Примечания к выпуску для Cisco Cisco IOS XR Software Release 3.9

Скачать
Страница из 98
Release Notes for Cisco ASR 9000 Series Aggregation Services Routers for Cisco IOS XR Software Release 3.9.2
Caveats
IR-87
Cisco ASR 9000 Series Aggregation Services Router IP Addresses and Services  Command
OL-23385-03
Serial0/6/1/1/6/1:0
Serial0/6/1/1/7/1:0
Serial0/6/1/1/8/1:0
Serial0/6/1/1/9/1:0
Serial0/6/1/1/10/1:0
Serial0/6/1/1/11/1:0
Serial0/6/1/1/12/1:0
In the pw-class class name encapsulation mpls command the control-word option default is now 
disable -In Cisco IOS XR Software Release 3.9 and above the control word is disabled by default. To 
configure the control word, enter the control-word keyword shown in the following example: 
pw-class class1 encapsulation mpls control-word
Caveats
Caveats describe unexpected behavior in Cisco IOS XR software releases. Severity-1 caveats are the 
most serious caveats; severity-2 caveats are less serious.
This section lists the Release 3.9.2 and Release 3.9.1 caveats for Cisco ASR 9000 Series Router 
Software and the Cisco ASR 9000 Series platform.
Resolved Release 3.9.2 Cisco IOS XR Software Caveats
CSCti62211   
Basic Description:
BGP flaps due to unknown attribute 
Symptom:
Cisco IOS XR Software contains a vulnerability in the Border Gateway Protocol (BGP) feature. The 
vulnerability manifests itself when a BGP peer announces a prefix with a specific, valid but 
unrecognized transitive attribute. On receipt of this prefix, the Cisco IOS XR device will corrupt the 
attribute before sending it to the neighboring devices. Neighboring devices that receive this 
corrupted update may reset the BGP peering session.
Conditions:
Affected devices running Cisco IOS XR Software corrupt the unrecognized attribute before sending 
to neighboring devices, but neighboring devices may be running operating systems other than Cisco 
IOS XR Software and may still reset the BGP peering session after receiving the corrupted update. 
This is per standards defining the operation of BGP.
Workaround:
No workaround. Cisco developed a fix that addresses this vulnerability and will be releasing free 
software maintenance upgrades (SMUs) progressively starting 28 August 2010. 
http://www.cisco.com/warp/public/707/cisco-sa-20100827-bgp.shtml