Datasheet

192
Release Notes for Cisco IOS Release 12.1E on the Catalyst 6500 and Cisco 7600 Supervisor Engine and MSFC
OL-2310-11
Caveats
Distributed CEF switching does not work for multilink interface egress traffic. This problem is
resolved in Release 12.1(22)E. (CSCec55650)
The 64-bit counter on the OSM-2+4GE-WAN+ main interface shows an incorrect value of zero. This
problem is resolved in Release 12.1(22)E. (CSCec34010)
With CRC32 configured on OSM interfaces, priority queues have high latency with line-rate traffic.
This problem is resolved in Release 12.1(22)E. (CSCec62800)
On OC-12c OSMs, the show controller pos interface pm command displays incorrect optics
information. This problem is resolved in Release 12.1(22)E. (CSCec48974)
On OSM-2+4GE-WAN+ modules, the ip mtu interface command incorrectly cannot increase the
MTU from the size set with the mtu interface command. This problem is resolved in
Release 12.1(22)E. (CSCec03984)
Parallel Express Forwarding (PXF) CEF load balancing does not work. This problem is resolved in
Release 12.1(22)E. (CSCdu47678)
Release 12.1(20)E and Rebuilds
General Caveats, page 192
FlexWAN Caveats, page 207
Service Module Caveats, page 209
OSM Caveats, page 210
General Caveats
Open General Caveats in Release 12.1(20)E6, page 192
Resolved General Caveats in Release 12.1(20)E6, page 192
Resolved General Caveats in Release 12.1(20)E3, page 194
Resolved General Caveats in Release 12.1(20)E2, page 196
Resolved General Caveats in Release 12.1(20)E, page 200
Open General Caveats in Release 12.1(20)E6
None.
Resolved General Caveats in Release 12.1(20)E6
A document that describes how the Internet Control Message Protocol (ICMP) could be used to
perform a number of Denial of Service (DoS) attacks against the Transmission Control Protocol
(TCP) has been made publicly available. This document has been published through the Internet
Engineering Task Force (IETF) Internet Draft process, and is entitled “ICMP Attacks Against TCP”
(draft-gont-tcpm-icmp-attacks-03.txt).
These attacks, which only affect sessions terminating or originating on a device itself, can be of
three types:
1. Attacks that use ICMP “hard” error messages.