Cisco Cisco IOS Software Release 12.2(33)SRE

Page de 398
451
Caveats for Cisco IOS Release 12.2(33)SRD through 12.2(33)SRD8
OL-10394-05 Rev. R0
CSCts51980
Symptoms: STM1-SMI PAs of version 3.0 do not come up.
Conditions: This symptom is observed when the new version of PAs do not come up with enhanced 
flexwan.
Workaround: There is no workaround. Without the PA, flexwan will come up.
Resolved Caveats—Cisco IOS Release 12.2(33)SRD6
Cisco IOS Release 12.2(33)SRD6 is a rebuild release for Cisco IOS Release 12.2(33)SRD. The caveats 
in this section are resolved in Cisco IOS Release 12.2(33)SRD6 but may be open in previous Cisco IOS 
releases.
CSCta77064
Symptoms: Crashinfo file is not generated.
Conditions: This symptom occurs when SIP600/ES20 line cards crash.
Workaround: There is no workaround. 
CSCtc84960
Symptoms: Traffic is not forwarded in LSM P2MP setup. This problem is seen after the router is 
booted up.
Conditions: The problem is seen in LSM P2MP on a HA setup.
Workaround: 
1.
The problem can be prevented by configuring tunnel mpls traffic-eng fast-reroute on the 
P2MP tunnel interface. 
2.
Use non HA setup. 
3.
Reset the ingress line card. 
4.
Program the fpoe table by using “test fpoe index index value value” or “test fpoe index index 
restore”.
Further Problem Description: P2MP tunnels do not forward the traffic on head end after the reload 
because the FPOE is programmed incorrectly. Here we see the traffic hitting the tunnel interface but 
not the outgoing physical interface. FPOE is not getting populated due to empty port lists. 
CSCtd10712
The Cisco IOS Software network address translation (NAT) feature contains multiple denial of 
service (DoS) vulnerabilities in the translation of the following protocols:
NetMeeting Directory (Lightweight Directory Access Protocol, LDAP)
Session Initiation Protocol (Multiple vulnerabilities)
H.323 protocol
All the vulnerabilities described in this document are caused by packets in transit on the affected 
devices when those packets require application layer translation.
Cisco has released free software updates that address these vulnerabilities.
This advisory is posted at
.