User guide
30 Release Notes for Cisco 2500 Series for Cisco IOS Release 12.0 T
Important Notes
The most commonly used or asked-about products are listed below. If you are unsure whether your
device is running Cisco IOS software, log in to the device and issue the show version command.
Cisco IOS software will identify itself simply as “IOS” or “Internetwork Operating System
Software”. Other Cisco devices will not have the show version command, or they will identify
themselves differently in their output. The most common Cisco devices that run Cisco IOS software
include the following:
• Cisco routers in the AGS/MGS/CGS/AGS+, IGS, RSM, 800, uBR900, 1000, 2500, 2600, 3000,
3600, 3800, 4000, 4500, 4700, AS5200, AS5300, AS5800, 6400, 7000, 7200 (including the
uBR7200), 7500, and 12000 series
• Most recent versions of the LS1010 ATM switch
• Some versions of the Catalyst 2900XL LAN switch
• Cisco DistributedDirector
Affected software versions, which are relatively new, are not necessarily available on every device
listed above. If you are not running Cisco IOS software, you are not affected by this problem.
The following Cisco devices are not affected:
• 700 dialup routers (750, 760, and 770 series)
• Catalyst 1900, 2800, 2900, 3000, and 5000 LAN switches are not affected, except for some
versions of the Catalyst 2900XL. However, optional router modules running Cisco IOS software
in switch backplanes, such as the RSM module for the Catalyst 5000 and 5500, are affected.
• WAN switching products in the IGX and BPX lines
• MGX (formerly known as the AXIS shelf)
• Host-based software
• Cisco PIX Firewall
• Cisco LocalDirector
• Cisco Cache Engine
This vulnerability has been assigned Cisco bug ID CSCdk77426.
Solution
Cisco offers free software updates to correct this vulnerability for all affected customers—regardless
of their contract status. However, because this vulnerability information has been disseminated by
third parties, Cisco has released this notice before updates are available for all software versions.
Table 7 gives Cisco’s projected fix dates.
Make sure your hardware has adequate RAM to support the new software before installing it. The
amount of RAM is seldom a problem when you upgrade within a major release (say, from 11.2[11]P
to 11.2[17]P), but it is often a factor when you upgrade between major releases (say, from 11.2 P to
11.3 T).
Because fixes will be available for all affected releases, this vulnerability will rarely, if ever, require
an upgrade to a new major release. Cisco recommends very careful planning for any upgrade
between major releases. Make certain no known bugs will prevent the new software from working
properly in your environment.
Further upgrade planning assistance is available on Cisco’s World Wide Web site at:
http://www.cisco.com