Cisco Cisco IPS 4255 Sensor 릴리즈 노트

다운로드
페이지 38
   
36
Release Notes for Cisco Intrusion Prevention System 6.0(4)E2
OL-20146-01
  Caveats
Known Caveats
The following known issues are found in Cisco IPS 6.0(4)E2:
CSCsk30811Unnecessary webserver error logging causes hard drive failure
CSCsm71528——sensorApp failure in InspectorServiceRpc after reconfig
CSCsm60273—AIP-SSM stays in Unresponsive state after ASA5500's bootup
CSCsj78809—IPS 6.0(3) SigProcessor failure with reinjected frag
CSCsj21080—Promiscuous 4255 in s/w bypass and no response from show stat vi
CSCsi42747—Memory leak in mainApp when checking license status
CSCsg09619—IPS accepts RSA keys with exponent 3 which are vulnerable to forgery
CSCsi43787—Memory leak in mainApp when log event initiated remotely
CSCsg96871—AnalysisEngine InspectorServiceAICWeb::ToServiceInspect abort
CSCsh50760—NAC causes high mainApp usage
CSCsk53813—upgrade log files are not preserved during an upgrade
CSCsj82458—global-block-timeout allows values outside supported range
CSCsd19619—NO statistics on traffic under heavy load
CSCse40651—Config operation on heavily loaded system may cause unresponsive system
CSCsm50539—MainApp fails to load
CSCsi88201—Error message too cryptic for events with bad XML
CSCsl08842—Under high loss conditions in promiscuous mode memory can be exhausted
CSCsm24466—XL interface pkt drops from jumbo frames
CSCsi51727—Error while copying AD files to a destination URL.
CSCsh89833—Delete event variable referenced by filter or sig from IDM
CSCsi56908—kernel change to 2.6 will create bug related to jiffies in the drivers
CSCsm46158—Critical memory condition can cause race condition
CSCsm46218—Non allocating logging method needed
CSCsj15446—MainApp - core on invalid platform test
CSCsi73502—6.0(2)E1: No warning message when removing sensor used by ASA
CSCsm42382—Link drops temporarily on hardware-bypass ports during cids shutdown
CSCsl24036—AnalysisEngine failure in MSRPC_TCP Inspector ProcessPacket
CSCsl75224—cli command no mars-category causes sensor connection closed
CSCsk44582—Sig upgrade within grace period fails prior to reboot
CSCsk09025—idsm2 interface Operational Mode: down after reload from switch
CSCsj75538—Auto Update - not pulling platform specific patch
CSCsj57474—Some sweep and atomic-ip sigs false neg with dot1q headers
CSCsi39496—IDCONF changes encrypted values of unchanged data
CSCsi10476—cidsAlertProtocol missing from SNMP Traps
CSCsj15835—SensorApp - PAWS alerts with telnet through 2 vs