Cisco Cisco NetFlow Generation Appliance (NGA) 3140 Release Notes

Page of 24
8
Release Notes for the Cisco NetFlow Generation Appliance
  Cisco NGA Bugs
Cisco NGA Bugs
This section provides the following information:
To obtain more information about known problems, access the Cisco Software Bug Toolkit at the 
following URL:
 
Resolved Bugs
 provides a list of resolved bugs in Cisco NGA Software Release 1.1 (1). 
1
Configure traffic to Cisco NGA using SPAN or a passive network tap. A flow monitor can be 
configured to listen to up to four data ports. For details on how to configure SPAN or a tap device, 
see your device documentation.
2
Configure one or more flow monitors to export multiple export formats. 
 depicts v5 and 
IPFIX exporters. Each exporter can work independently using different traffic input based on the 
requirements of your management application.
3
Configure multiple flow export filters to funnel application traffic based on specific management 
applications. For details on configuring the Advanced Setup flow filters, see the 
4
Given that filtering has been configured at the flow exporter, no extra filtering is required at the 
flow collector. 
5
Use your NetFlow collectors to produce reports, graphs, and analysis of the data.
Table 1
Resolved Bugs in Cisco NGA 1.1 (1)
Identifier
Description
CSCut19060 
In Cisco NGA 1.1, if any flow received at the NGA data ports include IP 
fragments, the NetFlow records exported by the NGA contain an incorrect value 
of 255 in the IP Protocol field.
CSCut45937
Cisco NGA evaluates OpenSSL vulnerabilities.
CSCut77454
Cisco NGA evaluates NTPd vulnerabilities.
CSCut80974 
Cisco NGA reports incorrect IP Protocol field while exporting flow records for 
Encapsulating Security Payload (ESP) packets.
CSCuu47537
In Cisco NGA 1.1, CLI must not timeout in non-interactive mode.