Cisco Cisco IPS 4255 Sensor Notas de publicación

Descargar
Página de 42
   
39
Release Notes for Cisco Intrusion Prevention System 6.0(5)E2
OL-16987-01
  Caveats
Caveats
This section describes the Bug Toolkit, lists the resolved and known caveats, and contains the following 
topics:
Bug Toolkit
For the most complete and up-to-date list of caveats, use the Bug Toolkit to refer to the caveat release 
note. You can use the Bug Toolkit to search for known bugs based on software version, feature set, and 
keywords. The resulting matrix shows when each bug was integrated, or fixed if applicable. It also lets 
you save the results of a search in Bug Groups, and also create persistent Alert Agents that can feed those 
groups with new defect alerts. 
Note
You must be logged in to Cisco.com to access the Bug Toolkit.
If you are a registered Cisco.com user, you can view the Bug Toolkit at this URL:
To become a registered cisco.com user, go to this URL:
Resolved Caveats
The following known issues have been resolved in Cisco IPS 6.0(5)E2: 
CSCso64762—IPS Jumbo frame not processed properly
CSCsk30811—Misconfigured remote application can cause sensor HDD failure
CSCsm99137—cli error on login attempt to 4240
CSCso31217—encrypted passwords not decrypted after upgrade
CSCsk09025—idsm2 interface Operational Mode: down after reload from switch
CSCsk73092—IPS may report wrong Trigger Packet for signature 1225
CSCsl59863—modify signature edc to include Trend Virus Update version 1.4
CSCsm72321—AIP module get stuck in high cpu due to mainApp infinite loop
CSCso12700—AIM/NME should not support inline TCP session tracking mode
CSCso21050—Frequent error generation - SigEventList not empty
CSCso49304—IPS - Large KB Thresholds represented as negatives
CSCso56465—mainApp cplane error message needs actual error code
CSCso65593—6.0(4a) upgrade failure with virus version 1.4 has bad error message
CSCso96079—META alarms may have the wrong risk ratings