Cisco Cisco IOS Software Release 12.2(33)SRE
451
Caveats for Cisco IOS Release 12.2(33)SRD through 12.2(33)SRD8
OL-10394-05 Rev. R0
•
CSCts51980
Symptoms: STM1-SMI PAs of version 3.0 do not come up.
Conditions: This symptom is observed when the new version of PAs do not come up with enhanced
flexwan.
flexwan.
Workaround: There is no workaround. Without the PA, flexwan will come up.
Resolved Caveats—Cisco IOS Release 12.2(33)SRD6
Cisco IOS Release 12.2(33)SRD6 is a rebuild release for Cisco IOS Release 12.2(33)SRD. The caveats
in this section are resolved in Cisco IOS Release 12.2(33)SRD6 but may be open in previous Cisco IOS
releases.
in this section are resolved in Cisco IOS Release 12.2(33)SRD6 but may be open in previous Cisco IOS
releases.
•
CSCta77064
Symptoms: Crashinfo file is not generated.
Conditions: This symptom occurs when SIP600/ES20 line cards crash.
Workaround: There is no workaround.
•
CSCtc84960
Symptoms: Traffic is not forwarded in LSM P2MP setup. This problem is seen after the router is
booted up.
booted up.
Conditions: The problem is seen in LSM P2MP on a HA setup.
Workaround:
1.
The problem can be prevented by configuring tunnel mpls traffic-eng fast-reroute on the
P2MP tunnel interface.
P2MP tunnel interface.
2.
Use non HA setup.
3.
Reset the ingress line card.
4.
Program the fpoe table by using “test fpoe index index value value” or “test fpoe index index
restore”.
restore”.
Further Problem Description: P2MP tunnels do not forward the traffic on head end after the reload
because the FPOE is programmed incorrectly. Here we see the traffic hitting the tunnel interface but
not the outgoing physical interface. FPOE is not getting populated due to empty port lists.
because the FPOE is programmed incorrectly. Here we see the traffic hitting the tunnel interface but
not the outgoing physical interface. FPOE is not getting populated due to empty port lists.
•
CSCtd10712
The Cisco IOS Software network address translation (NAT) feature contains multiple denial of
service (DoS) vulnerabilities in the translation of the following protocols:
service (DoS) vulnerabilities in the translation of the following protocols:
–
NetMeeting Directory (Lightweight Directory Access Protocol, LDAP)
–
Session Initiation Protocol (Multiple vulnerabilities)
–
H.323 protocol
All the vulnerabilities described in this document are caused by packets in transit on the affected
devices when those packets require application layer translation.
devices when those packets require application layer translation.
Cisco has released free software updates that address these vulnerabilities.
This advisory is posted at
.