Cisco Cisco IOS Software Release 12.0 S
2321
Cross-Platform Release Notes for Cisco IOS Release 12.0S
OL-1617-14 Rev. Q0
Resolved Caveats—Cisco IOS Release 12.0(15)S7
•
CSCdt51427
When a 3-Port Gigabit Ethernet line card on a Cisco 12000 series Internet router is configured for
Hot Standby Router Protocol (HSRP) and the Internet router takes over as the active router, the
HSRP address may not be pingable but the interface address will be pingable.
Hot Standby Router Protocol (HSRP) and the Internet router takes over as the active router, the
HSRP address may not be pingable but the interface address will be pingable.
Workaround: Enter the standby group-number use bia command.
•
CSCdt51864
OC-192 Packet-over-SONET (POS) and Quad OC-48 POS line cards can only support 200,000
Border Gateway Protocol (BGP) routes, 4,000 Interior Gateway Protocol (IGP) routes (such as
Intermediate System-to-Intermediate System [IS-IS]), and a maximum of 2,000 adjacencies. There
is no workaround.
Border Gateway Protocol (BGP) routes, 4,000 Interior Gateway Protocol (IGP) routes (such as
Intermediate System-to-Intermediate System [IS-IS]), and a maximum of 2,000 adjacencies. There
is no workaround.
•
CSCdt52678
If two routers are connected back-to-back with one router running Distributed Multilink PPP
(DML-PPP) and the other running Multilink PPP (distributed switching off), the VIP on the router
running DML-PPP may reload if fragmentation is enabled on the router running Multilink PPP.
(DML-PPP) and the other running Multilink PPP (distributed switching off), the VIP on the router
running DML-PPP may reload if fragmentation is enabled on the router running Multilink PPP.
Workaround: Disable fragmentation on the far-end router.
•
CSCdt61400
Configuring an OC-192 or Quad OC-48 line card with the following configuration may cause the
line card to reload when high rates of traffic are sent to the egress port if the precedence 4
random-detect-label 4 entry is not included:
line card to reload when high rates of traffic are sent to the egress port if the precedence 4
random-detect-label 4 entry is not included:
cos-queue-group traff4
precedence 4 queue 4
precedence 4 random-detect-label 4
traffic-shape queue 4 250000 84792
There is no workaround.
•
CSCdt70225
When OC-192 or Quad OC-48 line cards are connected back-to-back, Frame Relay subinterface
encapsulation does not function properly with Intermediate System-to-Intermediate System (IS-IS).
IS-IS cannot exchange routes across the link. This situation does not occur with OSPF. There is no
workaround.
encapsulation does not function properly with Intermediate System-to-Intermediate System (IS-IS).
IS-IS cannot exchange routes across the link. This situation does not occur with OSPF. There is no
workaround.
•
CSCdt71647
Applying Modified Deficit Round Robin (MDRR) on one port disrupts ORS on all the other ports
of a Quad OC-48 line card. There is no workaround.
of a Quad OC-48 line card. There is no workaround.
Resolved Caveats—Cisco IOS Release 12.0(15)S7
Cisco IOS Release 12.0(15)S7 is a rebuild of Cisco IOS Release 12.0(15)S. All the caveats listed in this
section are resolved in Cisco IOS Release 12.0(15)S7. This section describes only severity 1 and 2
caveats.
section are resolved in Cisco IOS Release 12.0(15)S7. This section describes only severity 1 and 2
caveats.
•
CSCea02355
Cisco routers and switches running Cisco IOS software and configured to process Internet Protocol
version 4 (IPv4) packets are vulnerable to a Denial of Service (DoS) attack. A rare sequence of
crafted IPv4 packets sent directly to the device may cause the input interface to stop processing
traffic once the input queue is full. No authentication is required to process the inbound packet.
Processing of IPv4 packets is enabled by default. Devices running only IP version 6 (IPv6) are not
affected. A workaround is available.
version 4 (IPv4) packets are vulnerable to a Denial of Service (DoS) attack. A rare sequence of
crafted IPv4 packets sent directly to the device may cause the input interface to stop processing
traffic once the input queue is full. No authentication is required to process the inbound packet.
Processing of IPv4 packets is enabled by default. Devices running only IP version 6 (IPv6) are not
affected. A workaround is available.