Cisco Cisco IPS 4255 Sensor

Seite von 40
   
39
Release Notes for Cisco Intrusion Prevention System 6.0(1)E1
OL-8827-01
    Caveats
Caveats
This section describes the Bug Toolkit, lists the known caveats, and contains the following topics:
Bug Toolkit
For the most complete and up-to-date list of caveats, use the Bug Toolkit to refer to the caveat release 
note. You can use the Bug Toolkit to search for known bugs based on software version, feature set, and 
keywords. The resulting matrix shows when each bug was integrated, or fixed if applicable. It also lets 
you save the results of a search in Bug Groups, and also create persistent Alert Agents that can feed those 
groups with new defect alerts. 
Note
You must be logged in to Cisco.com to access the Bug Toolkit.
If you are a registered Cisco.com user, you can view the Bug Toolkit at this URL:
To become a registered cisco.com user, go to this URL:
Unresolved Issues
The following known issues are found in Cisco IPS 6.0(1)E1: 
CSCsd19619—NO statistics on traffic under back off
CSCse40651—when virtual size near its memory cap, CT processing can cause deadlock
CSCse58463—TCP SYN Flood Protection SYN/ACK response packet is malformed in Tunnels
CSCse68062—show event reports out of subscriptions
CSCsg09619—IPS sensor is vulnerable to CVE-2006-4339
CSCsg21826—CISCO-CIDS-MIB v3.5 does not have denyPacket and blockHost defined
CSCsg24632—String.TCP sigs may fire out of order
CSCsg33061—5.sensorApp processing fault in inspector state-string
CSCsg38169—IPS SNMP interface reports incorrect sensing interface stats
CSCsg45642—IPS - Sensor drops CDP when configured Inline
CSCsg95895—sensor host-ip netmask issue
CSCsg96871—AnalysisEngine InspectorServiceAICWeb::ToServiceInspect abort
CSCsh05729—IDM generating CTs causing CF or HDD access every 4-10 secs
CSCsh12731—1316 sig false alarming and slowing performance