Cisco Cisco ASA 5505 Adaptive Security Appliance

Seite von 24
23
Cisco ASA 5580 Series Release Notes Version 8.1(2)
OL-15086-02
  Caveats
CSCsr69563
Traceback if policies are modified while traffic is being processed
CSCsr71069
ASA - OSPF over IPSEC over PPPoe connection not working correctly
CSCsr73107
Pix traceback fover_parse page fault in route processing
CSCsr74439
PIX/ASA: Certain malformed NAT-T packets may cause IKE process to hang
CSCsr75077
Fallback case fails when OCSP revocation check configured
CSCsr75653
'set connection decrement-ttl' does not work
CSCsr81712
Memory leak with inspection IM enabled
CSCsr84998
SSL VPN:  CSD tokens not cleaned up correctly
CSCsr91721
FOVER: Error trying to delete acl when used as a network-acl in DAP
CSCsr94152
ASA 5580 traceback due to vpn encryption
CSCsr98211
Smart tunnel connections remain active indefinitely after user's session
CSCsu00776
ASA 5580 traceback due to vpn encryption
CSCsu01332
PIX 6.x to 7.x upgrade removes nonegotiate from interface
CSCsu02317
ASA strips domain in RADIUS accounting packet
CSCsu02718
snmp get-next-request incorrect value IP-MIB::ipAdEntAddr from standby
CSCsu04547
Radius Challenge Message include <tag> make anyconnect fail
CSCsu06543
Proxy auth when in RSA Next-Token-Mode fails 50% of the redirection
CSCsu08061
ASA:RRI:Routes incorrectly deleted when split-tunneling enabled
CSCsu11361
Phone quickly re-registering with new IP requires additional license
CSCsu12382
"Some TLS packets may cause incorrect DMA mappings, leading to traceaback"
CSCsu21846
smart tunnel fail behind proxy server
CSCsu23121
"Cannot access CIFS shares based on ""name"" commands"
CSCsu26649
Large packets dropped with ip-comp enable configured
CSCsu29376
ASA 5580-20 traceback occurs when running multicast.
CSCsu37362
http inspection shouldn't reset for protocol-violation if not configured
CSCsu38292
interface Virtual254 appears in show interface output
CSCsu38385
Debug webvpn javascript trace user not disabled by undebug all
CSCsu40015
management-only cmd not  synced. when m0/0 configured for failover
CSCsu41224
Crash in Thread Name: CMGR Server Process
CSCsu43121
Traceback: Long IKE attributes can cause buffer overrun
CSCsu46588
Heuristic based scanners report smart tunnel as malware
CSCsu50074
Traceback in Thread Name: IPsec message handler
CSCsu52268
SSH won't work to interface with ip address assigned via DHCP
CSCsu55368
Traceback caused by assert in snp_loopback_ifc.c
CSCsu55642
redundant interface switchover in transparent mode not stable
CSCsu63272
"reload after issuing show crypto ipsec sa, related to anti-replay"
Table 4
Resolved Caveats in Version 8.1(2) (continued)
Caveat ID
Description