12-17-2020 03:28 AM
Good Morning,
Using the interface range to remove dot1x commands from Cisco 3850 switchport interfaces, we lost SSH connection to the switch. The interface range was Gi1/0/3 to Gi1/0/47. The router was connected to Gi1/0/48 on the switch. We are trying to determine why using the interface range commands to remove dot1x commands made the switch inaccessible. Could there a memory buffer that could cause the switch inaccessible? Has everyone experienced this same behavior with Cisco 3850?
12-17-2020 03:47 AM
Our switches, running 16.9.5 and 16.12.4, crash when we APPLIED Dot1x into ranged ports.
12-17-2020 04:25 AM
our switch is on 16.09.04. Was there a cash file generated when your switch crash? Was there a bug ID for this issue?
s1-glsdoedpem#sh ver
Cisco IOS XE Software, Version 16.09.04
Cisco IOS Software [Fuji], Catalyst L3 Switch Software (CAT3K_CAA-UNIVERSALK9-M), Version 16.9.4, RELEASE SOFTWARE (fc2)
Technical Support: http://www.cisco.com/techsupport
Copyright (c) 1986-2019 by Cisco Systems, Inc.
Compiled Thu 22-Aug-19 17:33 by mcpre
12-17-2020 02:26 PM
@seanharvey15116 wrote:
Was there a cash file generated when your switch crash? Was there a bug ID for this issue?
TAC says "the fix is in 16.12.4". Well, that was a major catastrophe because we walked straight into a major PoE bug that is found in the entire 16.12.X train (16.12.1 to 16.12.4). The bug "bites" after 8 weeks. If SMU is applied, the bug "bites" after 4 weeks.
I also created a new TAC Case yesterday because we have another stack, running 16.9.5, having a memory leak:
4-RP0 Critical 3977748 3874060 (97%) 103688 ( 3%) 4808000 (121%)
If this is the same bug as my previous TAC Case, the fix is meant to be in, you guessed it, 16.12.4.
So now, I have a major dilemma: Regularly reboot stack with memory leak or upgrade to 16.12.4 and regularly reboot the stack every 4 to 8 weeks before the PoE bug bites.
12-18-2020 02:18 AM
Good Morning,
Did Cisco TAC provide you with a Bug ID?
12-18-2020 04:44 PM
The first memory leak was attributed to a brand-new Bug ID: CSCvv66845
I am still waiting for the 2nd TAC Case to get analyzed.
12-22-2020 08:07 PM - edited 12-23-2020 04:19 PM
TAC has confirmed that the 2nd TAC Case, memory leak on 3850 stack running 16.9.5, is due to the same bug, CSCvv66845.
NOTE:
12-23-2020 05:54 AM
12-23-2020 05:54 AM
Thank you for the information.
12-17-2020 05:12 AM
- You may also want to check the logs when this happens.
M.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide