Release Notes

Send documentation comments to mdsfeedback-doc@cisco.com
40
)Cisco MDS 9000 Family Release Notes for Cisco MDS NX-OS Release 5.0(1a)
OL-21012-01
Caveats
Error Type : Minor error
PhyPortLayer : Fibre Channel
Port(s) Affected : 1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18
Error Description :
DSAP : 0 (0x0)
UUID : 0 (0x0)
Time : Mon Nov 16 10:07:33 2009
(Ticks: 4B012465 jiffies)
All FC and FCIP interfaces go into a hardware failure state and the switch needs to be reloaded to
recover. This error occurs only if in-order-delivery is enabled on one or more VSANs carried over
an FCIP trunk.
Workaround: This issue is resolved.
CSCtd59553
Symptom: A PortChannel member change can result in route or IVR rewrite corruption or both if
the following conditions are met:
In-order delivery (IOD) is enabled on the switch or in the fabric
More than one Equal Cost Multipath (ECMP) made of PortChannels is present.
Workaround: This issue is resolved.
CSCtd90345
Symptom: Hosts running Tivoli Storage Manager (TSM) may experience read/write errors when
IOA tape acceleration is enabled. This situation occurs because TSM always sends UNTAGGED
commands and IOA sends its own commands such as READ, SPACE6, REWIND, etc. for read
acceleration as TAGGED commands. When there is a mixture of UNTAGGED and TAGGED
commands, an overlapping occurs because of out-of-order commands, which causes the tape drive
to send a reject message.
Workaround: This issue is resolved.
CSCte37124
Symptom: RSCNs are not sent out to the affected devices when the enhanced device alias members
present in the active zone set are changed.
Workaround: This issue is resolved.
CSCsz16768
Symptom: When NPV is enabled, IP access list commands are not available.
Workaround: This issue is resolved.
CSCta62636
Symptom: Prior to MDS NX-OS Release 5.0(1a), MDS 9500 Series switches shipped with an
Apache HTTP server. Some versions of the Apache web server enable HTTP Trace and Track
methods on the switch, which exposes an XST vulnerability. See
http://www.kb.cert.org/vuls/id/867593 for additional information.
Workaround: This issue is resolved. The Apache server has been replaced by the THTTPD server
that does not exhibit this vulnerability.
CSCtc03274