Примечания к выпуску для Cisco Cisco IOS XR Software Release 3.9
Release Notes for Cisco ASR 9000 Series Aggregation Services Routers for Cisco IOS XR Software Release 3.9.2
Caveats
IR-87
Cisco ASR 9000 Series Aggregation Services Router IP Addresses and Services Command
OL-23385-03
Serial0/6/1/1/6/1:0
Serial0/6/1/1/7/1:0
Serial0/6/1/1/8/1:0
Serial0/6/1/1/9/1:0
Serial0/6/1/1/10/1:0
Serial0/6/1/1/11/1:0
Serial0/6/1/1/12/1:0
In the pw-class class name encapsulation mpls command the control-word option default is now
disable -In Cisco IOS XR Software Release 3.9 and above the control word is disabled by default. To
configure the control word, enter the control-word keyword shown in the following example:
disable -In Cisco IOS XR Software Release 3.9 and above the control word is disabled by default. To
configure the control word, enter the control-word keyword shown in the following example:
pw-class class1 encapsulation mpls control-word
Caveats
Caveats describe unexpected behavior in Cisco IOS XR software releases. Severity-1 caveats are the
most serious caveats; severity-2 caveats are less serious.
most serious caveats; severity-2 caveats are less serious.
This section lists the Release 3.9.2 and Release 3.9.1 caveats for Cisco ASR 9000 Series Router
Software and the Cisco ASR 9000 Series platform.
Software and the Cisco ASR 9000 Series platform.
Resolved Release 3.9.2 Cisco IOS XR Software Caveats
•
CSCti62211
Basic Description:
BGP flaps due to unknown attribute
Symptom:
Cisco IOS XR Software contains a vulnerability in the Border Gateway Protocol (BGP) feature. The
vulnerability manifests itself when a BGP peer announces a prefix with a specific, valid but
unrecognized transitive attribute. On receipt of this prefix, the Cisco IOS XR device will corrupt the
attribute before sending it to the neighboring devices. Neighboring devices that receive this
corrupted update may reset the BGP peering session.
vulnerability manifests itself when a BGP peer announces a prefix with a specific, valid but
unrecognized transitive attribute. On receipt of this prefix, the Cisco IOS XR device will corrupt the
attribute before sending it to the neighboring devices. Neighboring devices that receive this
corrupted update may reset the BGP peering session.
Conditions:
Affected devices running Cisco IOS XR Software corrupt the unrecognized attribute before sending
to neighboring devices, but neighboring devices may be running operating systems other than Cisco
IOS XR Software and may still reset the BGP peering session after receiving the corrupted update.
This is per standards defining the operation of BGP.
to neighboring devices, but neighboring devices may be running operating systems other than Cisco
IOS XR Software and may still reset the BGP peering session after receiving the corrupted update.
This is per standards defining the operation of BGP.
Workaround:
No workaround. Cisco developed a fix that addresses this vulnerability and will be releasing free
software maintenance upgrades (SMUs) progressively starting 28 August 2010.
software maintenance upgrades (SMUs) progressively starting 28 August 2010.
http://www.cisco.com/warp/public/707/cisco-sa-20100827-bgp.shtml