[c-nsp] blackholed traffic on ether-channel

Phil Mayers p.mayers at imperial.ac.uk
Fri Apr 8 03:26:55 EDT 2016

On 07/04/16 22:15, Hunter Fuller wrote:
> Look out for SY2!! We were on that release when we rolled out our
> Cat6807s in 2014 but there was a gross bug where a malformed mDNS
> packet could crash the sup! We had a quad-sup VSS at this time and it
> crashed all four within a minute! I'm unsure if this was VSS specific
> but I did get confirmation that it wasn't quad-sup specific.
> We are now on 15.1(2)SY4 and life is good... for now..

Note there's a 4a - the "a" release generally indicate pretty serious 
bugs in the plain release, IME, but I haven't pored over the release 
notes in a while.

Just to continue the comedy train for the 68xx IOS discussions, watch 
out for CSCut83493 on anything prior to SY5 ;o)

There's a slightly-larger-than-normal number of resolved caveats in 
SY5/6, be aware.

Basically, Cat6k IOS is the same it's always been - find a release where 
the known bugs don't affect *you* and stick on it until otherwise.

(It's not proving a great platform for us TBH - I still can't get good 
Netflow performance out of a 68xx in exactly the same environments a 
sup720 thrived... oh the irony)

More information about the cisco-nsp mailing list