Datasheet
139
Release Notes for Cisco IOS Release 12.1E on the Catalyst 6500 and Cisco 7600 Supervisor Engine and MSFC
OL-2310-11
Caveats
• When polling the SNMP MIB object slbstickyobjectable, SNMP goes into a loop. No SNMP
transactions take place and a loss of contact with SNMP devices may occur. This problem is resolved
in Release 12.1(26)E7. (CSCeh54725)
• Intermediate System-to-Intermediate System (IS-IS) load balancing may not function correctly.
This problem occurs in a topology in which three routers reside on a broadcast media. Router A is
the root node that performs Shortest Path First (SPF) and has a direct path to both router B and router
C. An additional path also also exists between router A and router B. When you configure IS-IS to
enable router A to reach router C along two equal-cost paths, router A may continue to only use the
additional path to router B to reach router C. This problem is resolved in Release 12.1(26)E7.
(CSCea24421)
• Static routes that are redistributed into BGP display an incorrect next hop address. This situation
might cause a routing loop. This problem is resolved in Release 12.1(26)E7. (CSCeg41727)
• With a Supervisor Engine 720, you might see software-forced reloads. This problem is resolved in
Release 12.1(26)E7. (CSCed36177)
Resolved General Caveats in Release 12.1(26)E6
• When an MSFC2 creates a sticky ARP entry for a device in a private VLAN, the MSFC2 ages the
ARP entry out when the ARP timer expires. This problem is resolved in Release 12.1(26)E6.
(CSCej45800)
• A label might not be assigned for a peer provider edge (PE) device, which causes the
label-controlled ATM (LC-ATM) label switch paths (LSPs) connectivity to be disrupted. This
problem has a high impact on the operability of a virtual private network (VPN) configuration with
multiple route reflectors (RRs) and label-controlled ATM (LC-ATM) links between PE routers. This
problem is resolved in Release 12.1(26)E6. (CSCeb76341)
Resolved General Caveats in Release 12.1(26)E5
• Symptoms: A vulnerability exists within the Cisco IOS Authentication, Authorization, and
Accounting (AAA) command authorization feature, where command authorization checks are not
performed on commands executed from the Tool Command Language (TCL) exec shell. This may
allow authenticated users to bypass command authorization checks in some configurations resulting
in unauthorized privilege escalation.
Conditions: Devices that are not running AAA command authorization feature, or do not support
TCL functionality are not affected by this vulnerability.
This vulnerability is present in all versions of Cisco IOS that support the tclsh command.
Workaround: This advisory with appropriate workarounds is posted at
http://www.cisco.com/warp/public/707/cisco-response-20060125-aaatcl.shtml
This problem is resolved in Release 12.1(26)E5. (CSCeh73049)
• Occasionally, the PS-Fan status in the show power command displays n/a for a functional power
supply. This problem is resolved in Release 12.1(26)E5. (CSCee01435)
• When the system uses an automatically learned source IP address to send packets, if the routes
change and the new ACLs cannot forward the traffic, the IP address becomes stale and the
transmission fails. If the system has not receive traffic from an IP address recently the outgoing
interface is probably stale and it should be purged. This problem is resolved in Release 12.1(26)E5.
(CSCei77073)