Cisco Cisco Content Security Management Appliance M680 Notas de publicación
10
Release Notes for AsyncOS 8.1.1 for Cisco Content Security Management
Known Issues
Known Issues
Note
•
Information about known issues in this release is available via the Bug Search Tool. See
.
•
Some issues may also have been present in previous releases. These issues are described in previous
release notes.
release notes.
•
Known issues in AsyncOS for Email and AsyncOS for Web that affect the Cisco Content Security
Management appliance may be documented under those product names in the Bug Search Tool or
in the release notes for those products.
Management appliance may be documented under those product names in the Bug Search Tool or
in the release notes for those products.
Current Information about Known and Fixed Issues
Use the Cisco Bug Search Tool to find the most current information about known and fixed defects.
37638
CSCzv11562
Fixed: Searches for UTF-8-encoded subjects are now supported in Message Tracking
For more information, see the New Features section.
84281
CSCzv18056
Fixed: Large Number of Content Filter Matches May Result in PDF Report Error
Fixed an issue a printable PDF report for content filters may contain the error message “one
of tables has too many columns” due to a large number of incoming or outgoing content filter
matches. Now, the PDF report prints out correctly.
of tables has too many columns” due to a large number of incoming or outgoing content filter
matches. Now, the PDF report prints out correctly.
—
CSCuf57558
Fixed: SNMP MIBs cannot be loaded into MIB browser
This issue applied only to MIBs downloaded from the appliance.
70279
87369
CSCzv56988
Fixed: SNMP trap issues
Various issues with the link status (linkUp, linkDown) SNMP trap
For example:
•
The snmp trap interface index incorrectly identified the interface
•
The link status sent from the appliance when the P1 or P2 port went up or down did not
include information about the event.
include information about the event.
Now, the use of the linkUp and linkDown traps have been deprecated.
Cisco recommends that you use the standardized traps in RFC-3418 instead.
49096
CSCzv18535
Fixed: (External RADIUS Authentication) System takes into account just the first
RADIUS Class attribute
RADIUS Class attribute
Users with multiple class attributes are now supported.
If a user is assigned multiple Class attributes that are mapped to custom user roles, the last
class attribute on the list in the RADIUS server will be used.
class attribute on the list in the RADIUS server will be used.
For details, see the user guide or online help.
Table 3
Resolved Issues in Release 8.1.0
Old Defect ID New Defect ID Description