Cisco Cisco ONS 15454 SDH Multiservice Provisioning Platform (MSPP) Notas de publicación
![Cisco](https://files.manualsbrain.com/attachments/7380d0050044647c30f5c24bbbf5d0c0b6d9bb84/common/fit/150/50/faa183d287233c52228cfea3dbc2a127fe780f60564fcb0955d9c3d1cd23/brand_logo.png)
10
Release Notes for Cisco ONS 15454 SDH Release 8.5.3
OL-17924-01
Caveats
CSCdy57891—LOP-P alarm is inadvertently cleared
An LOP-P alarm can be inadvertently cleared by an LOS that is raised and cleared. On older STM-N
cards, when an LOP condition and an LOS condition are both present on the input, an LOS will be raised.
However, upon clearing the LOS with the LOP still present, the LOP alarm is not raised. An AIS-P
condition will be visible. This issue will be resolved in a future release.
cards, when an LOP condition and an LOS condition are both present on the input, an LOS will be raised.
However, upon clearing the LOS with the LOP still present, the LOP alarm is not raised. An AIS-P
condition will be visible. This issue will be resolved in a future release.
CSCsb88234—No plug-in message when a filler card is plugged in without prior provisioning
When a card is provisioned and a filler card is plugged in, a DBCHG with ENT-EQPT alarm is raised,
but when a filler card is plugged in without a prior provision there is no plug-in message. Similarly, there
is no message upon removal of the filler card. The workaround for TL1 is to issue an inventory call and
the filler card appears. For CTC, the card is displayed and removed when the card is removed. This issue
will be resolved in a future release.
but when a filler card is plugged in without a prior provision there is no plug-in message. Similarly, there
is no message upon removal of the filler card. The workaround for TL1 is to issue an inventory call and
the filler card appears. For CTC, the card is displayed and removed when the card is removed. This issue
will be resolved in a future release.
CSCse85652—HTTP access allowed if enable password is not configured
The Cisco IOS HTTP server and the Cisco IOS HTTPS server allow HTTP access without any
authentication under the following conditions:
authentication under the following conditions:
•
An enable password is not present in the device configuration.
•
Either the Cisco IOS HTTP server or the Cisco IOS HTTPS server is enabled.
•
No other authentication mechanism has been configured for access to the Cisco IOS HTTP server
or Cisco IOS HTTPS server. The following workarounds apply:
or Cisco IOS HTTPS server. The following workarounds apply:
–
Enabling authentication of requests to the Cisco IOS HTTP server or the Cisco IOS HTTPS
server by configuring an enable password
server by configuring an enable password
–
Enabling authentication of requests to the Cisco IOS HTTP server or the Cisco IOS HTTPS
server by configuring an authentication mechanism other than the default
server by configuring an authentication mechanism other than the default
–
Disabling the Cisco IOS HTTP server and/or the Cisco IOS HTTPS server functionality
This issue will be resolved in a future release.
CSCsg32263—DBCHG message is not displayed when creating and deleting a proxy firewall tunnel
When DBCHG messages are turned on by using the ALW-MSG-ALL command, no DBCHG message
is returned when a proxy firewall tunnel is created and then deleted. This issue will be resolved in a
future release.
is returned when a proxy firewall tunnel is created and then deleted. This issue will be resolved in a
future release.
CSCsg42366—Traffic outage occurs when FPGA upgrade is done with manual switch on Y-cable
A traffic outage of 120 sec occurs when an FPGA upgrade is done with a manual switch on the Y-cable
and the client port is in out of service.
and the client port is in out of service.
To prevent traffic outages, follow the procedure for an FPGA upgrade:
1.
Configure the following:
–
Near-end (NE) node, 2 MXP-MR-10DME, Working and Protect, with the Working Active and
the Protect Stdby for each protection group supported on the client ports
the Protect Stdby for each protection group supported on the client ports
–
Far-end (FE) node, 2 MXP-MR-10DME, Working and Protect, with the Working Active and the
Protect Stdby for each protection group supported on the client ports
Protect Stdby for each protection group supported on the client ports