Skip to content

Overview

Affected platforms: Cisco Nexus 9000 Series Switches 16.0(5h)

Description: Routes show negative ages in the base shell. This doesn’t affect the ages in vsh, so this is cosmetic.

pod8-leaf3# show ip route vrf management
IP Route Table for VRF "management"
...
0.0.0.0/0, ubest/mbest: 1/0
    *via 10.122.145.129/32, mgmt0, [0], -1d22h, local
Result: IP Fabric Routing table is empty, as the parsing is not working. Routes are skipped due to the negative age, which breaks parsing. This affects E2E path lookup and related functionality.

Fix: Parsing was improved on version 7.5.7 and newer so negative numbers are processed and displayed correctly.

Resource: CSCwo46438

Note

Keep your network devices always up to date.
This is crucial to ensure all devices are on the newest version to resolve bugs.


Affected platforms: 15.1(4)M4, 15.1(4)M4.7, 15.1(4)M5, 12.2(50)SE3, 6.0(2)N2(3), 15.5(3.0l)M

Description: The show transceivers command can cause fatal issues on some Cisco platforms, including device crashes. It takes several minutes to finish the command on some platforms.

Result: Affected platforms are removed from collection, and the Transceivers task is disabled by default in IP Fabric. Before enabling it, ensure that your devices are not affected. If they are, remove them from the task settings.

Resources:


Affected platforms: all IOS-family switches

Description: The show spanning-tree mst command requires an enable password. It is currently not supported for the IOS family (only SG and ASA).

Result: MST is not collected, leading to false positives in the STP inconsistency check.

Workaround: Use privilege 15 authorization on login or show spanning-tree mst command authorization.


Affected platforms: SG family, sf302-08pp-k9 platform

Description:  The sh spa d command returns misformatted output (forgetting newline characters and repeating the output with an offset).

Result: STP detail is not collected.


Affected platforms: Cisco ASA

Description: Some Cisco ASA and Firepower hardware platforms can run either Cisco ASA software or Firepower Threat Defense software. Depending on the software in use, these devices are detected either as Cisco ASA or Cisco FTD. For example, Cisco Firepower 2100 can be detected as asa when running ASA software or as ftd when running FTD software.


Affected platforms: Cisco Nexus 5000, 6000, and 9000

Description: Several Cisco Nexus platforms allow setting MTU on a per-service basis. The interface MTU shown in the IP Fabric GUI is only interface-specific (e.g., inventory/interfaces table). Therefore, the interface MTU value for Nexus 5k/6k/9k can only be displayed if the network-qos system policy defines the same MTU for all services or when no network-qos system policy is active. The show policy-map system type network-qos command is used to determine the network-qos system policy. The MTU value displayed in the show interface command is assumed to be the default value. Note: class-fcoe is not considered when comparing different services’ MTUs.

Resource: CSCsl21529


Affected platforms: ASA- and FTD-family firewalls

Description: Currently, interface security levels are not supported.

Result: End-to-end path security policy check is only based on ACLs.


Affected platforms: ASA- and FTD-family firewalls

Description: VLAN ID detection for interfaces – If the show interface detail command doesn’t provide the VLAN ID, but the interface name suggests VLAN presence (e.g., interface names like vlan100 or sub-interfaces like Gi0/1.100 or Po1.100, etc.), this VLAN will be used.

Result: In rare cases, the VLAN ID for an interface might not be determined correctly.


Affected platforms: FTD-family firewalls

Description: When using FTD, if you run the show ntp command, a password prompt will appear in the command line. This will break the discovery of FTD.

Result: The NTP discovery task is disabled by default for FTD. If your FTD is not affected by this bug, you can safely enable it.

Resource: CSCvt01938