Cisco Cisco IPS 4255 Sensor 릴리즈 노트
33
Release Notes for Cisco Intrusion Prevention System 5.1(8)E2
OL-20154-01
Caveats
For More Information
•
For the procedure for creating the service account, refer to
.
•
For the procedures for reimaging the sensor, refer to
Caveats
This section lists the resolved and known issues, and contains the following topics:
•
•
•
Bug Toolkit
For the most complete and up-to-date list of caveats, use the Bug Toolkit to refer to the caveat release
note. You can use the Bug Toolkit to search for known bugs based on software version, feature set, and
keywords. The resulting matrix shows when each bug was integrated, or fixed if applicable. It also lets
you save the results of a search in Bug Groups, and also create persistent Alert Agents that can feed those
groups with new defect alerts.
note. You can use the Bug Toolkit to search for known bugs based on software version, feature set, and
keywords. The resulting matrix shows when each bug was integrated, or fixed if applicable. It also lets
you save the results of a search in Bug Groups, and also create persistent Alert Agents that can feed those
groups with new defect alerts.
Note
You must be logged in to Cisco.com to access the Bug Toolkit.
If you are a registered Cisco.com user, you can view the Bug Toolkit at this URL:
To become a registered cisco.com user, go to this URL:
Resolved Caveats
The following known issues have been resolved in IPS 5.1(8)E2:
•
CSCso64762—IPS Jumbo frame not processed properly
•
CSCsl04892—sensorApp failure after show stat vi clear
•
CSCsl06936—inline-vlan-pair delays passing traffic after reboot
•
CSCsl30784—inline-vlan-pair and bypass off down/notconnect after sig update
•
CSCsm99137—cli error on login attempt to 4240
•
CSCsg28140—admin disable an interface does not produce link down event
•
CSCsg45642—Make CDP drop a configurable option.
•
CSCsk05475—Packet display or packet capture causes rx errors
•
CSCsk48762—risk rating miscalculated for low severity due to signed math
•
CSCsl59863—modify signature edc to include Trend Virus Update version 1.4