Specifications
33
Release Notes for Cisco uBR924 Cable Access Router for Cisco IOS Release 12.1(5)T
OL-0385-04 Rev. B0 (2/2001)
Caveats
• CSCdr43824
In Cisco IOS Release 12.1(2)T, if two (or more) dial-peers were configured with destination
patterns terminated by T, then calls with a dial number that was completed by the # key were routed
only to the first matching dial-peer, even if other dial-peers are a better match. There was no
workaround.
• CSCdr61697
The Cisco uBR924 Cable Access Router defaults to using the ip address dhcp command to set the
IP address for the cable interface during power-on provisioning. However, the start-up and running
configurations show that the cable interface uses the ip address negotiated command instead.
Because only the serial interface can use the ip address negotiated command, this generates an
“invalid input” error during start-up. This is only a cosmetic error, however, and does not affect any
functionality. There is no workaround.
This caveat is resolved in Cisco IOS Release 12.1(5)T.
• CSCdr77182
The Cisco uBR924 router can eventually crash with “out of memory” errors after making several
thousand phone calls if the configuration includes the req-qos controlled-load dial-peer
configuration command. The workaround is to remove the req-qos controlled-load dial-peer
configuration command.
This caveat is resolved in Cisco IOS Release 12.1(5)T.
• CSCdr88376
When voice and data are both running in the Frame Relay Low Latency Queuing (FR LLQ)
configuration, some of the data packets are being classified as voice. This will result in police (that
is, bandwidth limit) and consequent drops for the packets in the priority queue and hence cause bad
voice quality.
Workaround: Turn on process-switching on the incoming interfaces for voice and data.
This caveat is resolved in Cisco IOS Release 12.1(5)T.
• CSCdr91706 and Cisco IOS HTTP Vulnerability
A defect in multiple releases of Cisco IOS software will cause a Cisco router or switch to halt and
reload if the Cisco IOS HTTP service is enabled, browsing to http://router-ip/anytext?/ is
attempted, and the enable password is supplied when requested. This defect can be exploited to
produce a denial of service (DoS) attack.
The vulnerability, identified as Cisco bug ID CSCdr91706, affects virtually all mainstream Cisco
routers and switches running Cisco IOS software releases 12.0 through 12.1, inclusive. This is not
the same defect as CSCdr36952.
The vulnerability has been corrected and Cisco is making fixed releases available for free to replace
all affected Cisco IOS releases. Customers are urged to upgrade to releases that are not vulnerable
to this defect as shown in detail below.
This vulnerability can only be exploited if the enable password is known or not set.
You are strongly encouraged to read the complete advisory, which is available at
http://www.cisco.com/warp/public/707/ioshttpserverquery-pub.shtml.
This caveat is resolved in Cisco IOS Release 12.1(5)T.