Release Notes
36
Release Notes for Cisco Intrusion Prevention System 5.1(7)E1
OL-8492-01
Caveats
• CSCsh50760—NAC causes high mainApp usage
• CSCsh75673—valid NTP key values stored as -1
• CSCsi21029—GRE tunnels blocked by sensorApp inspection defect
• CSCsi22195—Refactor normalizer processTcpOptions unit
• CSCsi29166—Some special characters are accepted as part of the username
• CSCsi42747—Memory leak in mainApp when checking license status
• CSCsi43787—Memory leak in mainApp when log event initiated remotely
• CSCsi45463—6.0(2) TCP SYN Flood Cookies not functioning on XL platform
• CSCsi48979—Sig 2152:0 false alarms after tunings or restore defaults
• CSCsi50951—ARC IPS cannot access blocking device with 'usage' in the banner
• CSCsi61184—AIP-SSM: Ident signature 6202/2 firing on SYN packets
• CSCsi87943—traffic conditions can stimulate small memory leak in inspector SNMP
• CSCsi98677—erase current-config hangs sensor CLI
• CSCsj17459—low-end sensor out of memory during sigupdate
• CSCsj30225—SNMP gets result in mainApp memory leak
• CSCsj35723—Sigs not alarming after default service sig sig0
• CSCsj41582—IPS 5.1(5)E1 UDP-string engine does not distinguish direction
• CSCsj82458—global-block-timeout allows values outside supported range
• CSCsj95950—ASA/SSM False Data Plane Failover Occuring
• CSCsk05475—Packet display or packet capture causes rx errors
• CSCsk27472—"IDS 4250 with Dual SX cards, causing interface flaps"
• CSCsk30811—Unnecessary webserver error logging causes hard drive failure
• CSCsk35511—Service-TNS Engine Enhancement Request
• CSCsk48762—risk rating miscalculated for low severity due to signed math
• CSCsk53813—upgrade log files are not preserved during an upgrade
• CSCsk54274—4250 int errors with onboard nic
• CSCsk56818—5.1(6)E1 custom AD sig issue