Cisco Cisco IOS Software Release 12.2(27)SBC 發佈版本通知
559
Caveats for Cisco IOS Release 12.2(31)SB15 through 12.2(33)SB2
OL-9967-04 Rev. A1
Caveats
Workaround: There is no workaround.
•
CSCso67850
Symptoms: When pasting (as in cut-and-paste) a set of IPv6 configuration CLI for a router network
interface to the router console, the router may crash.
interface to the router console, the router may crash.
Conditions: Unknown. The issue may occur during router configuration.
Workaround: There is no workaround.
•
CSCso74156
Symptoms: Feature push for VRF-tx does not work.
Conditions: On the service profile, a “vrf-id=...” is configured. This is pushed onto a session. IPCP
renegotiation fails on Client Router.
renegotiation fails on Client Router.
Workaround: There is no workaround.
Resolved Caveats—Cisco IOS Release 12.2(33)SB
All the caveats listed in this section are resolved in Cisco IOS Release 12.2(33)SB. This section
describes only severity 1, severity 2, and select severity 3 caveats.
describes only severity 1, severity 2, and select severity 3 caveats.
Miscellaneous
•
CSCeb69473
Symptoms: Device crashes with a segmentation violation (SegV) exception.
Conditions: Occurs when the connect target_ip [login|513] /terminal- type value command is
entered with a large input parameter to the terminal-type argument such as the following:
entered with a large input parameter to the terminal-type argument such as the following:
router>connect 192.168.0.1 login /terminal-type aaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
Trying 192.168.0.1...Open
login:
*** System received a SegV exception ***
signal= 0xb, code= 0x1100, context= 0x82f9e688
PC = 0x61616160, Vector = 0x1100, SP = 0x833ae5a8
Workaround: AAA Authorization AAA authorization enables you to limit the services available to
a user. When AAA authorization is enabled, the network access server uses information retrieved
from the user’s profile, which is located either in the local user database or on the security server, to
configure the user’s session. Once this is done, the user will be granted access to a requested service
only if the information in the user profile allows it.
a user. When AAA authorization is enabled, the network access server uses information retrieved
from the user’s profile, which is located either in the local user database or on the security server, to
configure the user’s session. Once this is done, the user will be granted access to a requested service
only if the information in the user profile allows it.
For a complete description of authorization commands, refer to the following links:
Configuring Authorization
ACS 4.1 Command Authorization Sets