Cisco Cisco IOS Software Release 12.4(4)T

Page de 314
1342
Caveats for Cisco IOS Release 12.4T
OL-8003-09 Rev. Z0
  Resolved Caveats—Cisco IOS Release 12.4(4)T1
show memory debug leaks 
show memory debug leaks chunks 
show memory debug leaks largest 
show memory debug leaks summary
Conditions: This symptom has been observed on the RPM-XF cards using Cisco IOS interim 
Release 12.4(4.6).
Workaround: There is no workaround. 
CSCsc12570
Symptoms: The codec upspeed (i.e., G729 to G711ulaw) or downspeed (i.e., G711ulaw to G729) 
does not happen. Other packet stream-related call parameter changes, such as VAD and PLAYOUT, 
do not happen as expected.
Conditions: This symptom has been observed when the codec type or other packet stream 
parameters are modified using MDCX or through the TDM side of the call module like VTSP.
Workaround: There is no workaround. 
CSCsc13844
Symptoms: After loading "flash:c2600-entservicesk9-mz.123-11.T7.bin", the E1 controller is 
missing from the snmpwalk command of IF-MIB.
Conditions: This symptom has been observed on a Cisco2621XM.
Workaround: There is no workaround. 
CSCsc13998
Symptoms: When receiving an incoming call, if an FXS port goes offhook and quickly (within 
500ms) goes back onhook, the port stays in the busy state - not able to accept incoming/outgoing 
calls though the phone is onhook.
Conditions: This behavior is observed on all analog FXS ports on Cisco 1700, Cisco 1800, 
Cisco 2400, Cisco 2600, Cisco 2800, Cisco 3600, Cisco 3700, and Cisco 3800 platforms. This 
defect will not occur in any FXO port.
Workaround:
1. The port can be taken out of the busy state and back to normal idle and operational state by doing 
an offhook follow by an onhook. 
2. Enter the shutdown and no shutdown commands and the FXS port will return to normal. 
CSCsc43461
Symptoms: A Cisco IOS router configured for IP Security (IPSec) may drop every other packet if 
the crypto interface has an input Access Control List (ACL) that does not explicitly permit traffic 
for the inner data packets, i.e., what is encapsulated inside of IPSec.
Conditions: This symptom has been observed on a Cisco IOS router running Cisco IOS interim 
Release 12.4(3.9)T7 or newer configured for IPSec and the crypto interface has an input ACL that 
does not explicitly permit traffic for the inner data packets.
Workaround: Do not configure the IPSec and explicitly allow inner data packets to be encapsulated 
by IPSec. 
CSCsc54426
Symptoms: Traffic from the inside subnet does not pass.