Datasheet

130
Release Notes for Cisco IOS Release 12.1E on the Catalyst 6500 and Cisco 7600 Supervisor Engine and MSFC
OL-2310-11
Caveats
When you use the show controller command to display the serial interface counters, they may stop
incrementing for the input and output rate and the input and output packet counts. This problem
occurs on a system configured with a PA-MC-E3 or a PA-MC-8E1 port adapter. The problem does
not effect traffic flow. This problem is resolved in Release 12.1(27b)E. (CSCsa46643)
A PA-MC-2T3+ port adapter configured in unchannelized mode might continuously generate the
following traceback message while initializing:
%SYS-2-INTSCHED: 'event dismiss' at level 2^M
-Process= "Init", ipl= 2, pid= 3^M
This problem is resolved in Release 12.1(27b)E. (CSCeh35783)
A Multilink PPP (MLP) link does not forward traffic when MLP is configured on an interface of a
FlexWAN port adapter, or an Enhanced FlexWAN PA. This problem is resolved in
Release 12.1(27b)E. (CSCeb07656)
An Any Transport over MPLS (AToM) virtual circuit that is configured on a PA-MC-8TE1+ stops
forwarding traffic after the module is OIRd. This problem occurs when the PA-MC-8TE1+ is
configured for Frame Relay over MPLS (FRoMPLS) or Ethernet interworking with Frame Relay
and ATM. This problem is resolved in Release 12.1(27b)E. (CSCin67253)
A channelized T3 interface might never come up after it is changed to unchannelized. This problem
is resolved in Release 12.1(27b)E. (CSCin88048)
Service Module Caveats
Open Service Module Caveats in Release 12.1(27b)E2, page 130
Resolved Service Module Caveats in Release 12.1(27b)E2, page 130
Resolved Service Module Caveats in Release 12.1(27b)E1, page 130
Resolved Service Module Caveats in Release 12.1(27b)E, page 131
Open Service Module Caveats in Release 12.1(27b)E2
None.
Resolved Service Module Caveats in Release 12.1(27b)E2
None.
Resolved Service Module Caveats in Release 12.1(27b)E1
Cisco Catalyst 6000, 6500 series and Cisco 7600 series that have a Network Analysis Module
installed are vulnerable to an attack, which could allow an attacker to gain complete control of the
system. Only Cisco Catalyst systems that have a NAM on them are affected. This vulnerability
affects systems that run Cisco IOS or Catalyst Operating System (CatOS).
Cisco has made free software available to address this vulnerability for affected customers.
A Cisco Security Advisory for this vulnerability is posted at
http://www.cisco.com/warp/public/707/cisco-sa-20070228-nam.shtml
This problem is resolved in Release 12.1(27b)E1. (CSCsd75273)