Cisco VMS problem

I have installed the cisco VMS 3.1 Enterprise edition but after installation. I am not able to open it in web page. I have checked all the services and it was running fine. But after the new installation, it is not opening in internet explorer. I have try with hostname adn IP address it is showing me following error
Internal Server Error
The server encountered an internal error or misconfiguration and was unable to complete your request.
Please contact the server administrator, [email protected] and inform them of the time the error occurred, and anything you might have done that may have caused the error.
More information about this error may be available in the server error log.
Additionally, a 403 Forbidden error was encountered while trying to use an ErrorDocument to handle the request.

Have you changed the hostname recently. Check the information at http://www.cisco.com/en/US/docs/net_mgmt/ciscoworks_common_services_software/3.0/user/guide/diagnos.html#wp1078582 for more information.

Similar Messages

  • Cisco vms 2.3 can't query to IDSM-2

    Hi all,
    I use Catalyst 6513 (Router IOS) + IDSM-2 and use Cisco VMS 2.3 to manage IDSM-2. I upgrade IDSM-2 from version 4 to version 5. However, after updating completely, I use Cisco VMS 2.3 to query to IDSM-2, I see a error:
    "status: Error importing configuration files from the sensor - Unable to get sensor version from the sensor. Possible reason: X.509 certificate is invalid or sensor version was downgraded. "

    Hi,
    Normally doing the following fixes the problem.
    You need to regenerate the IDSMC Certificate and add the VMS as the trusted host to the sensor.
    To generate the certificate do the following.
    c:\progra~1\cscopx\mdc\apache\gencert.bat
    where c: drive is the drive you installed your VMS.
    After this is done, please restart the CiscoWorks Daemon Manager.
    You will also need to generate tls key as well as manually re-install the TLS certificate on your sensor.
    tls trusted-host from the IPS CLI and specify your VMS's IP address.
    tls generate-key
    no tls trusted-host ip-address (vms server ip)
    tls trusted-host ip-address (vms server ip)
    Thanks.
    Edward

  • Can not use Cisco VMS 2.3 to send email alert to admin

    Hi all,
    I am using IDSM version 5 + Catalyst 6513.
    I am going to configure for Cisco VMS 2.3 to send alert email to admin. I downloaded scritp from cisco forum but now I can't configure.
    1. I rename the file emailalertv5.txt to emailalertv5.pl
    2. I copy the file to directory "E:\CSCOpx\MDC\etc\ids\scripts\"
    3. I configure in Cisco VMS 2.3 (like the attachment)
    However, I can't receive the alert email from Cisco VMS 2.3. When I connect to Security Monitor, I see many attack events.

    Hi all,
    if you know the answer, please answer me. I am looking for your answer.
    I read all materials about IDSM-2 but I can't configure email alert.
    Thank you very much.

  • Cisco VMS can support management of router and switches

    I want to use Cisco VMS to manage my IPS and firewalls.
    A also have two routere and five switches in place can i use the same software to monitor and manage them or I need separate software.

    VMS 2.3 components and the capabilities of each. VMS is packaged in one sub-box with Obtaining Documentation directing you to VMS documentation and the following two CDs:
    1.VMS Management and Monitoring Centers Disk 1 of 2Contains these VMS components and associated product documentation:
    CiscoWorks Common Services
    Auto Update Server
    Management Center for Firewalls
    Management Center for IPS Sensors1
    Monitoring Center for Performance
    Monitoring Center for Security
    Management Center for VPN Routers
    2.VMS Management and Monitoring Centers Disk 2 of 2Contains these VMS components and associated product documentation:
    http://www.cisco.com/en/US/products/sw/cscowork/ps2330/products_installation_guide_chapter09186a00803bd364.html#wp1036990
    Management Center for Cisco Security Agents
    Resource Manager Essentials
    Resource Manager Essentials IDU 12
    Management Center for IDS Sensors 2.0.12
    Monitoring Center for Security 2.0.13
    Note You must install IDU 12 included on Disk 2 for RME to work with VMS 2.3 even if you already have RME 3.5 installed on your server.

  • Unable to view IDS logs from cisco VMS server

    Hi,
    Pls help me out for viewing IDS logs from my cisco vms server (4th edition with SP2,java 1_4_1.02)
    Configured IDS sensor with IDS MC (2.0.1) and updated signatures with latest sig files,
    Configured Security monitor to view my IDS sensor and showing TLS was connected and cisco IDS REDP/SDEE,when viewing logs error was server codes need to be update., unreconiged last saved IDS alarms.
    Pls give me the solution
    Regards
    Ajay

    Hi Ajay,
    when you upgrade to sec mon 2.0.1, the database is the same, but the formats are different.. you need to do somethings for converting these formats, which might take hours together, if ur database has too many events...
    for information to convert the file format, refer to this URL:
    http://www.cisco.com/en/US/products/sw/cscowork/ps3990/prod_release_note09186a0080386f72.html#wp1087204
    see the section "Using the ConvertAndImport.pl Script after Upgrading from Security Monitor 1.2.3 to Security Monitor 2.0.1 "
    do this and see.. let us know
    Raj

  • Remote Access VPN on Cisco ASA Problem

    Hi, i configured Remote access VPN on Cisco ASA 8.x as per below configuration.
    Problem is that my internet has stopped working, and default route is just showing stars.
    i can ping internal server 10.110.10.150 fine , which i allowed on VPN ACL, but my other traffic not going to regular internet on my laptop,
    what additional required to force my internet to go to regular internet instead of getting encrypted?
    Also attaching output of route print at the point when VPN is connected.
    ip local pool RA_VPN_POOL 10.1.200.100-10.1.200.150 mask 255.255.255.0
    crypto ipsec transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac
    crypto dynamic-map RA_VPN 65535 set transform-set ESP-AES-128-SHA
    crypto dynamic-map RA_VPN 65535 set security-association lifetime seconds 28800
    crypto dynamic-map RA_VPN 65535 set security-association lifetime kilobytes 4608000
    crypto map VPN_MAP 65535 ipsec-isakmp dynamic RA_VPN
    crypto map VPN_MAP interface outside
    isakmp enable outside
    crypto isakmp policy 10
    authentication pre-share
    encryption aes
    hash sha
    group 2
    lifetime 86400
    tunnel-group ITT_RA type remote-access
    tunnel-group ITT_RA general-attributes
    address-pool RA_VPN_POOL
    default-group-policy RA_VPN_GP
    tunnel-group ITT_RA ipsec-attributes
    pre-shared-key <group key>
    group-policy RA_VPN_GP internal
    group-policy RA_VPN_GP attributes
    dns-server value 10.0.0.1 10.0.0.2
    vpn-tunnel-protocol IPSec
    split-tunnel-policy tunnelspecified
    split-tunnel-network-list value Split_Tunnel_List
    default-domain value mydomain.com
    address-pools value RA_VPN_POOL
    access-list Split_Tunnel_List extended permit ip host 10.110.10.150 10.1.200.0 255.255.255.0
    access-list nonattest extended permit ip host 10.110.10.150 10.1.200.0 255.255.255.0
    nat (inside) 0 access-list nonattest
    IPv4 Route Table
    ===========================================================================
    Active Routes:
    Network Destination        Netmask          Gateway       Interface  Metric
              0.0.0.0          0.0.0.0      10.111.36.1      10.111.36.9          276
              0.0.0.0          0.0.0.0         On-link      10.1.200.100            20
           10.1.200.0    255.255.255.0         On-link      10.1.200.100    276
         10.1.200.100  255.255.255.255         On-link      10.1.200.100    276
         10.1.200.255  255.255.255.255         On-link      10.1.200.100    276
        10.110.10.150  255.255.255.255       10.1.200.1     10.1.200.100    100
          10.111.36.0    255.255.255.0         On-link       10.111.36.9    276

    Hi, i configured Remote access VPN on Cisco ASA 8.x as per below configuration.
    Problem is that my internet has stopped working, and default route is just showing stars.
    i can ping internal server 10.110.10.150 fine , which i allowed on VPN ACL, but my other traffic not going to regular internet on my laptop,
    what additional required to force my internet to go to regular internet instead of getting encrypted?
    Also attaching output of route print at the point when VPN is connected.
    ip local pool RA_VPN_POOL 10.1.200.100-10.1.200.150 mask 255.255.255.0
    crypto ipsec transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac
    crypto dynamic-map RA_VPN 65535 set transform-set ESP-AES-128-SHA
    crypto dynamic-map RA_VPN 65535 set security-association lifetime seconds 28800
    crypto dynamic-map RA_VPN 65535 set security-association lifetime kilobytes 4608000
    crypto map VPN_MAP 65535 ipsec-isakmp dynamic RA_VPN
    crypto map VPN_MAP interface outside
    isakmp enable outside
    crypto isakmp policy 10
    authentication pre-share
    encryption aes
    hash sha
    group 2
    lifetime 86400
    tunnel-group ITT_RA type remote-access
    tunnel-group ITT_RA general-attributes
    address-pool RA_VPN_POOL
    default-group-policy RA_VPN_GP
    tunnel-group ITT_RA ipsec-attributes
    pre-shared-key <group key>
    group-policy RA_VPN_GP internal
    group-policy RA_VPN_GP attributes
    dns-server value 10.0.0.1 10.0.0.2
    vpn-tunnel-protocol IPSec
    split-tunnel-policy tunnelspecified
    split-tunnel-network-list value Split_Tunnel_List
    default-domain value mydomain.com
    address-pools value RA_VPN_POOL
    access-list Split_Tunnel_List extended permit ip host 10.110.10.150 10.1.200.0 255.255.255.0
    access-list nonattest extended permit ip host 10.110.10.150 10.1.200.0 255.255.255.0
    nat (inside) 0 access-list nonattest
    IPv4 Route Table
    ===========================================================================
    Active Routes:
    Network Destination        Netmask          Gateway       Interface  Metric
              0.0.0.0          0.0.0.0      10.111.36.1      10.111.36.9          276
              0.0.0.0          0.0.0.0         On-link      10.1.200.100            20
           10.1.200.0    255.255.255.0         On-link      10.1.200.100    276
         10.1.200.100  255.255.255.255         On-link      10.1.200.100    276
         10.1.200.255  255.255.255.255         On-link      10.1.200.100    276
        10.110.10.150  255.255.255.255       10.1.200.1     10.1.200.100    100
          10.111.36.0    255.255.255.0         On-link       10.111.36.9    276

  • Cisco 3905 problem / remote site

    Hi all!
    Information:
    I have CUCM 8.6.2.20000-2 and many Cisco IP Phone 3905 (SIP). Some of them deployed in central office and some in remote sites.
    Phone information:
    Boot Version: 3905.0-0-0-01-01
    DSP Version: 12.0.0.8
    Application: 3905.9-2-2-0
    Symptoms:
    In remote sites only!
    The phone is registered and working fine. However, after few hours idle state I lift the handset, dial any number and nothing happens. Drop the call and try again 2-3 times. After that either call passed or get permanent busy tone (need to reboot the phone to work again).
    The phone is marked as registered on CUCM and I hear dial tone when lifted the handset.
    I cannot collect debug messages from phones, because as soon as I login via telnet it going work fine.
    There is no such problem in central office.
    Phones print following messages in terminal all the time:
    17:07:10:302 x [CENTRAL] CDP/LLDP-MED CB function is called
    17:07:26:491   [sip]  03:58:24.490    pjsua_acc.c  SIP outbound status for acc 0 is not active
    17:07:26:495   [sip]  03:58:24.494    pjsua_acc.c  "п°п╦я┘п╟п╦п╩ п я┐пЇя▄п╪п╦пҐ"<sip:[email protected]:5060>: registration success, status=200 (OK              ), will re-register in 120 seconds
    17:07:26:502   [sip]  03:58:24.500         pjcu.c  pjcu_on_reg_state2(), Account["п°п╦я┘п╟п╦п╩ п я┐пЇя▄п╪п╦пҐ"<sip:[email protected]:5060>] : OK,               status=200
    17:07:26:506 x [pcu] pcuRcvHandler(CALL), SRV_EV, eid=0, cid=65535,
    17:07:26:510 x [pcu] [pcux_insrv_cb():7071] CUCM_DateTime:Mon, 27 May 2013 11:07:26 GMT
    17:07:26:511 x [pcu] Sync time from server: Mon, 27 May 2013 11:07:26 GMT
    17:07:26:515 x [pcu] [set_svr_type][1599] Bfe active_server_idx=0, serverType=0
    17:07:26:515 x [pcu] [set_svr_type][1602] Aft  serverType=0, Server Number=2
    17:07:26:531   [ipps] ----- PCU: CC_SRV, pid=0, eid=0, cid=65535 -----
    17:07:26:532   [ipps] In func: remoteNtyEvtProcess(), lib = 0, cid = 65535, ntyEv = 0
    17:07:26:533 f [ipps] In func: remoteNtyEvtProcess(), recv inservice nty, svrType = 0, cause = 0
    17:07:26:534 f [MMI] <RCV>: In func: ui_nty(), lid = 0, cid = 65535, ntyEv = 0
    17:07:26:535 x [CENTRAL] IPPS CB function(RegStatus) is called (1) with Line (0)
    17:07:26:536 f [ipps] In func: mlcu_isKpmlEnabled(), KPML value = 3, blRet = 1
    17:07:26:537 x [CENTRAL] Enter FSM: State(STANDBY) | Event(REGISTER_OK) | Cause(0)
    17:07:26:540 x [CENTRAL] Unexpected event REGISTER_OK (cause=0) at STANDBY state
    17:07:26:541 x [CENTRAL] Waiting event in STANDBY
    17:07:58:990 x [CENTRAL] CDP/LLDP-MED CB function is called
    17:08:39:022   [sip]  03:59:37.021         pjcu.c  pjcuRcvHandler(KA), KA_REQUEST, eid=-1, p1=192.168.70.1:5060
    17:08:39:040   [sip]  03:59:37.036         pjcu.c  pjcu_rpt_ka_status(), target(192.168.70.1:5060): status=1, id=27
    17:08:39:044 x [pcu] pcuRcvHandler(KA), KA_RESPONSE, eid=0, addr=192.168.70.1:5060, status=1
    17:08:39:050 x [pcu] [pcu_polling_sipserver_thread():1478] mark!
    17:08:54:130 x [CENTRAL] CDP/LLDP-MED CB function is called
    Thanks for your help.

    There are 2 versions of firmware on cisco.com. cmterm-3905.9-2-1-0 is the default firmware going with CUCM 8.6.2.20000-2 for 3905 phones and cmterm-3905.9-2-2-0 I've installed recently. Both versions of firmware with same problems.
           Some new information. I get traffic dump with wireshark.
    INVITE sip:[email protected]:5060;transport=tcp SIP/2.0
    Via: SIP/2.0/TCP 192.168.70.86:3457;rport;branch=z9hG4bKPjdp3HjFLs7Dy03RL9ce.16qung.tOq5O3
    Max-Forwards: 70
    From: "............ .............." ;tag=5a25b465-747b-4c31-a020-1a9636827427
    To: sip:[email protected]
    Contact: ;+sip.instance="";+u.sip!devicename.ccm.cisco.com="SEP10BD18DD3F59";+u.sip!model.ccm.cisco.com="592"
    Call-ID: e9edcc43-6a9b-42b8-8efc-99f702b313d1
    CSeq: 28324 INVITE
    Allow: PRACK, INVITE, ACK, BYE, CANCEL, UPDATE, SUBSCRIBE, NOTIFY, REFER, MESSAGE, OPTIONS
    User-Agent: Cisco-CP3905/9.2.1
    Supported: replaces,join,sdp-anat,norefersub,extended-refer,X-cisco-callinfo,X-cisco-serviceuri,X-cisco-escapecodes,X-cisco-service-control,X-cisco-monrec,X-cisco-config,X-cisco-sis-4.0.0,X-cisco-xsi-7.0.1
    Expires: 900
    Accept: application/sdp
    Allow-Events: kpml,dialog
    Remote-Party-ID: "............ ..............";privacy=off
    Content-Type: application/sdp
    Content-Length:   294
    As you can see phone trying to invite [email protected]:5060, BUT I dial 7103 DN from 7102. So where are other numbers? Bug?

  • 10.4.8 and Cisco/VPN problem solved

    Hi,
    This and related issues have arisen in threads on the past month, regarding the Cisco VPN v 4.9005 (and perhaps other VPN software) not working the same after the 10.4.8 upgrade. The problems relate to either not making a VPN connection, or data transfer after the successful connection is made, once the upgrade happened.
    The workaround was to run the Network Setup Assistant every time to do the connection properly before launching the VPN. But this is a pain.
    The eventual solution was simple, although effecting it was not straightforward. It was necessary to do a clean install of the VPN client. This is something that I could not accomplish manually, despite suggestions from the discussion group as to which files to remove, because it was difficult to find all the files that the install put it. But, at least on my machines, it could be done by command line in Terminal - cd to /usr/local/bin, ls vpn_uninstall to see if it is there, and if so, sudo ./vpn_uninstall.
    I don't know if other machines can do this or if this was part of our local IT install, but IT WORKED. I AM FREE!
    Wayne

    that's odd....
    I'm running cisco client 4.6.04 on OS X 10.4.8 and VNC without any problems...
    the only difference is my radius server is an NT box, but I can AFP and VNC to my Mac on that network.

  • New 2.4 Macbook and Cisco VPN problems?

    Is anyone else using the new MacBook Pro's with Cisco VPN? I cannot get the software to work, I get an error 51 "unable to connect to VPN subsystem" at every launch. I've ininstalled and reinstalled the cisco software, I'm using the latest VPN 4.9. I've got a 2.3 macbook pro sitting right next to it, and it runs the cisco software fine. Something with the Santa Rosa set? Any help would be greatly appreciated. I have no other network issues. All the software is up to date, system, cisco, etc. Thanks...

    Fixed my own problem, appears it's Parallels related, after I reinstalled the new parallels 3.0, cisco started working fine. Whew....;-) Hope this helps others.

  • AD Machine Authentication with Cisco ISE problem

    Hi Experts,
    I am new with ISE, I have configured ISE & Domain computers for PEAP authentication. initially machine gets authenticated and then starts going MAB.
    Authentication policy:
    Allowed protocol = PEAP & TLS
    Authorization Policy:
    Condition for computer to be checked in external identity store (AD) = Permit access
    Condition for users to be checked in external identity store (AD) plus WasMachineAuthenticated = permit access
    All of the above policies do match and download the ACL from ISE but computer starts to mab authentication again...
    Switchport configuration:
    ===============================================
    ip access-list extended ACL-DEFAULT
    remark Allow DHCP
    permit udp any eq bootpc any eq bootps
    remark Allow DNS
    permit udp any any eq domain
    permit ip any host (AD)
    permit icmp any any
    permit ip any host (ISE-1)
    permit ip any host  (ISE-2)
    permit udp any host (CUCM-1) eq tftp
    permit udp any host (CUCM-2)eq tftp
    deny ip any any
    ===============================================
    switchport config
    ===============================================
    Switchport Access vlan 10
    switchport mode access
    switchport voice vlan 20
    ip access-group ACL-DEFAULT in
    authentication open
    authentication event fail action next-method
    authentication event server dead action authorize vlan 1
    authentication event server alive action reinitialize
    authentication host-mode multi-domain
    authentication order dot1x mab
    authentication priority dot1x mab
    authentication port-control auto
    authentication periodic
    authentication timer reauthenticate server
    authentication timer inactivity 180
    authentication violation restrict
    mab
    dot1x pae authenticator
    dot1x timeout tx-period 100
    ====================================================
    One more problem about the "authentication open" and default ACL. Once the authentication succeeds and per user is ACL pushed though ISE to the switch. The default ACL still blocks communication on this switchprort.
    Your help will highly appreciated.
    Regards,

    You need to watch the switch during an authentication, see if the machine is passing authentication and the user may be failing authentication causing the switch to fail to mab.  If your switch configuration is on auth failure continue to next method, then this makes sense.  The question is why is the user failing auth but the machine is passing, could be something in the policy.  Make sure your AD setup has machine authentciation checked or it may not tie the machine and user auth together and the user may be failing because ISE can't make that relationship so the machinewasauth=true is not beeing matched.  Easy way to check is remove that rule from your policy and see if the same thing happens.
    I've also seen this happen when clients want to use EAP-TLS on the wired, machines passes auth, then the user logs into a machine for the first time.  The user auth kicks off before the user gets a cert and fails auth with a null certificate, since this is a auth failure the switchport kicks over to MAB.
    I don't think wasmachineauth=true is that great, I prefer to use EAP-FASTv2 using Cisco Anyconnect NAM with eap-chaining.  This is great because you can do two part authentication.  EAP-FAST outer with EAP-TLS inner for the machine auth, and MSCHAPv2 for the inner of the user auth. You get your EAP-TLS auth for the machine and don't have to worry about a user logging into a machine for the first time and switching to MAB because the user doesn't have a cert yet.  I also do my rule to say if machine pass and user fail, then workstaion policy, if machine and user pass then corp policy.

  • Cisco VMS exclusion

    Hi
    When I run the "Startup/Running Out of sync" report, all my device are out of sync. I went in my router in CLI and I found that some lines of my code are not written the same way in my running-config that in my startup-config. This is why VMS determine that all my router are out of sync.
    Is it possible to exclude code of my router in the VMS configuration database ?
    Thank you very much

    Thank you very much, this is what I was looking for and it works properly.
    But the problem is that my line code are related with crypto Global section.
    Here's the lines that are not the same in my running that in my startup :
    ***Running***
    crypto pki certificate chain [truspoint name]
    certificate [certificate ID]
    3DAC8C03 F89B2EEB 35D622D0 1DCC8C53
    F89F2ECB 35D797D0 1DC09C03 F89F2FFB
    35D197B0 ...
    ***Startup***
    crypto pki certificate chain [truspoint name]
    certificate [certificate ID] nvram:[truspoint name]#[ID].cer
    Each of my spokes have a different certificate so if I want to exclude some line code, I must do it for each certificate :(.
    Can I exclude a section of RME database
    ex.: "Crypto-Crypto Global"
    Thank you very much for your help

  • VMS Problem

    Hi Dear,
    I have my Nokia N72. I installed the VMS software in my mobile. But this is not woring well and is not uninstalling the software in the mobile. My mobile # is not working. Please tell me about this software and trick the uninstalling. Thanks

    Have you changed the hostname recently. Check the information at http://www.cisco.com/en/US/docs/net_mgmt/ciscoworks_common_services_software/3.0/user/guide/diagnos.html#wp1078582 for more information.

  • Cisco VMS Black Screen

    VMS displays a black screen after connecting to our IP cameras. I can see the cameras when we browse directly to their IP address, Cameras and VMS software on the same subnet, VMS is running on a Microsoft Hyper V, 2.5 gig processor, 1 GB RAM, 120 GB hard drive. Any assistance would be appreciated.
    Thanks.

    Hello,
    According to the Admin Guide, the minimum specs are:
    Dedicated display adaptor with 512 MB internal memory required. ATI
    Radeon 4650, nVIDIA GeForce GF-9600, or above (ATI
    recommended)
    http://www.cisco.com/en/US/docs/security/csbvsc/swvms16/administration/guide/sw_vms16.pdf
    We frequently see issues with Windows Server as well as VMs, as they usually do not have a large amount of video resources.

  • Cisco 1310 problem

    First, i want to apologize for my English.
    I have a wireless network, which connects areas isolated by the sea.
    One of the repeaters have connection problems.
    There is a picture that illustrates my problem.
    The repeater in red, was installed recently. Because of the distances are added to each output TNC an amplifier of 1 watt.
    The problem arises when the bridge that connects to the repeater, it begins to traffic on the network.
    The repeater is disconnected, leaving the bridge and repeater offline.
    We believe that the problem is caused by the fact that this link is at 12 meters above sea level. And we think that we could solve that problem by adding two amplifiers to the Master AP.
    Any suggestion.

    You did not include the config files for the 1310's, did you set the distsnce prameter for the radio on the root bridge. for longer distances the AP needs to adjust the time out values.
    http://cisco.com/en/US/docs/wireless/access_point/12.3_8_JA/command/reference/cr38main.html#wp2481270
    Hope this helps.
    Bill

  • Cisco 3550 Problem

    I have a number of C3550 switches in the field and one of them seems to have a problem showing Interface statistics on some fast Ethernet ports.
    Most ports are running at 100Meg Full-duplex, but some fail to show any "5 minute rate" stats when I do a show interface command. You can only determine the data rate throughput by doing succesive show int commands at set time intervals and counting the difeerence in the total packets received/transmitted sections.
    Has anyone seen this elsewhere? Is this a known problem as I can't see any reference to this as a problem on TAC
    The IOS version is 12.1(13)EA1a

    There was a known issue for interfaces with low rate of pps(<40 pps) because of the way the counter is implemented. Look at the following bug which is in a Closed state(not resolved)
    http://www.cisco.com/cgi-bin/bugtool/onebug.pl?bugid=CSCdz06305
    Change the load-interval to 30 seconds and see if this makes any difference.

Maybe you are looking for