Release Notes

13
Release Notes for Cisco ONS 15454 SDH Release 4.1.3
OL-4984-01
Caveats
DDTS # CSCin35960
POS ingress classification based on IP precedence does not match the packets when inbound policy map
classifying based on IP precedence is applied to the POS interface, which is configured for HDLC or
PPP encapsulation. To avoid this issue, use LEX encapsulation (default) or, at the Ethernet ingress point,
mark the COS based on an IP precedence classification, then classify based on the COS during POS
ingress. This issue will be resolved in a future release.
DDTS # CSCdy55437
The maximum MAC Address Learn Rate for the ML-Series cards is 1300 MAC addresses per second.
This number varies based on the ML-Series control and forwarding plane loads. If the forwarding and
control planes are heavily loaded, the maximum MAC Address Learn Rate could be as low as 100 MAC
addresses per second. To correct a situation where an ML-Series card has stopped learning MAC
addresses, reduce the load on these cards. This load limit is by design.
DDTS # CSCdy47284
Oversize frames are not supported on ML100 Fast Ethernet ports. Oversize frames cause egress traffic
to incur CRC, line, and fragment errors on these ports. To avoid this issue, do not send jumbo packets to
ML far end ports. This is as designed.
Maintenance and Administration
Caution VxWorks is intended for qualified Cisco personnel only. Customer use of VxWorks is not
recommended, nor is it supported by Cisco's Technical Assistance Center. Inappropriate use of
VxWorks commands can have a negative and service affecting impact on your network. Please
consult the troubleshooting guide for your release and platform for appropriate troubleshooting
procedures. To exit without logging in, enter a Control-D (hold down the Control and D keys at the
same time) at the Username prompt. To exit after logging in, type “logout” at the VxWorks shell
prompt.
Transmission Control Protocol Specification
A vulnerability in the Transmission Control Protocol (TCP) specification (RFC793) has been discovered
by an external researcher. The successful exploitation enables an adversary to reset any established TCP
connection in a much shorter time than was previously discussed publicly. Depending on the application,
the connection might be automatically reestablished. In other cases, a user must repeat the action (for
example, open a new Telnet or SSH session). Depending on the attacked protocol, a successful attack
might have consequences beyond terminated connection that also must be considered. This attack vector
is only applicable to those sessions that terminate on a device (such as a router, switch, or computer) and
not to those sessions that only pass through the device (for example, transit traffic that is being routed
by a router). Also, this attack vector does not directly compromise data integrity or confidentiality.
All Cisco products that contain TCP stack are susceptible to this vulnerability.
This advisory is available at http://www.cisco.com/warp/public/707/cisco-sa-20040420-tcp-ios.shtml,
and describes the vulnerability as it applies to Cisco products that run Cisco IOS® software.