Cisco Cisco IOS Software Release 12.4(4)T Notas de publicación
![Cisco](https://files.manualsbrain.com/attachments/7380d0050044647c30f5c24bbbf5d0c0b6d9bb84/common/fit/150/50/faa183d287233c52228cfea3dbc2a127fe780f60564fcb0955d9c3d1cd23/brand_logo.png)
979
Caveats for Cisco IOS Release 12.4T
OL-8003-09 Rev. Z0
Resolved Caveats—Cisco IOS Release 12.4(15)T1
Conditions: The router must be configured for WCCP redirection using the hash assignment method.
When there is only a single appliance in the service group, the loss of hash assignment details is
permanent. However with multiple appliances in the group, the loss of assignment information is
transitory; the router soon recovers.
When there is only a single appliance in the service group, the loss of hash assignment details is
permanent. However with multiple appliances in the group, the loss of assignment information is
transitory; the router soon recovers.
Workaround: To recover the assignment details, the WCCP configuration needs to be removed and
readded to the router. Use the no ip wccp service command followed by ip wccp service args
command.
readded to the router. Use the no ip wccp service command followed by ip wccp service args
command.
Further Problem Description: The changes also address the situation where some WCCP clients are
sending modified weight field in the WCCP message, and this way creates a topology change
situation.
sending modified weight field in the WCCP message, and this way creates a topology change
situation.
Resolved Caveats—Cisco IOS Release 12.4(15)T1
Cisco IOS Release 12.4(15)T1 is a rebuild release for Cisco IOS Release 12.4(15)T. The caveats in this
section are resolved in Cisco IOS Release 12.4(15)T1 but may be open in previous Cisco IOS releases.
section are resolved in Cisco IOS Release 12.4(15)T1 but may be open in previous Cisco IOS releases.
The following information is provided for each caveat:
•
Symptoms—A description of what is observed when the caveat occurs.
•
Conditions—The conditions under which the caveat has been known to occur.
•
Workaround—Solutions, if available, to counteract the caveat.
Basic System Services
•
CSCek78644
Symptoms: SNMP does not use the source address in a VRF.
Conditions: This symptom is observed on a Cisco router that runs Cisco IOS Release 12.4 or
Release 12.4T.
Release 12.4T.
Workaround: Ensure that an SNMP interface is not defined in a VRF.
•
CSCsi60004
Multiple voice-related vulnerabilities are identified in Cisco IOS software, one of which is also
shared with Cisco Unified Communications Manager. These vulnerabilities pertain to the following
protocols or features:
shared with Cisco Unified Communications Manager. These vulnerabilities pertain to the following
protocols or features:
–
Session Initiation Protocol (SIP)
–
Media Gateway Control Protocol (MGCP)
–
Signaling protocols H.323, H.254
–
Real-time Transport Protocol (RTP)
–
Facsimile reception
Cisco has made free software available to address these vulnerabilities for affected customers. Fixed
Cisco IOS software listed in the Software Versions and Fixes section contains fixes for all
vulnerabilities mentioned in this advisory.
Cisco IOS software listed in the Software Versions and Fixes section contains fixes for all
vulnerabilities mentioned in this advisory.
There are no workarounds available to mitigate the effects of any of the vulnerabilities apart from
disabling the protocol or feature itself.
disabling the protocol or feature itself.