Datasheet

238
Release Notes for Cisco IOS Release 12.1E on the Catalyst 6500 and Cisco 7600 Supervisor Engine and MSFC
OL-2310-11
Caveats
Resolved General Caveats in Release 12.1(13)E7
A manually summarized entry might remain in the Enhanced Interior Gateway Routing Protocol
(EIGRP) topology table after manual summarization is disabled. This problem is resolved in
Release 12.1(13)E7. (CSCdx83729)
Reads and writes to Advanced Technology Attachment (ATA) flash filesystem devices are extremely
slow. This problem is resolved in Release 12.1(13)E7. (CSCdz27200)
Cisco routers and switches running Cisco IOS software and configured to process Internet Protocol
version 4 (IPv4) packets are vulnerable to a Denial of Service (DoS) attack. A rare sequence of
crafted IPv4 packets sent directly to the device may cause the input interface to stop processing
traffic once the input queue is full. No authentication is required to process the inbound packet.
Processing of IPv4 packets is enabled by default. Devices running only IP version 6 (IPv6) are not
affected. A workaround is available.
Cisco has made software available, free of charge, to correct the problem.
This advisory is available at:
http://www.cisco.com/warp/public/707/cisco-sa-20030717-blocked.shtml
This problem is resolved in Release 12.1(13)E7. (CSCdz71127)
Cisco routers and switches running Cisco IOS software and configured to process Internet Protocol
version 4 (IPv4) packets are vulnerable to a Denial of Service (DoS) attack. A rare sequence of
crafted IPv4 packets sent directly to the device may cause the input interface to stop processing
traffic once the input queue is full. No authentication is required to process the inbound packet.
Processing of IPv4 packets is enabled by default. Devices running only IP version 6 (IPv6) are not
affected. A workaround is available.
Cisco has made software available, free of charge, to correct the problem.
This advisory is available at:
http://www.cisco.com/warp/public/707/cisco-sa-20030717-blocked.shtml
This problem is resolved in Release 12.1(13)E7. (CSCea02355)
When EtherChannel is configured, all traffic is flooded to all the ports in the VLAN every 11
minutes. This traffic storm lasts approximately 1.5 seconds and also affects service cards with
internal EtherChannel, such as the Content Switching Module (CSM) and Content Services Gateway
(CSG). This problem is resolved in Release 12.1(13)E7. CSCea43688)
Incorrect flooding might occur in a 13-slot chassis with DFCs. This problem is resolved in
Release 12.1(13)E7. (CSCeb11577)
ICMP ping tests fail across a EtherChannel when the “src-dst-port” port-channel load-balance
algorithm is used. This problem is resolved in Release 12.1(13)E7. (CSCea42504)
When you add a /31 netmask route, the new netmask does not overwrite an existing /32 CEF entry.
This problem is resolved in Release 12.1(13)E7. A facility has been provided to periodically
validate prefixes derived from adjacencies in the FIB against prefixes originating from the RIB. To
enable the validation, you must enter the ip cef table adjacency-prefix validate global
configuration command. (CSCea53765)
Multicast traffic is process switched after OIR. This problem is resolved in Release 12.1(13)E7.
(CSCea80221)
A system running Cisco IOS 12.1(13)E does not allow a secure MAC address to be removed or
reused on a Layer 2 port. This problem is resolved in Release 12.1(13)E7. (CSCea48243)