
OPERATIONAL DEFECT DATABASE
...

...
VPC peer keep-alive keeps failing after multiple failed user authentication: N3K01# show logging las 10 2020 Jun 13 13:57:17 N3K01 %AUTHPRIV-3-SYSTEM_MSG: pam_aaa:Authentication failed from 10.66.71.99 - dcos_sshd[26763] 2020 Jun 13 13:57:21 N3K01 %AUTHPRIV-3-SYSTEM_MSG: pam_aaa:Authentication failed from 10.66.71.99 - dcos_sshd[26788] 2020 Jun 13 13:57:24 N3K01 %AUTHPRIV-3-SYSTEM_MSG: pam_aaa:Authentication failed from 10.66.71.99 - dcos_sshd[26807] 2020 Jun 13 13:57:24 N3K01 %DAEMON-3-SYSTEM_MSG: error: maximum authentication attempts exceeded for invalid user cisco from 10.66.71.99 port 48526 ssh2 - dcos_sshd[26760] 2020 Jun 13 13:57:29 N3K01 %VPC-2-PEER_KEEP_ALIVE_RECV_FAIL: In domain 192, VPC peer keep-alive receive has failed 2020 Jun 13 13:58:56 N3K01 %AUTHPRIV-3-SYSTEM_MSG: pam_aaa:Authentication failed from 10.66.71.99 - dcos_sshd[27291] 2020 Jun 13 13:59:00 N3K01 %AUTHPRIV-3-SYSTEM_MSG: pam_aaa:Authentication failed from 10.66.71.99 - dcos_sshd[27308] 2020 Jun 13 13:59:03 N3K01 %AUTHPRIV-3-SYSTEM_MSG: pam_aaa:Authentication failed from 10.66.71.99 - dcos_sshd[27334] 2020 Jun 13 13:59:03 N3K01 %DAEMON-3-SYSTEM_MSG: error: maximum authentication attempts exceeded for invalid user cisco from 10.66.71.99 port 48560 ssh2 - dcos_sshd[27282] 2020 Jun 13 13:59:08 N3K01 %VPC-2-PEER_KEEP_ALIVE_RECV_FAIL: In domain 192, VPC peer keep-alive receive has failed
Perform the remote login using automation tool
N/A
Click on a version to see all relevant bugs
Cisco Integration
Learn more about where this data comes from
Bug Scrub Advisor
Streamline upgrades with automated vendor bug scrubs
BugZero Enterprise
Wish you caught this bug sooner? Get proactive today.