Datasheet

25
Release Notes for Catalyst 4500 Series Software Release 7.x
OL-1983-28
Open and Resolved Caveats in Software Release 7.6(9)
Resolved Caveats in Software Release 7.6(9)
These caveats are resolved in software release 7.6(9):
After executing many show commands over and over for 6~9 hours, via a telnet session, the system
tries to access an off-limits address, and reloads. This problem is resolved in software release 7.6(9).
(CSCee45047)
If a MAC address is configured as a “filtered” address right after the MAC address is learned but
before the address is aged out, traffic will not get filtered or dropped.
Workaround: Enter the clear cam dynamic command. This problem is resolved in software release
7.6(9). (CSCin78010)
A Catalyst 4500 series switch might reboot abnormally with the following exception code:
Cause : Exception 2: Tlb exception (load or fetch)
This problem is resolved in software release 7.6(9). (CSCef08126)
A switch running software release 8.3(1)GLX may fail because of an SRAM failure with the
following epc values in the crashdump:
epc 0x00000000100fdee4
epc 0x00000000100fd590
Workaround: Disable the SRAM online diagnostics using the set test switch-memory disable
command. This problem is resolved in software release 7.6(9). (CSCee88146)
A Catalyst 4500 series switch might reboot abnormally with the following exception code:
Cause : Exception 2: Tlb exception (load or fetch)
This problem is resolved in software release 7.6(9). (CSCef08126)
The dot3StatsFrameTooLongs counter should not increment when the port is configured as a trunk
port. This problem is resolved in software release 7.6(9). (CSCee94947)
If you upgrade your switch from any software release 7.x or earlier releases to software release 8.x
and later releases with the boot mode set to “text” and spanning tree set to “PVST+,” the
spanning-tree mode changes to “Rapid PVST+.
Workaround: Change the boot mode to “binary” before performing the upgrade. This problem is
resolved in software release 7.6(9). (CSCin75737)
With MISTP enabled and the EtherChannel mode set to "ON," if you configure more than one
EtherChannel and trunk in a short period of time, all of the newly configured channels might not
join the trunk. With this configuration scenario, the problem has also been seen after the switch is
reset. This problem is resolved in software release 7.6(9). (CSCee95922)
There is a vulnerability in the Transmission Control Protocol (TCP) specification (RFC793). All
Cisco products that contain TCP stack are susceptible to this vulnerability. This advisory is available
at these URLs:
http://www.cisco.com/warp/public/707/cisco-sa-20040420-tcp-ios.shtml
This URL describes this vulnerability as it applies to Cisco products that run Cisco IOS
software.
http://www.cisco.com/warp/public/707/cisco-sa-20040420-tcp-nonios.shtml
This URL describes this vulnerability for products that do not run Cisco IOS software.
This problem is resolved in software release 7.6(9). (CSCed32349)