Cisco Cisco IOS Software Release 12.4(4)T Notas de publicación

Descargar
Página de 302
979
Caveats for Cisco IOS Release 12.4T
OL-8003-09 Rev. Z0
  Resolved Caveats—Cisco IOS Release 12.4(15)T1
Conditions: The router must be configured for WCCP redirection using the hash assignment method. 
When there is only a single appliance in the service group, the loss of hash assignment details is 
permanent. However with multiple appliances in the group, the loss of assignment information is 
transitory; the router soon recovers. 
Workaround: To recover the assignment details, the WCCP configuration needs to be removed and 
readded to the router. Use the no ip wccp service command followed by ip wccp service args 
command. 
Further Problem Description: The changes also address the situation where some WCCP clients are 
sending modified weight field in the WCCP message, and this way creates a topology change 
situation.
Resolved Caveats—Cisco IOS Release 12.4(15)T1
Cisco IOS Release 12.4(15)T1 is a rebuild release for Cisco IOS Release 12.4(15)T. The caveats in this 
section are resolved in Cisco IOS Release 12.4(15)T1 but may be open in previous Cisco IOS releases. 
The following information is provided for each caveat:
Symptoms—A description of what is observed when the caveat occurs.
Conditions—The conditions under which the caveat has been known to occur.
Workaround—Solutions, if available, to counteract the caveat.
Basic System Services
CSCek78644
Symptoms: SNMP does not use the source address in a VRF.
Conditions: This symptom is observed on a Cisco router that runs Cisco IOS Release 12.4 or 
Release 12.4T.
Workaround: Ensure that an SNMP interface is not defined in a VRF. 
CSCsi60004
Multiple voice-related vulnerabilities are identified in Cisco IOS software, one of which is also 
shared with Cisco Unified Communications Manager. These vulnerabilities pertain to the following 
protocols or features:
Session Initiation Protocol (SIP) 
Media Gateway Control Protocol (MGCP) 
Signaling protocols H.323, H.254 
Real-time Transport Protocol (RTP) 
Facsimile reception 
Cisco has made free software available to address these vulnerabilities for affected customers. Fixed 
Cisco IOS software listed in the Software Versions and Fixes section contains fixes for all 
vulnerabilities mentioned in this advisory.
There are no workarounds available to mitigate the effects of any of the vulnerabilities apart from 
disabling the protocol or feature itself.