Cisco Cisco IOS Software Release 12.2

Page de 292
27
Caveats for Cisco IOS Release 12.2
OL-3513-16 Rev. G0
  Resolved Caveats—Cisco IOS Release 12.2(32)
Interfaces and Bridging
CSCin67809
Symptoms: CEF, dCEF, and fast-switching counters are not accurate on outbound serial E1 or T1 
interfaces.
Conditions: This symptom is observed on a Cisco 7200 series when CEF, dCEF, and fast-switching 
are enabled on a serial E1 or T1 interface.
Workaround: There is no workaround. 
Miscellaneous
CSCee20451
Symptoms: A VC may experience an output stuck condition.
Conditions: This symptom occurs when using T1 ATM (the IMA function is not used) on a 
PA-A3-8T1IMA. 
Workaround: Perform the clear interface command.
CSCeh78918
Symptoms: When a line card has reloaded because you reloaded the router, the line card crashed, or 
you entered a command to reload the line card, the following message may appear on the console:
%MDS-2-RP: MDFS is disabled on some line card(s). Use “show ip mds stats linecard” to 
view status and “clear ip mds linecard” to reset.
This message may be generated because MDFS is erroneously disabled on the reloaded line card. 
Erroneous disabling of MDFS may unnecessarily extend network convergence time.
Conditions: This symptom is observed on a distributed router or switch such as a 
Cisco Catalyst 6000 series, Cisco 7500 series, Cisco 7600 series, Cisco 10000 series, and 
Cisco 12000 series. The symptom occurs when the router has the ip multicast-routing distributed 
command enabled for any VRF and when a line card is reloaded more than 50 seconds into the 
60-second MDFS flow-control period.
Workaround: The symptom corrects itself after 60 seconds. Alternatively, you can enter the clear ip 
mds linecard
 slot number command.
CSCsb11124
The Cisco IOS Stack Group Bidding Protocol (SGBP) feature in certain versions of Cisco IOS 
software is vulnerable to a remotely-exploitable denial of service condition. Devices that do not 
support or have not enabled the SGBP protocol are not affected by this vulnerability. 
Cisco has made free software available to address this vulnerability for affected customers. There 
are workarounds available to mitigate the effects of the vulnerability. 
Cisco has published a Security Advisory on this issue; it is available at 
CSCsb18502
Symptoms: Data that is forwarded downstream from a SNASw router is intermittently corrupted. 
Sniffer traces that are captured upstream and downstream from the SNASw router show that the data 
that is sent from the host to the SNASw router is fine, but when the data leaves the SNASw router, 
there are some corrupted bytes at the end of the data stream.