Datasheet

155
Release Notes for Cisco IOS Release 12.1E on the Catalyst 6500 and Cisco 7600 Supervisor Engine and MSFC
OL-2310-11
Caveats
Under a high traffic load, a PA-A3-8T1IMA or PA-A3-8E1IMA port adapter might display an
increasing “rx_no_buffer” counter in the output of the show controllers atm privileged EXEC
command, and some PVCs that are configured on the port adapter might stop receiving traffic. This
problem is resolved in Release 12.1(26)E. (CSCin77553)
Serial interfaces on a PA-MC-8TE1+ port adapter that are configured as part of a channel group
continue to process packets when the interface is in the “admindown” state. The counters in the
output of the show interfaces serial command might increment when the serial interface is shut
down. This problem is resolved in Release 12.1(26)E. (CSCin78325)
Service Module Caveats
Open Service Module Caveats in Release 12.1(26)E9, page 155
Resolved Service Module Caveats in Release 12.1(26)E9, page 155
Resolved Service Module Caveats in Release 12.1(26)E8, page 155
Resolved Service Module Caveats in Release 12.1(26)E7, page 156
Resolved Service Module Caveats in Release 12.1(26)E6, page 156
Resolved Service Module Caveats in Release 12.1(26)E5, page 156
Resolved Service Module Caveats in Release 12.1(26)E4, page 156
Resolved Service Module Caveats in Release 12.1(26)E3, page 156
Resolved Service Module Caveats in Release 12.1(26)E2, page 156
Resolved Service Module Caveats in Release 12.1(26)E1, page 156
Resolved Service Module Caveats in Release 12.1(26)E, page 156
Open Service Module Caveats in Release 12.1(26)E9
None.
Resolved Service Module Caveats in Release 12.1(26)E9
None.
Resolved Service Module Caveats in Release 12.1(26)E8
Cisco Catalyst 6000, 6500 series and Cisco 7600 series that have a Network Analysis Module
installed are vulnerable to an attack, which could allow an attacker to gain complete control of the
system. Only Cisco Catalyst systems that have a NAM on them are affected. This vulnerability
affects systems that run Cisco IOS or Catalyst Operating System (CatOS).
Cisco has made free software available to address this vulnerability for affected customers.
A Cisco Security Advisory for this vulnerability is posted at
http://www.cisco.com/warp/public/707/cisco-sa-20070228-nam.shtml
This problem is resolved in Release 12.1(26)E8. (CSCsd75273)