Datasheet
240
Release Notes for Cisco IOS Release 12.1E on the Catalyst 6500 and Cisco 7600 Supervisor Engine and MSFC
OL-2310-11
Caveats
• After the link to the PBR next hop is lost, the new next hop information is not programmed into
hardware immediately. This problem is resolved in Release 12.1(13)E7. (CSCdy28888)
• Hardware-supported ACLs without any ACEs do not implicitly deny all traffic. This problem is
resolved in Release 12.1(13)E7. (CSCea17192)
• A system with an MSFC2 may encounter a bus error if the percent character is used in a VTP
password, a VTP domain, or a VTP VLAN name. This problem is resolved in Release 12.1(13)E7.
(CSCea82238)
• With the fastest aging time configured and the highest flow creation rates configured, the statistics
exported by NetFlow data export are not accurate. The inaccuracy is reduced in Release 12.1(13)E7.
(CSCea72771)
Resolved General Caveats in Release 12.1(13)E6
• A Cisco device running IOS and enabled for the Border Gateway Protocol (BGP) is vulnerable to a
Denial of Service (DOS) attack from a malformed BGP packet. The BGP protocol is not enabled by
default, and must be configured in order to accept traffic from an explicitly defined peer. Unless the
malicious traffic appears to be sourced from a configured, trusted peer, it would be difficult to inject
a malformed packet. BGP MD5 is a valid workaround for this problem.
Cisco has made free software available to address this problem. For more details, please refer to this
advisory, available at http://www.cisco.com/warp/public/707/cisco-sa-20040616-bgp.shtml.
This problem is resolved in Release 12.1(13)E6. (CSCdu53656)
• A Cisco device running IOS and enabled for the Border Gateway Protocol (BGP) is vulnerable to a
Denial of Service (DOS) attack from a malformed BGP packet. The BGP protocol is not enabled by
default, and must be configured in order to accept traffic from an explicitly defined peer. Unless the
malicious traffic appears to be sourced from a configured, trusted peer, it would be difficult to inject
a malformed packet. BGP MD5 is a valid workaround for this problem.
Cisco has made free software available to address this problem. For more details, please refer to this
advisory, available at http://www.cisco.com/warp/public/707/cisco-sa-20040616-bgp.shtml.
This problem is resolved in Release 12.1(13)E6. (CSCea28131)
• The show EOBC command shows a very large retry count when there is a lot of traffic in the
Ethernet Out-of-Band channel (EOBC) for a long period of time. This problem is resolved in
Release 12.1(13)E6. (CSCea46236)
• When the following conditions occur, some static multicast MAC entries may not get installed in
the Layer 2 hardware table:
–
During system load
–
During a system reload
–
During a switchover to the redundant system
This problem is resolved in Release 12.1(13)E6. (CSCuk37312)
• If a (*,G) shortcut is established as a complete shortcut, and then needs to change to a partial
shortcut, the software fails to change the shortcut to a partial shortcut. This problem is resolved in
Release 12.1(13)E6. (CSCea66943)