ParallelGC)" os_prio=0 tid=0x000000000232b000 nid=0x13bd1 runnable
"GC task thread#4 (ParallelGC)" os_prio=0 tid=0x000000000232d000 nid=0x13bd2 runnable
"GC task thread#5 (ParallelGC)" os_prio=0 tid=0x000000000232f000 nid=0x13bd3 runnable
"GC task thread#6 (ParallelGC)" os_prio=0 tid=0x0000000002330800 nid=0x13bd4 runnable
"GC task thread#7 (ParallelGC)" os_prio=0 tid=0x0000000002332800 nid=0x13bd5 runnable
"GC task thread#8 (ParallelGC)" os_prio=0 tid=0x0000000002334800 nid=0x13bd6 runnable
"GC task thread#9 (ParallelGC)" os_prio=0 tid=0x0000000002336000 nid=0x13bd7 runnable
"GC task thread#10 (ParallelGC)" os_prio=0 tid=0x0000000002338000 nid=0x13bd8 runnable
"GC task thread#11 (ParallelGC)" os_prio=0 tid=0x000000000233a000 nid=0x13bd9 runnable
"GC task thread#12 (ParallelGC)" os_prio=0 tid=0x000000000233b800 nid=0x13bda runnable
"GC task thread#13 (ParallelGC)" os_prio=0 tid=0x000000000233d800 nid=0x13bdb runnable
"GC task thread#14 (ParallelGC)" os_prio=0 tid=0x000000000233f800 nid=0x13bdc runnable
"GC task thread#15 (ParallelGC)" os_prio=0 tid=0x0000000002341000 nid=0x13bdd runnable
"GC task thread#16 (ParallelGC)" os_prio=0 tid=0x0000000002343000 nid=0x13bde runnable
"GC task thread#17 (ParallelGC)" os_prio=0 tid=0x0000000002345000 nid=0x13bdf runnable
"VM Periodic Task Thread" os_prio=0 tid=0x0000000002ac3800 nid=0x13cd6 waiting on condition
JNI global references: 3603
Heap
PSYoungGen total 79872K, used 288K [0x0000000635d80000, 0x000000063b280000, 0x00000007e0800000)
eden space 72704K, 0% used [0x0000000635d80000,0x0000000635dc8230,0x000000063a480000)
from space 7168K, 0% used [0x000000063ab80000,0x000000063ab80000,0x000000063b280000)
to space 7168K, 0% used [0x000000063a480000,0x000000063a480000,0x000000063ab80000)
ParOldGen total 2978304K, used 2963138K [0x00000002e0800000, 0x0000000396480000, 0x0000000635d80000)
object space 2978304K, 99% used [0x00000002e0800000,0x00000003955b0b70,0x0000000396480000)
Metaspace used 335348K, capacity 357063K, committed 358016K, reserved 1370112K
class space used 33786K, capacity 37225K, committed 37504K, reserved 1048576K
Garbage collector usage in RHEL: As long as an object is being referenced, the JVM considers it alive.
Once an object is no longer referenced and therefore is not reachable by the application code, the garbage collector removes it and reclaims the unused memory.
The reason GC is using more CPU cycles is that its aggressively reclaiming a huge amount of Objects which are not referenced anymore.
From the Catalina.out file we could see also the VCS threads being blocked:
"VCSPersistEventHandler-1-thread-1" #1920 prio=5 os_prio=0 tid=0x00007f42c5a27800 nid=0x185d7 waiting for monitor entry [0x00007f4224182000]
java.lang.Thread.State: BLOCKED (on object monitor)
at org.elasticsearch.action.bulk.BulkProcessor.internalAdd(BulkProcessor.java:287)
- waiting to lock <0x00000002ef9a1a28> (a org.elasticsearch.action.bulk.BulkProcessor)
at org.elasticsearch.action.bulk.BulkProcessor.add(BulkProcessor.java:272)
at org.elasticsearch.action.bulk.BulkProcessor.add(BulkProcessor.java:268)
at com.cisco.ise.vcs.crud.ESBulkProcessor.processRequest(ESBulkProcessor.java:122)
- locked <0x00000002ef51a570> (a com.cisco.ise.vcs.crud.ESBulkProcessor)
at com.cisco.ise.vcs.crud.VCSCrudProcessor.upsertBulkData(VCSCrudProcessor.java:98)
- locked <0x0000000308461c08> (a com.cisco.ise.vcs.crud.VCSCrudProcessor)
at com.cisco.ise.vcs.event.handler.VCSPersistEventHandler.updateContextRepository(VCSPersistEventHandler.java:147)
at com.cisco.ise.vcs.event.handler.VCSPersistEventHandler.handleEvent(VCSPersistEventHandler.java:113)
at com.cisco.ise.vcs.event.VCSEventHandler.run(VCSEventHandler.java:130)
at java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1149)
at java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:624)
at java.lang.Thread.run(Thread.java:748)
Because of the above observations we see that you are encountering the bug CSCwd45843<https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwd45843>.
There is a hotfix available for this bug:
https://software.cisco.com/download/home/283801620/type/283802505/release/HP-CSCwd45843
This is a generic HP and can be applied on any version and is available in CCO site, you could install it on all the nodes and monitor.
But we would suggests to install patch 6 first and then install this HP.
This bug is addressed in ISE 3.0 p7 which is yet to be released, until then you can install patch 6 first and then the HP over it.
Do let me know if you have any further queries or concerns.
Technology: Identity Services Engine (ISE) - 3.0
Subtechnology: ISE Performance (High CPU / Memory / IO / GUI Slowness)
Problem Code: Error Messages, Logs, Debugs
Product: NA
Product Family: CISE
Software Version: N/A
Router/Node Name: N/A
Problem Details: ISE - High Load Average for ISE PAN node
ISE - High Load Average for ISE PAN node
timestamp : 2023-02-27T01:52:17.000+0000 || updatedby : rupespat || type : RESOLUTION SUMMARY || visibility : External || details : observations we see that CU is encountering the bug CSCwd45843<https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwd45843>;. There is a hotfix available for this bug:
https://software.cisco.com/download/home/283801620/type/283802505/release/HP-CSCwd45843
This is a generic HP and can be applied on any version and is available in CCO site, you could install it on all the nodes and monitor.
But we would suggests to install patch 6 first and then install this HP.
This bug is addressed in ISE 3.0 p7 which is yet to be released, until then you can install patch 6 first and then the HP over it.
======
No response from CU since 9th February 23, closing the case after 3 strike and manager followup | Technology: Identity Services Engine (ISE) - 3.0
Subtechnology: ISE Performance (High CPU / Memory / IO / GUI Slowness)
Problem Code: Error Messages, Logs, Debugs
Product: NA
Product Family: CISE
Software Version: N/A
Router/Node Name: N/A
Problem Details: ISE - High Load Average for ISE PAN node | ISE - High Load Average for ISE PAN node | timestamp : 2023-02-27T01:52:17.000+0000 || updatedby : rupespat || type : RESOLUTION SUMMARY || visibility : External || details : observations we see that CU is encountering the bug CSCwd45843<https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwd45843>;. There is a hotfix available for this bug:
https://software.cisco.com/download/home/283801620/type/283802505/release/HP-CSCwd45843
This is a generic HP and can be applied on any version and is available in CCO site, you could install it on all the nodes and monitor.
But we would suggests to install patch 6 first and then install this HP.
This bug is addressed in ISE 3.0 p7 which is yet to be released, until then you can install patch 6 first and then the HP over it.
======
No response from CU since 9th February 23, closing the case after 3 strike and manager followup | nan | SNS-3655-K9 | ise-3.0.0.458.SPA.x86_64.iso | nan | nan | 3 | nan | Configuration Assistance (process not intuitive, too complex, inconsistent...) | CISE | Identity Services Engine (ISE) - 3.0 | ISE Performance (High CPU / Memory / IO / GUI Slowness) | nan | nan | nan | nan | nan | nan |
694068972 | Question: Which software version is principally discussed in these documents?
Answer "NONE" if you cannot find answer in the given documents.
The ONLY software version should be selected from the given software version list: 9.16.2.3/ 9.14.2.4/ 9.14.2.4/ 9.14.1 Response in this JSON format:
{"software_version": "","explanation": "", "summary": ""}
Technology: Security - Network Firewalls and Intrusion Prevention Systems
Subtechnology: Adaptive Security Appliance (ASA) non-VPN problem
Problem Code: Error Messages, Logs, Debugs
Product: NA
Product Family: FPRUHI
Software Version: N/A
Router/Node Name: N/A
Problem Details: FPR9K-SM-36 Network traffic issue
FPR9K-SM-36 Network traffic issue
timestamp : 2022-12-06T16:39:12.000+0000 || updatedby : dhanukri || type : RESOLUTION SUMMARY || visibility : External || details : Closing the case as there is no response from customer | Question: Which product is principally discussed in these documents?
Answer "NONE" if you cannot find answer in the given documents.
The ONLY product name should be selected from the given product name list: FPR9K-SM-36/ FPR-C9300-AC/ FPR1150-ASA-K9 Response in this JSON format:
{"product_name": "","explanation": "", "summary": ""}
Technology: Security - Network Firewalls and Intrusion Prevention Systems
Subtechnology: Adaptive Security Appliance (ASA) non-VPN problem
Problem Code: Error Messages, Logs, Debugs
Product: NA
Product Family: FPRUHI
Software Version: N/A
Router/Node Name: N/A
Problem Details: FPR9K-SM-36 Network traffic issue
FPR9K-SM-36 Network traffic issue
timestamp : 2022-12-06T16:39:12.000+0000 || updatedby : dhanukri || type : RESOLUTION SUMMARY || visibility : External || details : Closing the case as there is no response from customer | Technology: Security - Network Firewalls and Intrusion Prevention Systems
Subtechnology: Adaptive Security Appliance (ASA) non-VPN problem
Problem Code: Error Messages, Logs, Debugs
Product: NA
Product Family: FPRUHI
Software Version: N/A
Router/Node Name: N/A
Problem Details: FPR9K-SM-36 Network traffic issue | FPR9K-SM-36 Network traffic issue | timestamp : 2022-12-06T16:39:12.000+0000 || updatedby : dhanukri || type : RESOLUTION SUMMARY || visibility : External || details : Closing the case as there is no response from customer | nan | FPR9K-SM-36 | cisco-asa.9.14.2.4.SPA.csp | nan | nan | 3 | nan | Configuration Assistance (process not intuitive, too complex, inconsistent...) | FPRUHI | Adaptive Security Appliance | ASA Firepower Devices - Non-VPN | nan | nan | nan | nan | nan | nan |
694571397 | Question: Which software version is principally discussed in these documents?
Answer "NONE" if you cannot find answer in the given documents.
The ONLY software version should be selected from the given software version list: 17.03.04a/ 17.3.5/ 2.2.2.8 Response in this JSON format:
{"software_version": "","explanation": "", "summary": ""}
Technology: Cisco DNA Center - On-Prem
Subtechnology: Cisco DNA Center - LAN Automation (SDA)
Problem Code: Error Messages, Logs, Debugs
Product: NA
Product Family: ASR1000
Software Version: N/A
Router/Node Name: N/A
Problem Details: Hi,
we have observer this issue before and last time after change the SFP the issue was resolved. Please check the SR 693710312 & 694133288. however this time we have change the SFP and Fiber cable as well still the CRC is coming.
I am attaching the logs on testing time.
Device info:
ASR1009-X
Cisco IOS XE Software, Version 17.03.04a
Note: now we administrator shut the port.
Thanks,
Emrose
Technology: Cisco DNA Center - On-Prem
Subtechnology: Cisco DNA Center - LAN Automation (SDA)
Problem Code: Error Messages, Logs, Debugs
Product: NA
Product Family: ASR1000
Software Version: N/A
Router/Node Name: N/A
Problem Details: Hi,
we have observer this issue before and last time after change the SFP the issue was resolved. Please check the SR 693710312 & 694133288. however this time we have change the SFP and Fiber cable as well still the CRC is coming.
I am attaching the logs on testing time.
Device info:
ASR1009-X
Cisco IOS XE Software, Version 17.03.04a
Note: now we administrator shut the port.
Thanks,
Emrose
Hi,
we have observer this issue before and last time after change the SFP the issue was resolved. Please check the SR 693710312 & 694133288. however this time we have change the SFP and Fiber cable as well still the CRC is coming.
I am attaching the logs on testing time.
Device info:
ASR1009-X
Cisco IOS XE Software, Version 17.03.04a
Note: now we administrator shut the port.
Thanks,
Emrose
timestamp : 2022-12-30T13:30:48.000+0000 || updatedby : agarroab || type : RESOLUTION SUMMARY || visibility : External || details : There are CRC errors in line interface card
After the card was replaced, there are no more CRC errors.
Faulty card returned successfully. | Question: Which product is principally discussed in these documents?
Answer "NONE" if you cannot find answer in the given documents.
The ONLY product name should be selected from the given product name list: ASR1009-X Response in this JSON format:
{"product_name": "","explanation": "", "summary": ""}
Technology: Cisco DNA Center - On-Prem
Subtechnology: Cisco DNA Center - LAN Automation (SDA)
Problem Code: Error Messages, Logs, Debugs
Product: NA
Product Family: ASR1000
Software Version: N/A
Router/Node Name: N/A
Problem Details: Hi,
we have observer this issue before and last time after change the SFP the issue was resolved. Please check the SR 693710312 & 694133288. however this time we have change the SFP and Fiber cable as well still the CRC is coming.
I am attaching the logs on testing time.
Device info:
ASR1009-X
Cisco IOS XE Software, Version 17.03.04a
Note: now we administrator shut the port.
Thanks,
Emrose
Hi,
we have observer this issue before and last time after change the SFP the issue was resolved. Please check the SR 693710312 & 694133288. however this time we have change the SFP and Fiber cable as well still the CRC is coming.
I am attaching the logs on testing time.
Device info:
ASR1009-X
Cisco IOS XE Software, Version 17.03.04a
Note: now we administrator shut the port.
Thanks,
Emrose
timestamp : 2022-12-30T13:30:48.000+0000 || updatedby : agarroab || type : RESOLUTION SUMMARY || visibility : External || details : There are CRC errors in line interface card
After the card was replaced, there are no more CRC errors.
Faulty card returned successfully. | Technology: Cisco DNA Center - On-Prem
Subtechnology: Cisco DNA Center - LAN Automation (SDA)
Problem Code: Error Messages, Logs, Debugs
Product: NA
Product Family: ASR1000
Software Version: N/A
Router/Node Name: N/A
Problem Details: Hi,
we have observer this issue before and last time after change the SFP the issue was resolved. Please check the SR 693710312 & 694133288. however this time we have change the SFP and Fiber cable as well still the CRC is coming.
I am attaching the logs on testing time.
Device info:
ASR1009-X
Cisco IOS XE Software, Version 17.03.04a
Note: now we administrator shut the port.
Thanks,
Emrose | Hi,
we have observer this issue before and last time after change the SFP the issue was resolved. Please check the SR 693710312 & 694133288. however this time we have change the SFP and Fiber cable as well still the CRC is coming.
I am attaching the logs on testing time.
Device info:
ASR1009-X
Cisco IOS XE Software, Version 17.03.04a
Note: now we administrator shut the port.
Thanks,
Emrose | timestamp : 2022-12-30T13:30:48.000+0000 || updatedby : agarroab || type : RESOLUTION SUMMARY || visibility : External || details : There are CRC errors in line interface card
After the card was replaced, there are no more CRC errors.
Faulty card returned successfully. | nan | ASR1009-X | asr1000rpx86-universalk9.17.03.04a.SPA.bin | nan | nan | 3 | nan | Hardware Failure | ASR1000 | Cisco DNA Center - On-Prem | Cisco DNA Center - LAN Automation (SDA) | nan | nan | nan | nan | nan | nan |
694925542 | Question: Which software version is principally discussed in these documents?
Answer "NONE" if you cannot find answer in the given documents.
The ONLY software version should be selected from the given software version list: NA - COMPONENT ONLY/ 16.12.3s/ 2.3.3.3/ 17.6.4/ 16.12.4/ 2.2.2.5/ 1.3.3.6/ 16.12.03s/ 16.12.01s/ 16.12.04/ 16.12.1s/ 2.2.3.3/ THIRD_PARTY_PRODUCT_SW/ 16.12.1s/ 1.3.3.7/ 1.3.3.9/ 2.3.3.7/ 2.1.2.7/ 2.2.3.6/ 17.06.02 Response in this JSON format:
{"software_version": "","explanation": "", "summary": ""}
Software Version: -- => 16.12.1s
Technology: LAN Switching
Subtechnology: Cat3850 - Switching Issues
Problem Code: Error Messages, Logs, Debugs
Product: NA
Product Family: C9300
Software Version: N/A
Router/Node Name: N/A
Problem Details: C9300 SDA FE - %FED_L3_ERRMSG-3-RSRC_ERR: Switch 4 R0/0: fed: Failed to allocate hardware resource for adj entry - rc:1
Jan 19 2023 09:06:16.547 SGT: %FED_L3_ERRMSG-3-RSRC_ERR: Switch 1 R0/0: fed: Failed to allocate hardware resource for adj entry - rc:1
Jan 19 2023 09:06:16.548 SGT: %FMFP-3-OBJ_DWNLD_TO_DP_FAILED: Switch 1 R0/0: fman_fp_image: adj 0x125c5, Flags Midchain download to DP failed
Jan 19 2023 09:06:16.537 SGT: %FED_L3_ERRMSG-3-RSRC_ERR: Switch 7 R0/0: fed: Failed to allocate hardware resource for adj entry - rc:1
Jan 19 2023 09:06:16.537 SGT: %FMFP-3-OBJ_DWNLD_TO_DP_FAILED: Switch 7 R0/0: fman_fp_image: adj 0x125c5, Flags Midchain download to DP failed
Jan 19 2023 09:06:16.508 SGT: %FED_L3_ERRMSG-3-RSRC_ERR: Switch 6 R0/0: fed: Failed to allocate hardware resource for adj entry - rc:1
Jan 19 2023 09:06:16.509 SGT: %FMFP-3-OBJ_DWNLD_TO_DP_FAILED: Switch 6 R0/0: fman_fp_image: adj 0x125c5, Flags Midchain download to DP failed
Jan 19 2023 09:06:16.505 SGT: %FED_L3_ERRMSG-3-RSRC_ERR: Switch 4 R0/0: fed: Failed to allocate hardware resource for adj entry - rc:1
Jan 19 2023 09:06:16.506 SGT: %FMFP-3-OBJ_DWNLD_TO_DP_FAILED: Switch 4 R0/0: fman_fp_image: adj 0x125c5, Flags Midchain download to DP failed
Jan 19 2023 09:06:16.544 SGT: %FED_L3_ERRMSG-3-RSRC_ERR: Switch 3 R0/0: fed: Failed to allocate hardware resource for adj entry - rc:1
Jan 19 2023 09:06:16.544 SGT: %FMFP-3-OBJ_DWNLD_TO_DP_FAILED: Switch 3 R0/0: fman_fp_image: adj 0x125c5, Flags Midchain download to DP failed
Jan 19 2023 09:06:16.547 SGT: %FED_L3_ERRMSG-3-RSRC_ERR: Switch 2 R0/0: fed: Failed to allocate hardware resource for adj entry - rc:1
Jan 19 2023 09:06:16.548 SGT: %FMFP-3-OBJ_DWNLD_TO_DP_FAILED: Switch 2 R0/0: fman_fp_image: adj 0x125c5, Flags Midchain download to DP failed
Jan 19 2023 09:06:16.510 SGT: %FED_L3_ERRMSG-3-RSRC_ERR: Switch 5 R0/0: fed: Failed to allocate hardware resource for adj entry - rc:1
Jan 19 2023 09:06:16.510 SGT: %FMFP-3-OBJ_DWNLD_TO_DP_FAILED: Switch 5 R0/0: fman_fp_image: adj 0x125c5, Flags Midchain download to DP failed
Jan 19 2023 09:06:16.522 SGT: %FED_L3_ERRMSG-3-RSRC_ERR: Switch 8 R0/0: fed: Failed to allocate hardware resource for adj entry - rc:1
Jan 19 2023 09:06:16.523 SGT: %FMFP-3-OBJ_DWNLD_TO_DP_FAILED: Switch 8 R0/0: fman_fp_image: adj 0x125c5, Flags Midchain download to DP failed
C9300 SDA FE - %FED_L3_ERRMSG-3-RSRC_ERR: Switch 4 R0/0: fed: Failed to allocate hardware resource for adj entry - rc:1
Jan 19 2023 09:06:16.547 SGT: %FED_L3_ERRMSG-3-RSRC_ERR: Switch 1 R0/0: fed: Failed to allocate hardware resource for adj entry - rc:1
Jan 19 2023 09:06:16.548 SGT: %FMFP-3-OBJ_DWNLD_TO_DP_FAILED: Switch 1 R0/0: fman_fp_image: adj 0x125c5, Flags Midchain download to DP failed
Jan 19 2023 09:06:16.537 SGT: %FED_L3_ERRMSG-3-RSRC_ERR: Switch 7 R0/0: fed: Failed to allocate hardware resource for adj entry - rc:1
Jan 19 2023 09:06:16.537 SGT: %FMFP-3-OBJ_DWNLD_TO_DP_FAILED: Switch 7 R0/0: fman_fp_image: adj 0x125c5, Flags Midchain download to DP failed
Jan 19 2023 09:06:16.508 SGT: %FED_L3_ERRMSG-3-RSRC_ERR: Switch 6 R0/0: fed: Failed to allocate hardware resource for adj entry - rc:1
Jan 19 2023 09:06:16.509 SGT: %FMFP-3-OBJ_DWNLD_TO_DP_FAILED: Switch 6 R0/0: fman_fp_image: adj 0x125c5, Flags Midchain download to DP failed
Jan 19 2023 09:06:16.505 SGT: %FED_L3_ERRMSG-3-RSRC_ERR: Switch 4 R0/0: fed: Failed to allocate hardware resource for adj entry - rc:1
Jan 19 2023 09:06:16.506 SGT: %FMFP-3-OBJ_DWNLD_TO_DP_FAILED: Switch 4 R0/0: fman_fp_image: adj 0x125c5, Flags Midchain download to DP failed
Jan 19 2023 09:06:16.544 SGT: %FED_L3_ERRMSG-3-RSRC_ERR: Switch 3 R0/0: fed: Failed to allocate hardware resource for adj entry - rc:1
Jan 19 2023 09:06:16.544 SGT: %FMFP-3-OBJ_DWNLD_TO_DP_FAILED: Switch 3 R0/0: fman_fp_image: adj 0x125c5, Flags Midchain download to DP failed
Jan 19 2023 09:06:16.547 SGT: %FED_L3_ERRMSG-3-RSRC_ERR: Switch 2 R0/0: fed: Failed to allocate hardware resource for adj entry - rc:1
Jan 19 2023 09:06:16.548 SGT: %FMFP-3-OBJ_DWNLD_TO_DP_FAILED: Switch 2 R0/0: fman_fp_image: adj 0x125c5, Flags Midchain download to DP failed
Jan 19 2023 09:06:16.510 SGT: %FED_L3_ERRMSG-3-RSRC_ERR: Switch 5 R0/0: fed: Failed to allocate hardware resource for adj entry - rc:1
Jan 19 2023 09:06:16.510 SGT: %FMFP-3-OBJ_DWNLD_TO_DP_FAILED: Switch 5 R0/0: fman_fp_image: adj 0x125c5, Flags Midchain download to DP failed
Jan 19 2023 09:06:16.522 SGT: %FED_L3_ERRMSG-3-RSRC_ERR: Switch 8 R0/0: fed: Failed to allocate hardware resource for adj entry - rc:1
Jan 19 2023 09:06:16.523 SGT: %FMFP-3-OBJ_DWNLD_TO_DP_FAILED: Switch 8 R0/0: fman_fp_image: adj 0x125c5, Flags Midchain download to DP failed
timestamp : 2023-02-14T13:36:10.000+0000 || updatedby : jasterry || type : RESOLUTION SUMMARY || visibility : External || details : Customer stopped responding. Believe that there is an issue with Arp traffic being programmed correctly. closed with 3 strike | Question: Which product is principally discussed in these documents?
Answer "NONE" if you cannot find answer in the given documents.
The ONLY product name should be selected from the given product name list: DN2-HW-APL-XL/ ASR1009-X/ C9300-48U/ DN1-HW-APL/ C9500-48Y4C/ THIRD_PARTY_PRODUCT_HW/ C9300-48U-A/ ASR1002-HX Response in this JSON format:
{"product_name": "","explanation": "", "summary": ""}
Technology: LAN Switching
Subtechnology: Cat3850 - Switching Issues
Problem Code: Error Messages, Logs, Debugs
Product: NA
Product Family: C9300
Software Version: N/A
Router/Node Name: N/A
Problem Details: C9300 SDA FE - %FED_L3_ERRMSG-3-RSRC_ERR: Switch 4 R0/0: fed: Failed to allocate hardware resource for adj entry - rc:1
Jan 19 2023 09:06:16.547 SGT: %FED_L3_ERRMSG-3-RSRC_ERR: Switch 1 R0/0: fed: Failed to allocate hardware resource for adj entry - rc:1
Jan 19 2023 09:06:16.548 SGT: %FMFP-3-OBJ_DWNLD_TO_DP_FAILED: Switch 1 R0/0: fman_fp_image: adj 0x125c5, Flags Midchain download to DP failed
Jan 19 2023 09:06:16.537 SGT: %FED_L3_ERRMSG-3-RSRC_ERR: Switch 7 R0/0: fed: Failed to allocate hardware resource for adj entry - rc:1
Jan 19 2023 09:06:16.537 SGT: %FMFP-3-OBJ_DWNLD_TO_DP_FAILED: Switch 7 R0/0: fman_fp_image: adj 0x125c5, Flags Midchain download to DP failed
Jan 19 2023 09:06:16.508 SGT: %FED_L3_ERRMSG-3-RSRC_ERR: Switch 6 R0/0: fed: Failed to allocate hardware resource for adj entry - rc:1
Jan 19 2023 09:06:16.509 SGT: %FMFP-3-OBJ_DWNLD_TO_DP_FAILED: Switch 6 R0/0: fman_fp_image: adj 0x125c5, Flags Midchain download to DP failed
Jan 19 2023 09:06:16.505 SGT: %FED_L3_ERRMSG-3-RSRC_ERR: Switch 4 R0/0: fed: Failed to allocate hardware resource for adj entry - rc:1
Jan 19 2023 09:06:16.506 SGT: %FMFP-3-OBJ_DWNLD_TO_DP_FAILED: Switch 4 R0/0: fman_fp_image: adj 0x125c5, Flags Midchain download to DP failed
Jan 19 2023 09:06:16.544 SGT: %FED_L3_ERRMSG-3-RSRC_ERR: Switch 3 R0/0: fed: Failed to allocate hardware resource for adj entry - rc:1
Jan 19 2023 09:06:16.544 SGT: %FMFP-3-OBJ_DWNLD_TO_DP_FAILED: Switch 3 R0/0: fman_fp_image: adj 0x125c5, Flags Midchain download to DP failed
Jan 19 2023 09:06:16.547 SGT: %FED_L3_ERRMSG-3-RSRC_ERR: Switch 2 R0/0: fed: Failed to allocate hardware resource for adj entry - rc:1
Jan 19 2023 09:06:16.548 SGT: %FMFP-3-OBJ_DWNLD_TO_DP_FAILED: Switch 2 R0/0: fman_fp_image: adj 0x125c5, Flags Midchain download to DP failed
Jan 19 2023 09:06:16.510 SGT: %FED_L3_ERRMSG-3-RSRC_ERR: Switch 5 R0/0: fed: Failed to allocate hardware resource for adj entry - rc:1
Jan 19 2023 09:06:16.510 SGT: %FMFP-3-OBJ_DWNLD_TO_DP_FAILED: Switch 5 R0/0: fman_fp_image: adj 0x125c5, Flags Midchain download to DP failed
Jan 19 2023 09:06:16.522 SGT: %FED_L3_ERRMSG-3-RSRC_ERR: Switch 8 R0/0: fed: Failed to allocate hardware resource for adj entry - rc:1
Jan 19 2023 09:06:16.523 SGT: %FMFP-3-OBJ_DWNLD_TO_DP_FAILED: Switch 8 R0/0: fman_fp_image: adj 0x125c5, Flags Midchain download to DP failed
C9300 SDA FE - %FED_L3_ERRMSG-3-RSRC_ERR: Switch 4 R0/0: fed: Failed to allocate hardware resource for adj entry - rc:1
Jan 19 2023 09:06:16.547 SGT: %FED_L3_ERRMSG-3-RSRC_ERR: Switch 1 R0/0: fed: Failed to allocate hardware resource for adj entry - rc:1
Jan 19 2023 09:06:16.548 SGT: %FMFP-3-OBJ_DWNLD_TO_DP_FAILED: Switch 1 R0/0: fman_fp_image: adj 0x125c5, Flags Midchain download to DP failed
Jan 19 2023 09:06:16.537 SGT: %FED_L3_ERRMSG-3-RSRC_ERR: Switch 7 R0/0: fed: Failed to allocate hardware resource for adj entry - rc:1
Jan 19 2023 09:06:16.537 SGT: %FMFP-3-OBJ_DWNLD_TO_DP_FAILED: Switch 7 R0/0: fman_fp_image: adj 0x125c5, Flags Midchain download to DP failed
Jan 19 2023 09:06:16.508 SGT: %FED_L3_ERRMSG-3-RSRC_ERR: Switch 6 R0/0: fed: Failed to allocate hardware resource for adj entry - rc:1
Jan 19 2023 09:06:16.509 SGT: %FMFP-3-OBJ_DWNLD_TO_DP_FAILED: Switch 6 R0/0: fman_fp_image: adj 0x125c5, Flags Midchain download to DP failed
Jan 19 2023 09:06:16.505 SGT: %FED_L3_ERRMSG-3-RSRC_ERR: Switch 4 R0/0: fed: Failed to allocate hardware resource for adj entry - rc:1
Jan 19 2023 09:06:16.506 SGT: %FMFP-3-OBJ_DWNLD_TO_DP_FAILED: Switch 4 R0/0: fman_fp_image: adj 0x125c5, Flags Midchain download to DP failed
Jan 19 2023 09:06:16.544 SGT: %FED_L3_ERRMSG-3-RSRC_ERR: Switch 3 R0/0: fed: Failed to allocate hardware resource for adj entry - rc:1
Jan 19 2023 09:06:16.544 SGT: %FMFP-3-OBJ_DWNLD_TO_DP_FAILED: Switch 3 R0/0: fman_fp_image: adj 0x125c5, Flags Midchain download to DP failed
Jan 19 2023 09:06:16.547 SGT: %FED_L3_ERRMSG-3-RSRC_ERR: Switch 2 R0/0: fed: Failed to allocate hardware resource for adj entry - rc:1
Jan 19 2023 09:06:16.548 SGT: %FMFP-3-OBJ_DWNLD_TO_DP_FAILED: Switch 2 R0/0: fman_fp_image: adj 0x125c5, Flags Midchain download to DP failed
Jan 19 2023 09:06:16.510 SGT: %FED_L3_ERRMSG-3-RSRC_ERR: Switch 5 R0/0: fed: Failed to allocate hardware resource for adj entry - rc:1
Jan 19 2023 09:06:16.510 SGT: %FMFP-3-OBJ_DWNLD_TO_DP_FAILED: Switch 5 R0/0: fman_fp_image: adj 0x125c5, Flags Midchain download to DP failed
Jan 19 2023 09:06:16.522 SGT: %FED_L3_ERRMSG-3-RSRC_ERR: Switch 8 R0/0: fed: Failed to allocate hardware resource for adj entry - rc:1
Jan 19 2023 09:06:16.523 SGT: %FMFP-3-OBJ_DWNLD_TO_DP_FAILED: Switch 8 R0/0: fman_fp_image: adj 0x125c5, Flags Midchain download to DP failed
timestamp : 2023-02-14T13:36:10.000+0000 || updatedby : jasterry || type : RESOLUTION SUMMARY || visibility : External || details : Customer stopped responding. Believe that there is an issue with Arp traffic being programmed correctly. closed with 3 strike | Technology: LAN Switching
Subtechnology: Cat3850 - Switching Issues
Problem Code: Error Messages, Logs, Debugs
Product: NA
Product Family: C9300
Software Version: N/A
Router/Node Name: N/A
Problem Details: C9300 SDA FE - %FED_L3_ERRMSG-3-RSRC_ERR: Switch 4 R0/0: fed: Failed to allocate hardware resource for adj entry - rc:1
Jan 19 2023 09:06:16.547 SGT: %FED_L3_ERRMSG-3-RSRC_ERR: Switch 1 R0/0: fed: Failed to allocate hardware resource for adj entry - rc:1
Jan 19 2023 09:06:16.548 SGT: %FMFP-3-OBJ_DWNLD_TO_DP_FAILED: Switch 1 R0/0: fman_fp_image: adj 0x125c5, Flags Midchain download to DP failed
Jan 19 2023 09:06:16.537 SGT: %FED_L3_ERRMSG-3-RSRC_ERR: Switch 7 R0/0: fed: Failed to allocate hardware resource for adj entry - rc:1
Jan 19 2023 09:06:16.537 SGT: %FMFP-3-OBJ_DWNLD_TO_DP_FAILED: Switch 7 R0/0: fman_fp_image: adj 0x125c5, Flags Midchain download to DP failed
Jan 19 2023 09:06:16.508 SGT: %FED_L3_ERRMSG-3-RSRC_ERR: Switch 6 R0/0: fed: Failed to allocate hardware resource for adj entry - rc:1
Jan 19 2023 09:06:16.509 SGT: %FMFP-3-OBJ_DWNLD_TO_DP_FAILED: Switch 6 R0/0: fman_fp_image: adj 0x125c5, Flags Midchain download to DP failed
Jan 19 2023 09:06:16.505 SGT: %FED_L3_ERRMSG-3-RSRC_ERR: Switch 4 R0/0: fed: Failed to allocate hardware resource for adj entry - rc:1
Jan 19 2023 09:06:16.506 SGT: %FMFP-3-OBJ_DWNLD_TO_DP_FAILED: Switch 4 R0/0: fman_fp_image: adj 0x125c5, Flags Midchain download to DP failed
Jan 19 2023 09:06:16.544 SGT: %FED_L3_ERRMSG-3-RSRC_ERR: Switch 3 R0/0: fed: Failed to allocate hardware resource for adj entry - rc:1
Jan 19 2023 09:06:16.544 SGT: %FMFP-3-OBJ_DWNLD_TO_DP_FAILED: Switch 3 R0/0: fman_fp_image: adj 0x125c5, Flags Midchain download to DP failed
Jan 19 2023 09:06:16.547 SGT: %FED_L3_ERRMSG-3-RSRC_ERR: Switch 2 R0/0: fed: Failed to allocate hardware resource for adj entry - rc:1
Jan 19 2023 09:06:16.548 SGT: %FMFP-3-OBJ_DWNLD_TO_DP_FAILED: Switch 2 R0/0: fman_fp_image: adj 0x125c5, Flags Midchain download to DP failed
Jan 19 2023 09:06:16.510 SGT: %FED_L3_ERRMSG-3-RSRC_ERR: Switch 5 R0/0: fed: Failed to allocate hardware resource for adj entry - rc:1
Jan 19 2023 09:06:16.510 SGT: %FMFP-3-OBJ_DWNLD_TO_DP_FAILED: Switch 5 R0/0: fman_fp_image: adj 0x125c5, Flags Midchain download to DP failed
Jan 19 2023 09:06:16.522 SGT: %FED_L3_ERRMSG-3-RSRC_ERR: Switch 8 R0/0: fed: Failed to allocate hardware resource for adj entry - rc:1
Jan 19 2023 09:06:16.523 SGT: %FMFP-3-OBJ_DWNLD_TO_DP_FAILED: Switch 8 R0/0: fman_fp_image: adj 0x125c5, Flags Midchain download to DP failed | C9300 SDA FE - %FED_L3_ERRMSG-3-RSRC_ERR: Switch 4 R0/0: fed: Failed to allocate hardware resource for adj entry - rc:1
Jan 19 2023 09:06:16.547 SGT: %FED_L3_ERRMSG-3-RSRC_ERR: Switch 1 R0/0: fed: Failed to allocate hardware resource for adj entry - rc:1
Jan 19 2023 09:06:16.548 SGT: %FMFP-3-OBJ_DWNLD_TO_DP_FAILED: Switch 1 R0/0: fman_fp_image: adj 0x125c5, Flags Midchain download to DP failed
Jan 19 2023 09:06:16.537 SGT: %FED_L3_ERRMSG-3-RSRC_ERR: Switch 7 R0/0: fed: Failed to allocate hardware resource for adj entry - rc:1
Jan 19 2023 09:06:16.537 SGT: %FMFP-3-OBJ_DWNLD_TO_DP_FAILED: Switch 7 R0/0: fman_fp_image: adj 0x125c5, Flags Midchain download to DP failed
Jan 19 2023 09:06:16.508 SGT: %FED_L3_ERRMSG-3-RSRC_ERR: Switch 6 R0/0: fed: Failed to allocate hardware resource for adj entry - rc:1
Jan 19 2023 09:06:16.509 SGT: %FMFP-3-OBJ_DWNLD_TO_DP_FAILED: Switch 6 R0/0: fman_fp_image: adj 0x125c5, Flags Midchain download to DP failed
Jan 19 2023 09:06:16.505 SGT: %FED_L3_ERRMSG-3-RSRC_ERR: Switch 4 R0/0: fed: Failed to allocate hardware resource for adj entry - rc:1
Jan 19 2023 09:06:16.506 SGT: %FMFP-3-OBJ_DWNLD_TO_DP_FAILED: Switch 4 R0/0: fman_fp_image: adj 0x125c5, Flags Midchain download to DP failed
Jan 19 2023 09:06:16.544 SGT: %FED_L3_ERRMSG-3-RSRC_ERR: Switch 3 R0/0: fed: Failed to allocate hardware resource for adj entry - rc:1
Jan 19 2023 09:06:16.544 SGT: %FMFP-3-OBJ_DWNLD_TO_DP_FAILED: Switch 3 R0/0: fman_fp_image: adj 0x125c5, Flags Midchain download to DP failed
Jan 19 2023 09:06:16.547 SGT: %FED_L3_ERRMSG-3-RSRC_ERR: Switch 2 R0/0: fed: Failed to allocate hardware resource for adj entry - rc:1
Jan 19 2023 09:06:16.548 SGT: %FMFP-3-OBJ_DWNLD_TO_DP_FAILED: Switch 2 R0/0: fman_fp_image: adj 0x125c5, Flags Midchain download to DP failed
Jan 19 2023 09:06:16.510 SGT: %FED_L3_ERRMSG-3-RSRC_ERR: Switch 5 R0/0: fed: Failed to allocate hardware resource for adj entry - rc:1
Jan 19 2023 09:06:16.510 SGT: %FMFP-3-OBJ_DWNLD_TO_DP_FAILED: Switch 5 R0/0: fman_fp_image: adj 0x125c5, Flags Midchain download to DP failed
Jan 19 2023 09:06:16.522 SGT: %FED_L3_ERRMSG-3-RSRC_ERR: Switch 8 R0/0: fed: Failed to allocate hardware resource for adj entry - rc:1
Jan 19 2023 09:06:16.523 SGT: %FMFP-3-OBJ_DWNLD_TO_DP_FAILED: Switch 8 R0/0: fman_fp_image: adj 0x125c5, Flags Midchain download to DP failed | timestamp : 2023-02-14T13:36:10.000+0000 || updatedby : jasterry || type : RESOLUTION SUMMARY || visibility : External || details : Customer stopped responding. Believe that there is an issue with Arp traffic being programmed correctly. closed with 3 strike | nan | C9300-48U | cat9k_iosxe.17.06.02.SPA.bin | nan | nan | 3 | nan | Software -not a bug (scalability, version selection, install/upgrade help...) | C9300 | Cisco DNA Center - On-Prem | Cisco Software-Defined Access (SDA Wired) | nan | nan | nan | nan | nan | nan |
694935054 | Question: Which software version is principally discussed in these documents?
Answer "NONE" if you cannot find answer in the given documents.
The ONLY software version should be selected from the given software version list: 1/ 8.10.151.0/ 8.10.171.0/ 802.11AC/ 8.5.171.0/ 8.10.183.0/ 8.10.130.0/ 8.10.171.0/ THIRD_PARTY_PRODUCT_SW/ 8.5.135.0/ 8.3.143.0/ NA-CIN_CLOSE_SW/ 8.5.140.0/ 4.0.1a/ WLC CLIENT INTEROP/ 12.0.13/ 8.5.151.0/ 8.4/ 120.13/ 8.5.160.0/ 8.10.151.0/ 8.3.143.0/ 8.3.131.0/ 8.3.150.0/ 8.5.135.0/ 8.5.161.0/ 8.10.185.0/ 8.2.166.0/ 8.5.140.0/ 8.5.151.0/ 8.3.150.0/ 16.12.3s/ WLC RRM/RF/CLEANAIR/ 8.5.151.0/ 8.10.130.0/ NA - COMPONENT ONLY/ 8.10.162.0/ 8.3.140.0/ 8.10.150.0/ 8.10.183.0/ 8.10.161.0/ 8.10.185.0/ 8.5.151.0/ 16.12.4/ 17.3.5b/ 8.10.183.0/ 8.10.171.0/ 8.5.171.0 Response in this JSON format:
{"software_version": "","explanation": "", "summary": ""}
* After doing internal research, it seems you are hitting bug "CSCvy37953." This bug is only for CoS Ap's.
* This bug is fixed in 8.10MR7 as per developers, and it should also be fixed in 8.10.183.0.
* As you are already planning to go to 8.10.183.0, which is also the TAC recommended code, you can safely upgrade the WLC, which should fix our current issue.
Thank you for your time on Webex today.
Analysis from the logs:
We observe below error logs on the ap:
Feb 3 12:24:55 kernel: [*02/03/2023 12:24:55.0202] 2023-02-03 12:24:55 Application has no active session to process TAMC_CMD_RSA_PRIVATE_ENCR
Feb 3 12:24:55 kernel: [*02/03/2023 12:24:55.0215] 1957087432:error:14099006:lib(20):func(153):reason(6):NA:0:
Feb 3 12:24:55 kernel: [*02/03/2023 12:24:55.0215] dtls_process_packet: Error connecting TLS context
Feb 3 12:24:55 kernel: [*02/03/2023 12:24:55.0216] local_in_addr_comp: Client and server addresses/port/version of 2 nodes are [10.253.190.103]:5256(0)--[172.18.240.25]:5246(0) [10.253.190.103]:5256--[172.18.240.25]:5246
Feb 3 12:24:55 kernel: [*02/03/2023 12:24:55.0216] wtpDtlsCallback: DTLS-Ctrl Connection 0x55ec2a00 closed
Feb 3 12:24:55 kernel: [*02/03/2023 12:24:55.0216] dtls_free_connection: Free done...
for connection 0x55ec2a00
Feb 3 12:24:55 kernel: [*02/03/2023 12:24:55.0220] dtls_connectionDB_del_connection: Deleted Connection 0x55ec2a00, Server [172.18.240.25]:5246, Client [10.253.190.103]:5256, Count 0, rc_return 2
Feb 3 12:24:55 kernel: [*02/03/2023 12:24:55.0220]
Feb 3 12:24:55 kernel: [*02/03/2023 12:24:55.0220] DTLS: Error while processing DTLS packet 0x55f35000.
Feb 2 21:07:49 kernel: [*02/02/2023 21:07:49.0003] CAPWAP State: DTLS Setup
Feb 2 21:07:49 kernel: [*02/02/2023 21:07:49.0010] dtls_cssl_msg_cb: Received >>> DTLS Header [Length 000d]
Feb 2 21:07:49 kernel: [*02/02/2023 21:07:49.0011] dtls_cssl_msg_cb: Received >>> DTLS 1.2 Handshake [Length 00ac] ClientHello
Feb 2 21:07:49 kernel: [*02/02/2023 21:07:49.0011] dtls_connectionDB_add_connection: Added Connection 0x54aaea00 Server [172.18.240.26]:5246 Client [10.253.159.139]:5256
Feb 2 21:07:49 kernel: [*02/02/2023 21:07:49.0011]
Feb 2 21:07:49 kernel: [*02/02/2023 21:07:49.0011] create_dtls_connection: Creating DTLS Ctrl Connection 0x54aaea00
Feb 2 21:07:49 kernel: [*02/02/2023 21:07:49.0012] DTLS connection created sucessfully local_ip: 10.253.159.139 local_port: 5256 peer_ip: 172.18.240.26 peer_port: 5246
Feb 2 21:07:49 kernel: [*02/02/2023 21:07:49.0022] local_in_addr_comp: Client and server addresses/port/version of 2 nodes are [10.253.159.139]:5256(0)--[172.18.240.26]:5246(0) [10.253.159.139]:5256--[172.18.240.26]:5246
Feb 2 21:07:49 kernel: [*02/02/2023 21:07:49.0022] dtls_connection_find_using_link_info: Searching connection [10.253.159.139]:5256--[172.18.240.26]:5246, result 0x54aaea00
Feb 2 21:07:49 kernel: [*02/02/2023 21:07:49.0023] dtls_cssl_msg_cb: Sent <<< DTLS Header [Length 000d]
Feb 2 21:07:49 kernel: [*02/02/2023 21:07:49.0023] dtls_cssl_msg_cb: Sent <<< DTLS 1.2 Handshake [Length 002f] HelloVerifyRequest
Feb 2 21:07:49 kernel: [*02/02/2023 21:07:49.0024] dtls_cssl_msg_cb: Received >>> DTLS Header [Length 000d]
Feb 2 21:07:49 kernel: [*02/02/2023 21:07:49.0024] dtls_cssl_msg_cb: Received >>> DTLS 1.2 Handshake [Length 00cc] ClientHello
Feb 2 21:07:49 kernel: [*02/02/2023 21:07:49.0025] dtls_process_packet: SSL get error rc 5
Feb 2 21:07:49 kernel: [*02/02/2023 21:07:49.0031] local_in_addr_comp: Client and server addresses/port/version of 2 nodes are [10.253.159.139]:5256(0)--[172.18.240.26]:5246(0) [10.253.159.139]:5256--[172.18.240.26]:5246
Feb 2 21:07:49 kernel: [*02/02/2023 21:07:49.0032] dtls_connection_find_using_link_info: Searching connection [10.253.159.139]:5256--[172.18.240.26]:5246, result 0x54aaea00
* When AP wants to join a WLC, it will send a discovery message to known WLCs and wait for their response.
After that, it does a DTLS handshake where it exchanges certificates, and the AP and WLC go through the joining process, with the AP successfully joining the WLC.
* In our case, Ap is going through the discovery process and establishing the handshake, but the certificates are not being exchanged and showing the error "dtls_process_packet: SSL get error RC5".
* But after rebooting the AP, it is establishing the connection and joining the WLC successfully.
* After doing internal research, it seems you are hitting bug "CSCvy37953." This bug is only for CoS Ap's.
* This bug is fixed in 8.10MR7 as per developers, and it should also be fixed in 8.10.183.0.
* As you are already planning to go to 8.10.183.0, which is also the TAC recommended code, you can safely upgrade the WLC, which should fix our current issue.
Feel free to mail me for any queries.
I hope you are doing well.
After a lot of internal research, I found similar cases, and the issue was fixed after upgrading the WLC to 8.10.171.0.
I suggest you please upgrade the WL to 8.10.171.0.
What are the reasons reflected on the logs for unstable DTLS sessions.
Please share an ETA for analysis.
Did you checked the certificate issue while AP joining.
Please understand the urgency here as we are in middle of 8.10.183.0 adoption and every day new issues are making us unconfident about the same.
Also please share the hierarchy for further escalations as I cant see your manager email address in your Cisco signatures.
Thank you for your time on Webex today.
Wlc – 8540
Ap’s – 2802i
Code – 8.10.161.0
Ap’s are disconnecting from the network intermittently.
Four problematic APs are connected to the same switch.
From support bundle:
Jan 266 16:43:38 kernel: [*01/26/2023 16:43:38.2076] Re-Tx Count=3, Max Re-Tx Value=5, SendSeqNum=165, NumofPendingMsgs=10
Jan 26 16:43:38 kernel: [*01/26/2023 16:43:38.2076]
Jan 26 16:43:41 kernel: [*01/26/2023 16:43:41.0587] Re-Tx Count=4, Max Re-Tx Value=5, SendSeqNum=165, NumofPendingMsgs=10
Jan 26 16:43:41 kernel: [*01/26/2023 16:43:41.0587] Jan 26 16:43:43 kernel: [*01/26/2023 16:43:43.9100] Re-Tx Count=5, Max Re-Tx Value=5, SendSeqNum=165, NumofPendingMsgs=10
Jan 26 16:43:43 kernel: [*01/26/2023 16:43:43.9100] Jan 26 16:43:46 kernel: [*01/26/2023 16:43:46.7607] Max retransmission count exceeded, going back to DISCOVER mode.
J
Jan 26 16:43:46 kernel: [*01/26/2023 16:43:46.7610] GOING BACK TO DISCOVER MODE
Jan 26 16:43:46 kernel: [*01/26/2023 16:43:46.7889]
Jan 26 16:43:46 kernel: [*01/26/2023 16:43:46.7890] CAPWAP State: DTLS Teardown
* I see AP is sending "keep alive" packets to the WLC, but it didn't get any response back.
As AP has not received any response back from the WLC, it has disconnected from it and gone into discovery mode again.
* As shown below, after 27 seconds, AP has rejoined the WLC (TLDC-WLC1).
Jan 26 16:44:13 kernel: [*01/26/2023 16:44:13.0003] CAPWAP State: DTLS Setup
Jan 26 16:44:13 kernel: [*01/26/2023 16:44:13.7718]
Jan 26 16:44:13 kernel: [*01/26/2023 16:44:13.7718] CAPWAP State: Join
Jan 26 16:44:13 kernel: [*01/26/2023 16:44:13.7751] Sending Join request to 172.18.240.25 through port 5264
Jan 26 16:44:13 kernel: [*01/26/2023 16:44:13.7899] Join Response from 172.18.240.25
Jan 26 16:44:13 kernel: [*01/26/2023 16:44:13.7899] AC accepted join request with result code: 0
Jan 26 16:44:13 kernel: [*01/26/2023 16:44:13.8030] Received wlcType 0, timer 30
Jan 26 16:44:13 kernel: [*01/26/2023 16:44:13.9319]
Jan 26 16:44:13 kernel: [*01/26/2023 16:44:13.9319] CAPWAP State: Image Data
Jan 26 16:44:13 kernel: [*01/26/2023 16:44:13.9323] AP image version 8.10.162.0 backup 8.10.181.4, Controller 8.10.162.0
Jan 26 16:44:13 kernel: [*01/26/2023 16:44:13.9323] Version is the same, do not need update.
Jan 26 16:44:13 upgrade: Script called with args:[NO_UPGRADE]
Jan 26 16:44:13 kernel: [*01/26/2023 16:44:13.9606] upgrade.sh: Script called with args:[NO_UPGRADE]
Jan 26 16:44:14 kernel: [*01/26/2023 16:44:14.0186] do NO_UPGRADE, part1 is active part
Jan 26 16:44:14 kernel: [*01/26/2023 16:44:14.0290]
Jan 26 16:44:14 kernel: [*01/26/2023 16:44:14.0290] CAPWAP State: Configure
Jan 26 16:44:14 syslog: Check lagloadbalance setting flex mode 0 cfg 0 linkstate 0 ap_type 56
Jan 26 16:44:15 kernel: [*01/26/2023 16:44:15.2540] DOT11_CFG[1]: Starting radio 1
Jan 26 16:44:15 kernel: [*01/26/2023 16:44:15.8898] 1:change to DFS channel 64, CAC for 60 seconds.
Jan 26 16:44:15 kernel: [*01/26/2023 16:44:15.9449] DOT11_DRV[1]: Started Radio 1
Jan 26 16:44:17 kernel: [*01/26/2023 16:44:17.3088] Discarding msg CAPWAP_WTP_EVENT_REQUEST(type 9) in CAPWAP state: Configure(8).
Jan 26 16:44:17 kernel: [*01/26/2023 16:44:17.3089] Discarding msg CAPWAP_WTP_EVENT_REQUEST(type 9) in CAPWAP state: Configure(8).
Jan 26 16:44:17 kernel: [*01/26/2023 16:44:17.3089] Discarding msg CAPWAP_WTP_EVENT_REQUEST(type 9) in CAPWAP state: Configure(8).
Jan 26 16:44:18 kernel: [*01/26/2023 16:44:18.7411] Null cert id for TLV_AP_CACERTS_CONFIG_PAYLOAD
Jan 26 16:44:20 kernel: [*01/26/2023 16:44:20.1457]
Jan 26 16:44:20 kernel: [*01/26/2023 16:44:20.1457] CAPWAP State: Run
Jan 26 16:44:20 kernel: [*01/26/2023 16:44:20.1940] AP has joined controller TLDC-WLC1
* Again after 4 mins, ap disconnected from the wlc again as it didn’t get any keep-alive response.
Jan 26 16:48:27 kernel: [*01/26/2023 16:48:27.5214] Re-Tx Count=3, Max Re-Tx Value=5, SendSeqNum=101, NumofPendingMsgs=15
Jan 26 16:48:27 kernel: [*01/26/2023 16:48:27.5214]
Jan 26 16:48:30 kernel: [*01/26/2023 16:48:30.3725] Re-Tx Count=4, Max Re-Tx Value=5, SendSeqNum=101, NumofPendingMsgs=15
Jan 26 16:48:30 kernel: [*01/26/2023 16:48:30.3725]
Jan 26 16:48:33 kernel: [*01/26/2023 16:48:33.2237] Re-Tx Count=5, Max Re-Tx Value=5, SendSeqNum=101, NumofPendingMsgs=15
Jan 26 16:48:33 kernel: [*01/26/2023 16:48:33.2237]
Jan 26 16:48:36 kernel: [*01/26/2023 16:48:36.0745] Max retransmission count exceeded, going back to DISCOVER mode.
* The max retransmission is most likely the keep-alives once the DTLS connection is established with the WLC.
Once these heartbeats are not talking two-way, the AP/WLC will both complain that the AP has reached max transmissions.
The WLC will remove the AP entry and the AP will re-start the discovery/join process.
* If ap and wlc are in 2 different locations, there must have been brief period of network latency between ap and wlc that caused aps to disassociate from wlc.
* Please increase the retransmission parameters from the gui > wireless > global configuration > AP Retransmit Config Parameters > Ap retransmit count – 8 and interval – 5
* We need to check if the WLC is getting these keep-alive packets or not.
If yes, we need to check if it is responding back or not.
Enter the following commands when the problem occurs again:
From wlc:
* Debug mac addr <Base Radio MAC of the AP>
* Debug mac addr <ethernet mac of the AP>
* Debug capwap dtls-keepalive enable
From ap:
* Debug capwap client keepalive enable
Run these commands for some time until the disassociation happens again, then disable the debugging with "debug disable-all."
* Even after WLC responds, if AP didn’t receive it, we need to check where the drop is as the response is not reaching AP.
Technology: Wireless
Subtechnology: 8540 Series Wireless LAN Controller (AIR-CT8540)
Problem Code: Interoperability
Product: NA
Product Family: AIRCTA2
Software Version: N/A
Router/Node Name: N/A
Problem Details: AP's in central library are facing issues joining back to WLC
AP's in central library are facing issues joining back to WLC
timestamp : 2023-02-28T01:04:20.000+0000 || updatedby : sherholm || type : RESOLUTION SUMMARY || visibility : External || details : Standby SR monitored till customer requested closure date. | Question: Which product is principally discussed in these documents?
Answer "NONE" if you cannot find answer in the given documents.
The ONLY product name should be selected from the given product name list: AIR-CT8540-1K-K9/ AIR-CT8540-K9/ NA-CIN_CLOSE_HW/ C9120AXI-S/ THIRD_PARTY_PRODUCT_HW/ AIR-CT8540-CA-K9/ AIR-AP2802I-S-K9/ AIR-CT8540-K9Z/ AIR-BZL-C240M4/ DN2-HW-APL-XL/ WLC-AP-T/ AIR-CT8540-SW-8.2 Response in this JSON format:
{"product_name": "","explanation": "", "summary": ""}
Thank you for your time on Webex today.
Analysis from the logs:
We observe below error logs on the ap:
Feb 3 12:24:55 kernel: [*02/03/2023 12:24:55.0202] 2023-02-03 12:24:55 Application has no active session to process TAMC_CMD_RSA_PRIVATE_ENCR
Feb 3 12:24:55 kernel: [*02/03/2023 12:24:55.0215] 1957087432:error:14099006:lib(20):func(153):reason(6):NA:0:
Feb 3 12:24:55 kernel: [*02/03/2023 12:24:55.0215] dtls_process_packet: Error connecting TLS context
Feb 3 12:24:55 kernel: [*02/03/2023 12:24:55.0216] local_in_addr_comp: Client and server addresses/port/version of 2 nodes are [10.253.190.103]:5256(0)--[172.18.240.25]:5246(0) [10.253.190.103]:5256--[172.18.240.25]:5246
Feb 3 12:24:55 kernel: [*02/03/2023 12:24:55.0216] wtpDtlsCallback: DTLS-Ctrl Connection 0x55ec2a00 closed
Feb 3 12:24:55 kernel: [*02/03/2023 12:24:55.0216] dtls_free_connection: Free done...
for connection 0x55ec2a00
Feb 3 12:24:55 kernel: [*02/03/2023 12:24:55.0220] dtls_connectionDB_del_connection: Deleted Connection 0x55ec2a00, Server [172.18.240.25]:5246, Client [10.253.190.103]:5256, Count 0, rc_return 2
Feb 3 12:24:55 kernel: [*02/03/2023 12:24:55.0220]
Feb 3 12:24:55 kernel: [*02/03/2023 12:24:55.0220] DTLS: Error while processing DTLS packet 0x55f35000.
Feb 2 21:07:49 kernel: [*02/02/2023 21:07:49.0003] CAPWAP State: DTLS Setup
Feb 2 21:07:49 kernel: [*02/02/2023 21:07:49.0010] dtls_cssl_msg_cb: Received >>> DTLS Header [Length 000d]
Feb 2 21:07:49 kernel: [*02/02/2023 21:07:49.0011] dtls_cssl_msg_cb: Received >>> DTLS 1.2 Handshake [Length 00ac] ClientHello
Feb 2 21:07:49 kernel: [*02/02/2023 21:07:49.0011] dtls_connectionDB_add_connection: Added Connection 0x54aaea00 Server [172.18.240.26]:5246 Client [10.253.159.139]:5256
Feb 2 21:07:49 kernel: [*02/02/2023 21:07:49.0011]
Feb 2 21:07:49 kernel: [*02/02/2023 21:07:49.0011] create_dtls_connection: Creating DTLS Ctrl Connection 0x54aaea00
Feb 2 21:07:49 kernel: [*02/02/2023 21:07:49.0012] DTLS connection created sucessfully local_ip: 10.253.159.139 local_port: 5256 peer_ip: 172.18.240.26 peer_port: 5246
Feb 2 21:07:49 kernel: [*02/02/2023 21:07:49.0022] local_in_addr_comp: Client and server addresses/port/version of 2 nodes are [10.253.159.139]:5256(0)--[172.18.240.26]:5246(0) [10.253.159.139]:5256--[172.18.240.26]:5246
Feb 2 21:07:49 kernel: [*02/02/2023 21:07:49.0022] dtls_connection_find_using_link_info: Searching connection [10.253.159.139]:5256--[172.18.240.26]:5246, result 0x54aaea00
Feb 2 21:07:49 kernel: [*02/02/2023 21:07:49.0023] dtls_cssl_msg_cb: Sent <<< DTLS Header [Length 000d]
Feb 2 21:07:49 kernel: [*02/02/2023 21:07:49.0023] dtls_cssl_msg_cb: Sent <<< DTLS 1.2 Handshake [Length 002f] HelloVerifyRequest
Feb 2 21:07:49 kernel: [*02/02/2023 21:07:49.0024] dtls_cssl_msg_cb: Received >>> DTLS Header [Length 000d]
Feb 2 21:07:49 kernel: [*02/02/2023 21:07:49.0024] dtls_cssl_msg_cb: Received >>> DTLS 1.2 Handshake [Length 00cc] ClientHello
Feb 2 21:07:49 kernel: [*02/02/2023 21:07:49.0025] dtls_process_packet: SSL get error rc 5
Feb 2 21:07:49 kernel: [*02/02/2023 21:07:49.0031] local_in_addr_comp: Client and server addresses/port/version of 2 nodes are [10.253.159.139]:5256(0)--[172.18.240.26]:5246(0) [10.253.159.139]:5256--[172.18.240.26]:5246
Feb 2 21:07:49 kernel: [*02/02/2023 21:07:49.0032] dtls_connection_find_using_link_info: Searching connection [10.253.159.139]:5256--[172.18.240.26]:5246, result 0x54aaea00
* When AP wants to join a WLC, it will send a discovery message to known WLCs and wait for their response.
After that, it does a DTLS handshake where it exchanges certificates, and the AP and WLC go through the joining process, with the AP successfully joining the WLC.
* In our case, Ap is going through the discovery process and establishing the handshake, but the certificates are not being exchanged and showing the error "dtls_process_packet: SSL get error RC5".
* But after rebooting the AP, it is establishing the connection and joining the WLC successfully.
* After doing internal research, it seems you are hitting bug "CSCvy37953." This bug is only for CoS Ap's.
* This bug is fixed in 8.10MR7 as per developers, and it should also be fixed in 8.10.183.0.
* As you are already planning to go to 8.10.183.0, which is also the TAC recommended code, you can safely upgrade the WLC, which should fix our current issue.
Feel free to mail me for any queries.
Thank you for your time on Webex today.
Wlc – 8540
Ap’s – 2802i
Code – 8.10.161.0
Ap’s are disconnecting from the network intermittently.
Four problematic APs are connected to the same switch.
From support bundle:
Jan 266 16:43:38 kernel: [*01/26/2023 16:43:38.2076] Re-Tx Count=3, Max Re-Tx Value=5, SendSeqNum=165, NumofPendingMsgs=10
Jan 26 16:43:38 kernel: [*01/26/2023 16:43:38.2076]
Jan 26 16:43:41 kernel: [*01/26/2023 16:43:41.0587] Re-Tx Count=4, Max Re-Tx Value=5, SendSeqNum=165, NumofPendingMsgs=10
Jan 26 16:43:41 kernel: [*01/26/2023 16:43:41.0587] Jan 26 16:43:43 kernel: [*01/26/2023 16:43:43.9100] Re-Tx Count=5, Max Re-Tx Value=5, SendSeqNum=165, NumofPendingMsgs=10
Jan 26 16:43:43 kernel: [*01/26/2023 16:43:43.9100] Jan 26 16:43:46 kernel: [*01/26/2023 16:43:46.7607] Max retransmission count exceeded, going back to DISCOVER mode.
J
Jan 26 16:43:46 kernel: [*01/26/2023 16:43:46.7610] GOING BACK TO DISCOVER MODE
Jan 26 16:43:46 kernel: [*01/26/2023 16:43:46.7889]
Jan 26 16:43:46 kernel: [*01/26/2023 16:43:46.7890] CAPWAP State: DTLS Teardown
* I see AP is sending "keep alive" packets to the WLC, but it didn't get any response back.
As AP has not received any response back from the WLC, it has disconnected from it and gone into discovery mode again.
* As shown below, after 27 seconds, AP has rejoined the WLC (TLDC-WLC1).
Jan 26 16:44:13 kernel: [*01/26/2023 16:44:13.0003] CAPWAP State: DTLS Setup
Jan 26 16:44:13 kernel: [*01/26/2023 16:44:13.7718]
Jan 26 16:44:13 kernel: [*01/26/2023 16:44:13.7718] CAPWAP State: Join
Jan 26 16:44:13 kernel: [*01/26/2023 16:44:13.7751] Sending Join request to 172.18.240.25 through port 5264
Jan 26 16:44:13 kernel: [*01/26/2023 16:44:13.7899] Join Response from 172.18.240.25
Jan 26 16:44:13 kernel: [*01/26/2023 16:44:13.7899] AC accepted join request with result code: 0
Jan 26 16:44:13 kernel: [*01/26/2023 16:44:13.8030] Received wlcType 0, timer 30
Jan 26 16:44:13 kernel: [*01/26/2023 16:44:13.9319]
Jan 26 16:44:13 kernel: [*01/26/2023 16:44:13.9319] CAPWAP State: Image Data
Jan 26 16:44:13 kernel: [*01/26/2023 16:44:13.9323] AP image version 8.10.162.0 backup 8.10.181.4, Controller 8.10.162.0
Jan 26 16:44:13 kernel: [*01/26/2023 16:44:13.9323] Version is the same, do not need update.
Jan 26 16:44:13 upgrade: Script called with args:[NO_UPGRADE]
Jan 26 16:44:13 kernel: [*01/26/2023 16:44:13.9606] upgrade.sh: Script called with args:[NO_UPGRADE]
Jan 26 16:44:14 kernel: [*01/26/2023 16:44:14.0186] do NO_UPGRADE, part1 is active part
Jan 26 16:44:14 kernel: [*01/26/2023 16:44:14.0290]
Jan 26 16:44:14 kernel: [*01/26/2023 16:44:14.0290] CAPWAP State: Configure
Jan 26 16:44:14 syslog: Check lagloadbalance setting flex mode 0 cfg 0 linkstate 0 ap_type 56
Jan 26 16:44:15 kernel: [*01/26/2023 16:44:15.2540] DOT11_CFG[1]: Starting radio 1
Jan 26 16:44:15 kernel: [*01/26/2023 16:44:15.8898] 1:change to DFS channel 64, CAC for 60 seconds.
Jan 26 16:44:15 kernel: [*01/26/2023 16:44:15.9449] DOT11_DRV[1]: Started Radio 1
Jan 26 16:44:17 kernel: [*01/26/2023 16:44:17.3088] Discarding msg CAPWAP_WTP_EVENT_REQUEST(type 9) in CAPWAP state: Configure(8).
Jan 26 16:44:17 kernel: [*01/26/2023 16:44:17.3089] Discarding msg CAPWAP_WTP_EVENT_REQUEST(type 9) in CAPWAP state: Configure(8).
Jan 26 16:44:17 kernel: [*01/26/2023 16:44:17.3089] Discarding msg CAPWAP_WTP_EVENT_REQUEST(type 9) in CAPWAP state: Configure(8).
Jan 26 16:44:18 kernel: [*01/26/2023 16:44:18.7411] Null cert id for TLV_AP_CACERTS_CONFIG_PAYLOAD
Jan 26 16:44:20 kernel: [*01/26/2023 16:44:20.1457]
Jan 26 16:44:20 kernel: [*01/26/2023 16:44:20.1457] CAPWAP State: Run
Jan 26 16:44:20 kernel: [*01/26/2023 16:44:20.1940] AP has joined controller TLDC-WLC1
* Again after 4 mins, ap disconnected from the wlc again as it didn’t get any keep-alive response.
Jan 26 16:48:27 kernel: [*01/26/2023 16:48:27.5214] Re-Tx Count=3, Max Re-Tx Value=5, SendSeqNum=101, NumofPendingMsgs=15
Jan 26 16:48:27 kernel: [*01/26/2023 16:48:27.5214]
Jan 26 16:48:30 kernel: [*01/26/2023 16:48:30.3725] Re-Tx Count=4, Max Re-Tx Value=5, SendSeqNum=101, NumofPendingMsgs=15
Jan 26 16:48:30 kernel: [*01/26/2023 16:48:30.3725]
Jan 26 16:48:33 kernel: [*01/26/2023 16:48:33.2237] Re-Tx Count=5, Max Re-Tx Value=5, SendSeqNum=101, NumofPendingMsgs=15
Jan 26 16:48:33 kernel: [*01/26/2023 16:48:33.2237]
Jan 26 16:48:36 kernel: [*01/26/2023 16:48:36.0745] Max retransmission count exceeded, going back to DISCOVER mode.
* The max retransmission is most likely the keep-alives once the DTLS connection is established with the WLC.
Once these heartbeats are not talking two-way, the AP/WLC will both complain that the AP has reached max transmissions.
The WLC will remove the AP entry and the AP will re-start the discovery/join process.
* If ap and wlc are in 2 different locations, there must have been brief period of network latency between ap and wlc that caused aps to disassociate from wlc.
* Please increase the retransmission parameters from the gui > wireless > global configuration > AP Retransmit Config Parameters > Ap retransmit count – 8 and interval – 5
* We need to check if the WLC is getting these keep-alive packets or not.
If yes, we need to check if it is responding back or not.
Enter the following commands when the problem occurs again:
From wlc:
* Debug mac addr <Base Radio MAC of the AP>
* Debug mac addr <ethernet mac of the AP>
* Debug capwap dtls-keepalive enable
From ap:
* Debug capwap client keepalive enable
Run these commands for some time until the disassociation happens again, then disable the debugging with "debug disable-all."
* Even after WLC responds, if AP didn’t receive it, we need to check where the drop is as the response is not reaching AP.
Technology: Wireless
Subtechnology: 8540 Series Wireless LAN Controller (AIR-CT8540)
Problem Code: Interoperability
Product: NA
Product Family: AIRCTA2
Software Version: N/A
Router/Node Name: N/A
Problem Details: AP's in central library are facing issues joining back to WLC
AP's in central library are facing issues joining back to WLC
timestamp : 2023-02-28T01:04:20.000+0000 || updatedby : sherholm || type : RESOLUTION SUMMARY || visibility : External || details : Standby SR monitored till customer requested closure date. | Technology: Wireless
Subtechnology: 8540 Series Wireless LAN Controller (AIR-CT8540)
Problem Code: Interoperability
Product: NA
Product Family: AIRCTA2
Software Version: N/A
Router/Node Name: N/A
Problem Details: AP's in central library are facing issues joining back to WLC | AP's in central library are facing issues joining back to WLC | timestamp : 2023-02-28T01:04:20.000+0000 || updatedby : sherholm || type : RESOLUTION SUMMARY || visibility : External || details : Standby SR monitored till customer requested closure date. | nan | THIRD_PARTY_PRODUCT_HW | THIRD_PARTY_PRODUCT_SW | nan | nan | 3 | nan | Software -not a bug (scalability, version selection, install/upgrade help...) | AIRCTA2 | Wireless | 8540 Series Wireless LAN Controller (AIR-CT8540) | nan | nan | nan | nan | nan | nan |
695268540 | Question: Which software version is principally discussed in these documents?
Answer "NONE" if you cannot find answer in the given documents.
The ONLY software version should be selected from the given software version list: NA - COMPONENT ONLY/ 16.12.3s/ 2.3.3.3/ 17.6.4/ 16.12.4/ 2.2.2.5/ 1.3.3.6/ 16.12.03s/ 16.12.01s/ 16.12.04/ 16.12.1s/ 2.2.3.3/ THIRD_PARTY_PRODUCT_SW/ 16.12.1s/ 1.3.3.7/ 1.3.3.9/ 2.3.3.7/ 2.1.2.7/ 2.2.3.6/ 17.06.02 Response in this JSON format:
{"software_version": "","explanation": "", "summary": ""}
resolved issue
Technology: Cisco DNA Center - On-Prem
Subtechnology: Cisco Software-Defined Access (SDA Wired)
Problem Code: Error Messages, Logs, Debugs
Product: NA
Product Family: C9300
Software Version: N/A
Router/Node Name: N/A
Problem Details: SDA Fabric Edge - Intermittent AAA Server Down status impacting user/device authentication
This observed on switches upgraded from 16.12.4 to 17.6.4.
Though the radius status is UP, but Platform State from SMD is DEAD (for both radius/aaa servers)
IT-03-CNT-ES3#show aaa servers | inc auth-port|State|SMD
RADIUS: id 1, priority 1, host 172.19.208.9, auth-port 1812, acct-port 1813, hostname dnac-radius_172.19.208.9
State: current UP, duration 646545s, previous duration 14s
Platform State from SMD: current DEAD, duration 0s, previous duration 102s
SMD Platform Dead: total time 184899s, count 6970
Platform State from WNCD (1) : current UP
Platform State from WNCD (2) : current UP
Platform State from WNCD (3) : current UP
Platform State from WNCD (4) : current UP
Platform State from WNCD (5) : current UP
Platform State from WNCD (6) : current UP
Platform State from WNCD (7) : current UP
Platform State from WNCD (8) : current UP, duration 0s, previous duration 0s
SMD Platform : max 56, current 0 total 967
SMD Platform : max 272, current 2 total 33225
RADIUS: id 2, priority 2, host 172.19.208.25, auth-port 1812, acct-port 1813, hostname dnac-radius_172.19.208.25
State: current UP, duration 646540s, previous duration 20s
Platform State from SMD: current DEAD, duration 132s, previous duration 181s
SMD Platform Dead: total time 456112s, count 2735
Platform State from WNCD (1) : current UP
Platform State from WNCD (2) : current UP
Platform State from WNCD (3) : current UP
Platform State from WNCD (4) : current UP
Platform State from WNCD (5) : current UP
Platform State from WNCD (6) : current UP
Platform State from WNCD (7) : current UP
Platform State from WNCD (8) : current UP, duration 0s, previous duration 0s
SMD Platform : max 29, current 1 total 5330
SMD Platform : max 140, current 6 total 28472
SDA Fabric Edge - Intermittent AAA Server Down status impacting user/device authentication
This observed on switches upgraded from 16.12.4 to 17.6.4.
Though the radius status is UP, but Platform State from SMD is DEAD (for both radius/aaa servers)
IT-03-CNT-ES3#show aaa servers | inc auth-port|State|SMD
RADIUS: id 1, priority 1, host 172.19.208.9, auth-port 1812, acct-port 1813, hostname dnac-radius_172.19.208.9
State: current UP, duration 646545s, previous duration 14s
Platform State from SMD: current DEAD, duration 0s, previous duration 102s
SMD Platform Dead: total time 184899s, count 6970
Platform State from WNCD (1) : current UP
Platform State from WNCD (2) : current UP
Platform State from WNCD (3) : current UP
Platform State from WNCD (4) : current UP
Platform State from WNCD (5) : current UP
Platform State from WNCD (6) : current UP
Platform State from WNCD (7) : current UP
Platform State from WNCD (8) : current UP, duration 0s, previous duration 0s
SMD Platform : max 56, current 0 total 967
SMD Platform : max 272, current 2 total 33225
RADIUS: id 2, priority 2, host 172.19.208.25, auth-port 1812, acct-port 1813, hostname dnac-radius_172.19.208.25
State: current UP, duration 646540s, previous duration 20s
Platform State from SMD: current DEAD, duration 132s, previous duration 181s
SMD Platform Dead: total time 456112s, count 2735
Platform State from WNCD (1) : current UP
Platform State from WNCD (2) : current UP
Platform State from WNCD (3) : current UP
Platform State from WNCD (4) : current UP
Platform State from WNCD (5) : current UP
Platform State from WNCD (6) : current UP
Platform State from WNCD (7) : current UP
Platform State from WNCD (8) : current UP, duration 0s, previous duration 0s
SMD Platform : max 29, current 1 total 5330
SMD Platform : max 140, current 6 total 28472
resolved issue | Question: Which product is principally discussed in these documents?
Answer "NONE" if you cannot find answer in the given documents.
The ONLY product name should be selected from the given product name list: DN2-HW-APL-XL/ ASR1009-X/ C9300-48U/ DN1-HW-APL/ C9500-48Y4C/ THIRD_PARTY_PRODUCT_HW/ C9300-48U-A/ ASR1002-HX Response in this JSON format:
{"product_name": "","explanation": "", "summary": ""}
Technology: Cisco DNA Center - On-Prem
Subtechnology: Cisco Software-Defined Access (SDA Wired)
Problem Code: Error Messages, Logs, Debugs
Product: NA
Product Family: C9300
Software Version: N/A
Router/Node Name: N/A
Problem Details: SDA Fabric Edge - Intermittent AAA Server Down status impacting user/device authentication
This observed on switches upgraded from 16.12.4 to 17.6.4.
Though the radius status is UP, but Platform State from SMD is DEAD (for both radius/aaa servers)
IT-03-CNT-ES3#show aaa servers | inc auth-port|State|SMD
RADIUS: id 1, priority 1, host 172.19.208.9, auth-port 1812, acct-port 1813, hostname dnac-radius_172.19.208.9
State: current UP, duration 646545s, previous duration 14s
Platform State from SMD: current DEAD, duration 0s, previous duration 102s
SMD Platform Dead: total time 184899s, count 6970
Platform State from WNCD (1) : current UP
Platform State from WNCD (2) : current UP
Platform State from WNCD (3) : current UP
Platform State from WNCD (4) : current UP
Platform State from WNCD (5) : current UP
Platform State from WNCD (6) : current UP
Platform State from WNCD (7) : current UP
Platform State from WNCD (8) : current UP, duration 0s, previous duration 0s
SMD Platform : max 56, current 0 total 967
SMD Platform : max 272, current 2 total 33225
RADIUS: id 2, priority 2, host 172.19.208.25, auth-port 1812, acct-port 1813, hostname dnac-radius_172.19.208.25
State: current UP, duration 646540s, previous duration 20s
Platform State from SMD: current DEAD, duration 132s, previous duration 181s
SMD Platform Dead: total time 456112s, count 2735
Platform State from WNCD (1) : current UP
Platform State from WNCD (2) : current UP
Platform State from WNCD (3) : current UP
Platform State from WNCD (4) : current UP
Platform State from WNCD (5) : current UP
Platform State from WNCD (6) : current UP
Platform State from WNCD (7) : current UP
Platform State from WNCD (8) : current UP, duration 0s, previous duration 0s
SMD Platform : max 29, current 1 total 5330
SMD Platform : max 140, current 6 total 28472
SDA Fabric Edge - Intermittent AAA Server Down status impacting user/device authentication
This observed on switches upgraded from 16.12.4 to 17.6.4.
Though the radius status is UP, but Platform State from SMD is DEAD (for both radius/aaa servers)
IT-03-CNT-ES3#show aaa servers | inc auth-port|State|SMD
RADIUS: id 1, priority 1, host 172.19.208.9, auth-port 1812, acct-port 1813, hostname dnac-radius_172.19.208.9
State: current UP, duration 646545s, previous duration 14s
Platform State from SMD: current DEAD, duration 0s, previous duration 102s
SMD Platform Dead: total time 184899s, count 6970
Platform State from WNCD (1) : current UP
Platform State from WNCD (2) : current UP
Platform State from WNCD (3) : current UP
Platform State from WNCD (4) : current UP
Platform State from WNCD (5) : current UP
Platform State from WNCD (6) : current UP
Platform State from WNCD (7) : current UP
Platform State from WNCD (8) : current UP, duration 0s, previous duration 0s
SMD Platform : max 56, current 0 total 967
SMD Platform : max 272, current 2 total 33225
RADIUS: id 2, priority 2, host 172.19.208.25, auth-port 1812, acct-port 1813, hostname dnac-radius_172.19.208.25
State: current UP, duration 646540s, previous duration 20s
Platform State from SMD: current DEAD, duration 132s, previous duration 181s
SMD Platform Dead: total time 456112s, count 2735
Platform State from WNCD (1) : current UP
Platform State from WNCD (2) : current UP
Platform State from WNCD (3) : current UP
Platform State from WNCD (4) : current UP
Platform State from WNCD (5) : current UP
Platform State from WNCD (6) : current UP
Platform State from WNCD (7) : current UP
Platform State from WNCD (8) : current UP, duration 0s, previous duration 0s
SMD Platform : max 29, current 1 total 5330
SMD Platform : max 140, current 6 total 28472
resolved issue | Technology: Cisco DNA Center - On-Prem
Subtechnology: Cisco Software-Defined Access (SDA Wired)
Problem Code: Error Messages, Logs, Debugs
Product: NA
Product Family: C9300
Software Version: N/A
Router/Node Name: N/A
Problem Details: SDA Fabric Edge - Intermittent AAA Server Down status impacting user/device authentication
This observed on switches upgraded from 16.12.4 to 17.6.4.
Though the radius status is UP, but Platform State from SMD is DEAD (for both radius/aaa servers)
IT-03-CNT-ES3#show aaa servers | inc auth-port|State|SMD
RADIUS: id 1, priority 1, host 172.19.208.9, auth-port 1812, acct-port 1813, hostname dnac-radius_172.19.208.9
State: current UP, duration 646545s, previous duration 14s
Platform State from SMD: current DEAD, duration 0s, previous duration 102s
SMD Platform Dead: total time 184899s, count 6970
Platform State from WNCD (1) : current UP
Platform State from WNCD (2) : current UP
Platform State from WNCD (3) : current UP
Platform State from WNCD (4) : current UP
Platform State from WNCD (5) : current UP
Platform State from WNCD (6) : current UP
Platform State from WNCD (7) : current UP
Platform State from WNCD (8) : current UP, duration 0s, previous duration 0s
SMD Platform : max 56, current 0 total 967
SMD Platform : max 272, current 2 total 33225
RADIUS: id 2, priority 2, host 172.19.208.25, auth-port 1812, acct-port 1813, hostname dnac-radius_172.19.208.25
State: current UP, duration 646540s, previous duration 20s
Platform State from SMD: current DEAD, duration 132s, previous duration 181s
SMD Platform Dead: total time 456112s, count 2735
Platform State from WNCD (1) : current UP
Platform State from WNCD (2) : current UP
Platform State from WNCD (3) : current UP
Platform State from WNCD (4) : current UP
Platform State from WNCD (5) : current UP
Platform State from WNCD (6) : current UP
Platform State from WNCD (7) : current UP
Platform State from WNCD (8) : current UP, duration 0s, previous duration 0s
SMD Platform : max 29, current 1 total 5330
SMD Platform : max 140, current 6 total 28472 | SDA Fabric Edge - Intermittent AAA Server Down status impacting user/device authentication
This observed on switches upgraded from 16.12.4 to 17.6.4.
Though the radius status is UP, but Platform State from SMD is DEAD (for both radius/aaa servers)
IT-03-CNT-ES3#show aaa servers | inc auth-port|State|SMD
RADIUS: id 1, priority 1, host 172.19.208.9, auth-port 1812, acct-port 1813, hostname dnac-radius_172.19.208.9
State: current UP, duration 646545s, previous duration 14s
Platform State from SMD: current DEAD, duration 0s, previous duration 102s
SMD Platform Dead: total time 184899s, count 6970
Platform State from WNCD (1) : current UP
Platform State from WNCD (2) : current UP
Platform State from WNCD (3) : current UP
Platform State from WNCD (4) : current UP
Platform State from WNCD (5) : current UP
Platform State from WNCD (6) : current UP
Platform State from WNCD (7) : current UP
Platform State from WNCD (8) : current UP, duration 0s, previous duration 0s
SMD Platform : max 56, current 0 total 967
SMD Platform : max 272, current 2 total 33225
RADIUS: id 2, priority 2, host 172.19.208.25, auth-port 1812, acct-port 1813, hostname dnac-radius_172.19.208.25
State: current UP, duration 646540s, previous duration 20s
Platform State from SMD: current DEAD, duration 132s, previous duration 181s
SMD Platform Dead: total time 456112s, count 2735
Platform State from WNCD (1) : current UP
Platform State from WNCD (2) : current UP
Platform State from WNCD (3) : current UP
Platform State from WNCD (4) : current UP
Platform State from WNCD (5) : current UP
Platform State from WNCD (6) : current UP
Platform State from WNCD (7) : current UP
Platform State from WNCD (8) : current UP, duration 0s, previous duration 0s
SMD Platform : max 29, current 1 total 5330
SMD Platform : max 140, current 6 total 28472 | resolved issue | SDA Fabric Edge - Intermittent AAA Server Down status impacting user/device authentication | C9300-48U-A | 17.6.4 | 17.6.4 | 59.0 | 3 | 100.0 | Configuration Assistance (process not intuitive, too complex, inconsistent...) | C9300 | Cisco DNA Center - On-Prem | Cisco Software-Defined Access (SDA Wired) | 01t6R000006k8XpQAI | Error Messages, Logs, Debugs | Cisco Software-Defined Access (SDA Wired) | Cisco DNA Center - On-Prem | 01t15000005W0LTAA0 | nan |
694952109 | Question: Which software version is principally discussed in these documents?
Answer "NONE" if you cannot find answer in the given documents.
The ONLY software version should be selected from the given software version list: 1/ 8.10.151.0/ 8.10.171.0/ 802.11AC/ 8.5.171.0/ 8.10.183.0/ 8.10.130.0/ 8.10.171.0/ THIRD_PARTY_PRODUCT_SW/ 8.5.135.0/ 8.3.143.0/ NA-CIN_CLOSE_SW/ 8.5.140.0/ 4.0.1a/ WLC CLIENT INTEROP/ 12.0.13/ 8.5.151.0/ 8.4/ 120.13/ 8.5.160.0/ 8.10.151.0/ 8.3.143.0/ 8.3.131.0/ 8.3.150.0/ 8.5.135.0/ 8.5.161.0/ 8.10.185.0/ 8.2.166.0/ 8.5.140.0/ 8.5.151.0/ 8.3.150.0/ 16.12.3s/ WLC RRM/RF/CLEANAIR/ 8.5.151.0/ 8.10.130.0/ NA - COMPONENT ONLY/ 8.10.162.0/ 8.3.140.0/ 8.10.150.0/ 8.10.183.0/ 8.10.161.0/ 8.10.185.0/ 8.5.151.0/ 16.12.4/ 17.3.5b/ 8.10.183.0/ 8.10.171.0/ 8.5.171.0 Response in this JSON format:
{"software_version": "","explanation": "", "summary": ""}
From: [email protected]
To: "Karanam Sujith Simha -X (kasimha - ALLEGIS SERVICES INDIA PRIVATE LIMITED at Cisco)" <[email protected]>,Dubey Satyam <[email protected]>,"Karthikeyan Muthu (karmuth2)" <[email protected]>,"[email protected]" <[email protected]>
Cc: "Mohamed Issam Niyamathullah (NCS)" <[email protected]>,"Alejo Jay Mark Arcilia (NCS)" <[email protected]>,"Tan Wei Heng (NCS)" <[email protected]>,CCE Wipro NET <[email protected]>
Subject: RE: SR 694952109 Helpdesk#NCS#23478883 : Client while connecting to the AP 2802-S-K9 is facing issue after periodic time
Hi Karanam.
Thank you.
Hi Satyam,
Do u need anything else? If not I will proceed to close this case. Thank You.
Best,
VJ
From: Karanam Sujith Simha -X (kasimha - ALLEGIS SERVICES INDIA PRIVATE LIMITED at Cisco) <[email protected]>
Sent: Tuesday, 7 February 2023 12:49 pm
To: VJ Vijayadas (NCS) <[email protected]>; Dubey Satyam <[email protected]>; Karthikeyan Muthu (karmuth2) <[email protected]>; [email protected]
Cc: Mohamed Issam Niyamathullah (NCS) <[email protected]>; Alejo Jay Mark Arcilia (NCS) <[email protected]>; Tan Wei Heng (NCS) <[email protected]>; CCE Wipro NET <[email protected]>
Subject: RE: SR 694952109 Helpdesk#NCS#23478883 : Client while connecting to the AP 2802-S-K9 is facing issue after periodic time
[External email] Please be cautious when clicking on any links or attachments.
________________________________
Hi VJ,
Good day,
Please find reasons for disconnections for SDA and Non SDA environment.
CO_CLIENT_DELETE_REASON_SESSION_TIMEOUT > Session timeout> Client is deleted due to session time out. Time out occurs because of termination when no user is responding or answering.
CO_CLIENT_DELETE_REASON_IDLE_TIMEOUT> Idle timeout> Client is deleted due to session idle time out . Session time out occurs because idle time out occurs at Client not responding.
If any querys/ Issues please feel free to reach back to us.
Have a great day 😊
Thanks & Regards,
[Icon Description automatically generated]
Sujith Simha Karanam
[email protected]<mailto:[email protected]>
Cisco TAC|Wireless
Planned Leaves:
INDIA: +91 80 44263151
SHIFT:
Sunday – Thursday,9AM - 5AM US(EDT)
Monday- Friday ,6:30AM-2:30PM (IST)
Monday- Friday,12:00AM-8 PM (AEDT)
Monday- Friday,9AM- 5 PM (SGT)
Manager:
Ramya M
[email protected]<mailto:[email protected]>
Tech Leads:
[email protected]<mailto:[email protected]>
[signature_281047838]Think before you print.
This email may contain confidential and privileged material for the sole use of the intended recipient. Any review, use, distribution or disclosure by others is strictly prohibited. If you are not the intended recipient (or authorized to receive for the recipient), please contact the sender by reply email and delete all copies of this message.
Please click here<https://apc01.safelinks.protection.outlook.com/?url=http%3A%2F%2Fwww.cisco.com%2Fweb%2Fabout%2Fdoing_business%2Flegal%2Fcri%2Findex.html&data=05%7C01%7Cvj.vijayadas%40ncs.com.sg%7C75e5480bd68d42d6074208db08c6bb92%7Cca90d8f589634b6ebca99ac468bcc7a8%7C1%7C0%7C638113421947604043%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=TMO4VFLd8NpyrIoufRJTS758%2BSb7nFceexhguMMSMvE%3D&reserved=0> for Company Registration Information.
From: VJ Vijayadas (NCS) <[email protected]<mailto:[email protected]>>
Sent: 06 February 2023 11:34
To: Dubey Satyam <[email protected]<mailto:[email protected]>>; Karanam Sujith Simha -X (kasimha - ALLEGIS SERVICES INDIA PRIVATE LIMITED at Cisco) <[email protected]<mailto:[email protected]>>; Karthikeyan Muthu (karmuth2) <[email protected]<mailto:[email protected]>>; [email protected]<mailto:[email protected]>
Cc: Mohamed Issam Niyamathullah (NCS) <[email protected]<mailto:[email protected]>>; Alejo Jay Mark Arcilia (NCS) <[email protected]<mailto:[email protected]>>; Tan Wei Heng (NCS) <[email protected]<mailto:[email protected]>>; CCE Wipro NET <[email protected]<mailto:[email protected]>>
Subject: RE: SR 694952109 Helpdesk#NCS#23478883 : Client while connecting to the AP 2802-S-K9 is facing issue after periodic time
Hi Karnam,
Could you share the delete reasons known from such issues for sda and non sda client connectivity environment?
Best,
VJ
From: Dubey Satyam <[email protected]<mailto:[email protected]>>
Sent: Monday, 6 February 2023 1:59 pm
To: VJ Vijayadas (NCS) <[email protected]<mailto:[email protected]>>; Karanam Sujith Simha -X (kasimha - ALLEGIS SERVICES INDIA PRIVATE LIMITED at Cisco) <[email protected]<mailto:[email protected]>>; Karthikeyan Muthu (karmuth2) <[email protected]<mailto:[email protected]>>; [email protected]<mailto:[email protected]>
Cc: Mohamed Issam Niyamathullah (NCS) <[email protected]<mailto:[email protected]>>; Alejo Jay Mark Arcilia (NCS) <[email protected]<mailto:[email protected]>>; Tan Wei Heng (NCS) <[email protected]<mailto:[email protected]>>; CCE Wipro NET <[email protected]<mailto:[email protected]>>
Subject: RE: SR 694952109 Helpdesk#NCS#23478883 : Client while connecting to the AP 2802-S-K9 is facing issue after periodic time
[External email] Please be cautious when clicking on any links or attachments.
________________________________
Hi VJ,
We have got the clarity on the case to adjust session timeout. We are into discussion for adoption of this workaround.
My ask on last call was to share the delete reasons known from such issues for sda and non sda client connectivity environment.
This is still pending from Karnam. Once this info is provided. Please proceed with closure.
Regards,
Satyam Dubey | National University of Singapore | Architecture & Operations |
Desk Phone: (+65)-81506893| Email: [email protected]<mailto:[email protected]>
From: VJ Vijayadas (NCS) <[email protected]<mailto:[email protected]>>
Sent: Monday, 6 February 2023 11:29 am
To: Karanam Sujith Simha -X (kasimha - ALLEGIS SERVICES INDIA PRIVATE LIMITED at Cisco) <[email protected]<mailto:[email protected]>>; Dubey Satyam <[email protected]<mailto:[email protected]>>; Karthikeyan Muthu (karmuth2) <[email protected]<mailto:[email protected]>>; [email protected]<mailto:[email protected]>
Cc: Mohamed Issam Niyamathullah (NCS) <[email protected]<mailto:[email protected]>>; Alejo Jay Mark Arcilia (NCS) <[email protected]<mailto:[email protected]>>; Tan Wei Heng (NCS) <[email protected]<mailto:[email protected]>>; CCE Wipro NET <[email protected]<mailto:[email protected]>>
Subject: RE: SR 694952109 Helpdesk#NCS#23478883 : Client while connecting to the AP 2802-S-K9 is facing issue after periodic time
- External Email -
Hi Satyam,
Do you require any other assistance regarding this case? if not, we will proceed to close this ticket. Thank You.
Best,
VJ
From: Karanam Sujith Simha -X (kasimha - ALLEGIS SERVICES INDIA PRIVATE LIMITED at Cisco) <[email protected]<mailto:[email protected]>>
Sent: Monday, 6 February 2023 10:38 am
To: VJ Vijayadas (NCS) <[email protected]<mailto:[email protected]>>; Dubey Satyam <[email protected]<mailto:[email protected]>>; Karthikeyan Muthu (karmuth2) <[email protected]<mailto:[email protected]>>; [email protected]<mailto:[email protected]>
Cc: Mohamed Issam Niyamathullah (NCS) <[email protected]<mailto:[email protected]>>; Alejo Jay Mark Arcilia (NCS) <[email protected]<mailto:[email protected]>>; Tan Wei Heng (NCS) <[email protected]<mailto:[email protected]>>; CCE Wipro NET <[email protected]<mailto:[email protected]>>
Subject: RE: SR 694952109 Helpdesk#NCS#23478883 : Client while connecting to the AP 2802-S-K9 is facing issue after periodic time
[External email] Please be cautious when clicking on any links or attachments.
________________________________
Hi VJ,
Good day,
I hope you are doing great,
Can I know is there any assistance required on this case?
If any queries/ Issues please feel free to reach back to us.
Thanks & Regards,
[Icon Description automatically generated]
Sujith Simha Karanam
[email protected]<mailto:[email protected]>
Cisco TAC|Wireless
Planned Leaves:
INDIA: +91 80 44263151
SHIFT:
Sunday – Thursday,9AM - 5AM US(EDT)
Monday- Friday ,6:30AM-2:30PM (IST)
Monday- Friday,12:00AM-8 PM (AEDT)
Monday- Friday,9AM- 5 PM (SGT)
Manager:
Ramya M
[email protected]<mailto:[email protected]>
Tech Leads:
[email protected]<mailto:[email protected]>
[signature_281047838]Think before you print.
This email may contain confidential and privileged material for the sole use of the intended recipient. Any review, use, distribution or disclosure by others is strictly prohibited. If you are not the intended recipient (or authorized to receive for the recipient), please contact the sender by reply email and delete all copies of this message.
Please click here<https://apc01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fddec1-0-en-ctp.trendmicro.com%2Fwis%2Fclicktime%2Fv1%2Fquery%3Furl%3Dhttps%253a%252f%252fapc01.safelinks.protection.outlook.com%252f%253furl%253dhttp%25253A%25252F%25252Fwww.cisco.com%25252Fweb%25252Fabout%25252Fdoing_business%25252Flegal%25252Fcri%25252Findex.html%2526data%253d05%25257C01%25257Cvj.vijayadas%252540ncs.com.sg%25257Ca2133a262a064a82dae508db07eb2b6a%25257Cca90d8f589634b6ebca99ac468bcc7a8%25257C1%25257C0%25257C638112478927901895%25257CUnknown%25257CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%25253D%25257C3000%25257C%25257C%25257C%2526sdata%253d5EB9zhbRctNQHjLTCZyAl5LSCGwDy%25252FONagz4RviFfTQ%25253D%2526reserved%253d0%26umid%3D3584dd66-fcee-46bc-9e92-375d49bad412%26auth%3D32813f2e647ebb91b39d0b35ac97db1efa82dd64-22fdb2439cb33c1ab5c3d5ff1e22201c5da83495&data=05%7C01%7Cvj.vijayadas%40ncs.com.sg%7C75e5480bd68d42d6074208db08c6bb92%7Cca90d8f589634b6ebca99ac468bcc7a8%7C1%7C0%7C638113421947604043%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=ssgFp7%2FUAWmtzhqAeXThl3oV2c4Dl4%2Bhdu%2Fromfc5Aw%3D&reserved=0> for Company Registration Information.
From: Karanam Sujith Simha -X (kasimha - ALLEGIS SERVICES INDIA PRIVATE LIMITED at Cisco)
Sent: 02 February 2023 08:03
To: VJ Vijayadas (NCS) <[email protected]<mailto:[email protected]>>; Dubey Satyam <[email protected]<mailto:[email protected]>>; Karthikeyan Muthu (karmuth2) <[email protected]<mailto:[email protected]>>
Cc: Mohamed Issam Niyamathullah (NCS) <[email protected]<mailto:[email protected]>>; Alejo Jay Mark Arcilia (NCS) <[email protected]<mailto:[email protected]>>; Tan Wei Heng (NCS) <[email protected]<mailto:[email protected]>>; CCE Wipro NET <[email protected]<mailto:[email protected]>>
Subject: RE: SR 694952109 Helpdesk#NCS#23478883 : Client while connecting to the AP 2802-S-K9 is facing issue after periodic time
HI VJ,
Good day,
Thanks for your time over call,
Please find call summary,
As per discussion over call, Session time out should be configured to 84000 seconds and 3600 idle time out.
Current configuration 7200 is minimum session time out time,
Please update Session time out and idle time out as per best practice.
Attached link for reference:
Cisco Wireless LAN Controller (WLC) Configuration Best Practices - Cisco<https://apc01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fddec1-0-en-ctp.trendmicro.com%2Fwis%2Fclicktime%2Fv1%2Fquery%3Furl%3Dhttps%253a%252f%252fapc01.safelinks.protection.outlook.com%252f%253furl%253dhttps%25253A%25252F%25252Fwww.cisco.com%25252Fc%25252Fen%25252Fus%25252Ftd%25252Fdocs%25252Fwireless%25252Fcontroller%25252Ftechnotes%25252F8-6%25252Fb_Cisco_Wireless_LAN_Controller_Configuration_Best_Practices.html%2526data%253d05%25257C01%25257Cvj.vijayadas%252540ncs.com.sg%25257Ca2133a262a064a82dae508db07eb2b6a%25257Cca90d8f589634b6ebca99ac468bcc7a8%25257C1%25257C0%25257C638112478927901895%25257CUnknown%25257CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%25253D%25257C3000%25257C%25257C%25257C%2526sdata%253dbl61KB9krPuB2HovEcBPPtq%25252BrKu3hTzZjT3fedcDQDA%25253D%2526reserved%253d0%26umid%3D3584dd66-fcee-46bc-9e92-375d49bad412%26auth%3D32813f2e647ebb91b39d0b35ac97db1efa82dd64-4d77f7350e6280d16e1161e378aa6a914f848465&data=05%7C01%7Cvj.vijayadas%40ncs.com.sg%7C75e5480bd68d42d6074208db08c6bb92%7Cca90d8f589634b6ebca99ac468bcc7a8%7C1%7C0%7C638113421947604043%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=r43FOFLAqMfGwHxsum76UZeaZhSING1KWqVbfMh%2F8k4%3D&reserved=0>
Thanks & Regards,
[Icon Description automatically generated]
Sujith Simha Karanam
[email protected]<mailto:[email protected]>
Cisco TAC|Wireless
Planned Leaves:
INDIA: +91 80 44263151
SHIFT:
Sunday – Thursday,9AM - 5AM US(EDT)
Monday- Friday ,6:30AM-2:30PM (IST)
Monday- Friday,12:00AM-8 PM (AEDT)
Monday- Friday,9AM- 5 PM (SGT)
Manager:
Ramya M
[email protected]<mailto:[email protected]>
Tech Leads:
[email protected]<mailto:[email protected]>
[signature_281047838]Think before you print.
This email may contain confidential and privileged material for the sole use of the intended recipient. Any review, use, distribution or disclosure by others is strictly prohibited. If you are not the intended recipient (or authorized to receive for the recipient), please contact the sender by reply email and delete all copies of this message.
Please click here<https://apc01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fddec1-0-en-ctp.trendmicro.com%2Fwis%2Fclicktime%2Fv1%2Fquery%3Furl%3Dhttps%253a%252f%252fapc01.safelinks.protection.outlook.com%252f%253furl%253dhttp%25253A%25252F%25252Fwww.cisco.com%25252Fweb%25252Fabout%25252Fdoing_business%25252Flegal%25252Fcri%25252Findex.html%2526data%253d05%25257C01%25257Cvj.vijayadas%252540ncs.com.sg%25257Ca2133a262a064a82dae508db07eb2b6a%25257Cca90d8f589634b6ebca99ac468bcc7a8%25257C1%25257C0%25257C638112478927901895%25257CUnknown%25257CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%25253D%25257C3000%25257C%25257C%25257C%2526sdata%253d5EB9zhbRctNQHjLTCZyAl5LSCGwDy%25252FONagz4RviFfTQ%25253D%2526reserved%253d0%26umid%3D3584dd66-fcee-46bc-9e92-375d49bad412%26auth%3D32813f2e647ebb91b39d0b35ac97db1efa82dd64-22fdb2439cb33c1ab5c3d5ff1e22201c5da83495&data=05%7C01%7Cvj.vijayadas%40ncs.com.sg%7C75e5480bd68d42d6074208db08c6bb92%7Cca90d8f589634b6ebca99ac468bcc7a8%7C1%7C0%7C638113421947604043%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=ssgFp7%2FUAWmtzhqAeXThl3oV2c4Dl4%2Bhdu%2Fromfc5Aw%3D&reserved=0> for Company Registration Information.
From: Karanam Sujith Simha -X (kasimha - ALLEGIS SERVICES INDIA PRIVATE LIMITED at Cisco)
Sent: 01 February 2023 10:15
To: VJ Vijayadas (NCS) <[email protected]<mailto:[email protected]>>; Dubey Satyam <[email protected]<mailto:[email protected]>>; Karthikeyan Muthu (karmuth2) <[email protected]<mailto:[email protected]>>
Cc: Mohamed Issam Niyamathullah (NCS) <[email protected]<mailto:[email protected]>>; Alejo Jay Mark Arcilia (NCS) <[email protected]<mailto:[email protected]>>; Tan Wei Heng (NCS) <[email protected]<mailto:[email protected]>>; CCE Wipro NET <[email protected]<mailto:[email protected]>>
Subject: RE: SR 694952109 Helpdesk#NCS#23478883 : Client while connecting to the AP 2802-S-K9 is facing issue after periodic time
HI VJ,
Good day,
Please join the session.
https://cisco.webex.com/ciscosales/j.php?MTID=m2cc007e651c8ae9736187f43fc025c18<https://apc01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fddec1-0-en-ctp.trendmicro.com%2Fwis%2Fclicktime%2Fv1%2Fquery%3Furl%3Dhttps%253a%252f%252fapc01.safelinks.protection.outlook.com%252f%253furl%253dhttps%25253A%25252F%25252Fcisco.webex.com%25252Fciscosales%25252Fj.php%25253FMTID%25253Dm2cc007e651c8ae9736187f43fc025c18%2526data%253d05%25257C01%25257Cvj.vijayadas%252540ncs.com.sg%25257Ca2133a262a064a82dae508db07eb2b6a%25257Cca90d8f589634b6ebca99ac468bcc7a8%25257C1%25257C0%25257C638112478927901895%25257CUnknown%25257CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%25253D%25257C3000%25257C%25257C%25257C%2526sdata%253dHBcUEAOWmyA02ca%25252BDjHi1KjjOXrP1ClQbSRVgc8TeVw%25253D%2526reserved%253d0%26umid%3D3584dd66-fcee-46bc-9e92-375d49bad412%26auth%3D32813f2e647ebb91b39d0b35ac97db1efa82dd64-062aae967eb8c0846313395fd450b7010d517101&data=05%7C01%7Cvj.vijayadas%40ncs.com.sg%7C75e5480bd68d42d6074208db08c6bb92%7Cca90d8f589634b6ebca99ac468bcc7a8%7C1%7C0%7C638113421947604043%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=Fzu8kgX1LJInuU%2FInBITTXw5oUX2QolBWwQ52%2BYXvfI%3D&reserved=0>.
Thanks & Regards,
[Icon Description automatically generated]
Sujith Simha Karanam
[email protected]<mailto:[email protected]>
Cisco TAC|Wireless
Planned Leaves:
INDIA: +91 80 44263151
SHIFT:
Sunday – Thursday,9AM - 5AM US(EDT)
Monday- Friday ,6:30AM-2:30PM (IST)
Monday- Friday,12:00AM-8 PM (AEDT)
Monday- Friday,9AM- 5 PM (SGT)
Manager:
Ramya M
[email protected]<mailto:[email protected]>
Tech Leads:
[email protected]<mailto:[email protected]>
[signature_281047838]Think before you print.
This email may contain confidential and privileged material for the sole use of the intended recipient. Any review, use, distribution or disclosure by others is strictly prohibited. If you are not the intended recipient (or authorized to receive for the recipient), please contact the sender by reply email and delete all copies of this message.
Please click here<https://apc01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fddec1-0-en-ctp.trendmicro.com%2Fwis%2Fclicktime%2Fv1%2Fquery%3Furl%3Dhttps%253a%252f%252fapc01.safelinks.protection.outlook.com%252f%253furl%253dhttp%25253A%25252F%25252Fwww.cisco.com%25252Fweb%25252Fabout%25252Fdoing_business%25252Flegal%25252Fcri%25252Findex.html%2526data%253d05%25257C01%25257Cvj.vijayadas%252540ncs.com.sg%25257Ca2133a262a064a82dae508db07eb2b6a%25257Cca90d8f589634b6ebca99ac468bcc7a8%25257C1%25257C0%25257C638112478927901895%25257CUnknown%25257CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%25253D%25257C3000%25257C%25257C%25257C%2526sdata%253d5EB9zhbRctNQHjLTCZyAl5LSCGwDy%25252FONagz4RviFfTQ%25253D%2526reserved%253d0%26umid%3D3584dd66-fcee-46bc-9e92-375d49bad412%26auth%3D32813f2e647ebb91b39d0b35ac97db1efa82dd64-22fdb2439cb33c1ab5c3d5ff1e22201c5da83495&data=05%7C01%7Cvj.vijayadas%40ncs.com.sg%7C75e5480bd68d42d6074208db08c6bb92%7Cca90d8f589634b6ebca99ac468bcc7a8%7C1%7C0%7C638113421947604043%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=ssgFp7%2FUAWmtzhqAeXThl3oV2c4Dl4%2Bhdu%2Fromfc5Aw%3D&reserved=0> for Company Registration Information.
From: Karanam Sujith Simha -X (kasimha - ALLEGIS SERVICES INDIA PRIVATE LIMITED at Cisco)
Sent: 01 February 2023 07:40
To: VJ Vijayadas (NCS) <[email protected]<mailto:[email protected]>>; Dubey Satyam <[email protected]<mailto:[email protected]>>; Karthikeyan Muthu (karmuth2) <[email protected]<mailto:[email protected]>>
Cc: Mohamed Issam Niyamathullah (NCS) <[email protected]<mailto:[email protected]>>; Alejo Jay Mark Arcilia (NCS) <[email protected]<mailto:[email protected]>>; Tan Wei Heng (NCS) <[email protected]<mailto:[email protected]>>; CCE Wipro NET <[email protected]<mailto:[email protected]>>
Subject: RE: SR 694952109 Helpdesk#NCS#23478883 : Client while connecting to the AP 2802-S-K9 is facing issue after periodic time
Hi VJ,
Good day,
Sure will have session at 12 Noon.
Thanks & Regards,
[Icon Description automatically generated]
Sujith Simha Karanam
[email protected]<mailto:[email protected]>
Cisco TAC|Wireless
Planned Leaves:
INDIA: +91 80 44263151
SHIFT:
Sunday – Thursday,9AM - 5AM US(EDT)
Monday- Friday ,6:30AM-2:30PM (IST)
Monday- Friday,12:00AM-8 PM (AEDT)
Monday- Friday,9AM- 5 PM (SGT)
Manager:
Ramya M
[email protected]<mailto:[email protected]>
Tech Leads:
[email protected]<mailto:[email protected]>
[signature_281047838]Think before you print.
This email may contain confidential and privileged material for the sole use of the intended recipient. Any review, use, distribution or disclosure by others is strictly prohibited. If you are not the intended recipient (or authorized to receive for the recipient), please contact the sender by reply email and delete all copies of this message.
Please click here<https://apc01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fddec1-0-en-ctp.trendmicro.com%2Fwis%2Fclicktime%2Fv1%2Fquery%3Furl%3Dhttps%253a%252f%252fapc01.safelinks.protection.outlook.com%252f%253furl%253dhttp%25253A%25252F%25252Fwww.cisco.com%25252Fweb%25252Fabout%25252Fdoing_business%25252Flegal%25252Fcri%25252Findex.html%2526data%253d05%25257C01%25257Cvj.vijayadas%252540ncs.com.sg%25257Ca2133a262a064a82dae508db07eb2b6a%25257Cca90d8f589634b6ebca99ac468bcc7a8%25257C1%25257C0%25257C638112478927901895%25257CUnknown%25257CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%25253D%25257C3000%25257C%25257C%25257C%2526sdata%253d5EB9zhbRctNQHjLTCZyAl5LSCGwDy%25252FONagz4RviFfTQ%25253D%2526reserved%253d0%26umid%3D3584dd66-fcee-46bc-9e92-375d49bad412%26auth%3D32813f2e647ebb91b39d0b35ac97db1efa82dd64-22fdb2439cb33c1ab5c3d5ff1e22201c5da83495&data=05%7C01%7Cvj.vijayadas%40ncs.com.sg%7C75e5480bd68d42d6074208db08c6bb92%7Cca90d8f589634b6ebca99ac468bcc7a8%7C1%7C0%7C638113421947760277%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=cKtCjdcN4RoUli30pjcRcYVVLtQNCxS2buFd177mUdk%3D&reserved=0> for Company Registration Information.
From: VJ Vijayadas (NCS) <[email protected]<mailto:[email protected]>>
Sent: 01 February 2023 07:22
To: Dubey Satyam <[email protected]<mailto:[email protected]>>; Karanam Sujith Simha -X (kasimha - ALLEGIS SERVICES INDIA PRIVATE LIMITED at Cisco) <[email protected]<mailto:[email protected]>>; Karthikeyan Muthu (karmuth2) <[email protected]<mailto:[email protected]>>
Cc: Mohamed Issam Niyamathullah (NCS) <[email protected]<mailto:[email protected]>>; Alejo Jay Mark Arcilia (NCS) <[email protected]<mailto:[email protected]>>; Tan Wei Heng (NCS) <[email protected]<mailto:[email protected]>>; CCE Wipro NET <[email protected]<mailto:[email protected]>>
Subject: RE: SR 694952109 Helpdesk#NCS#23478883 : Client while connecting to the AP 2802-S-K9 is facing issue after periodic time
Hi Karanam,
Please do confirm your availability for today at 12 noon SGT time. Please also send the Webex meeting link. Thank you.
Best,
VJ
From: Dubey Satyam <[email protected]<mailto:[email protected]>>
Sent: Tuesday, 31 January 2023 5:46 pm
To: Karanam Sujith Simha -X (kasimha - ALLEGIS SERVICES INDIA PRIVATE LIMITED at Cisco) <[email protected]<mailto:[email protected]>>; VJ Vijayadas (NCS) <[email protected]<mailto:[email protected]>>; Karthikeyan Muthu (karmuth2) <[email protected]<mailto:[email protected]>>
Cc: Mohamed Issam Niyamathullah (NCS) <[email protected]<mailto:[email protected]>>; Alejo Jay Mark Arcilia (NCS) <[email protected]<mailto:[email protected]>>; Tan Wei Heng (NCS) <[email protected]<mailto:[email protected]>>; CCE Wipro NET <[email protected]<mailto:[email protected]>>
Subject: RE: SR 694952109 Helpdesk#NCS#23478883 : Client while connecting to the AP 2802-S-K9 is facing issue after periodic time
[External email] Please be cautious when clicking on any links or attachments.
________________________________
Hi Karnam,
I understand you were busy today.
I am available tomorrow at 12 noon SGT.
Regards,
Satyam Dubey | National University of Singapore | Architecture & Operations |
Desk Phone: (+65)-81506893| Email: [email protected]<mailto:[email protected]>
From: Karanam Sujith Simha -X (kasimha - ALLEGIS SERVICES INDIA PRIVATE LIMITED at Cisco) <[email protected]<mailto:[email protected]>>
Sent: Tuesday, 31 January 2023 4:09 pm
To: VJ Vijayadas (NCS) <[email protected]<mailto:[email protected]>>; Dubey Satyam <[email protected]<mailto:[email protected]>>; Karthikeyan Muthu (karmuth2) <[email protected]<mailto:[email protected]>>
Cc: Mohamed Issam Niyamathullah (NCS) <[email protected]<mailto:[email protected]>>; Alejo Jay Mark Arcilia (NCS) <[email protected]<mailto:[email protected]>>; Tan Wei Heng (NCS) <[email protected]<mailto:[email protected]>>; CCE Wipro NET <[email protected]<mailto:[email protected]>>
Subject: RE: SR 694952109 Helpdesk#NCS#23478883 : Client while connecting to the AP 2802-S-K9 is facing issue after periodic time
- External Email -
HI Satyam,
Good day,
Can we have session Tomorrow at 10 AM IST?
Thanks & Regards,
[Icon Description automatically generated]
Sujith Simha Karanam
[email protected]<mailto:[email protected]>
Cisco TAC|Wireless
Planned Leaves:
INDIA: +91 80 44263151
SHIFT:
Sunday – Thursday,9AM - 5AM US(EDT)
Monday- Friday ,6:30AM-2:30PM (IST)
Monday- Friday,12:00AM-8 PM (AEDT)
Monday- Friday,9AM- 5 PM (SGT)
Manager:
Ramya M
[email protected]<mailto:[email protected]>
Tech Leads:
[email protected]<mailto:[email protected]>
[signature_281047838]Think before you print.
This email may contain confidential and privileged material for the sole use of the intended recipient. Any review, use, distribution or disclosure by others is strictly prohibited. If you are not the intended recipient (or authorized to receive for the recipient), please contact the sender by reply email and delete all copies of this message.
Please click here<https://apc01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fddec1-0-en-ctp.trendmicro.com%2Fwis%2Fclicktime%2Fv1%2Fquery%3Furl%3Dhttps%253a%252f%252fapc01.safelinks.protection.outlook.com%252f%253furl%253dhttps%25253A%25252F%25252Fddec1-0-en-ctp.trendmicro.com%25252Fwis%25252Fclicktime%25252Fv1%25252Fquery%25253Furl%25253Dhttp%2525253a%2525252f%2525252fwww.cisco.com%2525252fweb%2525252fabout%2525252fdoing_business%2525252flegal%2525252fcri%2525252findex.html%252526umid%25253D72662d66-9684-4ef8-abee-d45b9d63eb6e%252526auth%25253D32813f2e647ebb91b39d0b35ac97db1efa82dd64-b539bcf3bc3e4dcf17e4f42207be4cf2da93c523%2526data%253d05%25257C01%25257Cvj.vijayadas%252540ncs.com.sg%25257Ca2133a262a064a82dae508db07eb2b6a%25257Cca90d8f589634b6ebca99ac468bcc7a8%25257C1%25257C0%25257C638112478927901895%25257CUnknown%25257CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%25253D%25257C3000%25257C%25257C%25257C%2526sdata%253dQn8cMd5AFiEcSneteK9GMUReuL8%25252FaPJa1z5AJ%25252Fs3qSM%25253D%2526reserved%253d0%26umid%3D3584dd66-fcee-46bc-9e92-375d49bad412%26auth%3D32813f2e647ebb91b39d0b35ac97db1efa82dd64-388e8af5373285eacf5dba6d40e257c29b0cf14d&data=05%7C01%7Cvj.vijayadas%40ncs.com.sg%7C75e5480bd68d42d6074208db08c6bb92%7Cca90d8f589634b6ebca99ac468bcc7a8%7C1%7C0%7C638113421947760277%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=Rt1wKAYwB4uAwGLvlIbXjuqHHgJn0UY7IssGASK6X3c%3D&reserved=0> for Company Registration Information.
From: VJ Vijayadas (NCS) <[email protected]<mailto:[email protected]>>
Sent: 31 January 2023 13:37
To: Karanam Sujith Simha -X (kasimha - ALLEGIS SERVICES INDIA PRIVATE LIMITED at Cisco) <[email protected]<mailto:[email protected]>>; Dubey Satyam <[email protected]<mailto:[email protected]>>; Karthikeyan Muthu (karmuth2) <[email protected]<mailto:[email protected]>>
Cc: Mohamed Issam Niyamathullah (NCS) <[email protected]<mailto:[email protected]>>; Alejo Jay Mark Arcilia (NCS) <[email protected]<mailto:[email protected]>>; Tan Wei Heng (NCS) <[email protected]<mailto:[email protected]>>; CCE Wipro NET <[email protected]<mailto:[email protected]>>
Subject: RE: SR 694952109 Helpdesk#NCS#23478883 : Client while connecting to the AP 2802-S-K9 is facing issue after periodic time
Hi Satyam,
Could you confirm your availability for tomorrow?
Best,
VJ
From: Karanam Sujith Simha -X (kasimha - ALLEGIS SERVICES INDIA PRIVATE LIMITED at Cisco) <[email protected]<mailto:[email protected]>>
Sent: Tuesday, 31 January 2023 4:04 pm
To: VJ Vijayadas (NCS) <[email protected]<mailto:[email protected]>>; Dubey Satyam <[email protected]<mailto:[email protected]>>; Karthikeyan Muthu (karmuth2) <[email protected]<mailto:[email protected]>>
Cc: Mohamed Issam Niyamathullah (NCS) <[email protected]<mailto:[email protected]>>; Alejo Jay Mark Arcilia (NCS) <[email protected]<mailto:[email protected]>>; Tan Wei Heng (NCS) <[email protected]<mailto:[email protected]>>; CCE Wipro NET <[email protected]<mailto:[email protected]>>
Subject: RE: SR 694952109 Helpdesk#NCS#23478883 : Client while connecting to the AP 2802-S-K9 is facing issue after periodic time
[External email] Please be cautious when clicking on any links or attachments.
________________________________
Hi VJ,
Good day,
Apologies for delay today,
Can we have session tomorrow ?
Thanks & Regards,
[Icon Description automatically generated]
Sujith Simha Karanam
[email protected]<mailto:[email protected]>
Cisco TAC|Wireless
Planned Leaves:
INDIA: +91 80 44263151
SHIFT:
Sunday – Thursday,9AM - 5AM US(EDT)
Monday- Friday ,6:30AM-2:30PM (IST)
Monday- Friday,12:00AM-8 PM (AEDT)
Monday- Friday,9AM- 5 PM (SGT)
Manager:
Ramya M
[email protected]<mailto:[email protected]>
Tech Leads:
[email protected]<mailto:[email protected]>
[signature_281047838]Think before you print.
This email may contain confidential and privileged material for the sole use of the intended recipient. Any review, use, distribution or disclosure by others is strictly prohibited. If you are not the intended recipient (or authorized to recei
The E-mail body was longer than 32KB, So it was added as an Attachment (20230206-225245899_mail.txt).
File Name:20230206-225245876_image001.gif
https://mycase.cloudapps.cisco.com/694952109/attach?fileID=63e1d91fab68d9015699401a
File Name:20230206-225245891_image002.gif
https://mycase.cloudapps.cisco.com/694952109/attach?fileID=63e1d921ab68d9015699401c
File Name:20230206-225245894_image003.png
https://mycase.cloudapps.cisco.com/694952109/attach?fileID=63e1d923fa32462b94404da4
File Name:20230206-225245899_mail.txt
https://mycase.cloudapps.cisco.com/694952109/attach?fileID=63e1d925fa32462b94404da8
Software Version: -- => 8.10.162.0
Technology: Wireless
Subtechnology: 8540 Series Wireless LAN Controller (AIR-CT8540)
Problem Code: Interoperability
Product: NA
Product Family: AIRCTA2
Software Version: N/A
Router/Node Name: N/A
Problem Details: Hi Support,
Please find below info.
- What is current version of WLC? – 8.10.162.0
- Is this only having this issue with connected client? – we are observing this from multiple clients across 2802i’s.
- Were there any changes in config/topo in prior this issue. - None
- What is the impact? How many users affected. - VIP’s in CLIB.
Technology: Wireless
Subtechnology: 8540 Series Wireless LAN Controller (AIR-CT8540)
Problem Code: Interoperability
Product: NA
Product Family: AIRCTA2
Software Version: N/A
Router/Node Name: N/A
Problem Details: Hi Support,
Please find below info.
- What is current version of WLC? – 8.10.162.0
- Is this only having this issue with connected client? – we are observing this from multiple clients across 2802i’s.
- Were there any changes in config/topo in prior this issue. - None
- What is the impact? How many users affected. - VIP’s in CLIB.
Hi Support,
Please find below info.
- What is current version of WLC? – 8.10.162.0
- Is this only having this issue with connected client? – we are observing this from multiple clients across 2802i’s.
- Were there any changes in config/topo in prior this issue. - None
- What is the impact? How many users affected. - VIP’s in CLIB.
timestamp : 2023-02-11T02:22:40.000+0000 || updatedby : kasimha || type : RESOLUTION SUMMARY || visibility : External || details : Please find call summary,
As per discussion over call, Session time out should be configured to 84000 seconds and 3600 idle time out.
Current configuration 7200 is minimum session time out time,
Please update Session time out and idle time out as per best practice.
Attached link for reference:
Cisco Wireless LAN Controller (WLC) Configuration Best Practices - Cisco | Question: Which product is principally discussed in these documents?
Answer "NONE" if you cannot find answer in the given documents.
The ONLY product name should be selected from the given product name list: AIR-CT8540-1K-K9/ AIR-CT8540-K9/ NA-CIN_CLOSE_HW/ C9120AXI-S/ THIRD_PARTY_PRODUCT_HW/ AIR-CT8540-CA-K9/ AIR-AP2802I-S-K9/ AIR-CT8540-K9Z/ AIR-BZL-C240M4/ DN2-HW-APL-XL/ WLC-AP-T/ AIR-CT8540-SW-8.2 Response in this JSON format:
{"product_name": "","explanation": "", "summary": ""}
From: [email protected]
To: "Karanam Sujith Simha -X (kasimha - ALLEGIS SERVICES INDIA PRIVATE LIMITED at Cisco)" <[email protected]>,Dubey Satyam <[email protected]>,"Karthikeyan Muthu (karmuth2)" <[email protected]>,"[email protected]" <[email protected]>
Cc: "Mohamed Issam Niyamathullah (NCS)" <[email protected]>,"Alejo Jay Mark Arcilia (NCS)" <[email protected]>,"Tan Wei Heng (NCS)" <[email protected]>,CCE Wipro NET <[email protected]>
Subject: RE: SR 694952109 Helpdesk#NCS#23478883 : Client while connecting to the AP 2802-S-K9 is facing issue after periodic time
Hi Karanam.
Thank you.
Hi Satyam,
Do u need anything else? If not I will proceed to close this case. Thank You.
Best,
VJ
From: Karanam Sujith Simha -X (kasimha - ALLEGIS SERVICES INDIA PRIVATE LIMITED at Cisco) <[email protected]>
Sent: Tuesday, 7 February 2023 12:49 pm
To: VJ Vijayadas (NCS) <[email protected]>; Dubey Satyam <[email protected]>; Karthikeyan Muthu (karmuth2) <[email protected]>; [email protected]
Cc: Mohamed Issam Niyamathullah (NCS) <[email protected]>; Alejo Jay Mark Arcilia (NCS) <[email protected]>; Tan Wei Heng (NCS) <[email protected]>; CCE Wipro NET <[email protected]>
Subject: RE: SR 694952109 Helpdesk#NCS#23478883 : Client while connecting to the AP 2802-S-K9 is facing issue after periodic time
[External email] Please be cautious when clicking on any links or attachments.
________________________________
Hi VJ,
Good day,
Please find reasons for disconnections for SDA and Non SDA environment.
CO_CLIENT_DELETE_REASON_SESSION_TIMEOUT > Session timeout> Client is deleted due to session time out. Time out occurs because of termination when no user is responding or answering.
CO_CLIENT_DELETE_REASON_IDLE_TIMEOUT> Idle timeout> Client is deleted due to session idle time out . Session time out occurs because idle time out occurs at Client not responding.
If any querys/ Issues please feel free to reach back to us.
Have a great day 😊
Thanks & Regards,
[Icon Description automatically generated]
Sujith Simha Karanam
[email protected]<mailto:[email protected]>
Cisco TAC|Wireless
Planned Leaves:
INDIA: +91 80 44263151
SHIFT:
Sunday – Thursday,9AM - 5AM US(EDT)
Monday- Friday ,6:30AM-2:30PM (IST)
Monday- Friday,12:00AM-8 PM (AEDT)
Monday- Friday,9AM- 5 PM (SGT)
Manager:
Ramya M
[email protected]<mailto:[email protected]>
Tech Leads:
[email protected]<mailto:[email protected]>
[signature_281047838]Think before you print.
This email may contain confidential and privileged material for the sole use of the intended recipient. Any review, use, distribution or disclosure by others is strictly prohibited. If you are not the intended recipient (or authorized to receive for the recipient), please contact the sender by reply email and delete all copies of this message.
Please click here<https://apc01.safelinks.protection.outlook.com/?url=http%3A%2F%2Fwww.cisco.com%2Fweb%2Fabout%2Fdoing_business%2Flegal%2Fcri%2Findex.html&data=05%7C01%7Cvj.vijayadas%40ncs.com.sg%7C75e5480bd68d42d6074208db08c6bb92%7Cca90d8f589634b6ebca99ac468bcc7a8%7C1%7C0%7C638113421947604043%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=TMO4VFLd8NpyrIoufRJTS758%2BSb7nFceexhguMMSMvE%3D&reserved=0> for Company Registration Information.
From: VJ Vijayadas (NCS) <[email protected]<mailto:[email protected]>>
Sent: 06 February 2023 11:34
To: Dubey Satyam <[email protected]<mailto:[email protected]>>; Karanam Sujith Simha -X (kasimha - ALLEGIS SERVICES INDIA PRIVATE LIMITED at Cisco) <[email protected]<mailto:[email protected]>>; Karthikeyan Muthu (karmuth2) <[email protected]<mailto:[email protected]>>; [email protected]<mailto:[email protected]>
Cc: Mohamed Issam Niyamathullah (NCS) <[email protected]<mailto:[email protected]>>; Alejo Jay Mark Arcilia (NCS) <[email protected]<mailto:[email protected]>>; Tan Wei Heng (NCS) <[email protected]<mailto:[email protected]>>; CCE Wipro NET <[email protected]<mailto:[email protected]>>
Subject: RE: SR 694952109 Helpdesk#NCS#23478883 : Client while connecting to the AP 2802-S-K9 is facing issue after periodic time
Hi Karnam,
Could you share the delete reasons known from such issues for sda and non sda client connectivity environment?
Best,
VJ
From: Dubey Satyam <[email protected]<mailto:[email protected]>>
Sent: Monday, 6 February 2023 1:59 pm
To: VJ Vijayadas (NCS) <[email protected]<mailto:[email protected]>>; Karanam Sujith Simha -X (kasimha - ALLEGIS SERVICES INDIA PRIVATE LIMITED at Cisco) <[email protected]<mailto:[email protected]>>; Karthikeyan Muthu (karmuth2) <[email protected]<mailto:[email protected]>>; [email protected]<mailto:[email protected]>
Cc: Mohamed Issam Niyamathullah (NCS) <[email protected]<mailto:[email protected]>>; Alejo Jay Mark Arcilia (NCS) <[email protected]<mailto:[email protected]>>; Tan Wei Heng (NCS) <[email protected]<mailto:[email protected]>>; CCE Wipro NET <[email protected]<mailto:[email protected]>>
Subject: RE: SR 694952109 Helpdesk#NCS#23478883 : Client while connecting to the AP 2802-S-K9 is facing issue after periodic time
[External email] Please be cautious when clicking on any links or attachments.
________________________________
Hi VJ,
We have got the clarity on the case to adjust session timeout. We are into discussion for adoption of this workaround.
My ask on last call was to share the delete reasons known from such issues for sda and non sda client connectivity environment.
This is still pending from Karnam. Once this info is provided. Please proceed with closure.
Regards,
Satyam Dubey | National University of Singapore | Architecture & Operations |
Desk Phone: (+65)-81506893| Email: [email protected]<mailto:[email protected]>
From: VJ Vijayadas (NCS) <[email protected]<mailto:[email protected]>>
Sent: Monday, 6 February 2023 11:29 am
To: Karanam Sujith Simha -X (kasimha - ALLEGIS SERVICES INDIA PRIVATE LIMITED at Cisco) <[email protected]<mailto:[email protected]>>; Dubey Satyam <[email protected]<mailto:[email protected]>>; Karthikeyan Muthu (karmuth2) <[email protected]<mailto:[email protected]>>; [email protected]<mailto:[email protected]>
Cc: Mohamed Issam Niyamathullah (NCS) <[email protected]<mailto:[email protected]>>; Alejo Jay Mark Arcilia (NCS) <[email protected]<mailto:[email protected]>>; Tan Wei Heng (NCS) <[email protected]<mailto:[email protected]>>; CCE Wipro NET <[email protected]<mailto:[email protected]>>
Subject: RE: SR 694952109 Helpdesk#NCS#23478883 : Client while connecting to the AP 2802-S-K9 is facing issue after periodic time
- External Email -
Hi Satyam,
Do you require any other assistance regarding this case? if not, we will proceed to close this ticket. Thank You.
Best,
VJ
From: Karanam Sujith Simha -X (kasimha - ALLEGIS SERVICES INDIA PRIVATE LIMITED at Cisco) <[email protected]<mailto:[email protected]>>
Sent: Monday, 6 February 2023 10:38 am
To: VJ Vijayadas (NCS) <[email protected]<mailto:[email protected]>>; Dubey Satyam <[email protected]<mailto:[email protected]>>; Karthikeyan Muthu (karmuth2) <[email protected]<mailto:[email protected]>>; [email protected]<mailto:[email protected]>
Cc: Mohamed Issam Niyamathullah (NCS) <[email protected]<mailto:[email protected]>>; Alejo Jay Mark Arcilia (NCS) <[email protected]<mailto:[email protected]>>; Tan Wei Heng (NCS) <[email protected]<mailto:[email protected]>>; CCE Wipro NET <[email protected]<mailto:[email protected]>>
Subject: RE: SR 694952109 Helpdesk#NCS#23478883 : Client while connecting to the AP 2802-S-K9 is facing issue after periodic time
[External email] Please be cautious when clicking on any links or attachments.
________________________________
Hi VJ,
Good day,
I hope you are doing great,
Can I know is there any assistance required on this case?
If any queries/ Issues please feel free to reach back to us.
Thanks & Regards,
[Icon Description automatically generated]
Sujith Simha Karanam
[email protected]<mailto:[email protected]>
Cisco TAC|Wireless
Planned Leaves:
INDIA: +91 80 44263151
SHIFT:
Sunday – Thursday,9AM - 5AM US(EDT)
Monday- Friday ,6:30AM-2:30PM (IST)
Monday- Friday,12:00AM-8 PM (AEDT)
Monday- Friday,9AM- 5 PM (SGT)
Manager:
Ramya M
[email protected]<mailto:[email protected]>
Tech Leads:
[email protected]<mailto:[email protected]>
[signature_281047838]Think before you print.
This email may contain confidential and privileged material for the sole use of the intended recipient. Any review, use, distribution or disclosure by others is strictly prohibited. If you are not the intended recipient (or authorized to receive for the recipient), please contact the sender by reply email and delete all copies of this message.
Please click here<https://apc01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fddec1-0-en-ctp.trendmicro.com%2Fwis%2Fclicktime%2Fv1%2Fquery%3Furl%3Dhttps%253a%252f%252fapc01.safelinks.protection.outlook.com%252f%253furl%253dhttp%25253A%25252F%25252Fwww.cisco.com%25252Fweb%25252Fabout%25252Fdoing_business%25252Flegal%25252Fcri%25252Findex.html%2526data%253d05%25257C01%25257Cvj.vijayadas%252540ncs.com.sg%25257Ca2133a262a064a82dae508db07eb2b6a%25257Cca90d8f589634b6ebca99ac468bcc7a8%25257C1%25257C0%25257C638112478927901895%25257CUnknown%25257CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%25253D%25257C3000%25257C%25257C%25257C%2526sdata%253d5EB9zhbRctNQHjLTCZyAl5LSCGwDy%25252FONagz4RviFfTQ%25253D%2526reserved%253d0%26umid%3D3584dd66-fcee-46bc-9e92-375d49bad412%26auth%3D32813f2e647ebb91b39d0b35ac97db1efa82dd64-22fdb2439cb33c1ab5c3d5ff1e22201c5da83495&data=05%7C01%7Cvj.vijayadas%40ncs.com.sg%7C75e5480bd68d42d6074208db08c6bb92%7Cca90d8f589634b6ebca99ac468bcc7a8%7C1%7C0%7C638113421947604043%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=ssgFp7%2FUAWmtzhqAeXThl3oV2c4Dl4%2Bhdu%2Fromfc5Aw%3D&reserved=0> for Company Registration Information.
From: Karanam Sujith Simha -X (kasimha - ALLEGIS SERVICES INDIA PRIVATE LIMITED at Cisco)
Sent: 02 February 2023 08:03
To: VJ Vijayadas (NCS) <[email protected]<mailto:[email protected]>>; Dubey Satyam <[email protected]<mailto:[email protected]>>; Karthikeyan Muthu (karmuth2) <[email protected]<mailto:[email protected]>>
Cc: Mohamed Issam Niyamathullah (NCS) <[email protected]<mailto:[email protected]>>; Alejo Jay Mark Arcilia (NCS) <[email protected]<mailto:[email protected]>>; Tan Wei Heng (NCS) <[email protected]<mailto:[email protected]>>; CCE Wipro NET <[email protected]<mailto:[email protected]>>
Subject: RE: SR 694952109 Helpdesk#NCS#23478883 : Client while connecting to the AP 2802-S-K9 is facing issue after periodic time
HI VJ,
Good day,
Thanks for your time over call,
Please find call summary,
As per discussion over call, Session time out should be configured to 84000 seconds and 3600 idle time out.
Current configuration 7200 is minimum session time out time,
Please update Session time out and idle time out as per best practice.
Attached link for reference:
Cisco Wireless LAN Controller (WLC) Configuration Best Practices - Cisco<https://apc01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fddec1-0-en-ctp.trendmicro.com%2Fwis%2Fclicktime%2Fv1%2Fquery%3Furl%3Dhttps%253a%252f%252fapc01.safelinks.protection.outlook.com%252f%253furl%253dhttps%25253A%25252F%25252Fwww.cisco.com%25252Fc%25252Fen%25252Fus%25252Ftd%25252Fdocs%25252Fwireless%25252Fcontroller%25252Ftechnotes%25252F8-6%25252Fb_Cisco_Wireless_LAN_Controller_Configuration_Best_Practices.html%2526data%253d05%25257C01%25257Cvj.vijayadas%252540ncs.com.sg%25257Ca2133a262a064a82dae508db07eb2b6a%25257Cca90d8f589634b6ebca99ac468bcc7a8%25257C1%25257C0%25257C638112478927901895%25257CUnknown%25257CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%25253D%25257C3000%25257C%25257C%25257C%2526sdata%253dbl61KB9krPuB2HovEcBPPtq%25252BrKu3hTzZjT3fedcDQDA%25253D%2526reserved%253d0%26umid%3D3584dd66-fcee-46bc-9e92-375d49bad412%26auth%3D32813f2e647ebb91b39d0b35ac97db1efa82dd64-4d77f7350e6280d16e1161e378aa6a914f848465&data=05%7C01%7Cvj.vijayadas%40ncs.com.sg%7C75e5480bd68d42d6074208db08c6bb92%7Cca90d8f589634b6ebca99ac468bcc7a8%7C1%7C0%7C638113421947604043%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=r43FOFLAqMfGwHxsum76UZeaZhSING1KWqVbfMh%2F8k4%3D&reserved=0>
Thanks & Regards,
[Icon Description automatically generated]
Sujith Simha Karanam
[email protected]<mailto:[email protected]>
Cisco TAC|Wireless
Planned Leaves:
INDIA: +91 80 44263151
SHIFT:
Sunday – Thursday,9AM - 5AM US(EDT)
Monday- Friday ,6:30AM-2:30PM (IST)
Monday- Friday,12:00AM-8 PM (AEDT)
Monday- Friday,9AM- 5 PM (SGT)
Manager:
Ramya M
[email protected]<mailto:[email protected]>
Tech Leads:
[email protected]<mailto:[email protected]>
[signature_281047838]Think before you print.
This email may contain confidential and privileged material for the sole use of the intended recipient. Any review, use, distribution or disclosure by others is strictly prohibited. If you are not the intended recipient (or authorized to receive for the recipient), please contact the sender by reply email and delete all copies of this message.
Please click here<https://apc01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fddec1-0-en-ctp.trendmicro.com%2Fwis%2Fclicktime%2Fv1%2Fquery%3Furl%3Dhttps%253a%252f%252fapc01.safelinks.protection.outlook.com%252f%253furl%253dhttp%25253A%25252F%25252Fwww.cisco.com%25252Fweb%25252Fabout%25252Fdoing_business%25252Flegal%25252Fcri%25252Findex.html%2526data%253d05%25257C01%25257Cvj.vijayadas%252540ncs.com.sg%25257Ca2133a262a064a82dae508db07eb2b6a%25257Cca90d8f589634b6ebca99ac468bcc7a8%25257C1%25257C0%25257C638112478927901895%25257CUnknown%25257CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%25253D%25257C3000%25257C%25257C%25257C%2526sdata%253d5EB9zhbRctNQHjLTCZyAl5LSCGwDy%25252FONagz4RviFfTQ%25253D%2526reserved%253d0%26umid%3D3584dd66-fcee-46bc-9e92-375d49bad412%26auth%3D32813f2e647ebb91b39d0b35ac97db1efa82dd64-22fdb2439cb33c1ab5c3d5ff1e22201c5da83495&data=05%7C01%7Cvj.vijayadas%40ncs.com.sg%7C75e5480bd68d42d6074208db08c6bb92%7Cca90d8f589634b6ebca99ac468bcc7a8%7C1%7C0%7C638113421947604043%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=ssgFp7%2FUAWmtzhqAeXThl3oV2c4Dl4%2Bhdu%2Fromfc5Aw%3D&reserved=0> for Company Registration Information.
From: Karanam Sujith Simha -X (kasimha - ALLEGIS SERVICES INDIA PRIVATE LIMITED at Cisco)
Sent: 01 February 2023 10:15
To: VJ Vijayadas (NCS) <[email protected]<mailto:[email protected]>>; Dubey Satyam <[email protected]<mailto:[email protected]>>; Karthikeyan Muthu (karmuth2) <[email protected]<mailto:[email protected]>>
Cc: Mohamed Issam Niyamathullah (NCS) <[email protected]<mailto:[email protected]>>; Alejo Jay Mark Arcilia (NCS) <[email protected]<mailto:[email protected]>>; Tan Wei Heng (NCS) <[email protected]<mailto:[email protected]>>; CCE Wipro NET <[email protected]<mailto:[email protected]>>
Subject: RE: SR 694952109 Helpdesk#NCS#23478883 : Client while connecting to the AP 2802-S-K9 is facing issue after periodic time
HI VJ,
Good day,
Please join the session.
https://cisco.webex.com/ciscosales/j.php?MTID=m2cc007e651c8ae9736187f43fc025c18<https://apc01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fddec1-0-en-ctp.trendmicro.com%2Fwis%2Fclicktime%2Fv1%2Fquery%3Furl%3Dhttps%253a%252f%252fapc01.safelinks.protection.outlook.com%252f%253furl%253dhttps%25253A%25252F%25252Fcisco.webex.com%25252Fciscosales%25252Fj.php%25253FMTID%25253Dm2cc007e651c8ae9736187f43fc025c18%2526data%253d05%25257C01%25257Cvj.vijayadas%252540ncs.com.sg%25257Ca2133a262a064a82dae508db07eb2b6a%25257Cca90d8f589634b6ebca99ac468bcc7a8%25257C1%25257C0%25257C638112478927901895%25257CUnknown%25257CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%25253D%25257C3000%25257C%25257C%25257C%2526sdata%253dHBcUEAOWmyA02ca%25252BDjHi1KjjOXrP1ClQbSRVgc8TeVw%25253D%2526reserved%253d0%26umid%3D3584dd66-fcee-46bc-9e92-375d49bad412%26auth%3D32813f2e647ebb91b39d0b35ac97db1efa82dd64-062aae967eb8c0846313395fd450b7010d517101&data=05%7C01%7Cvj.vijayadas%40ncs.com.sg%7C75e5480bd68d42d6074208db08c6bb92%7Cca90d8f589634b6ebca99ac468bcc7a8%7C1%7C0%7C638113421947604043%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=Fzu8kgX1LJInuU%2FInBITTXw5oUX2QolBWwQ52%2BYXvfI%3D&reserved=0>.
Thanks & Regards,
[Icon Description automatically generated]
Sujith Simha Karanam
[email protected]<mailto:[email protected]>
Cisco TAC|Wireless
Planned Leaves:
INDIA: +91 80 44263151
SHIFT:
Sunday – Thursday,9AM - 5AM US(EDT)
Monday- Friday ,6:30AM-2:30PM (IST)
Monday- Friday,12:00AM-8 PM (AEDT)
Monday- Friday,9AM- 5 PM (SGT)
Manager:
Ramya M
[email protected]<mailto:[email protected]>
Tech Leads:
[email protected]<mailto:[email protected]>
[signature_281047838]Think before you print.
This email may contain confidential and privileged material for the sole use of the intended recipient. Any review, use, distribution or disclosure by others is strictly prohibited. If you are not the intended recipient (or authorized to receive for the recipient), please contact the sender by reply email and delete all copies of this message.
Please click here<https://apc01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fddec1-0-en-ctp.trendmicro.com%2Fwis%2Fclicktime%2Fv1%2Fquery%3Furl%3Dhttps%253a%252f%252fapc01.safelinks.protection.outlook.com%252f%253furl%253dhttp%25253A%25252F%25252Fwww.cisco.com%25252Fweb%25252Fabout%25252Fdoing_business%25252Flegal%25252Fcri%25252Findex.html%2526data%253d05%25257C01%25257Cvj.vijayadas%252540ncs.com.sg%25257Ca2133a262a064a82dae508db07eb2b6a%25257Cca90d8f589634b6ebca99ac468bcc7a8%25257C1%25257C0%25257C638112478927901895%25257CUnknown%25257CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%25253D%25257C3000%25257C%25257C%25257C%2526sdata%253d5EB9zhbRctNQHjLTCZyAl5LSCGwDy%25252FONagz4RviFfTQ%25253D%2526reserved%253d0%26umid%3D3584dd66-fcee-46bc-9e92-375d49bad412%26auth%3D32813f2e647ebb91b39d0b35ac97db1efa82dd64-22fdb2439cb33c1ab5c3d5ff1e22201c5da83495&data=05%7C01%7Cvj.vijayadas%40ncs.com.sg%7C75e5480bd68d42d6074208db08c6bb92%7Cca90d8f589634b6ebca99ac468bcc7a8%7C1%7C0%7C638113421947604043%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=ssgFp7%2FUAWmtzhqAeXThl3oV2c4Dl4%2Bhdu%2Fromfc5Aw%3D&reserved=0> for Company Registration Information.
From: Karanam Sujith Simha -X (kasimha - ALLEGIS SERVICES INDIA PRIVATE LIMITED at Cisco)
Sent: 01 February 2023 07:40
To: VJ Vijayadas (NCS) <[email protected]<mailto:[email protected]>>; Dubey Satyam <[email protected]<mailto:[email protected]>>; Karthikeyan Muthu (karmuth2) <[email protected]<mailto:[email protected]>>
Cc: Mohamed Issam Niyamathullah (NCS) <[email protected]<mailto:[email protected]>>; Alejo Jay Mark Arcilia (NCS) <[email protected]<mailto:[email protected]>>; Tan Wei Heng (NCS) <[email protected]<mailto:[email protected]>>; CCE Wipro NET <[email protected]<mailto:[email protected]>>
Subject: RE: SR 694952109 Helpdesk#NCS#23478883 : Client while connecting to the AP 2802-S-K9 is facing issue after periodic time
Hi VJ,
Good day,
Sure will have session at 12 Noon.
Thanks & Regards,
[Icon Description automatically generated]
Sujith Simha Karanam
[email protected]<mailto:[email protected]>
Cisco TAC|Wireless
Planned Leaves:
INDIA: +91 80 44263151
SHIFT:
Sunday – Thursday,9AM - 5AM US(EDT)
Monday- Friday ,6:30AM-2:30PM (IST)
Monday- Friday,12:00AM-8 PM (AEDT)
Monday- Friday,9AM- 5 PM (SGT)
Manager:
Ramya M
[email protected]<mailto:[email protected]>
Tech Leads:
[email protected]<mailto:[email protected]>
[signature_281047838]Think before you print.
This email may contain confidential and privileged material for the sole use of the intended recipient. Any review, use, distribution or disclosure by others is strictly prohibited. If you are not the intended recipient (or authorized to receive for the recipient), please contact the sender by reply email and delete all copies of this message.
Please click here<https://apc01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fddec1-0-en-ctp.trendmicro.com%2Fwis%2Fclicktime%2Fv1%2Fquery%3Furl%3Dhttps%253a%252f%252fapc01.safelinks.protection.outlook.com%252f%253furl%253dhttp%25253A%25252F%25252Fwww.cisco.com%25252Fweb%25252Fabout%25252Fdoing_business%25252Flegal%25252Fcri%25252Findex.html%2526data%253d05%25257C01%25257Cvj.vijayadas%252540ncs.com.sg%25257Ca2133a262a064a82dae508db07eb2b6a%25257Cca90d8f589634b6ebca99ac468bcc7a8%25257C1%25257C0%25257C638112478927901895%25257CUnknown%25257CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%25253D%25257C3000%25257C%25257C%25257C%2526sdata%253d5EB9zhbRctNQHjLTCZyAl5LSCGwDy%25252FONagz4RviFfTQ%25253D%2526reserved%253d0%26umid%3D3584dd66-fcee-46bc-9e92-375d49bad412%26auth%3D32813f2e647ebb91b39d0b35ac97db1efa82dd64-22fdb2439cb33c1ab5c3d5ff1e22201c5da83495&data=05%7C01%7Cvj.vijayadas%40ncs.com.sg%7C75e5480bd68d42d6074208db08c6bb92%7Cca90d8f589634b6ebca99ac468bcc7a8%7C1%7C0%7C638113421947760277%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=cKtCjdcN4RoUli30pjcRcYVVLtQNCxS2buFd177mUdk%3D&reserved=0> for Company Registration Information.
From: VJ Vijayadas (NCS) <[email protected]<mailto:[email protected]>>
Sent: 01 February 2023 07:22
To: Dubey Satyam <[email protected]<mailto:[email protected]>>; Karanam Sujith Simha -X (kasimha - ALLEGIS SERVICES INDIA PRIVATE LIMITED at Cisco) <[email protected]<mailto:[email protected]>>; Karthikeyan Muthu (karmuth2) <[email protected]<mailto:[email protected]>>
Cc: Mohamed Issam Niyamathullah (NCS) <[email protected]<mailto:[email protected]>>; Alejo Jay Mark Arcilia (NCS) <[email protected]<mailto:[email protected]>>; Tan Wei Heng (NCS) <[email protected]<mailto:[email protected]>>; CCE Wipro NET <[email protected]<mailto:[email protected]>>
Subject: RE: SR 694952109 Helpdesk#NCS#23478883 : Client while connecting to the AP 2802-S-K9 is facing issue after periodic time
Hi Karanam,
Please do confirm your availability for today at 12 noon SGT time. Please also send the Webex meeting link. Thank you.
Best,
VJ
From: Dubey Satyam <[email protected]<mailto:[email protected]>>
Sent: Tuesday, 31 January 2023 5:46 pm
To: Karanam Sujith Simha -X (kasimha - ALLEGIS SERVICES INDIA PRIVATE LIMITED at Cisco) <[email protected]<mailto:[email protected]>>; VJ Vijayadas (NCS) <[email protected]<mailto:[email protected]>>; Karthikeyan Muthu (karmuth2) <[email protected]<mailto:[email protected]>>
Cc: Mohamed Issam Niyamathullah (NCS) <[email protected]<mailto:[email protected]>>; Alejo Jay Mark Arcilia (NCS) <[email protected]<mailto:[email protected]>>; Tan Wei Heng (NCS) <[email protected]<mailto:[email protected]>>; CCE Wipro NET <[email protected]<mailto:[email protected]>>
Subject: RE: SR 694952109 Helpdesk#NCS#23478883 : Client while connecting to the AP 2802-S-K9 is facing issue after periodic time
[External email] Please be cautious when clicking on any links or attachments.
________________________________
Hi Karnam,
I understand you were busy today.
I am available tomorrow at 12 noon SGT.
Regards,
Satyam Dubey | National University of Singapore | Architecture & Operations |
Desk Phone: (+65)-81506893| Email: [email protected]<mailto:[email protected]>
From: Karanam Sujith Simha -X (kasimha - ALLEGIS SERVICES INDIA PRIVATE LIMITED at Cisco) <[email protected]<mailto:[email protected]>>
Sent: Tuesday, 31 January 2023 4:09 pm
To: VJ Vijayadas (NCS) <[email protected]<mailto:[email protected]>>; Dubey Satyam <[email protected]<mailto:[email protected]>>; Karthikeyan Muthu (karmuth2) <[email protected]<mailto:[email protected]>>
Cc: Mohamed Issam Niyamathullah (NCS) <[email protected]<mailto:[email protected]>>; Alejo Jay Mark Arcilia (NCS) <[email protected]<mailto:[email protected]>>; Tan Wei Heng (NCS) <[email protected]<mailto:[email protected]>>; CCE Wipro NET <[email protected]<mailto:[email protected]>>
Subject: RE: SR 694952109 Helpdesk#NCS#23478883 : Client while connecting to the AP 2802-S-K9 is facing issue after periodic time
- External Email -
HI Satyam,
Good day,
Can we have session Tomorrow at 10 AM IST?
Thanks & Regards,
[Icon Description automatically generated]
Sujith Simha Karanam
[email protected]<mailto:[email protected]>
Cisco TAC|Wireless
Planned Leaves:
INDIA: +91 80 44263151
SHIFT:
Sunday – Thursday,9AM - 5AM US(EDT)
Monday- Friday ,6:30AM-2:30PM (IST)
Monday- Friday,12:00AM-8 PM (AEDT)
Monday- Friday,9AM- 5 PM (SGT)
Manager:
Ramya M
[email protected]<mailto:[email protected]>
Tech Leads:
[email protected]<mailto:[email protected]>
[signature_281047838]Think before you print.
This email may contain confidential and privileged material for the sole use of the intended recipient. Any review, use, distribution or disclosure by others is strictly prohibited. If you are not the intended recipient (or authorized to receive for the recipient), please contact the sender by reply email and delete all copies of this message.
Please click here<https://apc01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fddec1-0-en-ctp.trendmicro.com%2Fwis%2Fclicktime%2Fv1%2Fquery%3Furl%3Dhttps%253a%252f%252fapc01.safelinks.protection.outlook.com%252f%253furl%253dhttps%25253A%25252F%25252Fddec1-0-en-ctp.trendmicro.com%25252Fwis%25252Fclicktime%25252Fv1%25252Fquery%25253Furl%25253Dhttp%2525253a%2525252f%2525252fwww.cisco.com%2525252fweb%2525252fabout%2525252fdoing_business%2525252flegal%2525252fcri%2525252findex.html%252526umid%25253D72662d66-9684-4ef8-abee-d45b9d63eb6e%252526auth%25253D32813f2e647ebb91b39d0b35ac97db1efa82dd64-b539bcf3bc3e4dcf17e4f42207be4cf2da93c523%2526data%253d05%25257C01%25257Cvj.vijayadas%252540ncs.com.sg%25257Ca2133a262a064a82dae508db07eb2b6a%25257Cca90d8f589634b6ebca99ac468bcc7a8%25257C1%25257C0%25257C638112478927901895%25257CUnknown%25257CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%25253D%25257C3000%25257C%25257C%25257C%2526sdata%253dQn8cMd5AFiEcSneteK9GMUReuL8%25252FaPJa1z5AJ%25252Fs3qSM%25253D%2526reserved%253d0%26umid%3D3584dd66-fcee-46bc-9e92-375d49bad412%26auth%3D32813f2e647ebb91b39d0b35ac97db1efa82dd64-388e8af5373285eacf5dba6d40e257c29b0cf14d&data=05%7C01%7Cvj.vijayadas%40ncs.com.sg%7C75e5480bd68d42d6074208db08c6bb92%7Cca90d8f589634b6ebca99ac468bcc7a8%7C1%7C0%7C638113421947760277%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=Rt1wKAYwB4uAwGLvlIbXjuqHHgJn0UY7IssGASK6X3c%3D&reserved=0> for Company Registration Information.
From: VJ Vijayadas (NCS) <[email protected]<mailto:[email protected]>>
Sent: 31 January 2023 13:37
To: Karanam Sujith Simha -X (kasimha - ALLEGIS SERVICES INDIA PRIVATE LIMITED at Cisco) <[email protected]<mailto:[email protected]>>; Dubey Satyam <[email protected]<mailto:[email protected]>>; Karthikeyan Muthu (karmuth2) <[email protected]<mailto:[email protected]>>
Cc: Mohamed Issam Niyamathullah (NCS) <[email protected]<mailto:[email protected]>>; Alejo Jay Mark Arcilia (NCS) <[email protected]<mailto:[email protected]>>; Tan Wei Heng (NCS) <[email protected]<mailto:[email protected]>>; CCE Wipro NET <[email protected]<mailto:[email protected]>>
Subject: RE: SR 694952109 Helpdesk#NCS#23478883 : Client while connecting to the AP 2802-S-K9 is facing issue after periodic time
Hi Satyam,
Could you confirm your availability for tomorrow?
Best,
VJ
From: Karanam Sujith Simha -X (kasimha - ALLEGIS SERVICES INDIA PRIVATE LIMITED at Cisco) <[email protected]<mailto:[email protected]>>
Sent: Tuesday, 31 January 2023 4:04 pm
To: VJ Vijayadas (NCS) <[email protected]<mailto:[email protected]>>; Dubey Satyam <[email protected]<mailto:[email protected]>>; Karthikeyan Muthu (karmuth2) <[email protected]<mailto:[email protected]>>
Cc: Mohamed Issam Niyamathullah (NCS) <[email protected]<mailto:[email protected]>>; Alejo Jay Mark Arcilia (NCS) <[email protected]<mailto:[email protected]>>; Tan Wei Heng (NCS) <[email protected]<mailto:[email protected]>>; CCE Wipro NET <[email protected]<mailto:[email protected]>>
Subject: RE: SR 694952109 Helpdesk#NCS#23478883 : Client while connecting to the AP 2802-S-K9 is facing issue after periodic time
[External email] Please be cautious when clicking on any links or attachments.
________________________________
Hi VJ,
Good day,
Apologies for delay today,
Can we have session tomorrow ?
Thanks & Regards,
[Icon Description automatically generated]
Sujith Simha Karanam
[email protected]<mailto:[email protected]>
Cisco TAC|Wireless
Planned Leaves:
INDIA: +91 80 44263151
SHIFT:
Sunday – Thursday,9AM - 5AM US(EDT)
Monday- Friday ,6:30AM-2:30PM (IST)
Monday- Friday,12:00AM-8 PM (AEDT)
Monday- Friday,9AM- 5 PM (SGT)
Manager:
Ramya M
[email protected]<mailto:[email protected]>
Tech Leads:
[email protected]<mailto:[email protected]>
[signature_281047838]Think before you print.
This email may contain confidential and privileged material for the sole use of the intended recipient. Any review, use, distribution or disclosure by others is strictly prohibited. If you are not the intended recipient (or authorized to recei
The E-mail body was longer than 32KB, So it was added as an Attachment (20230206-225245899_mail.txt).
File Name:20230206-225245876_image001.gif
https://mycase.cloudapps.cisco.com/694952109/attach?fileID=63e1d91fab68d9015699401a
File Name:20230206-225245891_image002.gif
https://mycase.cloudapps.cisco.com/694952109/attach?fileID=63e1d921ab68d9015699401c
File Name:20230206-225245894_image003.png
https://mycase.cloudapps.cisco.com/694952109/attach?fileID=63e1d923fa32462b94404da4
File Name:20230206-225245899_mail.txt
https://mycase.cloudapps.cisco.com/694952109/attach?fileID=63e1d925fa32462b94404da8
Technology: Wireless
Subtechnology: 8540 Series Wireless LAN Controller (AIR-CT8540)
Problem Code: Interoperability
Product: NA
Product Family: AIRCTA2
Software Version: N/A
Router/Node Name: N/A
Problem Details: Hi Support,
Please find below info.
- What is current version of WLC? – 8.10.162.0
- Is this only having this issue with connected client? – we are observing this from multiple clients across 2802i’s.
- Were there any changes in config/topo in prior this issue. - None
- What is the impact? How many users affected. - VIP’s in CLIB.
Hi Support,
Please find below info.
- What is current version of WLC? – 8.10.162.0
- Is this only having this issue with connected client? – we are observing this from multiple clients across 2802i’s.
- Were there any changes in config/topo in prior this issue. - None
- What is the impact? How many users affected. - VIP’s in CLIB.
timestamp : 2023-02-11T02:22:40.000+0000 || updatedby : kasimha || type : RESOLUTION SUMMARY || visibility : External || details : Please find call summary,
As per discussion over call, Session time out should be configured to 84000 seconds and 3600 idle time out.
Current configuration 7200 is minimum session time out time,
Please update Session time out and idle time out as per best practice.
Attached link for reference:
Cisco Wireless LAN Controller (WLC) Configuration Best Practices - Cisco | Technology: Wireless
Subtechnology: 8540 Series Wireless LAN Controller (AIR-CT8540)
Problem Code: Interoperability
Product: NA
Product Family: AIRCTA2
Software Version: N/A
Router/Node Name: N/A
Problem Details: Hi Support,
Please find below info.
- What is current version of WLC? – 8.10.162.0
- Is this only having this issue with connected client? – we are observing this from multiple clients across 2802i’s.
- Were there any changes in config/topo in prior this issue. - None
- What is the impact? How many users affected. - VIP’s in CLIB. | Hi Support,
Please find below info.
- What is current version of WLC? – 8.10.162.0
- Is this only having this issue with connected client? – we are observing this from multiple clients across 2802i’s.
- Were there any changes in config/topo in prior this issue. - None
- What is the impact? How many users affected. - VIP’s in CLIB. | timestamp : 2023-02-11T02:22:40.000+0000 || updatedby : kasimha || type : RESOLUTION SUMMARY || visibility : External || details : Please find call summary,
As per discussion over call, Session time out should be configured to 84000 seconds and 3600 idle time out.
Current configuration 7200 is minimum session time out time,
Please update Session time out and idle time out as per best practice.
Attached link for reference:
Cisco Wireless LAN Controller (WLC) Configuration Best Practices - Cisco | nan | AIR-CT8540-K9Z | MFG_CTVM_SMALL_8.10.171.0.iso | nan | nan | 3 | nan | Debug/Diagnostic Capability (missing, incomplete, cryptic...) | AIRCTA2 | Wireless | 8540 Series Wireless LAN Controller (AIR-CT8540) | nan | nan | nan | nan | nan | nan |
694831371 | Question: Which software version is principally discussed in these documents?
Answer "NONE" if you cannot find answer in the given documents.
The ONLY software version should be selected from the given software version list: NA - COMPONENT ONLY/ 2.2.3.4/ 16.12.04/ 2.1.2.7/ 2.2.2.9/ 2.2.2.8/ 1.3.1.4/ 2.3.3.4/ 2.3.3.7/ 2.2.2.8/ 1.3.3.7/ 17.03.03/ 2.1.2.7/ 1.3.3.7/ 2.2.2.9/ 2.3.3.7/ 16.12.4/ 2.2.3.5/ 2.2.3.6/ 2.2.2.9/ 4.0.4b/ 2.2.3.4/ 2.2.2.8/ 2.1.2.6/ 2.2.3.5 Response in this JSON format:
{"software_version": "","explanation": "", "summary": ""}
SDA DNAC - C9300 NETCONF SSH access not working using TACACS authentication
9300-48U Version 16.12.
DNAC 2.2.2.9
Thanks for your time during Webex session today.
Please find a brief summary below:
DNAC version: 2.2.2.9
ISE version: 2.7
NETCONF not working for switches when customer is using TACACS credentials and it works fine when local credentials are used.
On switch logs we are seeing following message:
Jan 8 2023 13:58:22.107 SGT: %DMI-5-AUTHENTICATION_FAILED: Switch 1 R0/0: dmiauthd: Authentication failure from 172.18.12.20:49803 for netconf over ssh.
Jan 8 2023 13:58:27.304 SGT: %DMI-5-AUTHENTICATION_FAILED: Switch 1 R0/0: dmiauthd: Authentication failure from 172.18.12.20:10261 for netconf over ssh.
We added following AAA config on switch and NETCONF started working using TACACS credentials:
aaa authentication login default group dnac-network-tacacs-group local
aaa authorization exec default group dnac-network-tacacs-group local if-authenticated
This is an expected behaviour with NETCONF while using TACACS credentials as documented under https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvy47909 and we need to continue using workaround by applying above AAA commands using a CLI template to all switches where NETCONF will be enabled.
I will work with Dev team to updated affected version for this bug.
Regarding the other issue where DNAC is unable to login to switch using NETCONF when TACACS credentials are used we found that AAA request hits deny shell access rule because remote address is missing in the request due to which it cannot match same permit rule which is used when you use your own TACACS credential.
I will work with Manjunath to validate this behaviour in lab and see if we are able to replicate same.
Please upload all the debugs and sessions logs regarding this issue to the TAC case.
Please find below the requested details.
1.
Which DNAC version are you running?
2.2.2.9
2.
Could you please briefly describe the Business Impact this issue has on your operations (Low / Medium / High)?
Medium
1.
Is this a single node or a three-node cluster?
3-node cluster
1.
Is your appliance a DN1 or DN2?
DN2
1.
Please let me know your availability for a call.
You can send me the invitie
Software Version: -- => 2.2.2.9
Technology: Cisco DNA Center - On-Prem
Subtechnology: Cisco DNA Center - Infrastructure (Services, UI, API, etc.)
Problem Code: Error Messages, Logs, Debugs
Product: NA
Product Family: DNAHW
Software Version: N/A
Router/Node Name: N/A
Problem Details: SDA DNAC - C9300 NETCONF SSH access not working using TACACS authentication
SDA DNAC - C9300 NETCONF SSH access not working using TACACS authentication
timestamp : 2023-04-25T03:36:32.000+0000 || updatedby : bochinna || type : RESOLUTION SUMMARY || visibility : External || details : Resolution Summary
=====================
When DNAC ssh’s to NAD on the traditional port, its passes through and Inventory collection and other automation feature works as anticipated. However, when its SSH’s over 830 on Netconf, it’s gets denied.
The denial occurs because Netconf yang packet doesn’t contain remote address (DNAC address) in the TACAS request. This is a known behavior, and an enhancement has been raised for this CSCvx47585 | Question: Which product is principally discussed in these documents?
Answer "NONE" if you cannot find answer in the given documents.
The ONLY product name should be selected from the given product name list: DN1-HW-APL/ DN2-HW-APL/ DN2-HW-APL-XL/ C9300-48UN/ DN2-HW-APL-L/ DN2-HW-APL-U/ C9300-48U Response in this JSON format:
{"product_name": "","explanation": "", "summary": ""}
Resolution Summary
=====================
When DNAC ssh’s to NAD on the traditional port, its passes through and Inventory collection and other automation feature works as anticipated. However, when its SSH’s over 830 on Netconf, it’s gets denied.
The denial occurs because Netconf yang packet doesn’t contain remote address (DNAC address) in the TACAS request. This is a known behavior, and an enhancement has been raised for this CSCvx47585
Thanks for the case closure confirmation over WebExTeams on the 18th April.
It’s always a pleasure working with you and looking forward to work with you in the future 😊
I will proceed to close this SR.
It’s me again.
How are we tracking on this SR?
Have you upgraded the test switch to 17.4 or 17.6 version.
If so, please test Netconf ssh and let you know if you require further assistance.
NETCONF not working for switches when customer is using TACACS credentials and it works fine when local credentials are used.
%DMI-5-AUTHENTICATION_FAILED: Switch 1 R0/0: dmiauthd: Authentication failure from 172.18.12.20:54946 for netconf over ssh.
This is a known issue, Defect ID has been provided to the customer.
SDA DNAC - C9300 NETCONF SSH access not working using TACACS authentication
9300-48U Version 16.12.
DNAC 2.2.2.9
This is a known issue, Defect ID has been provided to the customer.
TAC to provide a patched list for the defect
Thanks for the update and it was lovely connecting with you over the Webex.
I understand that you have the below safety net measure to secure any ssh request that reaches ISE with DNAC managed username.
When DNAC ssh’s to NAD on the traditional port, its passes through and Inventory collection and other automation feature works as anticipated.
However, when its SSH’s over 830 on Netconf, it’s gets denied.
The denial occurs because Netconf yang packet doesn’t conatin remote address (DNAC address) in the TACAS request.
This is a known behaviour and an enhancement has been raised for this
https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx47585
Please allow me to identify if the patched versions work and suggest you one.
This case has been already updated.
Below is the update:
We appreciate your continuous patience working with Cisco Sydney TAC on this SR.
I have taken over this SR from Hitesh.
Please allow me to review the case, work with Hitesh to clarify the case details should it be required and come back to you with an action plan.
As per your usual communication preference, I’ll reach out to you on Webex teams.
To work with Manjunath and validate this behaviour in lab and see if we are able to replicate same where remote address is missing when we use TACACS credential from DNAC
Need to request for a lab again and perform testing
To work with Manjunath and validate this behaviour in lab and see if we are able to replicate same where remote address is missing when we use TACACS credential from DNAC
Pending device availability in lab
NETCONF not working for switches when customer is using TACACS credentials and it works fine when local credentials are used.
On switch logs we are seeing following message:
Jan 8 2023 13:58:22.107 SGT: %DMI-5-AUTHENTICATION_FAILED: Switch 1 R0/0: dmiauthd: Authentication failure from 172.18.12.20:49803 for netconf over ssh.
Jan 8 2023 13:58:27.304 SGT: %DMI-5-AUTHENTICATION_FAILED: Switch 1 R0/0: dmiauthd: Authentication failure from 172.18.12.20:10261 for netconf over ssh.
We added following AAA config on switch and NETCONF started working using TACACS credentials:
aaa authentication login default group dnac-network-tacacs-group local
aaa authorization exec default group dnac-network-tacacs-group local if-authenticated
This is an expected issue as of today and a enhancement was raised to improve this under https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvy47909 but till date behaviour is still same. We need to use CLI template during switch provision in order to apply these 2 commands.
Regarding the other issue where DNAC is unable to login to switch using NETCONF when TACACS credential is used we found that AAA request hits deny shell access rule because remote address is missing in the request due to which it cannot match same permit rule which is used when you use your own TACACS credential. However, when George uses his own TACACS credential it seems to have remote address of DNAC due to which it matches correct authorization rule and gets permitted.
To work with Manjunath and validate this behaviour in lab and see if we are able to replicate same where remote address is missing when we use TACACS credential from DNAC
Thanks for your time during Webex session today.
Please find a brief summary below:
DNAC version: 2.2.2.9
ISE version: 2.7
NETCONF not working for switches when customer is using TACACS credentials and it works fine when local credentials are used.
On switch logs we are seeing following message:
Jan 8 2023 13:58:22.107 SGT: %DMI-5-AUTHENTICATION_FAILED: Switch 1 R0/0: dmiauthd: Authentication failure from 172.18.12.20:49803 for netconf over ssh.
Jan 8 2023 13:58:27.304 SGT: %DMI-5-AUTHENTICATION_FAILED: Switch 1 R0/0: dmiauthd: Authentication failure from 172.18.12.20:10261 for netconf over ssh.
We added following AAA config on switch and NETCONF started working using TACACS credentials:
aaa authentication login default group dnac-network-tacacs-group local
aaa authorization exec default group dnac-network-tacacs-group local if-authenticated
This is an expected behaviour with NETCONF while using TACACS credentials as documented under https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvy47909 and we need to continue using workaround by applying above AAA commands using a CLI template to all switches where NETCONF will be enabled.
I will work with Dev team to updated affected version for this bug.
Regarding the other issue where DNAC is unable to login to switch using NETCONF when TACACS credentials are used we found that AAA request hits deny shell access rule because remote address is missing in the request due to which it cannot match same permit rule which is used when you use your own TACACS credential.
I will work with Manjunath to validate this behaviour in lab and see if we are able to replicate same.
Please upload all the debugs and sessions logs regarding this issue to the TAC case.
NETCONF not working for switches when customer is using TACACS credentials and it works fine when local credentials are used.
On switch logs we are seeing following message:
Jan 8 2023 13:58:22.107 SGT: %DMI-5-AUTHENTICATION_FAILED: Switch 1 R0/0: dmiauthd: Authentication failure from 172.18.12.20:49803 for netconf over ssh.
Jan 8 2023 13:58:27.304 SGT: %DMI-5-AUTHENTICATION_FAILED: Switch 1 R0/0: dmiauthd: Authentication failure from 172.18.12.20:10261 for netconf over ssh.
We added following AAA config on switch and NETCONF started working using TACACS credentials:
aaa authentication login default group dnac-network-tacacs-group local
aaa authorization exec default group dnac-network-tacacs-group local if-authenticated
-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-
-- Do not delete or change any of the following text.
User [email protected] requested TAC Connect bot to requeue case 694831371. Current time is outside the case owner's working hours (12:30 - 16:30 Tuesday - Saturday IST) and hence the case is requeued without contacting the case owner [email protected]. Please contact customer using their phone which is their preferred contact preference.
User [email protected] informed TAC Connect Bot that the case summary was not useful. Please update the case 694831371 with the latest GCI. Thanks!
Hope you are doing well.
This is Saurabh Khillare from the DNA Solution Support team; I will be the engineer assisting you with this service request.
I am sending this out as an initial point of contact to let you know that I have accepted your case and to give you information on how to contact me.
You can find my contact details and working hours in the signature of this email.
Is the device under managed state in DNAC inventory?
Are you able to SSH normally? Via 22 port
Does the user have priv 15?
Was this working earlier?
User [email protected] requested TAC Connect bot to requeue case 694831371 and decided not to contact current case owner. Please contact customer using their phone which is their preferred contact preference.
Lets have the call on Friday.
Is it ok a call for tomorrow at 9:00 AM CST?
Please find below the requested details.
1.
Which DNAC version are you running?
2.2.2.9
2.
Could you please briefly describe the Business Impact this issue has on your operations (Low / Medium / High)?
Medium
1.
Is this a single node or a three-node cluster?
3-node cluster
1.
Is your appliance a DN1 or DN2?
DN2
1.
Please let me know your availability for a call.
You can send me the invitie
Problem Details: SDA DNAC - C9300 NETCONF SSH access not working using TACACS authentication
$ ssh [email protected] -p 830 netconf
[email protected]'s password:
Permission denied, please try again.
[email protected]'s password:
You can now upload files to the case using FTP/FTPS/SCP/SFTP/HTTPS protocols and the following details:
Hostname: cxd.cisco.com
Username: 694831371
Password: i62rW1A7tWv5A7Np
Please note:
1. When uploading to HTTPS the path must be set to /home/<filename>, for all other protocols the path is always '/<filename>'
2. Empty files, that is files with a size of 0 Bytes, will not be attached and will be deleted automatically.
Software Version: -- => 2.2.2.9
Technology: Cisco DNA Center - On-Prem
Subtechnology: Cisco DNA Center - Infrastructure (Services, UI, API, etc.)
Problem Code: Error Messages, Logs, Debugs
Product: NA
Product Family: DNAHW
Software Version: N/A
Router/Node Name: N/A
Problem Details: SDA DNAC - C9300 NETCONF SSH access not working using TACACS authentication
SDA DNAC - C9300 NETCONF SSH access not working using TACACS authentication
timestamp : 2023-04-25T03:36:32.000+0000 || updatedby : bochinna || type : RESOLUTION SUMMARY || visibility : External || details : Resolution Summary
=====================
When DNAC ssh’s to NAD on the traditional port, its passes through and Inventory collection and other automation feature works as anticipated. However, when its SSH’s over 830 on Netconf, it’s gets denied.
The denial occurs because Netconf yang packet doesn’t contain remote address (DNAC address) in the TACAS request. This is a known behavior, and an enhancement has been raised for this CSCvx47585 | Technology: Cisco DNA Center - On-Prem
Subtechnology: Cisco DNA Center - Infrastructure (Services, UI, API, etc.)
Problem Code: Error Messages, Logs, Debugs
Product: NA
Product Family: DNAHW
Software Version: N/A
Router/Node Name: N/A
Problem Details: SDA DNAC - C9300 NETCONF SSH access not working using TACACS authentication | SDA DNAC - C9300 NETCONF SSH access not working using TACACS authentication | timestamp : 2023-04-25T03:36:32.000+0000 || updatedby : bochinna || type : RESOLUTION SUMMARY || visibility : External || details : Resolution Summary
=====================
When DNAC ssh’s to NAD on the traditional port, its passes through and Inventory collection and other automation feature works as anticipated. However, when its SSH’s over 830 on Netconf, it’s gets denied.
The denial occurs because Netconf yang packet doesn’t contain remote address (DNAC address) in the TACAS request. This is a known behavior, and an enhancement has been raised for this CSCvx47585 | nan | C9300-48U | cat9k_iosxe.16.12.04.SPA.bin | nan | nan | 3 | nan | Software Bug | DNAHW | Cisco DNA Center - On-Prem | Cisco DNA Center - Infrastructure (Services, UI, API, etc.) | nan | nan | nan | nan | nan | nan |
694105276 | Question: Which software version is principally discussed in these documents?
Answer "NONE" if you cannot find answer in the given documents.
The ONLY software version should be selected from the given software version list: NA - COMPONENT ONLY/ 16.12.3s/ 2.3.3.3/ 17.6.4/ 16.12.4/ 2.2.2.5/ 1.3.3.6/ 16.12.03s/ 16.12.01s/ 16.12.04/ 16.12.1s/ 2.2.3.3/ THIRD_PARTY_PRODUCT_SW/ 16.12.1s/ 1.3.3.7/ 1.3.3.9/ 2.3.3.7/ 2.1.2.7/ 2.2.3.6/ 17.06.02 Response in this JSON format:
{"software_version": "","explanation": "", "summary": ""}
Software Version: -- => 16.12.4
Technology: Cisco DNA Center - On-Prem
Subtechnology: Cisco Software-Defined Access (SDA Wired)
Problem Code: Error Messages, Logs, Debugs
Product: NA
Product Family: C9300
Software Version: N/A
Router/Node Name: N/A
Problem Details: SDA - Fabric Edge C9300 experiencing MAC flooding from specific ports and observing inconsistent in device-tracking IPDT policy applied to ports. We see inconsistent in the IPDT policy applied to the ports. Some switch ports are configured with IPDT_POLICY and some are with IPDT_MAX_10.
- whether the IPDT policy differs based on the code the device is running.
- whether the IPDT policy 'limit address-count' can help to address the MAC flooding issue.
Gi6/0/32 PORT IPDT_MAX_10 Device-tracking vlan all
Gi6/0/42 PORT IPDT_MAX_10 Device-tracking vlan all
Gi6/0/44 PORT IPDT_MAX_10 Device-tracking vlan all
Gi1/0/1 PORT IPDT_POLICY Device-tracking vlan all
Gi1/0/2 PORT IPDT_POLICY Device-tracking vlan all
Gi1/0/3 PORT IPDT_POLICY Device-tracking vlan all
Gi1/0/5 PORT IPDT_POLICY Device-tracking vlan all
Gi1/0/8 PORT IPDT_POLICY Device-tracking vlan all
Gi1/0/9 PORT IPDT_POLICY Device-tracking vlan all
Gi1/0/10 PORT IPDT_POLICY Device-tracking vlan all
Gi1/0/11 PORT IPDT_POLICY Device-tracking vlan all
CELS-02-CNT-ES1#show device-tracking policy IPDT_MAX_10
Policy IPDT_MAX_10 configuration:
security-level guard
device-role node
gleaning from Neighbor Discovery
gleaning from DHCP
gleaning from ARP
gleaning from DHCP4
NOT gleaning from protocol unkn
limit address-count 10
tracking enable
Policy IPDT_MAX_10 is applied on the following targets:
Target Type Policy Feature Target range
Ap1/0/1 PORT IPDT_MAX_10 Device-tracking vlan all
Ap2/0/1 PORT IPDT_MAX_10 Device-tracking vlan all
Ap3/0/1 PORT IPDT_MAX_10 Device-tracking vlan all
Ap4/0/1 PORT IPDT_MAX_10 Device-tracking vlan all
Ap5/0/1 PORT IPDT_MAX_10 Device-tracking vlan all
Gi6/0/32 PORT IPDT_MAX_10 Device-tracking vlan all
Gi6/0/42 PORT IPDT_MAX_10 Device-tracking vlan all
Gi6/0/44 PORT IPDT_MAX_10 Device-tracking vlan all
Ap6/0/1 PORT IPDT_MAX_10 Device-tracking vlan all
Gi7/0/37 PORT IPDT_MAX_10 Device-tracking vlan all
Gi7/0/39 PORT IPDT_MAX_10 Device-tracking vlan all
Ap7/0/1 PORT IPDT_MAX_10 Device-tracking vlan all
Ap8/0/1 PORT IPDT_MAX_10 Device-tracking vlan all
Checked one of the switch (S13-02-CNT-ES2) running code 16.12.3s, all ports are configured with IPDT_MAX_10
Technology: Cisco DNA Center - On-Prem
Subtechnology: Cisco Software-Defined Access (SDA Wired)
Problem Code: Error Messages, Logs, Debugs
Product: NA
Product Family: C9300
Software Version: N/A
Router/Node Name: N/A
Problem Details: SDA - Fabric Edge C9300 experiencing MAC flooding from specific ports and observing inconsistent in device-tracking IPDT policy applied to ports. We see inconsistent in the IPDT policy applied to the ports. Some switch ports are configured with IPDT_POLICY and some are with IPDT_MAX_10.
- whether the IPDT policy differs based on the code the device is running.
- whether the IPDT policy 'limit address-count' can help to address the MAC flooding issue.
Gi6/0/32 PORT IPDT_MAX_10 Device-tracking vlan all
Gi6/0/42 PORT IPDT_MAX_10 Device-tracking vlan all
Gi6/0/44 PORT IPDT_MAX_10 Device-tracking vlan all
Gi1/0/1 PORT IPDT_POLICY Device-tracking vlan all
Gi1/0/2 PORT IPDT_POLICY Device-tracking vlan all
Gi1/0/3 PORT IPDT_POLICY Device-tracking vlan all
Gi1/0/5 PORT IPDT_POLICY Device-tracking vlan all
Gi1/0/8 PORT IPDT_POLICY Device-tracking vlan all
Gi1/0/9 PORT IPDT_POLICY Device-tracking vlan all
Gi1/0/10 PORT IPDT_POLICY Device-tracking vlan all
Gi1/0/11 PORT IPDT_POLICY Device-tracking vlan all
CELS-02-CNT-ES1#show device-tracking policy IPDT_MAX_10
Policy IPDT_MAX_10 configuration:
security-level guard
device-role node
gleaning from Neighbor Discovery
gleaning from DHCP
gleaning from ARP
gleaning from DHCP4
NOT gleaning from protocol unkn
limit address-count 10
tracking enable
Policy IPDT_MAX_10 is applied on the following targets:
Target Type Policy Feature Target range
Ap1/0/1 PORT IPDT_MAX_10 Device-tracking vlan all
Ap2/0/1 PORT IPDT_MAX_10 Device-tracking vlan all
Ap3/0/1 PORT IPDT_MAX_10 Device-tracking vlan all
Ap4/0/1 PORT IPDT_MAX_10 Device-tracking vlan all
Ap5/0/1 PORT IPDT_MAX_10 Device-tracking vlan all
Gi6/0/32 PORT IPDT_MAX_10 Device-tracking vlan all
Gi6/0/42 PORT IPDT_MAX_10 Device-tracking vlan all
Gi6/0/44 PORT IPDT_MAX_10 Device-tracking vlan all
Ap6/0/1 PORT IPDT_MAX_10 Device-tracking vlan all
Gi7/0/37 PORT IPDT_MAX_10 Device-tracking vlan all
Gi7/0/39 PORT IPDT_MAX_10 Device-tracking vlan all
Ap7/0/1 PORT IPDT_MAX_10 Device-tracking vlan all
Ap8/0/1 PORT IPDT_MAX_10 Device-tracking vlan all
Checked one of the switch (S13-02-CNT-ES2) running code 16.12.3s, all ports are configured with IPDT_MAX_10
SDA - Fabric Edge C9300 experiencing MAC flooding from specific ports and observing inconsistent in device-tracking IPDT policy applied to ports. We see inconsistent in the IPDT policy applied to the ports. Some switch ports are configured with IPDT_POLICY and some are with IPDT_MAX_10.
- whether the IPDT policy differs based on the code the device is running.
- whether the IPDT policy 'limit address-count' can help to address the MAC flooding issue.
Gi6/0/32 PORT IPDT_MAX_10 Device-tracking vlan all
Gi6/0/42 PORT IPDT_MAX_10 Device-tracking vlan all
Gi6/0/44 PORT IPDT_MAX_10 Device-tracking vlan all
Gi1/0/1 PORT IPDT_POLICY Device-tracking vlan all
Gi1/0/2 PORT IPDT_POLICY Device-tracking vlan all
Gi1/0/3 PORT IPDT_POLICY Device-tracking vlan all
Gi1/0/5 PORT IPDT_POLICY Device-tracking vlan all
Gi1/0/8 PORT IPDT_POLICY Device-tracking vlan all
Gi1/0/9 PORT IPDT_POLICY Device-tracking vlan all
Gi1/0/10 PORT IPDT_POLICY Device-tracking vlan all
Gi1/0/11 PORT IPDT_POLICY Device-tracking vlan all
CELS-02-CNT-ES1#show device-tracking policy IPDT_MAX_10
Policy IPDT_MAX_10 configuration:
security-level guard
device-role node
gleaning from Neighbor Discovery
gleaning from DHCP
gleaning from ARP
gleaning from DHCP4
NOT gleaning from protocol unkn
limit address-count 10
tracking enable
Policy IPDT_MAX_10 is applied on the following targets:
Target Type Policy Feature Target range
Ap1/0/1 PORT IPDT_MAX_10 Device-tracking vlan all
Ap2/0/1 PORT IPDT_MAX_10 Device-tracking vlan all
Ap3/0/1 PORT IPDT_MAX_10 Device-tracking vlan all
Ap4/0/1 PORT IPDT_MAX_10 Device-tracking vlan all
Ap5/0/1 PORT IPDT_MAX_10 Device-tracking vlan all
Gi6/0/32 PORT IPDT_MAX_10 Device-tracking vlan all
Gi6/0/42 PORT IPDT_MAX_10 Device-tracking vlan all
Gi6/0/44 PORT IPDT_MAX_10 Device-tracking vlan all
Ap6/0/1 PORT IPDT_MAX_10 Device-tracking vlan all
Gi7/0/37 PORT IPDT_MAX_10 Device-tracking vlan all
Gi7/0/39 PORT IPDT_MAX_10 Device-tracking vlan all
Ap7/0/1 PORT IPDT_MAX_10 Device-tracking vlan all
Ap8/0/1 PORT IPDT_MAX_10 Device-tracking vlan all
Checked one of the switch (S13-02-CNT-ES2) running code 16.12.3s, all ports are configured with IPDT_MAX_10
timestamp : 2022-09-20T02:32:40.000+0000 || updatedby : josandov || type : RESOLUTION SUMMARY || visibility : External || details : Review IPDT configuration, command pushed seems to be expected.
Requested additional information about observed MAC Flood evidence.
Pending logs about MAC flooding | Question: Which product is principally discussed in these documents?
Answer "NONE" if you cannot find answer in the given documents.
The ONLY product name should be selected from the given product name list: DN2-HW-APL-XL/ ASR1009-X/ C9300-48U/ DN1-HW-APL/ C9500-48Y4C/ THIRD_PARTY_PRODUCT_HW/ C9300-48U-A/ ASR1002-HX Response in this JSON format:
{"product_name": "","explanation": "", "summary": ""}
Technology: Cisco DNA Center - On-Prem
Subtechnology: Cisco Software-Defined Access (SDA Wired)
Problem Code: Error Messages, Logs, Debugs
Product: NA
Product Family: C9300
Software Version: N/A
Router/Node Name: N/A
Problem Details: SDA - Fabric Edge C9300 experiencing MAC flooding from specific ports and observing inconsistent in device-tracking IPDT policy applied to ports. We see inconsistent in the IPDT policy applied to the ports. Some switch ports are configured with IPDT_POLICY and some are with IPDT_MAX_10.
- whether the IPDT policy differs based on the code the device is running.
- whether the IPDT policy 'limit address-count' can help to address the MAC flooding issue.
Gi6/0/32 PORT IPDT_MAX_10 Device-tracking vlan all
Gi6/0/42 PORT IPDT_MAX_10 Device-tracking vlan all
Gi6/0/44 PORT IPDT_MAX_10 Device-tracking vlan all
Gi1/0/1 PORT IPDT_POLICY Device-tracking vlan all
Gi1/0/2 PORT IPDT_POLICY Device-tracking vlan all
Gi1/0/3 PORT IPDT_POLICY Device-tracking vlan all
Gi1/0/5 PORT IPDT_POLICY Device-tracking vlan all
Gi1/0/8 PORT IPDT_POLICY Device-tracking vlan all
Gi1/0/9 PORT IPDT_POLICY Device-tracking vlan all
Gi1/0/10 PORT IPDT_POLICY Device-tracking vlan all
Gi1/0/11 PORT IPDT_POLICY Device-tracking vlan all
CELS-02-CNT-ES1#show device-tracking policy IPDT_MAX_10
Policy IPDT_MAX_10 configuration:
security-level guard
device-role node
gleaning from Neighbor Discovery
gleaning from DHCP
gleaning from ARP
gleaning from DHCP4
NOT gleaning from protocol unkn
limit address-count 10
tracking enable
Policy IPDT_MAX_10 is applied on the following targets:
Target Type Policy Feature Target range
Ap1/0/1 PORT IPDT_MAX_10 Device-tracking vlan all
Ap2/0/1 PORT IPDT_MAX_10 Device-tracking vlan all
Ap3/0/1 PORT IPDT_MAX_10 Device-tracking vlan all
Ap4/0/1 PORT IPDT_MAX_10 Device-tracking vlan all
Ap5/0/1 PORT IPDT_MAX_10 Device-tracking vlan all
Gi6/0/32 PORT IPDT_MAX_10 Device-tracking vlan all
Gi6/0/42 PORT IPDT_MAX_10 Device-tracking vlan all
Gi6/0/44 PORT IPDT_MAX_10 Device-tracking vlan all
Ap6/0/1 PORT IPDT_MAX_10 Device-tracking vlan all
Gi7/0/37 PORT IPDT_MAX_10 Device-tracking vlan all
Gi7/0/39 PORT IPDT_MAX_10 Device-tracking vlan all
Ap7/0/1 PORT IPDT_MAX_10 Device-tracking vlan all
Ap8/0/1 PORT IPDT_MAX_10 Device-tracking vlan all
Checked one of the switch (S13-02-CNT-ES2) running code 16.12.3s, all ports are configured with IPDT_MAX_10
SDA - Fabric Edge C9300 experiencing MAC flooding from specific ports and observing inconsistent in device-tracking IPDT policy applied to ports. We see inconsistent in the IPDT policy applied to the ports. Some switch ports are configured with IPDT_POLICY and some are with IPDT_MAX_10.
- whether the IPDT policy differs based on the code the device is running.
- whether the IPDT policy 'limit address-count' can help to address the MAC flooding issue.
Gi6/0/32 PORT IPDT_MAX_10 Device-tracking vlan all
Gi6/0/42 PORT IPDT_MAX_10 Device-tracking vlan all
Gi6/0/44 PORT IPDT_MAX_10 Device-tracking vlan all
Gi1/0/1 PORT IPDT_POLICY Device-tracking vlan all
Gi1/0/2 PORT IPDT_POLICY Device-tracking vlan all
Gi1/0/3 PORT IPDT_POLICY Device-tracking vlan all
Gi1/0/5 PORT IPDT_POLICY Device-tracking vlan all
Gi1/0/8 PORT IPDT_POLICY Device-tracking vlan all
Gi1/0/9 PORT IPDT_POLICY Device-tracking vlan all
Gi1/0/10 PORT IPDT_POLICY Device-tracking vlan all
Gi1/0/11 PORT IPDT_POLICY Device-tracking vlan all
CELS-02-CNT-ES1#show device-tracking policy IPDT_MAX_10
Policy IPDT_MAX_10 configuration:
security-level guard
device-role node
gleaning from Neighbor Discovery
gleaning from DHCP
gleaning from ARP
gleaning from DHCP4
NOT gleaning from protocol unkn
limit address-count 10
tracking enable
Policy IPDT_MAX_10 is applied on the following targets:
Target Type Policy Feature Target range
Ap1/0/1 PORT IPDT_MAX_10 Device-tracking vlan all
Ap2/0/1 PORT IPDT_MAX_10 Device-tracking vlan all
Ap3/0/1 PORT IPDT_MAX_10 Device-tracking vlan all
Ap4/0/1 PORT IPDT_MAX_10 Device-tracking vlan all
Ap5/0/1 PORT IPDT_MAX_10 Device-tracking vlan all
Gi6/0/32 PORT IPDT_MAX_10 Device-tracking vlan all
Gi6/0/42 PORT IPDT_MAX_10 Device-tracking vlan all
Gi6/0/44 PORT IPDT_MAX_10 Device-tracking vlan all
Ap6/0/1 PORT IPDT_MAX_10 Device-tracking vlan all
Gi7/0/37 PORT IPDT_MAX_10 Device-tracking vlan all
Gi7/0/39 PORT IPDT_MAX_10 Device-tracking vlan all
Ap7/0/1 PORT IPDT_MAX_10 Device-tracking vlan all
Ap8/0/1 PORT IPDT_MAX_10 Device-tracking vlan all
Checked one of the switch (S13-02-CNT-ES2) running code 16.12.3s, all ports are configured with IPDT_MAX_10
timestamp : 2022-09-20T02:32:40.000+0000 || updatedby : josandov || type : RESOLUTION SUMMARY || visibility : External || details : Review IPDT configuration, command pushed seems to be expected.
Requested additional information about observed MAC Flood evidence.
Pending logs about MAC flooding | Technology: Cisco DNA Center - On-Prem
Subtechnology: Cisco Software-Defined Access (SDA Wired)
Problem Code: Error Messages, Logs, Debugs
Product: NA
Product Family: C9300
Software Version: N/A
Router/Node Name: N/A
Problem Details: SDA - Fabric Edge C9300 experiencing MAC flooding from specific ports and observing inconsistent in device-tracking IPDT policy applied to ports. We see inconsistent in the IPDT policy applied to the ports. Some switch ports are configured with IPDT_POLICY and some are with IPDT_MAX_10.
- whether the IPDT policy differs based on the code the device is running.
- whether the IPDT policy 'limit address-count' can help to address the MAC flooding issue.
Gi6/0/32 PORT IPDT_MAX_10 Device-tracking vlan all
Gi6/0/42 PORT IPDT_MAX_10 Device-tracking vlan all
Gi6/0/44 PORT IPDT_MAX_10 Device-tracking vlan all
Gi1/0/1 PORT IPDT_POLICY Device-tracking vlan all
Gi1/0/2 PORT IPDT_POLICY Device-tracking vlan all
Gi1/0/3 PORT IPDT_POLICY Device-tracking vlan all
Gi1/0/5 PORT IPDT_POLICY Device-tracking vlan all
Gi1/0/8 PORT IPDT_POLICY Device-tracking vlan all
Gi1/0/9 PORT IPDT_POLICY Device-tracking vlan all
Gi1/0/10 PORT IPDT_POLICY Device-tracking vlan all
Gi1/0/11 PORT IPDT_POLICY Device-tracking vlan all
CELS-02-CNT-ES1#show device-tracking policy IPDT_MAX_10
Policy IPDT_MAX_10 configuration:
security-level guard
device-role node
gleaning from Neighbor Discovery
gleaning from DHCP
gleaning from ARP
gleaning from DHCP4
NOT gleaning from protocol unkn
limit address-count 10
tracking enable
Policy IPDT_MAX_10 is applied on the following targets:
Target Type Policy Feature Target range
Ap1/0/1 PORT IPDT_MAX_10 Device-tracking vlan all
Ap2/0/1 PORT IPDT_MAX_10 Device-tracking vlan all
Ap3/0/1 PORT IPDT_MAX_10 Device-tracking vlan all
Ap4/0/1 PORT IPDT_MAX_10 Device-tracking vlan all
Ap5/0/1 PORT IPDT_MAX_10 Device-tracking vlan all
Gi6/0/32 PORT IPDT_MAX_10 Device-tracking vlan all
Gi6/0/42 PORT IPDT_MAX_10 Device-tracking vlan all
Gi6/0/44 PORT IPDT_MAX_10 Device-tracking vlan all
Ap6/0/1 PORT IPDT_MAX_10 Device-tracking vlan all
Gi7/0/37 PORT IPDT_MAX_10 Device-tracking vlan all
Gi7/0/39 PORT IPDT_MAX_10 Device-tracking vlan all
Ap7/0/1 PORT IPDT_MAX_10 Device-tracking vlan all
Ap8/0/1 PORT IPDT_MAX_10 Device-tracking vlan all
Checked one of the switch (S13-02-CNT-ES2) running code 16.12.3s, all ports are configured with IPDT_MAX_10 | SDA - Fabric Edge C9300 experiencing MAC flooding from specific ports and observing inconsistent in device-tracking IPDT policy applied to ports. We see inconsistent in the IPDT policy applied to the ports. Some switch ports are configured with IPDT_POLICY and some are with IPDT_MAX_10.
- whether the IPDT policy differs based on the code the device is running.
- whether the IPDT policy 'limit address-count' can help to address the MAC flooding issue.
Gi6/0/32 PORT IPDT_MAX_10 Device-tracking vlan all
Gi6/0/42 PORT IPDT_MAX_10 Device-tracking vlan all
Gi6/0/44 PORT IPDT_MAX_10 Device-tracking vlan all
Gi1/0/1 PORT IPDT_POLICY Device-tracking vlan all
Gi1/0/2 PORT IPDT_POLICY Device-tracking vlan all
Gi1/0/3 PORT IPDT_POLICY Device-tracking vlan all
Gi1/0/5 PORT IPDT_POLICY Device-tracking vlan all
Gi1/0/8 PORT IPDT_POLICY Device-tracking vlan all
Gi1/0/9 PORT IPDT_POLICY Device-tracking vlan all
Gi1/0/10 PORT IPDT_POLICY Device-tracking vlan all
Gi1/0/11 PORT IPDT_POLICY Device-tracking vlan all
CELS-02-CNT-ES1#show device-tracking policy IPDT_MAX_10
Policy IPDT_MAX_10 configuration:
security-level guard
device-role node
gleaning from Neighbor Discovery
gleaning from DHCP
gleaning from ARP
gleaning from DHCP4
NOT gleaning from protocol unkn
limit address-count 10
tracking enable
Policy IPDT_MAX_10 is applied on the following targets:
Target Type Policy Feature Target range
Ap1/0/1 PORT IPDT_MAX_10 Device-tracking vlan all
Ap2/0/1 PORT IPDT_MAX_10 Device-tracking vlan all
Ap3/0/1 PORT IPDT_MAX_10 Device-tracking vlan all
Ap4/0/1 PORT IPDT_MAX_10 Device-tracking vlan all
Ap5/0/1 PORT IPDT_MAX_10 Device-tracking vlan all
Gi6/0/32 PORT IPDT_MAX_10 Device-tracking vlan all
Gi6/0/42 PORT IPDT_MAX_10 Device-tracking vlan all
Gi6/0/44 PORT IPDT_MAX_10 Device-tracking vlan all
Ap6/0/1 PORT IPDT_MAX_10 Device-tracking vlan all
Gi7/0/37 PORT IPDT_MAX_10 Device-tracking vlan all
Gi7/0/39 PORT IPDT_MAX_10 Device-tracking vlan all
Ap7/0/1 PORT IPDT_MAX_10 Device-tracking vlan all
Ap8/0/1 PORT IPDT_MAX_10 Device-tracking vlan all
Checked one of the switch (S13-02-CNT-ES2) running code 16.12.3s, all ports are configured with IPDT_MAX_10 | timestamp : 2022-09-20T02:32:40.000+0000 || updatedby : josandov || type : RESOLUTION SUMMARY || visibility : External || details : Review IPDT configuration, command pushed seems to be expected.
Requested additional information about observed MAC Flood evidence.
Pending logs about MAC flooding | nan | C9300-48U | cat9k_iosxe.16.12.04.SPA.bin | nan | nan | 3 | nan | Debug/Diagnostic Capability (missing, incomplete, cryptic...) | C9300 | Cisco DNA Center - On-Prem | Cisco Software-Defined Access (SDA Wired) | nan | nan | nan | nan | nan | nan |
694482515 | Question: Which software version is principally discussed in these documents?
Answer "NONE" if you cannot find answer in the given documents.
The ONLY software version should be selected from the given software version list: Response in this JSON format:
{"software_version": "","explanation": "", "summary": ""}
Closed
Technology: Identity Services Engine (ISE) - 3.0
Subtechnology: ISE Admin Access
Problem Code: Error Messages, Logs, Debugs
Product: NA
Product Family: CISE
Software Version: N/A
Router/Node Name: N/A
Problem Details: ISE- Admin/Portal wild card certificate not getting imported to secondary MNT node
We have totally 12 ISE nodes in the deployment (2 PAN, 2 MNT + 8 PSNs). The wild certificates are getting imported to all nodes in the deployment, except the secondary MNT node (hdsc-mnt-nac01)
ISE- Admin/Portal wild card certificate not getting imported to secondary MNT node
We have totally 12 ISE nodes in the deployment (2 PAN, 2 MNT + 8 PSNs). The wild certificates are getting imported to all nodes in the deployment, except the secondary MNT node (hdsc-mnt-nac01)
workaround for that is by,
First deregistering the affected node from the ISE cluster,
Then importing the certificate into the deployment,
And then adding the secondary monitoring node back to the deployment and synching up the nodes. | Question: Which product is principally discussed in these documents?
Answer "NONE" if you cannot find answer in the given documents.
The ONLY product name should be selected from the given product name list: SNS-3695-K9 Response in this JSON format:
{"product_name": "","explanation": "", "summary": ""}
Technology: Identity Services Engine (ISE) - 3.0
Subtechnology: ISE Admin Access
Problem Code: Error Messages, Logs, Debugs
Product: NA
Product Family: CISE
Software Version: N/A
Router/Node Name: N/A
Problem Details: ISE- Admin/Portal wild card certificate not getting imported to secondary MNT node
We have totally 12 ISE nodes in the deployment (2 PAN, 2 MNT + 8 PSNs). The wild certificates are getting imported to all nodes in the deployment, except the secondary MNT node (hdsc-mnt-nac01)
ISE- Admin/Portal wild card certificate not getting imported to secondary MNT node
We have totally 12 ISE nodes in the deployment (2 PAN, 2 MNT + 8 PSNs). The wild certificates are getting imported to all nodes in the deployment, except the secondary MNT node (hdsc-mnt-nac01)
workaround for that is by,
First deregistering the affected node from the ISE cluster,
Then importing the certificate into the deployment,
And then adding the secondary monitoring node back to the deployment and synching up the nodes. | Technology: Identity Services Engine (ISE) - 3.0
Subtechnology: ISE Admin Access
Problem Code: Error Messages, Logs, Debugs
Product: NA
Product Family: CISE
Software Version: N/A
Router/Node Name: N/A
Problem Details: ISE- Admin/Portal wild card certificate not getting imported to secondary MNT node
We have totally 12 ISE nodes in the deployment (2 PAN, 2 MNT + 8 PSNs). The wild certificates are getting imported to all nodes in the deployment, except the secondary MNT node (hdsc-mnt-nac01) | ISE- Admin/Portal wild card certificate not getting imported to secondary MNT node
We have totally 12 ISE nodes in the deployment (2 PAN, 2 MNT + 8 PSNs). The wild certificates are getting imported to all nodes in the deployment, except the secondary MNT node (hdsc-mnt-nac01) | workaround for that is by,
First deregistering the affected node from the ISE cluster,
Then importing the certificate into the deployment,
And then adding the secondary monitoring node back to the deployment and synching up the nodes. | ISE- Admin/Portal wild card certificate not getting import to secondary MNT. | SNS-3695-K9 | nan | nan | 36.0 | 3 | 100.0 | Software -not a bug (scalability, version selection, install/upgrade help...) | CISE | Identity Services Engine (ISE) - 3.0 | ISE Admin Access | 01tA0000000huFmIAI | Error Messages, Logs, Debugs | ISE Admin Access | Identity Services Engine (ISE) - 3.0 | 01tA0000000huFSIAY | TARPIT: PARTIAL |
694140893 | Question: Which software version is principally discussed in these documents?
Answer "NONE" if you cannot find answer in the given documents.
The ONLY software version should be selected from the given software version list: 3.0.0.458/ 2.7.0.356/ 3.0.0.448/ 3.0.0.458/ 3.0.0 Response in this JSON format:
{"software_version": "","explanation": "", "summary": ""}
High CPU Load on PAN node
The Tech top output does not show the process iseadmin+
Platform: SNS-3655-K9
Version: 3.0.0.458
Patch: 3
Serial Number WZP23040NF3
Disk: 1198 GB
CPU_Cores: 24
RAM: 93 GB
Deployment:
- hsdc-pan-nac01: Primary PAN,PXG
- tldc-rad-nac01: PSN
- hsdc-rad-nac03: PSN
- tldc-rad-nac02: PSN
- tldc-mnt-nac01: MNT
- tldc-rad-nac04: PSN
- hsdc-rad-nac04: PSN
- hsdc-mnt-nac01: MNT
- tldc-pan-nac01: PAN,PXG
- hsdc-rad-nac02: PSN
- hsdc-rad-nac01: PSN
- tldc-rad-nac03: PSN
Software Version: -- => 3.0.0.458
Technology: Identity Services Engine (ISE) - 3.0
Subtechnology: ISE Performance (High CPU / Memory / IO / GUI Slowness)
Problem Code: Error Messages, Logs, Debugs
Product: NA
Product Family: CISE
Software Version: N/A
Router/Node Name: N/A
Problem Details: ISE - High CPU load on Primary PAN node
hsdc-pan-nac01/admin# tech top
Invoking tech top. Press Control-C to interrupt.
top - 13:40:56 up 303 days, 16:51, 2 users, load average: 18.38, 15.73, 13.35
Tasks: 642 total, 1 running, 641 sleeping, 0 stopped, 0 zombie
%Cpu0 : 23.2 us, 1.3 sy, 0.0 ni, 75.4 id, 0.0 wa, 0.0 hi, 0.0 si, 0.0 st
%Cpu1 : 30.0 us, 0.3 sy, 0.0 ni, 69.3 id, 0.0 wa, 0.0 hi, 0.3 si, 0.0 st
%Cpu2 : 32.1 us, 0.3 sy, 0.0 ni, 67.2 id, 0.0 wa, 0.0 hi, 0.3 si, 0.0 st
%Cpu3 : 45.3 us, 0.7 sy, 0.0 ni, 54.0 id, 0.0 wa, 0.0 hi, 0.0 si, 0.0 st
%Cpu4 : 80.5 us, 0.0 sy, 0.0 ni, 19.5 id, 0.0 wa, 0.0 hi, 0.0 si, 0.0 st
%Cpu5 : 77.5 us, 0.3 sy, 0.0 ni, 22.2 id, 0.0 wa, 0.0 hi, 0.0 si, 0.0 st
%Cpu6 : 81.4 us, 0.0 sy, 0.0 ni, 18.6 id, 0.0 wa, 0.0 hi, 0.0 si, 0.0 st
%Cpu7 : 46.7 us, 0.0 sy, 0.0 ni, 53.0 id, 0.0 wa, 0.0 hi, 0.3 si, 0.0 st
%Cpu8 : 87.4 us, 0.0 sy, 0.0 ni, 12.6 id, 0.0 wa, 0.0 hi, 0.0 si, 0.0 st
%Cpu9 : 70.6 us, 0.3 sy, 0.0 ni, 29.0 id, 0.0 wa, 0.0 hi, 0.0 si, 0.0 st
%Cpu10 : 91.7 us, 0.0 sy, 0.0 ni, 8.3 id, 0.0 wa, 0.0 hi, 0.0 si, 0.0 st
%Cpu11 : 91.1 us, 0.3 sy, 0.0 ni, 8.6 id, 0.0 wa, 0.0 hi, 0.0 si, 0.0 st
%Cpu12 : 68.1 us, 0.3 sy, 0.0 ni, 31.6 id, 0.0 wa, 0.0 hi, 0.0 si, 0.0 st
%Cpu13 : 40.2 us, 0.3 sy, 0.0 ni, 59.5 id, 0.0 wa, 0.0 hi, 0.0 si, 0.0 st
%Cpu14 : 75.8 us, 0.0 sy, 0.0 ni, 24.2 id, 0.0 wa, 0.0 hi, 0.0 si, 0.0 st
%Cpu15 : 63.5 us, 0.0 sy, 0.0 ni, 36.5 id, 0.0 wa, 0.0 hi, 0.0 si, 0.0 st
%Cpu16 : 91.7 us, 0.0 sy, 0.0 ni, 8.3 id, 0.0 wa, 0.0 hi, 0.0 si, 0.0 st
%Cpu17 : 91.7 us, 0.0 sy, 0.0 ni, 8.3 id, 0.0 wa, 0.0 hi, 0.0 si, 0.0 st
%Cpu18 : 83.4 us, 0.3 sy, 0.0 ni, 16.3 id, 0.0 wa, 0.0 hi, 0.0 si, 0.0 st
%Cpu19 : 54.3 us, 0.0 sy, 0.0 ni, 45.7 id, 0.0 wa, 0.0 hi, 0.0 si, 0.0 st
%Cpu20 : 90.7 us, 0.0 sy, 0.0 ni, 9.3 id, 0.0 wa, 0.0 hi, 0.0 si, 0.0 st
%Cpu21 : 91.7 us, 0.0 sy, 0.0 ni, 8.3 id, 0.0 wa, 0.0 hi, 0.0 si, 0.0 st
%Cpu22 : 91.4 us, 0.0 sy, 0.0 ni, 8.6 id, 0.0 wa, 0.0 hi, 0.0 si, 0.0 st
%Cpu23 : 87.0 us, 0.0 sy, 0.0 ni, 13.0 id, 0.0 wa, 0.0 hi, 0.0 si, 0.0 st
KiB Mem : 97436048 total, 14773332 free, 31670192 used, 50992524 buff/cache
KiB Swap: 8191996 total, 7989884 free, 202112 used. 47788736 avail Mem
ISE - High CPU load on Primary PAN node
hsdc-pan-nac01/admin# tech top
Invoking tech top. Press Control-C to interrupt.
top - 13:40:56 up 303 days, 16:51, 2 users, load average: 18.38, 15.73, 13.35
Tasks: 642 total, 1 running, 641 sleeping, 0 stopped, 0 zombie
%Cpu0 : 23.2 us, 1.3 sy, 0.0 ni, 75.4 id, 0.0 wa, 0.0 hi, 0.0 si, 0.0 st
%Cpu1 : 30.0 us, 0.3 sy, 0.0 ni, 69.3 id, 0.0 wa, 0.0 hi, 0.3 si, 0.0 st
%Cpu2 : 32.1 us, 0.3 sy, 0.0 ni, 67.2 id, 0.0 wa, 0.0 hi, 0.3 si, 0.0 st
%Cpu3 : 45.3 us, 0.7 sy, 0.0 ni, 54.0 id, 0.0 wa, 0.0 hi, 0.0 si, 0.0 st
%Cpu4 : 80.5 us, 0.0 sy, 0.0 ni, 19.5 id, 0.0 wa, 0.0 hi, 0.0 si, 0.0 st
%Cpu5 : 77.5 us, 0.3 sy, 0.0 ni, 22.2 id, 0.0 wa, 0.0 hi, 0.0 si, 0.0 st
%Cpu6 : 81.4 us, 0.0 sy, 0.0 ni, 18.6 id, 0.0 wa, 0.0 hi, 0.0 si, 0.0 st
%Cpu7 : 46.7 us, 0.0 sy, 0.0 ni, 53.0 id, 0.0 wa, 0.0 hi, 0.3 si, 0.0 st
%Cpu8 : 87.4 us, 0.0 sy, 0.0 ni, 12.6 id, 0.0 wa, 0.0 hi, 0.0 si, 0.0 st
%Cpu9 : 70.6 us, 0.3 sy, 0.0 ni, 29.0 id, 0.0 wa, 0.0 hi, 0.0 si, 0.0 st
%Cpu10 : 91.7 us, 0.0 sy, 0.0 ni, 8.3 id, 0.0 wa, 0.0 hi, 0.0 si, 0.0 st
%Cpu11 : 91.1 us, 0.3 sy, 0.0 ni, 8.6 id, 0.0 wa, 0.0 hi, 0.0 si, 0.0 st
%Cpu12 : 68.1 us, 0.3 sy, 0.0 ni, 31.6 id, 0.0 wa, 0.0 hi, 0.0 si, 0.0 st
%Cpu13 : 40.2 us, 0.3 sy, 0.0 ni, 59.5 id, 0.0 wa, 0.0 hi, 0.0 si, 0.0 st
%Cpu14 : 75.8 us, 0.0 sy, 0.0 ni, 24.2 id, 0.0 wa, 0.0 hi, 0.0 si, 0.0 st
%Cpu15 : 63.5 us, 0.0 sy, 0.0 ni, 36.5 id, 0.0 wa, 0.0 hi, 0.0 si, 0.0 st
%Cpu16 : 91.7 us, 0.0 sy, 0.0 ni, 8.3 id, 0.0 wa, 0.0 hi, 0.0 si, 0.0 st
%Cpu17 : 91.7 us, 0.0 sy, 0.0 ni, 8.3 id, 0.0 wa, 0.0 hi, 0.0 si, 0.0 st
%Cpu18 : 83.4 us, 0.3 sy, 0.0 ni, 16.3 id, 0.0 wa, 0.0 hi, 0.0 si, 0.0 st
%Cpu19 : 54.3 us, 0.0 sy, 0.0 ni, 45.7 id, 0.0 wa, 0.0 hi, 0.0 si, 0.0 st
%Cpu20 : 90.7 us, 0.0 sy, 0.0 ni, 9.3 id, 0.0 wa, 0.0 hi, 0.0 si, 0.0 st
%Cpu21 : 91.7 us, 0.0 sy, 0.0 ni, 8.3 id, 0.0 wa, 0.0 hi, 0.0 si, 0.0 st
%Cpu22 : 91.4 us, 0.0 sy, 0.0 ni, 8.6 id, 0.0 wa, 0.0 hi, 0.0 si, 0.0 st
%Cpu23 : 87.0 us, 0.0 sy, 0.0 ni, 13.0 id, 0.0 wa, 0.0 hi, 0.0 si, 0.0 st
KiB Mem : 97436048 total, 14773332 free, 31670192 used, 50992524 buff/cache
KiB Swap: 8191996 total, 7989884 free, 202112 used. 47788736 avail Mem
timestamp : 2023-01-09T15:54:07.000+0000 || updatedby : surymish || type : RESOLUTION SUMMARY || visibility : External || details : No response from Cu since dec 10th | Question: Which product is principally discussed in these documents?
Answer "NONE" if you cannot find answer in the given documents.
The ONLY product name should be selected from the given product name list: SNS-3655-K9/ SNS-3695-K9 Response in this JSON format:
{"product_name": "","explanation": "", "summary": ""}
High CPU Load on PAN node
The Tech top output does not show the process iseadmin+
Platform: SNS-3655-K9
Version: 3.0.0.458
Patch: 3
Serial Number WZP23040NF3
Disk: 1198 GB
CPU_Cores: 24
RAM: 93 GB
Deployment:
- hsdc-pan-nac01: Primary PAN,PXG
- tldc-rad-nac01: PSN
- hsdc-rad-nac03: PSN
- tldc-rad-nac02: PSN
- tldc-mnt-nac01: MNT
- tldc-rad-nac04: PSN
- hsdc-rad-nac04: PSN
- hsdc-mnt-nac01: MNT
- tldc-pan-nac01: PAN,PXG
- hsdc-rad-nac02: PSN
- hsdc-rad-nac01: PSN
- tldc-rad-nac03: PSN
Technology: Identity Services Engine (ISE) - 3.0
Subtechnology: ISE Performance (High CPU / Memory / IO / GUI Slowness)
Problem Code: Error Messages, Logs, Debugs
Product: NA
Product Family: CISE
Software Version: N/A
Router/Node Name: N/A
Problem Details: ISE - High CPU load on Primary PAN node
hsdc-pan-nac01/admin# tech top
Invoking tech top. Press Control-C to interrupt.
top - 13:40:56 up 303 days, 16:51, 2 users, load average: 18.38, 15.73, 13.35
Tasks: 642 total, 1 running, 641 sleeping, 0 stopped, 0 zombie
%Cpu0 : 23.2 us, 1.3 sy, 0.0 ni, 75.4 id, 0.0 wa, 0.0 hi, 0.0 si, 0.0 st
%Cpu1 : 30.0 us, 0.3 sy, 0.0 ni, 69.3 id, 0.0 wa, 0.0 hi, 0.3 si, 0.0 st
%Cpu2 : 32.1 us, 0.3 sy, 0.0 ni, 67.2 id, 0.0 wa, 0.0 hi, 0.3 si, 0.0 st
%Cpu3 : 45.3 us, 0.7 sy, 0.0 ni, 54.0 id, 0.0 wa, 0.0 hi, 0.0 si, 0.0 st
%Cpu4 : 80.5 us, 0.0 sy, 0.0 ni, 19.5 id, 0.0 wa, 0.0 hi, 0.0 si, 0.0 st
%Cpu5 : 77.5 us, 0.3 sy, 0.0 ni, 22.2 id, 0.0 wa, 0.0 hi, 0.0 si, 0.0 st
%Cpu6 : 81.4 us, 0.0 sy, 0.0 ni, 18.6 id, 0.0 wa, 0.0 hi, 0.0 si, 0.0 st
%Cpu7 : 46.7 us, 0.0 sy, 0.0 ni, 53.0 id, 0.0 wa, 0.0 hi, 0.3 si, 0.0 st
%Cpu8 : 87.4 us, 0.0 sy, 0.0 ni, 12.6 id, 0.0 wa, 0.0 hi, 0.0 si, 0.0 st
%Cpu9 : 70.6 us, 0.3 sy, 0.0 ni, 29.0 id, 0.0 wa, 0.0 hi, 0.0 si, 0.0 st
%Cpu10 : 91.7 us, 0.0 sy, 0.0 ni, 8.3 id, 0.0 wa, 0.0 hi, 0.0 si, 0.0 st
%Cpu11 : 91.1 us, 0.3 sy, 0.0 ni, 8.6 id, 0.0 wa, 0.0 hi, 0.0 si, 0.0 st
%Cpu12 : 68.1 us, 0.3 sy, 0.0 ni, 31.6 id, 0.0 wa, 0.0 hi, 0.0 si, 0.0 st
%Cpu13 : 40.2 us, 0.3 sy, 0.0 ni, 59.5 id, 0.0 wa, 0.0 hi, 0.0 si, 0.0 st
%Cpu14 : 75.8 us, 0.0 sy, 0.0 ni, 24.2 id, 0.0 wa, 0.0 hi, 0.0 si, 0.0 st
%Cpu15 : 63.5 us, 0.0 sy, 0.0 ni, 36.5 id, 0.0 wa, 0.0 hi, 0.0 si, 0.0 st
%Cpu16 : 91.7 us, 0.0 sy, 0.0 ni, 8.3 id, 0.0 wa, 0.0 hi, 0.0 si, 0.0 st
%Cpu17 : 91.7 us, 0.0 sy, 0.0 ni, 8.3 id, 0.0 wa, 0.0 hi, 0.0 si, 0.0 st
%Cpu18 : 83.4 us, 0.3 sy, 0.0 ni, 16.3 id, 0.0 wa, 0.0 hi, 0.0 si, 0.0 st
%Cpu19 : 54.3 us, 0.0 sy, 0.0 ni, 45.7 id, 0.0 wa, 0.0 hi, 0.0 si, 0.0 st
%Cpu20 : 90.7 us, 0.0 sy, 0.0 ni, 9.3 id, 0.0 wa, 0.0 hi, 0.0 si, 0.0 st
%Cpu21 : 91.7 us, 0.0 sy, 0.0 ni, 8.3 id, 0.0 wa, 0.0 hi, 0.0 si, 0.0 st
%Cpu22 : 91.4 us, 0.0 sy, 0.0 ni, 8.6 id, 0.0 wa, 0.0 hi, 0.0 si, 0.0 st
%Cpu23 : 87.0 us, 0.0 sy, 0.0 ni, 13.0 id, 0.0 wa, 0.0 hi, 0.0 si, 0.0 st
KiB Mem : 97436048 total, 14773332 free, 31670192 used, 50992524 buff/cache
KiB Swap: 8191996 total, 7989884 free, 202112 used. 47788736 avail Mem
ISE - High CPU load on Primary PAN node
hsdc-pan-nac01/admin# tech top
Invoking tech top. Press Control-C to interrupt.
top - 13:40:56 up 303 days, 16:51, 2 users, load average: 18.38, 15.73, 13.35
Tasks: 642 total, 1 running, 641 sleeping, 0 stopped, 0 zombie
%Cpu0 : 23.2 us, 1.3 sy, 0.0 ni, 75.4 id, 0.0 wa, 0.0 hi, 0.0 si, 0.0 st
%Cpu1 : 30.0 us, 0.3 sy, 0.0 ni, 69.3 id, 0.0 wa, 0.0 hi, 0.3 si, 0.0 st
%Cpu2 : 32.1 us, 0.3 sy, 0.0 ni, 67.2 id, 0.0 wa, 0.0 hi, 0.3 si, 0.0 st
%Cpu3 : 45.3 us, 0.7 sy, 0.0 ni, 54.0 id, 0.0 wa, 0.0 hi, 0.0 si, 0.0 st
%Cpu4 : 80.5 us, 0.0 sy, 0.0 ni, 19.5 id, 0.0 wa, 0.0 hi, 0.0 si, 0.0 st
%Cpu5 : 77.5 us, 0.3 sy, 0.0 ni, 22.2 id, 0.0 wa, 0.0 hi, 0.0 si, 0.0 st
%Cpu6 : 81.4 us, 0.0 sy, 0.0 ni, 18.6 id, 0.0 wa, 0.0 hi, 0.0 si, 0.0 st
%Cpu7 : 46.7 us, 0.0 sy, 0.0 ni, 53.0 id, 0.0 wa, 0.0 hi, 0.3 si, 0.0 st
%Cpu8 : 87.4 us, 0.0 sy, 0.0 ni, 12.6 id, 0.0 wa, 0.0 hi, 0.0 si, 0.0 st
%Cpu9 : 70.6 us, 0.3 sy, 0.0 ni, 29.0 id, 0.0 wa, 0.0 hi, 0.0 si, 0.0 st
%Cpu10 : 91.7 us, 0.0 sy, 0.0 ni, 8.3 id, 0.0 wa, 0.0 hi, 0.0 si, 0.0 st
%Cpu11 : 91.1 us, 0.3 sy, 0.0 ni, 8.6 id, 0.0 wa, 0.0 hi, 0.0 si, 0.0 st
%Cpu12 : 68.1 us, 0.3 sy, 0.0 ni, 31.6 id, 0.0 wa, 0.0 hi, 0.0 si, 0.0 st
%Cpu13 : 40.2 us, 0.3 sy, 0.0 ni, 59.5 id, 0.0 wa, 0.0 hi, 0.0 si, 0.0 st
%Cpu14 : 75.8 us, 0.0 sy, 0.0 ni, 24.2 id, 0.0 wa, 0.0 hi, 0.0 si, 0.0 st
%Cpu15 : 63.5 us, 0.0 sy, 0.0 ni, 36.5 id, 0.0 wa, 0.0 hi, 0.0 si, 0.0 st
%Cpu16 : 91.7 us, 0.0 sy, 0.0 ni, 8.3 id, 0.0 wa, 0.0 hi, 0.0 si, 0.0 st
%Cpu17 : 91.7 us, 0.0 sy, 0.0 ni, 8.3 id, 0.0 wa, 0.0 hi, 0.0 si, 0.0 st
%Cpu18 : 83.4 us, 0.3 sy, 0.0 ni, 16.3 id, 0.0 wa, 0.0 hi, 0.0 si, 0.0 st
%Cpu19 : 54.3 us, 0.0 sy, 0.0 ni, 45.7 id, 0.0 wa, 0.0 hi, 0.0 si, 0.0 st
%Cpu20 : 90.7 us, 0.0 sy, 0.0 ni, 9.3 id, 0.0 wa, 0.0 hi, 0.0 si, 0.0 st
%Cpu21 : 91.7 us, 0.0 sy, 0.0 ni, 8.3 id, 0.0 wa, 0.0 hi, 0.0 si, 0.0 st
%Cpu22 : 91.4 us, 0.0 sy, 0.0 ni, 8.6 id, 0.0 wa, 0.0 hi, 0.0 si, 0.0 st
%Cpu23 : 87.0 us, 0.0 sy, 0.0 ni, 13.0 id, 0.0 wa, 0.0 hi, 0.0 si, 0.0 st
KiB Mem : 97436048 total, 14773332 free, 31670192 used, 50992524 buff/cache
KiB Swap: 8191996 total, 7989884 free, 202112 used. 47788736 avail Mem
timestamp : 2023-01-09T15:54:07.000+0000 || updatedby : surymish || type : RESOLUTION SUMMARY || visibility : External || details : No response from Cu since dec 10th | Technology: Identity Services Engine (ISE) - 3.0
Subtechnology: ISE Performance (High CPU / Memory / IO / GUI Slowness)
Problem Code: Error Messages, Logs, Debugs
Product: NA
Product Family: CISE
Software Version: N/A
Router/Node Name: N/A
Problem Details: ISE - High CPU load on Primary PAN node
hsdc-pan-nac01/admin# tech top
Invoking tech top. Press Control-C to interrupt.
top - 13:40:56 up 303 days, 16:51, 2 users, load average: 18.38, 15.73, 13.35
Tasks: 642 total, 1 running, 641 sleeping, 0 stopped, 0 zombie
%Cpu0 : 23.2 us, 1.3 sy, 0.0 ni, 75.4 id, 0.0 wa, 0.0 hi, 0.0 si, 0.0 st
%Cpu1 : 30.0 us, 0.3 sy, 0.0 ni, 69.3 id, 0.0 wa, 0.0 hi, 0.3 si, 0.0 st
%Cpu2 : 32.1 us, 0.3 sy, 0.0 ni, 67.2 id, 0.0 wa, 0.0 hi, 0.3 si, 0.0 st
%Cpu3 : 45.3 us, 0.7 sy, 0.0 ni, 54.0 id, 0.0 wa, 0.0 hi, 0.0 si, 0.0 st
%Cpu4 : 80.5 us, 0.0 sy, 0.0 ni, 19.5 id, 0.0 wa, 0.0 hi, 0.0 si, 0.0 st
%Cpu5 : 77.5 us, 0.3 sy, 0.0 ni, 22.2 id, 0.0 wa, 0.0 hi, 0.0 si, 0.0 st
%Cpu6 : 81.4 us, 0.0 sy, 0.0 ni, 18.6 id, 0.0 wa, 0.0 hi, 0.0 si, 0.0 st
%Cpu7 : 46.7 us, 0.0 sy, 0.0 ni, 53.0 id, 0.0 wa, 0.0 hi, 0.3 si, 0.0 st
%Cpu8 : 87.4 us, 0.0 sy, 0.0 ni, 12.6 id, 0.0 wa, 0.0 hi, 0.0 si, 0.0 st
%Cpu9 : 70.6 us, 0.3 sy, 0.0 ni, 29.0 id, 0.0 wa, 0.0 hi, 0.0 si, 0.0 st
%Cpu10 : 91.7 us, 0.0 sy, 0.0 ni, 8.3 id, 0.0 wa, 0.0 hi, 0.0 si, 0.0 st
%Cpu11 : 91.1 us, 0.3 sy, 0.0 ni, 8.6 id, 0.0 wa, 0.0 hi, 0.0 si, 0.0 st
%Cpu12 : 68.1 us, 0.3 sy, 0.0 ni, 31.6 id, 0.0 wa, 0.0 hi, 0.0 si, 0.0 st
%Cpu13 : 40.2 us, 0.3 sy, 0.0 ni, 59.5 id, 0.0 wa, 0.0 hi, 0.0 si, 0.0 st
%Cpu14 : 75.8 us, 0.0 sy, 0.0 ni, 24.2 id, 0.0 wa, 0.0 hi, 0.0 si, 0.0 st
%Cpu15 : 63.5 us, 0.0 sy, 0.0 ni, 36.5 id, 0.0 wa, 0.0 hi, 0.0 si, 0.0 st
%Cpu16 : 91.7 us, 0.0 sy, 0.0 ni, 8.3 id, 0.0 wa, 0.0 hi, 0.0 si, 0.0 st
%Cpu17 : 91.7 us, 0.0 sy, 0.0 ni, 8.3 id, 0.0 wa, 0.0 hi, 0.0 si, 0.0 st
%Cpu18 : 83.4 us, 0.3 sy, 0.0 ni, 16.3 id, 0.0 wa, 0.0 hi, 0.0 si, 0.0 st
%Cpu19 : 54.3 us, 0.0 sy, 0.0 ni, 45.7 id, 0.0 wa, 0.0 hi, 0.0 si, 0.0 st
%Cpu20 : 90.7 us, 0.0 sy, 0.0 ni, 9.3 id, 0.0 wa, 0.0 hi, 0.0 si, 0.0 st
%Cpu21 : 91.7 us, 0.0 sy, 0.0 ni, 8.3 id, 0.0 wa, 0.0 hi, 0.0 si, 0.0 st
%Cpu22 : 91.4 us, 0.0 sy, 0.0 ni, 8.6 id, 0.0 wa, 0.0 hi, 0.0 si, 0.0 st
%Cpu23 : 87.0 us, 0.0 sy, 0.0 ni, 13.0 id, 0.0 wa, 0.0 hi, 0.0 si, 0.0 st
KiB Mem : 97436048 total, 14773332 free, 31670192 used, 50992524 buff/cache
KiB Swap: 8191996 total, 7989884 free, 202112 used. 47788736 avail Mem | ISE - High CPU load on Primary PAN node
hsdc-pan-nac01/admin# tech top
Invoking tech top. Press Control-C to interrupt.
top - 13:40:56 up 303 days, 16:51, 2 users, load average: 18.38, 15.73, 13.35
Tasks: 642 total, 1 running, 641 sleeping, 0 stopped, 0 zombie
%Cpu0 : 23.2 us, 1.3 sy, 0.0 ni, 75.4 id, 0.0 wa, 0.0 hi, 0.0 si, 0.0 st
%Cpu1 : 30.0 us, 0.3 sy, 0.0 ni, 69.3 id, 0.0 wa, 0.0 hi, 0.3 si, 0.0 st
%Cpu2 : 32.1 us, 0.3 sy, 0.0 ni, 67.2 id, 0.0 wa, 0.0 hi, 0.3 si, 0.0 st
%Cpu3 : 45.3 us, 0.7 sy, 0.0 ni, 54.0 id, 0.0 wa, 0.0 hi, 0.0 si, 0.0 st
%Cpu4 : 80.5 us, 0.0 sy, 0.0 ni, 19.5 id, 0.0 wa, 0.0 hi, 0.0 si, 0.0 st
%Cpu5 : 77.5 us, 0.3 sy, 0.0 ni, 22.2 id, 0.0 wa, 0.0 hi, 0.0 si, 0.0 st
%Cpu6 : 81.4 us, 0.0 sy, 0.0 ni, 18.6 id, 0.0 wa, 0.0 hi, 0.0 si, 0.0 st
%Cpu7 : 46.7 us, 0.0 sy, 0.0 ni, 53.0 id, 0.0 wa, 0.0 hi, 0.3 si, 0.0 st
%Cpu8 : 87.4 us, 0.0 sy, 0.0 ni, 12.6 id, 0.0 wa, 0.0 hi, 0.0 si, 0.0 st
%Cpu9 : 70.6 us, 0.3 sy, 0.0 ni, 29.0 id, 0.0 wa, 0.0 hi, 0.0 si, 0.0 st
%Cpu10 : 91.7 us, 0.0 sy, 0.0 ni, 8.3 id, 0.0 wa, 0.0 hi, 0.0 si, 0.0 st
%Cpu11 : 91.1 us, 0.3 sy, 0.0 ni, 8.6 id, 0.0 wa, 0.0 hi, 0.0 si, 0.0 st
%Cpu12 : 68.1 us, 0.3 sy, 0.0 ni, 31.6 id, 0.0 wa, 0.0 hi, 0.0 si, 0.0 st
%Cpu13 : 40.2 us, 0.3 sy, 0.0 ni, 59.5 id, 0.0 wa, 0.0 hi, 0.0 si, 0.0 st
%Cpu14 : 75.8 us, 0.0 sy, 0.0 ni, 24.2 id, 0.0 wa, 0.0 hi, 0.0 si, 0.0 st
%Cpu15 : 63.5 us, 0.0 sy, 0.0 ni, 36.5 id, 0.0 wa, 0.0 hi, 0.0 si, 0.0 st
%Cpu16 : 91.7 us, 0.0 sy, 0.0 ni, 8.3 id, 0.0 wa, 0.0 hi, 0.0 si, 0.0 st
%Cpu17 : 91.7 us, 0.0 sy, 0.0 ni, 8.3 id, 0.0 wa, 0.0 hi, 0.0 si, 0.0 st
%Cpu18 : 83.4 us, 0.3 sy, 0.0 ni, 16.3 id, 0.0 wa, 0.0 hi, 0.0 si, 0.0 st
%Cpu19 : 54.3 us, 0.0 sy, 0.0 ni, 45.7 id, 0.0 wa, 0.0 hi, 0.0 si, 0.0 st
%Cpu20 : 90.7 us, 0.0 sy, 0.0 ni, 9.3 id, 0.0 wa, 0.0 hi, 0.0 si, 0.0 st
%Cpu21 : 91.7 us, 0.0 sy, 0.0 ni, 8.3 id, 0.0 wa, 0.0 hi, 0.0 si, 0.0 st
%Cpu22 : 91.4 us, 0.0 sy, 0.0 ni, 8.6 id, 0.0 wa, 0.0 hi, 0.0 si, 0.0 st
%Cpu23 : 87.0 us, 0.0 sy, 0.0 ni, 13.0 id, 0.0 wa, 0.0 hi, 0.0 si, 0.0 st
KiB Mem : 97436048 total, 14773332 free, 31670192 used, 50992524 buff/cache
KiB Swap: 8191996 total, 7989884 free, 202112 used. 47788736 avail Mem | timestamp : 2023-01-09T15:54:07.000+0000 || updatedby : surymish || type : RESOLUTION SUMMARY || visibility : External || details : No response from Cu since dec 10th | nan | SNS-3655-K9 | ise-2.7.0.356.SPA.x86_64.iso | nan | nan | 3 | nan | Configuration Assistance (process not intuitive, too complex, inconsistent...) | CISE | Identity Services Engine (ISE) - 3.0 | ISE Performance (High CPU / Memory / IO / GUI Slowness) | nan | nan | nan | nan | nan | nan |
694888348 | Question: Which software version is principally discussed in these documents?
Answer "NONE" if you cannot find answer in the given documents.
The ONLY software version should be selected from the given software version list: NA - COMPONENT ONLY/ 16.12.3s/ 2.3.3.3/ 17.6.4/ 16.12.4/ 2.2.2.5/ 1.3.3.6/ 16.12.03s/ 16.12.01s/ 16.12.04/ 16.12.1s/ 2.2.3.3/ THIRD_PARTY_PRODUCT_SW/ 16.12.1s/ 1.3.3.7/ 1.3.3.9/ 2.3.3.7/ 2.1.2.7/ 2.2.3.6/ 17.06.02 Response in this JSON format:
{"software_version": "","explanation": "", "summary": ""}
Software Version: -- => 16.12.4
Technology: Cisco DNA Center - On-Prem
Subtechnology: Cisco Software-Defined Access (SDA Wired)
Problem Code: Error Messages, Logs, Debugs
Product: NA
Product Family: C9300
Software Version: N/A
Router/Node Name: N/A
Problem Details: SDA FE C9300 - Device is Experiencing TCAM Exhaustion 97.0%. Layer2 TCAM Usage
Total Mac Addresses for this criterion: 583
Total Mac Addresses installed by LISP: REMOTE: 32768
E1-07-CNT-ES1#show platform hardware fed switch active fwd-asic resource tcam utilization | inc Unicast
Unicast MAC addresses 32768/1024 29060/1023
ERC-01-CNT2-ES1#show platform hardware fed switch active fwd-asic resource tcam utilization | inc Unicast
Unicast MAC addresses 32768/1024 30542/1024
SDA FE C9300 - Device is Experiencing TCAM Exhaustion 97.0%. Layer2 TCAM Usage
Total Mac Addresses for this criterion: 583
Total Mac Addresses installed by LISP: REMOTE: 32768
E1-07-CNT-ES1#show platform hardware fed switch active fwd-asic resource tcam utilization | inc Unicast
Unicast MAC addresses 32768/1024 29060/1023
ERC-01-CNT2-ES1#show platform hardware fed switch active fwd-asic resource tcam utilization | inc Unicast
Unicast MAC addresses 32768/1024 30542/1024
timestamp : 2023-02-10T13:20:08.000+0000 || updatedby : karanand || type : RESOLUTION SUMMARY || visibility : External || details : Closing the case as we have not had any response to the email over multiple attempts. | Question: Which product is principally discussed in these documents?
Answer "NONE" if you cannot find answer in the given documents.
The ONLY product name should be selected from the given product name list: DN2-HW-APL-XL/ ASR1009-X/ C9300-48U/ DN1-HW-APL/ C9500-48Y4C/ THIRD_PARTY_PRODUCT_HW/ C9300-48U-A/ ASR1002-HX Response in this JSON format:
{"product_name": "","explanation": "", "summary": ""}
Technology: Cisco DNA Center - On-Prem
Subtechnology: Cisco Software-Defined Access (SDA Wired)
Problem Code: Error Messages, Logs, Debugs
Product: NA
Product Family: C9300
Software Version: N/A
Router/Node Name: N/A
Problem Details: SDA FE C9300 - Device is Experiencing TCAM Exhaustion 97.0%. Layer2 TCAM Usage
Total Mac Addresses for this criterion: 583
Total Mac Addresses installed by LISP: REMOTE: 32768
E1-07-CNT-ES1#show platform hardware fed switch active fwd-asic resource tcam utilization | inc Unicast
Unicast MAC addresses 32768/1024 29060/1023
ERC-01-CNT2-ES1#show platform hardware fed switch active fwd-asic resource tcam utilization | inc Unicast
Unicast MAC addresses 32768/1024 30542/1024
SDA FE C9300 - Device is Experiencing TCAM Exhaustion 97.0%. Layer2 TCAM Usage
Total Mac Addresses for this criterion: 583
Total Mac Addresses installed by LISP: REMOTE: 32768
E1-07-CNT-ES1#show platform hardware fed switch active fwd-asic resource tcam utilization | inc Unicast
Unicast MAC addresses 32768/1024 29060/1023
ERC-01-CNT2-ES1#show platform hardware fed switch active fwd-asic resource tcam utilization | inc Unicast
Unicast MAC addresses 32768/1024 30542/1024
timestamp : 2023-02-10T13:20:08.000+0000 || updatedby : karanand || type : RESOLUTION SUMMARY || visibility : External || details : Closing the case as we have not had any response to the email over multiple attempts. | Technology: Cisco DNA Center - On-Prem
Subtechnology: Cisco Software-Defined Access (SDA Wired)
Problem Code: Error Messages, Logs, Debugs
Product: NA
Product Family: C9300
Software Version: N/A
Router/Node Name: N/A
Problem Details: SDA FE C9300 - Device is Experiencing TCAM Exhaustion 97.0%. Layer2 TCAM Usage
Total Mac Addresses for this criterion: 583
Total Mac Addresses installed by LISP: REMOTE: 32768
E1-07-CNT-ES1#show platform hardware fed switch active fwd-asic resource tcam utilization | inc Unicast
Unicast MAC addresses 32768/1024 29060/1023
ERC-01-CNT2-ES1#show platform hardware fed switch active fwd-asic resource tcam utilization | inc Unicast
Unicast MAC addresses 32768/1024 30542/1024 | SDA FE C9300 - Device is Experiencing TCAM Exhaustion 97.0%. Layer2 TCAM Usage
Total Mac Addresses for this criterion: 583
Total Mac Addresses installed by LISP: REMOTE: 32768
E1-07-CNT-ES1#show platform hardware fed switch active fwd-asic resource tcam utilization | inc Unicast
Unicast MAC addresses 32768/1024 29060/1023
ERC-01-CNT2-ES1#show platform hardware fed switch active fwd-asic resource tcam utilization | inc Unicast
Unicast MAC addresses 32768/1024 30542/1024 | timestamp : 2023-02-10T13:20:08.000+0000 || updatedby : karanand || type : RESOLUTION SUMMARY || visibility : External || details : Closing the case as we have not had any response to the email over multiple attempts. | nan | C9300-48U | cat9k_iosxe.16.12.04.SPA.bin | nan | nan | 3 | nan | Usability -other than config (product hard to use, no console port...) | C9300 | Cisco DNA Center - On-Prem | Cisco Software-Defined Access (SDA Wired) | nan | nan | nan | nan | nan | nan |
695942943 | Question: Which software version is principally discussed in these documents?
Answer "NONE" if you cannot find answer in the given documents.
The ONLY software version should be selected from the given software version list: 9.16.2.3/ 9.14.2.4/ 9.14.2.4/ 9.14.1 Response in this JSON format:
{"software_version": "","explanation": "", "summary": ""}
Technology: Adaptive Security Appliance
Subtechnology: ASA Firepower Devices - Non-VPN
Problem Code: Error Messages, Logs, Debugs
Product: NA
Product Family: FPRUHI
Software Version: N/A
Router/Node Name: N/A
Problem Details: Hi Team,
We are seeing that the some connections are getting dropped and the packets are note seen on interfaces.
PFA image
Source : 172.24.140.69
Destination : 10.245.0.114
Port : 7236
Will atach the captures and logs to the case..
Hi Team,
We are seeing that the some connections are getting dropped and the packets are note seen on interfaces.
PFA image
Source : 172.24.140.69
Destination : 10.245.0.114
Port : 7236
Will atach the captures and logs to the case..
Configuration changes that need to be done:-
policy-map global_policy
no class tcp_bypass
!
class any-tcp
set connection advanced-options tcp-state-bypas
!
wr mem
Verification:-
show runn policy-map
show connection
show connection detail
It was asked to close the service request further. | Question: Which product is principally discussed in these documents?
Answer "NONE" if you cannot find answer in the given documents.
The ONLY product name should be selected from the given product name list: FPR9K-SM-36/ FPR-C9300-AC/ FPR1150-ASA-K9 Response in this JSON format:
{"product_name": "","explanation": "", "summary": ""}
Technology: Adaptive Security Appliance
Subtechnology: ASA Firepower Devices - Non-VPN
Problem Code: Error Messages, Logs, Debugs
Product: NA
Product Family: FPRUHI
Software Version: N/A
Router/Node Name: N/A
Problem Details: Hi Team,
We are seeing that the some connections are getting dropped and the packets are note seen on interfaces.
PFA image
Source : 172.24.140.69
Destination : 10.245.0.114
Port : 7236
Will atach the captures and logs to the case..
Hi Team,
We are seeing that the some connections are getting dropped and the packets are note seen on interfaces.
PFA image
Source : 172.24.140.69
Destination : 10.245.0.114
Port : 7236
Will atach the captures and logs to the case..
Configuration changes that need to be done:-
policy-map global_policy
no class tcp_bypass
!
class any-tcp
set connection advanced-options tcp-state-bypas
!
wr mem
Verification:-
show runn policy-map
show connection
show connection detail
It was asked to close the service request further. | Technology: Adaptive Security Appliance
Subtechnology: ASA Firepower Devices - Non-VPN
Problem Code: Error Messages, Logs, Debugs
Product: NA
Product Family: FPRUHI
Software Version: N/A
Router/Node Name: N/A
Problem Details: Hi Team,
We are seeing that the some connections are getting dropped and the packets are note seen on interfaces.
PFA image
Source : 172.24.140.69
Destination : 10.245.0.114
Port : 7236
Will atach the captures and logs to the case.. | Hi Team,
We are seeing that the some connections are getting dropped and the packets are note seen on interfaces.
PFA image
Source : 172.24.140.69
Destination : 10.245.0.114
Port : 7236
Will atach the captures and logs to the case.. | Configuration changes that need to be done:-
policy-map global_policy
no class tcp_bypass
!
class any-tcp
set connection advanced-options tcp-state-bypas
!
wr mem
Verification:-
show runn policy-map
show connection
show connection detail
It was asked to close the service request further. | Connections getting drop on firepower running ASA | FPR-C9300-AC | 9.14(2)4 | 9.14(2)4 | 54.0 | 3 | 100.0 | Software -not a bug (scalability, version selection, install/upgrade help...) | FPRUHI | Adaptive Security Appliance | ASA Firepower Devices - Non-VPN | 01t1C000006E6CbQAK | Error Messages, Logs, Debugs | ASA Firepower Devices - Non-VPN | Adaptive Security Appliance | 01t15000004dGB5AAM | CaseClosureFieldAutomation: Partial |
694624943 | Question: Which software version is principally discussed in these documents?
Answer "NONE" if you cannot find answer in the given documents.
The ONLY software version should be selected from the given software version list: 1/ 8.10.151.0/ 8.10.171.0/ 802.11AC/ 8.5.171.0/ 8.10.183.0/ 8.10.130.0/ 8.10.171.0/ THIRD_PARTY_PRODUCT_SW/ 8.5.135.0/ 8.3.143.0/ NA-CIN_CLOSE_SW/ 8.5.140.0/ 4.0.1a/ WLC CLIENT INTEROP/ 12.0.13/ 8.5.151.0/ 8.4/ 120.13/ 8.5.160.0/ 8.10.151.0/ 8.3.143.0/ 8.3.131.0/ 8.3.150.0/ 8.5.135.0/ 8.5.161.0/ 8.10.185.0/ 8.2.166.0/ 8.5.140.0/ 8.5.151.0/ 8.3.150.0/ 16.12.3s/ WLC RRM/RF/CLEANAIR/ 8.5.151.0/ 8.10.130.0/ NA - COMPONENT ONLY/ 8.10.162.0/ 8.3.140.0/ 8.10.150.0/ 8.10.183.0/ 8.10.161.0/ 8.10.185.0/ 8.5.151.0/ 16.12.4/ 17.3.5b/ 8.10.183.0/ 8.10.171.0/ 8.5.171.0 Response in this JSON format:
{"software_version": "","explanation": "", "summary": ""}
Closed
Technology: Wireless
Subtechnology: 8540 Series Wireless LAN Controller (AIR-CT8540)
Problem Code: Error Messages, Logs, Debugs
Product: NA
Product Family: AIRCTA2
Software Version: N/A
Router/Node Name: N/A
Problem Details: Many Guest connecting to NUS_Guest WiFi are having intermittent internet connection.\
(TLDC-WL-WLC01) >show client detail c4:23:60:f8:68:9e
Client MAC Address............................... c4:23:60:f8:68:9e
Client Username ................................. c4:23:60:f8:68:9e
Client Webauth Username ......................... c4:23:60:f8:68:9e
Hostname: .......................................
Device Type: .................................... Unclassified
AP MAC Address................................... 84:f1:47:6c:bb:a0
AP Name.......................................... BIZ1-02-AP09
AP radio slot Id................................. 1
Client State..................................... Associated
User Authenticated by ........................... RADIUS Server
Client User Group................................ c4:23:60:f8:68:9e
Client NAC OOB State............................. Access
Wireless LAN Id.................................. 17
Wireless LAN Network Name (SSID)................. NUS_Guest
Wireless LAN Profile Name........................ NUS_Guest_NUS_fa_F_a317b737
WLAN Profile check for roaming................... Disabled
Hotspot (802.11u)................................ Not Supported
Connected For ................................... 78 secs
BSSID............................................ 84:f1:47:6c:bb:ae
Channel.......................................... 64
IP Address....................................... 10.244.8.1
Gateway Address.................................. 10.244.0.1
Netmask.......................................... 255.255.192.0
--More-- or (q)uit
IPv6 Address..................................... fe80::c50c:74bb:1203:3386
Association Id................................... 1
Authentication Algorithm......................... Open System
Reason Code...................................... 1
Client IPSK-TAG.................................. N/A
Status Code...................................... 0
Session Timeout.................................. 43200
Client CCX version............................... No CCX support
QoS Level........................................ Silver
Avg data Rate.................................... 0
Burst data Rate.................................. 0
Avg Real time data Rate.......................... 0
Burst Real Time data Rate........................ 0
Avg Uplink data Rate............................. 0
Burst Uplink data Rate........................... 0
Avg Uplink Real time data Rate................... 0
Burst Uplink Real Time data Rate................. 0
802.1P Priority Tag.............................. disabled
Security Group Tag............................... 6
KTS CAC Capability............................... No
Qos Map Capability............................... Yes
WMM Support...................................... Enabled
APSD ACs....................................... BK BE VI VO
--More-- or (q)uit
Current Rate..................................... 12.0
Supported Rates.................................. 6.0,12.0,18.0,24.0,36.0,48.0,
............................................. 54.0
Mobility State................................... Local
Mobility Move Count.............................. 0
Security Policy Completed........................ No
Policy Manager State............................. WEBAUTH_REQD
Pre-auth IPv4 ACL Name........................... none
Pre-auth IPv4 ACL Applied Status................. Unavailable
Pre-auth IPv6 ACL Name........................... none
Pre-auth IPv6 ACL Applied Status................. Unavailable
Pre-auth Flex IPv4 ACL Name...................... none
Pre-auth Flex IPv4 ACL Applied Status............ Unavailable
Pre-auth Flex IPv6 ACL Name...................... none
Pre-auth Flex IPv6 ACL Applied Status............ Unavailable
Pre-auth redirect URL............................ none
Audit Session ID................................. none
AAA Role Type.................................... none
Acct Interim Interval............................ 0
Local Policy Applied............................. none
IPv4 ACL Name.................................... none
AAA FlexConnect ACL Applied Status............... Unavailable
IPv4 ACL Applied Status.......................... Unavailable
--More-- or (q)uit
IPv6 ACL Name.................................... none
IPv6 ACL Applied Status.......................... Unavailable
Post-auth Flex IPv6 ACL Name..................... none
Post-auth Flex IPv6 ACL Applied Status........... Unavailable
Layer2 ACL Name.................................. none
Layer2 ACL Applied Status........................ Unavailable
URL ACL Name..................................... none
URL ACL Applied Status........................... Unavailable
Client Type...................................... SimpleIP
mDNS Status...................................... Disabled
mDNS Profile Name................................ none
No. of mDNS Services Advertised.................. 0
Policy Type...................................... N/A
Encryption Cipher................................ None
Protected Management Frame ...................... No
Management Frame Protection...................... No
EAP Type......................................... Unknown
Interface........................................ management
VLAN............................................. 390
Quarantine VLAN.................................. 0
Access VLAN...................................... 390
Local Bridging VLAN.............................. 390
Client Capabilities:
--More-- or (q)uit
Radio Capability........................... 802.11ax
CF Pollable................................ Not implemented
CF Poll Request............................ Not implemented
Short Preamble............................. Not implemented
PBCC....................................... Not implemented
Channel Agility............................ Not implemented
Listen Interval............................ 250
Fast BSS Transition........................ Not implemented
11v BSS Transition......................... Implemented
Non-Operable Channels............................ None
Non-Prefer Channels.............................. None
Client Wifi Direct Capabilities:
WFD capable................................ No
Manged WFD capable......................... No
Cross Connection Capable................... No
Support Concurrent Operation............... No
Fast BSS Transition Details:
DNS Server details:
DNS server IP ............................. 0.0.0.0
DNS server IP ............................. 0.0.0.0
Assisted Roaming Prediction List details:
--More-- or (q)uit
Client Dhcp Required: True
Allowed (URL)IP Addresses
-------------------------
AVC Profile Name: ............................... none
OpenDns Profile Name: ........................... none
Fastlane Client: ................................ No
Max DSCP: ....................................... 0
Nas Identifier: ................................. TLDC-WL-WLC01
Fabric Configuration
--------------------
Fabric Status: .................................. Enabled
Vnid: ........................................... 8211
Client RLOC IP registered to MS: ................ 172.18.1.133
Clients RLOC IP : .............................. 172.18.1.133
Fabric Flex Avc Policy Name: ....................
Fabric Statistics
--------------------
Primary Map Server : 172.18.0.129
ms_stattype_registrations_sent............... 1
ms_stattype_deregistrations_sent............. 0
ms_stattype_registrations_successful......... 1
ms_stattype_registrations_rejected........... 0
--More-- or (q)uit
ms_stattype_registrations_deregistrations.... 0
Secondary Map Server : 172.18.0.130
ms_stattype_registrations_sent............... 1
ms_stattype_deregistrations_sent............. 0
ms_stattype_registrations_successful......... 1
ms_stattype_registrations_rejected........... 0
ms_stattype_registrations_deregistrations.... 0
Client Statistics:
Number of Bytes Received................... 432456
Number of Bytes Sent....................... 401863
Total Number of Bytes Sent................. 401863
Total Number of Bytes Recv................. 432456
Number of Bytes Sent (last 90s)............ 51897
Number of Bytes Recv (last 90s)............ 53360
Number of Packets Received................. 3591
Number of Packets Sent..................... 3812
Number of Interim-Update Sent.............. 0
Number of EAP Id Request Msg Timeouts...... 0
Number of EAP Id Request Msg Failures...... 0
Number of EAP Request Msg Timeouts......... 0
Number of EAP Request Msg Failures......... 0
Number of EAP Key Msg Timeouts............. 0
Number of EAP Key Msg Failures............. 0
--More-- or (q)uit
Number of Data Retries..................... 435
Number of RTS Retries...................... 0
Number of Duplicate Received Packets....... 0
Number of Decrypt Failed Packets........... 0
Number of Mic Failured Packets............. 0
Number of Mic Missing Packets.............. 0
Number of RA Packets Dropped............... 0
Number of Policy Errors.................... 0
Radio Signal Strength Indicator............ -64 dBm
Signal to Noise Ratio...................... 30 dB
Client Detected as Inactive................ No
Client RBACL Statistics:
Number of RBACL Allowed Packets............ 0
Number of RBACL Denied Packets............. 0
Client Rate Limiting Statistics:
Number of Data Packets Received............ 0
Number of Data Rx Packets Dropped.......... 0
Number of Data Bytes Received.............. 0
Number of Data Rx Bytes Dropped............ 0
Number of Realtime Packets Received........ 0
Number of Realtime Rx Packets Dropped...... 0
Number of Realtime Bytes Received.......... 0
Number of Realtime Rx Bytes Dropped........ 0
--More-- or (q)uit
Number of Data Packets Sent................ 0
Number of Data Tx Packets Dropped.......... 0
Number of Data Bytes Sent.................. 0
Number of Data Tx Bytes Dropped............ 0
Number of Realtime Packets Sent............ 0
Number of Realtime Tx Packets Dropped...... 0
Number of Realtime Bytes Sent.............. 0
Number of Realtime Tx Bytes Dropped........ 0
Nearby AP Statistics:
BIZ1-02-AP10(slot 0)
antenna0: 35 secs ago.................... -45 dBm
antenna1: 35 secs ago.................... -45 dBm
BIZ1-02-AP10(slot 1)
antenna0: 80 secs ago.................... -43 dBm
antenna1: 80 secs ago.................... -43 dBm
BIZ1-02-AP15(slot 0)
antenna0: 35 secs ago.................... -75 dBm
antenna1: 35 secs ago.................... -75 dBm
BIZ1-02-AP15(slot 1)
antenna0: 80 secs ago.................... -80 dBm
antenna1: 80 secs ago.................... -80 dBm
BIZ1-02-AP24(slot 0)
antenna0: 130 secs ago................... -79 dBm
--More-- or (q)uit
antenna1: 130 secs ago................... -79 dBm
BIZ1-03-AP11(slot 0)
antenna0: 35 secs ago.................... -82 dBm
antenna1: 35 secs ago.................... -82 dBm
BIZ1-02-AP09(slot 0)
antenna0: 130 secs ago................... -48 dBm
antenna1: 130 secs ago................... -48 dBm
BIZ1-02-AP09(slot 1)
antenna0: 79 secs ago.................... -58 dBm
antenna1: 79 secs ago.................... -58 dBm
BIZ1-02-AP07(slot 1)
antenna0: 31 secs ago.................... -69 dBm
antenna1: 31 secs ago.................... -69 dBm
BIZ1-01-AP10(slot 0)
antenna0: 34 secs ago.................... -79 dBm
antenna1: 34 secs ago.................... -79 dBm
BIZ1-01-AP11(slot 0)
antenna0: 34 secs ago.................... -80 dBm
antenna1: 34 secs ago.................... -80 dBm
BIZ1-03-AP10(slot 0)
antenna0: 34 secs ago.................... -66 dBm
antenna1: 34 secs ago.................... -66 dBm
BIZ1-03-AP13(slot 0)
--More-- or (q)uit
antenna0: 80 secs ago.................... -84 dBm
antenna1: 80 secs ago.................... -84 dBm
BIZ1-02-AP13(slot 0)
antenna0: 34 secs ago.................... -66 dBm
antenna1: 34 secs ago.................... -66 dBm
BIZ1-02-AP14(slot 0)
antenna0: 130 secs ago................... -68 dBm
antenna1: 130 secs ago................... -68 dBm
BIZ1-02-AP14(slot 1)
antenna0: 33 secs ago.................... -71 dBm
antenna1: 33 secs ago.................... -71 dBm
BIZ1-03-AP12(slot 0)
antenna0: 130 secs ago................... -80 dBm
antenna1: 130 secs ago................... -80 dBm
BIZ1-03-AP12(slot 1)
antenna0: 80 secs ago.................... -84 dBm
antenna1: 80 secs ago.................... -84 dBm
BIZ1-02-AP12(slot 1)
antenna0: 79 secs ago.................... -55 dBm
antenna1: 79 secs ago.................... -55 dBm
BIZ1-01-AP02(slot 0)
antenna0: 35 secs ago.................... -80 dBm
antenna1: 35 secs ago.................... -80 dBm
--More-- or (q)uit
BIZ1-02-AP08(slot 0)
antenna0: 34 secs ago.................... -49 dBm
antenna1: 34 secs ago.................... -49 dBm
BIZ1-02-AP08(slot 1)
antenna0: 33 secs ago.................... -67 dBm
antenna1: 33 secs ago.................... -67 dBm
BIZ1-02-AP11(slot 0)
antenna0: 34 secs ago.................... -36 dBm
antenna1: 34 secs ago.................... -36 dBm
BIZ1-02-AP11(slot 1)
antenna0: 79 secs ago.................... -38 dBm
antenna1: 79 secs ago.................... -38 dBm
(TLDC-WL-WLC01) >
Many Guest connecting to NUS_Guest WiFi are having intermittent internet connection.\
(TLDC-WL-WLC01) >show client detail c4:23:60:f8:68:9e
Client MAC Address............................... c4:23:60:f8:68:9e
Client Username ................................. c4:23:60:f8:68:9e
Client Webauth Username ......................... c4:23:60:f8:68:9e
Hostname: .......................................
Device Type: .................................... Unclassified
AP MAC Address................................... 84:f1:47:6c:bb:a0
AP Name.......................................... BIZ1-02-AP09
AP radio slot Id................................. 1
Client State..................................... Associated
User Authenticated by ........................... RADIUS Server
Client User Group................................ c4:23:60:f8:68:9e
Client NAC OOB State............................. Access
Wireless LAN Id.................................. 17
Wireless LAN Network Name (SSID)................. NUS_Guest
Wireless LAN Profile Name........................ NUS_Guest_NUS_fa_F_a317b737
WLAN Profile check for roaming................... Disabled
Hotspot (802.11u)................................ Not Supported
Connected For ................................... 78 secs
BSSID............................................ 84:f1:47:6c:bb:ae
Channel.......................................... 64
IP Address....................................... 10.244.8.1
Gateway Address.................................. 10.244.0.1
Netmask.......................................... 255.255.192.0
--More-- or (q)uit
IPv6 Address..................................... fe80::c50c:74bb:1203:3386
Association Id................................... 1
Authentication Algorithm......................... Open System
Reason Code...................................... 1
Client IPSK-TAG.................................. N/A
Status Code...................................... 0
Session Timeout.................................. 43200
Client CCX version............................... No CCX support
QoS Level........................................ Silver
Avg data Rate.................................... 0
Burst data Rate.................................. 0
Avg Real time data Rate.......................... 0
Burst Real Time data Rate........................ 0
Avg Uplink data Rate............................. 0
Burst Uplink data Rate........................... 0
Avg Uplink Real time data Rate................... 0
Burst Uplink Real Time data Rate................. 0
802.1P Priority Tag.............................. disabled
Security Group Tag............................... 6
KTS CAC Capability............................... No
Qos Map Capability............................... Yes
WMM Support...................................... Enabled
APSD ACs....................................... BK BE VI VO
--More-- or (q)uit
Current Rate..................................... 12.0
Supported Rates.................................. 6.0,12.0,18.0,24.0,36.0,48.0,
............................................. 54.0
Mobility State................................... Local
Mobility Move Count.............................. 0
Security Policy Completed........................ No
Policy Manager State............................. WEBAUTH_REQD
Pre-auth IPv4 ACL Name........................... none
Pre-auth IPv4 ACL Applied Status................. Unavailable
Pre-auth IPv6 ACL Name........................... none
Pre-auth IPv6 ACL Applied Status................. Unavailable
Pre-auth Flex IPv4 ACL Name...................... none
Pre-auth Flex IPv4 ACL Applied Status............ Unavailable
Pre-auth Flex IPv6 ACL Name...................... none
Pre-auth Flex IPv6 ACL Applied Status............ Unavailable
Pre-auth redirect URL............................ none
Audit Session ID................................. none
AAA Role Type.................................... none
Acct Interim Interval............................ 0
Local Policy Applied............................. none
IPv4 ACL Name.................................... none
AAA FlexConnect ACL Applied Status............... Unavailable
IPv4 ACL Applied Status.......................... Unavailable
--More-- or (q)uit
IPv6 ACL Name.................................... none
IPv6 ACL Applied Status.......................... Unavailable
Post-auth Flex IPv6 ACL Name..................... none
Post-auth Flex IPv6 ACL Applied Status........... Unavailable
Layer2 ACL Name.................................. none
Layer2 ACL Applied Status........................ Unavailable
URL ACL Name..................................... none
URL ACL Applied Status........................... Unavailable
Client Type...................................... SimpleIP
mDNS Status...................................... Disabled
mDNS Profile Name................................ none
No. of mDNS Services Advertised.................. 0
Policy Type...................................... N/A
Encryption Cipher................................ None
Protected Management Frame ...................... No
Management Frame Protection...................... No
EAP Type......................................... Unknown
Interface........................................ management
VLAN............................................. 390
Quarantine VLAN.................................. 0
Access VLAN...................................... 390
Local Bridging VLAN.............................. 390
Client Capabilities:
--More-- or (q)uit
Radio Capability........................... 802.11ax
CF Pollable................................ Not implemented
CF Poll Request............................ Not implemented
Short Preamble............................. Not implemented
PBCC....................................... Not implemented
Channel Agility............................ Not implemented
Listen Interval............................ 250
Fast BSS Transition........................ Not implemented
11v BSS Transition......................... Implemented
Non-Operable Channels............................ None
Non-Prefer Channels.............................. None
Client Wifi Direct Capabilities:
WFD capable................................ No
Manged WFD capable......................... No
Cross Connection Capable................... No
Support Concurrent Operation............... No
Fast BSS Transition Details:
DNS Server details:
DNS server IP ............................. 0.0.0.0
DNS server IP ............................. 0.0.0.0
Assisted Roaming Prediction List details:
--More-- or (q)uit
Client Dhcp Required: True
Allowed (URL)IP Addresses
-------------------------
AVC Profile Name: ............................... none
OpenDns Profile Name: ........................... none
Fastlane Client: ................................ No
Max DSCP: ....................................... 0
Nas Identifier: ................................. TLDC-WL-WLC01
Fabric Configuration
--------------------
Fabric Status: .................................. Enabled
Vnid: ........................................... 8211
Client RLOC IP registered to MS: ................ 172.18.1.133
Clients RLOC IP : .............................. 172.18.1.133
Fabric Flex Avc Policy Name: ....................
Fabric Statistics
--------------------
Primary Map Server : 172.18.0.129
ms_stattype_registrations_sent............... 1
ms_stattype_deregistrations_sent............. 0
ms_stattype_registrations_successful......... 1
ms_stattype_registrations_rejected........... 0
--More-- or (q)uit
ms_stattype_registrations_deregistrations.... 0
Secondary Map Server : 172.18.0.130
ms_stattype_registrations_sent............... 1
ms_stattype_deregistrations_sent............. 0
ms_stattype_registrations_successful......... 1
ms_stattype_registrations_rejected........... 0
ms_stattype_registrations_deregistrations.... 0
Client Statistics:
Number of Bytes Received................... 432456
Number of Bytes Sent....................... 401863
Total Number of Bytes Sent................. 401863
Total Number of Bytes Recv................. 432456
Number of Bytes Sent (last 90s)............ 51897
Number of Bytes Recv (last 90s)............ 53360
Number of Packets Received................. 3591
Number of Packets Sent..................... 3812
Number of Interim-Update Sent.............. 0
Number of EAP Id Request Msg Timeouts...... 0
Number of EAP Id Request Msg Failures...... 0
Number of EAP Request Msg Timeouts......... 0
Number of EAP Request Msg Failures......... 0
Number of EAP Key Msg Timeouts............. 0
Number of EAP Key Msg Failures............. 0
--More-- or (q)uit
Number of Data Retries..................... 435
Number of RTS Retries...................... 0
Number of Duplicate Received Packets....... 0
Number of Decrypt Failed Packets........... 0
Number of Mic Failured Packets............. 0
Number of Mic Missing Packets.............. 0
Number of RA Packets Dropped............... 0
Number of Policy Errors.................... 0
Radio Signal Strength Indicator............ -64 dBm
Signal to Noise Ratio...................... 30 dB
Client Detected as Inactive................ No
Client RBACL Statistics:
Number of RBACL Allowed Packets............ 0
Number of RBACL Denied Packets............. 0
Client Rate Limiting Statistics:
Number of Data Packets Received............ 0
Number of Data Rx Packets Dropped.......... 0
Number of Data Bytes Received.............. 0
Number of Data Rx Bytes Dropped............ 0
Number of Realtime Packets Received........ 0
Number of Realtime Rx Packets Dropped...... 0
Number of Realtime Bytes Received.......... 0
Number of Realtime Rx Bytes Dropped........ 0
--More-- or (q)uit
Number of Data Packets Sent................ 0
Number of Data Tx Packets Dropped.......... 0
Number of Data Bytes Sent.................. 0
Number of Data Tx Bytes Dropped............ 0
Number of Realtime Packets Sent............ 0
Number of Realtime Tx Packets Dropped...... 0
Number of Realtime Bytes Sent.............. 0
Number of Realtime Tx Bytes Dropped........ 0
Nearby AP Statistics:
BIZ1-02-AP10(slot 0)
antenna0: 35 secs ago.................... -45 dBm
antenna1: 35 secs ago.................... -45 dBm
BIZ1-02-AP10(slot 1)
antenna0: 80 secs ago.................... -43 dBm
antenna1: 80 secs ago.................... -43 dBm
BIZ1-02-AP15(slot 0)
antenna0: 35 secs ago.................... -75 dBm
antenna1: 35 secs ago.................... -75 dBm
BIZ1-02-AP15(slot 1)
antenna0: 80 secs ago.................... -80 dBm
antenna1: 80 secs ago.................... -80 dBm
BIZ1-02-AP24(slot 0)
antenna0: 130 secs ago................... -79 dBm
--More-- or (q)uit
antenna1: 130 secs ago................... -79 dBm
BIZ1-03-AP11(slot 0)
antenna0: 35 secs ago.................... -82 dBm
antenna1: 35 secs ago.................... -82 dBm
BIZ1-02-AP09(slot 0)
antenna0: 130 secs ago................... -48 dBm
antenna1: 130 secs ago................... -48 dBm
BIZ1-02-AP09(slot 1)
antenna0: 79 secs ago.................... -58 dBm
antenna1: 79 secs ago.................... -58 dBm
BIZ1-02-AP07(slot 1)
antenna0: 31 secs ago.................... -69 dBm
antenna1: 31 secs ago.................... -69 dBm
BIZ1-01-AP10(slot 0)
antenna0: 34 secs ago.................... -79 dBm
antenna1: 34 secs ago.................... -79 dBm
BIZ1-01-AP11(slot 0)
antenna0: 34 secs ago.................... -80 dBm
antenna1: 34 secs ago.................... -80 dBm
BIZ1-03-AP10(slot 0)
antenna0: 34 secs ago.................... -66 dBm
antenna1: 34 secs ago.................... -66 dBm
BIZ1-03-AP13(slot 0)
--More-- or (q)uit
antenna0: 80 secs ago.................... -84 dBm
antenna1: 80 secs ago.................... -84 dBm
BIZ1-02-AP13(slot 0)
antenna0: 34 secs ago.................... -66 dBm
antenna1: 34 secs ago.................... -66 dBm
BIZ1-02-AP14(slot 0)
antenna0: 130 secs ago................... -68 dBm
antenna1: 130 secs ago................... -68 dBm
BIZ1-02-AP14(slot 1)
antenna0: 33 secs ago.................... -71 dBm
antenna1: 33 secs ago.................... -71 dBm
BIZ1-03-AP12(slot 0)
antenna0: 130 secs ago................... -80 dBm
antenna1: 130 secs ago................... -80 dBm
BIZ1-03-AP12(slot 1)
antenna0: 80 secs ago.................... -84 dBm
antenna1: 80 secs ago.................... -84 dBm
BIZ1-02-AP12(slot 1)
antenna0: 79 secs ago.................... -55 dBm
antenna1: 79 secs ago.................... -55 dBm
BIZ1-01-AP02(slot 0)
antenna0: 35 secs ago.................... -80 dBm
antenna1: 35 secs ago.................... -80 dBm
--More-- or (q)uit
BIZ1-02-AP08(slot 0)
antenna0: 34 secs ago.................... -49 dBm
antenna1: 34 secs ago.................... -49 dBm
BIZ1-02-AP08(slot 1)
antenna0: 33 secs ago.................... -67 dBm
antenna1: 33 secs ago.................... -67 dBm
BIZ1-02-AP11(slot 0)
antenna0: 34 secs ago.................... -36 dBm
antenna1: 34 secs ago.................... -36 dBm
BIZ1-02-AP11(slot 1)
antenna0: 79 secs ago.................... -38 dBm
antenna1: 79 secs ago.................... -38 dBm
(TLDC-WL-WLC01) >
Issue: Guest Clients were not able to connect due to the captive portal not redirecting.
Steps Taken:
* Assessed logs collected from cu and found some bugs which match the issue:
https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvh20238
* Asked customer to implement following workaround:
-Remove the ACL from the FlexConnect Group and add it again.
OR
-Reboot the AP.
===============
Customer will be monitoring the issue and will open a new case if issue arises. | Question: Which product is principally discussed in these documents?
Answer "NONE" if you cannot find answer in the given documents.
The ONLY product name should be selected from the given product name list: AIR-CT8540-1K-K9/ AIR-CT8540-K9/ NA-CIN_CLOSE_HW/ C9120AXI-S/ THIRD_PARTY_PRODUCT_HW/ AIR-CT8540-CA-K9/ AIR-AP2802I-S-K9/ AIR-CT8540-K9Z/ AIR-BZL-C240M4/ DN2-HW-APL-XL/ WLC-AP-T/ AIR-CT8540-SW-8.2 Response in this JSON format:
{"product_name": "","explanation": "", "summary": ""}
Technology: Wireless
Subtechnology: 8540 Series Wireless LAN Controller (AIR-CT8540)
Problem Code: Error Messages, Logs, Debugs
Product: NA
Product Family: AIRCTA2
Software Version: N/A
Router/Node Name: N/A
Problem Details: Many Guest connecting to NUS_Guest WiFi are having intermittent internet connection.\
(TLDC-WL-WLC01) >show client detail c4:23:60:f8:68:9e
Client MAC Address............................... c4:23:60:f8:68:9e
Client Username ................................. c4:23:60:f8:68:9e
Client Webauth Username ......................... c4:23:60:f8:68:9e
Hostname: .......................................
Device Type: .................................... Unclassified
AP MAC Address................................... 84:f1:47:6c:bb:a0
AP Name.......................................... BIZ1-02-AP09
AP radio slot Id................................. 1
Client State..................................... Associated
User Authenticated by ........................... RADIUS Server
Client User Group................................ c4:23:60:f8:68:9e
Client NAC OOB State............................. Access
Wireless LAN Id.................................. 17
Wireless LAN Network Name (SSID)................. NUS_Guest
Wireless LAN Profile Name........................ NUS_Guest_NUS_fa_F_a317b737
WLAN Profile check for roaming................... Disabled
Hotspot (802.11u)................................ Not Supported
Connected For ................................... 78 secs
BSSID............................................ 84:f1:47:6c:bb:ae
Channel.......................................... 64
IP Address....................................... 10.244.8.1
Gateway Address.................................. 10.244.0.1
Netmask.......................................... 255.255.192.0
--More-- or (q)uit
IPv6 Address..................................... fe80::c50c:74bb:1203:3386
Association Id................................... 1
Authentication Algorithm......................... Open System
Reason Code...................................... 1
Client IPSK-TAG.................................. N/A
Status Code...................................... 0
Session Timeout.................................. 43200
Client CCX version............................... No CCX support
QoS Level........................................ Silver
Avg data Rate.................................... 0
Burst data Rate.................................. 0
Avg Real time data Rate.......................... 0
Burst Real Time data Rate........................ 0
Avg Uplink data Rate............................. 0
Burst Uplink data Rate........................... 0
Avg Uplink Real time data Rate................... 0
Burst Uplink Real Time data Rate................. 0
802.1P Priority Tag.............................. disabled
Security Group Tag............................... 6
KTS CAC Capability............................... No
Qos Map Capability............................... Yes
WMM Support...................................... Enabled
APSD ACs....................................... BK BE VI VO
--More-- or (q)uit
Current Rate..................................... 12.0
Supported Rates.................................. 6.0,12.0,18.0,24.0,36.0,48.0,
............................................. 54.0
Mobility State................................... Local
Mobility Move Count.............................. 0
Security Policy Completed........................ No
Policy Manager State............................. WEBAUTH_REQD
Pre-auth IPv4 ACL Name........................... none
Pre-auth IPv4 ACL Applied Status................. Unavailable
Pre-auth IPv6 ACL Name........................... none
Pre-auth IPv6 ACL Applied Status................. Unavailable
Pre-auth Flex IPv4 ACL Name...................... none
Pre-auth Flex IPv4 ACL Applied Status............ Unavailable
Pre-auth Flex IPv6 ACL Name...................... none
Pre-auth Flex IPv6 ACL Applied Status............ Unavailable
Pre-auth redirect URL............................ none
Audit Session ID................................. none
AAA Role Type.................................... none
Acct Interim Interval............................ 0
Local Policy Applied............................. none
IPv4 ACL Name.................................... none
AAA FlexConnect ACL Applied Status............... Unavailable
IPv4 ACL Applied Status.......................... Unavailable
--More-- or (q)uit
IPv6 ACL Name.................................... none
IPv6 ACL Applied Status.......................... Unavailable
Post-auth Flex IPv6 ACL Name..................... none
Post-auth Flex IPv6 ACL Applied Status........... Unavailable
Layer2 ACL Name.................................. none
Layer2 ACL Applied Status........................ Unavailable
URL ACL Name..................................... none
URL ACL Applied Status........................... Unavailable
Client Type...................................... SimpleIP
mDNS Status...................................... Disabled
mDNS Profile Name................................ none
No. of mDNS Services Advertised.................. 0
Policy Type...................................... N/A
Encryption Cipher................................ None
Protected Management Frame ...................... No
Management Frame Protection...................... No
EAP Type......................................... Unknown
Interface........................................ management
VLAN............................................. 390
Quarantine VLAN.................................. 0
Access VLAN...................................... 390
Local Bridging VLAN.............................. 390
Client Capabilities:
--More-- or (q)uit
Radio Capability........................... 802.11ax
CF Pollable................................ Not implemented
CF Poll Request............................ Not implemented
Short Preamble............................. Not implemented
PBCC....................................... Not implemented
Channel Agility............................ Not implemented
Listen Interval............................ 250
Fast BSS Transition........................ Not implemented
11v BSS Transition......................... Implemented
Non-Operable Channels............................ None
Non-Prefer Channels.............................. None
Client Wifi Direct Capabilities:
WFD capable................................ No
Manged WFD capable......................... No
Cross Connection Capable................... No
Support Concurrent Operation............... No
Fast BSS Transition Details:
DNS Server details:
DNS server IP ............................. 0.0.0.0
DNS server IP ............................. 0.0.0.0
Assisted Roaming Prediction List details:
--More-- or (q)uit
Client Dhcp Required: True
Allowed (URL)IP Addresses
-------------------------
AVC Profile Name: ............................... none
OpenDns Profile Name: ........................... none
Fastlane Client: ................................ No
Max DSCP: ....................................... 0
Nas Identifier: ................................. TLDC-WL-WLC01
Fabric Configuration
--------------------
Fabric Status: .................................. Enabled
Vnid: ........................................... 8211
Client RLOC IP registered to MS: ................ 172.18.1.133
Clients RLOC IP : .............................. 172.18.1.133
Fabric Flex Avc Policy Name: ....................
Fabric Statistics
--------------------
Primary Map Server : 172.18.0.129
ms_stattype_registrations_sent............... 1
ms_stattype_deregistrations_sent............. 0
ms_stattype_registrations_successful......... 1
ms_stattype_registrations_rejected........... 0
--More-- or (q)uit
ms_stattype_registrations_deregistrations.... 0
Secondary Map Server : 172.18.0.130
ms_stattype_registrations_sent............... 1
ms_stattype_deregistrations_sent............. 0
ms_stattype_registrations_successful......... 1
ms_stattype_registrations_rejected........... 0
ms_stattype_registrations_deregistrations.... 0
Client Statistics:
Number of Bytes Received................... 432456
Number of Bytes Sent....................... 401863
Total Number of Bytes Sent................. 401863
Total Number of Bytes Recv................. 432456
Number of Bytes Sent (last 90s)............ 51897
Number of Bytes Recv (last 90s)............ 53360
Number of Packets Received................. 3591
Number of Packets Sent..................... 3812
Number of Interim-Update Sent.............. 0
Number of EAP Id Request Msg Timeouts...... 0
Number of EAP Id Request Msg Failures...... 0
Number of EAP Request Msg Timeouts......... 0
Number of EAP Request Msg Failures......... 0
Number of EAP Key Msg Timeouts............. 0
Number of EAP Key Msg Failures............. 0
--More-- or (q)uit
Number of Data Retries..................... 435
Number of RTS Retries...................... 0
Number of Duplicate Received Packets....... 0
Number of Decrypt Failed Packets........... 0
Number of Mic Failured Packets............. 0
Number of Mic Missing Packets.............. 0
Number of RA Packets Dropped............... 0
Number of Policy Errors.................... 0
Radio Signal Strength Indicator............ -64 dBm
Signal to Noise Ratio...................... 30 dB
Client Detected as Inactive................ No
Client RBACL Statistics:
Number of RBACL Allowed Packets............ 0
Number of RBACL Denied Packets............. 0
Client Rate Limiting Statistics:
Number of Data Packets Received............ 0
Number of Data Rx Packets Dropped.......... 0
Number of Data Bytes Received.............. 0
Number of Data Rx Bytes Dropped............ 0
Number of Realtime Packets Received........ 0
Number of Realtime Rx Packets Dropped...... 0
Number of Realtime Bytes Received.......... 0
Number of Realtime Rx Bytes Dropped........ 0
--More-- or (q)uit
Number of Data Packets Sent................ 0
Number of Data Tx Packets Dropped.......... 0
Number of Data Bytes Sent.................. 0
Number of Data Tx Bytes Dropped............ 0
Number of Realtime Packets Sent............ 0
Number of Realtime Tx Packets Dropped...... 0
Number of Realtime Bytes Sent.............. 0
Number of Realtime Tx Bytes Dropped........ 0
Nearby AP Statistics:
BIZ1-02-AP10(slot 0)
antenna0: 35 secs ago.................... -45 dBm
antenna1: 35 secs ago.................... -45 dBm
BIZ1-02-AP10(slot 1)
antenna0: 80 secs ago.................... -43 dBm
antenna1: 80 secs ago.................... -43 dBm
BIZ1-02-AP15(slot 0)
antenna0: 35 secs ago.................... -75 dBm
antenna1: 35 secs ago.................... -75 dBm
BIZ1-02-AP15(slot 1)
antenna0: 80 secs ago.................... -80 dBm
antenna1: 80 secs ago.................... -80 dBm
BIZ1-02-AP24(slot 0)
antenna0: 130 secs ago................... -79 dBm
--More-- or (q)uit
antenna1: 130 secs ago................... -79 dBm
BIZ1-03-AP11(slot 0)
antenna0: 35 secs ago.................... -82 dBm
antenna1: 35 secs ago.................... -82 dBm
BIZ1-02-AP09(slot 0)
antenna0: 130 secs ago................... -48 dBm
antenna1: 130 secs ago................... -48 dBm
BIZ1-02-AP09(slot 1)
antenna0: 79 secs ago.................... -58 dBm
antenna1: 79 secs ago.................... -58 dBm
BIZ1-02-AP07(slot 1)
antenna0: 31 secs ago.................... -69 dBm
antenna1: 31 secs ago.................... -69 dBm
BIZ1-01-AP10(slot 0)
antenna0: 34 secs ago.................... -79 dBm
antenna1: 34 secs ago.................... -79 dBm
BIZ1-01-AP11(slot 0)
antenna0: 34 secs ago.................... -80 dBm
antenna1: 34 secs ago.................... -80 dBm
BIZ1-03-AP10(slot 0)
antenna0: 34 secs ago.................... -66 dBm
antenna1: 34 secs ago.................... -66 dBm
BIZ1-03-AP13(slot 0)
--More-- or (q)uit
antenna0: 80 secs ago.................... -84 dBm
antenna1: 80 secs ago.................... -84 dBm
BIZ1-02-AP13(slot 0)
antenna0: 34 secs ago.................... -66 dBm
antenna1: 34 secs ago.................... -66 dBm
BIZ1-02-AP14(slot 0)
antenna0: 130 secs ago................... -68 dBm
antenna1: 130 secs ago................... -68 dBm
BIZ1-02-AP14(slot 1)
antenna0: 33 secs ago.................... -71 dBm
antenna1: 33 secs ago.................... -71 dBm
BIZ1-03-AP12(slot 0)
antenna0: 130 secs ago................... -80 dBm
antenna1: 130 secs ago................... -80 dBm
BIZ1-03-AP12(slot 1)
antenna0: 80 secs ago.................... -84 dBm
antenna1: 80 secs ago.................... -84 dBm
BIZ1-02-AP12(slot 1)
antenna0: 79 secs ago.................... -55 dBm
antenna1: 79 secs ago.................... -55 dBm
BIZ1-01-AP02(slot 0)
antenna0: 35 secs ago.................... -80 dBm
antenna1: 35 secs ago.................... -80 dBm
--More-- or (q)uit
BIZ1-02-AP08(slot 0)
antenna0: 34 secs ago.................... -49 dBm
antenna1: 34 secs ago.................... -49 dBm
BIZ1-02-AP08(slot 1)
antenna0: 33 secs ago.................... -67 dBm
antenna1: 33 secs ago.................... -67 dBm
BIZ1-02-AP11(slot 0)
antenna0: 34 secs ago.................... -36 dBm
antenna1: 34 secs ago.................... -36 dBm
BIZ1-02-AP11(slot 1)
antenna0: 79 secs ago.................... -38 dBm
antenna1: 79 secs ago.................... -38 dBm
(TLDC-WL-WLC01) >
Many Guest connecting to NUS_Guest WiFi are having intermittent internet connection.\
(TLDC-WL-WLC01) >show client detail c4:23:60:f8:68:9e
Client MAC Address............................... c4:23:60:f8:68:9e
Client Username ................................. c4:23:60:f8:68:9e
Client Webauth Username ......................... c4:23:60:f8:68:9e
Hostname: .......................................
Device Type: .................................... Unclassified
AP MAC Address................................... 84:f1:47:6c:bb:a0
AP Name.......................................... BIZ1-02-AP09
AP radio slot Id................................. 1
Client State..................................... Associated
User Authenticated by ........................... RADIUS Server
Client User Group................................ c4:23:60:f8:68:9e
Client NAC OOB State............................. Access
Wireless LAN Id.................................. 17
Wireless LAN Network Name (SSID)................. NUS_Guest
Wireless LAN Profile Name........................ NUS_Guest_NUS_fa_F_a317b737
WLAN Profile check for roaming................... Disabled
Hotspot (802.11u)................................ Not Supported
Connected For ................................... 78 secs
BSSID............................................ 84:f1:47:6c:bb:ae
Channel.......................................... 64
IP Address....................................... 10.244.8.1
Gateway Address.................................. 10.244.0.1
Netmask.......................................... 255.255.192.0
--More-- or (q)uit
IPv6 Address..................................... fe80::c50c:74bb:1203:3386
Association Id................................... 1
Authentication Algorithm......................... Open System
Reason Code...................................... 1
Client IPSK-TAG.................................. N/A
Status Code...................................... 0
Session Timeout.................................. 43200
Client CCX version............................... No CCX support
QoS Level........................................ Silver
Avg data Rate.................................... 0
Burst data Rate.................................. 0
Avg Real time data Rate.......................... 0
Burst Real Time data Rate........................ 0
Avg Uplink data Rate............................. 0
Burst Uplink data Rate........................... 0
Avg Uplink Real time data Rate................... 0
Burst Uplink Real Time data Rate................. 0
802.1P Priority Tag.............................. disabled
Security Group Tag............................... 6
KTS CAC Capability............................... No
Qos Map Capability............................... Yes
WMM Support...................................... Enabled
APSD ACs....................................... BK BE VI VO
--More-- or (q)uit
Current Rate..................................... 12.0
Supported Rates.................................. 6.0,12.0,18.0,24.0,36.0,48.0,
............................................. 54.0
Mobility State................................... Local
Mobility Move Count.............................. 0
Security Policy Completed........................ No
Policy Manager State............................. WEBAUTH_REQD
Pre-auth IPv4 ACL Name........................... none
Pre-auth IPv4 ACL Applied Status................. Unavailable
Pre-auth IPv6 ACL Name........................... none
Pre-auth IPv6 ACL Applied Status................. Unavailable
Pre-auth Flex IPv4 ACL Name...................... none
Pre-auth Flex IPv4 ACL Applied Status............ Unavailable
Pre-auth Flex IPv6 ACL Name...................... none
Pre-auth Flex IPv6 ACL Applied Status............ Unavailable
Pre-auth redirect URL............................ none
Audit Session ID................................. none
AAA Role Type.................................... none
Acct Interim Interval............................ 0
Local Policy Applied............................. none
IPv4 ACL Name.................................... none
AAA FlexConnect ACL Applied Status............... Unavailable
IPv4 ACL Applied Status.......................... Unavailable
--More-- or (q)uit
IPv6 ACL Name.................................... none
IPv6 ACL Applied Status.......................... Unavailable
Post-auth Flex IPv6 ACL Name..................... none
Post-auth Flex IPv6 ACL Applied Status........... Unavailable
Layer2 ACL Name.................................. none
Layer2 ACL Applied Status........................ Unavailable
URL ACL Name..................................... none
URL ACL Applied Status........................... Unavailable
Client Type...................................... SimpleIP
mDNS Status...................................... Disabled
mDNS Profile Name................................ none
No. of mDNS Services Advertised.................. 0
Policy Type...................................... N/A
Encryption Cipher................................ None
Protected Management Frame ...................... No
Management Frame Protection...................... No
EAP Type......................................... Unknown
Interface........................................ management
VLAN............................................. 390
Quarantine VLAN.................................. 0
Access VLAN...................................... 390
Local Bridging VLAN.............................. 390
Client Capabilities:
--More-- or (q)uit
Radio Capability........................... 802.11ax
CF Pollable................................ Not implemented
CF Poll Request............................ Not implemented
Short Preamble............................. Not implemented
PBCC....................................... Not implemented
Channel Agility............................ Not implemented
Listen Interval............................ 250
Fast BSS Transition........................ Not implemented
11v BSS Transition......................... Implemented
Non-Operable Channels............................ None
Non-Prefer Channels.............................. None
Client Wifi Direct Capabilities:
WFD capable................................ No
Manged WFD capable......................... No
Cross Connection Capable................... No
Support Concurrent Operation............... No
Fast BSS Transition Details:
DNS Server details:
DNS server IP ............................. 0.0.0.0
DNS server IP ............................. 0.0.0.0
Assisted Roaming Prediction List details:
--More-- or (q)uit
Client Dhcp Required: True
Allowed (URL)IP Addresses
-------------------------
AVC Profile Name: ............................... none
OpenDns Profile Name: ........................... none
Fastlane Client: ................................ No
Max DSCP: ....................................... 0
Nas Identifier: ................................. TLDC-WL-WLC01
Fabric Configuration
--------------------
Fabric Status: .................................. Enabled
Vnid: ........................................... 8211
Client RLOC IP registered to MS: ................ 172.18.1.133
Clients RLOC IP : .............................. 172.18.1.133
Fabric Flex Avc Policy Name: ....................
Fabric Statistics
--------------------
Primary Map Server : 172.18.0.129
ms_stattype_registrations_sent............... 1
ms_stattype_deregistrations_sent............. 0
ms_stattype_registrations_successful......... 1
ms_stattype_registrations_rejected........... 0
--More-- or (q)uit
ms_stattype_registrations_deregistrations.... 0
Secondary Map Server : 172.18.0.130
ms_stattype_registrations_sent............... 1
ms_stattype_deregistrations_sent............. 0
ms_stattype_registrations_successful......... 1
ms_stattype_registrations_rejected........... 0
ms_stattype_registrations_deregistrations.... 0
Client Statistics:
Number of Bytes Received................... 432456
Number of Bytes Sent....................... 401863
Total Number of Bytes Sent................. 401863
Total Number of Bytes Recv................. 432456
Number of Bytes Sent (last 90s)............ 51897
Number of Bytes Recv (last 90s)............ 53360
Number of Packets Received................. 3591
Number of Packets Sent..................... 3812
Number of Interim-Update Sent.............. 0
Number of EAP Id Request Msg Timeouts...... 0
Number of EAP Id Request Msg Failures...... 0
Number of EAP Request Msg Timeouts......... 0
Number of EAP Request Msg Failures......... 0
Number of EAP Key Msg Timeouts............. 0
Number of EAP Key Msg Failures............. 0
--More-- or (q)uit
Number of Data Retries..................... 435
Number of RTS Retries...................... 0
Number of Duplicate Received Packets....... 0
Number of Decrypt Failed Packets........... 0
Number of Mic Failured Packets............. 0
Number of Mic Missing Packets.............. 0
Number of RA Packets Dropped............... 0
Number of Policy Errors.................... 0
Radio Signal Strength Indicator............ -64 dBm
Signal to Noise Ratio...................... 30 dB
Client Detected as Inactive................ No
Client RBACL Statistics:
Number of RBACL Allowed Packets............ 0
Number of RBACL Denied Packets............. 0
Client Rate Limiting Statistics:
Number of Data Packets Received............ 0
Number of Data Rx Packets Dropped.......... 0
Number of Data Bytes Received.............. 0
Number of Data Rx Bytes Dropped............ 0
Number of Realtime Packets Received........ 0
Number of Realtime Rx Packets Dropped...... 0
Number of Realtime Bytes Received.......... 0
Number of Realtime Rx Bytes Dropped........ 0
--More-- or (q)uit
Number of Data Packets Sent................ 0
Number of Data Tx Packets Dropped.......... 0
Number of Data Bytes Sent.................. 0
Number of Data Tx Bytes Dropped............ 0
Number of Realtime Packets Sent............ 0
Number of Realtime Tx Packets Dropped...... 0
Number of Realtime Bytes Sent.............. 0
Number of Realtime Tx Bytes Dropped........ 0
Nearby AP Statistics:
BIZ1-02-AP10(slot 0)
antenna0: 35 secs ago.................... -45 dBm
antenna1: 35 secs ago.................... -45 dBm
BIZ1-02-AP10(slot 1)
antenna0: 80 secs ago.................... -43 dBm
antenna1: 80 secs ago.................... -43 dBm
BIZ1-02-AP15(slot 0)
antenna0: 35 secs ago.................... -75 dBm
antenna1: 35 secs ago.................... -75 dBm
BIZ1-02-AP15(slot 1)
antenna0: 80 secs ago.................... -80 dBm
antenna1: 80 secs ago.................... -80 dBm
BIZ1-02-AP24(slot 0)
antenna0: 130 secs ago................... -79 dBm
--More-- or (q)uit
antenna1: 130 secs ago................... -79 dBm
BIZ1-03-AP11(slot 0)
antenna0: 35 secs ago.................... -82 dBm
antenna1: 35 secs ago.................... -82 dBm
BIZ1-02-AP09(slot 0)
antenna0: 130 secs ago................... -48 dBm
antenna1: 130 secs ago................... -48 dBm
BIZ1-02-AP09(slot 1)
antenna0: 79 secs ago.................... -58 dBm
antenna1: 79 secs ago.................... -58 dBm
BIZ1-02-AP07(slot 1)
antenna0: 31 secs ago.................... -69 dBm
antenna1: 31 secs ago.................... -69 dBm
BIZ1-01-AP10(slot 0)
antenna0: 34 secs ago.................... -79 dBm
antenna1: 34 secs ago.................... -79 dBm
BIZ1-01-AP11(slot 0)
antenna0: 34 secs ago.................... -80 dBm
antenna1: 34 secs ago.................... -80 dBm
BIZ1-03-AP10(slot 0)
antenna0: 34 secs ago.................... -66 dBm
antenna1: 34 secs ago.................... -66 dBm
BIZ1-03-AP13(slot 0)
--More-- or (q)uit
antenna0: 80 secs ago.................... -84 dBm
antenna1: 80 secs ago.................... -84 dBm
BIZ1-02-AP13(slot 0)
antenna0: 34 secs ago.................... -66 dBm
antenna1: 34 secs ago.................... -66 dBm
BIZ1-02-AP14(slot 0)
antenna0: 130 secs ago................... -68 dBm
antenna1: 130 secs ago................... -68 dBm
BIZ1-02-AP14(slot 1)
antenna0: 33 secs ago.................... -71 dBm
antenna1: 33 secs ago.................... -71 dBm
BIZ1-03-AP12(slot 0)
antenna0: 130 secs ago................... -80 dBm
antenna1: 130 secs ago................... -80 dBm
BIZ1-03-AP12(slot 1)
antenna0: 80 secs ago.................... -84 dBm
antenna1: 80 secs ago.................... -84 dBm
BIZ1-02-AP12(slot 1)
antenna0: 79 secs ago.................... -55 dBm
antenna1: 79 secs ago.................... -55 dBm
BIZ1-01-AP02(slot 0)
antenna0: 35 secs ago.................... -80 dBm
antenna1: 35 secs ago.................... -80 dBm
--More-- or (q)uit
BIZ1-02-AP08(slot 0)
antenna0: 34 secs ago.................... -49 dBm
antenna1: 34 secs ago.................... -49 dBm
BIZ1-02-AP08(slot 1)
antenna0: 33 secs ago.................... -67 dBm
antenna1: 33 secs ago.................... -67 dBm
BIZ1-02-AP11(slot 0)
antenna0: 34 secs ago.................... -36 dBm
antenna1: 34 secs ago.................... -36 dBm
BIZ1-02-AP11(slot 1)
antenna0: 79 secs ago.................... -38 dBm
antenna1: 79 secs ago.................... -38 dBm
(TLDC-WL-WLC01) >
Issue: Guest Clients were not able to connect due to the captive portal not redirecting.
Steps Taken:
* Assessed logs collected from cu and found some bugs which match the issue:
https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvh20238
* Asked customer to implement following workaround:
-Remove the ACL from the FlexConnect Group and add it again.
OR
-Reboot the AP.
===============
Customer will be monitoring the issue and will open a new case if issue arises. | Technology: Wireless
Subtechnology: 8540 Series Wireless LAN Controller (AIR-CT8540)
Problem Code: Error Messages, Logs, Debugs
Product: NA
Product Family: AIRCTA2
Software Version: N/A
Router/Node Name: N/A
Problem Details: Many Guest connecting to NUS_Guest WiFi are having intermittent internet connection.\
(TLDC-WL-WLC01) >show client detail c4:23:60:f8:68:9e
Client MAC Address............................... c4:23:60:f8:68:9e
Client Username ................................. c4:23:60:f8:68:9e
Client Webauth Username ......................... c4:23:60:f8:68:9e
Hostname: .......................................
Device Type: .................................... Unclassified
AP MAC Address................................... 84:f1:47:6c:bb:a0
AP Name.......................................... BIZ1-02-AP09
AP radio slot Id................................. 1
Client State..................................... Associated
User Authenticated by ........................... RADIUS Server
Client User Group................................ c4:23:60:f8:68:9e
Client NAC OOB State............................. Access
Wireless LAN Id.................................. 17
Wireless LAN Network Name (SSID)................. NUS_Guest
Wireless LAN Profile Name........................ NUS_Guest_NUS_fa_F_a317b737
WLAN Profile check for roaming................... Disabled
Hotspot (802.11u)................................ Not Supported
Connected For ................................... 78 secs
BSSID............................................ 84:f1:47:6c:bb:ae
Channel.......................................... 64
IP Address....................................... 10.244.8.1
Gateway Address.................................. 10.244.0.1
Netmask.......................................... 255.255.192.0
--More-- or (q)uit
IPv6 Address..................................... fe80::c50c:74bb:1203:3386
Association Id................................... 1
Authentication Algorithm......................... Open System
Reason Code...................................... 1
Client IPSK-TAG.................................. N/A
Status Code...................................... 0
Session Timeout.................................. 43200
Client CCX version............................... No CCX support
QoS Level........................................ Silver
Avg data Rate.................................... 0
Burst data Rate.................................. 0
Avg Real time data Rate.......................... 0
Burst Real Time data Rate........................ 0
Avg Uplink data Rate............................. 0
Burst Uplink data Rate........................... 0
Avg Uplink Real time data Rate................... 0
Burst Uplink Real Time data Rate................. 0
802.1P Priority Tag.............................. disabled
Security Group Tag............................... 6
KTS CAC Capability............................... No
Qos Map Capability............................... Yes
WMM Support...................................... Enabled
APSD ACs....................................... BK BE VI VO
--More-- or (q)uit
Current Rate..................................... 12.0
Supported Rates.................................. 6.0,12.0,18.0,24.0,36.0,48.0,
............................................. 54.0
Mobility State................................... Local
Mobility Move Count.............................. 0
Security Policy Completed........................ No
Policy Manager State............................. WEBAUTH_REQD
Pre-auth IPv4 ACL Name........................... none
Pre-auth IPv4 ACL Applied Status................. Unavailable
Pre-auth IPv6 ACL Name........................... none
Pre-auth IPv6 ACL Applied Status................. Unavailable
Pre-auth Flex IPv4 ACL Name...................... none
Pre-auth Flex IPv4 ACL Applied Status............ Unavailable
Pre-auth Flex IPv6 ACL Name...................... none
Pre-auth Flex IPv6 ACL Applied Status............ Unavailable
Pre-auth redirect URL............................ none
Audit Session ID................................. none
AAA Role Type.................................... none
Acct Interim Interval............................ 0
Local Policy Applied............................. none
IPv4 ACL Name.................................... none
AAA FlexConnect ACL Applied Status............... Unavailable
IPv4 ACL Applied Status.......................... Unavailable
--More-- or (q)uit
IPv6 ACL Name.................................... none
IPv6 ACL Applied Status.......................... Unavailable
Post-auth Flex IPv6 ACL Name..................... none
Post-auth Flex IPv6 ACL Applied Status........... Unavailable
Layer2 ACL Name.................................. none
Layer2 ACL Applied Status........................ Unavailable
URL ACL Name..................................... none
URL ACL Applied Status........................... Unavailable
Client Type...................................... SimpleIP
mDNS Status...................................... Disabled
mDNS Profile Name................................ none
No. of mDNS Services Advertised.................. 0
Policy Type...................................... N/A
Encryption Cipher................................ None
Protected Management Frame ...................... No
Management Frame Protection...................... No
EAP Type......................................... Unknown
Interface........................................ management
VLAN............................................. 390
Quarantine VLAN.................................. 0
Access VLAN...................................... 390
Local Bridging VLAN.............................. 390
Client Capabilities:
--More-- or (q)uit
Radio Capability........................... 802.11ax
CF Pollable................................ Not implemented
CF Poll Request............................ Not implemented
Short Preamble............................. Not implemented
PBCC....................................... Not implemented
Channel Agility............................ Not implemented
Listen Interval............................ 250
Fast BSS Transition........................ Not implemented
11v BSS Transition......................... Implemented
Non-Operable Channels............................ None
Non-Prefer Channels.............................. None
Client Wifi Direct Capabilities:
WFD capable................................ No
Manged WFD capable......................... No
Cross Connection Capable................... No
Support Concurrent Operation............... No
Fast BSS Transition Details:
DNS Server details:
DNS server IP ............................. 0.0.0.0
DNS server IP ............................. 0.0.0.0
Assisted Roaming Prediction List details:
--More-- or (q)uit
Client Dhcp Required: True
Allowed (URL)IP Addresses
-------------------------
AVC Profile Name: ............................... none
OpenDns Profile Name: ........................... none
Fastlane Client: ................................ No
Max DSCP: ....................................... 0
Nas Identifier: ................................. TLDC-WL-WLC01
Fabric Configuration
--------------------
Fabric Status: .................................. Enabled
Vnid: ........................................... 8211
Client RLOC IP registered to MS: ................ 172.18.1.133
Clients RLOC IP : .............................. 172.18.1.133
Fabric Flex Avc Policy Name: ....................
Fabric Statistics
--------------------
Primary Map Server : 172.18.0.129
ms_stattype_registrations_sent............... 1
ms_stattype_deregistrations_sent............. 0
ms_stattype_registrations_successful......... 1
ms_stattype_registrations_rejected........... 0
--More-- or (q)uit
ms_stattype_registrations_deregistrations.... 0
Secondary Map Server : 172.18.0.130
ms_stattype_registrations_sent............... 1
ms_stattype_deregistrations_sent............. 0
ms_stattype_registrations_successful......... 1
ms_stattype_registrations_rejected........... 0
ms_stattype_registrations_deregistrations.... 0
Client Statistics:
Number of Bytes Received................... 432456
Number of Bytes Sent....................... 401863
Total Number of Bytes Sent................. 401863
Total Number of Bytes Recv................. 432456
Number of Bytes Sent (last 90s)............ 51897
Number of Bytes Recv (last 90s)............ 53360
Number of Packets Received................. 3591
Number of Packets Sent..................... 3812
Number of Interim-Update Sent.............. 0
Number of EAP Id Request Msg Timeouts...... 0
Number of EAP Id Request Msg Failures...... 0
Number of EAP Request Msg Timeouts......... 0
Number of EAP Request Msg Failures......... 0
Number of EAP Key Msg Timeouts............. 0
Number of EAP Key Msg Failures............. 0
--More-- or (q)uit
Number of Data Retries..................... 435
Number of RTS Retries...................... 0
Number of Duplicate Received Packets....... 0
Number of Decrypt Failed Packets........... 0
Number of Mic Failured Packets............. 0
Number of Mic Missing Packets.............. 0
Number of RA Packets Dropped............... 0
Number of Policy Errors.................... 0
Radio Signal Strength Indicator............ -64 dBm
Signal to Noise Ratio...................... 30 dB
Client Detected as Inactive................ No
Client RBACL Statistics:
Number of RBACL Allowed Packets............ 0
Number of RBACL Denied Packets............. 0
Client Rate Limiting Statistics:
Number of Data Packets Received............ 0
Number of Data Rx Packets Dropped.......... 0
Number of Data Bytes Received.............. 0
Number of Data Rx Bytes Dropped............ 0
Number of Realtime Packets Received........ 0
Number of Realtime Rx Packets Dropped...... 0
Number of Realtime Bytes Received.......... 0
Number of Realtime Rx Bytes Dropped........ 0
--More-- or (q)uit
Number of Data Packets Sent................ 0
Number of Data Tx Packets Dropped.......... 0
Number of Data Bytes Sent.................. 0
Number of Data Tx Bytes Dropped............ 0
Number of Realtime Packets Sent............ 0
Number of Realtime Tx Packets Dropped...... 0
Number of Realtime Bytes Sent.............. 0
Number of Realtime Tx Bytes Dropped........ 0
Nearby AP Statistics:
BIZ1-02-AP10(slot 0)
antenna0: 35 secs ago.................... -45 dBm
antenna1: 35 secs ago.................... -45 dBm
BIZ1-02-AP10(slot 1)
antenna0: 80 secs ago.................... -43 dBm
antenna1: 80 secs ago.................... -43 dBm
BIZ1-02-AP15(slot 0)
antenna0: 35 secs ago.................... -75 dBm
antenna1: 35 secs ago.................... -75 dBm
BIZ1-02-AP15(slot 1)
antenna0: 80 secs ago.................... -80 dBm
antenna1: 80 secs ago.................... -80 dBm
BIZ1-02-AP24(slot 0)
antenna0: 130 secs ago................... -79 dBm
--More-- or (q)uit
antenna1: 130 secs ago................... -79 dBm
BIZ1-03-AP11(slot 0)
antenna0: 35 secs ago.................... -82 dBm
antenna1: 35 secs ago.................... -82 dBm
BIZ1-02-AP09(slot 0)
antenna0: 130 secs ago................... -48 dBm
antenna1: 130 secs ago................... -48 dBm
BIZ1-02-AP09(slot 1)
antenna0: 79 secs ago.................... -58 dBm
antenna1: 79 secs ago.................... -58 dBm
BIZ1-02-AP07(slot 1)
antenna0: 31 secs ago.................... -69 dBm
antenna1: 31 secs ago.................... -69 dBm
BIZ1-01-AP10(slot 0)
antenna0: 34 secs ago.................... -79 dBm
antenna1: 34 secs ago.................... -79 dBm
BIZ1-01-AP11(slot 0)
antenna0: 34 secs ago.................... -80 dBm
antenna1: 34 secs ago.................... -80 dBm
BIZ1-03-AP10(slot 0)
antenna0: 34 secs ago.................... -66 dBm
antenna1: 34 secs ago.................... -66 dBm
BIZ1-03-AP13(slot 0)
--More-- or (q)uit
antenna0: 80 secs ago.................... -84 dBm
antenna1: 80 secs ago.................... -84 dBm
BIZ1-02-AP13(slot 0)
antenna0: 34 secs ago.................... -66 dBm
antenna1: 34 secs ago.................... -66 dBm
BIZ1-02-AP14(slot 0)
antenna0: 130 secs ago................... -68 dBm
antenna1: 130 secs ago................... -68 dBm
BIZ1-02-AP14(slot 1)
antenna0: 33 secs ago.................... -71 dBm
antenna1: 33 secs ago.................... -71 dBm
BIZ1-03-AP12(slot 0)
antenna0: 130 secs ago................... -80 dBm
antenna1: 130 secs ago................... -80 dBm
BIZ1-03-AP12(slot 1)
antenna0: 80 secs ago.................... -84 dBm
antenna1: 80 secs ago.................... -84 dBm
BIZ1-02-AP12(slot 1)
antenna0: 79 secs ago.................... -55 dBm
antenna1: 79 secs ago.................... -55 dBm
BIZ1-01-AP02(slot 0)
antenna0: 35 secs ago.................... -80 dBm
antenna1: 35 secs ago.................... -80 dBm
--More-- or (q)uit
BIZ1-02-AP08(slot 0)
antenna0: 34 secs ago.................... -49 dBm
antenna1: 34 secs ago.................... -49 dBm
BIZ1-02-AP08(slot 1)
antenna0: 33 secs ago.................... -67 dBm
antenna1: 33 secs ago.................... -67 dBm
BIZ1-02-AP11(slot 0)
antenna0: 34 secs ago.................... -36 dBm
antenna1: 34 secs ago.................... -36 dBm
BIZ1-02-AP11(slot 1)
antenna0: 79 secs ago.................... -38 dBm
antenna1: 79 secs ago.................... -38 dBm
(TLDC-WL-WLC01) > | Many Guest connecting to NUS_Guest WiFi are having intermittent internet connection.\
(TLDC-WL-WLC01) >show client detail c4:23:60:f8:68:9e
Client MAC Address............................... c4:23:60:f8:68:9e
Client Username ................................. c4:23:60:f8:68:9e
Client Webauth Username ......................... c4:23:60:f8:68:9e
Hostname: .......................................
Device Type: .................................... Unclassified
AP MAC Address................................... 84:f1:47:6c:bb:a0
AP Name.......................................... BIZ1-02-AP09
AP radio slot Id................................. 1
Client State..................................... Associated
User Authenticated by ........................... RADIUS Server
Client User Group................................ c4:23:60:f8:68:9e
Client NAC OOB State............................. Access
Wireless LAN Id.................................. 17
Wireless LAN Network Name (SSID)................. NUS_Guest
Wireless LAN Profile Name........................ NUS_Guest_NUS_fa_F_a317b737
WLAN Profile check for roaming................... Disabled
Hotspot (802.11u)................................ Not Supported
Connected For ................................... 78 secs
BSSID............................................ 84:f1:47:6c:bb:ae
Channel.......................................... 64
IP Address....................................... 10.244.8.1
Gateway Address.................................. 10.244.0.1
Netmask.......................................... 255.255.192.0
--More-- or (q)uit
IPv6 Address..................................... fe80::c50c:74bb:1203:3386
Association Id................................... 1
Authentication Algorithm......................... Open System
Reason Code...................................... 1
Client IPSK-TAG.................................. N/A
Status Code...................................... 0
Session Timeout.................................. 43200
Client CCX version............................... No CCX support
QoS Level........................................ Silver
Avg data Rate.................................... 0
Burst data Rate.................................. 0
Avg Real time data Rate.......................... 0
Burst Real Time data Rate........................ 0
Avg Uplink data Rate............................. 0
Burst Uplink data Rate........................... 0
Avg Uplink Real time data Rate................... 0
Burst Uplink Real Time data Rate................. 0
802.1P Priority Tag.............................. disabled
Security Group Tag............................... 6
KTS CAC Capability............................... No
Qos Map Capability............................... Yes
WMM Support...................................... Enabled
APSD ACs....................................... BK BE VI VO
--More-- or (q)uit
Current Rate..................................... 12.0
Supported Rates.................................. 6.0,12.0,18.0,24.0,36.0,48.0,
............................................. 54.0
Mobility State................................... Local
Mobility Move Count.............................. 0
Security Policy Completed........................ No
Policy Manager State............................. WEBAUTH_REQD
Pre-auth IPv4 ACL Name........................... none
Pre-auth IPv4 ACL Applied Status................. Unavailable
Pre-auth IPv6 ACL Name........................... none
Pre-auth IPv6 ACL Applied Status................. Unavailable
Pre-auth Flex IPv4 ACL Name...................... none
Pre-auth Flex IPv4 ACL Applied Status............ Unavailable
Pre-auth Flex IPv6 ACL Name...................... none
Pre-auth Flex IPv6 ACL Applied Status............ Unavailable
Pre-auth redirect URL............................ none
Audit Session ID................................. none
AAA Role Type.................................... none
Acct Interim Interval............................ 0
Local Policy Applied............................. none
IPv4 ACL Name.................................... none
AAA FlexConnect ACL Applied Status............... Unavailable
IPv4 ACL Applied Status.......................... Unavailable
--More-- or (q)uit
IPv6 ACL Name.................................... none
IPv6 ACL Applied Status.......................... Unavailable
Post-auth Flex IPv6 ACL Name..................... none
Post-auth Flex IPv6 ACL Applied Status........... Unavailable
Layer2 ACL Name.................................. none
Layer2 ACL Applied Status........................ Unavailable
URL ACL Name..................................... none
URL ACL Applied Status........................... Unavailable
Client Type...................................... SimpleIP
mDNS Status...................................... Disabled
mDNS Profile Name................................ none
No. of mDNS Services Advertised.................. 0
Policy Type...................................... N/A
Encryption Cipher................................ None
Protected Management Frame ...................... No
Management Frame Protection...................... No
EAP Type......................................... Unknown
Interface........................................ management
VLAN............................................. 390
Quarantine VLAN.................................. 0
Access VLAN...................................... 390
Local Bridging VLAN.............................. 390
Client Capabilities:
--More-- or (q)uit
Radio Capability........................... 802.11ax
CF Pollable................................ Not implemented
CF Poll Request............................ Not implemented
Short Preamble............................. Not implemented
PBCC....................................... Not implemented
Channel Agility............................ Not implemented
Listen Interval............................ 250
Fast BSS Transition........................ Not implemented
11v BSS Transition......................... Implemented
Non-Operable Channels............................ None
Non-Prefer Channels.............................. None
Client Wifi Direct Capabilities:
WFD capable................................ No
Manged WFD capable......................... No
Cross Connection Capable................... No
Support Concurrent Operation............... No
Fast BSS Transition Details:
DNS Server details:
DNS server IP ............................. 0.0.0.0
DNS server IP ............................. 0.0.0.0
Assisted Roaming Prediction List details:
--More-- or (q)uit
Client Dhcp Required: True
Allowed (URL)IP Addresses
-------------------------
AVC Profile Name: ............................... none
OpenDns Profile Name: ........................... none
Fastlane Client: ................................ No
Max DSCP: ....................................... 0
Nas Identifier: ................................. TLDC-WL-WLC01
Fabric Configuration
--------------------
Fabric Status: .................................. Enabled
Vnid: ........................................... 8211
Client RLOC IP registered to MS: ................ 172.18.1.133
Clients RLOC IP : .............................. 172.18.1.133
Fabric Flex Avc Policy Name: ....................
Fabric Statistics
--------------------
Primary Map Server : 172.18.0.129
ms_stattype_registrations_sent............... 1
ms_stattype_deregistrations_sent............. 0
ms_stattype_registrations_successful......... 1
ms_stattype_registrations_rejected........... 0
--More-- or (q)uit
ms_stattype_registrations_deregistrations.... 0
Secondary Map Server : 172.18.0.130
ms_stattype_registrations_sent............... 1
ms_stattype_deregistrations_sent............. 0
ms_stattype_registrations_successful......... 1
ms_stattype_registrations_rejected........... 0
ms_stattype_registrations_deregistrations.... 0
Client Statistics:
Number of Bytes Received................... 432456
Number of Bytes Sent....................... 401863
Total Number of Bytes Sent................. 401863
Total Number of Bytes Recv................. 432456
Number of Bytes Sent (last 90s)............ 51897
Number of Bytes Recv (last 90s)............ 53360
Number of Packets Received................. 3591
Number of Packets Sent..................... 3812
Number of Interim-Update Sent.............. 0
Number of EAP Id Request Msg Timeouts...... 0
Number of EAP Id Request Msg Failures...... 0
Number of EAP Request Msg Timeouts......... 0
Number of EAP Request Msg Failures......... 0
Number of EAP Key Msg Timeouts............. 0
Number of EAP Key Msg Failures............. 0
--More-- or (q)uit
Number of Data Retries..................... 435
Number of RTS Retries...................... 0
Number of Duplicate Received Packets....... 0
Number of Decrypt Failed Packets........... 0
Number of Mic Failured Packets............. 0
Number of Mic Missing Packets.............. 0
Number of RA Packets Dropped............... 0
Number of Policy Errors.................... 0
Radio Signal Strength Indicator............ -64 dBm
Signal to Noise Ratio...................... 30 dB
Client Detected as Inactive................ No
Client RBACL Statistics:
Number of RBACL Allowed Packets............ 0
Number of RBACL Denied Packets............. 0
Client Rate Limiting Statistics:
Number of Data Packets Received............ 0
Number of Data Rx Packets Dropped.......... 0
Number of Data Bytes Received.............. 0
Number of Data Rx Bytes Dropped............ 0
Number of Realtime Packets Received........ 0
Number of Realtime Rx Packets Dropped...... 0
Number of Realtime Bytes Received.......... 0
Number of Realtime Rx Bytes Dropped........ 0
--More-- or (q)uit
Number of Data Packets Sent................ 0
Number of Data Tx Packets Dropped.......... 0
Number of Data Bytes Sent.................. 0
Number of Data Tx Bytes Dropped............ 0
Number of Realtime Packets Sent............ 0
Number of Realtime Tx Packets Dropped...... 0
Number of Realtime Bytes Sent.............. 0
Number of Realtime Tx Bytes Dropped........ 0
Nearby AP Statistics:
BIZ1-02-AP10(slot 0)
antenna0: 35 secs ago.................... -45 dBm
antenna1: 35 secs ago.................... -45 dBm
BIZ1-02-AP10(slot 1)
antenna0: 80 secs ago.................... -43 dBm
antenna1: 80 secs ago.................... -43 dBm
BIZ1-02-AP15(slot 0)
antenna0: 35 secs ago.................... -75 dBm
antenna1: 35 secs ago.................... -75 dBm
BIZ1-02-AP15(slot 1)
antenna0: 80 secs ago.................... -80 dBm
antenna1: 80 secs ago.................... -80 dBm
BIZ1-02-AP24(slot 0)
antenna0: 130 secs ago................... -79 dBm
--More-- or (q)uit
antenna1: 130 secs ago................... -79 dBm
BIZ1-03-AP11(slot 0)
antenna0: 35 secs ago.................... -82 dBm
antenna1: 35 secs ago.................... -82 dBm
BIZ1-02-AP09(slot 0)
antenna0: 130 secs ago................... -48 dBm
antenna1: 130 secs ago................... -48 dBm
BIZ1-02-AP09(slot 1)
antenna0: 79 secs ago.................... -58 dBm
antenna1: 79 secs ago.................... -58 dBm
BIZ1-02-AP07(slot 1)
antenna0: 31 secs ago.................... -69 dBm
antenna1: 31 secs ago.................... -69 dBm
BIZ1-01-AP10(slot 0)
antenna0: 34 secs ago.................... -79 dBm
antenna1: 34 secs ago.................... -79 dBm
BIZ1-01-AP11(slot 0)
antenna0: 34 secs ago.................... -80 dBm
antenna1: 34 secs ago.................... -80 dBm
BIZ1-03-AP10(slot 0)
antenna0: 34 secs ago.................... -66 dBm
antenna1: 34 secs ago.................... -66 dBm
BIZ1-03-AP13(slot 0)
--More-- or (q)uit
antenna0: 80 secs ago.................... -84 dBm
antenna1: 80 secs ago.................... -84 dBm
BIZ1-02-AP13(slot 0)
antenna0: 34 secs ago.................... -66 dBm
antenna1: 34 secs ago.................... -66 dBm
BIZ1-02-AP14(slot 0)
antenna0: 130 secs ago................... -68 dBm
antenna1: 130 secs ago................... -68 dBm
BIZ1-02-AP14(slot 1)
antenna0: 33 secs ago.................... -71 dBm
antenna1: 33 secs ago.................... -71 dBm
BIZ1-03-AP12(slot 0)
antenna0: 130 secs ago................... -80 dBm
antenna1: 130 secs ago................... -80 dBm
BIZ1-03-AP12(slot 1)
antenna0: 80 secs ago.................... -84 dBm
antenna1: 80 secs ago.................... -84 dBm
BIZ1-02-AP12(slot 1)
antenna0: 79 secs ago.................... -55 dBm
antenna1: 79 secs ago.................... -55 dBm
BIZ1-01-AP02(slot 0)
antenna0: 35 secs ago.................... -80 dBm
antenna1: 35 secs ago.................... -80 dBm
--More-- or (q)uit
BIZ1-02-AP08(slot 0)
antenna0: 34 secs ago.................... -49 dBm
antenna1: 34 secs ago.................... -49 dBm
BIZ1-02-AP08(slot 1)
antenna0: 33 secs ago.................... -67 dBm
antenna1: 33 secs ago.................... -67 dBm
BIZ1-02-AP11(slot 0)
antenna0: 34 secs ago.................... -36 dBm
antenna1: 34 secs ago.................... -36 dBm
BIZ1-02-AP11(slot 1)
antenna0: 79 secs ago.................... -38 dBm
antenna1: 79 secs ago.................... -38 dBm
(TLDC-WL-WLC01) > | Issue: Guest Clients were not able to connect due to the captive portal not redirecting.
Steps Taken:
* Assessed logs collected from cu and found some bugs which match the issue:
https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvh20238
* Asked customer to implement following workaround:
-Remove the ACL from the FlexConnect Group and add it again.
OR
-Reboot the AP.
===============
Customer will be monitoring the issue and will open a new case if issue arises. | Guest SSID connected users, Captive portal is not redicrecting. | AIR-CT8540-K9 | 8.10.151.0 | 8.10.151.0 | 100.0 | 3 | 100.0 | Debug/Diagnostic Capability (missing, incomplete, cryptic...) | AIRCTA2 | Wireless | 8540 Series Wireless LAN Controller (AIR-CT8540) | 01t1C000006EB81QAG | Error Messages, Logs, Debugs | 8540 Series Wireless LAN Controller (AIR-CT8540) | Wireless | 01t15000004dDRMAA2 | nan |
695069319 | Question: Which software version is principally discussed in these documents?
Answer "NONE" if you cannot find answer in the given documents.
The ONLY software version should be selected from the given software version list: 1/ 8.5.140.0/ NA - RMA/ 16.12.4/ 8.10.161.0/ 15.3.3 Response in this JSON format:
{"software_version": "","explanation": "", "summary": ""}
Technology: Wireless
Subtechnology: 8540 Series Wireless LAN Controller (AIR-CT8540)
Problem Code: Interoperability
Product: NA
Product Family: C9120AX
Software Version: 8.10.151.0
Router/Node Name: TLDC-WL-WLC02
Problem Details: AP is up on switch side but dissociated from WLC, which cause service disruption.
AP is up on switch side but dissociated from WLC, which cause service disruption.
closing | Question: Which product is principally discussed in these documents?
Answer "NONE" if you cannot find answer in the given documents.
The ONLY product name should be selected from the given product name list: C9120AXI-S/ THIRD_PARTY_PRODUCT_HW/ AIR-CT8540-K9/ AIR-CT5520-K9 Response in this JSON format:
{"product_name": "","explanation": "", "summary": ""}
Technology: Wireless
Subtechnology: 8540 Series Wireless LAN Controller (AIR-CT8540)
Problem Code: Interoperability
Product: NA
Product Family: C9120AX
Software Version: 8.10.151.0
Router/Node Name: TLDC-WL-WLC02
Problem Details: AP is up on switch side but dissociated from WLC, which cause service disruption.
AP is up on switch side but dissociated from WLC, which cause service disruption.
closing | Technology: Wireless
Subtechnology: 8540 Series Wireless LAN Controller (AIR-CT8540)
Problem Code: Interoperability
Product: NA
Product Family: C9120AX
Software Version: 8.10.151.0
Router/Node Name: TLDC-WL-WLC02
Problem Details: AP is up on switch side but dissociated from WLC, which cause service disruption. | AP is up on switch side but dissociated from WLC, which cause service disruption. | closing | AP disconnected from WLC.
We see drops on the switchport. | C9120AXI-S | 16.12.4 | 16.12.4 | 13.0 | 3 | 100.0 | Software Bug | C9120AX | Wireless | 9120AX Series Access Point | 01t1C000006fIcDQAU | Error Messages, Logs, Debugs | 9120AX Series Access Point | Wireless | 01t15000004dDRMAA2 | SHERLOCK: PARTIAL |
695644022 | Question: Which software version is principally discussed in these documents?
Answer "NONE" if you cannot find answer in the given documents.
The ONLY software version should be selected from the given software version list: 1/ 8.10.151.0/ 8.10.171.0/ 802.11AC/ 8.5.171.0/ 8.10.183.0/ 8.10.130.0/ 8.10.171.0/ THIRD_PARTY_PRODUCT_SW/ 8.5.135.0/ 8.3.143.0/ NA-CIN_CLOSE_SW/ 8.5.140.0/ 4.0.1a/ WLC CLIENT INTEROP/ 12.0.13/ 8.5.151.0/ 8.4/ 120.13/ 8.5.160.0/ 8.10.151.0/ 8.3.143.0/ 8.3.131.0/ 8.3.150.0/ 8.5.135.0/ 8.5.161.0/ 8.10.185.0/ 8.2.166.0/ 8.5.140.0/ 8.5.151.0/ 8.3.150.0/ 16.12.3s/ WLC RRM/RF/CLEANAIR/ 8.5.151.0/ 8.10.130.0/ NA - COMPONENT ONLY/ 8.10.162.0/ 8.3.140.0/ 8.10.150.0/ 8.10.183.0/ 8.10.161.0/ 8.10.185.0/ 8.5.151.0/ 16.12.4/ 17.3.5b/ 8.10.183.0/ 8.10.171.0/ 8.5.171.0 Response in this JSON format:
{"software_version": "","explanation": "", "summary": ""}
qcsone-md
What Tasks are In-Progress:
No response from the customer, following up.
* Replace PSU1 with a known good power supply
* As your WLC pair is in a HA, so testing this on the standby should also be fine.
* Please note the power supply in 8540 is hot swappable, so just replacing the “Off” one on the secondary chassis and test it with a good power and let me know accordingly.
https://www.cisco.com/c/en/us/td/docs/unified_computing/ucs/c/hw/C240M4/install/C240M4/replace.html#pgfId-1250643<https://ddec1-0-en-ctp.trendmicro.com:443/wis/clicktime/v1/query?url=https%3a%2f%2fwww.cisco.com%2fc%2fen%2fus%2ftd%2fdocs%2funified%5fcomputing%2fucs%2fc%2fhw%2fC240M4%2finstall%2fC240M4%2freplace.html%23pgfId%2d1250643&umid=1728aed3-08ab-40d2-a28f-fa02560ef4c3&auth=32813f2e647ebb91b39d0b35ac97db1efa82dd64-1a67cb564e81a96e3d0c5ca3b5810635aafcce7c>;
I would recommend to perform this test during off hours and let us know accordingly.
Bug: CSCvy72527 (https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvy72527<https://ddec1-0-en-ctp.trendmicro.com:443/wis/clicktime/v1/query?url=https%3a%2f%2fbst.cloudapps.cisco.com%2fbugsearch%2fbug%2fCSCvy72527&umid=1728aed3-08ab-40d2-a28f-fa02560ef4c3&auth=32813f2e647ebb91b39d0b35ac97db1efa82dd64-2845f1cca7d4a50adb9fb745ee84df25e40bc8c5>;)
Summary of Completed Tasks and Troubleshooting:
As per the WLC the PSU is reported as Present, OFF and as per below:
(TLDC-WL-WLC02) >show imm chassis power-supply
PSU1_POUT | 29h | ok | 10.1 | 0 Watts
PSU2_POUT | 2Fh | ok | 10.2 | 56 Watts
POWER_USAGE | C1h | ok | 7.0 | 64 Watts
PSU1_PIN | C2h | ok | 10.1 | 0 Watts
PSU2_PIN | C3h | ok | 10.2 | 64 Watts
Power Supply 1................................... Present, Off
Power Supply 2................................... Present, OK
qcsone-md
Hardware:
8540
Software:
8.10.183
Symptoms:
PSU status on the WLC is incorrect, Present OFF however its in working condition
qcsone-md
What Tasks are In-Progress:
* Replace PSU1 with a known good power supply
* As your WLC pair is in a HA, so testing this on the standby should also be fine.
* Please note the power supply in 8540 is hot swappable, so just replacing the “Off” one on the secondary chassis and test it with a good power and let me know accordingly.
https://www.cisco.com/c/en/us/td/docs/unified_computing/ucs/c/hw/C240M4/install/C240M4/replace.html#pgfId-1250643<https://ddec1-0-en-ctp.trendmicro.com:443/wis/clicktime/v1/query?url=https%3a%2f%2fwww.cisco.com%2fc%2fen%2fus%2ftd%2fdocs%2funified%5fcomputing%2fucs%2fc%2fhw%2fC240M4%2finstall%2fC240M4%2freplace.html%23pgfId%2d1250643&umid=1728aed3-08ab-40d2-a28f-fa02560ef4c3&auth=32813f2e647ebb91b39d0b35ac97db1efa82dd64-1a67cb564e81a96e3d0c5ca3b5810635aafcce7c>;
I would recommend to perform this test during off hours and let us know accordingly.
Bug: CSCvy72527 (https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvy72527<https://ddec1-0-en-ctp.trendmicro.com:443/wis/clicktime/v1/query?url=https%3a%2f%2fbst.cloudapps.cisco.com%2fbugsearch%2fbug%2fCSCvy72527&umid=1728aed3-08ab-40d2-a28f-fa02560ef4c3&auth=32813f2e647ebb91b39d0b35ac97db1efa82dd64-2845f1cca7d4a50adb9fb745ee84df25e40bc8c5>;)
Summary of Completed Tasks and Troubleshooting:
As per the WLC the PSU is reported as Present, OFF and as per below:
(TLDC-WL-WLC02) >show imm chassis power-supply
PSU1_POUT | 29h | ok | 10.1 | 0 Watts
PSU2_POUT | 2Fh | ok | 10.2 | 56 Watts
POWER_USAGE | C1h | ok | 7.0 | 64 Watts
PSU1_PIN | C2h | ok | 10.1 | 0 Watts
PSU2_PIN | C3h | ok | 10.2 | 64 Watts
Power Supply 1................................... Present, Off
Power Supply 2................................... Present, OK
qcsone-md
Hardware:
8540
Software:
8.10.183
Symptoms:
PSU status on the WLC is incorrect, Present OFF however its in working condition.
Technology: Wireless
Subtechnology: 8540 Series Wireless LAN Controller (AIR-CT8540)
Problem Code: Error Messages, Logs, Debugs
Product: NA
Product Family: AIRCTA2
Software Version: 8.10.183.0
Router/Node Name: N/A
Problem Details: WLC 8540 PSU power supply present but OFF, psu led is green
Technology: Wireless
Subtechnology: 8540 Series Wireless LAN Controller (AIR-CT8540)
Problem Code: Error Messages, Logs, Debugs
Product: NA
Product Family: AIRCTA2
Software Version: 8.10.183.0
Router/Node Name: N/A
Problem Details: WLC 8540 PSU power supply present but OFF, psu led is green
WLC 8540 PSU power supply present but OFF, psu led is green
timestamp : 2023-07-04T09:50:15.000+0000 || updatedby : kishank || type : RESOLUTION SUMMARY || visibility : External || details : closing case threes strikes. | Question: Which product is principally discussed in these documents?
Answer "NONE" if you cannot find answer in the given documents.
The ONLY product name should be selected from the given product name list: AIR-CT8540-1K-K9/ AIR-CT8540-K9/ NA-CIN_CLOSE_HW/ C9120AXI-S/ THIRD_PARTY_PRODUCT_HW/ AIR-CT8540-CA-K9/ AIR-AP2802I-S-K9/ AIR-CT8540-K9Z/ AIR-BZL-C240M4/ DN2-HW-APL-XL/ WLC-AP-T/ AIR-CT8540-SW-8.2 Response in this JSON format:
{"product_name": "","explanation": "", "summary": ""}
Technology: Wireless
Subtechnology: 8540 Series Wireless LAN Controller (AIR-CT8540)
Problem Code: Error Messages, Logs, Debugs
Product: NA
Product Family: AIRCTA2
Software Version: 8.10.183.0
Router/Node Name: N/A
Problem Details: WLC 8540 PSU power supply present but OFF, psu led is green
WLC 8540 PSU power supply present but OFF, psu led is green
timestamp : 2023-07-04T09:50:15.000+0000 || updatedby : kishank || type : RESOLUTION SUMMARY || visibility : External || details : closing case threes strikes. | Technology: Wireless
Subtechnology: 8540 Series Wireless LAN Controller (AIR-CT8540)
Problem Code: Error Messages, Logs, Debugs
Product: NA
Product Family: AIRCTA2
Software Version: 8.10.183.0
Router/Node Name: N/A
Problem Details: WLC 8540 PSU power supply present but OFF, psu led is green | WLC 8540 PSU power supply present but OFF, psu led is green | timestamp : 2023-07-04T09:50:15.000+0000 || updatedby : kishank || type : RESOLUTION SUMMARY || visibility : External || details : closing case threes strikes. | nan | AIR-CT8540-CA-K9 | MFG_CTVM_SMALL_8.10.183.0.iso | nan | nan | 3 | nan | Configuration Assistance (process not intuitive, too complex, inconsistent...) | AIRCTA2 | Wireless | 8540 Series Wireless LAN Controller (AIR-CT8540) | nan | nan | nan | nan | nan | nan |
695960852 | Question: Which software version is principally discussed in these documents?
Answer "NONE" if you cannot find answer in the given documents.
The ONLY software version should be selected from the given software version list: 9.16.2.3/ 9.14.2.4/ 9.14.2.4/ 9.14.1 Response in this JSON format:
{"software_version": "","explanation": "", "summary": ""}
Technology: Adaptive Security Appliance
Subtechnology: ASA Firepower Devices - Non-VPN
Problem Code: Configuration Assistance
Product: NA
Product Family: FPRLOW
Software Version: N/A
Router/Node Name: N/A
Problem Details: Hi Team,
Afternoon, may we check what the heat generated (Btu/hours) for the FPR1150-ASA-K9?
Serial Number: JMX2716X0JJ
Thanks!
regards
Guan
Hi Team,
Afternoon, may we check what the heat generated (Btu/hours) for the FPR1150-ASA-K9?
Serial Number: JMX2716X0JJ
Thanks!
regards
Guan
Required information has been shared to calculate the BTU and attached the Watt to BTU converter for reference.
* I'm proceeding with the closure of this case after your confirmation in the last mail. | Question: Which product is principally discussed in these documents?
Answer "NONE" if you cannot find answer in the given documents.
The ONLY product name should be selected from the given product name list: FPR9K-SM-36/ FPR-C9300-AC/ FPR1150-ASA-K9 Response in this JSON format:
{"product_name": "","explanation": "", "summary": ""}
Technology: Adaptive Security Appliance
Subtechnology: ASA Firepower Devices - Non-VPN
Problem Code: Configuration Assistance
Product: NA
Product Family: FPRLOW
Software Version: N/A
Router/Node Name: N/A
Problem Details: Hi Team,
Afternoon, may we check what the heat generated (Btu/hours) for the FPR1150-ASA-K9?
Serial Number: JMX2716X0JJ
Thanks!
regards
Guan
Hi Team,
Afternoon, may we check what the heat generated (Btu/hours) for the FPR1150-ASA-K9?
Serial Number: JMX2716X0JJ
Thanks!
regards
Guan
Required information has been shared to calculate the BTU and attached the Watt to BTU converter for reference.
* I'm proceeding with the closure of this case after your confirmation in the last mail. | Technology: Adaptive Security Appliance
Subtechnology: ASA Firepower Devices - Non-VPN
Problem Code: Configuration Assistance
Product: NA
Product Family: FPRLOW
Software Version: N/A
Router/Node Name: N/A
Problem Details: Hi Team,
Afternoon, may we check what the heat generated (Btu/hours) for the FPR1150-ASA-K9?
Serial Number: JMX2716X0JJ
Thanks!
regards
Guan | Hi Team,
Afternoon, may we check what the heat generated (Btu/hours) for the FPR1150-ASA-K9?
Serial Number: JMX2716X0JJ
Thanks!
regards
Guan | Required information has been shared to calculate the BTU and attached the Watt to BTU converter for reference.
* I'm proceeding with the closure of this case after your confirmation in the last mail. | we are deploying the ASA in our client server room and we need to submit the heat generated in btu/hours for the equipment | FPR1150-ASA-K9 | 9.16(2)3 | 9.16(2)3 | 75.0 | 4 | 100.0 | Software -not a bug (scalability, version selection, install/upgrade help...) | FPRLOW | Adaptive Security Appliance | ASA Firepower Devices - Non-VPN | 01t6R000007BkD2QAK | Configuration Assistance | ASA Firepower Devices - Non-VPN | Adaptive Security Appliance | 01t1C000006UmrUQAS | CaseClosureFieldAutomation: Partial |
695684373 | Question: Which software version is principally discussed in these documents?
Answer "NONE" if you cannot find answer in the given documents.
The ONLY software version should be selected from the given software version list: 7.7.1/ 6.3.3/ 7.3.2/ NA - RMA/ 7.3.2 Response in this JSON format:
{"software_version": "","explanation": "", "summary": ""}
Technology: XR-Routing-Platforms
Subtechnology: ASR 9000 Series - Hardware failures, Environmental Issues (Power, Fans, etc)
Problem Code: Hardware Failure
Product: NA
Product Family: ASR9KFM
Software Version: N/A
Router/Node Name: N/A
Problem Details: Hi cisco support,
We observed that standby RSP (RSP1) was auto reloaded in ASR9006 router. Please find attached logs and investigate the root cause.
0/RSP0/ADMIN0:Jun 13 12:07:49.613 SGT: rvm_mgr[3921]: %PKT_INFRA-RVM_MGR-3-ERROR : Admin and Service VM down on card 0/RSP1, reloading card..
0/RSP0/ADMIN0:Jun 13 12:07:49.616 SGT: shelf_mgr[3924]: %INFRA-SHELF_MGR-4-CARD_RELOAD : Reloading card 0/RSP1
0/RSP0/ADMIN0:Jun 13 12:07:54.764 SGT: esdma[5174]: %INFRA-ESDMA-6-ESD_CONN_LOST : ESDMA lost connection with esd at 0/RP1/RP-SW1
RP/0/RSP0/CPU0:Jun 13 12:08:29.623 SGT: sysdb_svr_admin[298]: %LIBRARY-REPLICATOR-7-NO_CB : No completion notification received for update message 4035
RP/0/RSP0/CPU0:Jun 13 12:08:43.159 SGT: sysdb_svr_admin[298]: %LIBRARY-REPLICATOR-7-SEND_FAILED : Failed to send update: rc 0xb (Resource temporarily unavailable)
0/RSP0/ADMIN0:Jun 13 12:08:54.663 SGT: esd[3902]: %INFRA-ESD-6-PORT_STATE_CHANGE_LINK_DOWN : The physical link state of the control ethernet switch port 55 has changed. New Link state DOWN, Admin state: UP
0/0/ADMIN0:Jun 13 12:08:54.662 SGT: esd[3510]: %INFRA-ESD-6-PORT_STATE_CHANGE_LINK_DOWN : The physical link state of the control ethernet switch port 58 has changed. New Link state DOWN, Admin state: UP
0/RSP0/ADMIN0:Jun 13 12:08:54.664 SGT: esd[3902]: %INFRA-ESD-6-PORT_STATE_CHANGE_LINK_DOWN : The physical link state of the control ethernet switch port 54 has changed. New Link state DOWN, Admin state: UP
RP/0/RSP0/CPU0:Jun 13 12:08:54.679 SGT: rmf_svr[288]: %HA-REDCON-1-STANDBY_NOT_READY : standby card is NOT ready
0/RSP0/ADMIN0:Jun 13 12:08:54.668 SGT: canbus_driver[3894]: %PLATFORM-CANB_SERVER-7-CBC_PRE_RESET_NOTIFICATION : Node 0/RSP1 CBC-0, reset reason CPU_RESET_POR (0x05000000)
0/RSP0/ADMIN0:Jun 13 12:08:54.670 SGT: shelf_mgr[3924]: %INFRA-SHELF_MGR-6-HW_EVENT : Rcvd HW event HW_EVENT_RESET, event_reason_str 'HW Event RESET' for card 0/RSP1
RP/0/RSP0/CPU0:Jun 13 12:08:54.694 SGT: bpm[1102]: %ROUTING-BGP-5-ASYNC_IPC_STATUS : bpm-default:(S)inst-id 0, Connection Closed
RP/0/RSP0/CPU0:Jun 13 12:08:54.706 SGT: rmf_svr[288]: %HA-REDCON-6-STANDBY_CONNECTION_DOWN : connection to standby card is DOWN
Hi cisco support,
We observed that standby RSP (RSP1) was auto reloaded in ASR9006 router. Please find attached logs and investigate the root cause.
0/RSP0/ADMIN0:Jun 13 12:07:49.613 SGT: rvm_mgr[3921]: %PKT_INFRA-RVM_MGR-3-ERROR : Admin and Service VM down on card 0/RSP1, reloading card..
0/RSP0/ADMIN0:Jun 13 12:07:49.616 SGT: shelf_mgr[3924]: %INFRA-SHELF_MGR-4-CARD_RELOAD : Reloading card 0/RSP1
0/RSP0/ADMIN0:Jun 13 12:07:54.764 SGT: esdma[5174]: %INFRA-ESDMA-6-ESD_CONN_LOST : ESDMA lost connection with esd at 0/RP1/RP-SW1
RP/0/RSP0/CPU0:Jun 13 12:08:29.623 SGT: sysdb_svr_admin[298]: %LIBRARY-REPLICATOR-7-NO_CB : No completion notification received for update message 4035
RP/0/RSP0/CPU0:Jun 13 12:08:43.159 SGT: sysdb_svr_admin[298]: %LIBRARY-REPLICATOR-7-SEND_FAILED : Failed to send update: rc 0xb (Resource temporarily unavailable)
0/RSP0/ADMIN0:Jun 13 12:08:54.663 SGT: esd[3902]: %INFRA-ESD-6-PORT_STATE_CHANGE_LINK_DOWN : The physical link state of the control ethernet switch port 55 has changed. New Link state DOWN, Admin state: UP
0/0/ADMIN0:Jun 13 12:08:54.662 SGT: esd[3510]: %INFRA-ESD-6-PORT_STATE_CHANGE_LINK_DOWN : The physical link state of the control ethernet switch port 58 has changed. New Link state DOWN, Admin state: UP
0/RSP0/ADMIN0:Jun 13 12:08:54.664 SGT: esd[3902]: %INFRA-ESD-6-PORT_STATE_CHANGE_LINK_DOWN : The physical link state of the control ethernet switch port 54 has changed. New Link state DOWN, Admin state: UP
RP/0/RSP0/CPU0:Jun 13 12:08:54.679 SGT: rmf_svr[288]: %HA-REDCON-1-STANDBY_NOT_READY : standby card is NOT ready
0/RSP0/ADMIN0:Jun 13 12:08:54.668 SGT: canbus_driver[3894]: %PLATFORM-CANB_SERVER-7-CBC_PRE_RESET_NOTIFICATION : Node 0/RSP1 CBC-0, reset reason CPU_RESET_POR (0x05000000)
0/RSP0/ADMIN0:Jun 13 12:08:54.670 SGT: shelf_mgr[3924]: %INFRA-SHELF_MGR-6-HW_EVENT : Rcvd HW event HW_EVENT_RESET, event_reason_str 'HW Event RESET' for card 0/RSP1
RP/0/RSP0/CPU0:Jun 13 12:08:54.694 SGT: bpm[1102]: %ROUTING-BGP-5-ASYNC_IPC_STATUS : bpm-default:(S)inst-id 0, Connection Closed
RP/0/RSP0/CPU0:Jun 13 12:08:54.706 SGT: rmf_svr[288]: %HA-REDCON-6-STANDBY_CONNECTION_DOWN : connection to standby card is DOWN
Rvm_mgr (Remote VM manager), is a rack scoped service which runs only on RPs maintaining HBs (Heartbeats) with XR VMs on remote cards. This process caters to two simultaneous faults in the system.
* The two faults are, the process misses 3 HBs with remote XR VM, and Sysadmin VM on the remote card is down too. In case of such double failure, rvm_mgr takes action of reloading the remote card as a recovery mechanism.
* The connectivity failure between the cards was further confirmed from the below ping report, when the first HB is missed with XR VM, ping test is recorded.
* If ping result says 100% packet loss, this means there is communication failure.
Start:
2023-06-13-12:07:12:272349058 PING 192.0.4.4 (192.0.4.4) 56(84) bytes of data. ---
192.0.4.4 ping statistics ---
50 packets transmitted, 0 received, 100% packet loss, time 5271ms
Finish: 2023-06-13-12:07:27:552267057
* The node is stable for 25 days, if there is any sort of hardware failure we should see recurrence but that didn't happen.
* Considering all of the situations, we suspect that the admin VM of RP1 encountered a transient issue at the control plane to cause HB loss further. | Question: Which product is principally discussed in these documents?
Answer "NONE" if you cannot find answer in the given documents.
The ONLY product name should be selected from the given product name list: ASR-9006/ A9K-RSP880-SE/ ASR-9904/ ASR-9006-FAN-V2/ A9K-RSP880-TR Response in this JSON format:
{"product_name": "","explanation": "", "summary": ""}
Technology: XR-Routing-Platforms
Subtechnology: ASR 9000 Series - Hardware failures, Environmental Issues (Power, Fans, etc)
Problem Code: Hardware Failure
Product: NA
Product Family: ASR9KFM
Software Version: N/A
Router/Node Name: N/A
Problem Details: Hi cisco support,
We observed that standby RSP (RSP1) was auto reloaded in ASR9006 router. Please find attached logs and investigate the root cause.
0/RSP0/ADMIN0:Jun 13 12:07:49.613 SGT: rvm_mgr[3921]: %PKT_INFRA-RVM_MGR-3-ERROR : Admin and Service VM down on card 0/RSP1, reloading card..
0/RSP0/ADMIN0:Jun 13 12:07:49.616 SGT: shelf_mgr[3924]: %INFRA-SHELF_MGR-4-CARD_RELOAD : Reloading card 0/RSP1
0/RSP0/ADMIN0:Jun 13 12:07:54.764 SGT: esdma[5174]: %INFRA-ESDMA-6-ESD_CONN_LOST : ESDMA lost connection with esd at 0/RP1/RP-SW1
RP/0/RSP0/CPU0:Jun 13 12:08:29.623 SGT: sysdb_svr_admin[298]: %LIBRARY-REPLICATOR-7-NO_CB : No completion notification received for update message 4035
RP/0/RSP0/CPU0:Jun 13 12:08:43.159 SGT: sysdb_svr_admin[298]: %LIBRARY-REPLICATOR-7-SEND_FAILED : Failed to send update: rc 0xb (Resource temporarily unavailable)
0/RSP0/ADMIN0:Jun 13 12:08:54.663 SGT: esd[3902]: %INFRA-ESD-6-PORT_STATE_CHANGE_LINK_DOWN : The physical link state of the control ethernet switch port 55 has changed. New Link state DOWN, Admin state: UP
0/0/ADMIN0:Jun 13 12:08:54.662 SGT: esd[3510]: %INFRA-ESD-6-PORT_STATE_CHANGE_LINK_DOWN : The physical link state of the control ethernet switch port 58 has changed. New Link state DOWN, Admin state: UP
0/RSP0/ADMIN0:Jun 13 12:08:54.664 SGT: esd[3902]: %INFRA-ESD-6-PORT_STATE_CHANGE_LINK_DOWN : The physical link state of the control ethernet switch port 54 has changed. New Link state DOWN, Admin state: UP
RP/0/RSP0/CPU0:Jun 13 12:08:54.679 SGT: rmf_svr[288]: %HA-REDCON-1-STANDBY_NOT_READY : standby card is NOT ready
0/RSP0/ADMIN0:Jun 13 12:08:54.668 SGT: canbus_driver[3894]: %PLATFORM-CANB_SERVER-7-CBC_PRE_RESET_NOTIFICATION : Node 0/RSP1 CBC-0, reset reason CPU_RESET_POR (0x05000000)
0/RSP0/ADMIN0:Jun 13 12:08:54.670 SGT: shelf_mgr[3924]: %INFRA-SHELF_MGR-6-HW_EVENT : Rcvd HW event HW_EVENT_RESET, event_reason_str 'HW Event RESET' for card 0/RSP1
RP/0/RSP0/CPU0:Jun 13 12:08:54.694 SGT: bpm[1102]: %ROUTING-BGP-5-ASYNC_IPC_STATUS : bpm-default:(S)inst-id 0, Connection Closed
RP/0/RSP0/CPU0:Jun 13 12:08:54.706 SGT: rmf_svr[288]: %HA-REDCON-6-STANDBY_CONNECTION_DOWN : connection to standby card is DOWN
Hi cisco support,
We observed that standby RSP (RSP1) was auto reloaded in ASR9006 router. Please find attached logs and investigate the root cause.
0/RSP0/ADMIN0:Jun 13 12:07:49.613 SGT: rvm_mgr[3921]: %PKT_INFRA-RVM_MGR-3-ERROR : Admin and Service VM down on card 0/RSP1, reloading card..
0/RSP0/ADMIN0:Jun 13 12:07:49.616 SGT: shelf_mgr[3924]: %INFRA-SHELF_MGR-4-CARD_RELOAD : Reloading card 0/RSP1
0/RSP0/ADMIN0:Jun 13 12:07:54.764 SGT: esdma[5174]: %INFRA-ESDMA-6-ESD_CONN_LOST : ESDMA lost connection with esd at 0/RP1/RP-SW1
RP/0/RSP0/CPU0:Jun 13 12:08:29.623 SGT: sysdb_svr_admin[298]: %LIBRARY-REPLICATOR-7-NO_CB : No completion notification received for update message 4035
RP/0/RSP0/CPU0:Jun 13 12:08:43.159 SGT: sysdb_svr_admin[298]: %LIBRARY-REPLICATOR-7-SEND_FAILED : Failed to send update: rc 0xb (Resource temporarily unavailable)
0/RSP0/ADMIN0:Jun 13 12:08:54.663 SGT: esd[3902]: %INFRA-ESD-6-PORT_STATE_CHANGE_LINK_DOWN : The physical link state of the control ethernet switch port 55 has changed. New Link state DOWN, Admin state: UP
0/0/ADMIN0:Jun 13 12:08:54.662 SGT: esd[3510]: %INFRA-ESD-6-PORT_STATE_CHANGE_LINK_DOWN : The physical link state of the control ethernet switch port 58 has changed. New Link state DOWN, Admin state: UP
0/RSP0/ADMIN0:Jun 13 12:08:54.664 SGT: esd[3902]: %INFRA-ESD-6-PORT_STATE_CHANGE_LINK_DOWN : The physical link state of the control ethernet switch port 54 has changed. New Link state DOWN, Admin state: UP
RP/0/RSP0/CPU0:Jun 13 12:08:54.679 SGT: rmf_svr[288]: %HA-REDCON-1-STANDBY_NOT_READY : standby card is NOT ready
0/RSP0/ADMIN0:Jun 13 12:08:54.668 SGT: canbus_driver[3894]: %PLATFORM-CANB_SERVER-7-CBC_PRE_RESET_NOTIFICATION : Node 0/RSP1 CBC-0, reset reason CPU_RESET_POR (0x05000000)
0/RSP0/ADMIN0:Jun 13 12:08:54.670 SGT: shelf_mgr[3924]: %INFRA-SHELF_MGR-6-HW_EVENT : Rcvd HW event HW_EVENT_RESET, event_reason_str 'HW Event RESET' for card 0/RSP1
RP/0/RSP0/CPU0:Jun 13 12:08:54.694 SGT: bpm[1102]: %ROUTING-BGP-5-ASYNC_IPC_STATUS : bpm-default:(S)inst-id 0, Connection Closed
RP/0/RSP0/CPU0:Jun 13 12:08:54.706 SGT: rmf_svr[288]: %HA-REDCON-6-STANDBY_CONNECTION_DOWN : connection to standby card is DOWN
Rvm_mgr (Remote VM manager), is a rack scoped service which runs only on RPs maintaining HBs (Heartbeats) with XR VMs on remote cards. This process caters to two simultaneous faults in the system.
* The two faults are, the process misses 3 HBs with remote XR VM, and Sysadmin VM on the remote card is down too. In case of such double failure, rvm_mgr takes action of reloading the remote card as a recovery mechanism.
* The connectivity failure between the cards was further confirmed from the below ping report, when the first HB is missed with XR VM, ping test is recorded.
* If ping result says 100% packet loss, this means there is communication failure.
Start:
2023-06-13-12:07:12:272349058 PING 192.0.4.4 (192.0.4.4) 56(84) bytes of data. ---
192.0.4.4 ping statistics ---
50 packets transmitted, 0 received, 100% packet loss, time 5271ms
Finish: 2023-06-13-12:07:27:552267057
* The node is stable for 25 days, if there is any sort of hardware failure we should see recurrence but that didn't happen.
* Considering all of the situations, we suspect that the admin VM of RP1 encountered a transient issue at the control plane to cause HB loss further. | Technology: XR-Routing-Platforms
Subtechnology: ASR 9000 Series - Hardware failures, Environmental Issues (Power, Fans, etc)
Problem Code: Hardware Failure
Product: NA
Product Family: ASR9KFM
Software Version: N/A
Router/Node Name: N/A
Problem Details: Hi cisco support,
We observed that standby RSP (RSP1) was auto reloaded in ASR9006 router. Please find attached logs and investigate the root cause.
0/RSP0/ADMIN0:Jun 13 12:07:49.613 SGT: rvm_mgr[3921]: %PKT_INFRA-RVM_MGR-3-ERROR : Admin and Service VM down on card 0/RSP1, reloading card..
0/RSP0/ADMIN0:Jun 13 12:07:49.616 SGT: shelf_mgr[3924]: %INFRA-SHELF_MGR-4-CARD_RELOAD : Reloading card 0/RSP1
0/RSP0/ADMIN0:Jun 13 12:07:54.764 SGT: esdma[5174]: %INFRA-ESDMA-6-ESD_CONN_LOST : ESDMA lost connection with esd at 0/RP1/RP-SW1
RP/0/RSP0/CPU0:Jun 13 12:08:29.623 SGT: sysdb_svr_admin[298]: %LIBRARY-REPLICATOR-7-NO_CB : No completion notification received for update message 4035
RP/0/RSP0/CPU0:Jun 13 12:08:43.159 SGT: sysdb_svr_admin[298]: %LIBRARY-REPLICATOR-7-SEND_FAILED : Failed to send update: rc 0xb (Resource temporarily unavailable)
0/RSP0/ADMIN0:Jun 13 12:08:54.663 SGT: esd[3902]: %INFRA-ESD-6-PORT_STATE_CHANGE_LINK_DOWN : The physical link state of the control ethernet switch port 55 has changed. New Link state DOWN, Admin state: UP
0/0/ADMIN0:Jun 13 12:08:54.662 SGT: esd[3510]: %INFRA-ESD-6-PORT_STATE_CHANGE_LINK_DOWN : The physical link state of the control ethernet switch port 58 has changed. New Link state DOWN, Admin state: UP
0/RSP0/ADMIN0:Jun 13 12:08:54.664 SGT: esd[3902]: %INFRA-ESD-6-PORT_STATE_CHANGE_LINK_DOWN : The physical link state of the control ethernet switch port 54 has changed. New Link state DOWN, Admin state: UP
RP/0/RSP0/CPU0:Jun 13 12:08:54.679 SGT: rmf_svr[288]: %HA-REDCON-1-STANDBY_NOT_READY : standby card is NOT ready
0/RSP0/ADMIN0:Jun 13 12:08:54.668 SGT: canbus_driver[3894]: %PLATFORM-CANB_SERVER-7-CBC_PRE_RESET_NOTIFICATION : Node 0/RSP1 CBC-0, reset reason CPU_RESET_POR (0x05000000)
0/RSP0/ADMIN0:Jun 13 12:08:54.670 SGT: shelf_mgr[3924]: %INFRA-SHELF_MGR-6-HW_EVENT : Rcvd HW event HW_EVENT_RESET, event_reason_str 'HW Event RESET' for card 0/RSP1
RP/0/RSP0/CPU0:Jun 13 12:08:54.694 SGT: bpm[1102]: %ROUTING-BGP-5-ASYNC_IPC_STATUS : bpm-default:(S)inst-id 0, Connection Closed
RP/0/RSP0/CPU0:Jun 13 12:08:54.706 SGT: rmf_svr[288]: %HA-REDCON-6-STANDBY_CONNECTION_DOWN : connection to standby card is DOWN | Hi cisco support,
We observed that standby RSP (RSP1) was auto reloaded in ASR9006 router. Please find attached logs and investigate the root cause.
0/RSP0/ADMIN0:Jun 13 12:07:49.613 SGT: rvm_mgr[3921]: %PKT_INFRA-RVM_MGR-3-ERROR : Admin and Service VM down on card 0/RSP1, reloading card..
0/RSP0/ADMIN0:Jun 13 12:07:49.616 SGT: shelf_mgr[3924]: %INFRA-SHELF_MGR-4-CARD_RELOAD : Reloading card 0/RSP1
0/RSP0/ADMIN0:Jun 13 12:07:54.764 SGT: esdma[5174]: %INFRA-ESDMA-6-ESD_CONN_LOST : ESDMA lost connection with esd at 0/RP1/RP-SW1
RP/0/RSP0/CPU0:Jun 13 12:08:29.623 SGT: sysdb_svr_admin[298]: %LIBRARY-REPLICATOR-7-NO_CB : No completion notification received for update message 4035
RP/0/RSP0/CPU0:Jun 13 12:08:43.159 SGT: sysdb_svr_admin[298]: %LIBRARY-REPLICATOR-7-SEND_FAILED : Failed to send update: rc 0xb (Resource temporarily unavailable)
0/RSP0/ADMIN0:Jun 13 12:08:54.663 SGT: esd[3902]: %INFRA-ESD-6-PORT_STATE_CHANGE_LINK_DOWN : The physical link state of the control ethernet switch port 55 has changed. New Link state DOWN, Admin state: UP
0/0/ADMIN0:Jun 13 12:08:54.662 SGT: esd[3510]: %INFRA-ESD-6-PORT_STATE_CHANGE_LINK_DOWN : The physical link state of the control ethernet switch port 58 has changed. New Link state DOWN, Admin state: UP
0/RSP0/ADMIN0:Jun 13 12:08:54.664 SGT: esd[3902]: %INFRA-ESD-6-PORT_STATE_CHANGE_LINK_DOWN : The physical link state of the control ethernet switch port 54 has changed. New Link state DOWN, Admin state: UP
RP/0/RSP0/CPU0:Jun 13 12:08:54.679 SGT: rmf_svr[288]: %HA-REDCON-1-STANDBY_NOT_READY : standby card is NOT ready
0/RSP0/ADMIN0:Jun 13 12:08:54.668 SGT: canbus_driver[3894]: %PLATFORM-CANB_SERVER-7-CBC_PRE_RESET_NOTIFICATION : Node 0/RSP1 CBC-0, reset reason CPU_RESET_POR (0x05000000)
0/RSP0/ADMIN0:Jun 13 12:08:54.670 SGT: shelf_mgr[3924]: %INFRA-SHELF_MGR-6-HW_EVENT : Rcvd HW event HW_EVENT_RESET, event_reason_str 'HW Event RESET' for card 0/RSP1
RP/0/RSP0/CPU0:Jun 13 12:08:54.694 SGT: bpm[1102]: %ROUTING-BGP-5-ASYNC_IPC_STATUS : bpm-default:(S)inst-id 0, Connection Closed
RP/0/RSP0/CPU0:Jun 13 12:08:54.706 SGT: rmf_svr[288]: %HA-REDCON-6-STANDBY_CONNECTION_DOWN : connection to standby card is DOWN | Rvm_mgr (Remote VM manager), is a rack scoped service which runs only on RPs maintaining HBs (Heartbeats) with XR VMs on remote cards. This process caters to two simultaneous faults in the system.
* The two faults are, the process misses 3 HBs with remote XR VM, and Sysadmin VM on the remote card is down too. In case of such double failure, rvm_mgr takes action of reloading the remote card as a recovery mechanism.
* The connectivity failure between the cards was further confirmed from the below ping report, when the first HB is missed with XR VM, ping test is recorded.
* If ping result says 100% packet loss, this means there is communication failure.
Start:
2023-06-13-12:07:12:272349058 PING 192.0.4.4 (192.0.4.4) 56(84) bytes of data. ---
192.0.4.4 ping statistics ---
50 packets transmitted, 0 received, 100% packet loss, time 5271ms
Finish: 2023-06-13-12:07:27:552267057
* The node is stable for 25 days, if there is any sort of hardware failure we should see recurrence but that didn't happen.
* Considering all of the situations, we suspect that the admin VM of RP1 encountered a transient issue at the control plane to cause HB loss further. | Problem description:
------------------
Node Name: JE_GP_ASR_R02
Hardware: ASR-9006
Software: NA
Issue : Standby RSP 1 got auto-reloaded | A9K-RSP880-TR | 7.3.2 | 7.3.2 | 42.0 | 3 | 100.0 | Hardware - non-failure (limits exceeded, not enough memory, missing parts...) | ASR9KFM | XR-Routing-Platforms | ASR 9000 Series - Hardware failures, Environmental Issues (Power, Fans, etc) | 01t6R000007Bn2OQAS | Hardware Failure | ASR 9000 Series - Hardware failures, Environmental Issues (Power, Fans, etc) | XR-Routing-Platforms | 01tA0000000kmQpIAI | IRE: PARTIAL;SHERLOCK: PARTIAL;CaseClosureFieldAutomation: Partial |
694168349 | Question: Which software version is principally discussed in these documents?
Answer "NONE" if you cannot find answer in the given documents.
The ONLY software version should be selected from the given software version list: 1/ 8.10.151.0/ 8.10.171.0/ 802.11AC/ 8.5.171.0/ 8.10.183.0/ 8.10.130.0/ 8.10.171.0/ THIRD_PARTY_PRODUCT_SW/ 8.5.135.0/ 8.3.143.0/ NA-CIN_CLOSE_SW/ 8.5.140.0/ 4.0.1a/ WLC CLIENT INTEROP/ 12.0.13/ 8.5.151.0/ 8.4/ 120.13/ 8.5.160.0/ 8.10.151.0/ 8.3.143.0/ 8.3.131.0/ 8.3.150.0/ 8.5.135.0/ 8.5.161.0/ 8.10.185.0/ 8.2.166.0/ 8.5.140.0/ 8.5.151.0/ 8.3.150.0/ 16.12.3s/ WLC RRM/RF/CLEANAIR/ 8.5.151.0/ 8.10.130.0/ NA - COMPONENT ONLY/ 8.10.162.0/ 8.3.140.0/ 8.10.150.0/ 8.10.183.0/ 8.10.161.0/ 8.10.185.0/ 8.5.151.0/ 16.12.4/ 17.3.5b/ 8.10.183.0/ 8.10.171.0/ 8.5.171.0 Response in this JSON format:
{"software_version": "","explanation": "", "summary": ""}
Closed
Technology: Wireless
Subtechnology: 8540 Series Wireless LAN Controller (AIR-CT8540)
Problem Code: Error Messages, Logs, Debugs
Product: NA
Product Family: AIRCTA2
Software Version: N/A
Router/Node Name: N/A
Problem Details: Hi TAC,
For some reason, clients are not able to get IP address on a specific WiFi6 AP. Clients can connect and get IP address when connecting to a different WiFi6 AP.
Pls assign this case to Singapore Timezone TAC
logs from the client laptop when connecting on the problematic WiFi6 AP
C:\Users\P0104884>netsh wlan show interface
There is 1 interface on the system:
Name : Wi-Fi 2
Description : Intel(R) Wireless-AC 9560 160MHz
GUID : dc942dc5-f675-4d00-b042-fe9e06ead97c
Physical address : 80:32:53:d8:8a:ab
State : connected
SSID : NUS
BSSID : f0:1d:2d:ba:ba:0f
Network type : Infrastructure
Radio type : 802.11ac
Authentication : WPA2-Enterprise
Cipher : CCMP
Connection mode : Auto Connect
Channel : 100
Receive rate (Mbps) : 300
Transmit rate (Mbps) : 400
Signal : 89%
Profile : NUS
Hosted network status : Not available
Wireless LAN adapter Wi-Fi 2:
Connection-specific DNS Suffix . :
Description . . . . . . . . . . . : Intel(R) Wireless-AC 9560 160MHz
Physical Address. . . . . . . . . : 80-32-53-D8-8A-AB
DHCP Enabled. . . . . . . . . . . : Yes
Autoconfiguration Enabled . . . . : Yes
Link-local IPv6 Address . . . . . : fe80::b016:7822:bb77:cf9c%31(Preferred)
Autoconfiguration IPv4 Address. . : 169.254.207.156(Preferred)
Subnet Mask . . . . . . . . . . . : 255.255.0.0
Default Gateway . . . . . . . . . :
DHCPv6 IAID . . . . . . . . . . . : 444609107
DHCPv6 Client DUID. . . . . . . . : 00-01-00-01-27-E9-D1-F0-48-BA-4E-51-49-14
DNS Servers . . . . . . . . . . . : fec0:0:0:ffff::1%1
fec0:0:0:ffff::2%1
fec0:0:0:ffff::3%1
NetBIOS over Tcpip. . . . . . . . : Enabled
Hi TAC,
For some reason, clients are not able to get IP address on a specific WiFi6 AP. Clients can connect and get IP address when connecting to a different WiFi6 AP.
Pls assign this case to Singapore Timezone TAC
logs from the client laptop when connecting on the problematic WiFi6 AP
C:\Users\P0104884>netsh wlan show interface
There is 1 interface on the system:
Name : Wi-Fi 2
Description : Intel(R) Wireless-AC 9560 160MHz
GUID : dc942dc5-f675-4d00-b042-fe9e06ead97c
Physical address : 80:32:53:d8:8a:ab
State : connected
SSID : NUS
BSSID : f0:1d:2d:ba:ba:0f
Network type : Infrastructure
Radio type : 802.11ac
Authentication : WPA2-Enterprise
Cipher : CCMP
Connection mode : Auto Connect
Channel : 100
Receive rate (Mbps) : 300
Transmit rate (Mbps) : 400
Signal : 89%
Profile : NUS
Hosted network status : Not available
Wireless LAN adapter Wi-Fi 2:
Connection-specific DNS Suffix . :
Description . . . . . . . . . . . : Intel(R) Wireless-AC 9560 160MHz
Physical Address. . . . . . . . . : 80-32-53-D8-8A-AB
DHCP Enabled. . . . . . . . . . . : Yes
Autoconfiguration Enabled . . . . : Yes
Link-local IPv6 Address . . . . . : fe80::b016:7822:bb77:cf9c%31(Preferred)
Autoconfiguration IPv4 Address. . : 169.254.207.156(Preferred)
Subnet Mask . . . . . . . . . . . : 255.255.0.0
Default Gateway . . . . . . . . . :
DHCPv6 IAID . . . . . . . . . . . : 444609107
DHCPv6 Client DUID. . . . . . . . : 00-01-00-01-27-E9-D1-F0-48-BA-4E-51-49-14
DNS Servers . . . . . . . . . . . : fec0:0:0:ffff::1%1
fec0:0:0:ffff::2%1
fec0:0:0:ffff::3%1
NetBIOS over Tcpip. . . . . . . . : Enabled
Issue resolved.
Ref the Latest GCI | Question: Which product is principally discussed in these documents?
Answer "NONE" if you cannot find answer in the given documents.
The ONLY product name should be selected from the given product name list: AIR-CT8540-1K-K9/ AIR-CT8540-K9/ NA-CIN_CLOSE_HW/ C9120AXI-S/ THIRD_PARTY_PRODUCT_HW/ AIR-CT8540-CA-K9/ AIR-AP2802I-S-K9/ AIR-CT8540-K9Z/ AIR-BZL-C240M4/ DN2-HW-APL-XL/ WLC-AP-T/ AIR-CT8540-SW-8.2 Response in this JSON format:
{"product_name": "","explanation": "", "summary": ""}
Technology: Wireless
Subtechnology: 8540 Series Wireless LAN Controller (AIR-CT8540)
Problem Code: Error Messages, Logs, Debugs
Product: NA
Product Family: AIRCTA2
Software Version: N/A
Router/Node Name: N/A
Problem Details: Hi TAC,
For some reason, clients are not able to get IP address on a specific WiFi6 AP. Clients can connect and get IP address when connecting to a different WiFi6 AP.
Pls assign this case to Singapore Timezone TAC
logs from the client laptop when connecting on the problematic WiFi6 AP
C:\Users\P0104884>netsh wlan show interface
There is 1 interface on the system:
Name : Wi-Fi 2
Description : Intel(R) Wireless-AC 9560 160MHz
GUID : dc942dc5-f675-4d00-b042-fe9e06ead97c
Physical address : 80:32:53:d8:8a:ab
State : connected
SSID : NUS
BSSID : f0:1d:2d:ba:ba:0f
Network type : Infrastructure
Radio type : 802.11ac
Authentication : WPA2-Enterprise
Cipher : CCMP
Connection mode : Auto Connect
Channel : 100
Receive rate (Mbps) : 300
Transmit rate (Mbps) : 400
Signal : 89%
Profile : NUS
Hosted network status : Not available
Wireless LAN adapter Wi-Fi 2:
Connection-specific DNS Suffix . :
Description . . . . . . . . . . . : Intel(R) Wireless-AC 9560 160MHz
Physical Address. . . . . . . . . : 80-32-53-D8-8A-AB
DHCP Enabled. . . . . . . . . . . : Yes
Autoconfiguration Enabled . . . . : Yes
Link-local IPv6 Address . . . . . : fe80::b016:7822:bb77:cf9c%31(Preferred)
Autoconfiguration IPv4 Address. . : 169.254.207.156(Preferred)
Subnet Mask . . . . . . . . . . . : 255.255.0.0
Default Gateway . . . . . . . . . :
DHCPv6 IAID . . . . . . . . . . . : 444609107
DHCPv6 Client DUID. . . . . . . . : 00-01-00-01-27-E9-D1-F0-48-BA-4E-51-49-14
DNS Servers . . . . . . . . . . . : fec0:0:0:ffff::1%1
fec0:0:0:ffff::2%1
fec0:0:0:ffff::3%1
NetBIOS over Tcpip. . . . . . . . : Enabled
Hi TAC,
For some reason, clients are not able to get IP address on a specific WiFi6 AP. Clients can connect and get IP address when connecting to a different WiFi6 AP.
Pls assign this case to Singapore Timezone TAC
logs from the client laptop when connecting on the problematic WiFi6 AP
C:\Users\P0104884>netsh wlan show interface
There is 1 interface on the system:
Name : Wi-Fi 2
Description : Intel(R) Wireless-AC 9560 160MHz
GUID : dc942dc5-f675-4d00-b042-fe9e06ead97c
Physical address : 80:32:53:d8:8a:ab
State : connected
SSID : NUS
BSSID : f0:1d:2d:ba:ba:0f
Network type : Infrastructure
Radio type : 802.11ac
Authentication : WPA2-Enterprise
Cipher : CCMP
Connection mode : Auto Connect
Channel : 100
Receive rate (Mbps) : 300
Transmit rate (Mbps) : 400
Signal : 89%
Profile : NUS
Hosted network status : Not available
Wireless LAN adapter Wi-Fi 2:
Connection-specific DNS Suffix . :
Description . . . . . . . . . . . : Intel(R) Wireless-AC 9560 160MHz
Physical Address. . . . . . . . . : 80-32-53-D8-8A-AB
DHCP Enabled. . . . . . . . . . . : Yes
Autoconfiguration Enabled . . . . : Yes
Link-local IPv6 Address . . . . . : fe80::b016:7822:bb77:cf9c%31(Preferred)
Autoconfiguration IPv4 Address. . : 169.254.207.156(Preferred)
Subnet Mask . . . . . . . . . . . : 255.255.0.0
Default Gateway . . . . . . . . . :
DHCPv6 IAID . . . . . . . . . . . : 444609107
DHCPv6 Client DUID. . . . . . . . : 00-01-00-01-27-E9-D1-F0-48-BA-4E-51-49-14
DNS Servers . . . . . . . . . . . : fec0:0:0:ffff::1%1
fec0:0:0:ffff::2%1
fec0:0:0:ffff::3%1
NetBIOS over Tcpip. . . . . . . . : Enabled
Issue resolved.
Ref the Latest GCI | Technology: Wireless
Subtechnology: 8540 Series Wireless LAN Controller (AIR-CT8540)
Problem Code: Error Messages, Logs, Debugs
Product: NA
Product Family: AIRCTA2
Software Version: N/A
Router/Node Name: N/A
Problem Details: Hi TAC,
For some reason, clients are not able to get IP address on a specific WiFi6 AP. Clients can connect and get IP address when connecting to a different WiFi6 AP.
Pls assign this case to Singapore Timezone TAC
logs from the client laptop when connecting on the problematic WiFi6 AP
C:\Users\P0104884>netsh wlan show interface
There is 1 interface on the system:
Name : Wi-Fi 2
Description : Intel(R) Wireless-AC 9560 160MHz
GUID : dc942dc5-f675-4d00-b042-fe9e06ead97c
Physical address : 80:32:53:d8:8a:ab
State : connected
SSID : NUS
BSSID : f0:1d:2d:ba:ba:0f
Network type : Infrastructure
Radio type : 802.11ac
Authentication : WPA2-Enterprise
Cipher : CCMP
Connection mode : Auto Connect
Channel : 100
Receive rate (Mbps) : 300
Transmit rate (Mbps) : 400
Signal : 89%
Profile : NUS
Hosted network status : Not available
Wireless LAN adapter Wi-Fi 2:
Connection-specific DNS Suffix . :
Description . . . . . . . . . . . : Intel(R) Wireless-AC 9560 160MHz
Physical Address. . . . . . . . . : 80-32-53-D8-8A-AB
DHCP Enabled. . . . . . . . . . . : Yes
Autoconfiguration Enabled . . . . : Yes
Link-local IPv6 Address . . . . . : fe80::b016:7822:bb77:cf9c%31(Preferred)
Autoconfiguration IPv4 Address. . : 169.254.207.156(Preferred)
Subnet Mask . . . . . . . . . . . : 255.255.0.0
Default Gateway . . . . . . . . . :
DHCPv6 IAID . . . . . . . . . . . : 444609107
DHCPv6 Client DUID. . . . . . . . : 00-01-00-01-27-E9-D1-F0-48-BA-4E-51-49-14
DNS Servers . . . . . . . . . . . : fec0:0:0:ffff::1%1
fec0:0:0:ffff::2%1
fec0:0:0:ffff::3%1
NetBIOS over Tcpip. . . . . . . . : Enabled | Hi TAC,
For some reason, clients are not able to get IP address on a specific WiFi6 AP. Clients can connect and get IP address when connecting to a different WiFi6 AP.
Pls assign this case to Singapore Timezone TAC
logs from the client laptop when connecting on the problematic WiFi6 AP
C:\Users\P0104884>netsh wlan show interface
There is 1 interface on the system:
Name : Wi-Fi 2
Description : Intel(R) Wireless-AC 9560 160MHz
GUID : dc942dc5-f675-4d00-b042-fe9e06ead97c
Physical address : 80:32:53:d8:8a:ab
State : connected
SSID : NUS
BSSID : f0:1d:2d:ba:ba:0f
Network type : Infrastructure
Radio type : 802.11ac
Authentication : WPA2-Enterprise
Cipher : CCMP
Connection mode : Auto Connect
Channel : 100
Receive rate (Mbps) : 300
Transmit rate (Mbps) : 400
Signal : 89%
Profile : NUS
Hosted network status : Not available
Wireless LAN adapter Wi-Fi 2:
Connection-specific DNS Suffix . :
Description . . . . . . . . . . . : Intel(R) Wireless-AC 9560 160MHz
Physical Address. . . . . . . . . : 80-32-53-D8-8A-AB
DHCP Enabled. . . . . . . . . . . : Yes
Autoconfiguration Enabled . . . . : Yes
Link-local IPv6 Address . . . . . : fe80::b016:7822:bb77:cf9c%31(Preferred)
Autoconfiguration IPv4 Address. . : 169.254.207.156(Preferred)
Subnet Mask . . . . . . . . . . . : 255.255.0.0
Default Gateway . . . . . . . . . :
DHCPv6 IAID . . . . . . . . . . . : 444609107
DHCPv6 Client DUID. . . . . . . . : 00-01-00-01-27-E9-D1-F0-48-BA-4E-51-49-14
DNS Servers . . . . . . . . . . . : fec0:0:0:ffff::1%1
fec0:0:0:ffff::2%1
fec0:0:0:ffff::3%1
NetBIOS over Tcpip. . . . . . . . : Enabled | Issue resolved.
Ref the Latest GCI | Clients not able to connect specific SSID. | AIR-CT8540-K9 | 12.0(13)W5(19b) | 12.0(13)W5(19b) | 24.0 | 3 | 100.0 | Software -not a bug (scalability, version selection, install/upgrade help...) | AIRCTA2 | Wireless | 8540 Series Wireless LAN Controller (AIR-CT8540) | 01t1C0000065Y1wQAE | Error Messages, Logs, Debugs | 8540 Series Wireless LAN Controller (AIR-CT8540) | Wireless | 01t1C000006WMdqQAG | SHERLOCK: PARTIAL |
694111541 | Question: Which software version is principally discussed in these documents?
Answer "NONE" if you cannot find answer in the given documents.
The ONLY software version should be selected from the given software version list: NA - COMPONENT ONLY/ 2.2.3.4/ 16.12.04/ 2.1.2.7/ 2.2.2.9/ 2.2.2.8/ 1.3.1.4/ 2.3.3.4/ 2.3.3.7/ 2.2.2.8/ 1.3.3.7/ 17.03.03/ 2.1.2.7/ 1.3.3.7/ 2.2.2.9/ 2.3.3.7/ 16.12.4/ 2.2.3.5/ 2.2.3.6/ 2.2.2.9/ 4.0.4b/ 2.2.3.4/ 2.2.2.8/ 2.1.2.6/ 2.2.3.5 Response in this JSON format:
{"software_version": "","explanation": "", "summary": ""}
Closed
Technology: Cisco DNA Center - On-Prem
Subtechnology: Cisco DNA Center - Infrastructure (Services, UI, API, etc.)
Problem Code: Error Messages, Logs, Debugs
Product: NA
Product Family: DNAHW
Software Version: N/A
Router/Node Name: N/A
Problem Details: We are running DNA center version 2.2.2.9 and have configured SGACLs for micro-segmentation.
We have enabled logging for some of the ACL entries but are not able to view the relevant traffic flow on DNA center.
We are running DNA center version 2.2.2.9 and have configured SGACLs for micro-segmentation.
We have enabled logging for some of the ACL entries but are not able to view the relevant traffic flow on DNA center.
Issue was resolved after rediscovering the device with Netconf. | Question: Which product is principally discussed in these documents?
Answer "NONE" if you cannot find answer in the given documents.
The ONLY product name should be selected from the given product name list: DN1-HW-APL/ DN2-HW-APL/ DN2-HW-APL-XL/ C9300-48UN/ DN2-HW-APL-L/ DN2-HW-APL-U/ C9300-48U Response in this JSON format:
{"product_name": "","explanation": "", "summary": ""}
Technology: Cisco DNA Center - On-Prem
Subtechnology: Cisco DNA Center - Infrastructure (Services, UI, API, etc.)
Problem Code: Error Messages, Logs, Debugs
Product: NA
Product Family: DNAHW
Software Version: N/A
Router/Node Name: N/A
Problem Details: We are running DNA center version 2.2.2.9 and have configured SGACLs for micro-segmentation.
We have enabled logging for some of the ACL entries but are not able to view the relevant traffic flow on DNA center.
We are running DNA center version 2.2.2.9 and have configured SGACLs for micro-segmentation.
We have enabled logging for some of the ACL entries but are not able to view the relevant traffic flow on DNA center.
Issue was resolved after rediscovering the device with Netconf. | Technology: Cisco DNA Center - On-Prem
Subtechnology: Cisco DNA Center - Infrastructure (Services, UI, API, etc.)
Problem Code: Error Messages, Logs, Debugs
Product: NA
Product Family: DNAHW
Software Version: N/A
Router/Node Name: N/A
Problem Details: We are running DNA center version 2.2.2.9 and have configured SGACLs for micro-segmentation.
We have enabled logging for some of the ACL entries but are not able to view the relevant traffic flow on DNA center. | We are running DNA center version 2.2.2.9 and have configured SGACLs for micro-segmentation.
We have enabled logging for some of the ACL entries but are not able to view the relevant traffic flow on DNA center. | Issue was resolved after rediscovering the device with Netconf. | On DNA center, unable to view the traffic flows related to micro-segmentation | DN2-HW-APL-XL | 16.12.4 | 16.12.4 | 40.0 | 3 | 100.0 | Configuration Assistance (process not intuitive, too complex, inconsistent...) | DNAHW | Cisco DNA Center - On-Prem | Cisco DNA Center - Infrastructure (Services, UI, API, etc.) | 01t6R000006EH5aQAG | Error Messages, Logs, Debugs | Cisco DNA Center - Infrastructure (Services, UI, API, etc.) | Cisco DNA Center - On-Prem | 01t15000005W0LTAA0 | SHERLOCK: PARTIAL |
694641874 | Question: Which software version is principally discussed in these documents?
Answer "NONE" if you cannot find answer in the given documents.
The ONLY software version should be selected from the given software version list: 1/ 8.10.151.0/ 8.10.171.0/ 802.11AC/ 8.5.171.0/ 8.10.183.0/ 8.10.130.0/ 8.10.171.0/ THIRD_PARTY_PRODUCT_SW/ 8.5.135.0/ 8.3.143.0/ NA-CIN_CLOSE_SW/ 8.5.140.0/ 4.0.1a/ WLC CLIENT INTEROP/ 12.0.13/ 8.5.151.0/ 8.4/ 120.13/ 8.5.160.0/ 8.10.151.0/ 8.3.143.0/ 8.3.131.0/ 8.3.150.0/ 8.5.135.0/ 8.5.161.0/ 8.10.185.0/ 8.2.166.0/ 8.5.140.0/ 8.5.151.0/ 8.3.150.0/ 16.12.3s/ WLC RRM/RF/CLEANAIR/ 8.5.151.0/ 8.10.130.0/ NA - COMPONENT ONLY/ 8.10.162.0/ 8.3.140.0/ 8.10.150.0/ 8.10.183.0/ 8.10.161.0/ 8.10.185.0/ 8.5.151.0/ 16.12.4/ 17.3.5b/ 8.10.183.0/ 8.10.171.0/ 8.5.171.0 Response in this JSON format:
{"software_version": "","explanation": "", "summary": ""}
++ Tejas from Wireless TAC Team
Thank you for your time on the call today.
As per our session, it was seen that many AP’s were crashing over the last 1 week on the Cisco 8540 Wireless Controller running version 8.10.151.0.
We have seen the crash happening 2 models of AP’s on call ( 9120AXI Access Point , 2800I Access Point ).
The AP’s are currently managed successfully on the WLC.
The WLC and the AP’s are also reachable and Managed on DNAC.
Since this has been isolated to be a Platform issue, @Tejas Pillaiah (tpillaia)<mailto:[email protected]> from Wireless Team will be taking over this case and assisting you further.
Thank you for your patience.
Please feel free to let me know if you have any other queries.
Multiple AP's that are associated to the AP's have crashed.
Cisco 8540 Wireless Controller . Version : 8.10.151.0
Issue has been seen for 9120AXI Access Point 2800I Access Point so far.
Software Version: -- => 8.10.151.0
Technology: Wireless
Subtechnology: 8540 Series Wireless LAN Controller (AIR-CT8540)
Problem Code: Error Messages, Logs, Debugs
Product: NA
Product Family: AIRCTA2
Software Version: N/A
Router/Node Name: N/A
Problem Details: SDA Fabric AP - Frequent crash for random APs connected to WLC.13
SDA Fabric AP - Frequent crash for random APs connected to WLC.13
timestamp : 2022-12-09T08:05:04.000+0000 || updatedby : sasengar || type : RESOLUTION SUMMARY || visibility : External || details : Opened in Error | Question: Which product is principally discussed in these documents?
Answer "NONE" if you cannot find answer in the given documents.
The ONLY product name should be selected from the given product name list: AIR-CT8540-1K-K9/ AIR-CT8540-K9/ NA-CIN_CLOSE_HW/ C9120AXI-S/ THIRD_PARTY_PRODUCT_HW/ AIR-CT8540-CA-K9/ AIR-AP2802I-S-K9/ AIR-CT8540-K9Z/ AIR-BZL-C240M4/ DN2-HW-APL-XL/ WLC-AP-T/ AIR-CT8540-SW-8.2 Response in this JSON format:
{"product_name": "","explanation": "", "summary": ""}
Technology: Wireless
Subtechnology: 8540 Series Wireless LAN Controller (AIR-CT8540)
Problem Code: Error Messages, Logs, Debugs
Product: NA
Product Family: AIRCTA2
Software Version: N/A
Router/Node Name: N/A
Problem Details: SDA Fabric AP - Frequent crash for random APs connected to WLC.13
SDA Fabric AP - Frequent crash for random APs connected to WLC.13
timestamp : 2022-12-09T08:05:04.000+0000 || updatedby : sasengar || type : RESOLUTION SUMMARY || visibility : External || details : Opened in Error | Technology: Wireless
Subtechnology: 8540 Series Wireless LAN Controller (AIR-CT8540)
Problem Code: Error Messages, Logs, Debugs
Product: NA
Product Family: AIRCTA2
Software Version: N/A
Router/Node Name: N/A
Problem Details: SDA Fabric AP - Frequent crash for random APs connected to WLC.13 | SDA Fabric AP - Frequent crash for random APs connected to WLC.13 | timestamp : 2022-12-09T08:05:04.000+0000 || updatedby : sasengar || type : RESOLUTION SUMMARY || visibility : External || details : Opened in Error | nan | AIR-CT8540-K9 | AIR-CT8540-K9-8-10-151-0.aes | nan | nan | 3 | nan | Software -not a bug (scalability, version selection, install/upgrade help...) | AIRCTA2 | Wireless | 8540 Series Wireless LAN Controller (AIR-CT8540) | nan | nan | nan | nan | nan | nan |
695579249 | Question: Which software version is principally discussed in these documents?
Answer "NONE" if you cannot find answer in the given documents.
The ONLY software version should be selected from the given software version list: 2.2.3.6/ 2.2.3.6/ 2.3.3.7/ 2.2.2.9 Response in this JSON format:
{"software_version": "","explanation": "", "summary": ""}
Technology: Cisco DNA Center - On-Prem
Subtechnology: Cisco Software-Defined Access (SDA Wireless)
Problem Code: Software Failure
Product: NA
Product Family: DNAHW
Software Version: N/A
Router/Node Name: N/A
Problem Details: DNAC Provision Issues after upgraded to Version 2.3.3.7-72328
1. New Sites/Floors cannot be provisioned to wlc - "No configuration was generated"
Because of that, new APs for that new floors cannot be provisioned, error is "NCWL10802: The site(s) YNC-RC2-02 is not managed by any Wireless Controllers. Please provision a Wireless Controller and specify the site(s) as Managed AP Location(s)."
2. Unexpected/unintended/Unrelated commands came out during the first provision to WLCs after the upgrade
Refer to attached word file for detail explanation with screenshots and config preview files.
DNAC Provision Issues after upgraded to Version 2.3.3.7-72328
1. New Sites/Floors cannot be provisioned to wlc - "No configuration was generated"
Because of that, new APs for that new floors cannot be provisioned, error is "NCWL10802: The site(s) YNC-RC2-02 is not managed by any Wireless Controllers. Please provision a Wireless Controller and specify the site(s) as Managed AP Location(s)."
2. Unexpected/unintended/Unrelated commands came out during the first provision to WLCs after the upgrade
Refer to attached word file for detail explanation with screenshots and config preview files.
Issue : WLC Provisioning failed on DNAC
DNAC Version : 2.3.3.7 ( DN2-HW-APL-XL ) , 3 Node Cluster
On 4th of July Night at Singapore Time, the WLC was provisioned with additional Managed AP Locations where it was stuck for 9 Hours.
The Provision failed after 9 Hours of waiting with the below error :
A screenshot of a computer
Description automatically generated
The RCA Logs were generated after the failure for further investigation
The BU Escalation Team were involved and after analysis the Root Cause was identified as seen below :
Issue triggered due to duplication data in DB, resulting in Network Programmer running out of memory.
CSCwf89617 is addressed in 2.3.3.7. The fix is applicable only for WLC provisioning flows done after upgrading to 2.3.3.7.
The duplicated data is present in database prior to the Upgrade to 2.3.3.7
new defect CSCwd49629 is raised to handle the old stale entries in DB which might be carried forward after during upgrade to 2.3.3.7 and which are not handled by CSCwf89617.
The Workaround that was provided to resolve this issue is as follows :
Prune the DCS table to nullify the data, to clear the duplicated data.
Increase memory of network-programmer and spf-service
Subsequent sessions involved applying the workaround and provisioning the WLC’s which all resulted in success. | Question: Which product is principally discussed in these documents?
Answer "NONE" if you cannot find answer in the given documents.
The ONLY product name should be selected from the given product name list: DN2-HW-APL/ DN2-HW-APL-XL Response in this JSON format:
{"product_name": "","explanation": "", "summary": ""}
Technology: Cisco DNA Center - On-Prem
Subtechnology: Cisco Software-Defined Access (SDA Wireless)
Problem Code: Software Failure
Product: NA
Product Family: DNAHW
Software Version: N/A
Router/Node Name: N/A
Problem Details: DNAC Provision Issues after upgraded to Version 2.3.3.7-72328
1. New Sites/Floors cannot be provisioned to wlc - "No configuration was generated"
Because of that, new APs for that new floors cannot be provisioned, error is "NCWL10802: The site(s) YNC-RC2-02 is not managed by any Wireless Controllers. Please provision a Wireless Controller and specify the site(s) as Managed AP Location(s)."
2. Unexpected/unintended/Unrelated commands came out during the first provision to WLCs after the upgrade
Refer to attached word file for detail explanation with screenshots and config preview files.
DNAC Provision Issues after upgraded to Version 2.3.3.7-72328
1. New Sites/Floors cannot be provisioned to wlc - "No configuration was generated"
Because of that, new APs for that new floors cannot be provisioned, error is "NCWL10802: The site(s) YNC-RC2-02 is not managed by any Wireless Controllers. Please provision a Wireless Controller and specify the site(s) as Managed AP Location(s)."
2. Unexpected/unintended/Unrelated commands came out during the first provision to WLCs after the upgrade
Refer to attached word file for detail explanation with screenshots and config preview files.
Issue : WLC Provisioning failed on DNAC
DNAC Version : 2.3.3.7 ( DN2-HW-APL-XL ) , 3 Node Cluster
On 4th of July Night at Singapore Time, the WLC was provisioned with additional Managed AP Locations where it was stuck for 9 Hours.
The Provision failed after 9 Hours of waiting with the below error :
A screenshot of a computer
Description automatically generated
The RCA Logs were generated after the failure for further investigation
The BU Escalation Team were involved and after analysis the Root Cause was identified as seen below :
Issue triggered due to duplication data in DB, resulting in Network Programmer running out of memory.
CSCwf89617 is addressed in 2.3.3.7. The fix is applicable only for WLC provisioning flows done after upgrading to 2.3.3.7.
The duplicated data is present in database prior to the Upgrade to 2.3.3.7
new defect CSCwd49629 is raised to handle the old stale entries in DB which might be carried forward after during upgrade to 2.3.3.7 and which are not handled by CSCwf89617.
The Workaround that was provided to resolve this issue is as follows :
Prune the DCS table to nullify the data, to clear the duplicated data.
Increase memory of network-programmer and spf-service
Subsequent sessions involved applying the workaround and provisioning the WLC’s which all resulted in success. | Technology: Cisco DNA Center - On-Prem
Subtechnology: Cisco Software-Defined Access (SDA Wireless)
Problem Code: Software Failure
Product: NA
Product Family: DNAHW
Software Version: N/A
Router/Node Name: N/A
Problem Details: DNAC Provision Issues after upgraded to Version 2.3.3.7-72328
1. New Sites/Floors cannot be provisioned to wlc - "No configuration was generated"
Because of that, new APs for that new floors cannot be provisioned, error is "NCWL10802: The site(s) YNC-RC2-02 is not managed by any Wireless Controllers. Please provision a Wireless Controller and specify the site(s) as Managed AP Location(s)."
2. Unexpected/unintended/Unrelated commands came out during the first provision to WLCs after the upgrade
Refer to attached word file for detail explanation with screenshots and config preview files. | DNAC Provision Issues after upgraded to Version 2.3.3.7-72328
1. New Sites/Floors cannot be provisioned to wlc - "No configuration was generated"
Because of that, new APs for that new floors cannot be provisioned, error is "NCWL10802: The site(s) YNC-RC2-02 is not managed by any Wireless Controllers. Please provision a Wireless Controller and specify the site(s) as Managed AP Location(s)."
2. Unexpected/unintended/Unrelated commands came out during the first provision to WLCs after the upgrade
Refer to attached word file for detail explanation with screenshots and config preview files. | Issue : WLC Provisioning failed on DNAC
DNAC Version : 2.3.3.7 ( DN2-HW-APL-XL ) , 3 Node Cluster
On 4th of July Night at Singapore Time, the WLC was provisioned with additional Managed AP Locations where it was stuck for 9 Hours.
The Provision failed after 9 Hours of waiting with the below error :
A screenshot of a computer
Description automatically generated
The RCA Logs were generated after the failure for further investigation
The BU Escalation Team were involved and after analysis the Root Cause was identified as seen below :
Issue triggered due to duplication data in DB, resulting in Network Programmer running out of memory.
CSCwf89617 is addressed in 2.3.3.7. The fix is applicable only for WLC provisioning flows done after upgrading to 2.3.3.7.
The duplicated data is present in database prior to the Upgrade to 2.3.3.7
new defect CSCwd49629 is raised to handle the old stale entries in DB which might be carried forward after during upgrade to 2.3.3.7 and which are not handled by CSCwf89617.
The Workaround that was provided to resolve this issue is as follows :
Prune the DCS table to nullify the data, to clear the duplicated data.
Increase memory of network-programmer and spf-service
Subsequent sessions involved applying the workaround and provisioning the WLC’s which all resulted in success. | DNAC Provision Issues after upgraded to Version 2.3.3.7-72328
Client is unable to provision a 5540 WLC.
He stated that during the previous BEMS interaction they needed to add the new sites in the Cisco DNA Center hierarchy and then provision the WLC so it can manage those sites.
They could successfully add the new sites.
Now they wanted to provision the WLC (without doing any changes, just adding the new sites to be managed) and the provisioning is stucked here:
The client requested a WebEx when the provisioning was not moving after over 2 hours of waiting.
I took a fresh set of RCA and checked the SPF logs:
2023-07-04 12:53:23,353 | WARN | -service-manager-notify-1 | | c.c.g.a.i.GrapevineMessageListener | Error org.springframework.amqp.AmqpIllegalStateException was thrown for message handler of APSoftDeleteNotificationMessage {context={public={AuditParentCorrelationContext=null, AuditSourceIp=null, RBACSecurityContext=eyJhbGciOiJSUzI1NiIsInR5cCI6IkpXVCJ9.eyJzdWIiOiJ0ZW5hbnQtY29tbW9uLXV0aWwiLCJhdXRoU291cmNlIjoiaW50ZXJuYWwiLCJ0ZW5hbnROYW1lIjoiVE5UMCIsInJvbGVzIjpbIjVkYjdiN2MwMTJmM2JkMDBjYzExNWY3YyJdLCJ0ZW5hbnRJZCI6IjVkYjdiN2JlMTJmM2JkMDBjYzExNWY3NyIsImV4cCI6MTY4ODQ3ODgwMywiaWF0IjoxNjg4NDc1MjAzLCJqdGkiOiJkNDgyYjYwNi1mYzhhLTQzMmItYWIxYy1jNmJhYjdjNTE1MjMiLCJ1c2VybmFtZSI6InRlbmFudC1jb21tb24tdXRpbCJ9.NWMFAsmWwPXuOngo1-uDNcgn5Dx-AuVMKNKNxPMzDjYHrNOikoGnj_y7-1VrV6PQNZEai-P6adE1P2IsPGv2jvlzEEXBXIkOGpy2bkkZ8YKkN54OlmvosG00R9EQlNg-1TxzT4GSUfr8Ii-c_5QNS3xHfMprwoHfzLtyjPfGK-CMTEyK5ixsx4q45PNKQ4NGZDoHVewJkinv-Zy5vZISAdPVaf2ylJ-R8eBvij8eVZWvqSJOAjH9QB-wf-TaI1KmA8MDcDgm_E8QeBUry2s-L9EfH1o9-Y1c0In1iVx9rDHMYC8PLSKSyFomCjg17T_Zyc9rwPCN-Di2ozZGc4XaPQ, accept-language=en_US, AuditCorrelationContext=14e0f0a1-ab0b-43eb-9d53-3cbd25a95ad9}}, replyToChain=null, version=0, payload=Request [WLC Device IP=172.18.240.16]Request [WLC Device ID=a19ede95-f7b2-45d1-9f56-b13d762a4593]Request [AP Device IP=10.253.135.167]Request [AP Device ID=756c7953-6a8c-4bd8-89f3-a8140a1ff7b0]Request [AP Mac Address=84:f1:47:6b:2b:c0]}. |
org.springframework.amqp.AmqpIllegalStateException: Unable to find suitable REQUEST handler for requestKey=com.cisco.enc.inventory.api.notifications.APSoftDeleteNotificationMessage
at com.cisco.grapevine.amqp.impl.GrapevineMessageListener.getRequestHandler(GrapevineMessageListener.java:457) ~[message-queue-sdk-7.0.518.62181.jar:7.0.518.62181]
at com.cisco.grapevine.amqp.impl.GrapevineMessageListener.invokeHandler_aroundBody0(GrapevineMessageListener.java:432) ~[message-queue-sdk-7.0.518.62181.jar:7.0.518.62181]
at com.cisco.grapevine.amqp.impl.GrapevineMessageListener$AjcClosure1.run(GrapevineMessageListener.java:1) ~[na:7.0.518.62181]
at org.aspectj.runtime.reflect.JoinPointImpl.proceed(JoinPointImpl.java:149) ~[aspectjtools-1.8.13.jar:na]
at com.cisco.enc.i18n.localization.aop.EnableI18nOnRequestHandler.getEmptyResponse(EnableI18nOnRequestHandler.java:26) ~[i18n-7.1.518.62181.jar:7.1.518.62181]
at com.cisco.grapevine.amqp.impl.GrapevineMessageListener.invokeHandler(GrapevineMessageListener.java:398) ~[message-queue-sdk-7.0.518.62181.jar:7.0.518.62181]
at com.cisco.grapevine.amqp.impl.GrapevineMessageListener.onMessage(GrapevineMessageListener.java:236) ~[message-queue-sdk-7.0.518.62181.jar:7.0.518.62181]
at org.springframework.amqp.rabbit.listener.AbstractMessageListenerContainer.doInvokeListener(AbstractMessageListenerContainer.java:546) ~[spring-rabbit-1.2.0.RELEASE.jar:na]
at org.springframework.amqp.rabbit.listener.AbstractMessageListenerContainer.invokeListener(AbstractMessageListenerContainer.java:472) ~[spring-rabbit-1.2.0.RELEASE.jar:na]
at org.springframework.amqp.rabbit.listener.SimpleMessageListenerContainer.access$001(SimpleMessageListenerContainer.java:61) ~[spring-rabbit-1.2.0.RELEASE.jar:na]
at org.springframework.amqp.rabbit.listener.SimpleMessageListenerContainer$1.invokeListener(SimpleMessageListenerContainer.java:110) ~[spring-rabbit-1.2.0.RELEASE.jar:na]
at org.springframework.amqp.rabbit.listener.SimpleMessageListenerContainer.invokeListener(SimpleMessageListenerContainer.java:611) ~[spring-rabbit-1.2.0.RELEASE.jar:na]
at org.springframework.amqp.rabbit.listener.AbstractMessageListenerContainer.executeListener(AbstractMessageListenerContainer.java:454) ~[spring-rabbit-1.2.0.RELEASE.jar:na]
at org.springframework.amqp.rabbit.listener.SimpleMessageListenerContainer.doReceiveAndExecute(SimpleMessageListenerContainer.java:474) ~[spring-rabbit-1.2.0.RELEASE.jar:na]
at org.springframework.amqp.rabbit.listener.SimpleMessageListenerContainer.receiveAndExecute(SimpleMessageListenerContainer.java:458) ~[spring-rabbit-1.2.0.RELEASE.jar:na]
at org.springframework.amqp.rabbit.listener.SimpleMessageListenerContainer.access$300(SimpleMessageListenerContainer.java:61) ~[spring-rabbit-1.2.0.RELEASE.jar:na]
at org.springframework.amqp.rabbit.listener.SimpleMessageListenerContainer$AsyncMessageProcessingConsumer.run(SimpleMessageListenerContainer.java:551) ~[spring-rabbit-1.2.0.RELEASE.jar:na]
at java.base/java.lang.Thread.run(Thread.java:834) ~[na:na]
It is worth noting that the WLC was not sending assurance data to Cisco DNA Center and the WSA service was disabled.
We forced pushed telemetry. After that WSA and assurance became Active to this WLC.
Not sure if this can cause a block in the provisioning task. | DN2-HW-APL-XL | 2.3.3.7 | 2.3.3.7 | 47.0 | 3 | 100.0 | Configuration Assistance (process not intuitive, too complex, inconsistent...) | DNAHW | Cisco DNA Center - On-Prem | Cisco DNA Center - Provisioning | 01t6R000007PJzCQAW | Error Messages, Logs, Debugs | Cisco DNA Center - Provisioning | Cisco DNA Center - On-Prem | 01t1C0000061ceEQAQ | SHERLOCK: PARTIAL |
695605404 | Question: Which software version is principally discussed in these documents?
Answer "NONE" if you cannot find answer in the given documents.
The ONLY software version should be selected from the given software version list: 1/ 8.10.151.0/ 8.10.171.0/ 802.11AC/ 8.5.171.0/ 8.10.183.0/ 8.10.130.0/ 8.10.171.0/ THIRD_PARTY_PRODUCT_SW/ 8.5.135.0/ 8.3.143.0/ NA-CIN_CLOSE_SW/ 8.5.140.0/ 4.0.1a/ WLC CLIENT INTEROP/ 12.0.13/ 8.5.151.0/ 8.4/ 120.13/ 8.5.160.0/ 8.10.151.0/ 8.3.143.0/ 8.3.131.0/ 8.3.150.0/ 8.5.135.0/ 8.5.161.0/ 8.10.185.0/ 8.2.166.0/ 8.5.140.0/ 8.5.151.0/ 8.3.150.0/ 16.12.3s/ WLC RRM/RF/CLEANAIR/ 8.5.151.0/ 8.10.130.0/ NA - COMPONENT ONLY/ 8.10.162.0/ 8.3.140.0/ 8.10.150.0/ 8.10.183.0/ 8.10.161.0/ 8.10.185.0/ 8.5.151.0/ 16.12.4/ 17.3.5b/ 8.10.183.0/ 8.10.171.0/ 8.5.171.0 Response in this JSON format:
{"software_version": "","explanation": "", "summary": ""}
Technology: Wireless
Subtechnology: 8540 Series Wireless LAN Controller (AIR-CT8540)
Problem Code: Error Messages, Logs, Debugs
Product: NA
Product Family: AIRCTA2
Software Version: 8.10.183.0
Router/Node Name: N/A
Problem Details: Wireless Access Point disassociation/Flap
Wireless Access Point disassociation/Flap
The issue with respect to Ap flapping.
The Ap was going down due to Max retransmission. The issue was isolated to be on the switch end.
Once the switch was upgrade to 17.x firmware the issue is resolved.
RCA was provided to customer. Based on approval from them closing the case | Question: Which product is principally discussed in these documents?
Answer "NONE" if you cannot find answer in the given documents.
The ONLY product name should be selected from the given product name list: AIR-CT8540-1K-K9/ AIR-CT8540-K9/ NA-CIN_CLOSE_HW/ C9120AXI-S/ THIRD_PARTY_PRODUCT_HW/ AIR-CT8540-CA-K9/ AIR-AP2802I-S-K9/ AIR-CT8540-K9Z/ AIR-BZL-C240M4/ DN2-HW-APL-XL/ WLC-AP-T/ AIR-CT8540-SW-8.2 Response in this JSON format:
{"product_name": "","explanation": "", "summary": ""}
Technology: Wireless
Subtechnology: 8540 Series Wireless LAN Controller (AIR-CT8540)
Problem Code: Error Messages, Logs, Debugs
Product: NA
Product Family: AIRCTA2
Software Version: 8.10.183.0
Router/Node Name: N/A
Problem Details: Wireless Access Point disassociation/Flap
Wireless Access Point disassociation/Flap
The issue with respect to Ap flapping.
The Ap was going down due to Max retransmission. The issue was isolated to be on the switch end.
Once the switch was upgrade to 17.x firmware the issue is resolved.
RCA was provided to customer. Based on approval from them closing the case | Technology: Wireless
Subtechnology: 8540 Series Wireless LAN Controller (AIR-CT8540)
Problem Code: Error Messages, Logs, Debugs
Product: NA
Product Family: AIRCTA2
Software Version: 8.10.183.0
Router/Node Name: N/A
Problem Details: Wireless Access Point disassociation/Flap | Wireless Access Point disassociation/Flap | The issue with respect to Ap flapping.
The Ap was going down due to Max retransmission. The issue was isolated to be on the switch end.
Once the switch was upgrade to 17.x firmware the issue is resolved.
RCA was provided to customer. Based on approval from them closing the case | Product: NA
Product Family: AIRCTA2
Software Version: 8.10.183.0
Router/Node Name: N/A
Problem Details: Wireless Access Point disassociation/Flap | AIR-CT8540-K9 | 16.12.3s | 16.12.3s | 52.0 | 3 | 100.0 | Configuration Assistance (process not intuitive, too complex, inconsistent...) | AIRCTA2 | Wireless | 8540 Series Wireless LAN Controller (AIR-CT8540) | 01t1C000004GjbyQAC | Error Messages, Logs, Debugs | 8540 Series Wireless LAN Controller (AIR-CT8540) | Wireless | 01t1C000006WMdqQAG | nan |
695138158 | Question: Which software version is principally discussed in these documents?
Answer "NONE" if you cannot find answer in the given documents.
The ONLY software version should be selected from the given software version list: NA - COMPONENT ONLY/ 16.12.3s/ 2.3.3.3/ 17.6.4/ 16.12.4/ 2.2.2.5/ 1.3.3.6/ 16.12.03s/ 16.12.01s/ 16.12.04/ 16.12.1s/ 2.2.3.3/ THIRD_PARTY_PRODUCT_SW/ 16.12.1s/ 1.3.3.7/ 1.3.3.9/ 2.3.3.7/ 2.1.2.7/ 2.2.3.6/ 17.06.02 Response in this JSON format:
{"software_version": "","explanation": "", "summary": ""}
1. The issue was resolved after upgrading the devices to a cisco-suggested release.
2. The previous IOS being run on the devices was EoL and hence likely causing an unknown bug and hence the issue.
https://www.cisco.com/c/en/us/products/collateral/ios-nx-os-software/ios-xe-16/eos-eol-notice-c51-744154.html
++ okay with case closure after monitoring
++ thank you
Technology: Cisco DNA Center - On-Prem
Subtechnology: Cisco Software-Defined Access (SDA Wired)
Problem Code: Error Messages, Logs, Debugs
Product: NA
Product Family: C9300
Software Version: N/A
Router/Node Name: N/A
Problem Details: SDA FE - TCAM Exhaustion 96.0%, layer2 TCAM Usage is more than the limit
Map cache entries have exceeded limit. The maximum number of MAC addresses has been reached:32768.
SDA FE - TCAM Exhaustion 96.0%, layer2 TCAM Usage is more than the limit
Map cache entries have exceeded limit. The maximum number of MAC addresses has been reached:32768.
1. The issue was resolved after upgrading the devices to a cisco-suggested release.
2. The previous IOS being run on the devices was EoL and hence likely causing an unknown bug and hence the issue.
https://www.cisco.com/c/en/us/products/collateral/ios-nx-os-software/ios-xe-16/eos-eol-notice-c51-744154.html
++ okay with case closure after monitoring
++ thank you | Question: Which product is principally discussed in these documents?
Answer "NONE" if you cannot find answer in the given documents.
The ONLY product name should be selected from the given product name list: DN2-HW-APL-XL/ ASR1009-X/ C9300-48U/ DN1-HW-APL/ C9500-48Y4C/ THIRD_PARTY_PRODUCT_HW/ C9300-48U-A/ ASR1002-HX Response in this JSON format:
{"product_name": "","explanation": "", "summary": ""}
Technology: Cisco DNA Center - On-Prem
Subtechnology: Cisco Software-Defined Access (SDA Wired)
Problem Code: Error Messages, Logs, Debugs
Product: NA
Product Family: C9300
Software Version: N/A
Router/Node Name: N/A
Problem Details: SDA FE - TCAM Exhaustion 96.0%, layer2 TCAM Usage is more than the limit
Map cache entries have exceeded limit. The maximum number of MAC addresses has been reached:32768.
SDA FE - TCAM Exhaustion 96.0%, layer2 TCAM Usage is more than the limit
Map cache entries have exceeded limit. The maximum number of MAC addresses has been reached:32768.
1. The issue was resolved after upgrading the devices to a cisco-suggested release.
2. The previous IOS being run on the devices was EoL and hence likely causing an unknown bug and hence the issue.
https://www.cisco.com/c/en/us/products/collateral/ios-nx-os-software/ios-xe-16/eos-eol-notice-c51-744154.html
++ okay with case closure after monitoring
++ thank you | Technology: Cisco DNA Center - On-Prem
Subtechnology: Cisco Software-Defined Access (SDA Wired)
Problem Code: Error Messages, Logs, Debugs
Product: NA
Product Family: C9300
Software Version: N/A
Router/Node Name: N/A
Problem Details: SDA FE - TCAM Exhaustion 96.0%, layer2 TCAM Usage is more than the limit
Map cache entries have exceeded limit. The maximum number of MAC addresses has been reached:32768. | SDA FE - TCAM Exhaustion 96.0%, layer2 TCAM Usage is more than the limit
Map cache entries have exceeded limit. The maximum number of MAC addresses has been reached:32768. | 1. The issue was resolved after upgrading the devices to a cisco-suggested release.
2. The previous IOS being run on the devices was EoL and hence likely causing an unknown bug and hence the issue.
https://www.cisco.com/c/en/us/products/collateral/ios-nx-os-software/ios-xe-16/eos-eol-notice-c51-744154.html
++ okay with case closure after monitoring
++ thank you | SDA FE - TCAM Exhaustion 96.0%, layer2 TCAM Usage is more than the limit
Map cache entries have exceeded limit. The maximum number of MAC addresses has been reached:32768. | C9300-48U-A | 16.12.4 | 16.12.4 | 73.0 | 3 | 100.0 | Configuration Assistance (process not intuitive, too complex, inconsistent...) | C9300 | Cisco DNA Center - On-Prem | Cisco Software-Defined Access (SDA Wired) | 01t1C000006fIcDQAU | Error Messages, Logs, Debugs | Cisco Software-Defined Access (SDA Wired) | Cisco DNA Center - On-Prem | 01t15000005W0LTAA0 | SHERLOCK: PARTIAL |
695618886 | Question: Which software version is principally discussed in these documents?
Answer "NONE" if you cannot find answer in the given documents.
The ONLY software version should be selected from the given software version list: 2.2.2.9/ 2.2.2.9/ 2.1.2.7/ 16.12.01s/ 2.1.2.7/ 4.0.4b/ PRODUCT_NOT_FOUND/ 17.3.3/ 1.3.3.9/ 17.3.4a/ 1.3.3.7/ 2.2.3.6/ 2.2.2.3/ 2.1.2.0/ 2.1.2.7 Response in this JSON format:
{"software_version": "","explanation": "", "summary": ""}
Technology: Cisco DNA Center - On-Prem
Subtechnology: Cisco Software-Defined Access (SDA Wireless)
Problem Code: Configuration Assistance
Product: NA
Product Family: DNAHW
Software Version: N/A
Router/Node Name: N/A
Problem Details: Cannot see any DSCP marking after applying QoS policy to wireless SSID.
Cannot see any DSCP marking after applying QoS policy to wireless SSID.
++ each wireless profile can push the maximum of 32 applications only. As of now all the wired applications are working fine without any issue and markings are happening.
we checked the supportive document and its the expected behaviour for wireless having the cap of 32 applications. this will not be able to modify/edit as we have seen and from below document.
https://www.cisco.com/c/en/us/td/docs/wireless/controller/8-5/Enterprise-Mobility-8-5-Design-Guide/Enterprise_Mobility_8-5_Deployment_Guide/ch5_QoS.html
++ we have filed a enhancement request to modify these applications and below bug can track this.
https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwf67618 | Question: Which product is principally discussed in these documents?
Answer "NONE" if you cannot find answer in the given documents.
The ONLY product name should be selected from the given product name list: AIR-AP2802I-S-K9/ DN2-HW-APL-XL/ DN2-HW-APL/ DN2-HW-APL-L/ AIR-CT8540-K9/ UCSC-C480-M5/ ASR1002-HX Response in this JSON format:
{"product_name": "","explanation": "", "summary": ""}
Technology: Cisco DNA Center - On-Prem
Subtechnology: Cisco Software-Defined Access (SDA Wireless)
Problem Code: Configuration Assistance
Product: NA
Product Family: DNAHW
Software Version: N/A
Router/Node Name: N/A
Problem Details: Cannot see any DSCP marking after applying QoS policy to wireless SSID.
Cannot see any DSCP marking after applying QoS policy to wireless SSID.
++ each wireless profile can push the maximum of 32 applications only. As of now all the wired applications are working fine without any issue and markings are happening.
we checked the supportive document and its the expected behaviour for wireless having the cap of 32 applications. this will not be able to modify/edit as we have seen and from below document.
https://www.cisco.com/c/en/us/td/docs/wireless/controller/8-5/Enterprise-Mobility-8-5-Design-Guide/Enterprise_Mobility_8-5_Deployment_Guide/ch5_QoS.html
++ we have filed a enhancement request to modify these applications and below bug can track this.
https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwf67618 | Technology: Cisco DNA Center - On-Prem
Subtechnology: Cisco Software-Defined Access (SDA Wireless)
Problem Code: Configuration Assistance
Product: NA
Product Family: DNAHW
Software Version: N/A
Router/Node Name: N/A
Problem Details: Cannot see any DSCP marking after applying QoS policy to wireless SSID. | Cannot see any DSCP marking after applying QoS policy to wireless SSID. | ++ each wireless profile can push the maximum of 32 applications only. As of now all the wired applications are working fine without any issue and markings are happening.
we checked the supportive document and its the expected behaviour for wireless having the cap of 32 applications. this will not be able to modify/edit as we have seen and from below document.
https://www.cisco.com/c/en/us/td/docs/wireless/controller/8-5/Enterprise-Mobility-8-5-Design-Guide/Enterprise_Mobility_8-5_Deployment_Guide/ch5_QoS.html
++ we have filed a enhancement request to modify these applications and below bug can track this.
https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwf67618 | Not able to see any DSCP marking after applying QoS policy to wireless SSID. | DN2-HW-APL-XL | 17.3.4a | 17.3.4a | 71.0 | 3 | 100.0 | Software Bug | DNAHW | Cisco DNA Center - On-Prem | Cisco Software-Defined Access (SDA Wireless) | 01t6R000005tUMBQA2 | Configuration Assistance | Cisco Software-Defined Access (SDA Wireless) | Cisco DNA Center - On-Prem | 01tA0000002qQtWIAU | nan |
695443169 | Question: Which software version is principally discussed in these documents?
Answer "NONE" if you cannot find answer in the given documents.
The ONLY software version should be selected from the given software version list: NA - COMPONENT ONLY/ 16.12.3s/ 2.3.3.3/ 17.6.4/ 16.12.4/ 2.2.2.5/ 1.3.3.6/ 16.12.03s/ 16.12.01s/ 16.12.04/ 16.12.1s/ 2.2.3.3/ THIRD_PARTY_PRODUCT_SW/ 16.12.1s/ 1.3.3.7/ 1.3.3.9/ 2.3.3.7/ 2.1.2.7/ 2.2.3.6/ 17.06.02 Response in this JSON format:
{"software_version": "","explanation": "", "summary": ""}
looks like the traffic is not forwarded to the 6800 on the po20
from the packet capture we see that ARP flooding is happening on the outgoing interface of po20 but not seen on the 6800
- looks like platform issue for now as inter SDA communication is happening but l2 is broken between traditional and SDA.
-Software of Switch is in older code 16.12.1s
-Pending upgrade of L2Border device.
-All working after upgrade to o 17.6.4
-ok to close
Technology: LAN Switching
Subtechnology: CAT 9500 Unexpected Reboot
Problem Code: Software Failure
Product: NA
Product Family: C9300
Software Version: N/A
Router/Node Name: N/A
Problem Details: SDA L2 border switch (model 9500) stack running version 16.12.1s is using L2 flooding for a vlan/subnet. For this particular subnet, the L2 border seems not forwarding the arp requests and hence client in the same vlan are not able to communicate.
SDA L2 border switch (model 9500) stack running version 16.12.1s is using L2 flooding for a vlan/subnet. For this particular subnet, the L2 border seems not forwarding the arp requests and hence client in the same vlan are not able to communicate.
looks like the traffic is not forwarded to the 6800 on the po20
from the packet capture we see that ARP flooding is happening on the outgoing interface of po20 but not seen on the 6800
- looks like platform issue for now as inter SDA communication is happening but l2 is broken between traditional and SDA.
-Software of Switch is in older code 16.12.1s
-Pending upgrade of L2Border device.
-All working after upgrade to o 17.6.4
-ok to close | Question: Which product is principally discussed in these documents?
Answer "NONE" if you cannot find answer in the given documents.
The ONLY product name should be selected from the given product name list: DN2-HW-APL-XL/ ASR1009-X/ C9300-48U/ DN1-HW-APL/ C9500-48Y4C/ THIRD_PARTY_PRODUCT_HW/ C9300-48U-A/ ASR1002-HX Response in this JSON format:
{"product_name": "","explanation": "", "summary": ""}
looks like the traffic is not forwarded to the 6800 on the po20
from the packet capture we see that ARP flooding is happening on the outgoing interface of po20 but not seen on the 6800
- looks like platform issue for now as inter SDA communication is happening but l2 is broken between traditional and SDA.
-Software of Switch is in older code 16.12.1s
-Pending upgrade of L2Border device.
-All working after upgrade to o 17.6.4
-ok to close
Technology: LAN Switching
Subtechnology: CAT 9500 Unexpected Reboot
Problem Code: Software Failure
Product: NA
Product Family: C9300
Software Version: N/A
Router/Node Name: N/A
Problem Details: SDA L2 border switch (model 9500) stack running version 16.12.1s is using L2 flooding for a vlan/subnet. For this particular subnet, the L2 border seems not forwarding the arp requests and hence client in the same vlan are not able to communicate.
SDA L2 border switch (model 9500) stack running version 16.12.1s is using L2 flooding for a vlan/subnet. For this particular subnet, the L2 border seems not forwarding the arp requests and hence client in the same vlan are not able to communicate.
looks like the traffic is not forwarded to the 6800 on the po20
from the packet capture we see that ARP flooding is happening on the outgoing interface of po20 but not seen on the 6800
- looks like platform issue for now as inter SDA communication is happening but l2 is broken between traditional and SDA.
-Software of Switch is in older code 16.12.1s
-Pending upgrade of L2Border device.
-All working after upgrade to o 17.6.4
-ok to close | Technology: LAN Switching
Subtechnology: CAT 9500 Unexpected Reboot
Problem Code: Software Failure
Product: NA
Product Family: C9300
Software Version: N/A
Router/Node Name: N/A
Problem Details: SDA L2 border switch (model 9500) stack running version 16.12.1s is using L2 flooding for a vlan/subnet. For this particular subnet, the L2 border seems not forwarding the arp requests and hence client in the same vlan are not able to communicate. | SDA L2 border switch (model 9500) stack running version 16.12.1s is using L2 flooding for a vlan/subnet. For this particular subnet, the L2 border seems not forwarding the arp requests and hence client in the same vlan are not able to communicate. | looks like the traffic is not forwarded to the 6800 on the po20
from the packet capture we see that ARP flooding is happening on the outgoing interface of po20 but not seen on the 6800
- looks like platform issue for now as inter SDA communication is happening but l2 is broken between traditional and SDA.
-Software of Switch is in older code 16.12.1s
-Pending upgrade of L2Border device.
-All working after upgrade to o 17.6.4
-ok to close | SDA L2 border switch seems not forwarding the ARP requests between SDA network - L2 flooding vlan/subnet and traditional network.
HW/SW details:
DNAC 3-node Cluster running 2.2.2.9.
C9500-48Y4C switch stack running IOS-XE 16.12.1s (CUST-SPECIAL:V1612_1S_CSCVR77599_2)
Further details:
It is a production environment which was working without problems for more than 2 years
Is seems that issue was triggered after SDA L2 border switch experienced a power outage around 9 weeks ago
Issue currently affecting one VLAN/VN.
The VN name is res_access_VN and the VLAN name is vl_sciyih_bms (which is vlan 7 in the L2 handoff) and in SDA fabric it is vlan 1102
It was used a couple of devices in the same subnet for testing purposes:
---> Device A on SDA network -------- 172.25.57.100 (Source IP)
---> Device B on traditional -------- 172.25.56.11 (Destination IP)
Device A is behind FE switch (ip: 172.18.1.61) and device B is on traditional network behind L2 switch (ip:172.18.112.141).
Business Impact: * Is the network or users affected at this point?
Yes. The meter systems (using exiBACNet) are not able to communicate and receive data. | C9300-48U-A | Gibraltar-16.12.1s | Gibraltar-16.12.1s | 60.0 | 3 | 100.0 | Software -not a bug (scalability, version selection, install/upgrade help...) | C9300 | Cisco DNA Center - On-Prem | Cisco Software-Defined Access (SDA Wired) | 01t1C000004ah02QAA | Error Messages, Logs, Debugs | Cisco Software-Defined Access (SDA Wired) | Cisco DNA Center - On-Prem | 01t15000005W0LRAA0 | SHERLOCK: PARTIAL |
695810508 | Question: Which software version is principally discussed in these documents?
Answer "NONE" if you cannot find answer in the given documents.
The ONLY software version should be selected from the given software version list: 122.33/ 15.5.1 Response in this JSON format:
{"software_version": "","explanation": "", "summary": ""}
Technology: LAN Switching
Subtechnology: Cat6500/6800 (Supervisor 2T) VSS
Problem Code: Error Messages, Logs, Debugs
Product: NA
Product Family: C6800MD
Software Version: N/A
Router/Node Name: N/A
Problem Details: Hi, user requires a root cause analysis for why the distribution switch rebooted unexpectedly on its own.
Thank you
Hi, user requires a root cause analysis for why the distribution switch rebooted unexpectedly on its own.
Thank you
++No crashfile generated.
++Concluded as soft parity error. | Question: Which product is principally discussed in these documents?
Answer "NONE" if you cannot find answer in the given documents.
The ONLY product name should be selected from the given product name list: VS-C6509E-S720-10G/ C6807-XL Response in this JSON format:
{"product_name": "","explanation": "", "summary": ""}
Technology: LAN Switching
Subtechnology: Cat6500/6800 (Supervisor 2T) VSS
Problem Code: Error Messages, Logs, Debugs
Product: NA
Product Family: C6800MD
Software Version: N/A
Router/Node Name: N/A
Problem Details: Hi, user requires a root cause analysis for why the distribution switch rebooted unexpectedly on its own.
Thank you
Hi, user requires a root cause analysis for why the distribution switch rebooted unexpectedly on its own.
Thank you
++No crashfile generated.
++Concluded as soft parity error. | Technology: LAN Switching
Subtechnology: Cat6500/6800 (Supervisor 2T) VSS
Problem Code: Error Messages, Logs, Debugs
Product: NA
Product Family: C6800MD
Software Version: N/A
Router/Node Name: N/A
Problem Details: Hi, user requires a root cause analysis for why the distribution switch rebooted unexpectedly on its own.
Thank you | Hi, user requires a root cause analysis for why the distribution switch rebooted unexpectedly on its own.
Thank you | ++No crashfile generated.
++Concluded as soft parity error. | ++ Distribution Switch Reboot Automatically. | C6807-XL | 15.5(1)SY3 | 15.5(1)SY3 | 70.0 | 3 | 100.0 | Software -not a bug (scalability, version selection, install/upgrade help...) | C6800MD | LAN Switching | Cat6500/6800 Unexpected Reboot | 01t1C000005yOfqQAE | Software Failure | Cat6500/6800 Unexpected Reboot | LAN Switching | 01t15000004dPUOAA2 | SHERLOCK: FULL;CaseClosureFieldAutomation: Partial |
694180161 | Question: Which software version is principally discussed in these documents?
Answer "NONE" if you cannot find answer in the given documents.
The ONLY software version should be selected from the given software version list: 16.12.04/ NA - COMPONENT ONLY/ THIRD_PARTY_PRODUCT_SW/ NA - RMA/ 16.12.04/ 3.2.3o/ 15.0.2/ 16.06.07/ 16.12.03s/ 1/ 16.06.08/ 16.12.1s/ 17.03.05/ 16.12.4/ 16.9.5/ 16.12.01s/ PRODUCT_NOT_FOUND/ 16.3.5/ 16.12.3s/ 16.09.02/ 16.12.3a/ 16.12.1s/ 17.6.4 Response in this JSON format:
{"software_version": "","explanation": "", "summary": ""}
Closed
Technology: LAN Switching
Subtechnology: Cat9300
Problem Code: Error Messages, Logs, Debugs
Product: NA
Product Family: C9300
Software Version: N/A
Router/Node Name: N/A
Problem Details: Cisco C9300-48U Switch output drops on AP interface, suspected cause of users disconnections.
over 100 APs are affected.
Cisco C9300-48U Switch output drops on AP interface, suspected cause of users disconnections.
over 100 APs are affected.
Port Align-Err FCS-Err Xmit-Err Rcv-Err UnderSize OutDiscards
Gi1/0/1 0 0 0 0 0 52624298
Gi1/0/2 0 0 0 0 0 52168180
Gi1/0/3 0 0 0 0 0 53547902
Gi1/0/4 0 0 0 0 0 53849947
Gi1/0/5 0 0 0 0 0 53014579
Gi1/0/6 0 0 0 0 0 49926547
Gi1/0/7 0 0 0 0 0 53680013
** As per the above outputs, I could see that drops value are ideally the same.
** These output drops will not be related to the random disconnect as we are not seeing AP getting disconnected from the WLC.
** So the output drops will not be a direct issue of wireless users' disconnection. | Question: Which product is principally discussed in these documents?
Answer "NONE" if you cannot find answer in the given documents.
The ONLY product name should be selected from the given product name list: C9300-48U-A/ C9300-48U/ THIRD_PARTY_PRODUCT_HW/ UCS-FI-6454/ C9300-NM-8X/ PWR-C1-1100WAC Response in this JSON format:
{"product_name": "","explanation": "", "summary": ""}
Technology: LAN Switching
Subtechnology: Cat9300
Problem Code: Error Messages, Logs, Debugs
Product: NA
Product Family: C9300
Software Version: N/A
Router/Node Name: N/A
Problem Details: Cisco C9300-48U Switch output drops on AP interface, suspected cause of users disconnections.
over 100 APs are affected.
Cisco C9300-48U Switch output drops on AP interface, suspected cause of users disconnections.
over 100 APs are affected.
Port Align-Err FCS-Err Xmit-Err Rcv-Err UnderSize OutDiscards
Gi1/0/1 0 0 0 0 0 52624298
Gi1/0/2 0 0 0 0 0 52168180
Gi1/0/3 0 0 0 0 0 53547902
Gi1/0/4 0 0 0 0 0 53849947
Gi1/0/5 0 0 0 0 0 53014579
Gi1/0/6 0 0 0 0 0 49926547
Gi1/0/7 0 0 0 0 0 53680013
** As per the above outputs, I could see that drops value are ideally the same.
** These output drops will not be related to the random disconnect as we are not seeing AP getting disconnected from the WLC.
** So the output drops will not be a direct issue of wireless users' disconnection. | Technology: LAN Switching
Subtechnology: Cat9300
Problem Code: Error Messages, Logs, Debugs
Product: NA
Product Family: C9300
Software Version: N/A
Router/Node Name: N/A
Problem Details: Cisco C9300-48U Switch output drops on AP interface, suspected cause of users disconnections.
over 100 APs are affected. | Cisco C9300-48U Switch output drops on AP interface, suspected cause of users disconnections.
over 100 APs are affected. | Port Align-Err FCS-Err Xmit-Err Rcv-Err UnderSize OutDiscards
Gi1/0/1 0 0 0 0 0 52624298
Gi1/0/2 0 0 0 0 0 52168180
Gi1/0/3 0 0 0 0 0 53547902
Gi1/0/4 0 0 0 0 0 53849947
Gi1/0/5 0 0 0 0 0 53014579
Gi1/0/6 0 0 0 0 0 49926547
Gi1/0/7 0 0 0 0 0 53680013
** As per the above outputs, I could see that drops value are ideally the same.
** These output drops will not be related to the random disconnect as we are not seeing AP getting disconnected from the WLC.
** So the output drops will not be a direct issue of wireless users' disconnection. | Output drops on AP connected interfaces | C9300-48U-A | 16.12.4 | 16.12.4 | 49.0 | 3 | 100.0 | Debug/Diagnostic Capability (missing, incomplete, cryptic...) | C9300 | LAN Switching | Cat9300 | 01t1C000006fIcDQAU | Error Messages, Logs, Debugs | Cat9300 | LAN Switching | 01t15000005W0LTAA0 | IRE: PARTIAL;SHERLOCK: PARTIAL |
694914231 | Question: Which software version is principally discussed in these documents?
Answer "NONE" if you cannot find answer in the given documents.
The ONLY software version should be selected from the given software version list: 16.12.04/ NA - COMPONENT ONLY/ THIRD_PARTY_PRODUCT_SW/ NA - RMA/ 16.12.04/ 3.2.3o/ 15.0.2/ 16.06.07/ 16.12.03s/ 1/ 16.06.08/ 16.12.1s/ 17.03.05/ 16.12.4/ 16.9.5/ 16.12.01s/ PRODUCT_NOT_FOUND/ 16.3.5/ 16.12.3s/ 16.09.02/ 16.12.3a/ 16.12.1s/ 17.6.4 Response in this JSON format:
{"software_version": "","explanation": "", "summary": ""}
Technology: LAN Switching
Subtechnology: Cat9300
Problem Code: Hardware Failure
Product: NA
Product Family: C9300
Software Version: N/A
Router/Node Name: N/A
Problem Details: Hi TAC Team,
Please kindly help to raise an RMA for below details.
[Please reply-to-all, so that all the concerned parties in the cc: list also be kept in loop]
CCO ID# SCSLIMITED
P/N# C9300-NM-8X
Faulty S/N# FOC24424RV0
Fault# Unable to detect. no output.
Qty# 01EA
Ship To Address:
NCS PTE LTD
5 ANG MO KIO STREET 62
NCS HUB
SINGAPORE 569141
Ship To Contact# Samuel Tan/Case# 23458623
Phone# +65 87504718
Email# [email protected]
Hardware Failure
Please go ahead and close this case.
Hi Jimmy Tey,
All of the parts in RMA(s) 802711026 have been successfully delivered.
If you believe you are missing a part, or if a replacement part has arrived damaged or non-operational, please contact us within the next 24 hours.
If we do not receive a response from you in the next 24 hours, we will assume all is well and will proceed to close out this RMA.
RETURNING PARTS:
**** IT IS VERY IMPORTANT THAT YOU RETURN ONLY THE PART(s) ORDERED.****
For return shipments, only ship back the same parts that are received.
Please do not ship back any accessories such as cables, rack mounts,
manuals, CD's.
These accessories are only shipped with original shipments not with
Replacement parts.
Also, for modular replacements, all non-faulty
components will need to be swapped from the old device to the replacement
device.
This includes: WIC's; Network-Modules (NM's); Port Adapters (PA's); Memory; etc).
--------------------------------------------------------------------------------------------------------------------
To get the latest status on your RMA or on the return shipment you may
contact Cisco's Logistics or Asset Recovery department and reference your RMA#.
LOGISTICS: E-Mail <mailto:[email protected]> [email protected] or Phone
1-800-553-2447 Opt 4
ASSET RECOVERY: E-Mail <mailto:[email protected]>
[email protected] or Phone 1-800-800-1180 x67284, Opt 4
Delivery ID - 162474231 ;
Received By - Jimmy ;
Received On - 30-Jan-2023 09:03:06 GMT ;
POD Complete on - 30-Jan-2023 09:03:06 GMT ;
Tracking Number(s)- 145806011 ;
Line: 1.1 ; Product: C9300-NM-8X= ; Qty: 1 ;
***ORDER 802711026 END OF NOTIFICATION.
*** RMA/SVO 802711026 POD completed on 30-JAN-23 (GMT).
Please refer to:
https://ibpm.cisco.com/rma/home/?&&OrderNumber=802711026
ORDER NUMBER: 802711026
CREATED DATE: 27-Jan-2023 05:17:00 GMT
CREATED BY: [email protected] (JHWATSON)
SERVICE LEVEL: Advance Replacement - Warranty Same Day Ship
NOTIFICATION SENT TO:[email protected];[email protected]
NOTIFICATION SENT TIME: 27-Jan-2023 08:29:25 GMT
Your shipment is on its way:
Delivery ID - 162474231 ;
Shipped Date- 27-Jan-2023 08:27:42 GMT ;
Carrier- DSC ;
Tracking Number(s)- 145806011 ;
Line: 1.1 ; Product: C9300-NM-8X= ; Qty: 1 ; License Transfer:
Ship to Address:
NCS PTE LTD
5 ANG MO KIO STREET 62 NCS HUB
SINGAPORE,,569141
SG
Ship to Contact:
NAME: Samuel Tan/23458623
PHONE: +6587504718
LicenseTransfer Note
If the transfer of the license was requested during RMA creation, the acknowledgmentcontact will receive a separate email within 24 hours containing the new license keys and instructions.
If the transfer of the license was not requestedor the email with license key was not received, please follow the instructions below:
1.Log into the Licensing Portal
2.Under Manage, go to Devices, then Actions, then RMA.
3.Follow the on-screen prompts and enter the required information.
For additional information, please see below or [email protected] licensing support.
Document: License Registration Portal Basic User Guide
Video: How to generate a license for a failed device using the RMA function
Additional information: License Registration Portal Help page
Source PID: C9300-NM-8X= ;
Source Serial Number: FOC24424RV0 ;
Destination PID: C9300-NM-8X= ;
Destination Serial Number: FOC2633359Z ;
We were unable to verify the accuracy of the Source Serial Number. Please be sure to validate the Serial Numbers prior to using the RMA License Transfer tool to ensure a successful software license transfer.
***ORDER 802711026 END OF NOTIFICATION.
ORDER NUMBER: 802711026
CREATED DATE: 27-Jan-2023 05:17:00 GMT
CREATED BY: [email protected] (JHWATSON)
SERVICE LEVEL: Advance Replacement - Warranty Same Day Ship
NOTIFICATION SENT TO:[email protected];[email protected]
NOTIFICATION SENT TIME: 27-Jan-2023 05:34:33 GMT
***Parts ETA:***
Delivery ID: 162474231 ; ETA: 30-Jan-2023 09:00:00 GMT ;
Line: 1.1 ; Product: C9300-NM-8X= ; Qty: 1 ;
Ship to Address:
NCS PTE LTD
5 ANG MO KIO STREET 62 NCS HUB
SINGAPORE,,569141
SG
Ship to Contact:
NAME: Samuel Tan/23458623
PHONE: +6587504718
***ORDER 802711026 END OF NOTIFICATION.
Hi Pratishtha Yadav,
RMA 802711026 submitted.
Company Name:
Company Address:
SVO Access Enabled: false
City:
Cisco.com Id:
State/Province:
Name:
Zip Code:
Country:
Contact Name:
Email:
Sales Order #:
Comments for Person Receiving Shipment:
Special Shipping Instructions:
ORDER NUMBER: 802711026
CREATED DATE: 27-Jan-2023 05:17:00 GMT
CREATED BY: [email protected] (JHWATSON)
SERVICE LEVEL: Advance Replacement - Warranty Same Day Ship
NOTIFICATION SENT TO:[email protected];[email protected]
NOTIFICATION SENT TIME: 27-Jan-2023 05:17:56 GMT
Ship to Address:
NCS PTE LTD
5 ANG MO KIO STREET 62 NCS HUB
SINGAPORE,,569141
SG
Ship to Contact:
NAME: Samuel Tan/23458623
PHONE: +6587504718
Failure Code: OHW4 - HW Fail - Boot Up
SVO Status URL: https://ibpm.cisco.com/rma/home/?OrderNumber=802711026
***Parts Ordered:***
Line: 1.1 ; Product: C9300-NM-8X= ; Qty: 1 ;
***ORDER Return Line Detail:***
Scheduled Return Date: 06-Feb-2023 05:35:19 GMT ;
Line: 2.1 ; Product: C9300-NM-8X= ; Qty: 1 ;
Serial Number(s): FOC24424RV0 ;
*** ORDER 802711026 END OF NOTIFICATION.
Thank you for taking time to share all the relevant information.
The RMA Creation has been initiated by concerned engineer.
Please use below link to track the progress of request.
https://ibpm.cisco.com/rma/home/?RMANumber=802711026
Your recent RMA#802711026 is handed off.
Please use the RMA completion link to submit the order.
*** ACTIONS PENDING RMA REQUESTER ***
Order handoff email has been sent to the Order Requester to complete the order submission.
NOTIFICATION SENT TO: [email protected]
NOTIFICATION SENT TIME: 27-Jan-2023 04:15:14 GMT
Order completion link :
https://ibpm.cisco.com/rma/home/?RMANumber=802711026
Resolution Summary:
Automatic RMA submitted for C9300-NM-8X=
Action Plan:
An RMA has been generated.
Shipping & Delivery Info: Not Available Customer to fill out RMA details
The case will be closed 24-48 hours after the RMA is fulfilled or expired.
*** ACTIONS PENDING RMA REQUESTER ***
Order handoff email has been sent to the Order Requester to complete the order submission.
NOTIFICATION SENT TO: [email protected]
NOTIFICATION SENT TIME: 27-Jan-2023 04:15:14 GMT
Order completion link :
https://ibpm.cisco.com/rma/home/?RMANumber=802711026
*********************************************************************************************
Draft ORDER NUMBER: 802711026
Draft ORDER INITIATED BY (Order creator): (jhwatson)
Order Details:
Serial Number: FOC24424RV0 ; Product: C9300-NM-8X= ; Contract: WARRANTY ; Service Level: Advance Replacement - Warranty Same Day Ship ; Qty: 1 ; Labor: No ;
Note: If this Order has multiple service levels, it will be split into separate Order numbers at Order review & submit (during Order submission)
*** ORDER 802711026 END OF NOTIFICATION.
Problem Description:
The IRE process has identified Hardware Failure
Current Status:
Decision: ADHOC-RMA
Status: DRAFT_RMA_COMPLETED
Shipping & Delivery Info: Not Available
Please refer the attachment.
Please assist.
3rd follow up.
Could you please help us provide below outputs.
This would help us better to isolate the issue.
* show environment
* show module
Please follow up.
18th January, 2023
Sent IR
Asked below questions -
Before proceeding we would need to do some checks. Could you please share below information-
1. How long have you been facing this issue? Was it a working setup or a new setup?
2. What is the LED status of the module.
3. Have you done any recent changes in the network?
4. Is the power cable connected properly?
5. Did you try connecting the switch to a known working power source and power socket with known working power cables?
6. Please share a snapshot of the front and back panel of the device with the power cables connected?
7. Do you want to share any additional information ?
19th January, 2023
Got below response-
1. How long have you been facing this issue? Was it a working setup or a new setup? Issue noticed for a week, this 10G network module is not detected. This is existing setup. Was working fine previously.
2. What is the LED status of the module. No LED status.
3. Have you done any recent changes in the network? No changes.
4. Is the power cable connected properly? Verified power cable are working. Also Have tried use with our other spare module and is that is OK. however this still not Woking
5. Did you try connecting the switch to a known working power source and power socket with known working power cables? Yes have tried also reseating the module doesn’t work.
19th January, 2023
Asked for below output
show environment
show module
show tech
21st January, 2023
Sent a follow up email for above outputs.
23rd January, 2023
Sent follow up email.
2nd follow up.
Could you please share output for "show tech" as this would help us understand if there are any logs generated.
18th January, 2023
Sent IR
Asked below questions -
Before proceeding we would need to do some checks. Could you please share below information-
1. How long have you been facing this issue? Was it a working setup or a new setup?
2. What is the LED status of the module.
3. Have you done any recent changes in the network?
4. Is the power cable connected properly?
5. Did you try connecting the switch to a known working power source and power socket with known working power cables?
6. Please share a snapshot of the front and back panel of the device with the power cables connected?
7. Do you want to share any additional information ?
19th January, 2023
Got below response-
1. How long have you been facing this issue? Was it a working setup or a new setup? Issue noticed for a week, this 10G network module is not detected. This is existing setup. Was working fine previously.
2. What is the LED status of the module. No LED status.
3. Have you done any recent changes in the network? No changes.
4. Is the power cable connected properly? Verified power cable are working. Also Have tried use with our other spare module and is that is OK. however this still not Woking
5. Did you try connecting the switch to a known working power source and power socket with known working power cables? Yes have tried also reseating the module doesn’t work.
19th January, 2023
Asked for below output
show environment
show module
show tech
21st January, 2023
Sent a follow up email for above outputs.
Hope you are doing well.
This is a follow up email to check if you got a chance to collect outputs for previously mentioned commands.
This would help us understand if there are any logs generated.
20th January, 2023
waiting on customer response.
Unable to detect module C9300-NM-8X= on Cat9300
18th January, 2023
Sent IR
Asked below questions -
Before proceeding we would need to do some checks. Could you please share below information-
1. How long have you been facing this issue? Was it a working setup or a new setup?
2. What is the LED status of the module.
3. Have you done any recent changes in the network?
4. Is the power cable connected properly?
5. Did you try connecting the switch to a known working power source and power socket with known working power cables?
6. Please share a snapshot of the front and back panel of the device with the power cables connected?
7. Do you want to share any additional information ?
19th January, 2023
Got below response-
1. How long have you been facing this issue? Was it a working setup or a new setup? Issue noticed for a week, this 10G network module is not detected. This is existing setup. Was working fine previously.
2. What is the LED status of the module. No LED status.
3. Have you done any recent changes in the network? No changes.
4. Is the power cable connected properly? Verified power cable are working. Also Have tried use with our other spare module and is that is OK. however this still not Woking
5. Did you try connecting the switch to a known working power source and power socket with known working power cables? Yes have tried also reseating the module doesn’t work.
19th January, 2023
Asked for below output
show environment
show module
show tech
Sent IR
Asked below questions -
Before proceeding we would need to do some checks. Could you please share below information-
1. How long have you been facing this issue? Was it a working setup or a new setup?
2. What is the LED status of the module.
3. Have you done any recent changes in the network?
4. Is the power cable connected properly?
5. Did you try connecting the switch to a known working power source and power socket with known working power cables?
6. Please share a snapshot of the front and back panel of the device with the power cables connected?
7. Do you want to share any additional information ?
Got below response-
1. How long have you been facing this issue? Was it a working setup or a new setup? Issue noticed for a week, this 10G network module is not detected. This is existing setup. Was working fine previously.
2. What is the LED status of the module. No LED status.
3. Have you done any recent changes in the network? No changes.
4. Is the power cable connected properly? Verified power cable are working. Also Have tried use with our other spare module and is that is OK. however this still not Woking
5. Did you try connecting the switch to a known working power source and power socket with known working power cables? Yes have tried also reseating the module doesn’t work.
Asked for below output
show environment
show module
show tech
Unable to detect module C9300-NM-8X= on Cat9300.
Thanks for sharing this information.
Could you also please share outputs for below commands:-
* show environment
* show module
Hi Pratishtha Yadav,
1.
How long have you been facing this issue? Was it a working setup or a new setup? Issue noticed for a week, this 10G network module is not detected.
This is existing setup.
Was working fine previously.
2.
What is the LED status of the module.
No LED status.
3.
Have you done any recent changes in the network? No changes.
4.
Is the power cable connected properly? Verified power cable are working.
Also Have tried use with our other spare module and is that is OK.
however this still not Woking
5.
Did you try connecting the switch to a known working power source and power socket with known working power cables? Yes have tried also reseating the module doesn't work.
Please assist.
CCO ID# SCSLIMITED
P/N# C9300-NM-8X
Faulty S/N# FOC24424RV0
Fault# Unable to detect.
no output.
Qty# 01EA
Ship To Address:
NCS PTE LTD
5 ANG MO KIO STREET 62
NCS HUB
SINGAPORE 569141
Ship To Contact# Samuel Tan/Case# 23458623
Phone# +65 87504718
Email# [email protected]<mailto:[email protected]>
I am Pratishtha Yadav from CISCO TAC Asia-Pacific LAN Switching team.
I have the ownership of your service request with SR: 694914231.
I will be closely working with you towards the final resolution of this service request.
I have reviewed the case.
Based on the case notes, here is my understanding of the issue.
Problem Description:
Unable to detect module C9300-NM-8X= on Cat9300.
Action Plan:
Before proceeding we would need to do some checks.
Could you please share below information-
1.
How long have you been facing this issue? Was it a working setup or a new setup?
2.
What is the LED status of the module.
3.
Have you done any recent changes in the network?
4.
Is the power cable connected properly?
5.
Did you try connecting the switch to a known working power source and power socket with known working power cables?
6.
Please share a snapshot of the front and back panel of the device with the power cables connected?
7.
Do you want to share any additional information ?
While replying to my emails, please include a copy to [email protected]<mailto:[email protected]> or use reply-all to ensure that all our conversation regarding the case are attached to the case notes automatically.
My contact details and shift hours are mentioned below.
In case, if you need immediate attention outside of my working hours, please call on below TAC frontline contact numbers to have your SR transferred to an on-shift engineer.
You can now upload files to the case using FTP/FTPS/SCP/SFTP/HTTPS protocols and the following details:
Hostname: cxd.cisco.com
Username: 694914231
Password: BaRevshKZ7BXl7Gz
Please note:
1. When uploading to HTTPS the path must be set to /home/<filename>, for all other protocols the path is always '/<filename>'
2. Empty files, that is files with a size of 0 Bytes, will not be attached and will be deleted automatically.
Technology: LAN Switching
Subtechnology: Cat9300
Problem Code: Hardware Failure
Product: NA
Product Family: C9300
Software Version: N/A
Router/Node Name: N/A
Problem Details: Hi TAC Team,
Please kindly help to raise an RMA for below details.
[Please reply-to-all, so that all the concerned parties in the cc: list also be kept in loop]
CCO ID# SCSLIMITED
P/N# C9300-NM-8X
Faulty S/N# FOC24424RV0
Fault# Unable to detect. no output.
Qty# 01EA
Ship To Address:
NCS PTE LTD
5 ANG MO KIO STREET 62
NCS HUB
SINGAPORE 569141
Ship To Contact# Samuel Tan/Case# 23458623
Phone# +65 87504718
Email# [email protected]
Technology: LAN Switching
Subtechnology: Cat9300
Problem Code: Hardware Failure
Product: NA
Product Family: C9300
Software Version: N/A
Router/Node Name: N/A
Problem Details: Hi TAC Team,
Please kindly help to raise an RMA for below details.
[Please reply-to-all, so that all the concerned parties in the cc: list also be kept in loop]
CCO ID# SCSLIMITED
P/N# C9300-NM-8X
Faulty S/N# FOC24424RV0
Fault# Unable to detect. no output.
Qty# 01EA
Ship To Address:
NCS PTE LTD
5 ANG MO KIO STREET 62
NCS HUB
SINGAPORE 569141
Ship To Contact# Samuel Tan/Case# 23458623
Phone# +65 87504718
Email# [email protected]
Hi TAC Team,
Please kindly help to raise an RMA for below details.
[Please reply-to-all, so that all the concerned parties in the cc: list also be kept in loop]
CCO ID# SCSLIMITED
P/N# C9300-NM-8X
Faulty S/N# FOC24424RV0
Fault# Unable to detect. no output.
Qty# 01EA
Ship To Address:
NCS PTE LTD
5 ANG MO KIO STREET 62
NCS HUB
SINGAPORE 569141
Ship To Contact# Samuel Tan/Case# 23458623
Phone# +65 87504718
Email# [email protected]
timestamp : 2023-01-27T04:15:20.000+0000 || updatedby : jhwatson || type : Resolution Summary || visibility : External || details : Resolution Summary:
Automatic RMA submitted for C9300-NM-8X= | Question: Which product is principally discussed in these documents?
Answer "NONE" if you cannot find answer in the given documents.
The ONLY product name should be selected from the given product name list: C9300-48U-A/ C9300-48U/ THIRD_PARTY_PRODUCT_HW/ UCS-FI-6454/ C9300-NM-8X/ PWR-C1-1100WAC Response in this JSON format:
{"product_name": "","explanation": "", "summary": ""}
Technology: LAN Switching
Subtechnology: Cat9300
Problem Code: Hardware Failure
Product: NA
Product Family: C9300
Software Version: N/A
Router/Node Name: N/A
Problem Details: Hi TAC Team,
Please kindly help to raise an RMA for below details.
[Please reply-to-all, so that all the concerned parties in the cc: list also be kept in loop]
CCO ID# SCSLIMITED
P/N# C9300-NM-8X
Faulty S/N# FOC24424RV0
Fault# Unable to detect. no output.
Qty# 01EA
Ship To Address:
NCS PTE LTD
5 ANG MO KIO STREET 62
NCS HUB
SINGAPORE 569141
Ship To Contact# Samuel Tan/Case# 23458623
Phone# +65 87504718
Email# [email protected]
Hi TAC Team,
Please kindly help to raise an RMA for below details.
[Please reply-to-all, so that all the concerned parties in the cc: list also be kept in loop]
CCO ID# SCSLIMITED
P/N# C9300-NM-8X
Faulty S/N# FOC24424RV0
Fault# Unable to detect. no output.
Qty# 01EA
Ship To Address:
NCS PTE LTD
5 ANG MO KIO STREET 62
NCS HUB
SINGAPORE 569141
Ship To Contact# Samuel Tan/Case# 23458623
Phone# +65 87504718
Email# [email protected]
timestamp : 2023-01-27T04:15:20.000+0000 || updatedby : jhwatson || type : Resolution Summary || visibility : External || details : Resolution Summary:
Automatic RMA submitted for C9300-NM-8X= | Technology: LAN Switching
Subtechnology: Cat9300
Problem Code: Hardware Failure
Product: NA
Product Family: C9300
Software Version: N/A
Router/Node Name: N/A
Problem Details: Hi TAC Team,
Please kindly help to raise an RMA for below details.
[Please reply-to-all, so that all the concerned parties in the cc: list also be kept in loop]
CCO ID# SCSLIMITED
P/N# C9300-NM-8X
Faulty S/N# FOC24424RV0
Fault# Unable to detect. no output.
Qty# 01EA
Ship To Address:
NCS PTE LTD
5 ANG MO KIO STREET 62
NCS HUB
SINGAPORE 569141
Ship To Contact# Samuel Tan/Case# 23458623
Phone# +65 87504718
Email# [email protected] | Hi TAC Team,
Please kindly help to raise an RMA for below details.
[Please reply-to-all, so that all the concerned parties in the cc: list also be kept in loop]
CCO ID# SCSLIMITED
P/N# C9300-NM-8X
Faulty S/N# FOC24424RV0
Fault# Unable to detect. no output.
Qty# 01EA
Ship To Address:
NCS PTE LTD
5 ANG MO KIO STREET 62
NCS HUB
SINGAPORE 569141
Ship To Contact# Samuel Tan/Case# 23458623
Phone# +65 87504718
Email# [email protected] | timestamp : 2023-01-27T04:15:20.000+0000 || updatedby : jhwatson || type : Resolution Summary || visibility : External || details : Resolution Summary:
Automatic RMA submitted for C9300-NM-8X= | nan | C9300-NM-8X | NA - RMA | nan | nan | 3 | nan | Hardware Failure | C9300 | LAN Switching | Cat9300 | nan | nan | nan | nan | nan | nan |
695138053 | Question: Which software version is principally discussed in these documents?
Answer "NONE" if you cannot find answer in the given documents.
The ONLY software version should be selected from the given software version list: 1/ 8.10.151.0/ 8.10.171.0/ 802.11AC/ 8.5.171.0/ 8.10.183.0/ 8.10.130.0/ 8.10.171.0/ THIRD_PARTY_PRODUCT_SW/ 8.5.135.0/ 8.3.143.0/ NA-CIN_CLOSE_SW/ 8.5.140.0/ 4.0.1a/ WLC CLIENT INTEROP/ 12.0.13/ 8.5.151.0/ 8.4/ 120.13/ 8.5.160.0/ 8.10.151.0/ 8.3.143.0/ 8.3.131.0/ 8.3.150.0/ 8.5.135.0/ 8.5.161.0/ 8.10.185.0/ 8.2.166.0/ 8.5.140.0/ 8.5.151.0/ 8.3.150.0/ 16.12.3s/ WLC RRM/RF/CLEANAIR/ 8.5.151.0/ 8.10.130.0/ NA - COMPONENT ONLY/ 8.10.162.0/ 8.3.140.0/ 8.10.150.0/ 8.10.183.0/ 8.10.161.0/ 8.10.185.0/ 8.5.151.0/ 16.12.4/ 17.3.5b/ 8.10.183.0/ 8.10.171.0/ 8.5.171.0 Response in this JSON format:
{"software_version": "","explanation": "", "summary": ""}
Cu acknowledged closure as Cu planning to connect both WLCs' RP ports back to back using fiber link and media converter which will take some time. If post connecting WLC back to back issue reoccur Cu will reach out to us
-------------
Cu had query, answered the same
-------------
2nd follow up done
----------
1st follow up done
-----------
Cu reverted back with query, answered the same
------------
3rd follow up done
--------------
2nd follow up
-------------
1st follow up done
-------------
Cu to increase the HA keep alive timers
--------------
Issue is occurring due to RP link latency.
Asked Cu to increase the HA timers and check if issue still persist.
In case issue still persist, we need to connect devices back to back to check if the issue is due to WLC
------------
From the logs, shared the analysis
requested for redundancy summary to check the HA keep alive timer configuration
------------
Sent IR
Since the reset date was 2021, asked Cu when was the issue last happened.
Asked for latest tech-support and support bundle from WLC.
-------------------------
Reference case:
692758235
Next Action plan was shared:
1. Work with your network team to traverse the entire topology between the wireless controllers and check all network devices in the path to verify that the WLC RP VLAN is not added as an SVI on any of these. We will further have to validate that only the WLC mac-address is being learnt on the VLAN on all network devices which can be confirmed by taking a ‘show mac-address table’ output from all the intermediate switches.
2. Another recommendation by the internal team is to disable the ‘Gateway reachability check’ under WLC->Controller->Redundancy. By disabling this feature, we can confirm if the issue arises due to intermittent reachability loss of the standby to its gateway. If that is the cause, then disabling the feature will not lead to any further reboots of the WLC. However, if the WLC reboots post disabling this feature, then we can ignore this cause. Please note that this test can best be confirmed when the issue is frequent. As I understand from our last call, the WLC has been stable for over the past 4 months, hence to get the best results, perform this test when issue has resurfaced. Also, note that disabling this feature will cause a reboot of the controllers, so please plan to make this change during a downtime.
Cu to update if they have tried disabling the gateway reachability check and post changes what was the observation
Technology: Wireless
Subtechnology: 8540 Series Wireless LAN Controller (AIR-CT8540)
Problem Code: Error Messages, Logs, Debugs
Product: NA
Product Family: AIRCTA2
Software Version: N/A
Router/Node Name: N/A
Problem Details: While performing firmware upgrade, the WLC reset with the error below:
Reset reason : Peer-RMI, peer-RP and management default gateway are reachable ,(Version: 8.10.130.11)
Reset time : Sat Dec 18 02:11:51 2021
Trace back : 0x8f5754 0x1e1af9a 0x1ea0b04 0x1e8f251 0x1e95ad6 0x1e8b99e 0x1e23d97 0x7dff 0xe898d
Kindly assign this ticket to APAC support as the client wished to get RCA on this issue
Reference case number: 692758235
Derek
+6590129432
While performing firmware upgrade, the WLC reset with the error below:
Reset reason : Peer-RMI, peer-RP and management default gateway are reachable ,(Version: 8.10.130.11)
Reset time : Sat Dec 18 02:11:51 2021
Trace back : 0x8f5754 0x1e1af9a 0x1ea0b04 0x1e8f251 0x1e95ad6 0x1e8b99e 0x1e23d97 0x7dff 0xe898d
Kindly assign this ticket to APAC support as the client wished to get RCA on this issue
Reference case number: 692758235
Derek
+6590129432
* Logs indicating Standby was rebooting due to due to RP link latency try increasing the HA timers configure on your WLC, and check if the issue still persist.
Please find the process below to achieve the same:
Via GUI:
Controller > Redundancy > Global Configuration >
Keep Alive Timer: 500-800 millisecond.
Keep Alive Retries: 8-10 retries.
Via CLI:
(Cisco Controller) >config redundancy timer keep-alive-timer <timer msecs>
(Cisco Controller) >config redundancy retries keep-alive-retry <retry count>
* We can test connecting both WLC back to back and test if issue arises again, I understand it won’t be convenient but to conclude it to be a hardware issue we need to test the behavior by connecting both WLC back to back (or keeping max distance to 100 meters as we know: A direct physical connection between Active and Standby Redundant Ports is highly recommended. The distance between the connections can go up to 100 meters at per Ethernet cable standards.
* We can monitor the frequency of issue > Accordingly we can predict the next trigger for the issue so we can check the L1 connectivity (where the packets are getting dropped) also as previously suggested Work with your network team to traverse the entire topology between the wireless controllers and check all network devices in the path to verify that the WLC RP VLAN is not added as an SVI on any of these. We will further have to validate that only the WLC mac-address is being learnt on the VLAN on all network devices which can be confirmed by taking a ‘show mac-address table’ output from all the intermediate switches. | Question: Which product is principally discussed in these documents?
Answer "NONE" if you cannot find answer in the given documents.
The ONLY product name should be selected from the given product name list: AIR-CT8540-1K-K9/ AIR-CT8540-K9/ NA-CIN_CLOSE_HW/ C9120AXI-S/ THIRD_PARTY_PRODUCT_HW/ AIR-CT8540-CA-K9/ AIR-AP2802I-S-K9/ AIR-CT8540-K9Z/ AIR-BZL-C240M4/ DN2-HW-APL-XL/ WLC-AP-T/ AIR-CT8540-SW-8.2 Response in this JSON format:
{"product_name": "","explanation": "", "summary": ""}
Technology: Wireless
Subtechnology: 8540 Series Wireless LAN Controller (AIR-CT8540)
Problem Code: Error Messages, Logs, Debugs
Product: NA
Product Family: AIRCTA2
Software Version: N/A
Router/Node Name: N/A
Problem Details: While performing firmware upgrade, the WLC reset with the error below:
Reset reason : Peer-RMI, peer-RP and management default gateway are reachable ,(Version: 8.10.130.11)
Reset time : Sat Dec 18 02:11:51 2021
Trace back : 0x8f5754 0x1e1af9a 0x1ea0b04 0x1e8f251 0x1e95ad6 0x1e8b99e 0x1e23d97 0x7dff 0xe898d
Kindly assign this ticket to APAC support as the client wished to get RCA on this issue
Reference case number: 692758235
Derek
+6590129432
While performing firmware upgrade, the WLC reset with the error below:
Reset reason : Peer-RMI, peer-RP and management default gateway are reachable ,(Version: 8.10.130.11)
Reset time : Sat Dec 18 02:11:51 2021
Trace back : 0x8f5754 0x1e1af9a 0x1ea0b04 0x1e8f251 0x1e95ad6 0x1e8b99e 0x1e23d97 0x7dff 0xe898d
Kindly assign this ticket to APAC support as the client wished to get RCA on this issue
Reference case number: 692758235
Derek
+6590129432
* Logs indicating Standby was rebooting due to due to RP link latency try increasing the HA timers configure on your WLC, and check if the issue still persist.
Please find the process below to achieve the same:
Via GUI:
Controller > Redundancy > Global Configuration >
Keep Alive Timer: 500-800 millisecond.
Keep Alive Retries: 8-10 retries.
Via CLI:
(Cisco Controller) >config redundancy timer keep-alive-timer <timer msecs>
(Cisco Controller) >config redundancy retries keep-alive-retry <retry count>
* We can test connecting both WLC back to back and test if issue arises again, I understand it won’t be convenient but to conclude it to be a hardware issue we need to test the behavior by connecting both WLC back to back (or keeping max distance to 100 meters as we know: A direct physical connection between Active and Standby Redundant Ports is highly recommended. The distance between the connections can go up to 100 meters at per Ethernet cable standards.
* We can monitor the frequency of issue > Accordingly we can predict the next trigger for the issue so we can check the L1 connectivity (where the packets are getting dropped) also as previously suggested Work with your network team to traverse the entire topology between the wireless controllers and check all network devices in the path to verify that the WLC RP VLAN is not added as an SVI on any of these. We will further have to validate that only the WLC mac-address is being learnt on the VLAN on all network devices which can be confirmed by taking a ‘show mac-address table’ output from all the intermediate switches. | Technology: Wireless
Subtechnology: 8540 Series Wireless LAN Controller (AIR-CT8540)
Problem Code: Error Messages, Logs, Debugs
Product: NA
Product Family: AIRCTA2
Software Version: N/A
Router/Node Name: N/A
Problem Details: While performing firmware upgrade, the WLC reset with the error below:
Reset reason : Peer-RMI, peer-RP and management default gateway are reachable ,(Version: 8.10.130.11)
Reset time : Sat Dec 18 02:11:51 2021
Trace back : 0x8f5754 0x1e1af9a 0x1ea0b04 0x1e8f251 0x1e95ad6 0x1e8b99e 0x1e23d97 0x7dff 0xe898d
Kindly assign this ticket to APAC support as the client wished to get RCA on this issue
Reference case number: 692758235
Derek
+6590129432 | While performing firmware upgrade, the WLC reset with the error below:
Reset reason : Peer-RMI, peer-RP and management default gateway are reachable ,(Version: 8.10.130.11)
Reset time : Sat Dec 18 02:11:51 2021
Trace back : 0x8f5754 0x1e1af9a 0x1ea0b04 0x1e8f251 0x1e95ad6 0x1e8b99e 0x1e23d97 0x7dff 0xe898d
Kindly assign this ticket to APAC support as the client wished to get RCA on this issue
Reference case number: 692758235
Derek
+6590129432 | * Logs indicating Standby was rebooting due to due to RP link latency try increasing the HA timers configure on your WLC, and check if the issue still persist.
Please find the process below to achieve the same:
Via GUI:
Controller > Redundancy > Global Configuration >
Keep Alive Timer: 500-800 millisecond.
Keep Alive Retries: 8-10 retries.
Via CLI:
(Cisco Controller) >config redundancy timer keep-alive-timer <timer msecs>
(Cisco Controller) >config redundancy retries keep-alive-retry <retry count>
* We can test connecting both WLC back to back and test if issue arises again, I understand it won’t be convenient but to conclude it to be a hardware issue we need to test the behavior by connecting both WLC back to back (or keeping max distance to 100 meters as we know: A direct physical connection between Active and Standby Redundant Ports is highly recommended. The distance between the connections can go up to 100 meters at per Ethernet cable standards.
* We can monitor the frequency of issue > Accordingly we can predict the next trigger for the issue so we can check the L1 connectivity (where the packets are getting dropped) also as previously suggested Work with your network team to traverse the entire topology between the wireless controllers and check all network devices in the path to verify that the WLC RP VLAN is not added as an SVI on any of these. We will further have to validate that only the WLC mac-address is being learnt on the VLAN on all network devices which can be confirmed by taking a ‘show mac-address table’ output from all the intermediate switches. | Hardware: AIR-CT8540-K9
Issue: HA are losing reachability and the WLCs are reloading with the following reason:
Reset reason : Peer-RMI, peer-RP and management default gateway are reachable ,(Version: 8.10.130.11) | AIR-CT8540-K9 | 8.10.183.0 | 8.10.183.0 | 71.0 | 3 | 100.0 | Debug/Diagnostic Capability (missing, incomplete, cryptic...) | AIRCTA2 | Wireless | 8540 Series Wireless LAN Controller (AIR-CT8540) | 01t6R000007OTqHQAW | Error Messages, Logs, Debugs | 8540 Series Wireless LAN Controller (AIR-CT8540) | Wireless | 01t15000004dDRMAA2 | nan |
694913120 | Question: Which software version is principally discussed in these documents?
Answer "NONE" if you cannot find answer in the given documents.
The ONLY software version should be selected from the given software version list: 17.03.04a/ 17.3.4a Response in this JSON format:
{"software_version": "","explanation": "", "summary": ""}
Workaround is provided for the issue. Cu will upgrade the router in May.
Technology: Router and IOS Architecture
Subtechnology: Memory Allocation Failure
Problem Code: Software Failure
Product: NA
Product Family: ASR1000
Software Version: N/A
Router/Node Name: N/A
Problem Details: Critical - QFP 0 IRAM(EXMEM) at 98 percent, exceeds critical level 95
HSDC-DBN-RTR01#show platform hardware qfp active infrastructure exmem statistics
QFP exmem statistics
Type: Name: DRAM, QFP: 0
Total: 8589934592
InUse: 3510652928
Free: 5079281664
Lowest free water mark: 5071855616
Type: Name: IRAM, QFP: 0
Total: 134217728
InUse: 132231168
Free: 1986560
Lowest free water mark: 1986560
Type: Name: SRAM, QFP: 0
Total: 0
InUse: 0
Free: 0
Lowest free water mark: 0
HSDC-DBN-RTR01# show platform resources
**State Acronym: H - Healthy, W - Warning, C - Critical
Resource Usage Max Warning Critical State
----------------------------------------------------------------------------------------------------
RP0 (ok, active) H
Control Processor 1.23% 100% 80% 90% H
DRAM 4143MB(6%) 63417MB 88% 93% H
bootflash 3969MB(58%) 6840MB 88% 93% H
harddisk 32MB(0%) 93836MB 88% 93% H
ESP0(ok, active) C
Control Processor 1.32% 100% 80% 90% H
DRAM 1253MB(3%) 32015MB 88% 93% H
QFP C
TCAM 64cells(0%) 1048576cells 65% 85% H
DRAM 3428372KB(40%) 8388608KB 85% 95% H
IRAM 129132KB(98%) 131072KB 85% 95% C
CPU Utilization 7.00% 100% 90% 95% H
Pkt Buf Mem (0) 67KB(0%) 524288KB 85% 95% H
Pkt Buf Mem (1) 67KB(0%) 524288KB 85% 95% H
Pkt Buf Mem (2) 67KB(0%) 524288KB 85% 95% H
Pkt Buf Mem (3) 67KB(0%) 524288KB 85% 95% H
SIP0 H
Control Processor 9.61% 100% 80% 90% H
DRAM 687MB(35%) 1955MB 88% 93% H
SIP1 H
Control Processor 3.20% 100% 80% 90% H
DRAM 626MB(32%) 1955MB 88% 93% H
Critical - QFP 0 IRAM(EXMEM) at 98 percent, exceeds critical level 95
HSDC-DBN-RTR01#show platform hardware qfp active infrastructure exmem statistics
QFP exmem statistics
Type: Name: DRAM, QFP: 0
Total: 8589934592
InUse: 3510652928
Free: 5079281664
Lowest free water mark: 5071855616
Type: Name: IRAM, QFP: 0
Total: 134217728
InUse: 132231168
Free: 1986560
Lowest free water mark: 1986560
Type: Name: SRAM, QFP: 0
Total: 0
InUse: 0
Free: 0
Lowest free water mark: 0
HSDC-DBN-RTR01# show platform resources
**State Acronym: H - Healthy, W - Warning, C - Critical
Resource Usage Max Warning Critical State
----------------------------------------------------------------------------------------------------
RP0 (ok, active) H
Control Processor 1.23% 100% 80% 90% H
DRAM 4143MB(6%) 63417MB 88% 93% H
bootflash 3969MB(58%) 6840MB 88% 93% H
harddisk 32MB(0%) 93836MB 88% 93% H
ESP0(ok, active) C
Control Processor 1.32% 100% 80% 90% H
DRAM 1253MB(3%) 32015MB 88% 93% H
QFP C
TCAM 64cells(0%) 1048576cells 65% 85% H
DRAM 3428372KB(40%) 8388608KB 85% 95% H
IRAM 129132KB(98%) 131072KB 85% 95% C
CPU Utilization 7.00% 100% 90% 95% H
Pkt Buf Mem (0) 67KB(0%) 524288KB 85% 95% H
Pkt Buf Mem (1) 67KB(0%) 524288KB 85% 95% H
Pkt Buf Mem (2) 67KB(0%) 524288KB 85% 95% H
Pkt Buf Mem (3) 67KB(0%) 524288KB 85% 95% H
SIP0 H
Control Processor 9.61% 100% 80% 90% H
DRAM 687MB(35%) 1955MB 88% 93% H
SIP1 H
Control Processor 3.20% 100% 80% 90% H
DRAM 626MB(32%) 1955MB 88% 93% H
Workaround is provided for the issue. Cu will upgrade the router in May. | Question: Which product is principally discussed in these documents?
Answer "NONE" if you cannot find answer in the given documents.
The ONLY product name should be selected from the given product name list: ASR1002-HX/ ASR1009-X Response in this JSON format:
{"product_name": "","explanation": "", "summary": ""}
Technology: Router and IOS Architecture
Subtechnology: Memory Allocation Failure
Problem Code: Software Failure
Product: NA
Product Family: ASR1000
Software Version: N/A
Router/Node Name: N/A
Problem Details: Critical - QFP 0 IRAM(EXMEM) at 98 percent, exceeds critical level 95
HSDC-DBN-RTR01#show platform hardware qfp active infrastructure exmem statistics
QFP exmem statistics
Type: Name: DRAM, QFP: 0
Total: 8589934592
InUse: 3510652928
Free: 5079281664
Lowest free water mark: 5071855616
Type: Name: IRAM, QFP: 0
Total: 134217728
InUse: 132231168
Free: 1986560
Lowest free water mark: 1986560
Type: Name: SRAM, QFP: 0
Total: 0
InUse: 0
Free: 0
Lowest free water mark: 0
HSDC-DBN-RTR01# show platform resources
**State Acronym: H - Healthy, W - Warning, C - Critical
Resource Usage Max Warning Critical State
----------------------------------------------------------------------------------------------------
RP0 (ok, active) H
Control Processor 1.23% 100% 80% 90% H
DRAM 4143MB(6%) 63417MB 88% 93% H
bootflash 3969MB(58%) 6840MB 88% 93% H
harddisk 32MB(0%) 93836MB 88% 93% H
ESP0(ok, active) C
Control Processor 1.32% 100% 80% 90% H
DRAM 1253MB(3%) 32015MB 88% 93% H
QFP C
TCAM 64cells(0%) 1048576cells 65% 85% H
DRAM 3428372KB(40%) 8388608KB 85% 95% H
IRAM 129132KB(98%) 131072KB 85% 95% C
CPU Utilization 7.00% 100% 90% 95% H
Pkt Buf Mem (0) 67KB(0%) 524288KB 85% 95% H
Pkt Buf Mem (1) 67KB(0%) 524288KB 85% 95% H
Pkt Buf Mem (2) 67KB(0%) 524288KB 85% 95% H
Pkt Buf Mem (3) 67KB(0%) 524288KB 85% 95% H
SIP0 H
Control Processor 9.61% 100% 80% 90% H
DRAM 687MB(35%) 1955MB 88% 93% H
SIP1 H
Control Processor 3.20% 100% 80% 90% H
DRAM 626MB(32%) 1955MB 88% 93% H
Critical - QFP 0 IRAM(EXMEM) at 98 percent, exceeds critical level 95
HSDC-DBN-RTR01#show platform hardware qfp active infrastructure exmem statistics
QFP exmem statistics
Type: Name: DRAM, QFP: 0
Total: 8589934592
InUse: 3510652928
Free: 5079281664
Lowest free water mark: 5071855616
Type: Name: IRAM, QFP: 0
Total: 134217728
InUse: 132231168
Free: 1986560
Lowest free water mark: 1986560
Type: Name: SRAM, QFP: 0
Total: 0
InUse: 0
Free: 0
Lowest free water mark: 0
HSDC-DBN-RTR01# show platform resources
**State Acronym: H - Healthy, W - Warning, C - Critical
Resource Usage Max Warning Critical State
----------------------------------------------------------------------------------------------------
RP0 (ok, active) H
Control Processor 1.23% 100% 80% 90% H
DRAM 4143MB(6%) 63417MB 88% 93% H
bootflash 3969MB(58%) 6840MB 88% 93% H
harddisk 32MB(0%) 93836MB 88% 93% H
ESP0(ok, active) C
Control Processor 1.32% 100% 80% 90% H
DRAM 1253MB(3%) 32015MB 88% 93% H
QFP C
TCAM 64cells(0%) 1048576cells 65% 85% H
DRAM 3428372KB(40%) 8388608KB 85% 95% H
IRAM 129132KB(98%) 131072KB 85% 95% C
CPU Utilization 7.00% 100% 90% 95% H
Pkt Buf Mem (0) 67KB(0%) 524288KB 85% 95% H
Pkt Buf Mem (1) 67KB(0%) 524288KB 85% 95% H
Pkt Buf Mem (2) 67KB(0%) 524288KB 85% 95% H
Pkt Buf Mem (3) 67KB(0%) 524288KB 85% 95% H
SIP0 H
Control Processor 9.61% 100% 80% 90% H
DRAM 687MB(35%) 1955MB 88% 93% H
SIP1 H
Control Processor 3.20% 100% 80% 90% H
DRAM 626MB(32%) 1955MB 88% 93% H
Workaround is provided for the issue. Cu will upgrade the router in May. | Technology: Router and IOS Architecture
Subtechnology: Memory Allocation Failure
Problem Code: Software Failure
Product: NA
Product Family: ASR1000
Software Version: N/A
Router/Node Name: N/A
Problem Details: Critical - QFP 0 IRAM(EXMEM) at 98 percent, exceeds critical level 95
HSDC-DBN-RTR01#show platform hardware qfp active infrastructure exmem statistics
QFP exmem statistics
Type: Name: DRAM, QFP: 0
Total: 8589934592
InUse: 3510652928
Free: 5079281664
Lowest free water mark: 5071855616
Type: Name: IRAM, QFP: 0
Total: 134217728
InUse: 132231168
Free: 1986560
Lowest free water mark: 1986560
Type: Name: SRAM, QFP: 0
Total: 0
InUse: 0
Free: 0
Lowest free water mark: 0
HSDC-DBN-RTR01# show platform resources
**State Acronym: H - Healthy, W - Warning, C - Critical
Resource Usage Max Warning Critical State
----------------------------------------------------------------------------------------------------
RP0 (ok, active) H
Control Processor 1.23% 100% 80% 90% H
DRAM 4143MB(6%) 63417MB 88% 93% H
bootflash 3969MB(58%) 6840MB 88% 93% H
harddisk 32MB(0%) 93836MB 88% 93% H
ESP0(ok, active) C
Control Processor 1.32% 100% 80% 90% H
DRAM 1253MB(3%) 32015MB 88% 93% H
QFP C
TCAM 64cells(0%) 1048576cells 65% 85% H
DRAM 3428372KB(40%) 8388608KB 85% 95% H
IRAM 129132KB(98%) 131072KB 85% 95% C
CPU Utilization 7.00% 100% 90% 95% H
Pkt Buf Mem (0) 67KB(0%) 524288KB 85% 95% H
Pkt Buf Mem (1) 67KB(0%) 524288KB 85% 95% H
Pkt Buf Mem (2) 67KB(0%) 524288KB 85% 95% H
Pkt Buf Mem (3) 67KB(0%) 524288KB 85% 95% H
SIP0 H
Control Processor 9.61% 100% 80% 90% H
DRAM 687MB(35%) 1955MB 88% 93% H
SIP1 H
Control Processor 3.20% 100% 80% 90% H
DRAM 626MB(32%) 1955MB 88% 93% H | Critical - QFP 0 IRAM(EXMEM) at 98 percent, exceeds critical level 95
HSDC-DBN-RTR01#show platform hardware qfp active infrastructure exmem statistics
QFP exmem statistics
Type: Name: DRAM, QFP: 0
Total: 8589934592
InUse: 3510652928
Free: 5079281664
Lowest free water mark: 5071855616
Type: Name: IRAM, QFP: 0
Total: 134217728
InUse: 132231168
Free: 1986560
Lowest free water mark: 1986560
Type: Name: SRAM, QFP: 0
Total: 0
InUse: 0
Free: 0
Lowest free water mark: 0
HSDC-DBN-RTR01# show platform resources
**State Acronym: H - Healthy, W - Warning, C - Critical
Resource Usage Max Warning Critical State
----------------------------------------------------------------------------------------------------
RP0 (ok, active) H
Control Processor 1.23% 100% 80% 90% H
DRAM 4143MB(6%) 63417MB 88% 93% H
bootflash 3969MB(58%) 6840MB 88% 93% H
harddisk 32MB(0%) 93836MB 88% 93% H
ESP0(ok, active) C
Control Processor 1.32% 100% 80% 90% H
DRAM 1253MB(3%) 32015MB 88% 93% H
QFP C
TCAM 64cells(0%) 1048576cells 65% 85% H
DRAM 3428372KB(40%) 8388608KB 85% 95% H
IRAM 129132KB(98%) 131072KB 85% 95% C
CPU Utilization 7.00% 100% 90% 95% H
Pkt Buf Mem (0) 67KB(0%) 524288KB 85% 95% H
Pkt Buf Mem (1) 67KB(0%) 524288KB 85% 95% H
Pkt Buf Mem (2) 67KB(0%) 524288KB 85% 95% H
Pkt Buf Mem (3) 67KB(0%) 524288KB 85% 95% H
SIP0 H
Control Processor 9.61% 100% 80% 90% H
DRAM 687MB(35%) 1955MB 88% 93% H
SIP1 H
Control Processor 3.20% 100% 80% 90% H
DRAM 626MB(32%) 1955MB 88% 93% H | Workaround is provided for the issue. Cu will upgrade the router in May. | Product: NA
Product Family: ASR1000
Software Version: N/A
Router/Node Name: N/A
Problem Details: Critical - QFP 0 IRAM(EXMEM) at 98 percent, exceeds critical level 95
HSDC-DBN-RTR01#show platform hardware qfp active infrastructure exmem statistics
QFP exmem statistics
Type: Name: DRAM, QFP: 0
Total: 8589934592
InUse: 3510652928
Free: 5079281664
Lowest free water mark: 5071855616
Type: Name: IRAM, QFP: 0
Total: 134217728
InUse: 132231168
Free: 1986560
Lowest free water mark: 1986560
Type: Name: SRAM, QFP: 0
Total: 0
InUse: 0
Free: 0
Lowest free water mark: 0
HSDC-DBN-RTR01# show platform resources
**State Acronym: H - Healthy, W - Warning, C - Critical
Resource Usage Max Warning Critical State
----------------------------------------------------------------------------------------------------
RP0 (ok, active) H
Control Processor 1.23% 100% 80% 90% H
DRAM 4143MB(6%) 63417MB 88% 93% H
bootflash 3969MB(58%) 6840MB 88% 93% H
harddisk 32MB(0%) 93836MB 88% 93% H
ESP0(ok, active) C
Control Processor 1.32% 100% 80% 90% H
DRAM 1253MB(3%) 32015MB 88% 93% H
QFP C
TCAM 64cells(0%) 1048576cells 65% 85% H
DRAM 3428372KB(40%) 8388608KB 85% 95% H
IRAM 129132KB(98%) 131072KB 85% 95% C
CPU Utilization 7.00% 100% 90% 95% H
Pkt Buf Mem (0) 67KB(0%) 524288KB 85% 95% H
Pkt Buf Mem (1) 67KB(0%) 524288KB 85% 95% H
Pkt Buf Mem (2) 67KB(0%) 524288KB 85% 95% H
Pkt Buf Mem (3) 67KB(0%) 524288KB 85% 95% H
SIP0 H
Control Processor 9.61% 100% 80% 90% H
DRAM 687MB(35%) 1955MB 88% 93% H
SIP1 H
Control Processor 3.20% 100% 80% 90% H
DRAM 626MB(32%) 1955MB 88% 93% H | ASR1009-X | 17.3.4a | 17.3.4a | 72.0 | 3 | 100.0 | Software Bug | ASR1000 | Router and IOS-XE Architecture | IOS-XE - NETCONF and RESTCONF and YANG | 01t6R000005tULsQAM | Configuration Assistance | IOS-XE - NETCONF and RESTCONF and YANG | Router and IOS-XE Architecture | 01t15000004dDisAAE | SHERLOCK: PARTIAL |
695146873 | Question: Which software version is principally discussed in these documents?
Answer "NONE" if you cannot find answer in the given documents.
The ONLY software version should be selected from the given software version list: 16.12.04/ NA - COMPONENT ONLY/ THIRD_PARTY_PRODUCT_SW/ NA - RMA/ 16.12.04/ 3.2.3o/ 15.0.2/ 16.06.07/ 16.12.03s/ 1/ 16.06.08/ 16.12.1s/ 17.03.05/ 16.12.4/ 16.9.5/ 16.12.01s/ PRODUCT_NOT_FOUND/ 16.3.5/ 16.12.3s/ 16.09.02/ 16.12.3a/ 16.12.1s/ 17.6.4 Response in this JSON format:
{"software_version": "","explanation": "", "summary": ""}
Closed
Technology: LAN Switching
Subtechnology: Cat9300
Problem Code: Error Messages, Logs, Debugs
Product: NA
Product Family: C9300
Software Version: N/A
Router/Node Name: N/A
Problem Details: Server rebooted automatically due to critical software exception. Would like to confirm the cause.
Server rebooted automatically due to critical software exception. Would like to confirm the cause.
Thanks you for sharing the show tech and the system report files.
Hardware : C9300-48U
Software : 16.12.04
------------------ show logging onboard switch 1 uptime detail ------------------
--------------------------------------------------------------------------------
UPTIME SUMMARY INFORMATION
--------------------------------------------------------------------------------
First customer power on : 03/13/2021 04:48:04
Total uptime : 1 years 36 weeks 5 days 11 hours 21 minutes
Total downtime : 0 years 13 weeks 4 days 10 hours 10 minutes
Number of resets : 16
Number of slot changes : 0
Current reset reason : Critical software exception
Current reset timestamp : 02/24/2023 16:20:01
Current slot : 1
Chassis type : 99
Current uptime : 0 years 0 weeks 4 days 10 hours 0 minutes
--------------------------------------------------------------------------------
Decoded stack traces:
1. 0x56053df14014 <BE> access_tunnel_oqueue
2. 0x5605403754ce <BE> datagram_out
3. 0x56053de73413 <BE> pm_vlan_bridge_or_compute_port_set
4. 0x56053de735ed <BE> pm_vlan_bridge_packet
5. 0x56053df881e6 <BE> arp_snoop_process
From the decoded stack traces looks like we are hitting the below defect:
https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvu93346<https://ddec1-0-en-ctp.trendmicro.com:443/wis/clicktime/v1/query?url=https%3a%2f%2fapc01.safelinks.protection.outlook.com%2f%3furl%3dhttps%253A%252F%252Fddec1%2d0%2den%2dctp.trendmicro.com%252Fwis%252Fclicktime%252Fv1%252Fquery%253Furl%253Dhttps%25253a%25252f%25252fapc01.safelinks.protection.outlook.com%25252f%25253furl%25253dhttps%2525253A%2525252F%2525252Fbst.cloudapps.cisco.com%2525252Fbugsearch%2525252Fbug%2525252FCSCvu93346%252526data%25253d05%2525257C01%2525257Ckeane.phua.caijun%25252540ncs.com.sg%2525257C5fa4762486cb4121d02f08db1f989197%2525257Cca90d8f589634b6ebca99ac468bcc7a8%2525257C1%2525257C0%2525257C638138512367379254%2525257CUnknown%2525257CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%2525253D%2525257C3000%2525257C%2525257C%2525257C%252526sdata%25253d20QWTMRQAf9JUG5ddM0%2525252FhzKGlOBzdODQSVwwTTXgbes%2525253D%252526reserved%25253d0%2526umid%253D7534ffb8%2de466%2d4e12%2da569%2d231f9b03e0e1%2526auth%253D32813f2e647ebb91b39d0b35ac97db1efa82dd64%2d097b8edbb06a5ebfbc12c8981b429ff594e539d1%26data%3d05%257C01%257Cgeorgekingsley.paulsundararaj%2540ncs.com.sg%257Cc6e89c2ed32e4d21c91208db1f9bf30a%257Cca90d8f589634b6ebca99ac468bcc7a8%257C1%257C0%257C638138526885301089%257CUnknown%257CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%253D%257C3000%257C%257C%257C%26sdata%3dEmVZCmiW9o0%252FLqF7AmsAZOQoAWcm1JDQusNWxScP3t0%253D%26reserved%3d0&umid=48f669ec-c0e9-4e2c-b663-a06eb2569ec1&auth=32813f2e647ebb91b39d0b35ac97db1efa82dd64-563a432c0d33496048faedcfe67aae8255142649>;
You can also find the known fixed releases for this bug from the known fixed releases box, and the only way to mitigate this bug will be by upgrading the device to known fixed release.
The crash is happening after DNAC makes some interface changes and pushes to the switch's configuration. | Question: Which product is principally discussed in these documents?
Answer "NONE" if you cannot find answer in the given documents.
The ONLY product name should be selected from the given product name list: C9300-48U-A/ C9300-48U/ THIRD_PARTY_PRODUCT_HW/ UCS-FI-6454/ C9300-NM-8X/ PWR-C1-1100WAC Response in this JSON format:
{"product_name": "","explanation": "", "summary": ""}
Technology: LAN Switching
Subtechnology: Cat9300
Problem Code: Error Messages, Logs, Debugs
Product: NA
Product Family: C9300
Software Version: N/A
Router/Node Name: N/A
Problem Details: Server rebooted automatically due to critical software exception. Would like to confirm the cause.
Server rebooted automatically due to critical software exception. Would like to confirm the cause.
Thanks you for sharing the show tech and the system report files.
Hardware : C9300-48U
Software : 16.12.04
------------------ show logging onboard switch 1 uptime detail ------------------
--------------------------------------------------------------------------------
UPTIME SUMMARY INFORMATION
--------------------------------------------------------------------------------
First customer power on : 03/13/2021 04:48:04
Total uptime : 1 years 36 weeks 5 days 11 hours 21 minutes
Total downtime : 0 years 13 weeks 4 days 10 hours 10 minutes
Number of resets : 16
Number of slot changes : 0
Current reset reason : Critical software exception
Current reset timestamp : 02/24/2023 16:20:01
Current slot : 1
Chassis type : 99
Current uptime : 0 years 0 weeks 4 days 10 hours 0 minutes
--------------------------------------------------------------------------------
Decoded stack traces:
1. 0x56053df14014 <BE> access_tunnel_oqueue
2. 0x5605403754ce <BE> datagram_out
3. 0x56053de73413 <BE> pm_vlan_bridge_or_compute_port_set
4. 0x56053de735ed <BE> pm_vlan_bridge_packet
5. 0x56053df881e6 <BE> arp_snoop_process
From the decoded stack traces looks like we are hitting the below defect:
https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvu93346<https://ddec1-0-en-ctp.trendmicro.com:443/wis/clicktime/v1/query?url=https%3a%2f%2fapc01.safelinks.protection.outlook.com%2f%3furl%3dhttps%253A%252F%252Fddec1%2d0%2den%2dctp.trendmicro.com%252Fwis%252Fclicktime%252Fv1%252Fquery%253Furl%253Dhttps%25253a%25252f%25252fapc01.safelinks.protection.outlook.com%25252f%25253furl%25253dhttps%2525253A%2525252F%2525252Fbst.cloudapps.cisco.com%2525252Fbugsearch%2525252Fbug%2525252FCSCvu93346%252526data%25253d05%2525257C01%2525257Ckeane.phua.caijun%25252540ncs.com.sg%2525257C5fa4762486cb4121d02f08db1f989197%2525257Cca90d8f589634b6ebca99ac468bcc7a8%2525257C1%2525257C0%2525257C638138512367379254%2525257CUnknown%2525257CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%2525253D%2525257C3000%2525257C%2525257C%2525257C%252526sdata%25253d20QWTMRQAf9JUG5ddM0%2525252FhzKGlOBzdODQSVwwTTXgbes%2525253D%252526reserved%25253d0%2526umid%253D7534ffb8%2de466%2d4e12%2da569%2d231f9b03e0e1%2526auth%253D32813f2e647ebb91b39d0b35ac97db1efa82dd64%2d097b8edbb06a5ebfbc12c8981b429ff594e539d1%26data%3d05%257C01%257Cgeorgekingsley.paulsundararaj%2540ncs.com.sg%257Cc6e89c2ed32e4d21c91208db1f9bf30a%257Cca90d8f589634b6ebca99ac468bcc7a8%257C1%257C0%257C638138526885301089%257CUnknown%257CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%253D%257C3000%257C%257C%257C%26sdata%3dEmVZCmiW9o0%252FLqF7AmsAZOQoAWcm1JDQusNWxScP3t0%253D%26reserved%3d0&umid=48f669ec-c0e9-4e2c-b663-a06eb2569ec1&auth=32813f2e647ebb91b39d0b35ac97db1efa82dd64-563a432c0d33496048faedcfe67aae8255142649>;
You can also find the known fixed releases for this bug from the known fixed releases box, and the only way to mitigate this bug will be by upgrading the device to known fixed release.
The crash is happening after DNAC makes some interface changes and pushes to the switch's configuration. | Technology: LAN Switching
Subtechnology: Cat9300
Problem Code: Error Messages, Logs, Debugs
Product: NA
Product Family: C9300
Software Version: N/A
Router/Node Name: N/A
Problem Details: Server rebooted automatically due to critical software exception. Would like to confirm the cause. | Server rebooted automatically due to critical software exception. Would like to confirm the cause. | Thanks you for sharing the show tech and the system report files.
Hardware : C9300-48U
Software : 16.12.04
------------------ show logging onboard switch 1 uptime detail ------------------
--------------------------------------------------------------------------------
UPTIME SUMMARY INFORMATION
--------------------------------------------------------------------------------
First customer power on : 03/13/2021 04:48:04
Total uptime : 1 years 36 weeks 5 days 11 hours 21 minutes
Total downtime : 0 years 13 weeks 4 days 10 hours 10 minutes
Number of resets : 16
Number of slot changes : 0
Current reset reason : Critical software exception
Current reset timestamp : 02/24/2023 16:20:01
Current slot : 1
Chassis type : 99
Current uptime : 0 years 0 weeks 4 days 10 hours 0 minutes
--------------------------------------------------------------------------------
Decoded stack traces:
1. 0x56053df14014 <BE> access_tunnel_oqueue
2. 0x5605403754ce <BE> datagram_out
3. 0x56053de73413 <BE> pm_vlan_bridge_or_compute_port_set
4. 0x56053de735ed <BE> pm_vlan_bridge_packet
5. 0x56053df881e6 <BE> arp_snoop_process
From the decoded stack traces looks like we are hitting the below defect:
https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvu93346<https://ddec1-0-en-ctp.trendmicro.com:443/wis/clicktime/v1/query?url=https%3a%2f%2fapc01.safelinks.protection.outlook.com%2f%3furl%3dhttps%253A%252F%252Fddec1%2d0%2den%2dctp.trendmicro.com%252Fwis%252Fclicktime%252Fv1%252Fquery%253Furl%253Dhttps%25253a%25252f%25252fapc01.safelinks.protection.outlook.com%25252f%25253furl%25253dhttps%2525253A%2525252F%2525252Fbst.cloudapps.cisco.com%2525252Fbugsearch%2525252Fbug%2525252FCSCvu93346%252526data%25253d05%2525257C01%2525257Ckeane.phua.caijun%25252540ncs.com.sg%2525257C5fa4762486cb4121d02f08db1f989197%2525257Cca90d8f589634b6ebca99ac468bcc7a8%2525257C1%2525257C0%2525257C638138512367379254%2525257CUnknown%2525257CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%2525253D%2525257C3000%2525257C%2525257C%2525257C%252526sdata%25253d20QWTMRQAf9JUG5ddM0%2525252FhzKGlOBzdODQSVwwTTXgbes%2525253D%252526reserved%25253d0%2526umid%253D7534ffb8%2de466%2d4e12%2da569%2d231f9b03e0e1%2526auth%253D32813f2e647ebb91b39d0b35ac97db1efa82dd64%2d097b8edbb06a5ebfbc12c8981b429ff594e539d1%26data%3d05%257C01%257Cgeorgekingsley.paulsundararaj%2540ncs.com.sg%257Cc6e89c2ed32e4d21c91208db1f9bf30a%257Cca90d8f589634b6ebca99ac468bcc7a8%257C1%257C0%257C638138526885301089%257CUnknown%257CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%253D%257C3000%257C%257C%257C%26sdata%3dEmVZCmiW9o0%252FLqF7AmsAZOQoAWcm1JDQusNWxScP3t0%253D%26reserved%3d0&umid=48f669ec-c0e9-4e2c-b663-a06eb2569ec1&auth=32813f2e647ebb91b39d0b35ac97db1efa82dd64-563a432c0d33496048faedcfe67aae8255142649>;
You can also find the known fixed releases for this bug from the known fixed releases box, and the only way to mitigate this bug will be by upgrading the device to known fixed release.
The crash is happening after DNAC makes some interface changes and pushes to the switch's configuration. | Cisco Switch rebooted | C9300-48U-A | 16.12.4 | 16.12.4 | 73.0 | 3 | 100.0 | Software Bug | C9300 | LAN Switching | Cat9300 | 01t1C000006fIcDQAU | Error Messages, Logs, Debugs | Cat9300 | LAN Switching | 01t15000005W0LTAA0 | SHERLOCK: PARTIAL |
695503784 | Question: Which software version is principally discussed in these documents?
Answer "NONE" if you cannot find answer in the given documents.
The ONLY software version should be selected from the given software version list: NA - COMPONENT ONLY/ 16.12.3s/ 2.3.3.3/ 17.6.4/ 16.12.4/ 2.2.2.5/ 1.3.3.6/ 16.12.03s/ 16.12.01s/ 16.12.04/ 16.12.1s/ 2.2.3.3/ THIRD_PARTY_PRODUCT_SW/ 16.12.1s/ 1.3.3.7/ 1.3.3.9/ 2.3.3.7/ 2.1.2.7/ 2.2.3.6/ 17.06.02 Response in this JSON format:
{"software_version": "","explanation": "", "summary": ""}
Technology: Router and IOS-XE Architecture
Subtechnology: IOS-XEISSU Upgrade
Problem Code: Install, uninstall, or Upgrade
Product: NA
Product Family: ASR1000
Software Version: N/A
Router/Node Name: N/A
Problem Details: TAC Support for SDA Fabric Border Nodes upgrade from 16.12.1s to 17.6.4
Issue SRs: 692159335, 693041357, 693101485
Change start time: 13-May-2023 19:00 SGT (07:00 PM SGT)
TAC Support for SDA Fabric Border Nodes upgrade from 16.12.1s to 17.6.4
Issue SRs: 692159335, 693041357, 693101485
Change start time: 13-May-2023 19:00 SGT (07:00 PM SGT)
CSCwf44649 - Customer was hitting the following bug - after multiple MW we were able to get them past the issue and successfully update their fabric | Question: Which product is principally discussed in these documents?
Answer "NONE" if you cannot find answer in the given documents.
The ONLY product name should be selected from the given product name list: DN2-HW-APL-XL/ ASR1009-X/ C9300-48U/ DN1-HW-APL/ C9500-48Y4C/ THIRD_PARTY_PRODUCT_HW/ C9300-48U-A/ ASR1002-HX Response in this JSON format:
{"product_name": "","explanation": "", "summary": ""}
Technology: Router and IOS-XE Architecture
Subtechnology: IOS-XEISSU Upgrade
Problem Code: Install, uninstall, or Upgrade
Product: NA
Product Family: ASR1000
Software Version: N/A
Router/Node Name: N/A
Problem Details: TAC Support for SDA Fabric Border Nodes upgrade from 16.12.1s to 17.6.4
Issue SRs: 692159335, 693041357, 693101485
Change start time: 13-May-2023 19:00 SGT (07:00 PM SGT)
TAC Support for SDA Fabric Border Nodes upgrade from 16.12.1s to 17.6.4
Issue SRs: 692159335, 693041357, 693101485
Change start time: 13-May-2023 19:00 SGT (07:00 PM SGT)
CSCwf44649 - Customer was hitting the following bug - after multiple MW we were able to get them past the issue and successfully update their fabric | Technology: Router and IOS-XE Architecture
Subtechnology: IOS-XEISSU Upgrade
Problem Code: Install, uninstall, or Upgrade
Product: NA
Product Family: ASR1000
Software Version: N/A
Router/Node Name: N/A
Problem Details: TAC Support for SDA Fabric Border Nodes upgrade from 16.12.1s to 17.6.4
Issue SRs: 692159335, 693041357, 693101485
Change start time: 13-May-2023 19:00 SGT (07:00 PM SGT) | TAC Support for SDA Fabric Border Nodes upgrade from 16.12.1s to 17.6.4
Issue SRs: 692159335, 693041357, 693101485
Change start time: 13-May-2023 19:00 SGT (07:00 PM SGT) | CSCwf44649 - Customer was hitting the following bug - after multiple MW we were able to get them past the issue and successfully update their fabric | Customer requires TAC Support to complete a software upgrade for SDA Fabric Border Nodes from 16.12.1s > 17.6.4.
Issue is similar to SRs: 692159335, 693041357, 693101485
Change start time: 13-May-2023 19:00 SGT (07:00 PM SGT) | ASR1009-X | 17.6.4 | 17.6.4 | 37.0 | 3 | 100.0 | Software -not a bug (scalability, version selection, install/upgrade help...) | ASR1000 | Cisco DNA Center - On-Prem | Cisco Software-Defined Access (SDA Wired) | 01t6R000006k8PsQAI | Install, uninstall, or Upgrade | Cisco Software-Defined Access (SDA Wired) | Cisco DNA Center - On-Prem | 01t15000004dDisAAE | SHERLOCK: PARTIAL;CaseClosureFieldAutomation: Partial |
694745866 | Question: Which software version is principally discussed in these documents?
Answer "NONE" if you cannot find answer in the given documents.
The ONLY software version should be selected from the given software version list: NA - COMPONENT ONLY/ 16.12.3s/ 2.3.3.3/ 17.6.4/ 16.12.4/ 2.2.2.5/ 1.3.3.6/ 16.12.03s/ 16.12.01s/ 16.12.04/ 16.12.1s/ 2.2.3.3/ THIRD_PARTY_PRODUCT_SW/ 16.12.1s/ 1.3.3.7/ 1.3.3.9/ 2.3.3.7/ 2.1.2.7/ 2.2.3.6/ 17.06.02 Response in this JSON format:
{"software_version": "","explanation": "", "summary": ""}
Closed
Technology: Cisco DNA Center - On-Prem
Subtechnology: Cisco Software-Defined Access (SDA Wired)
Problem Code: Error Messages, Logs, Debugs
Product: NA
Product Family: C9300
Software Version: N/A
Router/Node Name: N/A
Problem Details: SDA FE - Specific VLAN Anycast Gateway not reachable for connected endpoints
Device-tracking pointing to wrong MAC address and Tunnel Interface
H20-01-CNT-ES1#sh device-tracking data address 172.27.64.1
Codes: L - Local, S - Static, ND - Neighbor Discovery, ARP - Address Resolution Protocol, DH4 - IPv4 DHCP, DH6 - IPv6 DHCP, PKT - Other Packet, API - API created
Preflevel flags (prlvl):
0001:MAC and LLA match 0002:Orig trunk 0004:Orig access
0008:Orig trusted trunk 0010:Orig trusted access 0020:DHCP assigned
0040:Cga authenticated 0080:Cert authenticated 0100:Statically assigned
Network Layer Address Link Layer Address Interface vlan prlvl age state Time left
ARP 172.27.64.1 bce7.122d.408a Tu0 1071 0005 102s REACHABLE 143 s
H20-01-CNT-ES1#show ip arp vrf admin_VN vlan 1071
Protocol Address Age (min) Hardware Addr Type Interface
Internet 172.27.64.1 - 0000.0c9f.f48e ARPA Vlan1071
1071 0000.0c9f.f48e CP_LEARN Tu0
SDA FE - Specific VLAN Anycast Gateway not reachable for connected endpoints
Device-tracking pointing to wrong MAC address and Tunnel Interface
H20-01-CNT-ES1#sh device-tracking data address 172.27.64.1
Codes: L - Local, S - Static, ND - Neighbor Discovery, ARP - Address Resolution Protocol, DH4 - IPv4 DHCP, DH6 - IPv6 DHCP, PKT - Other Packet, API - API created
Preflevel flags (prlvl):
0001:MAC and LLA match 0002:Orig trunk 0004:Orig access
0008:Orig trusted trunk 0010:Orig trusted access 0020:DHCP assigned
0040:Cga authenticated 0080:Cert authenticated 0100:Statically assigned
Network Layer Address Link Layer Address Interface vlan prlvl age state Time left
ARP 172.27.64.1 bce7.122d.408a Tu0 1071 0005 102s REACHABLE 143 s
H20-01-CNT-ES1#show ip arp vrf admin_VN vlan 1071
Protocol Address Age (min) Hardware Addr Type Interface
Internet 172.27.64.1 - 0000.0c9f.f48e ARPA Vlan1071
1071 0000.0c9f.f48e CP_LEARN Tu0
1. CSCvq05985 Since we are seeing DT pointing to Tunnel0 or any random interface
Workaround –
a. Clear device-tracking database mac <>
b. Device-tracking database binding vlan <vlan no > <svi ip> interface vlan <vlan no> <mac>
Or
c. Upgrade to fixed release.
2. CSCvm86310 Since there were some DT entries pointing to 0000.0000.00fd mac
Unfortunately there is no workaround for this. I checked for customer cases where this issue was hit and the clearing device-tracking/ resetting the SVI resolved the issue. | Question: Which product is principally discussed in these documents?
Answer "NONE" if you cannot find answer in the given documents.
The ONLY product name should be selected from the given product name list: DN2-HW-APL-XL/ ASR1009-X/ C9300-48U/ DN1-HW-APL/ C9500-48Y4C/ THIRD_PARTY_PRODUCT_HW/ C9300-48U-A/ ASR1002-HX Response in this JSON format:
{"product_name": "","explanation": "", "summary": ""}
Technology: Cisco DNA Center - On-Prem
Subtechnology: Cisco Software-Defined Access (SDA Wired)
Problem Code: Error Messages, Logs, Debugs
Product: NA
Product Family: C9300
Software Version: N/A
Router/Node Name: N/A
Problem Details: SDA FE - Specific VLAN Anycast Gateway not reachable for connected endpoints
Device-tracking pointing to wrong MAC address and Tunnel Interface
H20-01-CNT-ES1#sh device-tracking data address 172.27.64.1
Codes: L - Local, S - Static, ND - Neighbor Discovery, ARP - Address Resolution Protocol, DH4 - IPv4 DHCP, DH6 - IPv6 DHCP, PKT - Other Packet, API - API created
Preflevel flags (prlvl):
0001:MAC and LLA match 0002:Orig trunk 0004:Orig access
0008:Orig trusted trunk 0010:Orig trusted access 0020:DHCP assigned
0040:Cga authenticated 0080:Cert authenticated 0100:Statically assigned
Network Layer Address Link Layer Address Interface vlan prlvl age state Time left
ARP 172.27.64.1 bce7.122d.408a Tu0 1071 0005 102s REACHABLE 143 s
H20-01-CNT-ES1#show ip arp vrf admin_VN vlan 1071
Protocol Address Age (min) Hardware Addr Type Interface
Internet 172.27.64.1 - 0000.0c9f.f48e ARPA Vlan1071
1071 0000.0c9f.f48e CP_LEARN Tu0
SDA FE - Specific VLAN Anycast Gateway not reachable for connected endpoints
Device-tracking pointing to wrong MAC address and Tunnel Interface
H20-01-CNT-ES1#sh device-tracking data address 172.27.64.1
Codes: L - Local, S - Static, ND - Neighbor Discovery, ARP - Address Resolution Protocol, DH4 - IPv4 DHCP, DH6 - IPv6 DHCP, PKT - Other Packet, API - API created
Preflevel flags (prlvl):
0001:MAC and LLA match 0002:Orig trunk 0004:Orig access
0008:Orig trusted trunk 0010:Orig trusted access 0020:DHCP assigned
0040:Cga authenticated 0080:Cert authenticated 0100:Statically assigned
Network Layer Address Link Layer Address Interface vlan prlvl age state Time left
ARP 172.27.64.1 bce7.122d.408a Tu0 1071 0005 102s REACHABLE 143 s
H20-01-CNT-ES1#show ip arp vrf admin_VN vlan 1071
Protocol Address Age (min) Hardware Addr Type Interface
Internet 172.27.64.1 - 0000.0c9f.f48e ARPA Vlan1071
1071 0000.0c9f.f48e CP_LEARN Tu0
1. CSCvq05985 Since we are seeing DT pointing to Tunnel0 or any random interface
Workaround –
a. Clear device-tracking database mac <>
b. Device-tracking database binding vlan <vlan no > <svi ip> interface vlan <vlan no> <mac>
Or
c. Upgrade to fixed release.
2. CSCvm86310 Since there were some DT entries pointing to 0000.0000.00fd mac
Unfortunately there is no workaround for this. I checked for customer cases where this issue was hit and the clearing device-tracking/ resetting the SVI resolved the issue. | Technology: Cisco DNA Center - On-Prem
Subtechnology: Cisco Software-Defined Access (SDA Wired)
Problem Code: Error Messages, Logs, Debugs
Product: NA
Product Family: C9300
Software Version: N/A
Router/Node Name: N/A
Problem Details: SDA FE - Specific VLAN Anycast Gateway not reachable for connected endpoints
Device-tracking pointing to wrong MAC address and Tunnel Interface
H20-01-CNT-ES1#sh device-tracking data address 172.27.64.1
Codes: L - Local, S - Static, ND - Neighbor Discovery, ARP - Address Resolution Protocol, DH4 - IPv4 DHCP, DH6 - IPv6 DHCP, PKT - Other Packet, API - API created
Preflevel flags (prlvl):
0001:MAC and LLA match 0002:Orig trunk 0004:Orig access
0008:Orig trusted trunk 0010:Orig trusted access 0020:DHCP assigned
0040:Cga authenticated 0080:Cert authenticated 0100:Statically assigned
Network Layer Address Link Layer Address Interface vlan prlvl age state Time left
ARP 172.27.64.1 bce7.122d.408a Tu0 1071 0005 102s REACHABLE 143 s
H20-01-CNT-ES1#show ip arp vrf admin_VN vlan 1071
Protocol Address Age (min) Hardware Addr Type Interface
Internet 172.27.64.1 - 0000.0c9f.f48e ARPA Vlan1071
1071 0000.0c9f.f48e CP_LEARN Tu0 | SDA FE - Specific VLAN Anycast Gateway not reachable for connected endpoints
Device-tracking pointing to wrong MAC address and Tunnel Interface
H20-01-CNT-ES1#sh device-tracking data address 172.27.64.1
Codes: L - Local, S - Static, ND - Neighbor Discovery, ARP - Address Resolution Protocol, DH4 - IPv4 DHCP, DH6 - IPv6 DHCP, PKT - Other Packet, API - API created
Preflevel flags (prlvl):
0001:MAC and LLA match 0002:Orig trunk 0004:Orig access
0008:Orig trusted trunk 0010:Orig trusted access 0020:DHCP assigned
0040:Cga authenticated 0080:Cert authenticated 0100:Statically assigned
Network Layer Address Link Layer Address Interface vlan prlvl age state Time left
ARP 172.27.64.1 bce7.122d.408a Tu0 1071 0005 102s REACHABLE 143 s
H20-01-CNT-ES1#show ip arp vrf admin_VN vlan 1071
Protocol Address Age (min) Hardware Addr Type Interface
Internet 172.27.64.1 - 0000.0c9f.f48e ARPA Vlan1071
1071 0000.0c9f.f48e CP_LEARN Tu0 | 1. CSCvq05985 Since we are seeing DT pointing to Tunnel0 or any random interface
Workaround –
a. Clear device-tracking database mac <>
b. Device-tracking database binding vlan <vlan no > <svi ip> interface vlan <vlan no> <mac>
Or
c. Upgrade to fixed release.
2. CSCvm86310 Since there were some DT entries pointing to 0000.0000.00fd mac
Unfortunately there is no workaround for this. I checked for customer cases where this issue was hit and the clearing device-tracking/ resetting the SVI resolved the issue. | - Endpoints are not able to reach specific VLAN gateway.
- Customer observes that device tracking database entry for this gateway is pointing incorrectly to an unrelated interface.
```
H20-01-CNT-ES1#sh device-tracking data address 172.27.64.1
Codes: L - Local, S - Static, ND - Neighbor Discovery, ARP - Address Resolution Protocol, DH4 - IPv4 DHCP, DH6 - IPv6 DHCP, PKT - Other Packet, API - API created
Preflevel flags (prlvl):
0001:MAC and LLA match 0002:Orig trunk 0004:Orig access
0008:Orig trusted trunk 0010:Orig trusted access 0020:DHCP assigned
0040:Cga authenticated 0080:Cert authenticated 0100:Statically assigned
Network Layer Address Link Layer Address Interface vlan prlvl age state Time left
ARP 172.27.64.1 bce7.122d.408a Tu0 1071 0005 102s REACHABLE 143 s
H20-01-CNT-ES1#show ip arp vrf admin_VN vlan 1071
Protocol Address Age (min) Hardware Addr Type Interface
Internet 172.27.64.1 - 0000.0c9f.f48e ARPA Vlan1071
``` | C9300-48U-A | 16.12.4 | 16.12.4 | 77.0 | 3 | 100.0 | Software Bug | C9300 | Cisco DNA Center - On-Prem | Cisco Software-Defined Access (SDA Wired) | 01t1C000006fIcDQAU | Error Messages, Logs, Debugs | Cisco Software-Defined Access (SDA Wired) | Cisco DNA Center - On-Prem | 01t15000005W0LTAA0 | nan |
694540632 | Question: Which software version is principally discussed in these documents?
Answer "NONE" if you cannot find answer in the given documents.
The ONLY software version should be selected from the given software version list: 16.12.04/ NA - COMPONENT ONLY/ THIRD_PARTY_PRODUCT_SW/ NA - RMA/ 16.12.04/ 3.2.3o/ 15.0.2/ 16.06.07/ 16.12.03s/ 1/ 16.06.08/ 16.12.1s/ 17.03.05/ 16.12.4/ 16.9.5/ 16.12.01s/ PRODUCT_NOT_FOUND/ 16.3.5/ 16.12.3s/ 16.09.02/ 16.12.3a/ 16.12.1s/ 17.6.4 Response in this JSON format:
{"software_version": "","explanation": "", "summary": ""}
Closed
Technology: LAN Switching
Subtechnology: Cat9300
Problem Code: Error Messages, Logs, Debugs
Product: NA
Product Family: C9300
Software Version: N/A
Router/Node Name: N/A
Problem Details: We found UP link is UP but switch was unreachable. OSPF was down. uplink ports shows green light. service also get down.
We found UP link is UP but switch was unreachable. OSPF was down. uplink ports shows green light. service also get down.
+++ As per logs. I don’t see any error related to behaviour we observed on the switch .
+++ Ideally such behaviour could have been result of memory leak, switch getting stuck in state, hardware programming error , or any unknown bugs.
+++ Since we had reloaded without collecting logs which needed to pin point such cases , we will not be able to proceed further .
+++ My best suggestion here would be to upgrade the Switch to latest stable code so that we can avoid any old known issue on 16.12.3.
Below is latest Stable Cisco Suggested code for this Switch ,
https://software.cisco.com/download/home/286314027/type/282046477/release/Bengaluru-17.6.4 | Question: Which product is principally discussed in these documents?
Answer "NONE" if you cannot find answer in the given documents.
The ONLY product name should be selected from the given product name list: C9300-48U-A/ C9300-48U/ THIRD_PARTY_PRODUCT_HW/ UCS-FI-6454/ C9300-NM-8X/ PWR-C1-1100WAC Response in this JSON format:
{"product_name": "","explanation": "", "summary": ""}
Technology: LAN Switching
Subtechnology: Cat9300
Problem Code: Error Messages, Logs, Debugs
Product: NA
Product Family: C9300
Software Version: N/A
Router/Node Name: N/A
Problem Details: We found UP link is UP but switch was unreachable. OSPF was down. uplink ports shows green light. service also get down.
We found UP link is UP but switch was unreachable. OSPF was down. uplink ports shows green light. service also get down.
+++ As per logs. I don’t see any error related to behaviour we observed on the switch .
+++ Ideally such behaviour could have been result of memory leak, switch getting stuck in state, hardware programming error , or any unknown bugs.
+++ Since we had reloaded without collecting logs which needed to pin point such cases , we will not be able to proceed further .
+++ My best suggestion here would be to upgrade the Switch to latest stable code so that we can avoid any old known issue on 16.12.3.
Below is latest Stable Cisco Suggested code for this Switch ,
https://software.cisco.com/download/home/286314027/type/282046477/release/Bengaluru-17.6.4 | Technology: LAN Switching
Subtechnology: Cat9300
Problem Code: Error Messages, Logs, Debugs
Product: NA
Product Family: C9300
Software Version: N/A
Router/Node Name: N/A
Problem Details: We found UP link is UP but switch was unreachable. OSPF was down. uplink ports shows green light. service also get down. | We found UP link is UP but switch was unreachable. OSPF was down. uplink ports shows green light. service also get down. | +++ As per logs. I don’t see any error related to behaviour we observed on the switch .
+++ Ideally such behaviour could have been result of memory leak, switch getting stuck in state, hardware programming error , or any unknown bugs.
+++ Since we had reloaded without collecting logs which needed to pin point such cases , we will not be able to proceed further .
+++ My best suggestion here would be to upgrade the Switch to latest stable code so that we can avoid any old known issue on 16.12.3.
Below is latest Stable Cisco Suggested code for this Switch ,
https://software.cisco.com/download/home/286314027/type/282046477/release/Bengaluru-17.6.4 | We found UP link is UP but switch was unreachable. OSPF was down. uplink ports shows green light. service also get down. | C9300-48U-A | 16.12.3s | 16.12.3s | 79.0 | 3 | 100.0 | Software -not a bug (scalability, version selection, install/upgrade help...) | C9300 | LAN Switching | Cat9300 | 01t1C000004GjbyQAC | Error Messages, Logs, Debugs | Cat9300 | LAN Switching | 01t15000005W0LTAA0 | nan |
694515784 | Question: Which software version is principally discussed in these documents?
Answer "NONE" if you cannot find answer in the given documents.
The ONLY software version should be selected from the given software version list: 1/ 8.10.151.0/ 8.10.171.0/ 802.11AC/ 8.5.171.0/ 8.10.183.0/ 8.10.130.0/ 8.10.171.0/ THIRD_PARTY_PRODUCT_SW/ 8.5.135.0/ 8.3.143.0/ NA-CIN_CLOSE_SW/ 8.5.140.0/ 4.0.1a/ WLC CLIENT INTEROP/ 12.0.13/ 8.5.151.0/ 8.4/ 120.13/ 8.5.160.0/ 8.10.151.0/ 8.3.143.0/ 8.3.131.0/ 8.3.150.0/ 8.5.135.0/ 8.5.161.0/ 8.10.185.0/ 8.2.166.0/ 8.5.140.0/ 8.5.151.0/ 8.3.150.0/ 16.12.3s/ WLC RRM/RF/CLEANAIR/ 8.5.151.0/ 8.10.130.0/ NA - COMPONENT ONLY/ 8.10.162.0/ 8.3.140.0/ 8.10.150.0/ 8.10.183.0/ 8.10.161.0/ 8.10.185.0/ 8.5.151.0/ 16.12.4/ 17.3.5b/ 8.10.183.0/ 8.10.171.0/ 8.5.171.0 Response in this JSON format:
{"software_version": "","explanation": "", "summary": ""}
Closed
Technology: Wireless
Subtechnology: 8540 Series Wireless LAN Controller (AIR-CT8540)
Problem Code: Error Messages, Logs, Debugs
Product: NA
Product Family: AIRCTA2
Software Version: N/A
Router/Node Name: N/A
Problem Details: SDA - AP disconnected from WLC alert on DNAC
SDA - AP disconnected from WLC alert on DNAC
Customer gaev confirmation on the closure | Question: Which product is principally discussed in these documents?
Answer "NONE" if you cannot find answer in the given documents.
The ONLY product name should be selected from the given product name list: AIR-CT8540-1K-K9/ AIR-CT8540-K9/ NA-CIN_CLOSE_HW/ C9120AXI-S/ THIRD_PARTY_PRODUCT_HW/ AIR-CT8540-CA-K9/ AIR-AP2802I-S-K9/ AIR-CT8540-K9Z/ AIR-BZL-C240M4/ DN2-HW-APL-XL/ WLC-AP-T/ AIR-CT8540-SW-8.2 Response in this JSON format:
{"product_name": "","explanation": "", "summary": ""}
Technology: Wireless
Subtechnology: 8540 Series Wireless LAN Controller (AIR-CT8540)
Problem Code: Error Messages, Logs, Debugs
Product: NA
Product Family: AIRCTA2
Software Version: N/A
Router/Node Name: N/A
Problem Details: SDA - AP disconnected from WLC alert on DNAC
SDA - AP disconnected from WLC alert on DNAC
Customer gaev confirmation on the closure | Technology: Wireless
Subtechnology: 8540 Series Wireless LAN Controller (AIR-CT8540)
Problem Code: Error Messages, Logs, Debugs
Product: NA
Product Family: AIRCTA2
Software Version: N/A
Router/Node Name: N/A
Problem Details: SDA - AP disconnected from WLC alert on DNAC | SDA - AP disconnected from WLC alert on DNAC | Customer gaev confirmation on the closure | SDA - AP disconnected from WLC alert on DNAC | AIR-CT8540-K9 | 17.3.5b | 17.3.5b | 53.0 | 3 | 100.0 | Interoperability/Compatibility (Cisco to Cisco or Cisco to 3rd Party) | AIRCTA2 | Wireless | 8540 Series Wireless LAN Controller (AIR-CT8540) | 01t6R000006k5BEQAY | Error Messages, Logs, Debugs | 8540 Series Wireless LAN Controller (AIR-CT8540) | Wireless | 01t15000004n996AAA | SHERLOCK: PARTIAL |
694180958 | Question: Which software version is principally discussed in these documents?
Answer "NONE" if you cannot find answer in the given documents.
The ONLY software version should be selected from the given software version list: 16.12.04/ NA - COMPONENT ONLY/ THIRD_PARTY_PRODUCT_SW/ NA - RMA/ 16.12.04/ 3.2.3o/ 15.0.2/ 16.06.07/ 16.12.03s/ 1/ 16.06.08/ 16.12.1s/ 17.03.05/ 16.12.4/ 16.9.5/ 16.12.01s/ PRODUCT_NOT_FOUND/ 16.3.5/ 16.12.3s/ 16.09.02/ 16.12.3a/ 16.12.1s/ 17.6.4 Response in this JSON format:
{"software_version": "","explanation": "", "summary": ""}
Closed
Technology: LAN Switching
Subtechnology: Cat9300
Problem Code: Error Messages, Logs, Debugs
Product: NA
Product Family: C9300
Software Version: N/A
Router/Node Name: N/A
Problem Details: Switch CPU high and ospf neighbor flapping and neighbor frequently down.
Switch CPU high and ospf neighbor flapping and neighbor frequently down.
W have seen high cpu and ospf flapp
We suggested cli. To get top cpu results
Sw(config)# process cpu threshold type total rising 70 interval 5 falling 50 interval 5
After monitoring we see that the device is stable | Question: Which product is principally discussed in these documents?
Answer "NONE" if you cannot find answer in the given documents.
The ONLY product name should be selected from the given product name list: C9300-48U-A/ C9300-48U/ THIRD_PARTY_PRODUCT_HW/ UCS-FI-6454/ C9300-NM-8X/ PWR-C1-1100WAC Response in this JSON format:
{"product_name": "","explanation": "", "summary": ""}
Technology: LAN Switching
Subtechnology: Cat9300
Problem Code: Error Messages, Logs, Debugs
Product: NA
Product Family: C9300
Software Version: N/A
Router/Node Name: N/A
Problem Details: Switch CPU high and ospf neighbor flapping and neighbor frequently down.
Switch CPU high and ospf neighbor flapping and neighbor frequently down.
W have seen high cpu and ospf flapp
We suggested cli. To get top cpu results
Sw(config)# process cpu threshold type total rising 70 interval 5 falling 50 interval 5
After monitoring we see that the device is stable | Technology: LAN Switching
Subtechnology: Cat9300
Problem Code: Error Messages, Logs, Debugs
Product: NA
Product Family: C9300
Software Version: N/A
Router/Node Name: N/A
Problem Details: Switch CPU high and ospf neighbor flapping and neighbor frequently down. | Switch CPU high and ospf neighbor flapping and neighbor frequently down. | W have seen high cpu and ospf flapp
We suggested cli. To get top cpu results
Sw(config)# process cpu threshold type total rising 70 interval 5 falling 50 interval 5
After monitoring we see that the device is stable | ospf flapp | C9300-48U-A | 16.12.4 | 16.12.4 | 73.0 | 3 | 100.0 | Software -not a bug (scalability, version selection, install/upgrade help...) | C9300 | LAN Switching | Cat9300 | 01t1C000006fIcDQAU | Error Messages, Logs, Debugs | Cat9300 | LAN Switching | 01t15000005W0LTAA0 | IRE: PARTIAL |
695940399 | Question: Which software version is principally discussed in these documents?
Answer "NONE" if you cannot find answer in the given documents.
The ONLY software version should be selected from the given software version list: 8.4.2/ 8.2.3/ 7.3.5/ 9.3.9/ 7.3.7 Response in this JSON format:
{"software_version": "","explanation": "", "summary": ""}
Technology: Data Center and Storage Networking
Subtechnology: Nexus 7000 Series Switch - Interface, Port Channel (inc. VPC), Trunk, VLAN, Spanning Tree
Problem Code: Configuration Assistance
Product: NA
Product Family: N7000
Software Version: N/A
Router/Node Name: N/A
Problem Details: User requires support to establish an uplink between core switches, both of which are running VTP Mode Servers.
User requires support to establish an uplink between core switches, both of which are running VTP Mode Servers.
proceeding with closer with customer consent | Question: Which product is principally discussed in these documents?
Answer "NONE" if you cannot find answer in the given documents.
The ONLY product name should be selected from the given product name list: N77-C7710/ N77-SUP2E Response in this JSON format:
{"product_name": "","explanation": "", "summary": ""}
Technology: Data Center and Storage Networking
Subtechnology: Nexus 7000 Series Switch - Interface, Port Channel (inc. VPC), Trunk, VLAN, Spanning Tree
Problem Code: Configuration Assistance
Product: NA
Product Family: N7000
Software Version: N/A
Router/Node Name: N/A
Problem Details: User requires support to establish an uplink between core switches, both of which are running VTP Mode Servers.
User requires support to establish an uplink between core switches, both of which are running VTP Mode Servers.
proceeding with closer with customer consent | Technology: Data Center and Storage Networking
Subtechnology: Nexus 7000 Series Switch - Interface, Port Channel (inc. VPC), Trunk, VLAN, Spanning Tree
Problem Code: Configuration Assistance
Product: NA
Product Family: N7000
Software Version: N/A
Router/Node Name: N/A
Problem Details: User requires support to establish an uplink between core switches, both of which are running VTP Mode Servers. | User requires support to establish an uplink between core switches, both of which are running VTP Mode Servers. | proceeding with closer with customer consent | Hardware:
N77-C7710
Symptoms:
new config spanning tree issue impact check | N77-C7710 | 9.3(9)EFT | 9.3(9)EFT | 81.0 | 3 | 100.0 | Documentation/Tools (incomplete, too complex...) | N7000 | Data Center and Storage Networking | Nexus 7000 Series Switch - Interface, Port Channel (inc. VPC), Trunk, VLAN, Spanning Tree | 01t6R000007By8nQAC | Error Messages, Logs, Debugs | Nexus 7000 Series Switch - Interface, Port Channel (inc. VPC), Trunk, VLAN, Spanning Tree | Data Center and Storage Networking | 01tA0000002q8pGIAQ | SHERLOCK: PARTIAL |
695571422 | Question: Which software version is principally discussed in these documents?
Answer "NONE" if you cannot find answer in the given documents.
The ONLY software version should be selected from the given software version list: 15.5.1/ 155.1/ THIRD_PARTY_PRODUCT_SW/ 152.1/ 151.2/ 155.1/ NA - RMA/ 15.5.1 Response in this JSON format:
{"software_version": "","explanation": "", "summary": ""}
Technology: LAN Switching
Subtechnology: Cat6500/6800 (Supervisor 2T) VSS
Problem Code: Error Messages, Logs, Debugs
Product: NA
Product Family: C6800MD
Software Version: N/A
Router/Node Name: N/A
Problem Details: We need assistance to fix this issue.
We need assistance to fix this issue.
As per my understanding post switch reload supervisors have been replaced and the IOS version running on the switch is 15.5(1)SY1 is old one.
Due to fewer logs outputs, it will not be possible to provide a pinpoint issue and as you are running an old IOS version,
it could be affected by several defects. It is recommended to upgrade the IOS version to the suggested one. | Question: Which product is principally discussed in these documents?
Answer "NONE" if you cannot find answer in the given documents.
The ONLY product name should be selected from the given product name list: C6807-XL/ C6800-32P10G-XL/ C6800-SUP6T/ C6800-SUP6T-XL/ C6800-SUP6T-XL=/ C6807-DNA-A Response in this JSON format:
{"product_name": "","explanation": "", "summary": ""}
Technology: LAN Switching
Subtechnology: Cat6500/6800 (Supervisor 2T) VSS
Problem Code: Error Messages, Logs, Debugs
Product: NA
Product Family: C6800MD
Software Version: N/A
Router/Node Name: N/A
Problem Details: We need assistance to fix this issue.
We need assistance to fix this issue.
As per my understanding post switch reload supervisors have been replaced and the IOS version running on the switch is 15.5(1)SY1 is old one.
Due to fewer logs outputs, it will not be possible to provide a pinpoint issue and as you are running an old IOS version,
it could be affected by several defects. It is recommended to upgrade the IOS version to the suggested one. | Technology: LAN Switching
Subtechnology: Cat6500/6800 (Supervisor 2T) VSS
Problem Code: Error Messages, Logs, Debugs
Product: NA
Product Family: C6800MD
Software Version: N/A
Router/Node Name: N/A
Problem Details: We need assistance to fix this issue. | We need assistance to fix this issue. | As per my understanding post switch reload supervisors have been replaced and the IOS version running on the switch is 15.5(1)SY1 is old one.
Due to fewer logs outputs, it will not be possible to provide a pinpoint issue and as you are running an old IOS version,
it could be affected by several defects. It is recommended to upgrade the IOS version to the suggested one. | Urgent - C6800-SUP6T-XL Link Down | C6800-SUP6T-XL | 15.5(1)SY1 | 15.5(1)SY1 | 61.0 | 3 | 100.0 | Debug/Diagnostic Capability (missing, incomplete, cryptic...) | C6800MD | LAN Switching | Cat6800 (Supervisor 6T) VSS | 01t15000005WPxkAAG | Configuration Assistance | Cat6800 (Supervisor 6T) VSS | LAN Switching | 01t15000004dPUOAA2 | nan |
695816345 | Question: Which software version is principally discussed in these documents?
Answer "NONE" if you cannot find answer in the given documents.
The ONLY software version should be selected from the given software version list: 1/ 8.10.151.0/ 8.10.171.0/ 802.11AC/ 8.5.171.0/ 8.10.183.0/ 8.10.130.0/ 8.10.171.0/ THIRD_PARTY_PRODUCT_SW/ 8.5.135.0/ 8.3.143.0/ NA-CIN_CLOSE_SW/ 8.5.140.0/ 4.0.1a/ WLC CLIENT INTEROP/ 12.0.13/ 8.5.151.0/ 8.4/ 120.13/ 8.5.160.0/ 8.10.151.0/ 8.3.143.0/ 8.3.131.0/ 8.3.150.0/ 8.5.135.0/ 8.5.161.0/ 8.10.185.0/ 8.2.166.0/ 8.5.140.0/ 8.5.151.0/ 8.3.150.0/ 16.12.3s/ WLC RRM/RF/CLEANAIR/ 8.5.151.0/ 8.10.130.0/ NA - COMPONENT ONLY/ 8.10.162.0/ 8.3.140.0/ 8.10.150.0/ 8.10.183.0/ 8.10.161.0/ 8.10.185.0/ 8.5.151.0/ 16.12.4/ 17.3.5b/ 8.10.183.0/ 8.10.171.0/ 8.5.171.0 Response in this JSON format:
{"software_version": "","explanation": "", "summary": ""}
Hi NCS and Baby Team,
Thank you for your time on call.
As per you request, we are keeping this case under S2 for now.
Please find the summary of the call and the next action below:
Issue Reported: The standby controller gone to “Maintenance” Mode.
Summary:
Observed that the standby controller is on Maintenance mode (CT8540 - 8.10.183.0)
Analysed the logs and found that the standby controller sync failed and timeout for the XML config and result in the Cert Failed aswell as below
Reset reason : Certificate transfer from Active to Standby failed ,(Version: 8.10.183.0)
Reset time : Mon Jul 10 09:28:41 2023
Trace back : 0x8f9abc 0x1e2f80a 0x1eb54d4 0x1eaacf4 0x1eaa4a6 0x1ea0413 0x1e38647 0x7dff 0xe898d
Jul 10 15:40:16.800 :Previous State: RED_XML_TRANSFER_FAILED_STATE, Event:RED_XML_TRANSFER_MASTER_TMOUT_SM_EVENT
Jul 10 15:40:16.800 :Current State RED_XML_TRANSFER_DONE_STATE
Jul 10 15:40:16.800 :----------------------------------------------------------------
*rmgrMain: Jul 10 15:40:16.828: Send Role Negotiation payload to peer
Role Negotiation timeout.
Didn't find Peer..
The above logs indicates, the issue could be from the Redundant Port connection between Active and Standby so the result in XML file sync up failed and Master timeout.
As per the information on call, the Redundant Port is not back to back connection and the connection on through distributed switches.
As per the recommendation from Cisco , the RP connection needs to be connected directly between two controllers as a permanent solution.
Please Refer > https://www.cisco.com/c/en/us/td/docs/wireless/controller/technotes/8-7/High_Availability_DG.html#pgfId-91515
As you have provided the bug CSCvq95397, it is also related to RP connection issue and it was on Unreproduceable state due to the RP connection is not back to back.
Next Plan of Action:
For time being, if the RP connection is coming UP and there is a proper RP communication, Please try the following action
Please bring down the RP port before doing the below action;
1.
Need to bring down the RP Port
2.
Make the reachability to mgmt IP address for Standby controller (Unique IP)
3.
Disable the port connection and HA SSO
4.
Reload the standby controller
5.
Bring UP the standby as standalone controller.
6.
Reconfigure the HA SSO with RP interface UP.
7.
If the above steps are failed, Please change the switch port of RP connection.
8.
Permanent solution to connect RP back to Back.
Please refer the below document for configuration and scenario;
https://www.cisco.com/c/en/us/td/docs/wireless/controller/technotes/8-1/8540-WLC-DG/b_Cisco-8540-WLC-deployment-guide.html#concept_C0A18A765999461BA204F8BEF444D71E
+ @Muhammad Hilmi Bin Zainal<mailto:[email protected]>
We would like to reschedule the call to 9pm SGT tomorrow as requested by customer.
Here are some additional details:
* Are we able to take console access to the standby controller? yes
* Is there any service impact during the time of you have observed the issue? No as 1 wlc is still running
* May I know what is the software version running on the controllers? 8.10.183
* May I know total number of APs working on the active? 4600
* I hope now the standby controller is on standalone mode, can we take the console to the controller and take the below output? Yes
* May I know what is the LED light status of the standby chassis? All green
1.
We console and notice wlc is in maintenance mode and config looks ok
2.
We reboot and this message keep prompting “[PM] RP KA bitmap=0000, RMI KA bitmap=FFFF, GW KA bitmap=FFFF” and we cant ping the management ip and the redundancy didn’t came up.
3.
The we tried remove all cables and reboot the wlc.
Now its in active and standalone.
Ps – attached is the show tech before we reboot the wlc and logs after we reboot
May I check with you is there any additional logs needed before the troubleshooting session?
Kindly wait for response from TAC.
Hi Yokeswaran and Png Ting,
As per customer, we shall proceed tomorrow 9pm SGT.
Before that, what are the logs you need before we start the call tomorrow?
Are we able to take console access to the standby controller?
yes
Is there any service impact during the time of you have observed the issue?
No as 1 wlc is still running
May I know what is the software version running on the controllers?
8.10.183
May I know total number of APs working on the active?
4600
I hope now the standby controller is on standalone mode, can we take the console to the controller and take the below output? yes
May I know what is the LED light status of the standby chassis?
Technology: Wireless
Subtechnology: 8540 Series Wireless LAN Controller (AIR-CT8540)
Problem Code: Error Messages, Logs, Debugs
Product: NA
Product Family: AIRCTA2
Software Version: N/A
Router/Node Name: N/A
Problem Details: Model No.: AIR-CT8540-K9
SN: FCH2324V04H
standby controller got disconnected and we discover that it went to maintenance mode
Tried restart the WLC and the redundancy is still not establish After restart,WLC is up and in active state.
Model No.: AIR-CT8540-K9
SN: FCH2324V04H
standby controller got disconnected and we discover that it went to maintenance mode
Tried restart the WLC and the redundancy is still not establish After restart,WLC is up and in active state.
timestamp : 2023-07-23T19:30:49.000+0000 || updatedby : mepalaci || type : RESOLUTION SUMMARY || visibility : External || details : Requested to change the SFP and RJ45 to Fiber connector between the Switch and Primary controller (TLDC) _ its looks like L1 issue between two controllers on RP connection.
2 Brand new cables have been use to replace previous cables on switch
After change on cables and make port channel up, connection to HA SSO form correctly with no issues. | Question: Which product is principally discussed in these documents?
Answer "NONE" if you cannot find answer in the given documents.
The ONLY product name should be selected from the given product name list: AIR-CT8540-1K-K9/ AIR-CT8540-K9/ NA-CIN_CLOSE_HW/ C9120AXI-S/ THIRD_PARTY_PRODUCT_HW/ AIR-CT8540-CA-K9/ AIR-AP2802I-S-K9/ AIR-CT8540-K9Z/ AIR-BZL-C240M4/ DN2-HW-APL-XL/ WLC-AP-T/ AIR-CT8540-SW-8.2 Response in this JSON format:
{"product_name": "","explanation": "", "summary": ""}
Technology: Wireless
Subtechnology: 8540 Series Wireless LAN Controller (AIR-CT8540)
Problem Code: Error Messages, Logs, Debugs
Product: NA
Product Family: AIRCTA2
Software Version: N/A
Router/Node Name: N/A
Problem Details: Model No.: AIR-CT8540-K9
SN: FCH2324V04H
standby controller got disconnected and we discover that it went to maintenance mode
Tried restart the WLC and the redundancy is still not establish After restart,WLC is up and in active state.
Model No.: AIR-CT8540-K9
SN: FCH2324V04H
standby controller got disconnected and we discover that it went to maintenance mode
Tried restart the WLC and the redundancy is still not establish After restart,WLC is up and in active state.
timestamp : 2023-07-23T19:30:49.000+0000 || updatedby : mepalaci || type : RESOLUTION SUMMARY || visibility : External || details : Requested to change the SFP and RJ45 to Fiber connector between the Switch and Primary controller (TLDC) _ its looks like L1 issue between two controllers on RP connection.
2 Brand new cables have been use to replace previous cables on switch
After change on cables and make port channel up, connection to HA SSO form correctly with no issues. | Technology: Wireless
Subtechnology: 8540 Series Wireless LAN Controller (AIR-CT8540)
Problem Code: Error Messages, Logs, Debugs
Product: NA
Product Family: AIRCTA2
Software Version: N/A
Router/Node Name: N/A
Problem Details: Model No.: AIR-CT8540-K9
SN: FCH2324V04H
standby controller got disconnected and we discover that it went to maintenance mode
Tried restart the WLC and the redundancy is still not establish After restart,WLC is up and in active state. | Model No.: AIR-CT8540-K9
SN: FCH2324V04H
standby controller got disconnected and we discover that it went to maintenance mode
Tried restart the WLC and the redundancy is still not establish After restart,WLC is up and in active state. | timestamp : 2023-07-23T19:30:49.000+0000 || updatedby : mepalaci || type : RESOLUTION SUMMARY || visibility : External || details : Requested to change the SFP and RJ45 to Fiber connector between the Switch and Primary controller (TLDC) _ its looks like L1 issue between two controllers on RP connection.
2 Brand new cables have been use to replace previous cables on switch
After change on cables and make port channel up, connection to HA SSO form correctly with no issues. | nan | AIR-CT8540-K9 | crete-single_8-10-183-0.img | nan | nan | 3 | nan | Configuration Assistance (process not intuitive, too complex, inconsistent...) | AIRCTA2 | Wireless | 8540 Series Wireless LAN Controller (AIR-CT8540) | nan | nan | nan | nan | nan | nan |
695077555 | Question: Which software version is principally discussed in these documents?
Answer "NONE" if you cannot find answer in the given documents.
The ONLY software version should be selected from the given software version list: 17.03.04a/ 17.3.4a Response in this JSON format:
{"software_version": "","explanation": "", "summary": ""}
Closed w/o Customer Confirm
++ Regarding the punt inject drops:
Feb 8 2023 05:57:56.583 UTC: %IOSXE-5-PLATFORM: R0/0: cpp_cp: QFP:0.1 Thread:090 TS:00031241039764900733 %PUNT_INJECT-5-DROP_PUNT_CAUSE: punt policer drops packets, cause: for-us-data (0xb) from TenGigabitEthernet0/1/0 src ip: 172.18.1.98
Feb 8 2023 06:02:01.780 UTC: %IOSXE-5-PLATFORM: R0/0: cpp_cp: QFP:0.1 Thread:030 TS:00031241284970959902 %PUNT_INJECT-5-DROP_PUNT_CAUSE: punt policer drops packets, cause: for-us-data (0xb) from TenGigabitEthernet0/1/1 src ip: 172.18.0.134
show platform software punt-policer drop-only
Per Punt-Cause Policer Configuration and Packet Counters
Punt Config Rate(pps) Conform Packets Dropped Packets Config Burst(pkts) Config Alert
Cause Description Normal High Normal High Normal High Normal High Normal High
-------------------------------------------------------------------------------------------------------------------------------------------------------------
11 For-us data 40000 5000 384699812 14399195415 0 611103 40000 5000 Off Off
1. To identify the packets that is causing the CPU spike, we need to enable the below debugs, please note these debugs can be run during the production and non-service impacting.
Conft
Ip access list extended TAC
Permit ip any any
debug platform condition ipv4 access-list TAC both
debug platform packet-trace packet 8192 circular fia-trace
debug platform packet-trace punt code 11
debug platform packet-trace copy packet both size 256 L3
once the punt logs are observed please run the below commands and share the tac.txt file for further analysis.
show platform packet-trace statistics | app tac.txt
show platform packet-trace summary | app tac.txt
show platform packet-trace packet all | app tac.txt ( wait for some time for router to copy all the packets )
show platform hardware qfp active infrastructure punt config cause 11 | app tac.txt
show platform software punt-policer drop-only | app tac.txt
Punt-policer is enabled by default, and it polices all the control plane punted traffic. When traffic for a specific punt cause exceeds the configured value, the packets will be dropped, and a log message printed, punt policer is enabled to control the CPU from becoming overwhelmed. Currently the high priority traffic threshold is 5000
As we see the high priority packets are dropped, we can increase the threshold to 15000 and see if there is any drops. ( this can be applied later after getting the logs from debugs)
Conf t
#Platform punt-policer 11 15000 high
2.In addition, please configure this command to monitor which process is taking the more CPU load.
process cpu threshold type total rising 90 interval 5 falling 50 intervals 5
3.currently process that is causing more CPU utilisation is BGP router but not sure when its 90% need to take a capture when its 90 percent.
LDC-CN-RTR01#sh processes cpu sorted
CPU utilization for five seconds: 66%/1%; one minute: 65%; five minutes: 64%
PID Runtime(ms) Invoked uSecs 5Sec 1Min 5Min TTY Process
722 2491375244 645632249 3858 54.43% 50.97% 50.59% 0 BGP Router
396 1358881623 1928116369 704 6.00% 7.08% 6.99% 0 LISP control
134 490160586 3276638596 0 2.56% 2.39% 2.40% 0 IOSXE-RP Punt Se
333 127630648 370024659 344 1.20% 1.34% 1.38% 0 IP RIB Update
228 5908 5801 1018 0.15% 1.07% 0.66% 2 SSH Process
306 15299251 276586916 55 0.15% 0.09% 0.08% 0 TCP Timer
152 22577584 3548004 6363 0.15% 0.07% 0.05% 0 Compute load av
BGP router process, Calculates the best BGP path and processes any route churn. It also sends and receives routes, establishes peers, and interacts with the routing information base (RIB).
To get more details we need to enable debugs on the router.
Increase Interface Input Queues
If BGP advertises thousands of routes to many peers, TCP must transmit thousands of packets in a short duration. The BGP peers receive these packets and send TCP acknowledgements to the BGP speaker that advertises, which causes the BGP speaker to receive a flood of TCP ACKs in a short period of time. If the ACKs arrive at a rate that is too high for the route processor, packets back up in inbound interface queues. By default, router interfaces use an input queue size of 75 packets. In addition, special control packets such as BGP UPDATES use a special queue with Selective Packet Discard (SPD). This special queue holds 100 packets. When BGP convergence, happens TCP ACKs can fill quickly the 175 spots of input buffering and the new packets that arrive must be dropped. On routers with 15 or more BGP peers and exchange of the full Internet routing table, over 10,000 drops per interface per minute can be seen. Here is example output from a router 15 minutes after reboot:
Router#show interface pos 8/0 | include input queue
Output queue 0/40, 0 drops; input queue 0/75, 278637 drops
Router#
If you increase the interface input queue depth (with the hold-queue in command) it helps reduce the number of dropped TCP ACKs, which reduces the amount of work BGP must do to converge. Normally, a value of 1000 resolves problems caused by input queue drops.
These are described in below doc and matches the issue we are seeing, there could be some peers which are advertising the routes in continuous interval.
https://www.cisco.com/c/en/us/support/docs/ip/border-gateway-protocol-bgp/107615-highcpu-bgp.html
++ Suggest increasing input que to 1000
interface tenGigabitEthernet 0/1/0
#hold-queue 1000 in
Please capture the below logs when CPU is over 90% to check further.
Show process cpu sorted
show bgp neighbors
show bgp all summary | i table
show bgp vpnv4 unicast all neighbors
show bgp all summary
show platform software punt-policer drop-only
show interfaces tenGigabitEthernet 0/1/0 | i que
show interfaces tenGigabitEthernet 0/1/1 | i que
show platform hardware qfp active statistics drop detail
show logging
Good day!
Iam proceeding for closure it is always a pleasure to help.
however, if you need anything in future, please don't hesitate to contact me.
My working hours and call back number are listed below.
Additionally, you may re-open the case within 14 days if you require further assistance on the same issue.
You can simply reply to this email and case will get re-open automatically.
Good day !
This a follow up- email since there was no furhter updates
I want to be in touch with you and understand if you have any further queries related to the case, please let me know if you have any, I will be happy to help.
If you have no further queries, please confirm If I could proceed for case closure.
Good day!
My name is Kala and I am manager for Routing/WAN team in APAC time zone.
This is regarding the SR: 695077555, owned by my engineer Jobin George.
I am writing this email to you as it seems, he hasn’t been able to establish successful communication with you.
I am not sure if this issue is resolved, please let us know, we will be glad to assist.
If you are currently busy with other engagements, you could opt to temporarily close this case and re-work with us, when you have appropriate time.
Looking forward to your response.
Thank you!
Assuring best service.
XX-MESSAGE-FROM-SHERLOCK---LOOPED-DATA-XX
XX-MESSAGE-FROM-SHERLOCK---LOOPED-DATA-XX
XX-MESSAGE-FROM-SHERLOCK---LOOPED-DATA-XX
Per Punt-Cause Policer Configuration and Packet Counters
Punt Config Rate(pps) Conform Packets Dropped Packets Config Burst(pkts) Config Alert
Cause Description Normal High Normal High Normal High Normal High Normal High
-------------------------------------------------------------------------------------------------------------------------------------------------------------
11 For-us data 40000 5000 384699812 14399195415 0 611103 40000 5000 Off Off
1.
To identify the packets that is causing the CPU spike, we need to enable the below debugs, please note these debugs can be run during the production and non-service impacting.
Conft
Ip access list extended TAC
Permit ip any any
debug platform condition ipv4 access-list TAC both
debug platform packet-trace packet 8192 circular fia-trace
debug platform packet-trace punt code 11
debug platform packet-trace copy packet both size 256 L3
once the punt logs are observed please run the below commands and share the tac.txt file for further analysis.
show platform packet-trace statistics | app tac.txt
show platform packet-trace summary | app tac.txt
show platform packet-trace packet all | app tac.txt ( wait for some time for router to copy all the packets )
show platform hardware qfp active infrastructure punt config cause 11 | app tac.txt
show platform software punt-policer drop-only | app tac.txt
Punt-policer is enabled by default, and it polices all the control plane punted traffic. When traffic for a specific punt cause exceeds the configured value, the packets will be dropped, and a log message printed, punt policer is enabled to control the CPU from becoming overwhelmed. Currently the high priority traffic threshold is 5000
As we see the high priority packets are dropped, we can increase the threshold to 15000 and see if there is any drops. ( this can be applied later after getting the logs from debugs)
Conf t
#Platform punt-policer 11 15000 high
2.
In addition, please configure this command to monitor which process is taking the more CPU load.
process cpu threshold type total rising 90 interval 5 falling 50 intervals 5
3.
Also increase the input que size of tengig 0/1/0 and 0/1/1 to 1000 and observe if there is any input que drops on the interface.
interface tenGigabitEthernet 0/1/0
#hold-queue 1000 in
+++ customer to apply the change
++ call scheduled for 3pm SGT on 08/03 Wed
++ Logs needed when CPU spikes ( 90% )are observed. checking with end customer for enabling the bgp debugs to get more information on the BGP updates. We will also take platform and EPC captures for bgp packets during this window.
Aug 18 2022 04:18:49.487 UTC: %BGP-3-NOTIFICATION: sent to neighbor 172.18.0.131 4/0 (hold time expired) 0 bytes
Aug 18 2022 04:18:49.487 UTC: %BGP-5-NBR_RESET: Neighbor 172.18.0.131 reset (BGP Notification sent)
Aug 18 2022 04:18:49.511 UTC: %BGP-5-ADJCHANGE: neighbor 172.18.0.131 Down BGP Notification sent
Aug 18 2022 04:18:49.511 UTC: %BGP_SESSION-5-ADJCHANGE: neighbor 172.18.0.131 VPNv4 Unicast topology base removed from session BGP Notification sent
Aug 18 2022 04:18:49.511 UTC: %BGP_SESSION-5-ADJCHANGE: neighbor 172.18.0.131 IPv4 Unicast topology base removed from session BGP Notification sent
Aug 18 2022 04:22:17.016 UTC: %IOSXE-5-PLATFORM: R0/0: cpp_cp: QFP:0.0 Thread:115 TS:00018015331484357227 %PUNT_INJECT-5-DROP_PUNT_CAUSE: punt policer drops packets, cause: for-us-data (0xb) from TenGigabitEthernet0/1/1 src ip: 172.18.0.133
Aug 18 2022 04:27:24.223 UTC: %BGP-5-ADJCHANGE: neighbor 172.18.0.131 Up
BGP is flapping when CPU is spiking and there are also CPU PUNT drops. For further analysis please configure the below EEM script on the router to capture the logs at the time of CPU spike events.
LDC-CN-RTR01#sh processes cpu sorted
CPU utilization for five seconds: 66%/1%; one minute: 65%; five minutes: 64%
PID Runtime(ms) Invoked uSecs 5Sec 1Min 5Min TTY Process
722 2491375244 645632249 3858 54.43% 50.97% 50.59% 0 BGP Router
396 1358881623 1928116369 704 6.00% 7.08% 6.99% 0 LISP control
134 490160586 3276638596 0 2.56% 2.39% 2.40% 0 IOSXE-RP Punt Se
333 127630648 370024659 344 1.20% 1.34% 1.38% 0 IP RIB Update
228 5908 5801 1018 0.15% 1.07% 0.66% 2 SSH Process
306 15299251 276586916 55 0.15% 0.09% 0.08% 0 TCP Timer
152 22577584 3548004 6363 0.15% 0.07% 0.05% 0 Compute load av
BGP router process, Calculates the best BGP path and processes any route churn. It also sends and receives routes, establishes peers, and interacts with the routing information base (RIB).
To get more details we need to enable debugs on the router.
Increase Interface Input Queues
If BGP advertises thousands of routes to many peers, TCP must transmit thousands of packets in a short duration. The BGP peers receive these packets and send TCP acknowledgements to the BGP speaker that advertises, which causes the BGP speaker to receive a flood of TCP ACKs in a short period of time. If the ACKs arrive at a rate that is too high for the route processor, packets back up in inbound interface queues. By default, router interfaces use an input queue size of 75 packets. In addition, special control packets such as BGP UPDATES use a special queue with Selective Packet Discard (SPD). This special queue holds 100 packets. When BGP convergence, happens TCP ACKs can fill quickly the 175 spots of input buffering and the new packets that arrive must be dropped. On routers with 15 or more BGP peers and exchange of the full Internet routing table, over 10,000 drops per interface per minute can be seen. Here is example output from a router 15 minutes after reboot:
Router#show interface pos 8/0 | include input queue
Output queue 0/40, 0 drops; input queue 0/75, 278637 drops
Router#
If you increase the interface input queue depth (with the hold-queue in command) it helps reduce the number of dropped TCP ACKs, which reduces the amount of work BGP must do to converge. Normally, a value of 1000 resolves problems caused by input queue drops.
These are described in below doc and matches the issue we are seeing, there could be some peers which are advertising the routes in continuous interval.
https://www.cisco.com/c/en/us/support/docs/ip/border-gateway-protocol-bgp/107615-highcpu-bgp.html
++ Suggest increasing input que to 1000
interface tenGigabitEthernet 0/1/0
#hold-queue 1000 in
Please capture the below logs when CPU is over 90%
Show process cpu sorted
show bgp neighbors
show bgp all summary | i table
show bgp vpnv4 unicast all neighbors
show bgp all summary
show platform software punt-policer drop-only
show interfaces tenGigabitEthernet 0/1/0 | i que
show interfaces tenGigabitEthernet 0/1/1 | i que
show platform hardware qfp active statistics drop detail
show logging
Thanks for your time on call today.
As discussed, the currently process that is causing more CPU utilisation is BGP router but not sure when its 90% need to take a capture when its 90 percent.
LDC-CN-RTR01#sh processes cpu sorted
CPU utilization for five seconds: 66%/1%; one minute: 65%; five minutes: 64%
PID Runtime(ms) Invoked uSecs 5Sec 1Min 5Min TTY Process
722 2491375244 645632249 3858 54.43% 50.97% 50.59% 0 BGP Router
396 1358881623 1928116369 704 6.00% 7.08% 6.99% 0 LISP control
134 490160586 3276638596 0 2.56% 2.39% 2.40% 0 IOSXE-RP Punt Se
333 127630648 370024659 344 1.20% 1.34% 1.38% 0 IP RIB Update
228 5908 5801 1018 0.15% 1.07% 0.66% 2 SSH Process
306 15299251 276586916 55 0.15% 0.09% 0.08% 0 TCP Timer
152 22577584 3548004 6363 0.15% 0.07% 0.05% 0 Compute load av
BGP router process, Calculates the best BGP path and processes any route churn.
It also sends and receives routes, establishes peers, and interacts with the routing information base (RIB).
To get more details we need to enable debugs on the router.
Increase Interface Input Queues
If BGP advertises thousands of routes to many peers, TCP must transmit thousands of packets in a short duration.
The BGP peers receive these packets and send TCP acknowledgements to the BGP speaker that advertises, which causes the BGP speaker to receive a flood of TCP ACKs in a short period of time.
If the ACKs arrive at a rate that is too high for the route processor, packets back up in inbound interface queues.
By default, router interfaces use an input queue size of 75 packets.
In addition, special control packets such as BGP UPDATES use a special queue with Selective Packet Discard (SPD).
This special queue holds 100 packets.
When BGP convergence, happens TCP ACKs can fill quickly the 175 spots of input buffering and the new packets that arrive must be dropped.
On routers with 15 or more BGP peers and exchange of the full Internet routing table, over 10,000 drops per interface per minute can be seen.
Here is example output from a router 15 minutes after reboot:
Router#show interface pos 8/0 | include input queue
Output queue 0/40, 0 drops; input queue 0/75, 278637 drops
Router#
If you increase the interface input queue depth (with the hold-queue in command) it helps reduce the number of dropped TCP ACKs, which reduces the amount of work BGP must do to converge.
Normally, a value of 1000 resolves problems caused by input queue drops.
These are described in below doc and matches the issue we are seeing, there could be some peers which are advertising the routes in continuous interval.
https://www.cisco.com/c/en/us/support/docs/ip/border-gateway-protocol-bgp/107615-highcpu-bgp.html
++ Suggest increasing input que to 1000
interface tenGigabitEthernet 0/1/0
#hold-queue 1000 in
Please capture the below logs when CPU is over 90%
Show process cpu sorted
show bgp neighbors
show bgp all summary | i table
show bgp vpnv4 unicast all neighbors
show bgp all summary
show platform software punt-policer drop-only
show interfaces tenGigabitEthernet 0/1/0 | i que
show interfaces tenGigabitEthernet 0/1/1 | i que
show platform hardware qfp active statistics drop detail
show logging
Please capture and attach the above logs when CPU spikes ( 90% )are observed.
Meanwhile please check with end customer for enabling the bgp debugs to get more information on the BGP updates.
We will also take platform and EPC captures for bgp packets during this window.
User: 00us9gpwj1wne67ev5d6
Email: [email protected]
File uploaded from Support Case Manager
User Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/110.0.0.0 Safari/537.36 Edg/110.0.1587.63
File Name: 172.18.0.129_08032023_1526.log
File Type: log_values
File Description: Session Logs
File Link: https://mycase.cloudapps.cisco.com/695077555/attach?fileID=640842d74fd96f04ac51d777
File Upload Date / Time: Wed Mar 08 2023 16:09:59 GMT+0800 (Singapore Standard Time) - COMPLETED
User: 00us9gpwj1wne67ev5d6
Email: [email protected]
File uploaded from Support Case Manager
User Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/110.0.0.0 Safari/537.36 Edg/110.0.1587.63
File Name: 172.18.0.129_08032023_1506.log
File Type: log_values
File Description: Session Logs
File Link: https://mycase.cloudapps.cisco.com/695077555/attach?fileID=640842c92063184ac91a1360
File Upload Date / Time: Wed Mar 08 2023 16:09:46 GMT+0800 (Singapore Standard Time) - COMPLETED
File Name: 172.18.0.130_08032023_1506.log
File Type: log_values
File Description: Session Logs
File Link: https://mycase.cloudapps.cisco.com/695077555/attach?fileID=640842ce4fd96f04ac51d75d
File Upload Date / Time: Wed Mar 08 2023 16:09:50 GMT+0800 (Singapore Standard Time) - COMPLETED
Per Punt-Cause Policer Configuration and Packet Counters
Punt Config Rate(pps) Conform Packets Dropped Packets Config Burst(pkts) Config Alert
Cause Description Normal High Normal High Normal High Normal High Normal High
-------------------------------------------------------------------------------------------------------------------------------------------------------------
11 For-us data 40000 5000 384699812 14399195415 0 611103 40000 5000 Off Off
1.
To identify the packets that is causing the CPU spike, we need to enable the below debugs, please note these debugs can be run during the production and non-service impacting.
Conft
Ip access list extended TAC
Permit ip any any
debug platform condition ipv4 access-list TAC both
debug platform packet-trace packet 8192 circular fia-trace
debug platform packet-trace punt code 11
debug platform packet-trace copy packet both size 256 L3
once the punt logs are observed please run the below commands and share the tac.txt file for further analysis.
show platform packet-trace statistics | app tac.txt
show platform packet-trace summary | app tac.txt
show platform packet-trace packet all | app tac.txt ( wait for some time for router to copy all the packets )
show platform hardware qfp active infrastructure punt config cause 11 | app tac.txt
show platform software punt-policer drop-only | app tac.txt
Punt-policer is enabled by default, and it polices all the control plane punted traffic. When traffic for a specific punt cause exceeds the configured value, the packets will be dropped, and a log message printed, punt policer is enabled to control the CPU from becoming overwhelmed. Currently the high priority traffic threshold is 5000
As we see the high priority packets are dropped, we can increase the threshold to 15000 and see if there is any drops. ( this can be applied later after getting the logs from debugs)
Conf t
#Platform punt-policer 11 15000 high
2.
In addition, please configure this command to monitor which process is taking the more CPU load.
process cpu threshold type total rising 90 interval 5 falling 50 intervals 5
3.
Also increase the input que size of tengig 0/1/0 and 0/1/1 to 1000 and observe if there is any input que drops on the interface.
interface tenGigabitEthernet 0/1/0
#hold-queue 1000 in
+++ customer to apply the change
++ call scheduled for 3pm SGT on 08/03 Wed
Per Punt-Cause Policer Configuration and Packet Counters
Punt Config Rate(pps) Conform Packets Dropped Packets Config Burst(pkts) Config Alert
Cause Description Normal High Normal High Normal High Normal High Normal High
-------------------------------------------------------------------------------------------------------------------------------------------------------------
11 For-us data 40000 5000 384699812 14399195415 0 611103 40000 5000 Off Off
1.
To identify the packets that is causing the CPU spike, we need to enable the below debugs, please note these debugs can be run during the production and non-service impacting.
Conft
Ip access list extended TAC
Permit ip any any
debug platform condition ipv4 access-list TAC both
debug platform packet-trace packet 8192 circular fia-trace
debug platform packet-trace punt code 11
debug platform packet-trace copy packet both size 256 L3
once the punt logs are observed please run the below commands and share the tac.txt file for further analysis.
show platform packet-trace statistics | app tac.txt
show platform packet-trace summary | app tac.txt
show platform packet-trace packet all | app tac.txt ( wait for some time for router to copy all the packets )
show platform hardware qfp active infrastructure punt config cause 11 | app tac.txt
show platform software punt-policer drop-only | app tac.txt
Punt-policer is enabled by default, and it polices all the control plane punted traffic. When traffic for a specific punt cause exceeds the configured value, the packets will be dropped, and a log message printed, punt policer is enabled to control the CPU from becoming overwhelmed. Currently the high priority traffic threshold is 5000
As we see the high priority packets are dropped, we can increase the threshold to 15000 and see if there is any drops. ( this can be applied later after getting the logs from debugs)
Conf t
#Platform punt-policer 11 15000 high
2.
In addition, please configure this command to monitor which process is taking the more CPU load.
process cpu threshold type total rising 90 interval 5 falling 50 intervals 5
3.
Also increase the input que size of tengig 0/1/0 and 0/1/1 to 1000 and observe if there is any input que drops on the interface.
interface tenGigabitEthernet 0/1/0
#hold-queue 1000 in
+++ customer to apply the change
++ call scheduled for 3pm SGT on 07/03
Please use the below webex link for the same.
https://cisco.webex.com/ciscosales/j.php?MTID=m873ae5931a775d47f4d08e29ce0f8235
Please share us webex link ....
Good day!
Thanks for the update, I will be available for webex session 3pm Tomorrow.
Can we have a Webex call tomorrow 3PM SGT time ??
Per Punt-Cause Policer Configuration and Packet Counters
Punt Config Rate(pps) Conform Packets Dropped Packets Config Burst(pkts) Config Alert
Cause Description Normal High Normal High Normal High Normal High Normal High
-------------------------------------------------------------------------------------------------------------------------------------------------------------
11 For-us data 40000 5000 384699812 14399195415 0 611103 40000 5000 Off Off
1.
To identify the packets that is causing the CPU spike, we need to enable the below debugs, please note these debugs can be run during the production and non-service impacting.
Conft
Ip access list extended TAC
Permit ip any any
debug platform condition ipv4 access-list TAC both
debug platform packet-trace packet 8192 circular fia-trace
debug platform packet-trace punt code 11
debug platform packet-trace copy packet both size 256 L3
once the punt logs are observed please run the below commands and share the tac.txt file for further analysis.
show platform packet-trace statistics | app tac.txt
show platform packet-trace summary | app tac.txt
show platform packet-trace packet all | app tac.txt ( wait for some time for router to copy all the packets )
show platform hardware qfp active infrastructure punt config cause 11 | app tac.txt
show platform software punt-policer drop-only | app tac.txt
Punt-policer is enabled by default, and it polices all the control plane punted traffic. When traffic for a specific punt cause exceeds the configured value, the packets will be dropped, and a log message printed, punt policer is enabled to control the CPU from becoming overwhelmed. Currently the high priority traffic threshold is 5000
As we see the high priority packets are dropped, we can increase the threshold to 15000 and see if there is any drops. ( this can be applied later after getting the logs from debugs)
Conf t
#Platform punt-policer 11 15000 high
2.
In addition, please configure this command to monitor which process is taking the more CPU load.
process cpu threshold type total rising 90 interval 5 falling 50 intervals 5
3.
Also increase the input que size of tengig 0/1/0 and 0/1/1 to 1000 and observe if there is any input que drops on the interface.
interface tenGigabitEthernet 0/1/0
#hold-queue 1000 in
+++ customer to apply the changes.
Good day!!
I want to be in touch with you and understand if you have applied the suggested config changes on the router.
Please share an update to proceed further once you are available.
Let me check with customer and let you know asap.
Good day!
There is no impact.
process cpu threshold type total rising 90 interval 5 falling 50 intervals 5
->this will generate logs on the router when the CPU rises to 90 and with the top process.
Increase the input buffer que size on both tengig 0/1/0 and 0/1/1 interfaces to reduce the input que drops.
interface tenGigabitEthernet 0/1/0
hold-queue 1000 in
Please share me the below outputs after adding the above commands once the CPU spike is observed.
Clear logging, clear counters tengig 0/1/0, clear counters tengig 0/11
show interfaces tenGigabitEthernet 0/1/0 | i que
show interfaces tenGigabitEthernet 0/1/1 | i que
show platform hardware qfp active statistics drop detail
show platform software punt-policer drop-only
show process cpu sorted
show process cpu history
Show logging.
Is there any impact for below config?
2.
In addition, please configure this command to monitor which process is taking the more CPU load.
process cpu threshold type total rising 90 interval 5 falling 50 intervals 5
3.
Also increase the input que size of tengig 0/1/0 and 0/1/1 to 1000 and observe if there is any input que drops on the interface.
interface tenGigabitEthernet 0/1/0
#hold-queue 1000 in
Per Punt-Cause Policer Configuration and Packet Counters
Punt Config Rate(pps) Conform Packets Dropped Packets Config Burst(pkts) Config Alert
Cause Description Normal High Normal High Normal High Normal High Normal High
-------------------------------------------------------------------------------------------------------------------------------------------------------------
11 For-us data 40000 5000 384699812 14399195415 0 611103 40000 5000 Off Off
1.
To identify the packets that is causing the CPU spike, we need to enable the below debugs, please note these debugs can be run during the production and non-service impacting.
Conft
Ip access list extended TAC
Permit ip any any
debug platform condition ipv4 access-list TAC both
debug platform packet-trace packet 8192 circular fia-trace
debug platform packet-trace punt code 11
debug platform packet-trace copy packet both size 256 L3
once the punt logs are observed please run the below commands and share the tac.txt file for further analysis.
show platform packet-trace statistics | app tac.txt
show platform packet-trace summary | app tac.txt
show platform packet-trace packet all | app tac.txt ( wait for some time for router to copy all the packets )
show platform hardware qfp active infrastructure punt config cause 11 | app tac.txt
show platform software punt-policer drop-only | app tac.txt
Punt-policer is enabled by default, and it polices all the control plane punted traffic. When traffic for a specific punt cause exceeds the configured value, the packets will be dropped, and a log message printed, punt policer is enabled to control the CPU from becoming overwhelmed. Currently the high priority traffic threshold is 5000
As we see the high priority packets are dropped, we can increase the threshold to 15000 and see if there is any drops. ( this can be applied later after getting the logs from debugs)
Conf t
#Platform punt-policer 11 15000 high
2.
In addition, please configure this command to monitor which process is taking the more CPU load.
process cpu threshold type total rising 90 interval 5 falling 50 intervals 5
3.
Also increase the input que size of tengig 0/1/0 and 0/1/1 to 1000 and observe if there is any input que drops on the interface.
interface tenGigabitEthernet 0/1/0
#hold-queue 1000 in
Good day!
The last logs for punt policer drops were on Feb 8th that is when the BGP has also flapped.
erver hostname/domain name
Feb 7 2023 17:12:09.768 UTC: %SMART_LIC-3-COMM_FAILED: Communications failure with the Cisco Smart License Utility (CSLU) : Unable to resolve server hostname/domain name
Feb 8 2023 05:49:29.574 UTC: %BGP-3-NOTIFICATION: sent to neighbor 172.18.0.133 4/0 (hold time expired) 0 bytes
Feb 8 2023 05:49:43.674 UTC: %BGP-5-NBR_RESET: Neighbor 172.18.0.133 reset (BGP Notification sent)
Feb 8 2023 05:49:43.705 UTC: %BGP-5-ADJCHANGE: neighbor 172.18.0.133 Down BGP Notification sent
Feb 8 2023 05:49:43.705 UTC: %BGP_SESSION-5-ADJCHANGE: neighbor 172.18.0.133 VPNv4 Unicast topology base removed from session BGP Notification sent
Feb 8 2023 05:49:43.705 UTC: %BGP_SESSION-5-ADJCHANGE: neighbor 172.18.0.133 IPv4 Unicast topology base removed from session BGP Notification sent
Feb 8 2023 05:53:41.872 UTC: %IOSXE-5-PLATFORM: R0/0: cpp_cp: QFP:0.0 Thread:161 TS:00031240785043225194 %PUNT_INJECT-5-DROP_PUNT_CAUSE: punt policer drops packets, cause: for-us-data (0xb) from TenGigabitEthernet0/1/0 src ip: 172.18.0.131
Feb 8 2023 05:57:50.740 UTC: %BGP-5-NBR_RESET: Neighbor 172.18.0.133 active reset (BGP Notification sent)
Feb 8 2023 05:57:50.740 UTC: %BGP-5-ADJCHANGE: neighbor 172.18.0.133 Up
Feb 8 2023 05:57:56.583 UTC: %IOSXE-5-PLATFORM: R0/0: cpp_cp: QFP:0.1 Thread:090 TS:00031241039764900733 %PUNT_INJECT-5-DROP_PUNT_CAUSE: punt policer drops packets, cause: for-us-data (0xb) from TenGigabitEthernet0/1/0 src ip: 172.18.1.98
Feb 8 2023 06:02:01.780 UTC: %IOSXE-5-PLATFORM: R0/0: cpp_cp: QFP:0.1 Thread:030 TS:00031241284970959902 %PUNT_INJECT-5-DROP_PUNT_CAUSE: punt policer drops packets, cause: for-us-data (0xb) from TenGigabitEthernet0/1/1 src ip: 172.18.0.134
Per Punt-Cause Policer Configuration and Packet Counters
Punt Config Rate(pps) Conform Packets Dropped Packets Config Burst(pkts) Config Alert
Cause Description Normal High Normal High Normal High Normal High Normal High
-------------------------------------------------------------------------------------------------------------------------------------------------------------
11 For-us data 40000 5000 384699812 14399195415 0 611103 40000 5000 Off Off
1.
To identify the packets that is causing the CPU spike, we need to enable the below debugs, please note these debugs can be run during the production and non-service impacting.
Conft
Ip access list extended TAC
Permit ip any any
debug platform condition ipv4 access-list TAC both
debug platform packet-trace packet 8192 circular fia-trace
debug platform packet-trace punt code 11
debug platform packet-trace copy packet both size 256 L3
once the punt logs are observed please run the below commands and share the tac.txt file for further analysis.
show platform packet-trace statistics | app tac.txt
show platform packet-trace summary | app tac.txt
show platform packet-trace packet all | app tac.txt ( wait for some time for router to copy all the packets )
show platform hardware qfp active infrastructure punt config cause 11 | app tac.txt
show platform software punt-policer drop-only | app tac.txt
Punt-policer is enabled by default, and it polices all the control plane punted traffic.
When traffic for a specific punt cause exceeds the configured value, the packets will be dropped, and a log message printed, punt policer is enabled to control the CPU from becoming overwhelmed.
Currently the high priority traffic threshold is 5000
Good day!
Thanks for the shared logs, I am working on it will be updating you on my findings.
We have uploaded the required logs.
Regarding the 172.18.0.133 this is a Border Node had BGP peer with this Control Node.
User: 00u547cgp4nzef79z5d7
Email: [email protected]
File uploaded from Support Case Manager
User Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/110.0.0.0 Safari/537.36
File Name: TLDC-CN-RTR01-23-feb-2023-TAC-Log.log
File Type: web_uploaded
File Description:
File Link: https://mycase.cloudapps.cisco.com/695077555/attach?fileID=63f6ff30857e5c4ff6d78a9e
File Upload Date / Time: Thu Feb 23 2023 13:52:58 GMT+0800 (Singapore Standard Time) - COMPLETED
configure the below EEM script on the router to capture the logs at the time of CPU spike events.
event manager applet ASR_High_CPU authorization bypass
event snmp oid 1.3.6.1.4.1.9.2.1.56 get-type next entry-op ge entry-val "85" exit-time 30 poll-interval 1
action 1.0 syslog msg "High cpu detected. Please check bootflash:cpuinfo.txt"
action 2.0 cli command "enable"
action 3.0 cli command "term exec prompt timestamp"
action 4.0 cli command "show processes cpu sorted | append bootflash:cpuinfo.txt"
action 5.0 cli command "show process memory sorted | append bootflash:cpuinfo.txt"
action 5.4 cli command "show bgp all sum | append bootflash:cpuinfo.txt"
action 6.0 cli command "show platform hardware qfp active statistics drop | append bootflash:cpuinfo.txt"
action 7.1 cli command "show platform software punt-policer drop-only | append bootflash:cpuinfo.txt"
action 7.2 cli command "show platform hardware qfp active datapath utilization | append bootflash:cpuinfo.txt"
action 7.3 cli command "show process cpu hist | append bootflash:cpuinfo.txt"
action 7.7 cli command "show logging | append bootflash:cpuinfo.txt"
action 8.0 cli command "end"
++ Customer has not applied the EEM script
++ Aksed customer for more logs
Please share me the below logs from the router to check further
show interfaces tenGigabitEthernet 0/1/0 | i que
show interfaces tenGigabitEthernet 0/1/1 | i que
show platform hardware qfp active statistics drop detail
show platform software punt-policer drop-only
show platform hardware qfp active interface if-name ten 0/1/0 statistics
show platform hardware qfp active interface if-name ten 0/1/1 statistics
show interfaces tenGigabitEthernet 0/1/0 accounting
show interfaces tenGigabitEthernet 0/1/1 accounting
show interfaces TenGigabitEthernet 0/1/0 stats
show interfaces TenGigabitEthernet 0/1/1 stats
show ip arp tenGigabitEthernet 0/1/0
show ip arp tenGigabitEthernet 0/1/1
show process cpu history
show logging
Good day!!
I have gone through the logs,I need more logs to further proceed on this case.
packets are getting dropped due to buffer que id full as there are more packets received at the interface level.
TenGigabitEthernet0/1/0 is up, line protocol is up
Hardware is BUILT-IN-EPA-8x10G, address is dc8c.3793.c910 (bia dc8c.3793.c910)
Internet address is 172.18.12.65/30
MTU 9212 bytes, BW 10000000 Kbit/sec, DLY 10 usec,
reliability 255/255, txload 1/255, rxload 1/255
Input queue: 0/375/14668/0 (size/max/drops/flushes); Total output drops: 0 >> input que drops
Queueing strategy: fifo
TenGigabitEthernet0/1/1 is up, line protocol is up
Hardware is BUILT-IN-EPA-8x10G, address is dc8c.3793.c911 (bia dc8c.3793.c911)
Input queue: 0/375/10951/0 (size/max/drops/flushes); Total output drops: 0
Queueing strategy: fifo
Output queue: 0/40 (size/max)
also please turn of any debugging you are current running on this router to capture more logs
>>show debugging , undebug all
Please share me the below logs from the router to check further
show interfaces tenGigabitEthernet 0/1/0 | i que
show interfaces tenGigabitEthernet 0/1/1 | i que
show platform hardware qfp active statistics drop detail
show platform software punt-policer drop-only
show platform hardware qfp active interface if-name ten 0/1/0 statistics
show platform hardware qfp active interface if-name ten 0/1/1 statistics
show interfaces tenGigabitEthernet 0/1/0 accounting
show interfaces tenGigabitEthernet 0/1/1 accounting
show interfaces TenGigabitEthernet 0/1/0 stats
show interfaces TenGigabitEthernet 0/1/1 stats
show ip arp tenGigabitEthernet 0/1/0
show ip arp tenGigabitEthernet 0/1/1
show process cpu history
show logging
In addition please let me know which devices are connected to ten gig 0/1/0 and 0/1/1 and details on src ip: 172.18.0.133 which is attached to TenGigabitEthernet0/1/1.
We have uploaded the logs that we collected when CPU was high.
Hope you will get all your required output.
User: 00us9gpwj1wne67ev5d6
Email: [email protected]
File uploaded from Support Case Manager
User Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/110.0
File Name: 172.18.0.130_14022023_1457.log
File Type: show_tech
File Description:
File Link: https://mycase.cloudapps.cisco.com/695077555/attach?fileID=63f595e7b39e646169f216f6
File Upload Date / Time: Wed Feb 22 2023 12:12:21 GMT+0800 (Singapore Standard Time) - COMPLETED
File Name: 172.18.0.129_14022023_1456.log
File Type: show_tech
File Description:
File Link: https://mycase.cloudapps.cisco.com/695077555/attach?fileID=63f595ebc029371c310e914c
File Upload Date / Time: Wed Feb 22 2023 12:12:28 GMT+0800 (Singapore Standard Time) - COMPLETED
My Colleague "George Kingsley" will share you the logs, we had collected those in the incident time.
To configure EEM script we need customer permission and set a schedule to configure.
As we had the logs that we collected on incident time so hope that will serve your requirements.
configure the below EEM script on the router to capture the logs at the time of CPU spike events.
event manager applet ASR_High_CPU authorization bypass
event snmp oid 1.3.6.1.4.1.9.2.1.56 get-type next entry-op ge entry-val "85" exit-time 30 poll-interval 1
action 1.0 syslog msg "High cpu detected. Please check bootflash:cpuinfo.txt"
action 2.0 cli command "enable"
action 3.0 cli command "term exec prompt timestamp"
action 4.0 cli command "show processes cpu sorted | append bootflash:cpuinfo.txt"
action 5.0 cli command "show process memory sorted | append bootflash:cpuinfo.txt"
action 5.4 cli command "show bgp all sum | append bootflash:cpuinfo.txt"
action 6.0 cli command "show platform hardware qfp active statistics drop | append bootflash:cpuinfo.txt"
action 7.1 cli command "show platform software punt-policer drop-only | append bootflash:cpuinfo.txt"
action 7.2 cli command "show platform hardware qfp active datapath utilization | append bootflash:cpuinfo.txt"
action 7.3 cli command "show process cpu hist | append bootflash:cpuinfo.txt"
action 7.7 cli command "show logging | append bootflash:cpuinfo.txt"
action 8.0 cli command "end"
++ CPU Logs pending from customer
Good day! , Thanks please share me the logs cpuinfo.txt which will be added to bootflash for further analysis.
Please help to share the incident time logs.
We had collected the logs when incident was happened, George will share the log.
Hope that will be helpful for you to check the root cause.
configure the below EEM script on the router to capture the logs at the time of CPU spike events.
event manager applet ASR_High_CPU authorization bypass
event snmp oid 1.3.6.1.4.1.9.2.1.56 get-type next entry-op ge entry-val "85" exit-time 30 poll-interval 1
action 1.0 syslog msg "High cpu detected. Please check bootflash:cpuinfo.txt"
action 2.0 cli command "enable"
action 3.0 cli command "term exec prompt timestamp"
action 4.0 cli command "show processes cpu sorted | append bootflash:cpuinfo.txt"
action 5.0 cli command "show process memory sorted | append bootflash:cpuinfo.txt"
action 5.4 cli command "show bgp all sum | append bootflash:cpuinfo.txt"
action 6.0 cli command "show platform hardware qfp active statistics drop | append bootflash:cpuinfo.txt"
action 7.1 cli command "show platform software punt-policer drop-only | append bootflash:cpuinfo.txt"
action 7.2 cli command "show platform hardware qfp active datapath utilization | append bootflash:cpuinfo.txt"
action 7.3 cli command "show process cpu hist | append bootflash:cpuinfo.txt"
action 7.7 cli command "show logging | append bootflash:cpuinfo.txt"
action 8.0 cli command "end"
Aug 18 2022 04:18:49.487 UTC: %BGP-3-NOTIFICATION: sent to neighbor 172.18.0.131 4/0 (hold time expired) 0 bytes
Aug 18 2022 04:18:49.487 UTC: %BGP-5-NBR_RESET: Neighbor 172.18.0.131 reset (BGP Notification sent)
Aug 18 2022 04:18:49.511 UTC: %BGP-5-ADJCHANGE: neighbor 172.18.0.131 Down BGP Notification sent
Aug 18 2022 04:18:49.511 UTC: %BGP_SESSION-5-ADJCHANGE: neighbor 172.18.0.131 VPNv4 Unicast topology base removed from session BGP Notification sent
Aug 18 2022 04:18:49.511 UTC: %BGP_SESSION-5-ADJCHANGE: neighbor 172.18.0.131 IPv4 Unicast topology base removed from session BGP Notification sent
Aug 18 2022 04:22:17.016 UTC: %IOSXE-5-PLATFORM: R0/0: cpp_cp: QFP:0.0 Thread:115 TS:00018015331484357227 %PUNT_INJECT-5-DROP_PUNT_CAUSE: punt policer drops packets, cause: for-us-data (0xb) from TenGigabitEthernet0/1/1 src ip: 172.18.0.133
Aug 18 2022 04:27:24.223 UTC: %BGP-5-ADJCHANGE: neighbor 172.18.0.131 Up
BGP is flapping when CPU is spiking and there are also CPU PUNT drops. For further analysis please configure the below EEM script on the router to capture the logs at the time of CPU spike events.
Product: NA
Product Family: ASR1000
Software Version: N/A
Router/Node Name: N/A
Problem Details: we observing control node CPU getting high. we have two control node and both are getting High some time it reached 100%
Good day!!
Thanks for the shared details, I can see below logs on the router.
Aug 18 2022 04:18:49.487 UTC: %BGP-3-NOTIFICATION: sent to neighbor 172.18.0.131 4/0 (hold time expired) 0 bytes
Aug 18 2022 04:18:49.487 UTC: %BGP-5-NBR_RESET: Neighbor 172.18.0.131 reset (BGP Notification sent)
Aug 18 2022 04:18:49.511 UTC: %BGP-5-ADJCHANGE: neighbor 172.18.0.131 Down BGP Notification sent
Aug 18 2022 04:18:49.511 UTC: %BGP_SESSION-5-ADJCHANGE: neighbor 172.18.0.131 VPNv4 Unicast topology base removed from session BGP Notification sent
Aug 18 2022 04:18:49.511 UTC: %BGP_SESSION-5-ADJCHANGE: neighbor 172.18.0.131 IPv4 Unicast topology base removed from session BGP Notification sent
Aug 18 2022 04:22:17.016 UTC: %IOSXE-5-PLATFORM: R0/0: cpp_cp: QFP:0.0 Thread:115 TS:00018015331484357227 %PUNT_INJECT-5-DROP_PUNT_CAUSE: punt policer drops packets, cause: for-us-data (0xb) from TenGigabitEthernet0/1/1 src ip: 172.18.0.133
Aug 18 2022 04:27:24.223 UTC: %BGP-5-ADJCHANGE: neighbor 172.18.0.131 Up
BGP is flapping when CPU is spiking and there are also CPU PUNT drops.
For further analysis please configure the below EEM script on the router to capture the logs at the time of CPU spike events.
event manager applet ASR_High_CPU authorization bypass
event snmp oid 1.3.6.1.4.1.9.2.1.56 get-type next entry-op ge entry-val "85" exit-time 30 poll-interval 1
action 1.0 syslog msg "High cpu detected.
Please check bootflash:cpuinfo.txt"
action 2.0 cli command "enable"
action 3.0 cli command "term exec prompt timestamp"
action 4.0 cli command "show processes cpu sorted | append bootflash:cpuinfo.txt"
action 5.0 cli command "show process memory sorted | append bootflash:cpuinfo.txt"
action 5.4 cli command "show bgp all sum | append bootflash:cpuinfo.txt"
action 6.0 cli command "show platform hardware qfp active statistics drop | append bootflash:cpuinfo.txt"
action 7.1 cli command "show platform software punt-policer drop-only | append bootflash:cpuinfo.txt"
action 7.2 cli command "show platform hardware qfp active datapath utilization | append bootflash:cpuinfo.txt"
action 7.3 cli command "show process cpu hist | append bootflash:cpuinfo.txt"
action 7.7 cli command "show logging | append bootflash:cpuinfo.txt"
action 8.0 cli command "end"
The logs will be added to cpuinfo.txt file on the router flash memory.
Please share the same once the Event is triggered.
I have sent you CPU history you can find its happening very frequently.
It's an existing node and did do any config change.
We are observing 100% cpu and that's the main concern.
In addition, we have two nodes, and both have the high CPU.
I have already attached show tech and show processes cpu you can check.
Good Day!!
My name is Jobin, and I am sending you this e-mail to let you know that I have taken the ownership of this SR 695077555
As I have understood you are seeing issues with High CPU, please allow me some time go to through the logs will come back to you with an update.
Please let me know
1.
How frequently are you facing this issue ?
2.
Have you done any configuration changes ?
3.
Is it a new setup or the existing one ?
4.
Please explain the issue in brief.
Also, to help me better understand the urgency of this case, please briefly describe the business impact this issue has on your operations.
Note: Use "Reply All" function of your email program to ensure timely response for your queries
User: 00u547cgp4nzef79z5d7
Email: [email protected]
File uploaded from Support Case Manager
User Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/110.0.0.0 Safari/537.36
File Name: sh-tech
File Type: web_uploaded
File Description:
File Link: https://mycase.cloudapps.cisco.com/695077555/attach?fileID=63edd0feed79e76571433d48
File Upload Date / Time: Thu Feb 16 2023 14:45:22 GMT+0800 (Singapore Standard Time) - COMPLETED
You can now upload files to the case using FTP/FTPS/SCP/SFTP/HTTPS protocols and the following details:
Hostname: cxd.cisco.com
Username: 695077555
Password: O0QZpidf97QSUmC9
Please note:
1. When uploading to HTTPS the path must be set to /home/<filename>, for all other protocols the path is always '/<filename>'
2. Empty files, that is files with a size of 0 Bytes, will not be attached and will be deleted automatically.
User: 00u547cgp4nzef79z5d7
Email: [email protected]
File uploaded from Support Case Manager
User Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/110.0.0.0 Safari/537.36
File Name: TLDC-CN-RTR01
File Type: web_uploaded
File Description:
File Link: https://mycase.cloudapps.cisco.com/695077555/attach?fileID=63edd0507ca83e7a3ae69e23
File Upload Date / Time: Thu Feb 16 2023 14:42:30 GMT+0800 (Singapore Standard Time) - COMPLETED
Hello Md Ali Emrose Khan,
This is confirmation that Case Number 695077555 was successfully opened with the Cisco Technical Assistance Center.
Case details:
Case: 695077555
Case Subject: Control Node CPU getting high (more than 90%)
Severity: 3
Status: Open
Please REPLY ALL to this email so that updates you make will be reflected in the case notes.
To manage this case, you can use:
Technology: Router and IOS Architecture
Subtechnology: IOS High CPU
Problem Code: Software Failure
Product: NA
Product Family: ASR1000
Software Version: N/A
Router/Node Name: N/A
Problem Details: we observing control node CPU getting high. we have two control node and both are getting High some time it reached 100%
Technology: Router and IOS Architecture
Subtechnology: IOS High CPU
Problem Code: Software Failure
Product: NA
Product Family: ASR1000
Software Version: N/A
Router/Node Name: N/A
Problem Details: we observing control node CPU getting high. we have two control node and both are getting High some time it reached 100%
we observing control node CPU getting high. we have two control node and both are getting High some time it reached 100%
timestamp : 2023-03-30T12:49:59.000+0000 || updatedby : jobingeo || type : RESOLUTION SUMMARY || visibility : External || details : ++ Regarding the punt inject drops:
Feb 8 2023 05:57:56.583 UTC: %IOSXE-5-PLATFORM: R0/0: cpp_cp: QFP:0.1 Thread:090 TS:00031241039764900733 %PUNT_INJECT-5-DROP_PUNT_CAUSE: punt policer drops packets, cause: for-us-data (0xb) from TenGigabitEthernet0/1/0 src ip: 172.18.1.98
Feb 8 2023 06:02:01.780 UTC: %IOSXE-5-PLATFORM: R0/0: cpp_cp: QFP:0.1 Thread:030 TS:00031241284970959902 %PUNT_INJECT-5-DROP_PUNT_CAUSE: punt policer drops packets, cause: for-us-data (0xb) from TenGigabitEthernet0/1/1 src ip: 172.18.0.134
show platform software punt-policer drop-only
Per Punt-Cause Policer Configuration and Packet Counters
Punt Config Rate(pps) Conform Packets Dropped Packets Config Burst(pkts) Config Alert
Cause Description Normal High Normal High Normal High Normal High Normal High
-------------------------------------------------------------------------------------------------------------------------------------------------------------
11 For-us data 40000 5000 384699812 14399195415 0 611103 40000 5000 Off Off
1. To identify the packets that is causing the CPU spike, we need to enable the below debugs, please note these debugs can be run during the production and non-service impacting.
Conft
Ip access list extended TAC
Permit ip any any
debug platform condition ipv4 access-list TAC both
debug platform packet-trace packet 8192 circular fia-trace
debug platform packet-trace punt code 11
debug platform packet-trace copy packet both size 256 L3
once the punt logs are observed please run the below commands and share the tac.txt file for further analysis.
show platform packet-trace statistics | app tac.txt
show platform packet-trace summary | app tac.txt
show platform packet-trace packet all | app tac.txt ( wait for some time for router to copy all the packets )
show platform hardware qfp active infrastructure punt config cause 11 | app tac.txt
show platform software punt-policer drop-only | app tac.txt
Punt-policer is enabled by default, and it polices all the control plane punted traffic. When traffic for a specific punt cause exceeds the configured value, the packets will be dropped, and a log message printed, punt policer is enabled to control the CPU from becoming overwhelmed. Currently the high priority traffic threshold is 5000
As we see the high priority packets are dropped, we can increase the threshold to 15000 and see if there is any drops. ( this can be applied later after getting the logs from debugs)
Conf t
#Platform punt-policer 11 15000 high
2.In addition, please configure this command to monitor which process is taking the more CPU load.
process cpu threshold type total rising 90 interval 5 falling 50 intervals 5
3.currently process that is causing more CPU utilisation is BGP router but not sure when its 90% need to take a capture when its 90 percent.
LDC-CN-RTR01#sh processes cpu sorted
CPU utilization for five seconds: 66%/1%; one minute: 65%; five minutes: 64%
PID Runtime(ms) Invoked uSecs 5Sec 1Min 5Min TTY Process
722 2491375244 645632249 3858 54.43% 50.97% 50.59% 0 BGP Router
396 1358881623 1928116369 704 6.00% 7.08% 6.99% 0 LISP control
134 490160586 3276638596 0 2.56% 2.39% 2.40% 0 IOSXE-RP Punt Se
333 127630648 370024659 344 1.20% 1.34% 1.38% 0 IP RIB Update
228 5908 5801 1018 0.15% 1.07% 0.66% 2 SSH Process
306 15299251 276586916 55 0.15% 0.09% 0.08% 0 TCP Timer
152 22577584 3548004 6363 0.15% 0.07% 0.05% 0 Compute load av
BGP router process, Calculates the best BGP path and processes any route churn. It also sends and receives routes, establishes peers, and interacts with the routing information base (RIB).
To get more details we need to enable debugs on the router.
Increase Interface Input Queues
If BGP advertises thousands of routes to many peers, TCP must transmit thousands of packets in a short duration. The BGP peers receive these packets and send TCP acknowledgements to the BGP speaker that advertises, which causes the BGP speaker to receive a flood of TCP ACKs in a short period of time. If the ACKs arrive at a rate that is too high for the route processor, packets back up in inbound interface queues. By default, router interfaces use an input queue size of 75 packets. In addition, special control packets such as BGP UPDATES use a special queue with Selective Packet Discard (SPD). This special queue holds 100 packets. When BGP convergence, happens TCP ACKs can fill quickly the 175 spots of input buffering and the new packets that arrive must be dropped. On routers with 15 or more BGP peers and exchange of the full Internet routing table, over 10,000 drops per interface per minute can be seen. Here is example output from a router 15 minutes after reboot:
Router#show interface pos 8/0 | include input queue
Output queue 0/40, 0 drops; input queue 0/75, 278637 drops
Router#
If you increase the interface input queue depth (with the hold-queue in command) it helps reduce the number of dropped TCP ACKs, which reduces the amount of work BGP must do to converge. Normally, a value of 1000 resolves problems caused by input queue drops.
These are described in below doc and matches the issue we are seeing, there could be some peers which are advertising the routes in continuous interval.
https://www.cisco.com/c/en/us/support/docs/ip/border-gateway-protocol-bgp/107615-highcpu-bgp.html
++ Suggest increasing input que to 1000
interface tenGigabitEthernet 0/1/0
#hold-queue 1000 in
Please capture the below logs when CPU is over 90% to check further.
Show process cpu sorted
show bgp neighbors
show bgp all summary | i table
show bgp vpnv4 unicast all neighbors
show bgp all summary
show platform software punt-policer drop-only
show interfaces tenGigabitEthernet 0/1/0 | i que
show interfaces tenGigabitEthernet 0/1/1 | i que
show platform hardware qfp active statistics drop detail
show logging | Question: Which product is principally discussed in these documents?
Answer "NONE" if you cannot find answer in the given documents.
The ONLY product name should be selected from the given product name list: ASR1002-HX/ ASR1009-X Response in this JSON format:
{"product_name": "","explanation": "", "summary": ""}
Technology: Router and IOS Architecture
Subtechnology: IOS High CPU
Problem Code: Software Failure
Product: NA
Product Family: ASR1000
Software Version: N/A
Router/Node Name: N/A
Problem Details: we observing control node CPU getting high. we have two control node and both are getting High some time it reached 100%
we observing control node CPU getting high. we have two control node and both are getting High some time it reached 100%
timestamp : 2023-03-30T12:49:59.000+0000 || updatedby : jobingeo || type : RESOLUTION SUMMARY || visibility : External || details : ++ Regarding the punt inject drops:
Feb 8 2023 05:57:56.583 UTC: %IOSXE-5-PLATFORM: R0/0: cpp_cp: QFP:0.1 Thread:090 TS:00031241039764900733 %PUNT_INJECT-5-DROP_PUNT_CAUSE: punt policer drops packets, cause: for-us-data (0xb) from TenGigabitEthernet0/1/0 src ip: 172.18.1.98
Feb 8 2023 06:02:01.780 UTC: %IOSXE-5-PLATFORM: R0/0: cpp_cp: QFP:0.1 Thread:030 TS:00031241284970959902 %PUNT_INJECT-5-DROP_PUNT_CAUSE: punt policer drops packets, cause: for-us-data (0xb) from TenGigabitEthernet0/1/1 src ip: 172.18.0.134
show platform software punt-policer drop-only
Per Punt-Cause Policer Configuration and Packet Counters
Punt Config Rate(pps) Conform Packets Dropped Packets Config Burst(pkts) Config Alert
Cause Description Normal High Normal High Normal High Normal High Normal High
-------------------------------------------------------------------------------------------------------------------------------------------------------------
11 For-us data 40000 5000 384699812 14399195415 0 611103 40000 5000 Off Off
1. To identify the packets that is causing the CPU spike, we need to enable the below debugs, please note these debugs can be run during the production and non-service impacting.
Conft
Ip access list extended TAC
Permit ip any any
debug platform condition ipv4 access-list TAC both
debug platform packet-trace packet 8192 circular fia-trace
debug platform packet-trace punt code 11
debug platform packet-trace copy packet both size 256 L3
once the punt logs are observed please run the below commands and share the tac.txt file for further analysis.
show platform packet-trace statistics | app tac.txt
show platform packet-trace summary | app tac.txt
show platform packet-trace packet all | app tac.txt ( wait for some time for router to copy all the packets )
show platform hardware qfp active infrastructure punt config cause 11 | app tac.txt
show platform software punt-policer drop-only | app tac.txt
Punt-policer is enabled by default, and it polices all the control plane punted traffic. When traffic for a specific punt cause exceeds the configured value, the packets will be dropped, and a log message printed, punt policer is enabled to control the CPU from becoming overwhelmed. Currently the high priority traffic threshold is 5000
As we see the high priority packets are dropped, we can increase the threshold to 15000 and see if there is any drops. ( this can be applied later after getting the logs from debugs)
Conf t
#Platform punt-policer 11 15000 high
2.In addition, please configure this command to monitor which process is taking the more CPU load.
process cpu threshold type total rising 90 interval 5 falling 50 intervals 5
3.currently process that is causing more CPU utilisation is BGP router but not sure when its 90% need to take a capture when its 90 percent.
LDC-CN-RTR01#sh processes cpu sorted
CPU utilization for five seconds: 66%/1%; one minute: 65%; five minutes: 64%
PID Runtime(ms) Invoked uSecs 5Sec 1Min 5Min TTY Process
722 2491375244 645632249 3858 54.43% 50.97% 50.59% 0 BGP Router
396 1358881623 1928116369 704 6.00% 7.08% 6.99% 0 LISP control
134 490160586 3276638596 0 2.56% 2.39% 2.40% 0 IOSXE-RP Punt Se
333 127630648 370024659 344 1.20% 1.34% 1.38% 0 IP RIB Update
228 5908 5801 1018 0.15% 1.07% 0.66% 2 SSH Process
306 15299251 276586916 55 0.15% 0.09% 0.08% 0 TCP Timer
152 22577584 3548004 6363 0.15% 0.07% 0.05% 0 Compute load av
BGP router process, Calculates the best BGP path and processes any route churn. It also sends and receives routes, establishes peers, and interacts with the routing information base (RIB).
To get more details we need to enable debugs on the router.
Increase Interface Input Queues
If BGP advertises thousands of routes to many peers, TCP must transmit thousands of packets in a short duration. The BGP peers receive these packets and send TCP acknowledgements to the BGP speaker that advertises, which causes the BGP speaker to receive a flood of TCP ACKs in a short period of time. If the ACKs arrive at a rate that is too high for the route processor, packets back up in inbound interface queues. By default, router interfaces use an input queue size of 75 packets. In addition, special control packets such as BGP UPDATES use a special queue with Selective Packet Discard (SPD). This special queue holds 100 packets. When BGP convergence, happens TCP ACKs can fill quickly the 175 spots of input buffering and the new packets that arrive must be dropped. On routers with 15 or more BGP peers and exchange of the full Internet routing table, over 10,000 drops per interface per minute can be seen. Here is example output from a router 15 minutes after reboot:
Router#show interface pos 8/0 | include input queue
Output queue 0/40, 0 drops; input queue 0/75, 278637 drops
Router#
If you increase the interface input queue depth (with the hold-queue in command) it helps reduce the number of dropped TCP ACKs, which reduces the amount of work BGP must do to converge. Normally, a value of 1000 resolves problems caused by input queue drops.
These are described in below doc and matches the issue we are seeing, there could be some peers which are advertising the routes in continuous interval.
https://www.cisco.com/c/en/us/support/docs/ip/border-gateway-protocol-bgp/107615-highcpu-bgp.html
++ Suggest increasing input que to 1000
interface tenGigabitEthernet 0/1/0
#hold-queue 1000 in
Please capture the below logs when CPU is over 90% to check further.
Show process cpu sorted
show bgp neighbors
show bgp all summary | i table
show bgp vpnv4 unicast all neighbors
show bgp all summary
show platform software punt-policer drop-only
show interfaces tenGigabitEthernet 0/1/0 | i que
show interfaces tenGigabitEthernet 0/1/1 | i que
show platform hardware qfp active statistics drop detail
show logging | Technology: Router and IOS Architecture
Subtechnology: IOS High CPU
Problem Code: Software Failure
Product: NA
Product Family: ASR1000
Software Version: N/A
Router/Node Name: N/A
Problem Details: we observing control node CPU getting high. we have two control node and both are getting High some time it reached 100% | we observing control node CPU getting high. we have two control node and both are getting High some time it reached 100% | timestamp : 2023-03-30T12:49:59.000+0000 || updatedby : jobingeo || type : RESOLUTION SUMMARY || visibility : External || details : ++ Regarding the punt inject drops:
Feb 8 2023 05:57:56.583 UTC: %IOSXE-5-PLATFORM: R0/0: cpp_cp: QFP:0.1 Thread:090 TS:00031241039764900733 %PUNT_INJECT-5-DROP_PUNT_CAUSE: punt policer drops packets, cause: for-us-data (0xb) from TenGigabitEthernet0/1/0 src ip: 172.18.1.98
Feb 8 2023 06:02:01.780 UTC: %IOSXE-5-PLATFORM: R0/0: cpp_cp: QFP:0.1 Thread:030 TS:00031241284970959902 %PUNT_INJECT-5-DROP_PUNT_CAUSE: punt policer drops packets, cause: for-us-data (0xb) from TenGigabitEthernet0/1/1 src ip: 172.18.0.134
show platform software punt-policer drop-only
Per Punt-Cause Policer Configuration and Packet Counters
Punt Config Rate(pps) Conform Packets Dropped Packets Config Burst(pkts) Config Alert
Cause Description Normal High Normal High Normal High Normal High Normal High
-------------------------------------------------------------------------------------------------------------------------------------------------------------
11 For-us data 40000 5000 384699812 14399195415 0 611103 40000 5000 Off Off
1. To identify the packets that is causing the CPU spike, we need to enable the below debugs, please note these debugs can be run during the production and non-service impacting.
Conft
Ip access list extended TAC
Permit ip any any
debug platform condition ipv4 access-list TAC both
debug platform packet-trace packet 8192 circular fia-trace
debug platform packet-trace punt code 11
debug platform packet-trace copy packet both size 256 L3
once the punt logs are observed please run the below commands and share the tac.txt file for further analysis.
show platform packet-trace statistics | app tac.txt
show platform packet-trace summary | app tac.txt
show platform packet-trace packet all | app tac.txt ( wait for some time for router to copy all the packets )
show platform hardware qfp active infrastructure punt config cause 11 | app tac.txt
show platform software punt-policer drop-only | app tac.txt
Punt-policer is enabled by default, and it polices all the control plane punted traffic. When traffic for a specific punt cause exceeds the configured value, the packets will be dropped, and a log message printed, punt policer is enabled to control the CPU from becoming overwhelmed. Currently the high priority traffic threshold is 5000
As we see the high priority packets are dropped, we can increase the threshold to 15000 and see if there is any drops. ( this can be applied later after getting the logs from debugs)
Conf t
#Platform punt-policer 11 15000 high
2.In addition, please configure this command to monitor which process is taking the more CPU load.
process cpu threshold type total rising 90 interval 5 falling 50 intervals 5
3.currently process that is causing more CPU utilisation is BGP router but not sure when its 90% need to take a capture when its 90 percent.
LDC-CN-RTR01#sh processes cpu sorted
CPU utilization for five seconds: 66%/1%; one minute: 65%; five minutes: 64%
PID Runtime(ms) Invoked uSecs 5Sec 1Min 5Min TTY Process
722 2491375244 645632249 3858 54.43% 50.97% 50.59% 0 BGP Router
396 1358881623 1928116369 704 6.00% 7.08% 6.99% 0 LISP control
134 490160586 3276638596 0 2.56% 2.39% 2.40% 0 IOSXE-RP Punt Se
333 127630648 370024659 344 1.20% 1.34% 1.38% 0 IP RIB Update
228 5908 5801 1018 0.15% 1.07% 0.66% 2 SSH Process
306 15299251 276586916 55 0.15% 0.09% 0.08% 0 TCP Timer
152 22577584 3548004 6363 0.15% 0.07% 0.05% 0 Compute load av
BGP router process, Calculates the best BGP path and processes any route churn. It also sends and receives routes, establishes peers, and interacts with the routing information base (RIB).
To get more details we need to enable debugs on the router.
Increase Interface Input Queues
If BGP advertises thousands of routes to many peers, TCP must transmit thousands of packets in a short duration. The BGP peers receive these packets and send TCP acknowledgements to the BGP speaker that advertises, which causes the BGP speaker to receive a flood of TCP ACKs in a short period of time. If the ACKs arrive at a rate that is too high for the route processor, packets back up in inbound interface queues. By default, router interfaces use an input queue size of 75 packets. In addition, special control packets such as BGP UPDATES use a special queue with Selective Packet Discard (SPD). This special queue holds 100 packets. When BGP convergence, happens TCP ACKs can fill quickly the 175 spots of input buffering and the new packets that arrive must be dropped. On routers with 15 or more BGP peers and exchange of the full Internet routing table, over 10,000 drops per interface per minute can be seen. Here is example output from a router 15 minutes after reboot:
Router#show interface pos 8/0 | include input queue
Output queue 0/40, 0 drops; input queue 0/75, 278637 drops
Router#
If you increase the interface input queue depth (with the hold-queue in command) it helps reduce the number of dropped TCP ACKs, which reduces the amount of work BGP must do to converge. Normally, a value of 1000 resolves problems caused by input queue drops.
These are described in below doc and matches the issue we are seeing, there could be some peers which are advertising the routes in continuous interval.
https://www.cisco.com/c/en/us/support/docs/ip/border-gateway-protocol-bgp/107615-highcpu-bgp.html
++ Suggest increasing input que to 1000
interface tenGigabitEthernet 0/1/0
#hold-queue 1000 in
Please capture the below logs when CPU is over 90% to check further.
Show process cpu sorted
show bgp neighbors
show bgp all summary | i table
show bgp vpnv4 unicast all neighbors
show bgp all summary
show platform software punt-policer drop-only
show interfaces tenGigabitEthernet 0/1/0 | i que
show interfaces tenGigabitEthernet 0/1/1 | i que
show platform hardware qfp active statistics drop detail
show logging | nan | ASR1002-HX | asr1000-universalk9.17.03.04a.SPA.bin | nan | nan | 3 | nan | Debug/Diagnostic Capability (missing, incomplete, cryptic...) | ASR1000 | Router and IOS-XE Architecture | IOS-XE - NETCONF and RESTCONF and YANG | nan | nan | nan | nan | nan | nan |
694117912 | Question: Which software version is principally discussed in these documents?
Answer "NONE" if you cannot find answer in the given documents.
The ONLY software version should be selected from the given software version list: NA - COMPONENT ONLY/ 2.2.3.4/ 16.12.04/ 2.1.2.7/ 2.2.2.9/ 2.2.2.8/ 1.3.1.4/ 2.3.3.4/ 2.3.3.7/ 2.2.2.8/ 1.3.3.7/ 17.03.03/ 2.1.2.7/ 1.3.3.7/ 2.2.2.9/ 2.3.3.7/ 16.12.4/ 2.2.3.5/ 2.2.3.6/ 2.2.2.9/ 4.0.4b/ 2.2.3.4/ 2.2.2.8/ 2.1.2.6/ 2.2.3.5 Response in this JSON format:
{"software_version": "","explanation": "", "summary": ""}
Wearing a larger form for the below issue:
A big educational institution a cherished customer is observing this issue on a 3 node DNAC in 2.2.2.9 where port assignment provisioning removing radius config and reapplying the same in global config of the switch .
E2-03-CNT-ES2(config)#no radius server dnac-radius_172.19.208.9
E2-03-CNT-ES2(config)#no radius server dnac-radius_172.19.208.25
E2-03-CNT-ES2(config)#radius server dnac-radius_172.19.208.9
E2-03-CNT-ES2(config-radius-server)#address ipv4 172.19.208.9 auth-port 1812 acct-port 1813
E2-03-CNT-ES2(config-radius-server)#pac key 7 ******
E2-03-CNT-ES2(config-radius-server)#retransmit 3
E2-03-CNT-ES2(config-radius-server)#timeout 4
E2-03-CNT-ES2(config-radius-server)#automate-tester username dummy ignore-acct-port probe-on
E2-03-CNT-ES2(config-radius-server)#exit
E2-03-CNT-ES2(config)#radius server dnac-radius_172.19.208.25
E2-03-CNT-ES2(config-radius-server)#address ipv4 172.19.208.25 auth-port 1812 acct-port 1813
E2-03-CNT-ES2(config-radius-server)#pac key 7 ******
E2-03-CNT-ES2(config-radius-server)#retransmit 3
E2-03-CNT-ES2(config-radius-server)#timeout 4
E2-03-CNT-ES2(config-radius-server)#automate-tester username dummy ignore-acct-port probe-on
E2-03-CNT-ES2(config-radius-server)#exit
Some of the swicthes CU tested is exhibiting this behaviour. Attaching the show-tech from the switch to the case. This is first port provisioning done for the switch after update from 2.1.2.7 to 2.2.2.9
Host onboarding attempted for interface GigabitEthernet1/0/40
Upgrade of DNAC from 2.1.2.7 to 2.2.2.9 (16-18 Jul). Now when we do port provisioning, we observed this issue.
Please find below the information.
1.
Do all devices exhibit this behaviour ? What is the show run of this switch ? What are the last provisioning done for this device ?
Some of those we tested is exhibit this behaviour.
I have attached the show-tech from the switch to the case.
This is first port provisioning done for the switch after update from 2.1.2.7 to 2.2.2.9
2.
Is DNAC single node or three node cluster and what is the current version of DNAC?
3-node cluster
3.
Which interface was configured here ?
interface GigabitEthernet1/0/40
4.
Any recent changes post which this has been observed ? Since when did this start ?
Upgrade of DNAC from 2.1.2.7 to 2.2.2.9 (16-18 Jul).
Today when we do port provisioning, we observed this issue.
5.
Please collect and upload a RCA file to case
I will get it uploaded.
I will upload the other command output as well.
I have already uploaded DNAC screenshot, DNAC logs and FE/switch logs.
Technology: Cisco DNA Center - On-Prem
Subtechnology: Cisco DNA Center - Infrastructure (Services, UI, API, etc.)
Problem Code: Error Messages, Logs, Debugs
Product: NA
Product Family: C9300
Software Version: N/A
Router/Node Name: N/A
Problem Details: DNAC - Port Assignment provisioning removing radius config and reapplying the same
E2-03-CNT-ES2(config)#no radius server dnac-radius_172.19.208.9
E2-03-CNT-ES2(config)#no radius server dnac-radius_172.19.208.25
E2-03-CNT-ES2(config)#radius server dnac-radius_172.19.208.9
E2-03-CNT-ES2(config-radius-server)#address ipv4 172.19.208.9 auth-port 1812 acct-port 1813
E2-03-CNT-ES2(config-radius-server)#pac key 7 ******
E2-03-CNT-ES2(config-radius-server)#retransmit 3
E2-03-CNT-ES2(config-radius-server)#timeout 4
E2-03-CNT-ES2(config-radius-server)#automate-tester username dummy ignore-acct-port probe-on
E2-03-CNT-ES2(config-radius-server)#exit
E2-03-CNT-ES2(config)#radius server dnac-radius_172.19.208.25
E2-03-CNT-ES2(config-radius-server)#address ipv4 172.19.208.25 auth-port 1812 acct-port 1813
E2-03-CNT-ES2(config-radius-server)#pac key 7 ******
E2-03-CNT-ES2(config-radius-server)#retransmit 3
E2-03-CNT-ES2(config-radius-server)#timeout 4
E2-03-CNT-ES2(config-radius-server)#automate-tester username dummy ignore-acct-port probe-on
E2-03-CNT-ES2(config-radius-server)#exit
DNAC - Port Assignment provisioning removing radius config and reapplying the same
E2-03-CNT-ES2(config)#no radius server dnac-radius_172.19.208.9
E2-03-CNT-ES2(config)#no radius server dnac-radius_172.19.208.25
E2-03-CNT-ES2(config)#radius server dnac-radius_172.19.208.9
E2-03-CNT-ES2(config-radius-server)#address ipv4 172.19.208.9 auth-port 1812 acct-port 1813
E2-03-CNT-ES2(config-radius-server)#pac key 7 ******
E2-03-CNT-ES2(config-radius-server)#retransmit 3
E2-03-CNT-ES2(config-radius-server)#timeout 4
E2-03-CNT-ES2(config-radius-server)#automate-tester username dummy ignore-acct-port probe-on
E2-03-CNT-ES2(config-radius-server)#exit
E2-03-CNT-ES2(config)#radius server dnac-radius_172.19.208.25
E2-03-CNT-ES2(config-radius-server)#address ipv4 172.19.208.25 auth-port 1812 acct-port 1813
E2-03-CNT-ES2(config-radius-server)#pac key 7 ******
E2-03-CNT-ES2(config-radius-server)#retransmit 3
E2-03-CNT-ES2(config-radius-server)#timeout 4
E2-03-CNT-ES2(config-radius-server)#automate-tester username dummy ignore-acct-port probe-on
E2-03-CNT-ES2(config-radius-server)#exit
timestamp : 2022-09-07T12:12:02.000+0000 || updatedby : asechatu || type : RESOLUTION SUMMARY || visibility : External || details : after three attempts of reaching out to the customer he did not provide me the RCA to relay to the development engineers.
I will go ahead and close this case as the customer was unresponsive | Question: Which product is principally discussed in these documents?
Answer "NONE" if you cannot find answer in the given documents.
The ONLY product name should be selected from the given product name list: DN1-HW-APL/ DN2-HW-APL/ DN2-HW-APL-XL/ C9300-48UN/ DN2-HW-APL-L/ DN2-HW-APL-U/ C9300-48U Response in this JSON format:
{"product_name": "","explanation": "", "summary": ""}
After reproducing the issue we need the RCA .
Unfortunately we cannot proceed any further without it.
.:|:.:|:.
I have filled a new defect but with the RCA not uploaded I feel the logs would have got rolled over. Can you try the host onboarding again and collect the RCA ? Please help us with supporting logs also.
I have filled a new defect but with the RCA not uploaded I feel the logs would have got rolled over.
Can you try the host onboarding again and collect the RCA ? Please help us with supporting logs also.
.:|:.:|:.
Need to check for the following after an internal discussion
Do I need file a new defect or in some use cases this is okay ? Anyways assistance of this will really be helpful.
Wearing a larger form for the below issue:
A big educational institution a cherished customer is observing this issue on a 3 node DNAC in 2.2.2.9 where port assignment provisioning removing radius config and reapplying the same in global config of the switch .
E2-03-CNT-ES2(config)#no radius server dnac-radius_172.19.208.9
E2-03-CNT-ES2(config)#no radius server dnac-radius_172.19.208.25
E2-03-CNT-ES2(config)#radius server dnac-radius_172.19.208.9
E2-03-CNT-ES2(config-radius-server)#address ipv4 172.19.208.9 auth-port 1812 acct-port 1813
E2-03-CNT-ES2(config-radius-server)#pac key 7 ******
E2-03-CNT-ES2(config-radius-server)#retransmit 3
E2-03-CNT-ES2(config-radius-server)#timeout 4
E2-03-CNT-ES2(config-radius-server)#automate-tester username dummy ignore-acct-port probe-on
E2-03-CNT-ES2(config-radius-server)#exit
E2-03-CNT-ES2(config)#radius server dnac-radius_172.19.208.25
E2-03-CNT-ES2(config-radius-server)#address ipv4 172.19.208.25 auth-port 1812 acct-port 1813
E2-03-CNT-ES2(config-radius-server)#pac key 7 ******
E2-03-CNT-ES2(config-radius-server)#retransmit 3
E2-03-CNT-ES2(config-radius-server)#timeout 4
E2-03-CNT-ES2(config-radius-server)#automate-tester username dummy ignore-acct-port probe-on
E2-03-CNT-ES2(config-radius-server)#exit
Some of the swicthes CU tested is exhibiting this behaviour. Attaching the show-tech from the switch to the case. This is first port provisioning done for the switch after update from 2.1.2.7 to 2.2.2.9
Host onboarding attempted for interface GigabitEthernet1/0/40
Upgrade of DNAC from 2.1.2.7 to 2.2.2.9 (16-18 Jul). Now when we do port provisioning, we observed this issue.
For the last 3 days , I tried reaching out toa developer that handled a previous defect like this.
They haven’t replied to me.
I will reach out to bigger forum today and see response.
.:|:.:|:.
Please update the status.
Please find below the information.
1.
Do all devices exhibit this behaviour ? What is the show run of this switch ? What are the last provisioning done for this device ?
Some of those we tested is exhibit this behaviour.
I have attached the show-tech from the switch to the case.
This is first port provisioning done for the switch after update from 2.1.2.7 to 2.2.2.9
2.
Is DNAC single node or three node cluster and what is the current version of DNAC?
3-node cluster
3.
Which interface was configured here ?
interface GigabitEthernet1/0/40
4.
Any recent changes post which this has been observed ? Since when did this start ?
Upgrade of DNAC from 2.1.2.7 to 2.2.2.9 (16-18 Jul).
Today when we do port provisioning, we observed this issue.
5.
Please collect and upload a RCA file to case
I will get it uploaded.
I will upload the other command output as well.
I have already uploaded DNAC screenshot, DNAC logs and FE/switch logs.
Thank you for contacting Cisco Technical Support.
My name is Aseem and I will be working closely with you towards resolving this case.
I have gone through the case notes and inferred the following: -
Problem Description: DNAC - Port Assignment provisioning removing radius config and reapplying the same
Symptoms:
E2-03-CNT-ES2(config)#no radius server dnac-radius_172.19.208.9
E2-03-CNT-ES2(config)#no radius server dnac-radius_172.19.208.25
E2-03-CNT-ES2(config)#radius server dnac-radius_172.19.208.9
E2-03-CNT-ES2(config-radius-server)#address ipv4 172.19.208.9 auth-port 1812 acct-port 1813
E2-03-CNT-ES2(config-radius-server)#pac key 7 ******
E2-03-CNT-ES2(config-radius-server)#retransmit 3
E2-03-CNT-ES2(config-radius-server)#timeout 4
E2-03-CNT-ES2(config-radius-server)#automate-tester username dummy ignore-acct-port probe-on
E2-03-CNT-ES2(config-radius-server)#exit
E2-03-CNT-ES2(config)#radius server dnac-radius_172.19.208.25
E2-03-CNT-ES2(config-radius-server)#address ipv4 172.19.208.25 auth-port 1812 acct-port 1813
E2-03-CNT-ES2(config-radius-server)#pac key 7 ******
E2-03-CNT-ES2(config-radius-server)#retransmit 3
E2-03-CNT-ES2(config-radius-server)#timeout 4
E2-03-CNT-ES2(config-radius-server)#automate-tester username dummy ignore-acct-port probe-on
E2-03-CNT-ES2(config-radius-server)#exit
Action Plan:
To assist me with investigating this issue, are you able to please provide information/confirmation on the below points:
1.
Do all devices exhibit this behaviour ? What is the show run of this switch ? What are the last provisioning done for this device ?
2.
Is DNAC single node or three node cluster and what is the current version of DNAC?
3.
Which interface was configured here ?
4.
Any recent changes post which this has been observed ? Since when did this start ?
5.
Please collect and upload a RCA file to case
(For generation you need to just enter the command “rca “ one by one on all nodes and then extract from the DNAC refer section Extract the RCA file on a Windows computer in below document)
Reference 'How to Generate and Extract Root Cause Analysis (RCA) file from Digital Network Architecture (DNA) Center.': https://www.cisco.com/c/en/us/support/docs/cloud-systems-management/dna-center/213926-how-to-generate-and-extract-root-cause-a.html
8.
Please collect and send the following output from the maglev CLI:
a.
maglev package status
b.
magctl appstack status
c.
magctl appstack status | grep -v -E '([0-9]+)/\1.*Running'
d.
magctl node status
e.
magctl node display
f.
etcdctl cluster-health
Business Impact: Please provide what is the business impact ?
:|:.:|:.
User: 00us9gpwj1wne67ev5d6
Email: [email protected]
File uploaded from Support Case Manager
User Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:103.0) Gecko/20100101 Firefox/103.0
File Name: 172.18.1.11_19082022_1643.log
File Type: log_values
File Description: show tech
File Link: https://mycase.cloudapps.cisco.com/694117912/attach?fileID=62ff52428a2e49561792555e
User: 00us9gpwj1wne67ev5d6
Email: [email protected]
File uploaded from Support Case Manager
User Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:103.0) Gecko/20100101 Firefox/103.0
File Name: 694117912_DNAC_Provisiong_output.docx
File Type: log_values
File Description: DNAC & FE Logs
File Link: https://mycase.cloudapps.cisco.com/694117912/attach?fileID=62ff51e189279911bfcc6256
User: 00us9gpwj1wne67ev5d6
Email: [email protected]
File uploaded from Support Case Manager
User Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:103.0) Gecko/20100101 Firefox/103.0
File Name: 694117912_172.18.1.11-19082022-095738.txt
File Type: log_values
File Description: DNAC & FE Logs
File Link: https://mycase.cloudapps.cisco.com/694117912/attach?fileID=62ff51dffdf3e35f19fc22d2
User: 00us9gpwj1wne67ev5d6
Email: [email protected]
File uploaded from Support Case Manager
User Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:103.0) Gecko/20100101 Firefox/103.0
File Name: 694117912_DNAC_Provisiong_logs.txt
File Type: log_values
File Description: DNAC & FE Logs
File Link: https://mycase.cloudapps.cisco.com/694117912/attach?fileID=62ff51dc32a485058cd97430
You can now upload files to the case using FTP/FTPS/SCP/SFTP/HTTPS protocols and the following details:
Hostname: cxd.cisco.com
Username: 694117912
Password: F0Tr1BXWcHVkhz8d
Please note:
1. When uploading to HTTPS the path must be set to /home/<filename>, for all other protocols the path is always '/<filename>'
2. Empty files, that is files with a size of 0 Bytes, will not be attached and will be deleted automatically.
Hello George Kingsley Paul Sundararaj,
This is confirmation that Case Number 694117912 was successfully opened with the Cisco Technical Assistance Center.
Case details:
Case: 694117912
Case Subject: DNAC - Port Assignment provisioning removing radius config and reapplying the same
Severity: 3
Status: Open
Please REPLY ALL to this email so that updates you make will be reflected in the case notes.
To manage this case, you can use:
Technology: Cisco DNA Center - On-Prem
Subtechnology: Cisco DNA Center - Infrastructure (Services, UI, API, etc.)
Problem Code: Error Messages, Logs, Debugs
Product: NA
Product Family: C9300
Software Version: N/A
Router/Node Name: N/A
Problem Details: DNAC - Port Assignment provisioning removing radius config and reapplying the same
E2-03-CNT-ES2(config)#no radius server dnac-radius_172.19.208.9
E2-03-CNT-ES2(config)#no radius server dnac-radius_172.19.208.25
E2-03-CNT-ES2(config)#radius server dnac-radius_172.19.208.9
E2-03-CNT-ES2(config-radius-server)#address ipv4 172.19.208.9 auth-port 1812 acct-port 1813
E2-03-CNT-ES2(config-radius-server)#pac key 7 ******
E2-03-CNT-ES2(config-radius-server)#retransmit 3
E2-03-CNT-ES2(config-radius-server)#timeout 4
E2-03-CNT-ES2(config-radius-server)#automate-tester username dummy ignore-acct-port probe-on
E2-03-CNT-ES2(config-radius-server)#exit
E2-03-CNT-ES2(config)#radius server dnac-radius_172.19.208.25
E2-03-CNT-ES2(config-radius-server)#address ipv4 172.19.208.25 auth-port 1812 acct-port 1813
E2-03-CNT-ES2(config-radius-server)#pac key 7 ******
E2-03-CNT-ES2(config-radius-server)#retransmit 3
E2-03-CNT-ES2(config-radius-server)#timeout 4
E2-03-CNT-ES2(config-radius-server)#automate-tester username dummy ignore-acct-port probe-on
E2-03-CNT-ES2(config-radius-server)#exit
DNAC - Port Assignment provisioning removing radius config and reapplying the same
E2-03-CNT-ES2(config)#no radius server dnac-radius_172.19.208.9
E2-03-CNT-ES2(config)#no radius server dnac-radius_172.19.208.25
E2-03-CNT-ES2(config)#radius server dnac-radius_172.19.208.9
E2-03-CNT-ES2(config-radius-server)#address ipv4 172.19.208.9 auth-port 1812 acct-port 1813
E2-03-CNT-ES2(config-radius-server)#pac key 7 ******
E2-03-CNT-ES2(config-radius-server)#retransmit 3
E2-03-CNT-ES2(config-radius-server)#timeout 4
E2-03-CNT-ES2(config-radius-server)#automate-tester username dummy ignore-acct-port probe-on
E2-03-CNT-ES2(config-radius-server)#exit
E2-03-CNT-ES2(config)#radius server dnac-radius_172.19.208.25
E2-03-CNT-ES2(config-radius-server)#address ipv4 172.19.208.25 auth-port 1812 acct-port 1813
E2-03-CNT-ES2(config-radius-server)#pac key 7 ******
E2-03-CNT-ES2(config-radius-server)#retransmit 3
E2-03-CNT-ES2(config-radius-server)#timeout 4
E2-03-CNT-ES2(config-radius-server)#automate-tester username dummy ignore-acct-port probe-on
E2-03-CNT-ES2(config-radius-server)#exit
timestamp : 2022-09-07T12:12:02.000+0000 || updatedby : asechatu || type : RESOLUTION SUMMARY || visibility : External || details : after three attempts of reaching out to the customer he did not provide me the RCA to relay to the development engineers.
I will go ahead and close this case as the customer was unresponsive | Technology: Cisco DNA Center - On-Prem
Subtechnology: Cisco DNA Center - Infrastructure (Services, UI, API, etc.)
Problem Code: Error Messages, Logs, Debugs
Product: NA
Product Family: C9300
Software Version: N/A
Router/Node Name: N/A
Problem Details: DNAC - Port Assignment provisioning removing radius config and reapplying the same
E2-03-CNT-ES2(config)#no radius server dnac-radius_172.19.208.9
E2-03-CNT-ES2(config)#no radius server dnac-radius_172.19.208.25
E2-03-CNT-ES2(config)#radius server dnac-radius_172.19.208.9
E2-03-CNT-ES2(config-radius-server)#address ipv4 172.19.208.9 auth-port 1812 acct-port 1813
E2-03-CNT-ES2(config-radius-server)#pac key 7 ******
E2-03-CNT-ES2(config-radius-server)#retransmit 3
E2-03-CNT-ES2(config-radius-server)#timeout 4
E2-03-CNT-ES2(config-radius-server)#automate-tester username dummy ignore-acct-port probe-on
E2-03-CNT-ES2(config-radius-server)#exit
E2-03-CNT-ES2(config)#radius server dnac-radius_172.19.208.25
E2-03-CNT-ES2(config-radius-server)#address ipv4 172.19.208.25 auth-port 1812 acct-port 1813
E2-03-CNT-ES2(config-radius-server)#pac key 7 ******
E2-03-CNT-ES2(config-radius-server)#retransmit 3
E2-03-CNT-ES2(config-radius-server)#timeout 4
E2-03-CNT-ES2(config-radius-server)#automate-tester username dummy ignore-acct-port probe-on
E2-03-CNT-ES2(config-radius-server)#exit | DNAC - Port Assignment provisioning removing radius config and reapplying the same
E2-03-CNT-ES2(config)#no radius server dnac-radius_172.19.208.9
E2-03-CNT-ES2(config)#no radius server dnac-radius_172.19.208.25
E2-03-CNT-ES2(config)#radius server dnac-radius_172.19.208.9
E2-03-CNT-ES2(config-radius-server)#address ipv4 172.19.208.9 auth-port 1812 acct-port 1813
E2-03-CNT-ES2(config-radius-server)#pac key 7 ******
E2-03-CNT-ES2(config-radius-server)#retransmit 3
E2-03-CNT-ES2(config-radius-server)#timeout 4
E2-03-CNT-ES2(config-radius-server)#automate-tester username dummy ignore-acct-port probe-on
E2-03-CNT-ES2(config-radius-server)#exit
E2-03-CNT-ES2(config)#radius server dnac-radius_172.19.208.25
E2-03-CNT-ES2(config-radius-server)#address ipv4 172.19.208.25 auth-port 1812 acct-port 1813
E2-03-CNT-ES2(config-radius-server)#pac key 7 ******
E2-03-CNT-ES2(config-radius-server)#retransmit 3
E2-03-CNT-ES2(config-radius-server)#timeout 4
E2-03-CNT-ES2(config-radius-server)#automate-tester username dummy ignore-acct-port probe-on
E2-03-CNT-ES2(config-radius-server)#exit | timestamp : 2022-09-07T12:12:02.000+0000 || updatedby : asechatu || type : RESOLUTION SUMMARY || visibility : External || details : after three attempts of reaching out to the customer he did not provide me the RCA to relay to the development engineers.
I will go ahead and close this case as the customer was unresponsive | nan | DN1-HW-APL | DNAC-SW-2.2.2.9.bin | nan | nan | 3 | nan | Software Bug | C9300 | Cisco DNA Center - On-Prem | Cisco DNA Center - Infrastructure (Services, UI, API, etc.) | nan | nan | nan | nan | nan | nan |
694208469 | Question: Which software version is principally discussed in these documents?
Answer "NONE" if you cannot find answer in the given documents.
The ONLY software version should be selected from the given software version list: 16.12.04/ 16.12.4 Response in this JSON format:
{"software_version": "","explanation": "", "summary": ""}
Closed
Technology: LAN Switching
Subtechnology: Cat9000 - Unexpected Reboot
Problem Code: Software Failure
Product: NA
Product Family: C9300
Software Version: N/A
Router/Node Name: N/A
Problem Details: 9300 Switch reboot with the reason of "stack merge due to incompatibility". And in the show_version output, it only shows 5 switches, it actually have 7 switches stack.
9300 Switch reboot with the reason of "stack merge due to incompatibility". And in the show_version output, it only shows 5 switches, it actually have 7 switches stack.
Post reseating stack cables, switch stable | Question: Which product is principally discussed in these documents?
Answer "NONE" if you cannot find answer in the given documents.
The ONLY product name should be selected from the given product name list: C9300-48U/ C9300-48U-A Response in this JSON format:
{"product_name": "","explanation": "", "summary": ""}
Technology: LAN Switching
Subtechnology: Cat9000 - Unexpected Reboot
Problem Code: Software Failure
Product: NA
Product Family: C9300
Software Version: N/A
Router/Node Name: N/A
Problem Details: 9300 Switch reboot with the reason of "stack merge due to incompatibility". And in the show_version output, it only shows 5 switches, it actually have 7 switches stack.
9300 Switch reboot with the reason of "stack merge due to incompatibility". And in the show_version output, it only shows 5 switches, it actually have 7 switches stack.
Post reseating stack cables, switch stable | Technology: LAN Switching
Subtechnology: Cat9000 - Unexpected Reboot
Problem Code: Software Failure
Product: NA
Product Family: C9300
Software Version: N/A
Router/Node Name: N/A
Problem Details: 9300 Switch reboot with the reason of "stack merge due to incompatibility". And in the show_version output, it only shows 5 switches, it actually have 7 switches stack. | 9300 Switch reboot with the reason of "stack merge due to incompatibility". And in the show_version output, it only shows 5 switches, it actually have 7 switches stack. | Post reseating stack cables, switch stable | Switch crashed | C9300-48U-A | 16.12.4 | 16.12.4 | 71.0 | 3 | 100.0 | Software Bug | C9300 | LAN Switching | Cat9000 - Unexpected Reboot | 01t1C000006fIcDQAU | Software Failure | Cat9000 - Unexpected Reboot | LAN Switching | 01t15000005W0LTAA0 | SHERLOCK: PARTIAL |
694249113 | Question: Which software version is principally discussed in these documents?
Answer "NONE" if you cannot find answer in the given documents.
The ONLY software version should be selected from the given software version list: 16.12.04/ NA - COMPONENT ONLY/ THIRD_PARTY_PRODUCT_SW/ NA - RMA/ 16.12.04/ 3.2.3o/ 15.0.2/ 16.06.07/ 16.12.03s/ 1/ 16.06.08/ 16.12.1s/ 17.03.05/ 16.12.4/ 16.9.5/ 16.12.01s/ PRODUCT_NOT_FOUND/ 16.3.5/ 16.12.3s/ 16.09.02/ 16.12.3a/ 16.12.1s/ 17.6.4 Response in this JSON format:
{"software_version": "","explanation": "", "summary": ""}
Closed
Technology: LAN Switching
Subtechnology: Cat9300
Problem Code: Error Messages, Logs, Debugs
Product: NA
Product Family: C9300
Software Version: N/A
Router/Node Name: N/A
Problem Details: Hi,
We have observed in 9300 switch log Power Device detected: Cisco PD and remove.
we checked interface is down. not sure about this alarm could you please help to explain and do t-shoot.
CELS-04-CNT-ES1#show interfaces Gi1/0/14
GigabitEthernet1/0/14 is down, line protocol is down (notconnect)
Hardware is Gigabit Ethernet, address is f8a7.3a1a.848e (bia f8a7.3a1a.848e)
MTU 9198 bytes, BW 1000000 Kbit/sec, DLY 10 usec,
reliability 255/255, txload 1/255, rxload 1/255
CELS-04-CNT-ES1#show power inline gigabitEthernet 1/0/14
Interface Admin Oper Power Device Class Max
(Watts)
--------- ------ ---------- ------- ------------------- ----- ----
Gi1/0/14 auto off 0.0 n/a n/a 60.0
CELS-04-CNT-ES1#
Sep 13 2022 01:51:39.024 UTC: %ILPOWER-5-IEEE_DISCONNECT: Interface Gi1/0/14: PD removed
Sep 13 2022 01:51:52.649 UTC: %ILPOWER-5-DETECT: Interface Gi1/0/14: Power Device detected: Cisco PD
Sep 13 2022 01:51:54.009 UTC: %ILPOWER-5-IEEE_DISCONNECT: Interface Gi1/0/14: PD removed
Sep 13 2022 01:51:54.009 UTC: %ILPOWER-3-CONTROLLER_PORT_ERR: Controller port error, Interface Gi1/0/14: Power Controller reports power Tstart error detected
Hi,
We have observed in 9300 switch log Power Device detected: Cisco PD and remove.
we checked interface is down. not sure about this alarm could you please help to explain and do t-shoot.
CELS-04-CNT-ES1#show interfaces Gi1/0/14
GigabitEthernet1/0/14 is down, line protocol is down (notconnect)
Hardware is Gigabit Ethernet, address is f8a7.3a1a.848e (bia f8a7.3a1a.848e)
MTU 9198 bytes, BW 1000000 Kbit/sec, DLY 10 usec,
reliability 255/255, txload 1/255, rxload 1/255
CELS-04-CNT-ES1#show power inline gigabitEthernet 1/0/14
Interface Admin Oper Power Device Class Max
(Watts)
--------- ------ ---------- ------- ------------------- ----- ----
Gi1/0/14 auto off 0.0 n/a n/a 60.0
CELS-04-CNT-ES1#
Sep 13 2022 01:51:39.024 UTC: %ILPOWER-5-IEEE_DISCONNECT: Interface Gi1/0/14: PD removed
Sep 13 2022 01:51:52.649 UTC: %ILPOWER-5-DETECT: Interface Gi1/0/14: Power Device detected: Cisco PD
Sep 13 2022 01:51:54.009 UTC: %ILPOWER-5-IEEE_DISCONNECT: Interface Gi1/0/14: PD removed
Sep 13 2022 01:51:54.009 UTC: %ILPOWER-3-CONTROLLER_PORT_ERR: Controller port error, Interface Gi1/0/14: Power Controller reports power Tstart error detected
--on the device we were observing multiple logs, even when there is nothing connected on the port.
Sep 13 2022 01:51:39.024 UTC: %ILPOWER-5-IEEE_DISCONNECT: Interface Gi1/0/14: PD removed
Sep 13 2022 01:51:52.649 UTC: %ILPOWER-5-DETECT: Interface Gi1/0/14: Power Device detected: Cisco PD
Sep 13 2022 01:51:54.009 UTC: %ILPOWER-5-IEEE_DISCONNECT: Interface Gi1/0/14: PD removed
Sep 13 2022 01:51:54.009 UTC: %ILPOWER-3-CONTROLLER_PORT_ERR: Controller port error, Interface Gi1/0/14: Power Controller reports power Tstart error detected
--we collected the Techsupport and on further validation, we see the option to disable the inline power to get rid of the issue and since the code which is running is an old code we suggested to upgrade.
--we were not able to upgrade as end customer wants to know the exact bug.
--collected the required data and figured out the issue to be known bug on the code CSCvv91944, for which we have a workaround in place and for the permanent fix upgrade is needed. | Question: Which product is principally discussed in these documents?
Answer "NONE" if you cannot find answer in the given documents.
The ONLY product name should be selected from the given product name list: C9300-48U-A/ C9300-48U/ THIRD_PARTY_PRODUCT_HW/ UCS-FI-6454/ C9300-NM-8X/ PWR-C1-1100WAC Response in this JSON format:
{"product_name": "","explanation": "", "summary": ""}
Technology: LAN Switching
Subtechnology: Cat9300
Problem Code: Error Messages, Logs, Debugs
Product: NA
Product Family: C9300
Software Version: N/A
Router/Node Name: N/A
Problem Details: Hi,
We have observed in 9300 switch log Power Device detected: Cisco PD and remove.
we checked interface is down. not sure about this alarm could you please help to explain and do t-shoot.
CELS-04-CNT-ES1#show interfaces Gi1/0/14
GigabitEthernet1/0/14 is down, line protocol is down (notconnect)
Hardware is Gigabit Ethernet, address is f8a7.3a1a.848e (bia f8a7.3a1a.848e)
MTU 9198 bytes, BW 1000000 Kbit/sec, DLY 10 usec,
reliability 255/255, txload 1/255, rxload 1/255
CELS-04-CNT-ES1#show power inline gigabitEthernet 1/0/14
Interface Admin Oper Power Device Class Max
(Watts)
--------- ------ ---------- ------- ------------------- ----- ----
Gi1/0/14 auto off 0.0 n/a n/a 60.0
CELS-04-CNT-ES1#
Sep 13 2022 01:51:39.024 UTC: %ILPOWER-5-IEEE_DISCONNECT: Interface Gi1/0/14: PD removed
Sep 13 2022 01:51:52.649 UTC: %ILPOWER-5-DETECT: Interface Gi1/0/14: Power Device detected: Cisco PD
Sep 13 2022 01:51:54.009 UTC: %ILPOWER-5-IEEE_DISCONNECT: Interface Gi1/0/14: PD removed
Sep 13 2022 01:51:54.009 UTC: %ILPOWER-3-CONTROLLER_PORT_ERR: Controller port error, Interface Gi1/0/14: Power Controller reports power Tstart error detected
Hi,
We have observed in 9300 switch log Power Device detected: Cisco PD and remove.
we checked interface is down. not sure about this alarm could you please help to explain and do t-shoot.
CELS-04-CNT-ES1#show interfaces Gi1/0/14
GigabitEthernet1/0/14 is down, line protocol is down (notconnect)
Hardware is Gigabit Ethernet, address is f8a7.3a1a.848e (bia f8a7.3a1a.848e)
MTU 9198 bytes, BW 1000000 Kbit/sec, DLY 10 usec,
reliability 255/255, txload 1/255, rxload 1/255
CELS-04-CNT-ES1#show power inline gigabitEthernet 1/0/14
Interface Admin Oper Power Device Class Max
(Watts)
--------- ------ ---------- ------- ------------------- ----- ----
Gi1/0/14 auto off 0.0 n/a n/a 60.0
CELS-04-CNT-ES1#
Sep 13 2022 01:51:39.024 UTC: %ILPOWER-5-IEEE_DISCONNECT: Interface Gi1/0/14: PD removed
Sep 13 2022 01:51:52.649 UTC: %ILPOWER-5-DETECT: Interface Gi1/0/14: Power Device detected: Cisco PD
Sep 13 2022 01:51:54.009 UTC: %ILPOWER-5-IEEE_DISCONNECT: Interface Gi1/0/14: PD removed
Sep 13 2022 01:51:54.009 UTC: %ILPOWER-3-CONTROLLER_PORT_ERR: Controller port error, Interface Gi1/0/14: Power Controller reports power Tstart error detected
--on the device we were observing multiple logs, even when there is nothing connected on the port.
Sep 13 2022 01:51:39.024 UTC: %ILPOWER-5-IEEE_DISCONNECT: Interface Gi1/0/14: PD removed
Sep 13 2022 01:51:52.649 UTC: %ILPOWER-5-DETECT: Interface Gi1/0/14: Power Device detected: Cisco PD
Sep 13 2022 01:51:54.009 UTC: %ILPOWER-5-IEEE_DISCONNECT: Interface Gi1/0/14: PD removed
Sep 13 2022 01:51:54.009 UTC: %ILPOWER-3-CONTROLLER_PORT_ERR: Controller port error, Interface Gi1/0/14: Power Controller reports power Tstart error detected
--we collected the Techsupport and on further validation, we see the option to disable the inline power to get rid of the issue and since the code which is running is an old code we suggested to upgrade.
--we were not able to upgrade as end customer wants to know the exact bug.
--collected the required data and figured out the issue to be known bug on the code CSCvv91944, for which we have a workaround in place and for the permanent fix upgrade is needed. | Technology: LAN Switching
Subtechnology: Cat9300
Problem Code: Error Messages, Logs, Debugs
Product: NA
Product Family: C9300
Software Version: N/A
Router/Node Name: N/A
Problem Details: Hi,
We have observed in 9300 switch log Power Device detected: Cisco PD and remove.
we checked interface is down. not sure about this alarm could you please help to explain and do t-shoot.
CELS-04-CNT-ES1#show interfaces Gi1/0/14
GigabitEthernet1/0/14 is down, line protocol is down (notconnect)
Hardware is Gigabit Ethernet, address is f8a7.3a1a.848e (bia f8a7.3a1a.848e)
MTU 9198 bytes, BW 1000000 Kbit/sec, DLY 10 usec,
reliability 255/255, txload 1/255, rxload 1/255
CELS-04-CNT-ES1#show power inline gigabitEthernet 1/0/14
Interface Admin Oper Power Device Class Max
(Watts)
--------- ------ ---------- ------- ------------------- ----- ----
Gi1/0/14 auto off 0.0 n/a n/a 60.0
CELS-04-CNT-ES1#
Sep 13 2022 01:51:39.024 UTC: %ILPOWER-5-IEEE_DISCONNECT: Interface Gi1/0/14: PD removed
Sep 13 2022 01:51:52.649 UTC: %ILPOWER-5-DETECT: Interface Gi1/0/14: Power Device detected: Cisco PD
Sep 13 2022 01:51:54.009 UTC: %ILPOWER-5-IEEE_DISCONNECT: Interface Gi1/0/14: PD removed
Sep 13 2022 01:51:54.009 UTC: %ILPOWER-3-CONTROLLER_PORT_ERR: Controller port error, Interface Gi1/0/14: Power Controller reports power Tstart error detected | Hi,
We have observed in 9300 switch log Power Device detected: Cisco PD and remove.
we checked interface is down. not sure about this alarm could you please help to explain and do t-shoot.
CELS-04-CNT-ES1#show interfaces Gi1/0/14
GigabitEthernet1/0/14 is down, line protocol is down (notconnect)
Hardware is Gigabit Ethernet, address is f8a7.3a1a.848e (bia f8a7.3a1a.848e)
MTU 9198 bytes, BW 1000000 Kbit/sec, DLY 10 usec,
reliability 255/255, txload 1/255, rxload 1/255
CELS-04-CNT-ES1#show power inline gigabitEthernet 1/0/14
Interface Admin Oper Power Device Class Max
(Watts)
--------- ------ ---------- ------- ------------------- ----- ----
Gi1/0/14 auto off 0.0 n/a n/a 60.0
CELS-04-CNT-ES1#
Sep 13 2022 01:51:39.024 UTC: %ILPOWER-5-IEEE_DISCONNECT: Interface Gi1/0/14: PD removed
Sep 13 2022 01:51:52.649 UTC: %ILPOWER-5-DETECT: Interface Gi1/0/14: Power Device detected: Cisco PD
Sep 13 2022 01:51:54.009 UTC: %ILPOWER-5-IEEE_DISCONNECT: Interface Gi1/0/14: PD removed
Sep 13 2022 01:51:54.009 UTC: %ILPOWER-3-CONTROLLER_PORT_ERR: Controller port error, Interface Gi1/0/14: Power Controller reports power Tstart error detected | --on the device we were observing multiple logs, even when there is nothing connected on the port.
Sep 13 2022 01:51:39.024 UTC: %ILPOWER-5-IEEE_DISCONNECT: Interface Gi1/0/14: PD removed
Sep 13 2022 01:51:52.649 UTC: %ILPOWER-5-DETECT: Interface Gi1/0/14: Power Device detected: Cisco PD
Sep 13 2022 01:51:54.009 UTC: %ILPOWER-5-IEEE_DISCONNECT: Interface Gi1/0/14: PD removed
Sep 13 2022 01:51:54.009 UTC: %ILPOWER-3-CONTROLLER_PORT_ERR: Controller port error, Interface Gi1/0/14: Power Controller reports power Tstart error detected
--we collected the Techsupport and on further validation, we see the option to disable the inline power to get rid of the issue and since the code which is running is an old code we suggested to upgrade.
--we were not able to upgrade as end customer wants to know the exact bug.
--collected the required data and figured out the issue to be known bug on the code CSCvv91944, for which we have a workaround in place and for the permanent fix upgrade is needed. | CELS-04-CNT-ES1#show interfaces Gi1/0/14
GigabitEthernet1/0/14 is down, line protocol is down (notconnect)
Hardware is Gigabit Ethernet, address is f8a7.3a1a.848e (bia f8a7.3a1a.848e)
MTU 9198 bytes, BW 1000000 Kbit/sec, DLY 10 usec,
reliability 255/255, txload 1/255, rxload 1/255
CELS-04-CNT-ES1#show power inline gigabitEthernet 1/0/14
Interface Admin Oper Power Device Class Max
(Watts)
--------- ------ ---------- ------- ------------------- ----- ----
Gi1/0/14 auto off 0.0 n/a n/a 60.0
CELS-04-CNT-ES1#
Sep 13 2022 01:51:39.024 UTC: %ILPOWER-5-IEEE_DISCONNECT: Interface Gi1/0/14: PD removed
Sep 13 2022 01:51:52.649 UTC: %ILPOWER-5-DETECT: Interface Gi1/0/14: Power Device detected: Cisco PD
Sep 13 2022 01:51:54.009 UTC: %ILPOWER-5-IEEE_DISCONNECT: Interface Gi1/0/14: PD removed
Sep 13 2022 01:51:54.009 UTC: %ILPOWER-3-CONTROLLER_PORT_ERR: Controller port error, Interface Gi1/0/14: Power Controller reports power Tstart error detected | C9300-48U-A | 16.12.4 | 16.12.4 | 37.0 | 3 | 100.0 | Software Bug | C9300 | LAN Switching | Cat9300 | 01t1C000006fIcDQAU | Error Messages, Logs, Debugs | Cat9300 | LAN Switching | 01t15000005W0LTAA0 | nan |
695545329 | Question: Which software version is principally discussed in these documents?
Answer "NONE" if you cannot find answer in the given documents.
The ONLY software version should be selected from the given software version list: 1.3.3.7/ 2.2.3.6/ 16.12.04/ 2.3.3.6/ 2.3.3.7.72323/ 2.3.3.7/ 2.1.2.7/ 2.3.3.7.72328/ 2.3.3.4/ 2.2.2.9/ 2.1.2.7 Response in this JSON format:
{"software_version": "","explanation": "", "summary": ""}
Technology: Cisco DNA Center - On-Prem
Subtechnology: Cisco DNA Center - Assurance
Problem Code: Error Messages, Logs, Debugs
Product: NA
Product Family: DNAHW
Software Version: N/A
Router/Node Name: N/A
Problem Details: DNAC - Wireless Assurance Data unavailable post upgrade from 2.2.2.9 to 2.3.3.7
(TLDC-WL-WLC01) >show network assurance summary
Server url............................. https://172.18.12.19
Wsa Service............................ Disabled
NAC Data Publish Status:
Current State....................... Idle
Last Error.......................... Mon May 15 20:28:53 2023 Un-Authorized JWT Token
Last Success........................ Mon May 15 20:41:12 2023
Last 5XX server response............ An invalid response was received from the backend service. Please refer to the backend service's logs for more details.
JWT Token Config.................... JWT Auth Configured
JWT Last Success.................... Mon May 15 20:28:53 2023
JWT Last Failure.................... Sun May 7 15:28:07 2023 Received server response code (0)
Sensor Backhaul settings:
Ssid................................ Not Configured
Authentication...................... Open
Sensor provisioning:
Status.............................. Disabled
Interface Name...................... None
WLAN ID............................. None
SSID................................ None
DNAC - Wireless Assurance Data unavailable post upgrade from 2.2.2.9 to 2.3.3.7
(TLDC-WL-WLC01) >show network assurance summary
Server url............................. https://172.18.12.19
Wsa Service............................ Disabled
NAC Data Publish Status:
Current State....................... Idle
Last Error.......................... Mon May 15 20:28:53 2023 Un-Authorized JWT Token
Last Success........................ Mon May 15 20:41:12 2023
Last 5XX server response............ An invalid response was received from the backend service. Please refer to the backend service's logs for more details.
JWT Token Config.................... JWT Auth Configured
JWT Last Success.................... Mon May 15 20:28:53 2023
JWT Last Failure.................... Sun May 7 15:28:07 2023 Received server response code (0)
Sensor Backhaul settings:
Ssid................................ Not Configured
Authentication...................... Open
Sensor provisioning:
Status.............................. Disabled
Interface Name...................... None
WLAN ID............................. None
SSID................................ None
Following is the case summary:
Problem Description:
- DNAC Wireless Assurance health score shows 0 after May 15 9:00 PM SGT.
- Issue seen after provisioning the WLC.
- **Provisioning time:** May 15 @ 12:53 UTC.
Setup Info:
- DNAC version: 2.3.3.7
- WLC we are focusing:
- **Hostname:** TLDC-WL-WLC01
- **IP:** 172.18.240.13
- **HW/SW:** AIR-CT8540-K9 / 8.10.183.0
Tshoot/Analysis:
- We have seen that Wireless assurance is missing in DNAC since around May 15 9:00 PM SGT.
- Checking WLC configuration we see that it is disabled.
- Checking DNAC site settings we see that Wireless telemetry is disabled.
- We also observed that around 8:53 PM SGT, the WLC was provisioned as part of another activity.
- Suspect that the WLC was provisioned with Wireless telemetry disabled as per the site settings configured in DNAC.
- However, the audit log details, or configuration preview do not indicate that wireless assurance was disabled.
- You forced pushed the telemetry settings to WLC [172.18.240.13] during MW on 20 May. However that does not seem to enable the WSA service on the WLC.
- On further analysis, identified following defects which have been root caused to CSCvk62901 libssh2 library upgrade for WLC
CSCvq42714 WLC WSA service is disabled after discovery and provisioning due to which it says unmonitored
CSCvp20941 Assurance configs are not getting pushed to WLC.
- engaged Sudhanshu from WLC team who validated this in lab and it was working as expected.
- In order to further isolate the issue and he requested following details.
o Save the putty session of WLC and run the below debugs on WLC.
show logging config-history
debug emweb web enable
debug pm pki enable
o Trigger the issue by doing 'Update Telemetry Settings' --> "Force Configuration push" from DNAC.
o After running the above debugs commands on WLC and triggering the issue from DNAC, wait for 10 min to collect the outputs on WLC, then close the SSH session and share the file.
o From DNAC side, upload the RCA file.
- As per your last update,
Telemetry Settings for wlc01 had been updated on 4th of July and assurance got enabled for that WLC since then.
- As per your request we monitored the status by end of the week and did not receive any further issues reported. | Question: Which product is principally discussed in these documents?
Answer "NONE" if you cannot find answer in the given documents.
The ONLY product name should be selected from the given product name list: DN2-HW-APL-XL/ C9300-48U/ C6807-DNA-A Response in this JSON format:
{"product_name": "","explanation": "", "summary": ""}
Technology: Cisco DNA Center - On-Prem
Subtechnology: Cisco DNA Center - Assurance
Problem Code: Error Messages, Logs, Debugs
Product: NA
Product Family: DNAHW
Software Version: N/A
Router/Node Name: N/A
Problem Details: DNAC - Wireless Assurance Data unavailable post upgrade from 2.2.2.9 to 2.3.3.7
(TLDC-WL-WLC01) >show network assurance summary
Server url............................. https://172.18.12.19
Wsa Service............................ Disabled
NAC Data Publish Status:
Current State....................... Idle
Last Error.......................... Mon May 15 20:28:53 2023 Un-Authorized JWT Token
Last Success........................ Mon May 15 20:41:12 2023
Last 5XX server response............ An invalid response was received from the backend service. Please refer to the backend service's logs for more details.
JWT Token Config.................... JWT Auth Configured
JWT Last Success.................... Mon May 15 20:28:53 2023
JWT Last Failure.................... Sun May 7 15:28:07 2023 Received server response code (0)
Sensor Backhaul settings:
Ssid................................ Not Configured
Authentication...................... Open
Sensor provisioning:
Status.............................. Disabled
Interface Name...................... None
WLAN ID............................. None
SSID................................ None
DNAC - Wireless Assurance Data unavailable post upgrade from 2.2.2.9 to 2.3.3.7
(TLDC-WL-WLC01) >show network assurance summary
Server url............................. https://172.18.12.19
Wsa Service............................ Disabled
NAC Data Publish Status:
Current State....................... Idle
Last Error.......................... Mon May 15 20:28:53 2023 Un-Authorized JWT Token
Last Success........................ Mon May 15 20:41:12 2023
Last 5XX server response............ An invalid response was received from the backend service. Please refer to the backend service's logs for more details.
JWT Token Config.................... JWT Auth Configured
JWT Last Success.................... Mon May 15 20:28:53 2023
JWT Last Failure.................... Sun May 7 15:28:07 2023 Received server response code (0)
Sensor Backhaul settings:
Ssid................................ Not Configured
Authentication...................... Open
Sensor provisioning:
Status.............................. Disabled
Interface Name...................... None
WLAN ID............................. None
SSID................................ None
Following is the case summary:
Problem Description:
- DNAC Wireless Assurance health score shows 0 after May 15 9:00 PM SGT.
- Issue seen after provisioning the WLC.
- **Provisioning time:** May 15 @ 12:53 UTC.
Setup Info:
- DNAC version: 2.3.3.7
- WLC we are focusing:
- **Hostname:** TLDC-WL-WLC01
- **IP:** 172.18.240.13
- **HW/SW:** AIR-CT8540-K9 / 8.10.183.0
Tshoot/Analysis:
- We have seen that Wireless assurance is missing in DNAC since around May 15 9:00 PM SGT.
- Checking WLC configuration we see that it is disabled.
- Checking DNAC site settings we see that Wireless telemetry is disabled.
- We also observed that around 8:53 PM SGT, the WLC was provisioned as part of another activity.
- Suspect that the WLC was provisioned with Wireless telemetry disabled as per the site settings configured in DNAC.
- However, the audit log details, or configuration preview do not indicate that wireless assurance was disabled.
- You forced pushed the telemetry settings to WLC [172.18.240.13] during MW on 20 May. However that does not seem to enable the WSA service on the WLC.
- On further analysis, identified following defects which have been root caused to CSCvk62901 libssh2 library upgrade for WLC
CSCvq42714 WLC WSA service is disabled after discovery and provisioning due to which it says unmonitored
CSCvp20941 Assurance configs are not getting pushed to WLC.
- engaged Sudhanshu from WLC team who validated this in lab and it was working as expected.
- In order to further isolate the issue and he requested following details.
o Save the putty session of WLC and run the below debugs on WLC.
show logging config-history
debug emweb web enable
debug pm pki enable
o Trigger the issue by doing 'Update Telemetry Settings' --> "Force Configuration push" from DNAC.
o After running the above debugs commands on WLC and triggering the issue from DNAC, wait for 10 min to collect the outputs on WLC, then close the SSH session and share the file.
o From DNAC side, upload the RCA file.
- As per your last update,
Telemetry Settings for wlc01 had been updated on 4th of July and assurance got enabled for that WLC since then.
- As per your request we monitored the status by end of the week and did not receive any further issues reported. | Technology: Cisco DNA Center - On-Prem
Subtechnology: Cisco DNA Center - Assurance
Problem Code: Error Messages, Logs, Debugs
Product: NA
Product Family: DNAHW
Software Version: N/A
Router/Node Name: N/A
Problem Details: DNAC - Wireless Assurance Data unavailable post upgrade from 2.2.2.9 to 2.3.3.7
(TLDC-WL-WLC01) >show network assurance summary
Server url............................. https://172.18.12.19
Wsa Service............................ Disabled
NAC Data Publish Status:
Current State....................... Idle
Last Error.......................... Mon May 15 20:28:53 2023 Un-Authorized JWT Token
Last Success........................ Mon May 15 20:41:12 2023
Last 5XX server response............ An invalid response was received from the backend service. Please refer to the backend service's logs for more details.
JWT Token Config.................... JWT Auth Configured
JWT Last Success.................... Mon May 15 20:28:53 2023
JWT Last Failure.................... Sun May 7 15:28:07 2023 Received server response code (0)
Sensor Backhaul settings:
Ssid................................ Not Configured
Authentication...................... Open
Sensor provisioning:
Status.............................. Disabled
Interface Name...................... None
WLAN ID............................. None
SSID................................ None | DNAC - Wireless Assurance Data unavailable post upgrade from 2.2.2.9 to 2.3.3.7
(TLDC-WL-WLC01) >show network assurance summary
Server url............................. https://172.18.12.19
Wsa Service............................ Disabled
NAC Data Publish Status:
Current State....................... Idle
Last Error.......................... Mon May 15 20:28:53 2023 Un-Authorized JWT Token
Last Success........................ Mon May 15 20:41:12 2023
Last 5XX server response............ An invalid response was received from the backend service. Please refer to the backend service's logs for more details.
JWT Token Config.................... JWT Auth Configured
JWT Last Success.................... Mon May 15 20:28:53 2023
JWT Last Failure.................... Sun May 7 15:28:07 2023 Received server response code (0)
Sensor Backhaul settings:
Ssid................................ Not Configured
Authentication...................... Open
Sensor provisioning:
Status.............................. Disabled
Interface Name...................... None
WLAN ID............................. None
SSID................................ None | Following is the case summary:
Problem Description:
- DNAC Wireless Assurance health score shows 0 after May 15 9:00 PM SGT.
- Issue seen after provisioning the WLC.
- **Provisioning time:** May 15 @ 12:53 UTC.
Setup Info:
- DNAC version: 2.3.3.7
- WLC we are focusing:
- **Hostname:** TLDC-WL-WLC01
- **IP:** 172.18.240.13
- **HW/SW:** AIR-CT8540-K9 / 8.10.183.0
Tshoot/Analysis:
- We have seen that Wireless assurance is missing in DNAC since around May 15 9:00 PM SGT.
- Checking WLC configuration we see that it is disabled.
- Checking DNAC site settings we see that Wireless telemetry is disabled.
- We also observed that around 8:53 PM SGT, the WLC was provisioned as part of another activity.
- Suspect that the WLC was provisioned with Wireless telemetry disabled as per the site settings configured in DNAC.
- However, the audit log details, or configuration preview do not indicate that wireless assurance was disabled.
- You forced pushed the telemetry settings to WLC [172.18.240.13] during MW on 20 May. However that does not seem to enable the WSA service on the WLC.
- On further analysis, identified following defects which have been root caused to CSCvk62901 libssh2 library upgrade for WLC
CSCvq42714 WLC WSA service is disabled after discovery and provisioning due to which it says unmonitored
CSCvp20941 Assurance configs are not getting pushed to WLC.
- engaged Sudhanshu from WLC team who validated this in lab and it was working as expected.
- In order to further isolate the issue and he requested following details.
o Save the putty session of WLC and run the below debugs on WLC.
show logging config-history
debug emweb web enable
debug pm pki enable
o Trigger the issue by doing 'Update Telemetry Settings' --> "Force Configuration push" from DNAC.
o After running the above debugs commands on WLC and triggering the issue from DNAC, wait for 10 min to collect the outputs on WLC, then close the SSH session and share the file.
o From DNAC side, upload the RCA file.
- As per your last update,
Telemetry Settings for wlc01 had been updated on 4th of July and assurance got enabled for that WLC since then.
- As per your request we monitored the status by end of the week and did not receive any further issues reported. | - DNAC Wireless Assurance health score shows 0 after May 15 9:00 PM SGT.
- Issue seen after provisioning the WLC.
- DNAC version: 2.3.3.7
- WLC we are focusing:
- **Hostname:** TLDC-WL-WLC01
- **IP:** 172.18.240.13
- **HW/SW:** AIR-CT8540-K9 / 8.10.183.0
- **Provisioning time:** May 15 @ 12:53 UTC. | DN2-HW-APL-XL | 2.3.3.7 | 2.3.3.7 | 70.0 | 3 | 100.0 | Configuration Assistance (process not intuitive, too complex, inconsistent...) | DNAHW | Cisco DNA Center - On-Prem | Cisco DNA Center - Assurance | 01t6R000007PJzCQAW | Error Messages, Logs, Debugs | Cisco DNA Center - Assurance | Cisco DNA Center - On-Prem | 01t1C000006B44HQAS | SHERLOCK: PARTIAL |
695648768 | Question: Which software version is principally discussed in these documents?
Answer "NONE" if you cannot find answer in the given documents.
The ONLY software version should be selected from the given software version list: 1/ 8.10.151.0/ 8.10.171.0/ 802.11AC/ 8.5.171.0/ 8.10.183.0/ 8.10.130.0/ 8.10.171.0/ THIRD_PARTY_PRODUCT_SW/ 8.5.135.0/ 8.3.143.0/ NA-CIN_CLOSE_SW/ 8.5.140.0/ 4.0.1a/ WLC CLIENT INTEROP/ 12.0.13/ 8.5.151.0/ 8.4/ 120.13/ 8.5.160.0/ 8.10.151.0/ 8.3.143.0/ 8.3.131.0/ 8.3.150.0/ 8.5.135.0/ 8.5.161.0/ 8.10.185.0/ 8.2.166.0/ 8.5.140.0/ 8.5.151.0/ 8.3.150.0/ 16.12.3s/ WLC RRM/RF/CLEANAIR/ 8.5.151.0/ 8.10.130.0/ NA - COMPONENT ONLY/ 8.10.162.0/ 8.3.140.0/ 8.10.150.0/ 8.10.183.0/ 8.10.161.0/ 8.10.185.0/ 8.5.151.0/ 16.12.4/ 17.3.5b/ 8.10.183.0/ 8.10.171.0/ 8.5.171.0 Response in this JSON format:
{"software_version": "","explanation": "", "summary": ""}
Technology: Wireless
Subtechnology: 8540 Series Wireless LAN Controller (AIR-CT8540)
Problem Code: Error Messages, Logs, Debugs
Product: NA
Product Family: AIRCTA2
Software Version: N/A
Router/Node Name: N/A
Problem Details: AP is connected to controller TLDC-WL-WLC02. refer to attached ap log.
From AP log,
Jun 6 09:02:57 kernel: [*06/06/2023 17:02:57.7390] CAPWAP State: Run
Jun 6 09:02:57 kernel: [*06/06/2023 17:02:57.8130] AP has joined controller TLDC-WL-WLC02
Jun 6 09:03:54 kernel: [*06/06/2023 17:03:54.6830] Warning, unencrypted data keepalive failed
Jun 6 09:03:54 kernel: [*06/06/2023 17:03:54.6830]
Jun 6 09:03:54 kernel: [*06/06/2023 17:03:54.6830] Going to restart CAPWAP (reason : data keepalive not received)...
Jun 6 09:01:05 kernel: [*06/06/2023 17:01:05.6600] Going to restart CAPWAP (reason : data keepalive not received)...
Jun 6 09:02:30 kernel: [*06/06/2023 17:02:30.6790] Going to restart CAPWAP (reason : data keepalive not received)...
Jun 6 09:03:54 kernel: [*06/06/2023 17:03:54.6830] Going to restart CAPWAP (reason : data keepalive not received)...
Jun 6 09:05:18 kernel: [*06/06/2023 17:05:18.6760] Going to restart CAPWAP (reason : data keepalive not received)...
Jun 6 09:06:42 kernel: [*06/06/2023 17:06:42.6610] Going to restart CAPWAP (reason : data keepalive not received)...
Jun 6 09:08:06 kernel: [*06/06/2023 17:08:06.6610] Going to restart CAPWAP (reason : data keepalive not received)...
AP is connected to controller TLDC-WL-WLC02. refer to attached ap log.
From AP log,
Jun 6 09:02:57 kernel: [*06/06/2023 17:02:57.7390] CAPWAP State: Run
Jun 6 09:02:57 kernel: [*06/06/2023 17:02:57.8130] AP has joined controller TLDC-WL-WLC02
Jun 6 09:03:54 kernel: [*06/06/2023 17:03:54.6830] Warning, unencrypted data keepalive failed
Jun 6 09:03:54 kernel: [*06/06/2023 17:03:54.6830]
Jun 6 09:03:54 kernel: [*06/06/2023 17:03:54.6830] Going to restart CAPWAP (reason : data keepalive not received)...
Jun 6 09:01:05 kernel: [*06/06/2023 17:01:05.6600] Going to restart CAPWAP (reason : data keepalive not received)...
Jun 6 09:02:30 kernel: [*06/06/2023 17:02:30.6790] Going to restart CAPWAP (reason : data keepalive not received)...
Jun 6 09:03:54 kernel: [*06/06/2023 17:03:54.6830] Going to restart CAPWAP (reason : data keepalive not received)...
Jun 6 09:05:18 kernel: [*06/06/2023 17:05:18.6760] Going to restart CAPWAP (reason : data keepalive not received)...
Jun 6 09:06:42 kernel: [*06/06/2023 17:06:42.6610] Going to restart CAPWAP (reason : data keepalive not received)...
Jun 6 09:08:06 kernel: [*06/06/2023 17:08:06.6610] Going to restart CAPWAP (reason : data keepalive not received)...
APs disjoin while being a part of a fabric network.
Issue occurs in 16.12.x, post upgrade to 17.6.4 it has been stable.
Presently we are not seeing any AP flaps for the last 2 months after the image upgrade of the fabric edge(FE) to 17.6.4. The action plan has been shared as part of the RCA readout and in the slide deck, the logs to be collected and shared have been noted in case an issue is seen on the 17.6.4 image in the future | Question: Which product is principally discussed in these documents?
Answer "NONE" if you cannot find answer in the given documents.
The ONLY product name should be selected from the given product name list: AIR-CT8540-1K-K9/ AIR-CT8540-K9/ NA-CIN_CLOSE_HW/ C9120AXI-S/ THIRD_PARTY_PRODUCT_HW/ AIR-CT8540-CA-K9/ AIR-AP2802I-S-K9/ AIR-CT8540-K9Z/ AIR-BZL-C240M4/ DN2-HW-APL-XL/ WLC-AP-T/ AIR-CT8540-SW-8.2 Response in this JSON format:
{"product_name": "","explanation": "", "summary": ""}
Technology: Wireless
Subtechnology: 8540 Series Wireless LAN Controller (AIR-CT8540)
Problem Code: Error Messages, Logs, Debugs
Product: NA
Product Family: AIRCTA2
Software Version: N/A
Router/Node Name: N/A
Problem Details: AP is connected to controller TLDC-WL-WLC02. refer to attached ap log.
From AP log,
Jun 6 09:02:57 kernel: [*06/06/2023 17:02:57.7390] CAPWAP State: Run
Jun 6 09:02:57 kernel: [*06/06/2023 17:02:57.8130] AP has joined controller TLDC-WL-WLC02
Jun 6 09:03:54 kernel: [*06/06/2023 17:03:54.6830] Warning, unencrypted data keepalive failed
Jun 6 09:03:54 kernel: [*06/06/2023 17:03:54.6830]
Jun 6 09:03:54 kernel: [*06/06/2023 17:03:54.6830] Going to restart CAPWAP (reason : data keepalive not received)...
Jun 6 09:01:05 kernel: [*06/06/2023 17:01:05.6600] Going to restart CAPWAP (reason : data keepalive not received)...
Jun 6 09:02:30 kernel: [*06/06/2023 17:02:30.6790] Going to restart CAPWAP (reason : data keepalive not received)...
Jun 6 09:03:54 kernel: [*06/06/2023 17:03:54.6830] Going to restart CAPWAP (reason : data keepalive not received)...
Jun 6 09:05:18 kernel: [*06/06/2023 17:05:18.6760] Going to restart CAPWAP (reason : data keepalive not received)...
Jun 6 09:06:42 kernel: [*06/06/2023 17:06:42.6610] Going to restart CAPWAP (reason : data keepalive not received)...
Jun 6 09:08:06 kernel: [*06/06/2023 17:08:06.6610] Going to restart CAPWAP (reason : data keepalive not received)...
AP is connected to controller TLDC-WL-WLC02. refer to attached ap log.
From AP log,
Jun 6 09:02:57 kernel: [*06/06/2023 17:02:57.7390] CAPWAP State: Run
Jun 6 09:02:57 kernel: [*06/06/2023 17:02:57.8130] AP has joined controller TLDC-WL-WLC02
Jun 6 09:03:54 kernel: [*06/06/2023 17:03:54.6830] Warning, unencrypted data keepalive failed
Jun 6 09:03:54 kernel: [*06/06/2023 17:03:54.6830]
Jun 6 09:03:54 kernel: [*06/06/2023 17:03:54.6830] Going to restart CAPWAP (reason : data keepalive not received)...
Jun 6 09:01:05 kernel: [*06/06/2023 17:01:05.6600] Going to restart CAPWAP (reason : data keepalive not received)...
Jun 6 09:02:30 kernel: [*06/06/2023 17:02:30.6790] Going to restart CAPWAP (reason : data keepalive not received)...
Jun 6 09:03:54 kernel: [*06/06/2023 17:03:54.6830] Going to restart CAPWAP (reason : data keepalive not received)...
Jun 6 09:05:18 kernel: [*06/06/2023 17:05:18.6760] Going to restart CAPWAP (reason : data keepalive not received)...
Jun 6 09:06:42 kernel: [*06/06/2023 17:06:42.6610] Going to restart CAPWAP (reason : data keepalive not received)...
Jun 6 09:08:06 kernel: [*06/06/2023 17:08:06.6610] Going to restart CAPWAP (reason : data keepalive not received)...
APs disjoin while being a part of a fabric network.
Issue occurs in 16.12.x, post upgrade to 17.6.4 it has been stable.
Presently we are not seeing any AP flaps for the last 2 months after the image upgrade of the fabric edge(FE) to 17.6.4. The action plan has been shared as part of the RCA readout and in the slide deck, the logs to be collected and shared have been noted in case an issue is seen on the 17.6.4 image in the future | Technology: Wireless
Subtechnology: 8540 Series Wireless LAN Controller (AIR-CT8540)
Problem Code: Error Messages, Logs, Debugs
Product: NA
Product Family: AIRCTA2
Software Version: N/A
Router/Node Name: N/A
Problem Details: AP is connected to controller TLDC-WL-WLC02. refer to attached ap log.
From AP log,
Jun 6 09:02:57 kernel: [*06/06/2023 17:02:57.7390] CAPWAP State: Run
Jun 6 09:02:57 kernel: [*06/06/2023 17:02:57.8130] AP has joined controller TLDC-WL-WLC02
Jun 6 09:03:54 kernel: [*06/06/2023 17:03:54.6830] Warning, unencrypted data keepalive failed
Jun 6 09:03:54 kernel: [*06/06/2023 17:03:54.6830]
Jun 6 09:03:54 kernel: [*06/06/2023 17:03:54.6830] Going to restart CAPWAP (reason : data keepalive not received)...
Jun 6 09:01:05 kernel: [*06/06/2023 17:01:05.6600] Going to restart CAPWAP (reason : data keepalive not received)...
Jun 6 09:02:30 kernel: [*06/06/2023 17:02:30.6790] Going to restart CAPWAP (reason : data keepalive not received)...
Jun 6 09:03:54 kernel: [*06/06/2023 17:03:54.6830] Going to restart CAPWAP (reason : data keepalive not received)...
Jun 6 09:05:18 kernel: [*06/06/2023 17:05:18.6760] Going to restart CAPWAP (reason : data keepalive not received)...
Jun 6 09:06:42 kernel: [*06/06/2023 17:06:42.6610] Going to restart CAPWAP (reason : data keepalive not received)...
Jun 6 09:08:06 kernel: [*06/06/2023 17:08:06.6610] Going to restart CAPWAP (reason : data keepalive not received)... | AP is connected to controller TLDC-WL-WLC02. refer to attached ap log.
From AP log,
Jun 6 09:02:57 kernel: [*06/06/2023 17:02:57.7390] CAPWAP State: Run
Jun 6 09:02:57 kernel: [*06/06/2023 17:02:57.8130] AP has joined controller TLDC-WL-WLC02
Jun 6 09:03:54 kernel: [*06/06/2023 17:03:54.6830] Warning, unencrypted data keepalive failed
Jun 6 09:03:54 kernel: [*06/06/2023 17:03:54.6830]
Jun 6 09:03:54 kernel: [*06/06/2023 17:03:54.6830] Going to restart CAPWAP (reason : data keepalive not received)...
Jun 6 09:01:05 kernel: [*06/06/2023 17:01:05.6600] Going to restart CAPWAP (reason : data keepalive not received)...
Jun 6 09:02:30 kernel: [*06/06/2023 17:02:30.6790] Going to restart CAPWAP (reason : data keepalive not received)...
Jun 6 09:03:54 kernel: [*06/06/2023 17:03:54.6830] Going to restart CAPWAP (reason : data keepalive not received)...
Jun 6 09:05:18 kernel: [*06/06/2023 17:05:18.6760] Going to restart CAPWAP (reason : data keepalive not received)...
Jun 6 09:06:42 kernel: [*06/06/2023 17:06:42.6610] Going to restart CAPWAP (reason : data keepalive not received)...
Jun 6 09:08:06 kernel: [*06/06/2023 17:08:06.6610] Going to restart CAPWAP (reason : data keepalive not received)... | APs disjoin while being a part of a fabric network.
Issue occurs in 16.12.x, post upgrade to 17.6.4 it has been stable.
Presently we are not seeing any AP flaps for the last 2 months after the image upgrade of the fabric edge(FE) to 17.6.4. The action plan has been shared as part of the RCA readout and in the slide deck, the logs to be collected and shared have been noted in case an issue is seen on the 17.6.4 image in the future | SDA AP Flapping Continuously | AIR-CT8540-K9 | 16.12.4 | 16.12.4 | 62.0 | 3 | 100.0 | Software Bug | AIRCTA2 | Wireless | 8540 Series Wireless LAN Controller (AIR-CT8540) | 01t1C000006fIcDQAU | Error Messages, Logs, Debugs | 8540 Series Wireless LAN Controller (AIR-CT8540) | Wireless | 01t15000004dDRMAA2 | CaseClosureFieldAutomation: Partial |
694180060 | Question: Which software version is principally discussed in these documents?
Answer "NONE" if you cannot find answer in the given documents.
The ONLY software version should be selected from the given software version list: 3.0.0.458/ 2.7.0.356/ 3.0.0.448/ 3.0.0.458/ 3.0.0 Response in this JSON format:
{"software_version": "","explanation": "", "summary": ""}
Closed
Technology: Identity Services Engine (ISE) - 3.0
Subtechnology: ISE Performance (High CPU / Memory / IO / GUI Slowness)
Problem Code: Error Messages, Logs, Debugs
Product: NA
Product Family: CISE
Software Version: N/A
Router/Node Name: N/A
Problem Details: Slow Replication Error for MNT node
Message=Node hsdc-mnt-nac01 has slow replication since this node is not consuming messages for past 1829 minutes
Slow Replication Error for MNT node
Message=Node hsdc-mnt-nac01 has slow replication since this node is not consuming messages for past 1829 minutes
Problem Description:
====================
Slow Replication Error for MNT node
Troubleshooting/ Steps taken:
===========
- we collected the SB from the MNT node, but it wasn’t attached to case.
- customer found that replication ports weren’t opened for the MNT node on the firewall.
- post fixing it slow replication error was fixed and no more observed.
Resolution:
============
Opening the replication ports on the firewall. | Question: Which product is principally discussed in these documents?
Answer "NONE" if you cannot find answer in the given documents.
The ONLY product name should be selected from the given product name list: SNS-3655-K9/ SNS-3695-K9 Response in this JSON format:
{"product_name": "","explanation": "", "summary": ""}
Technology: Identity Services Engine (ISE) - 3.0
Subtechnology: ISE Performance (High CPU / Memory / IO / GUI Slowness)
Problem Code: Error Messages, Logs, Debugs
Product: NA
Product Family: CISE
Software Version: N/A
Router/Node Name: N/A
Problem Details: Slow Replication Error for MNT node
Message=Node hsdc-mnt-nac01 has slow replication since this node is not consuming messages for past 1829 minutes
Slow Replication Error for MNT node
Message=Node hsdc-mnt-nac01 has slow replication since this node is not consuming messages for past 1829 minutes
Problem Description:
====================
Slow Replication Error for MNT node
Troubleshooting/ Steps taken:
===========
- we collected the SB from the MNT node, but it wasn’t attached to case.
- customer found that replication ports weren’t opened for the MNT node on the firewall.
- post fixing it slow replication error was fixed and no more observed.
Resolution:
============
Opening the replication ports on the firewall. | Technology: Identity Services Engine (ISE) - 3.0
Subtechnology: ISE Performance (High CPU / Memory / IO / GUI Slowness)
Problem Code: Error Messages, Logs, Debugs
Product: NA
Product Family: CISE
Software Version: N/A
Router/Node Name: N/A
Problem Details: Slow Replication Error for MNT node
Message=Node hsdc-mnt-nac01 has slow replication since this node is not consuming messages for past 1829 minutes | Slow Replication Error for MNT node
Message=Node hsdc-mnt-nac01 has slow replication since this node is not consuming messages for past 1829 minutes | Problem Description:
====================
Slow Replication Error for MNT node
Troubleshooting/ Steps taken:
===========
- we collected the SB from the MNT node, but it wasn’t attached to case.
- customer found that replication ports weren’t opened for the MNT node on the firewall.
- post fixing it slow replication error was fixed and no more observed.
Resolution:
============
Opening the replication ports on the firewall. | Slow Replication Error for MNT node | SNS-3695-K9 | 3.0.0-BETA-DROP4 | 3.0.0-BETA-DROP4 | 60.0 | 3 | 100.0 | Software -not a bug (scalability, version selection, install/upgrade help...) | CISE | Identity Services Engine (ISE) - 3.0 | ISE Performance (High CPU / Memory / IO / GUI Slowness) | 01t1C000006Dwc3QAC | Error Messages, Logs, Debugs | ISE Performance (High CPU / Memory / IO / GUI Slowness) | Identity Services Engine (ISE) - 3.0 | 01t1C000006BE4YQAW | nan |
694925180 | Question: Which software version is principally discussed in these documents?
Answer "NONE" if you cannot find answer in the given documents.
The ONLY software version should be selected from the given software version list: 2.2.2.9/ 2.2.2.8/ 1.3.3.7/ 2.2.3.6/ 1.3.3.7 Response in this JSON format:
{"software_version": "","explanation": "", "summary": ""}
We saw that WLC is continious sync . It does not go into managed state it keeps synching itself
From the logs we are seeing this info :
105 | 2023-04-19 02:54:20,889 | INFO | pository Unloading Thread | | XDE.runtime | Unloaded 2 function sets |
| 106 | 2023-04-19 02:54:20,919 | INFO | pool-24-thread-1 | | c.c.e.i.impl.InventoryServiceImpl | getDeviceId: Fetched ManagedElementInterface Id 11381375 |
| 107 | 2023-04-19 02:54:20,919 | INFO | pool-24-thread-1 | | c.c.e.i.util.EventSyncTracker | Delaying sync request for 11381375 as continuous event based sync detected for the device. Event based sync requests in queue :1 |
| 108 | 2023-04-19 02:54:20,919 | INFO | pool-24-thread-1 | | c.c.e.i.n.p.APTrapEventProcessor | It is detected that the device went through continuous event based sync, so delaying the sync request 172.18.240.13 |
| 109 | 2023-04-19 02:54:30,948 | INFO | pool-24-thread-1 | | c.c.e.i.impl.InventoryServiceImpl | getDeviceId: Fetched ManagedElementInterface Id 11381375 |
| 110 | 2023-04-19 02:54:30,948 | INFO | pool-24-thread-1 | | c.c.e.i.util.EventSyncTracker | Delaying sync request for 11381375 as continuous event based sync detected for the device. Event based sync requests in queue :1 |
| 111 | 2023-04-19 02:54:30,948 | INFO | pool-24-thread-1 | | c.c.e.i.n.p.APTrapEventProcessor | It is detected that the device went through continuous event based sync, so delaying the sync request 172.18.240.13 |
| 112 | 2023-04-19 02:54:31,236 | INFO | ICE Service - CPU 7 | | com.cisco.xmp.inventory | Building associations complete. Total time :89369 | mid=2, MSGNAME=XICE_GENERIC_MSG_INF_02, ch=com.cisco.xmp.inventory, sev=informational
| 113 | 2023-04-19 02:54:31,246 | INFO | ICE Service - CPU 7 | | c.c.e.i.util.ShardOwnerValidator | Device: e1c7b3c8-7674-4d31-91f5-8cfb7cc1637a is owned by this instance of inventory service |
| 114 | 2023-04-19 02:54:31,247 | INFO | ICE Service - CPU 7 | | com.cisco.xmp.inventory | Collector context is set to ignore the Serialnumber change for 11381375 | MSGNAME=XICE_GENERIC_MSG_INF_02, ch=com.cisco.xmp.inventory, sev=informational, mid=2
| 115 | 2023-04-19 02:54:31,247 | INFO | ICE Service - CPU 7 | | com.cisco.xmp.inventory | 172.18.240.13 persistObjects called with addMap size = 0, updateSet size = 4685, sameSet size = 37568, and tenant from collection context = 5db7b7be12f3bd00cc115f77 | mid=2, MSGNAME=XICE_GENERIC_MSG_INF_02, ch=com.cisco.xmp.inventory, sev=informational
We got to know that AP are continuously getting disconnected and getting connected back due to this the WLC in DNAC is kept in synching process as event based sync happens in DNAC . Once the frequent ap disconnect issue is resolved we are able to see WLC goes back into managed state
Technology: Cisco DNA Center - On-Prem
Subtechnology: Cisco DNA Center - Discovery and Inventory
Problem Code: Error Messages, Logs, Debugs
Product: NA
Product Family: DNAHW
Software Version: N/A
Router/Node Name: N/A
Problem Details: Fabric WLC got stuck on the syncing process for more than 4 hours since raising this TAC case
TLDC-WL-WLC01
172.18.240.13 Wireless Controller
Reachable
Managed
Syncing...
Non-Compliant
Fabric WLC got stuck on the syncing process for more than 4 hours since raising this TAC case
TLDC-WL-WLC01
172.18.240.13 Wireless Controller
Reachable
Managed
Syncing...
Non-Compliant
We saw that WLC is continious sync . It does not go into managed state it keeps synching itself
From the logs we are seeing this info :
105 | 2023-04-19 02:54:20,889 | INFO | pository Unloading Thread | | XDE.runtime | Unloaded 2 function sets |
| 106 | 2023-04-19 02:54:20,919 | INFO | pool-24-thread-1 | | c.c.e.i.impl.InventoryServiceImpl | getDeviceId: Fetched ManagedElementInterface Id 11381375 |
| 107 | 2023-04-19 02:54:20,919 | INFO | pool-24-thread-1 | | c.c.e.i.util.EventSyncTracker | Delaying sync request for 11381375 as continuous event based sync detected for the device. Event based sync requests in queue :1 |
| 108 | 2023-04-19 02:54:20,919 | INFO | pool-24-thread-1 | | c.c.e.i.n.p.APTrapEventProcessor | It is detected that the device went through continuous event based sync, so delaying the sync request 172.18.240.13 |
| 109 | 2023-04-19 02:54:30,948 | INFO | pool-24-thread-1 | | c.c.e.i.impl.InventoryServiceImpl | getDeviceId: Fetched ManagedElementInterface Id 11381375 |
| 110 | 2023-04-19 02:54:30,948 | INFO | pool-24-thread-1 | | c.c.e.i.util.EventSyncTracker | Delaying sync request for 11381375 as continuous event based sync detected for the device. Event based sync requests in queue :1 |
| 111 | 2023-04-19 02:54:30,948 | INFO | pool-24-thread-1 | | c.c.e.i.n.p.APTrapEventProcessor | It is detected that the device went through continuous event based sync, so delaying the sync request 172.18.240.13 |
| 112 | 2023-04-19 02:54:31,236 | INFO | ICE Service - CPU 7 | | com.cisco.xmp.inventory | Building associations complete. Total time :89369 | mid=2, MSGNAME=XICE_GENERIC_MSG_INF_02, ch=com.cisco.xmp.inventory, sev=informational
| 113 | 2023-04-19 02:54:31,246 | INFO | ICE Service - CPU 7 | | c.c.e.i.util.ShardOwnerValidator | Device: e1c7b3c8-7674-4d31-91f5-8cfb7cc1637a is owned by this instance of inventory service |
| 114 | 2023-04-19 02:54:31,247 | INFO | ICE Service - CPU 7 | | com.cisco.xmp.inventory | Collector context is set to ignore the Serialnumber change for 11381375 | MSGNAME=XICE_GENERIC_MSG_INF_02, ch=com.cisco.xmp.inventory, sev=informational, mid=2
| 115 | 2023-04-19 02:54:31,247 | INFO | ICE Service - CPU 7 | | com.cisco.xmp.inventory | 172.18.240.13 persistObjects called with addMap size = 0, updateSet size = 4685, sameSet size = 37568, and tenant from collection context = 5db7b7be12f3bd00cc115f77 | mid=2, MSGNAME=XICE_GENERIC_MSG_INF_02, ch=com.cisco.xmp.inventory, sev=informational
We got to know that AP are continuously getting disconnected and getting connected back due to this the WLC in DNAC is kept in synching process as event based sync happens in DNAC . Once the frequent ap disconnect issue is resolved we are able to see WLC goes back into managed state | Question: Which product is principally discussed in these documents?
Answer "NONE" if you cannot find answer in the given documents.
The ONLY product name should be selected from the given product name list: DN2-HW-APL-XL Response in this JSON format:
{"product_name": "","explanation": "", "summary": ""}
Technology: Cisco DNA Center - On-Prem
Subtechnology: Cisco DNA Center - Discovery and Inventory
Problem Code: Error Messages, Logs, Debugs
Product: NA
Product Family: DNAHW
Software Version: N/A
Router/Node Name: N/A
Problem Details: Fabric WLC got stuck on the syncing process for more than 4 hours since raising this TAC case
TLDC-WL-WLC01
172.18.240.13 Wireless Controller
Reachable
Managed
Syncing...
Non-Compliant
Fabric WLC got stuck on the syncing process for more than 4 hours since raising this TAC case
TLDC-WL-WLC01
172.18.240.13 Wireless Controller
Reachable
Managed
Syncing...
Non-Compliant
We saw that WLC is continious sync . It does not go into managed state it keeps synching itself
From the logs we are seeing this info :
105 | 2023-04-19 02:54:20,889 | INFO | pository Unloading Thread | | XDE.runtime | Unloaded 2 function sets |
| 106 | 2023-04-19 02:54:20,919 | INFO | pool-24-thread-1 | | c.c.e.i.impl.InventoryServiceImpl | getDeviceId: Fetched ManagedElementInterface Id 11381375 |
| 107 | 2023-04-19 02:54:20,919 | INFO | pool-24-thread-1 | | c.c.e.i.util.EventSyncTracker | Delaying sync request for 11381375 as continuous event based sync detected for the device. Event based sync requests in queue :1 |
| 108 | 2023-04-19 02:54:20,919 | INFO | pool-24-thread-1 | | c.c.e.i.n.p.APTrapEventProcessor | It is detected that the device went through continuous event based sync, so delaying the sync request 172.18.240.13 |
| 109 | 2023-04-19 02:54:30,948 | INFO | pool-24-thread-1 | | c.c.e.i.impl.InventoryServiceImpl | getDeviceId: Fetched ManagedElementInterface Id 11381375 |
| 110 | 2023-04-19 02:54:30,948 | INFO | pool-24-thread-1 | | c.c.e.i.util.EventSyncTracker | Delaying sync request for 11381375 as continuous event based sync detected for the device. Event based sync requests in queue :1 |
| 111 | 2023-04-19 02:54:30,948 | INFO | pool-24-thread-1 | | c.c.e.i.n.p.APTrapEventProcessor | It is detected that the device went through continuous event based sync, so delaying the sync request 172.18.240.13 |
| 112 | 2023-04-19 02:54:31,236 | INFO | ICE Service - CPU 7 | | com.cisco.xmp.inventory | Building associations complete. Total time :89369 | mid=2, MSGNAME=XICE_GENERIC_MSG_INF_02, ch=com.cisco.xmp.inventory, sev=informational
| 113 | 2023-04-19 02:54:31,246 | INFO | ICE Service - CPU 7 | | c.c.e.i.util.ShardOwnerValidator | Device: e1c7b3c8-7674-4d31-91f5-8cfb7cc1637a is owned by this instance of inventory service |
| 114 | 2023-04-19 02:54:31,247 | INFO | ICE Service - CPU 7 | | com.cisco.xmp.inventory | Collector context is set to ignore the Serialnumber change for 11381375 | MSGNAME=XICE_GENERIC_MSG_INF_02, ch=com.cisco.xmp.inventory, sev=informational, mid=2
| 115 | 2023-04-19 02:54:31,247 | INFO | ICE Service - CPU 7 | | com.cisco.xmp.inventory | 172.18.240.13 persistObjects called with addMap size = 0, updateSet size = 4685, sameSet size = 37568, and tenant from collection context = 5db7b7be12f3bd00cc115f77 | mid=2, MSGNAME=XICE_GENERIC_MSG_INF_02, ch=com.cisco.xmp.inventory, sev=informational
We got to know that AP are continuously getting disconnected and getting connected back due to this the WLC in DNAC is kept in synching process as event based sync happens in DNAC . Once the frequent ap disconnect issue is resolved we are able to see WLC goes back into managed state | Technology: Cisco DNA Center - On-Prem
Subtechnology: Cisco DNA Center - Discovery and Inventory
Problem Code: Error Messages, Logs, Debugs
Product: NA
Product Family: DNAHW
Software Version: N/A
Router/Node Name: N/A
Problem Details: Fabric WLC got stuck on the syncing process for more than 4 hours since raising this TAC case
TLDC-WL-WLC01
172.18.240.13 Wireless Controller
Reachable
Managed
Syncing...
Non-Compliant | Fabric WLC got stuck on the syncing process for more than 4 hours since raising this TAC case
TLDC-WL-WLC01
172.18.240.13 Wireless Controller
Reachable
Managed
Syncing...
Non-Compliant | We saw that WLC is continious sync . It does not go into managed state it keeps synching itself
From the logs we are seeing this info :
105 | 2023-04-19 02:54:20,889 | INFO | pository Unloading Thread | | XDE.runtime | Unloaded 2 function sets |
| 106 | 2023-04-19 02:54:20,919 | INFO | pool-24-thread-1 | | c.c.e.i.impl.InventoryServiceImpl | getDeviceId: Fetched ManagedElementInterface Id 11381375 |
| 107 | 2023-04-19 02:54:20,919 | INFO | pool-24-thread-1 | | c.c.e.i.util.EventSyncTracker | Delaying sync request for 11381375 as continuous event based sync detected for the device. Event based sync requests in queue :1 |
| 108 | 2023-04-19 02:54:20,919 | INFO | pool-24-thread-1 | | c.c.e.i.n.p.APTrapEventProcessor | It is detected that the device went through continuous event based sync, so delaying the sync request 172.18.240.13 |
| 109 | 2023-04-19 02:54:30,948 | INFO | pool-24-thread-1 | | c.c.e.i.impl.InventoryServiceImpl | getDeviceId: Fetched ManagedElementInterface Id 11381375 |
| 110 | 2023-04-19 02:54:30,948 | INFO | pool-24-thread-1 | | c.c.e.i.util.EventSyncTracker | Delaying sync request for 11381375 as continuous event based sync detected for the device. Event based sync requests in queue :1 |
| 111 | 2023-04-19 02:54:30,948 | INFO | pool-24-thread-1 | | c.c.e.i.n.p.APTrapEventProcessor | It is detected that the device went through continuous event based sync, so delaying the sync request 172.18.240.13 |
| 112 | 2023-04-19 02:54:31,236 | INFO | ICE Service - CPU 7 | | com.cisco.xmp.inventory | Building associations complete. Total time :89369 | mid=2, MSGNAME=XICE_GENERIC_MSG_INF_02, ch=com.cisco.xmp.inventory, sev=informational
| 113 | 2023-04-19 02:54:31,246 | INFO | ICE Service - CPU 7 | | c.c.e.i.util.ShardOwnerValidator | Device: e1c7b3c8-7674-4d31-91f5-8cfb7cc1637a is owned by this instance of inventory service |
| 114 | 2023-04-19 02:54:31,247 | INFO | ICE Service - CPU 7 | | com.cisco.xmp.inventory | Collector context is set to ignore the Serialnumber change for 11381375 | MSGNAME=XICE_GENERIC_MSG_INF_02, ch=com.cisco.xmp.inventory, sev=informational, mid=2
| 115 | 2023-04-19 02:54:31,247 | INFO | ICE Service - CPU 7 | | com.cisco.xmp.inventory | 172.18.240.13 persistObjects called with addMap size = 0, updateSet size = 4685, sameSet size = 37568, and tenant from collection context = 5db7b7be12f3bd00cc115f77 | mid=2, MSGNAME=XICE_GENERIC_MSG_INF_02, ch=com.cisco.xmp.inventory, sev=informational
We got to know that AP are continuously getting disconnected and getting connected back due to this the WLC in DNAC is kept in synching process as event based sync happens in DNAC . Once the frequent ap disconnect issue is resolved we are able to see WLC goes back into managed state | The customer is having issues with a wireless controller that's been showing in syncing status for more than 4 hours.
TLDC-WL-WLC01
172.18.240.13 Wireless Controller
Reachable
Managed
Syncing...
Non-Compliant
Cisco DNA center 2.2.2.9 | DN2-HW-APL-XL | 2.2.2.9 | 2.2.2.9 | 38.0 | 3 | 100.0 | Configuration Assistance (process not intuitive, too complex, inconsistent...) | DNAHW | Cisco DNA Center - On-Prem | Cisco DNA Center - Discovery and Inventory | 01t6R000006k0UEQAY | Error Messages, Logs, Debugs | Cisco DNA Center - Discovery and Inventory | Cisco DNA Center - On-Prem | 01t1C0000061ceHQAQ | SHERLOCK: PARTIAL |
694870141 | Question: Which software version is principally discussed in these documents?
Answer "NONE" if you cannot find answer in the given documents.
The ONLY software version should be selected from the given software version list: NA - COMPONENT ONLY/ 16.12.3s/ 2.3.3.3/ 17.6.4/ 16.12.4/ 2.2.2.5/ 1.3.3.6/ 16.12.03s/ 16.12.01s/ 16.12.04/ 16.12.1s/ 2.2.3.3/ THIRD_PARTY_PRODUCT_SW/ 16.12.1s/ 1.3.3.7/ 1.3.3.9/ 2.3.3.7/ 2.1.2.7/ 2.2.3.6/ 17.06.02 Response in this JSON format:
{"software_version": "","explanation": "", "summary": ""}
Resolution Summary
======================
UH-01-CNT-ES01#show mac address-table | count 1/0/48
Number of lines which match regexp = 8641 <<<
UH-01-CNT-ES01#sh devi classifier att in gi1/0/48 | count 1/0/48
Number of lines which match regexp = 1024 <<<<
UH-01-CNT-ES01#
UH-01-CNT-ES01#show device-tracking database interface gigabitEthernet 1/0/48
portDB has 2 entries for interface Gi1/0/48, 2 dynamic
Codes: L - Local, S - Static, ND - Neighbor Discovery, ARP - Address Resolution Protocol, DH4 - IPv4 DHCP, DH6 - IPv6 DHCP, PKT - Other Packet, API - API created
Preflevel flags (prlvl):
0001:MAC and LLA match 0002:Orig trunk 0004:Orig access
0008:Orig trusted trunk 0010:Orig trusted access 0020:DHCP assigned
0040:Cga authenticated 0080:Cert authenticated 0100:Statically assigned
Network Layer Address Link Layer Address Interface vlan prlvl age state Time left
DH4 172.27.127.229 040e.3cbf.445c Gi1/0/48 1071 0025 1s REACHABLE 312 s(1592 s)
ND FE80::BD38:83C:446E:DA13 040e.3cbf.445c Gi1/0/48 1071 0005 37s REACHABLE 269 s try 0
UH-01-CNT-ES01#
UH-01-CNT-ES01#sh run int gi1/0/48
Building configuration...
Current configuration : 258 bytes
!
interface GigabitEthernet1/0/48
switchport mode access
device-tracking attach-policy IPDT_POLICY
dot1x timeout tx-period 7
dot1x max-reauth-req 3
source template DefaultWiredDot1xClosedAuth
spanning-tree portfast
spanning-tree bpduguard enable
end
UH-01-CNT-ES01#
UH-01-CNT-ES01#sh run int vlan 1071
Building configuration...
Current configuration : 377 bytes
!
interface Vlan1071
description Configured from Cisco DNA-Center
mac-address 0000.0c9f.f48e
vrf forwarding admin_VN
ip address 172.27.64.1 255.255.192.0
ip helper-address 172.19.208.10
ip helper-address 172.19.50.39
ip helper-address 172.19.215.140
no ip redirects
ip route-cache same-interface
no lisp mobility liveness test
lisp mobility vl_admin_wired-IPV4
end
UH-01-CNT-ES01#sh device-sensor cache in gi1/0/48
Device: 040e.3cbf.445c on port GigabitEthernet1/0/48
----------------------------------------------------------------------------
Proto Type:Name Len Value Text
DHCP 55:parameter-request-list 16 37 0E 01 03 06 0F 1F 21 2B 7......!+
2C 2E 2F 77 79 F9 FC ,./wyy.
DHCP 60:class-identifier 10 3C 08 4D 53 46 54 20 35 2E <.MSFT 5.
30 0
DHCP 12:host-name 16 0C 0E 75 63 69 2D 74 63 6B ..uci-tck
68 70 65 6C 69 74 65 hpelite
UH-01-CNT-ES01#
UH-01-CNT-ES01#
UH-01-CNT-ES01#
UH-01-CNT-ES01#
UH-01-CNT-ES01#sh devi classifier att in gi1/0/48
Summary:
MAC_Address Port_Id Profile Name Device Name
==========================================================================
0000.0000.0001 GigabitEthernet1/0/48 Un-Classified Device XEROX CORPORATION
0000.0000.0022 GigabitEthernet1/0/48 Un-Classified Device XEROX CORPORATION
0000.0000.0101 GigabitEthernet1/0/48 Un-Classified Device XEROX CORPORATION
0000.0000.0104 GigabitEthernet1/0/48 Un-Classified Device XEROX CORPORATION
0000.0000.0107 GigabitEthernet1/0/48 Un-Classified Device XEROX CORPORATION
0000.0000.010b GigabitEthernet1/0/48 Un-Classified Device XEROX CORPORATION
0000.0000.0111 GigabitEthernet1/0/48 Un-Classified Device XEROX CORPORATION
0000.0000.0118 GigabitEthernet1/0/48 Un-Classified Device XEROX CORPORATION
0000.0000.0119 GigabitEthernet1/0/48 Un-Classified Device XEROX CORPORATION
0000.0000.011a GigabitEthernet1/0/48 Un-Classified Device XEROX CORPORATION
0000.0000.0122 GigabitEthernet1/0/48 Un-Classified Device XEROX CORPORATION
0000.0000.0123 GigabitEthernet1/0/48 Un-Classified Device XEROX CORPORATION
0000.0000.0129 GigabitEthernet1/0/48 Un-Classified Device XEROX CORPORATION
0000.0000.012d GigabitEthernet1/0/48 Un-Classified Device XEROX CORPORATION
0000.0000.0135 GigabitEthernet1/0/48 Un-Classified Device XEROX CORPORATION
0000.0000.013b GigabitEthernet1/0/48 Un-Classified Device XEROX CORPORATION
0000.0000.013c GigabitEthernet1/0/48 Un-Classified Device XEROX CORPORATION
0000.0000.0142 GigabitEthernet1/0/48 Un-Classified Device XEROX CORPORATION
0000.0000.0147 GigabitEthernet1/0/48 Un-Classified Device XEROX CORPORATION
0000.0000.014f GigabitEthernet1/0/48 Un-Classified Device XEROX CORPORATION
0000.0000.0154 GigabitEthernet1/0/48 Un-Classified Device XEROX CORPORATION
0000.0000.0163 GigabitEthernet1/0/48 Un-Classified Device XEROX CORPORATION
0000.0000.016b GigabitEthernet1/0/48 Un-Classified Device XEROX CORPORATION
0000.0000.0171 GigabitEthernet1/0/48 Un-Classified Device XEROX CORPORATION
As with the recent occurrence – we don’t have output of the MAC’s incrementing and the packet capture doesn’t show those macs as stated above.
USC-02-CNT-ES01#
071 feed.8542.9fc2 STATIC Gi3/0/17
1071 fef4.2a1b.bd4e STATIC Gi3/0/17
Total Mac Addresses for this criterion: 3296 <<<<
USC-02-CNT-ES01#
USC-02-CNT-ES01#show device-tracking database interface gigabitEthernet 3/0/17
portDB has 2 entries for interface Gi3/0/17, 2 dynamic
Codes: L - Local, S - Static, ND - Neighbor Discovery, ARP - Address Resolution Protocol, DH4 - IPv4 DHCP, DH6 - IPv6 DHCP, PKT - Other Packet, API - API created
Preflevel flags (prlvl):
0001:MAC and LLA match 0002:Orig trunk 0004:Orig access
0008:Orig trusted trunk 0010:Orig trusted access 0020:DHCP assigned
0040:Cga authenticated 0080:Cert authenticated 0100:Statically assigned
Network Layer Address Link Layer Address Interface vlan prlvl age state Time left
DH4 172.27.112.101 b445.066a.b212 Gi3/0/17 1071 0025 23s REACHABLE 286 s try 0(1004 s)
ND FE80::9353:5FED:DD96:E6B2 b445.066a.b212 Gi3/0/17 1071 0005 19s REACHABLE 283 s
USC-02-CNT-ES01#show ip dhcp snooping binding interface gigabitEthernet 3/0/17
MacAddress IpAddress Lease(sec) Type VLAN Interface
------------------ --------------- ---------- ------------- ---- --------------------
B4:45:06:6A:B2:12 172.27.112.101 987 dhcp-snooping 1071 GigabitEthernet3/0/17
Total number of bindings: 1
1) This could be either no bogus mac addresses being sent from PC to switch during capture
2) To rule this out, when the issue re-occurs, please perform a simultaneous capture on the switch and PC.
a. Run the mac count command on the switch multiple times to show the mac addresses are incrementing.
b. As workaround we tested by setting a client connected interface on one the switch from mult-auth to single-auth
i. You may follow this during the next occurrence of the mac increments are spiking the CPU.
Techno-L3-Test#show authentication sessions interface gigabitEthernet 1/0/9 details
<SNIP>
Oper host mode: multi-auth <<<<<<<
<SNIP>
Techno-L3-Test(config)#int gi1/0/9
Techno-L3-Test(config-if)#shut
Techno-L3-Test(config-if)#access-session host-mode single-host <<<<
Techno-L3-Test(config-if)#no shut
Techno-L3-Test(config-if)#end
Techno-L3-Test#show mac address-table interface gigabitEthernet 1/0/9
<SNIP>
Oper host mode: single-host <<<<<<
<SNIP>
Customer requested to close this SR.
Technology: Cisco DNA Center - On-Prem
Subtechnology: Cisco Software-Defined Access (SDA Wired)
Problem Code: Error Messages, Logs, Debugs
Product: NA
Product Family: C9300
Software Version: N/A
Router/Node Name: N/A
Problem Details: SDA FE C9300 - MAC Flooding from specific port
SDA FE C9300 - MAC Flooding from specific port
Resolution Summary
======================
UH-01-CNT-ES01#show mac address-table | count 1/0/48
Number of lines which match regexp = 8641 <<<
UH-01-CNT-ES01#sh devi classifier att in gi1/0/48 | count 1/0/48
Number of lines which match regexp = 1024 <<<<
UH-01-CNT-ES01#
UH-01-CNT-ES01#show device-tracking database interface gigabitEthernet 1/0/48
portDB has 2 entries for interface Gi1/0/48, 2 dynamic
Codes: L - Local, S - Static, ND - Neighbor Discovery, ARP - Address Resolution Protocol, DH4 - IPv4 DHCP, DH6 - IPv6 DHCP, PKT - Other Packet, API - API created
Preflevel flags (prlvl):
0001:MAC and LLA match 0002:Orig trunk 0004:Orig access
0008:Orig trusted trunk 0010:Orig trusted access 0020:DHCP assigned
0040:Cga authenticated 0080:Cert authenticated 0100:Statically assigned
Network Layer Address Link Layer Address Interface vlan prlvl age state Time left
DH4 172.27.127.229 040e.3cbf.445c Gi1/0/48 1071 0025 1s REACHABLE 312 s(1592 s)
ND FE80::BD38:83C:446E:DA13 040e.3cbf.445c Gi1/0/48 1071 0005 37s REACHABLE 269 s try 0
UH-01-CNT-ES01#
UH-01-CNT-ES01#sh run int gi1/0/48
Building configuration...
Current configuration : 258 bytes
!
interface GigabitEthernet1/0/48
switchport mode access
device-tracking attach-policy IPDT_POLICY
dot1x timeout tx-period 7
dot1x max-reauth-req 3
source template DefaultWiredDot1xClosedAuth
spanning-tree portfast
spanning-tree bpduguard enable
end
UH-01-CNT-ES01#
UH-01-CNT-ES01#sh run int vlan 1071
Building configuration...
Current configuration : 377 bytes
!
interface Vlan1071
description Configured from Cisco DNA-Center
mac-address 0000.0c9f.f48e
vrf forwarding admin_VN
ip address 172.27.64.1 255.255.192.0
ip helper-address 172.19.208.10
ip helper-address 172.19.50.39
ip helper-address 172.19.215.140
no ip redirects
ip route-cache same-interface
no lisp mobility liveness test
lisp mobility vl_admin_wired-IPV4
end
UH-01-CNT-ES01#sh device-sensor cache in gi1/0/48
Device: 040e.3cbf.445c on port GigabitEthernet1/0/48
----------------------------------------------------------------------------
Proto Type:Name Len Value Text
DHCP 55:parameter-request-list 16 37 0E 01 03 06 0F 1F 21 2B 7......!+
2C 2E 2F 77 79 F9 FC ,./wyy.
DHCP 60:class-identifier 10 3C 08 4D 53 46 54 20 35 2E <.MSFT 5.
30 0
DHCP 12:host-name 16 0C 0E 75 63 69 2D 74 63 6B ..uci-tck
68 70 65 6C 69 74 65 hpelite
UH-01-CNT-ES01#
UH-01-CNT-ES01#
UH-01-CNT-ES01#
UH-01-CNT-ES01#
UH-01-CNT-ES01#sh devi classifier att in gi1/0/48
Summary:
MAC_Address Port_Id Profile Name Device Name
==========================================================================
0000.0000.0001 GigabitEthernet1/0/48 Un-Classified Device XEROX CORPORATION
0000.0000.0022 GigabitEthernet1/0/48 Un-Classified Device XEROX CORPORATION
0000.0000.0101 GigabitEthernet1/0/48 Un-Classified Device XEROX CORPORATION
0000.0000.0104 GigabitEthernet1/0/48 Un-Classified Device XEROX CORPORATION
0000.0000.0107 GigabitEthernet1/0/48 Un-Classified Device XEROX CORPORATION
0000.0000.010b GigabitEthernet1/0/48 Un-Classified Device XEROX CORPORATION
0000.0000.0111 GigabitEthernet1/0/48 Un-Classified Device XEROX CORPORATION
0000.0000.0118 GigabitEthernet1/0/48 Un-Classified Device XEROX CORPORATION
0000.0000.0119 GigabitEthernet1/0/48 Un-Classified Device XEROX CORPORATION
0000.0000.011a GigabitEthernet1/0/48 Un-Classified Device XEROX CORPORATION
0000.0000.0122 GigabitEthernet1/0/48 Un-Classified Device XEROX CORPORATION
0000.0000.0123 GigabitEthernet1/0/48 Un-Classified Device XEROX CORPORATION
0000.0000.0129 GigabitEthernet1/0/48 Un-Classified Device XEROX CORPORATION
0000.0000.012d GigabitEthernet1/0/48 Un-Classified Device XEROX CORPORATION
0000.0000.0135 GigabitEthernet1/0/48 Un-Classified Device XEROX CORPORATION
0000.0000.013b GigabitEthernet1/0/48 Un-Classified Device XEROX CORPORATION
0000.0000.013c GigabitEthernet1/0/48 Un-Classified Device XEROX CORPORATION
0000.0000.0142 GigabitEthernet1/0/48 Un-Classified Device XEROX CORPORATION
0000.0000.0147 GigabitEthernet1/0/48 Un-Classified Device XEROX CORPORATION
0000.0000.014f GigabitEthernet1/0/48 Un-Classified Device XEROX CORPORATION
0000.0000.0154 GigabitEthernet1/0/48 Un-Classified Device XEROX CORPORATION
0000.0000.0163 GigabitEthernet1/0/48 Un-Classified Device XEROX CORPORATION
0000.0000.016b GigabitEthernet1/0/48 Un-Classified Device XEROX CORPORATION
0000.0000.0171 GigabitEthernet1/0/48 Un-Classified Device XEROX CORPORATION
As with the recent occurrence – we don’t have output of the MAC’s incrementing and the packet capture doesn’t show those macs as stated above.
USC-02-CNT-ES01#
071 feed.8542.9fc2 STATIC Gi3/0/17
1071 fef4.2a1b.bd4e STATIC Gi3/0/17
Total Mac Addresses for this criterion: 3296 <<<<
USC-02-CNT-ES01#
USC-02-CNT-ES01#show device-tracking database interface gigabitEthernet 3/0/17
portDB has 2 entries for interface Gi3/0/17, 2 dynamic
Codes: L - Local, S - Static, ND - Neighbor Discovery, ARP - Address Resolution Protocol, DH4 - IPv4 DHCP, DH6 - IPv6 DHCP, PKT - Other Packet, API - API created
Preflevel flags (prlvl):
0001:MAC and LLA match 0002:Orig trunk 0004:Orig access
0008:Orig trusted trunk 0010:Orig trusted access 0020:DHCP assigned
0040:Cga authenticated 0080:Cert authenticated 0100:Statically assigned
Network Layer Address Link Layer Address Interface vlan prlvl age state Time left
DH4 172.27.112.101 b445.066a.b212 Gi3/0/17 1071 0025 23s REACHABLE 286 s try 0(1004 s)
ND FE80::9353:5FED:DD96:E6B2 b445.066a.b212 Gi3/0/17 1071 0005 19s REACHABLE 283 s
USC-02-CNT-ES01#show ip dhcp snooping binding interface gigabitEthernet 3/0/17
MacAddress IpAddress Lease(sec) Type VLAN Interface
------------------ --------------- ---------- ------------- ---- --------------------
B4:45:06:6A:B2:12 172.27.112.101 987 dhcp-snooping 1071 GigabitEthernet3/0/17
Total number of bindings: 1
1) This could be either no bogus mac addresses being sent from PC to switch during capture
2) To rule this out, when the issue re-occurs, please perform a simultaneous capture on the switch and PC.
a. Run the mac count command on the switch multiple times to show the mac addresses are incrementing.
b. As workaround we tested by setting a client connected interface on one the switch from mult-auth to single-auth
i. You may follow this during the next occurrence of the mac increments are spiking the CPU.
Techno-L3-Test#show authentication sessions interface gigabitEthernet 1/0/9 details
<SNIP>
Oper host mode: multi-auth <<<<<<<
<SNIP>
Techno-L3-Test(config)#int gi1/0/9
Techno-L3-Test(config-if)#shut
Techno-L3-Test(config-if)#access-session host-mode single-host <<<<
Techno-L3-Test(config-if)#no shut
Techno-L3-Test(config-if)#end
Techno-L3-Test#show mac address-table interface gigabitEthernet 1/0/9
<SNIP>
Oper host mode: single-host <<<<<<
<SNIP>
Customer requested to close this SR. | Question: Which product is principally discussed in these documents?
Answer "NONE" if you cannot find answer in the given documents.
The ONLY product name should be selected from the given product name list: DN2-HW-APL-XL/ ASR1009-X/ C9300-48U/ DN1-HW-APL/ C9500-48Y4C/ THIRD_PARTY_PRODUCT_HW/ C9300-48U-A/ ASR1002-HX Response in this JSON format:
{"product_name": "","explanation": "", "summary": ""}
Technology: Cisco DNA Center - On-Prem
Subtechnology: Cisco Software-Defined Access (SDA Wired)
Problem Code: Error Messages, Logs, Debugs
Product: NA
Product Family: C9300
Software Version: N/A
Router/Node Name: N/A
Problem Details: SDA FE C9300 - MAC Flooding from specific port
SDA FE C9300 - MAC Flooding from specific port
Resolution Summary
======================
UH-01-CNT-ES01#show mac address-table | count 1/0/48
Number of lines which match regexp = 8641 <<<
UH-01-CNT-ES01#sh devi classifier att in gi1/0/48 | count 1/0/48
Number of lines which match regexp = 1024 <<<<
UH-01-CNT-ES01#
UH-01-CNT-ES01#show device-tracking database interface gigabitEthernet 1/0/48
portDB has 2 entries for interface Gi1/0/48, 2 dynamic
Codes: L - Local, S - Static, ND - Neighbor Discovery, ARP - Address Resolution Protocol, DH4 - IPv4 DHCP, DH6 - IPv6 DHCP, PKT - Other Packet, API - API created
Preflevel flags (prlvl):
0001:MAC and LLA match 0002:Orig trunk 0004:Orig access
0008:Orig trusted trunk 0010:Orig trusted access 0020:DHCP assigned
0040:Cga authenticated 0080:Cert authenticated 0100:Statically assigned
Network Layer Address Link Layer Address Interface vlan prlvl age state Time left
DH4 172.27.127.229 040e.3cbf.445c Gi1/0/48 1071 0025 1s REACHABLE 312 s(1592 s)
ND FE80::BD38:83C:446E:DA13 040e.3cbf.445c Gi1/0/48 1071 0005 37s REACHABLE 269 s try 0
UH-01-CNT-ES01#
UH-01-CNT-ES01#sh run int gi1/0/48
Building configuration...
Current configuration : 258 bytes
!
interface GigabitEthernet1/0/48
switchport mode access
device-tracking attach-policy IPDT_POLICY
dot1x timeout tx-period 7
dot1x max-reauth-req 3
source template DefaultWiredDot1xClosedAuth
spanning-tree portfast
spanning-tree bpduguard enable
end
UH-01-CNT-ES01#
UH-01-CNT-ES01#sh run int vlan 1071
Building configuration...
Current configuration : 377 bytes
!
interface Vlan1071
description Configured from Cisco DNA-Center
mac-address 0000.0c9f.f48e
vrf forwarding admin_VN
ip address 172.27.64.1 255.255.192.0
ip helper-address 172.19.208.10
ip helper-address 172.19.50.39
ip helper-address 172.19.215.140
no ip redirects
ip route-cache same-interface
no lisp mobility liveness test
lisp mobility vl_admin_wired-IPV4
end
UH-01-CNT-ES01#sh device-sensor cache in gi1/0/48
Device: 040e.3cbf.445c on port GigabitEthernet1/0/48
----------------------------------------------------------------------------
Proto Type:Name Len Value Text
DHCP 55:parameter-request-list 16 37 0E 01 03 06 0F 1F 21 2B 7......!+
2C 2E 2F 77 79 F9 FC ,./wyy.
DHCP 60:class-identifier 10 3C 08 4D 53 46 54 20 35 2E <.MSFT 5.
30 0
DHCP 12:host-name 16 0C 0E 75 63 69 2D 74 63 6B ..uci-tck
68 70 65 6C 69 74 65 hpelite
UH-01-CNT-ES01#
UH-01-CNT-ES01#
UH-01-CNT-ES01#
UH-01-CNT-ES01#
UH-01-CNT-ES01#sh devi classifier att in gi1/0/48
Summary:
MAC_Address Port_Id Profile Name Device Name
==========================================================================
0000.0000.0001 GigabitEthernet1/0/48 Un-Classified Device XEROX CORPORATION
0000.0000.0022 GigabitEthernet1/0/48 Un-Classified Device XEROX CORPORATION
0000.0000.0101 GigabitEthernet1/0/48 Un-Classified Device XEROX CORPORATION
0000.0000.0104 GigabitEthernet1/0/48 Un-Classified Device XEROX CORPORATION
0000.0000.0107 GigabitEthernet1/0/48 Un-Classified Device XEROX CORPORATION
0000.0000.010b GigabitEthernet1/0/48 Un-Classified Device XEROX CORPORATION
0000.0000.0111 GigabitEthernet1/0/48 Un-Classified Device XEROX CORPORATION
0000.0000.0118 GigabitEthernet1/0/48 Un-Classified Device XEROX CORPORATION
0000.0000.0119 GigabitEthernet1/0/48 Un-Classified Device XEROX CORPORATION
0000.0000.011a GigabitEthernet1/0/48 Un-Classified Device XEROX CORPORATION
0000.0000.0122 GigabitEthernet1/0/48 Un-Classified Device XEROX CORPORATION
0000.0000.0123 GigabitEthernet1/0/48 Un-Classified Device XEROX CORPORATION
0000.0000.0129 GigabitEthernet1/0/48 Un-Classified Device XEROX CORPORATION
0000.0000.012d GigabitEthernet1/0/48 Un-Classified Device XEROX CORPORATION
0000.0000.0135 GigabitEthernet1/0/48 Un-Classified Device XEROX CORPORATION
0000.0000.013b GigabitEthernet1/0/48 Un-Classified Device XEROX CORPORATION
0000.0000.013c GigabitEthernet1/0/48 Un-Classified Device XEROX CORPORATION
0000.0000.0142 GigabitEthernet1/0/48 Un-Classified Device XEROX CORPORATION
0000.0000.0147 GigabitEthernet1/0/48 Un-Classified Device XEROX CORPORATION
0000.0000.014f GigabitEthernet1/0/48 Un-Classified Device XEROX CORPORATION
0000.0000.0154 GigabitEthernet1/0/48 Un-Classified Device XEROX CORPORATION
0000.0000.0163 GigabitEthernet1/0/48 Un-Classified Device XEROX CORPORATION
0000.0000.016b GigabitEthernet1/0/48 Un-Classified Device XEROX CORPORATION
0000.0000.0171 GigabitEthernet1/0/48 Un-Classified Device XEROX CORPORATION
As with the recent occurrence – we don’t have output of the MAC’s incrementing and the packet capture doesn’t show those macs as stated above.
USC-02-CNT-ES01#
071 feed.8542.9fc2 STATIC Gi3/0/17
1071 fef4.2a1b.bd4e STATIC Gi3/0/17
Total Mac Addresses for this criterion: 3296 <<<<
USC-02-CNT-ES01#
USC-02-CNT-ES01#show device-tracking database interface gigabitEthernet 3/0/17
portDB has 2 entries for interface Gi3/0/17, 2 dynamic
Codes: L - Local, S - Static, ND - Neighbor Discovery, ARP - Address Resolution Protocol, DH4 - IPv4 DHCP, DH6 - IPv6 DHCP, PKT - Other Packet, API - API created
Preflevel flags (prlvl):
0001:MAC and LLA match 0002:Orig trunk 0004:Orig access
0008:Orig trusted trunk 0010:Orig trusted access 0020:DHCP assigned
0040:Cga authenticated 0080:Cert authenticated 0100:Statically assigned
Network Layer Address Link Layer Address Interface vlan prlvl age state Time left
DH4 172.27.112.101 b445.066a.b212 Gi3/0/17 1071 0025 23s REACHABLE 286 s try 0(1004 s)
ND FE80::9353:5FED:DD96:E6B2 b445.066a.b212 Gi3/0/17 1071 0005 19s REACHABLE 283 s
USC-02-CNT-ES01#show ip dhcp snooping binding interface gigabitEthernet 3/0/17
MacAddress IpAddress Lease(sec) Type VLAN Interface
------------------ --------------- ---------- ------------- ---- --------------------
B4:45:06:6A:B2:12 172.27.112.101 987 dhcp-snooping 1071 GigabitEthernet3/0/17
Total number of bindings: 1
1) This could be either no bogus mac addresses being sent from PC to switch during capture
2) To rule this out, when the issue re-occurs, please perform a simultaneous capture on the switch and PC.
a. Run the mac count command on the switch multiple times to show the mac addresses are incrementing.
b. As workaround we tested by setting a client connected interface on one the switch from mult-auth to single-auth
i. You may follow this during the next occurrence of the mac increments are spiking the CPU.
Techno-L3-Test#show authentication sessions interface gigabitEthernet 1/0/9 details
<SNIP>
Oper host mode: multi-auth <<<<<<<
<SNIP>
Techno-L3-Test(config)#int gi1/0/9
Techno-L3-Test(config-if)#shut
Techno-L3-Test(config-if)#access-session host-mode single-host <<<<
Techno-L3-Test(config-if)#no shut
Techno-L3-Test(config-if)#end
Techno-L3-Test#show mac address-table interface gigabitEthernet 1/0/9
<SNIP>
Oper host mode: single-host <<<<<<
<SNIP>
Customer requested to close this SR. | Technology: Cisco DNA Center - On-Prem
Subtechnology: Cisco Software-Defined Access (SDA Wired)
Problem Code: Error Messages, Logs, Debugs
Product: NA
Product Family: C9300
Software Version: N/A
Router/Node Name: N/A
Problem Details: SDA FE C9300 - MAC Flooding from specific port | SDA FE C9300 - MAC Flooding from specific port | Resolution Summary
======================
UH-01-CNT-ES01#show mac address-table | count 1/0/48
Number of lines which match regexp = 8641 <<<
UH-01-CNT-ES01#sh devi classifier att in gi1/0/48 | count 1/0/48
Number of lines which match regexp = 1024 <<<<
UH-01-CNT-ES01#
UH-01-CNT-ES01#show device-tracking database interface gigabitEthernet 1/0/48
portDB has 2 entries for interface Gi1/0/48, 2 dynamic
Codes: L - Local, S - Static, ND - Neighbor Discovery, ARP - Address Resolution Protocol, DH4 - IPv4 DHCP, DH6 - IPv6 DHCP, PKT - Other Packet, API - API created
Preflevel flags (prlvl):
0001:MAC and LLA match 0002:Orig trunk 0004:Orig access
0008:Orig trusted trunk 0010:Orig trusted access 0020:DHCP assigned
0040:Cga authenticated 0080:Cert authenticated 0100:Statically assigned
Network Layer Address Link Layer Address Interface vlan prlvl age state Time left
DH4 172.27.127.229 040e.3cbf.445c Gi1/0/48 1071 0025 1s REACHABLE 312 s(1592 s)
ND FE80::BD38:83C:446E:DA13 040e.3cbf.445c Gi1/0/48 1071 0005 37s REACHABLE 269 s try 0
UH-01-CNT-ES01#
UH-01-CNT-ES01#sh run int gi1/0/48
Building configuration...
Current configuration : 258 bytes
!
interface GigabitEthernet1/0/48
switchport mode access
device-tracking attach-policy IPDT_POLICY
dot1x timeout tx-period 7
dot1x max-reauth-req 3
source template DefaultWiredDot1xClosedAuth
spanning-tree portfast
spanning-tree bpduguard enable
end
UH-01-CNT-ES01#
UH-01-CNT-ES01#sh run int vlan 1071
Building configuration...
Current configuration : 377 bytes
!
interface Vlan1071
description Configured from Cisco DNA-Center
mac-address 0000.0c9f.f48e
vrf forwarding admin_VN
ip address 172.27.64.1 255.255.192.0
ip helper-address 172.19.208.10
ip helper-address 172.19.50.39
ip helper-address 172.19.215.140
no ip redirects
ip route-cache same-interface
no lisp mobility liveness test
lisp mobility vl_admin_wired-IPV4
end
UH-01-CNT-ES01#sh device-sensor cache in gi1/0/48
Device: 040e.3cbf.445c on port GigabitEthernet1/0/48
----------------------------------------------------------------------------
Proto Type:Name Len Value Text
DHCP 55:parameter-request-list 16 37 0E 01 03 06 0F 1F 21 2B 7......!+
2C 2E 2F 77 79 F9 FC ,./wyy.
DHCP 60:class-identifier 10 3C 08 4D 53 46 54 20 35 2E <.MSFT 5.
30 0
DHCP 12:host-name 16 0C 0E 75 63 69 2D 74 63 6B ..uci-tck
68 70 65 6C 69 74 65 hpelite
UH-01-CNT-ES01#
UH-01-CNT-ES01#
UH-01-CNT-ES01#
UH-01-CNT-ES01#
UH-01-CNT-ES01#sh devi classifier att in gi1/0/48
Summary:
MAC_Address Port_Id Profile Name Device Name
==========================================================================
0000.0000.0001 GigabitEthernet1/0/48 Un-Classified Device XEROX CORPORATION
0000.0000.0022 GigabitEthernet1/0/48 Un-Classified Device XEROX CORPORATION
0000.0000.0101 GigabitEthernet1/0/48 Un-Classified Device XEROX CORPORATION
0000.0000.0104 GigabitEthernet1/0/48 Un-Classified Device XEROX CORPORATION
0000.0000.0107 GigabitEthernet1/0/48 Un-Classified Device XEROX CORPORATION
0000.0000.010b GigabitEthernet1/0/48 Un-Classified Device XEROX CORPORATION
0000.0000.0111 GigabitEthernet1/0/48 Un-Classified Device XEROX CORPORATION
0000.0000.0118 GigabitEthernet1/0/48 Un-Classified Device XEROX CORPORATION
0000.0000.0119 GigabitEthernet1/0/48 Un-Classified Device XEROX CORPORATION
0000.0000.011a GigabitEthernet1/0/48 Un-Classified Device XEROX CORPORATION
0000.0000.0122 GigabitEthernet1/0/48 Un-Classified Device XEROX CORPORATION
0000.0000.0123 GigabitEthernet1/0/48 Un-Classified Device XEROX CORPORATION
0000.0000.0129 GigabitEthernet1/0/48 Un-Classified Device XEROX CORPORATION
0000.0000.012d GigabitEthernet1/0/48 Un-Classified Device XEROX CORPORATION
0000.0000.0135 GigabitEthernet1/0/48 Un-Classified Device XEROX CORPORATION
0000.0000.013b GigabitEthernet1/0/48 Un-Classified Device XEROX CORPORATION
0000.0000.013c GigabitEthernet1/0/48 Un-Classified Device XEROX CORPORATION
0000.0000.0142 GigabitEthernet1/0/48 Un-Classified Device XEROX CORPORATION
0000.0000.0147 GigabitEthernet1/0/48 Un-Classified Device XEROX CORPORATION
0000.0000.014f GigabitEthernet1/0/48 Un-Classified Device XEROX CORPORATION
0000.0000.0154 GigabitEthernet1/0/48 Un-Classified Device XEROX CORPORATION
0000.0000.0163 GigabitEthernet1/0/48 Un-Classified Device XEROX CORPORATION
0000.0000.016b GigabitEthernet1/0/48 Un-Classified Device XEROX CORPORATION
0000.0000.0171 GigabitEthernet1/0/48 Un-Classified Device XEROX CORPORATION
As with the recent occurrence – we don’t have output of the MAC’s incrementing and the packet capture doesn’t show those macs as stated above.
USC-02-CNT-ES01#
071 feed.8542.9fc2 STATIC Gi3/0/17
1071 fef4.2a1b.bd4e STATIC Gi3/0/17
Total Mac Addresses for this criterion: 3296 <<<<
USC-02-CNT-ES01#
USC-02-CNT-ES01#show device-tracking database interface gigabitEthernet 3/0/17
portDB has 2 entries for interface Gi3/0/17, 2 dynamic
Codes: L - Local, S - Static, ND - Neighbor Discovery, ARP - Address Resolution Protocol, DH4 - IPv4 DHCP, DH6 - IPv6 DHCP, PKT - Other Packet, API - API created
Preflevel flags (prlvl):
0001:MAC and LLA match 0002:Orig trunk 0004:Orig access
0008:Orig trusted trunk 0010:Orig trusted access 0020:DHCP assigned
0040:Cga authenticated 0080:Cert authenticated 0100:Statically assigned
Network Layer Address Link Layer Address Interface vlan prlvl age state Time left
DH4 172.27.112.101 b445.066a.b212 Gi3/0/17 1071 0025 23s REACHABLE 286 s try 0(1004 s)
ND FE80::9353:5FED:DD96:E6B2 b445.066a.b212 Gi3/0/17 1071 0005 19s REACHABLE 283 s
USC-02-CNT-ES01#show ip dhcp snooping binding interface gigabitEthernet 3/0/17
MacAddress IpAddress Lease(sec) Type VLAN Interface
------------------ --------------- ---------- ------------- ---- --------------------
B4:45:06:6A:B2:12 172.27.112.101 987 dhcp-snooping 1071 GigabitEthernet3/0/17
Total number of bindings: 1
1) This could be either no bogus mac addresses being sent from PC to switch during capture
2) To rule this out, when the issue re-occurs, please perform a simultaneous capture on the switch and PC.
a. Run the mac count command on the switch multiple times to show the mac addresses are incrementing.
b. As workaround we tested by setting a client connected interface on one the switch from mult-auth to single-auth
i. You may follow this during the next occurrence of the mac increments are spiking the CPU.
Techno-L3-Test#show authentication sessions interface gigabitEthernet 1/0/9 details
<SNIP>
Oper host mode: multi-auth <<<<<<<
<SNIP>
Techno-L3-Test(config)#int gi1/0/9
Techno-L3-Test(config-if)#shut
Techno-L3-Test(config-if)#access-session host-mode single-host <<<<
Techno-L3-Test(config-if)#no shut
Techno-L3-Test(config-if)#end
Techno-L3-Test#show mac address-table interface gigabitEthernet 1/0/9
<SNIP>
Oper host mode: single-host <<<<<<
<SNIP>
Customer requested to close this SR. | Problem Described
===================
SDA FE C9300 - MAC Flooding from specific port | C9300-48U-A | 16.12.3s | 16.12.3s | 70.0 | 3 | 100.0 | Configuration Assistance (process not intuitive, too complex, inconsistent...) | C9300 | Cisco DNA Center - On-Prem | Cisco Software-Defined Access (SDA Wired) | 01t1C000004GjbyQAC | Error Messages, Logs, Debugs | Cisco Software-Defined Access (SDA Wired) | Cisco DNA Center - On-Prem | 01t15000005W0LTAA0 | SHERLOCK: PARTIAL |
694498853 | Question: Which software version is principally discussed in these documents?
Answer "NONE" if you cannot find answer in the given documents.
The ONLY software version should be selected from the given software version list: 1/ 8.10.151.0/ 8.10.171.0/ 802.11AC/ 8.5.171.0/ 8.10.183.0/ 8.10.130.0/ 8.10.171.0/ THIRD_PARTY_PRODUCT_SW/ 8.5.135.0/ 8.3.143.0/ NA-CIN_CLOSE_SW/ 8.5.140.0/ 4.0.1a/ WLC CLIENT INTEROP/ 12.0.13/ 8.5.151.0/ 8.4/ 120.13/ 8.5.160.0/ 8.10.151.0/ 8.3.143.0/ 8.3.131.0/ 8.3.150.0/ 8.5.135.0/ 8.5.161.0/ 8.10.185.0/ 8.2.166.0/ 8.5.140.0/ 8.5.151.0/ 8.3.150.0/ 16.12.3s/ WLC RRM/RF/CLEANAIR/ 8.5.151.0/ 8.10.130.0/ NA - COMPONENT ONLY/ 8.10.162.0/ 8.3.140.0/ 8.10.150.0/ 8.10.183.0/ 8.10.161.0/ 8.10.185.0/ 8.5.151.0/ 16.12.4/ 17.3.5b/ 8.10.183.0/ 8.10.171.0/ 8.5.171.0 Response in this JSON format:
{"software_version": "","explanation": "", "summary": ""}
refer the latest GCI
Technology: Wireless
Subtechnology: 8540 Series Wireless LAN Controller (AIR-CT8540)
Problem Code: Interoperability
Product: NA
Product Family: AIRCTA2
Software Version: N/A
Router/Node Name: N/A
Problem Details: We are noticing that some 2800 series APs are not able to join the WLC. APs are up and reachable from the network but shows down on the WLC.
Previous case - 694189183
LT19-01-AP10#ping 172.18.240.13
Sending 5, 100-byte ICMP Echos to 172.18.240.13, timeout is 2 seconds
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max = 0.576/0.659/0.854 ms
LT19-01-AP10#
(TLDC-WL-WLC01) >grep include LT19-01-AP10 "show ap join stats summary all"
Press any key to continue..
bc:5a:56:f0:c2:60 N A LT19-01-AP10 10.253.179.36 Not Joined
There are 1 lines matching the pattern LT19-01-AP10
(TLDC-WL-WLC01) >
We are noticing that some 2800 series APs are not able to join the WLC. APs are up and reachable from the network but shows down on the WLC.
Previous case - 694189183
LT19-01-AP10#ping 172.18.240.13
Sending 5, 100-byte ICMP Echos to 172.18.240.13, timeout is 2 seconds
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max = 0.576/0.659/0.854 ms
LT19-01-AP10#
(TLDC-WL-WLC01) >grep include LT19-01-AP10 "show ap join stats summary all"
Press any key to continue..
bc:5a:56:f0:c2:60 N A LT19-01-AP10 10.253.179.36 Not Joined
There are 1 lines matching the pattern LT19-01-AP10
(TLDC-WL-WLC01) >
refer the latest GCI | Question: Which product is principally discussed in these documents?
Answer "NONE" if you cannot find answer in the given documents.
The ONLY product name should be selected from the given product name list: AIR-CT8540-1K-K9/ AIR-CT8540-K9/ NA-CIN_CLOSE_HW/ C9120AXI-S/ THIRD_PARTY_PRODUCT_HW/ AIR-CT8540-CA-K9/ AIR-AP2802I-S-K9/ AIR-CT8540-K9Z/ AIR-BZL-C240M4/ DN2-HW-APL-XL/ WLC-AP-T/ AIR-CT8540-SW-8.2 Response in this JSON format:
{"product_name": "","explanation": "", "summary": ""}
Technology: Wireless
Subtechnology: 8540 Series Wireless LAN Controller (AIR-CT8540)
Problem Code: Interoperability
Product: NA
Product Family: AIRCTA2
Software Version: N/A
Router/Node Name: N/A
Problem Details: We are noticing that some 2800 series APs are not able to join the WLC. APs are up and reachable from the network but shows down on the WLC.
Previous case - 694189183
LT19-01-AP10#ping 172.18.240.13
Sending 5, 100-byte ICMP Echos to 172.18.240.13, timeout is 2 seconds
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max = 0.576/0.659/0.854 ms
LT19-01-AP10#
(TLDC-WL-WLC01) >grep include LT19-01-AP10 "show ap join stats summary all"
Press any key to continue..
bc:5a:56:f0:c2:60 N A LT19-01-AP10 10.253.179.36 Not Joined
There are 1 lines matching the pattern LT19-01-AP10
(TLDC-WL-WLC01) >
We are noticing that some 2800 series APs are not able to join the WLC. APs are up and reachable from the network but shows down on the WLC.
Previous case - 694189183
LT19-01-AP10#ping 172.18.240.13
Sending 5, 100-byte ICMP Echos to 172.18.240.13, timeout is 2 seconds
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max = 0.576/0.659/0.854 ms
LT19-01-AP10#
(TLDC-WL-WLC01) >grep include LT19-01-AP10 "show ap join stats summary all"
Press any key to continue..
bc:5a:56:f0:c2:60 N A LT19-01-AP10 10.253.179.36 Not Joined
There are 1 lines matching the pattern LT19-01-AP10
(TLDC-WL-WLC01) >
refer the latest GCI | Technology: Wireless
Subtechnology: 8540 Series Wireless LAN Controller (AIR-CT8540)
Problem Code: Interoperability
Product: NA
Product Family: AIRCTA2
Software Version: N/A
Router/Node Name: N/A
Problem Details: We are noticing that some 2800 series APs are not able to join the WLC. APs are up and reachable from the network but shows down on the WLC.
Previous case - 694189183
LT19-01-AP10#ping 172.18.240.13
Sending 5, 100-byte ICMP Echos to 172.18.240.13, timeout is 2 seconds
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max = 0.576/0.659/0.854 ms
LT19-01-AP10#
(TLDC-WL-WLC01) >grep include LT19-01-AP10 "show ap join stats summary all"
Press any key to continue..
bc:5a:56:f0:c2:60 N A LT19-01-AP10 10.253.179.36 Not Joined
There are 1 lines matching the pattern LT19-01-AP10
(TLDC-WL-WLC01) > | We are noticing that some 2800 series APs are not able to join the WLC. APs are up and reachable from the network but shows down on the WLC.
Previous case - 694189183
LT19-01-AP10#ping 172.18.240.13
Sending 5, 100-byte ICMP Echos to 172.18.240.13, timeout is 2 seconds
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max = 0.576/0.659/0.854 ms
LT19-01-AP10#
(TLDC-WL-WLC01) >grep include LT19-01-AP10 "show ap join stats summary all"
Press any key to continue..
bc:5a:56:f0:c2:60 N A LT19-01-AP10 10.253.179.36 Not Joined
There are 1 lines matching the pattern LT19-01-AP10
(TLDC-WL-WLC01) > | refer the latest GCI | Problem Details: We are noticing that some 2800 series APs are not able to join the WLC. APs are up and reachable from the network but shows down on the WLC. | AIR-CT8540-K9 | 8.10.185.0 | 8.10.185.0 | 16.0 | 3 | 100.0 | Software Bug | AIRCTA2 | Wireless | 8540 Series Wireless LAN Controller (AIR-CT8540) | 01t6R000007PZHhQAO | Interoperability | 8540 Series Wireless LAN Controller (AIR-CT8540) | Wireless | 01t15000004dDRMAA2 | SHERLOCK: PARTIAL |
694069586 | Question: Which software version is principally discussed in these documents?
Answer "NONE" if you cannot find answer in the given documents.
The ONLY software version should be selected from the given software version list: 2.6.0.156/ 2.6.0 Response in this JSON format:
{"software_version": "","explanation": "", "summary": ""}
Closed
Technology: Identity Services Engine (ISE) - 2.6 and Prior
Subtechnology: ISE Performance (High CPU / Memory / IO / GUI Slowness)
Problem Code: Error Messages, Logs, Debugs
Product: NA
Product Family: CISE
Software Version: N/A
Router/Node Name: N/A
Problem Details: Hi Support,
We are facing very slowness issue accessing PAN node GUI. Need TAC assistance to investigate on this. I will attach some of show output in case portal. Thanks.
Hi Support,
We are facing very slowness issue accessing PAN node GUI. Need TAC assistance to investigate on this. I will attach some of show output in case portal. Thanks.
Collected Show-tech from CLI.
Device uptime is 225 days.
Observed high load average usage.
Suggested for reloading the device.
Issue resolved after reload, proceeding towards case closure with Vijay's consent. | Question: Which product is principally discussed in these documents?
Answer "NONE" if you cannot find answer in the given documents.
The ONLY product name should be selected from the given product name list: SNS-3595-K9 Response in this JSON format:
{"product_name": "","explanation": "", "summary": ""}
Technology: Identity Services Engine (ISE) - 2.6 and Prior
Subtechnology: ISE Performance (High CPU / Memory / IO / GUI Slowness)
Problem Code: Error Messages, Logs, Debugs
Product: NA
Product Family: CISE
Software Version: N/A
Router/Node Name: N/A
Problem Details: Hi Support,
We are facing very slowness issue accessing PAN node GUI. Need TAC assistance to investigate on this. I will attach some of show output in case portal. Thanks.
Hi Support,
We are facing very slowness issue accessing PAN node GUI. Need TAC assistance to investigate on this. I will attach some of show output in case portal. Thanks.
Collected Show-tech from CLI.
Device uptime is 225 days.
Observed high load average usage.
Suggested for reloading the device.
Issue resolved after reload, proceeding towards case closure with Vijay's consent. | Technology: Identity Services Engine (ISE) - 2.6 and Prior
Subtechnology: ISE Performance (High CPU / Memory / IO / GUI Slowness)
Problem Code: Error Messages, Logs, Debugs
Product: NA
Product Family: CISE
Software Version: N/A
Router/Node Name: N/A
Problem Details: Hi Support,
We are facing very slowness issue accessing PAN node GUI. Need TAC assistance to investigate on this. I will attach some of show output in case portal. Thanks. | Hi Support,
We are facing very slowness issue accessing PAN node GUI. Need TAC assistance to investigate on this. I will attach some of show output in case portal. Thanks. | Collected Show-tech from CLI.
Device uptime is 225 days.
Observed high load average usage.
Suggested for reloading the device.
Issue resolved after reload, proceeding towards case closure with Vijay's consent. | ISE GUI slowness issue. | SNS-3595-K9 | 2.6.0 | 2.6.0 | 85.0 | 3 | 100.0 | Configuration Assistance (process not intuitive, too complex, inconsistent...) | CISE | Identity Services Engine (ISE) - 2.6 and Prior | ISE Performance (High CPU / Memory / IO / GUI Slowness) | 01t1C000006XIP9QAO | Error Messages, Logs, Debugs | ISE Performance (High CPU / Memory / IO / GUI Slowness) | Identity Services Engine (ISE) - 2.6 and Prior | 01tA0000002qmXqIAI | nan |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.