RN 7000 XD
RN 7000 XD
Note Prior to Cisco IOS Release 12.4 (4)XD7, Cisco IOS Release 12.4 (4)XD supports Cisco 7200 VXR series
routers on the NPE-G2 only. Beginning with Cisco IOS Release 12.4 (4) XD7, Cisco IOS
Release 12.4(4)XD also supports the Cisco 7201 router.
For a list of the software caveats that apply to Cisco IOS Release 12.4(4)XD12, see the “Caveats for
Cisco IOS Release 12.4XD” section on page 24 and Caveats for Cisco IOS Release 12.4T. The caveats
document is updated for every maintenance release and is located on Cisco.com.
Use these release notes with Cross-Platform Release Notes for Cisco IOS Release 12.4T located on
Cisco.com.
Cisco recommends that you view the field notices for this release to see if your software or hardware
platforms are affected. If you have an account on Cisco.com, you can find field notices at
http://www.cisco.com/warp/customer/tech_tips/index/fn.html. If you do not have a Cisco.com login
account, you can find field notices at http://www.cisco.com/warp/public/tech_tips/index/fn.html.
Americas Headquarters:
Cisco Systems, Inc., 170 West Tasman Drive, San Jose, CA 95134-1706 USA
©2008 Cisco Systems, Inc. All rights reserved.
Contents
Contents
These release notes describe the following topics:
• Inheritance Information, page 2
• System Requirements, page 4
• New and Changed Information, page 13
• MIBs, page 22
• Limitations and Restrictions, page 23
• Caveats for Cisco IOS Release 12.4XD, page 24
• Related Documentation, page 75
• Open Source License Notices, page 86
• Obtaining Documentation, page 88
• Documentation Feedback, page 89
• Obtaining Technical Assistance, page 90
• Obtaining Additional Publications and Information, page 92
Inheritance Information
Cisco IOS Release 12.4(4)XD12 is based on Cisco IOS Release 12.4(4)T5. All features in Cisco IOS
Release 12.4(4)T5 are in Cisco IOS Release 12.4(4)XD12.
Cisco IOS Release 12.4(4)XD11 is based on Cisco IOS Release 12.4(4)T5. All features in Cisco IOS
Release 12.4(4)T5 are in Cisco IOS Release 12.4(4)XD11.
Cisco IOS Release 12.4(4)XD10 is based on Cisco IOS Release 12.4(4)T5. All features in Cisco IOS
Release 12.4(4)T5 are in Cisco IOS Release 12.4(4)XD10.
Cisco IOS Release 12.4(4)XD9 is based on Cisco IOS Release 12.4(4)T5. All features in Cisco IOS
Release 12.4(4)T5 are in Cisco IOS Release 12.4(4)XD9.
Cisco IOS Release 12.4(4)XD8 is based on Cisco IOS Release 12.4(4)T5. All features in Cisco IOS
Release 12.4(4)T5 are in Cisco IOS Release 12.4(4)XD8.
Cisco IOS Release 12.4(4)XD7 is based on Cisco IOS Release 12.4(4)T5. All features in Cisco IOS
Release 12.4(4)T5 are in Cisco IOS Release 12.4(4)XD7.
Cisco IOS Release 12.4(4)XD6 is based on Cisco IOS Release 12.4(4)T5. All features in Cisco IOS
Release 12.4(4)T5 are in Cisco IOS Release 12.4(4)XD6.
Cisco IOS Release 12.4(4)XD5 is based on Cisco IOS Release 12.4(4)T5. All features in Cisco IOS
Release 12.4(4)T5 are in Cisco IOS Release 12.4(4)XD5.
Note Cisco IOS Release 12.4(4)XD4 is based on Cisco IOS Release 12.4(4)T5, label:
SYNC_V1244XDT_061009. Only caveats resolved in 12.4(4)T5 before this label are also resolved in
Cisco IOS Release 12.4(4)XD4.
Cisco IOS Release 12.4(4)XD3 is based on Cisco IOS Release 12.4(4)T3. All features in Cisco IOS
Release 12.4(4)T3 are in Cisco IOS Release 12.4(4)XD3
Release Notes for Cisco 7000 Family for Cisco IOS Release 12.4XD
2 OL-10395-13
Inheritance Information
Cisco IOS Release 12.4(4)XD2 is based on Cisco IOS Release 12.4(4)T3. All features in Cisco IOS
Release 12.4(4)T3 are in Cisco IOS Release 12.4(4)XD2.
Cisco IOS Release 12.4(4)XD1 is based on Cisco IOS Release 12.4(4)T1. All features in Cisco IOS
Release 12.4(4)T1 are in Cisco IOS Release 12.4(4)XD1.
Cisco IOS Release 12.4(4)XD is based on Cisco IOS Release 12.4(4)T1. All features in Cisco IOS
Release 12.4(4)T1 are in Cisco IOS Release 12.4(4)XD.
Table 1 lists sections of the Cross-Platform Release Notes for Cisco IOS Release 12.4T that apply to
Cisco IOS Release 12.4(4)XD.
Table 1 References for the Cross-Platform Release Notes for Cisco IOS Release 12.4T
Topic Location
• Introductory information about the Cisco On Cisco.com at:
7000 family of routers
Product Support> Cisco IOS Software > Cisco IOS Software
• Hardware Supported Releases 12.4T > General Information> Release Notes >
Cross-Platform Release Notes for Cisco IOS Release 12.4T, Part 2:
• Feature Set Tables
Platform-Specific Information
Or at:
http://www.cisco.com/univercd/cc/td/doc/product/software/ios124/124re
lnt/xprn124t/124tfeat.htm
• Determining the Software Version On Cisco.com at:
• Upgrading to a New Software Release Product Support> Cisco IOS Software > Cisco IOS Software
Releases 12.4T > General Information> Release Notes >
Cross-Platform Release Notes for Cisco IOS Release 12.4T, Part 1:
System Requirements
Or at:
http://www.cisco.com/univercd/cc/td/doc/product/software/ios124/
124relnt/xprn124t/124treqs.htm
• Feature Descriptions (New and Changed On Cisco.com at:
Information) Product Support> Cisco IOS Software > Cisco IOS Software
• MIBs Releases 12.4T > General Information> Release Notes >
Cross-Platform Release Notes for Cisco IOS Release 12.4T, Part 3:
• Important Notes
New Features and Important Notes
Or at:
http://www.cisco.com/univercd/cc/td/doc/product/software/ios124/
124relnt/xprn124t/124tnewf.htm
• Related Documentation On Cisco.com at:
• Obtaining Documentation Product Support> Cisco IOS Software > Cisco IOS Software
• Obtaining Technical Assistance Releases 12.4T > General Information > Release Notes >
Cross-Platform Release Notes for Cisco IOS Release 12.4T, Part 4:
Related Documentation
Or at:
http://www.cisco.com/univercd/cc/td/doc/product/software/ios124/
124relnt/xprn124t/124tdocs.htm
Release Notes for Cisco 7000 Family for Cisco IOS Release 12.4XD
OL-10395-13 3
System Requirements
System Requirements
This section describes the system requirements for Cisco IOS Release 12.4(4)XD and includes the
following sections:
• Memory Recommendations, page 4
• Supported Hardware, page 5
• Cisco 7201 Router ROMMON Requirement, page 6
• C7200 VSA Hardware Requirements, page 6
• Determining the ROMMON Version, page 6
• Determining the I/O and VSA FPGA Versions, page 7
• Determining the Software Version, page 7
• Upgrading to a New Software Release, page 7
• Feature Set Tables, page 11
Memory Recommendations
Warning Unlike other network processing engines, the Cisco NPE-G2 has its own Cisco IOS software images
with the prefix of "c7200p-" in the software image file names. All other network processing engines
such as NPE-225, NPE-400 and NPE-G1 are compatible with images with the prefix of "c7200-." The
Cisco NPE-G2 does not boot up with a software image with the prefix of "c7200-". Conversely, the other
network processing engines such as NPE-225, NPE-400, and NPE-G1 do not boot up with the software
image with the prefix of "c7200p-".
Release Notes for Cisco 7000 Family for Cisco IOS Release 12.4XD
4 OL-10395-13
System Requirements
Table 2 Memory Recommendations for the Cisco 7200 VXR Routers on the NPE-G2 and Cisco 7201 Router
Flash DRAM
Memory Memory Runs
Platforms Feature Sets Software Image Recommended Recommended From
Cisco 7200 VXR ADVANCED c7200p-adventerprisek9-mz 256 MB Flash 1 GB DRAM RAM
Routers and ENTERPRISE
Cisco 7201 SERVICES
Router Feature Set
ADVANCED c7200p-adventerprisek9_sna- 256 MB Flash 1 GB DRAM RAM
ENTERPRISE mz
SERVICES
WITH SNA
SWITCHING
Feature Set
ADVANCED IP c7200p-advipservicesk9-mz 256 MB Flash 1 GB DRAM RAM
SERVICES
Feature Set
ADVANCED IP c7200p-advipservicesk9_li-m 256 MB Flash 1 GB DRAM RAM
SERVICES z
W/LAWFUL
INTERCEPT
Feature Set
ADVANCED c7200p-advsecurityk9-mz 256 MB Flash 1 GB DRAM RAM
SECURITY
Feature Set
IP BASE W/O c7200p-ipbase-mz 48 MB Flash 1 GB DRAM RAM
CRYPTO
Feature Set
IP BASE c7200p-ipbasek9-mz 48 MB Flash 1 GB DRAM RAM
Feature Set
SP SERVICES c7200p-spservicesk9-mz 256 MB Flash 1 GB DRAM RAM
Feature Set
Supported Hardware
Cisco IOS Release 12.4(4)XD supports the following Cisco 7000 platforms:
• Cisco 7200 VXR routers on the NPE-G2
• Cisco 7201 router, beginning with Cisco IOS Release 12.4(4)XD7
For detailed descriptions of the new hardware features, see the “New and Changed Information” section
on page 13.
Release Notes for Cisco 7000 Family for Cisco IOS Release 12.4XD
OL-10395-13 5
System Requirements
Note Beginning with Cisco IOS Release 12.4(4)XD7, the C7200 VSA and VAM2+ are no longer supported
on the Cisco IOS Release12.4XD. Customers who require C7200 VSA or VAM2+ support should
migrate to Cisco IOS Release 12.4(15)Tx.
The hardware required to ensure proper operation of the C7200 VSA is as follows:
• The C7200 VSA is compatible with the Cisco NPE-G2 processor on the Cisco 7204VXR or
Cisco 7206VXR routers.
• ROMMON requirement: 12.4(4r)XD5 or later
• I/O FPGA requirement: 0x25 (decimal 0.37) or later
• VSA FPGA requirement: 0x13 (decimal 0.19) or later
Release Notes for Cisco 7000 Family for Cisco IOS Release 12.4XD
6 OL-10395-13
System Requirements
=========================================================
Bundled FPD Image Version Matrix
===================================
Min. Req.
Supported Card TypesID Image Name Version H/W Ver.
=================== === ============ ======= ===========
NPEG2 IOFPGA 1 NPEG2 IOFPGA 0.37 0.0
------------------- --- ------------ ------- -----------
VSA 1 VSA 0.19 0.0
============================================================
Note Beginning with Cisco IOS Release 12.4(4)XD7, the C7200 VSA and VAM2+ are no longer supported
on the Cisco IOS Release12.4XD. Customers who require C7200 VSA or VAM2+ support should
migrate to Cisco IOS Release 12.4(15)Tx.
Release Notes for Cisco 7000 Family for Cisco IOS Release 12.4XD
OL-10395-13 7
System Requirements
are supported in a specific Cisco IOS image. You can search by feature or by feature set (software
image). Under the release section, you can compare Cisco IOS software releases side by side to display
both the features unique to each software release and the features that the releases have in common.
Cisco Feature Navigator is updated regularly when major Cisco IOS software releases and technology
releases occur. For the most current information, go to the Cisco Feature Navigator home page at the
following URL:
http://www.cisco.com/go/fn
To choose a new Cisco IOS software release based on information about defects that affect that software,
use Bug Toolkit at:
http://www.cisco.com/cgi-bin/Support/Bugtool/launch_bugtool.pl.
FPD Image Packages for Cisco 7200 VXR Routers on the NPE-G2
Field Programmable Device (FPD) image packages are used to update FPD images.
The FPD image package that is used to upgrade an FPD image that runs Cisco IOS Release 12.4(4)XD12
is the c7200p-fpd-pkg.124-4.XD12.pkg file. This FPD image package file is accessible from the page
where you downloaded your specific Cisco IOS image in the Software Center on Cisco.com.
Table 3 Cisco 7000 Series FPD Image Package Contents for Release 12.4(4)XD12
The FPD image package that is used to upgrade an FPD image that runs Cisco IOS Release 12.4(4)XD11
is the c7200p-fpd-pkg.124-4.XD11.pkg file. This FPD image package file is accessible from the page
where you downloaded your specific Cisco IOS image in the Software Center on Cisco.com.
Table 4 Cisco 7000 Series FPD Image Package Contents for Release 12.4(4)XD11
The FPD image package that is used to upgrade an FPD image that runs Cisco IOS Release 12.4(4)XD10
is the c7200p-fpd-pkg.124-4.XD10.pkg file. This FPD image package file is accessible from the page
where you downloaded your specific Cisco IOS image in the Software Center on Cisco.com.
Release Notes for Cisco 7000 Family for Cisco IOS Release 12.4XD
8 OL-10395-13
System Requirements
Table 5 Cisco 7000 Series FPD Image Package Contents for Release 12.4(4)XD10
The FPD image package that is used to upgrade an FPD image that runs Cisco IOS Release 12.4(4)XD9
is the c7200p-fpd-pkg.124-4.XD9.pkg file. This FPD image package file is accessible from the page
where you downloaded your specific Cisco IOS image in the Software Center on Cisco.com.
Table 6 Cisco 7000 Series FPD Image Package Contents for Release 12.4(4)XD9
The FPD image package that is used to upgrade an FPD image that runs Cisco IOS Release 12.4(4)XD8
is the c7200p-fpd-pkg.124-4.XD8.pkg file. This FPD image package file is accessible from the page
where you downloaded your specific Cisco IOS image in the Software Center on Cisco.com.
Table 7 Cisco 7000 Series FPD Image Package Contents for Release 12.4(4)XD8
The FPD image package that is used to upgrade an FPD image that runs Cisco IOS Release 12.4(4)XD7
is the c7200p-fpd-pkg.124-4.XD7.pkg file. This FPD image package file is accessible from the page
where you downloaded your specific Cisco IOS image in the Software Center on Cisco.com.
Table 8 Cisco 7000 Series FPD Image Package Contents for Release 12.4(4)XD7
The FPD image package that is used to upgrade an FPD image that runs Cisco IOS Release 12.4(4)XD6
is the c7200p-fpd-pkg.124-4.XD6.pkg file. This FPD image package file is accessible from the page
where you downloaded your specific Cisco IOS image in the Software Center on Cisco.com.
Release Notes for Cisco 7000 Family for Cisco IOS Release 12.4XD
OL-10395-13 9
System Requirements
Table 9 Cisco 7000 Series FPD Image Package Contents for Release 12.4(4)XD6
The FPD image package that is used to upgrade an FPD image that runs Cisco IOS Release 12.4(4)XD5
is the c7200p-fpd-pkg.124-4.XD5.pkg file. This FPD image package file is accessible from the page
where you downloaded your specific Cisco IOS image in the Software Center on Cisco.com.
Table 10 Cisco 7000 Series FPD Image Package Contents for Release 12.4(4)XD5
The FPD image package that is used to upgrade an FPD image that runs Cisco IOS Release 12.4(4)XD4
is the c7200-fpd-pkg.124-4.XD4.pkg file. This FPD image package file is accessible from the page
where you downloaded your specific Cisco IOS image in the Software Center on Cisco.com.
Table 11 Cisco 7000 Series FPD Image Package Contents for Release 12.4(4)XD4
The FPD image package that is used to upgrade an FPD image that runs Cisco IOS Release 12.4(4)XD3
is the c7200-fpd-pkg.124-4.XD3.pkg file. This FPD image package file is accessible from the page
where you downloaded your specific Cisco IOS image in the Software Center on Cisco.com.
Table 12 Cisco 7000 Series FPD Image Package Contents for Release 12.4(4)XD3
Release Notes for Cisco 7000 Family for Cisco IOS Release 12.4XD
10 OL-10395-13
System Requirements
The FPD image package that is used to upgrade an FPD image that runs Cisco IOS Release 12.4(4)XD
is the c7200-fpd-pkg.124-4.XD2.pkg file. This FPD image package file is accessible from the page
where you downloaded your specific Cisco IOS image in the Software Center on Cisco.com.
Table 13 Cisco 7000 Series FPD Image Package Contents for Release 12.4(4)XD2
The FPD image package that is used to upgrade an FPD image that runs Cisco IOS Release 12.4(4)XD
is the c7200-fpd-pkg.124-4.XD1.pkg file. This FPD image package file is accessible from the page
where you downloaded your specific Cisco IOS image in the Software Center on Cisco.com.
Table 14 Cisco 7000 Series FPD Image Package Contents for Release 12.4(4)XD1
The FPD image package that is used to upgrade an FPD image that runs Cisco IOS Release 12.4(4)XD
is the c7200-fpd-pkg.124-4.XD.pkg file. This FPD image package file is accessible from the page where
you downloaded your specific Cisco IOS image in the Software Center on Cisco.com.
Table 15 Cisco 7000 Series FPD Image Package Contents for Release 12.4(4)XD
Caution Cisco IOS images with strong encryption (including, but not limited to, 168-bit Triple Data Encryption
Standard [3DES] data encryption feature sets) are subject to United States government export controls
and have limited distribution. Strong encryption images to be installed outside the United States are
likely to require an export license. Customer orders may be denied or subject to delay because of United
Release Notes for Cisco 7000 Family for Cisco IOS Release 12.4XD
OL-10395-13 11
System Requirements
States government regulations. When applicable, purchaser and user must obtain local import and use
authorizations for all encryption strengths. Please contact your sales representative or distributor for
more information, or send an e-mail to export@cisco.com.
Cisco IOS software images are subject to deferral. Cisco recommends that you view the deferral notices
at the following location to determine if your software release is affected:
http://www.cisco.com/kobayashi/sw-center/sw-ios-advisories.shtml
Table 16, Table 17, Table 18, andTable 19 list the features and feature sets supported by Cisco 7200
VXR routers on the NPE-G 2 and the Cisco 7201 router in Cisco IOS Release 12.4(4)XD and use the
following conventions:
• Yes—The feature is supported in the software image.
• No—The feature is not supported in the software image.
• In—The number in the “In” column indicates the Cisco IOS release in which the feature was
introduced. For example, (4) means a feature was introduced in 12.4 (4)XD4. If a cell in this column
is empty, the feature was included in the initial base release.
Note These release notes are not cumulative and list only features that are new to Cisco IOS
Release 12.4(4)XD. The parent release for Cisco IOS Release 12.4(4)XD is Cisco IOS
Release 12.4(4)T. For information about inherited features, refer to Cisco.com or Cisco Feature
Navigator. For Cisco.com, either go to Cisco.com and select the appropriate software release under
Product Support> Cisco IOS Software or go to http://www.cisco.com/univercd/home/index.htm and
select the appropriate software release under Cisco IOS Software and Release Notes. You can use the
Cisco Feature Navigator tool at http://www.cisco.com/go/fn.
Table 16 Feature List by Feature Set for Cisco 7200 VXR Routers on the NPE-G2 and the Cisco 7201 Router
Table 17 Feature List by Feature Set for Cisco 7200 VXR Routers on the NPE-G2 and the Cisco 7201
Router (continued)
Release Notes for Cisco 7000 Family for Cisco IOS Release 12.4XD
12 OL-10395-13
New and Changed Information
Table 17 Feature List by Feature Set for Cisco 7200 VXR Routers on the NPE-G2 and the Cisco 7201
Router (continued)
Table 18 Feature List by Feature Set for Cisco 7200 VXR Routers on the NPE-G2 and the Cisco 7201
Router (continued)
Table 19 Feature List by Feature Set for Cisco 7200 VXR Routers on the NPE-G2 and the Cisco 7201
Router (continued)
Release Notes for Cisco 7000 Family for Cisco IOS Release 12.4XD
OL-10395-13 13
New and Changed Information
Release Notes for Cisco 7000 Family for Cisco IOS Release 12.4XD
14 OL-10395-13
New and Changed Information
Note Beginning with Cisco IOS Release 12.4(4)XD7, the C7200 VSA and VAM2+ are no longer supported
on the Cisco IOS Release12.4XD. Customers who require C7200 VSA or VAM2+ support should
migrate to Cisco IOS Release 12.4(15)Tx.
Release Notes for Cisco 7000 Family for Cisco IOS Release 12.4XD
OL-10395-13 15
New and Changed Information
Note Beginning with Cisco IOS Release 12.4(4)XD7, the C7200 VSA and VAM2+ are no longer supported
on the Cisco IOS Release12.4XD. Customers who require C7200 VSA or VAM2+ support should
migrate to Cisco IOS Release 12.4(15)Tx.
The C7200 VSA (VPN Services Adapter) is a full-width service adapter supported in the I/O slot (slot 0)
of the Cisco 7204VXR and Cisco 7206VXR routers with the NPE-G2 processor.
Table 20 summarizes the features provided by the VSA.
Feature Description/Benefit
1
Throughput Performance to 960 Mbps encrypted throughput using 3DES
or AES on the Cisco 7204VXR and Cisco 7206VXR routers
Number of IPSec protected tunnels2 Up to 5000 tunnels
Number of tunnels per second Up to 85 tunnels per second
Hardware-based encryption Data protection: IPSec DES, 3DES, and AES
Authentication: RSA and Diffie-Hellman
Data integrity: SHA-1 and Message Digest 5 (MD5)
VPN tunneling IPsec tunnel mode; Generic Routing Encapsulation (GRE) and
Layer 2 Tunneling Protocol (L2TP) protected by IPSec
Minimum Cisco IOS software release 12.4(11)Tx
supported
Standards supported IPSec/IKE: RFCs 2401-2411, 2451
1. As measured with IPSec 3DES HMAC-SHA1 on 1400 byte packets.
2. Number of tunnels supported varies dependent of traffic throughput and the actual deployment topology.
Release Notes for Cisco 7000 Family for Cisco IOS Release 12.4XD
16 OL-10395-13
New and Changed Information
.
Table 21 Performance for VSA
For more information about the C7200 VSA, refer to the following Cisco documents:
• C7200 VSA (VPN Services Adapter) feature module at:
http://www.cisco.com/univercd/cc/td/doc/product/software/ios124/124newft/124t/124t6/index.htm
• C7200 VSA (VPN Services Adapter) Installation and Configuration Guide at:
http:/www.cisco.com/univercd/cc/td/doc/product/core/7200vx/portadpt/service/vsa/index.htm
Release Notes for Cisco 7000 Family for Cisco IOS Release 12.4XD
OL-10395-13 17
New and Changed Information
• Provides a cost-effective way to increase the slot density in parallel to the increased switching
capacity of the newest engine of the platform-the Cisco NPE-G2.
For more information about the Port Adapter Jacket Card, refer to the following Cisco document:
• Port Adapter Jacket Card Installation Guide at:
http://www.cisco.com/univercd/cc/td/doc/product/core/7200vx/72vxfru/8427j.htm
Note Beginning with Cisco IOS Release 12.4(4)XD7, the C7200 VSA and VAM2+ are no longer supported
on the Cisco IOS Release12.4XD. Customers who require C7200 VSA or VAM2+ support should
migrate to Cisco IOS Release 12.4(15)Tx.
As of Cisco IOS Release 12.4(4)XD1, support has been included for the VPN Acceleration Module 2+
(VAM2+) on the NPE-G2. VAM2+ is a single-width port adapter that features 128/192/256-bit
Advanced Encryption Standard (AES) in hardware, Data Encryption Standard (DES), Triple DES
(3DES), and IPv6 IPSec, providing increased performance for site-to-site and remote-access IPSec VPN
services. The Cisco VAM2+ provides hardware-assisted Layer 3 compression services with its
encryption services, conserving bandwidth and lowering network connection costs over secured links,
as well as full Layer 3 routing, quality of service (QoS), multicast and multiprotocol traffic, and broad
support of integrated LAN/WAN media.
Note Although VAM2 and VAM2+ are both supported on the NPE-G1, Cisco IOS Release 12.4 (4)XD
supports Cisco 7200 VXR series routers on the NPE-G2 only, and has not been tested against the
NPE-G1.
For more information about VAM2+, refer to the following Cisco documents:
• VPN Acceleration Module 2+ (VAM2+) feature module at:
http://www.cisco.com/univercd/cc/td/doc/product/software/ios123/123newft/123t/123t_11/ft_vam
2p.htm
• VAM2+ Installation and Configuration Guide at:
http://www.cisco.com/univercd/cc/td/doc/product/core/7200vx/portadpt/accelmod/vam2p/index.ht
m
Release Notes for Cisco 7000 Family for Cisco IOS Release 12.4XD
18 OL-10395-13
New and Changed Information
NPE-G2
Like the NPE-G1, the NPE-G2 provides the functionality of both a network processing engine and I/O
controller. If used without an I/O controller, an I/O blank panel must be in place.
While its design provides I/O controller functionality, it can also work with any I/O controller supported
in the Cisco 7200 VXR routers. The NPE-G2, when installed with an I/O controller, provides the
bootflash and NVRAM that the Cisco IOS software uses to boot.
Note An I/O controller can be used with the NPE-G2, but an I/O controller is not necessary for system
functionality. Installing an I/O controller in a chassis with the NPE-G2 activates the console and
auxiliary ports on the I/O controller and automatically disables the console and auxiliary ports the
NPE-G2. However, you can still use the CompactFlash Disk slots and Ethernet ports on both the NPE-G2
and I/O controller when both cards are installed.
The NPE-G2 maintains and executes the system management functions for the Cisco 7200 VXR routers
and also holds the system memory and environmental monitoring functions.
The NPE-G2 consists of one board with multiple interfaces. It can be used only in the Cisco 7200 VXR
routers.
The NPE-G2 can be used with the Port Adapter Jacket Card installed in the I/O controller slot. If you
are upgrading to an NPE-G2 and Port Adapter Jacket Card at the same time, refer to the Port Adapter
Jacket Card Installation Guide at the following URL for information about the order of installation of
both the NPE-G2 and the Port Adapter Jacket Card:
http://www.cisco.com/univercd/cc/td/doc/product/core/7200vx/72vxfru/8427j.htm
Cisco Quality ID
Cisco IOS Release 12.4(4)XD supports the Cisco Quality ID feature in Cisco transceivers (Gigabit
Interface Converter [GBIC] or small form factor pluggables [SFP]).
Release Notes for Cisco 7000 Family for Cisco IOS Release 12.4XD
OL-10395-13 19
New and Changed Information
The Cisco Quality ID feature primarily consists of the following components: 1) a unique encrypted code
in the GBIC module or SFP module which enables Cisco IOS to identify Cisco-pluggable parts, and 2)
the ability of Cisco IOS to enable only those ports populated with Cisco parts. The Cisco Quality ID
feature allows customers to have confidence that the GBIC modules or SFP modules being deployed are
certified to be compatible with the Cisco network device in which they are being deployed.
Release Notes for Cisco 7000 Family for Cisco IOS Release 12.4XD
20 OL-10395-13
New and Changed Information
USB Storage
Storing on USB Flash Memory Modules
The NPE-G2 provides two USB ports that can be used with USB Flash memory modules as secondary
storage, similar to CompactFlash Disks. The USB Flash memory modules can be used to store Cisco IOS
images, data, and configuration files. The Cisco USB Flash memory module is nonsecure, compared to
the USB eToken, which is a secure memory module.
Release Notes for Cisco 7000 Family for Cisco IOS Release 12.4XD
OL-10395-13 21
MIBs
MIBs
To locate and download MIBs for selected platforms, Cisco IOS releases, and feature sets, use Cisco
MIB Locator found at the following URL:
http://tools.cisco.com/ITDIT/MIBS/servlet/index
If Cisco MIB Locator does not support the MIB information that you need, you can also obtain a list of
supported MIBs and download MIBs from the Cisco MIBs page at the following URL:
http://www.cisco.com/public/sw-center/netmgmt/cmtk/mibs.shtml
To access Cisco MIB Locator, you must have an account on Cisco.com. If you have forgotten or lost your
account information, send a blank e-mail to cco-locksmith@cisco.com. An automatic check will verify
that your e-mail address is registered with Cisco.com. If the check is successful, account details with a
new random password will be e-mailed to you. Qualified users can establish an account on Cisco.com
by following the directions found at this URL:
http://tools.cisco.com/RPF/register/register.do
The C7200 VSA supports the following MIBs:
• CISCO-IPSEC-FLOW-MONITOR-MIB
• CISCO-IPSEC-MIB
• CISCO-IPSEC-POLICY-MAP-MIB
Release Notes for Cisco 7000 Family for Cisco IOS Release 12.4XD
22 OL-10395-13
Limitations and Restrictions
Note Beginning with Cisco IOS Release 12.4(4)XD7, the C7200 VSA and VAM2+ are no longer supported
on the Cisco IOS Release12.4XD. Customers who require C7200 VSA or VAM2+ support should
migrate to Cisco IOS Release 12.4(15)Tx.
Note Only Cisco 7200VXR series routers with the NPE-G2 processor are supported.
• The VSA module does not support Online Insertion and Removal (OIR).
The VSA boots only during system initialization. The VSA will not work if it is inserted after the
system is up and running. The VSA can be shut down by a disabling CLI command. The VSA is
ready for removal after the disabling CLI command is executed.
• No per packet show access-list packet count details for crypto map ACL are displayed when the
show access-list command is entered.
Use other counters, such as the output from the show crypto ipsec sa, show crypto engine
accelerator statistics 0, and show crypto engine conn act commands, to determine if the VSA is
processing the packets.
• VSA does not support IPPCP compression.
• VSA supports a maximum anti-replay window size of 512.
Note Beginning with Cisco IOS Release 12.4(4)XD7, the C7200 VSA and VAM2+ are no longer supported
on the Cisco IOS Release12.4XD. Customers who require C7200 VSA or VAM2+ support should
migrate to Cisco IOS Release 12.4(15)Tx.
Release Notes for Cisco 7000 Family for Cisco IOS Release 12.4XD
OL-10395-13 23
Caveats for Cisco IOS Release 12.4XD
Note If you have an account on Cisco.com, you can also use the Bug Toolkit to find select caveats of any
severity. To reach the Bug Toolkit, log in to Cisco.com and click Products and Services > Cisco IOS
Software > Cisco IOS Software Releases 12.2 Mainline> Troubleshoot and Alerts > Bug Toolkit.
Another option is to go to http://www.cisco.com/cgi-bin/Support/Bugtool/launch_bugtool.pl. (If the
defect that you have requested cannot be displayed, this may be due to one or more of the following
reasons: the defect number does not exist, the defect does not have a customer-visible description yet,
or the defect has been marked Cisco Confidential.)
The Dictionary of Internetworking Terms and Acronyms contains definitions of acronyms that are not
defined in this document:
http://www.cisco.com/univercd/cc/td/doc/cisintwk/ita/index.htm.
Software Release
12.4(4)XD
DDTS Number Caveat Resolved Caveat Open
CSCdy80322 12.4(4)XD8 12.4(4)XD8
CSCea58000 12.4(4)XD6 12.4(4)XD6
CSCec10149 12.4(4)XD11 No
CSCec12299 12.4(4)XD7 12.4(4)XD7
CSCec77703 12.4(4)XD12
CSCed57504 12.4(4)XD7 12.4(4)XD7
CSCef93594 12.4(4)XD12
CSCeg87396 12.4(4)XD8 12.4(4)XD8
CSCeh52502 12.4(4)XD3 12.4(4)XD3
CSCej21681 12.4(4)XD3 12.4(4)XD3
CSCej27827 12.4(4)XD10 12.4(4)XD10
CSCej44509 12.4(4)XD7 12.4(4)XD
CSCej83614 12.4(4)XD8 12.4(4)XD8
CSCek26492 12.4(4)XD2 12.2(4)XD2
CSCek28689 No 12.4(4)XD3
Release Notes for Cisco 7000 Family for Cisco IOS Release 12.4XD
24 OL-10395-13
Caveats for Cisco IOS Release 12.4XD
Software Release
12.4(4)XD
DDTS Number Caveat Resolved Caveat Open
CSCek34097 12.4(4)XD11 No
CSCek40085 12.4(4)XD2 12.4(4)XD
CSCek42751 12.4(4)XD11 No
CSCek43101 12.4(4)XD2 12.4(4)XD1
CSCek43732 12.4(4)XD8 12.4(4)XD8
CSCek44895 No 12.4(4)XD2
CSCek46234 12.4(4)XD11 No
CSCek48252 No 12.4(4)XD3
CSCek50177 12.4(4)XD8 12.4(4)XD8
CSCek50994 No 12.4(4)XD3
CSCek51696 No 12.4(4)XD3
CSCek51702 12.4(4)XD5 12.2(4)XD5
CSCek52673 12.4(4)XD11 No
CSCek53837 No 12.4(4)XD3
CSCek53865 No 12.4(4)XD3
CSCek53980 No 12.4(4)XD3
CSCek54071 No 12.4(4)XD3
CSCek54073 No 12.4(4)XD3
CSCek54331 No 12.4(4)XD3
CSCek55486 12.4(4)XD7 12.4(4)XD7
CSCek56991 12.4(4)XD4 12.4(4)XD3
CSCek58542 12.4(4)XD8 12.4(4)XD8
CSCek61276 12.4(4)XD8 12.4(4)XD8
CSCek68014 12.4(4)XD6 12.4(4)XD6
CSCek71805 12.4(4)XD8 12.4(4)XD8
CSCek73386 12.4(4)XD8 12.4(4)XD8
CSCek75633 12.4(4)XD8 12.4(4)XD8
CSCek75931 12.4(4)XD11 No
CSCek76933 No 12.4(4)XD8
CSCek77866 No 12.4(4)XD8
CSCir00018 12.4(4)XD5 12.4(4)XD5
CSCin78805 12.4(4)XD12
CSCsa55031 12.4(4)XD11 No
CSCsa86801 12.4(4)XD12
Release Notes for Cisco 7000 Family for Cisco IOS Release 12.4XD
OL-10395-13 25
Caveats for Cisco IOS Release 12.4XD
Software Release
12.4(4)XD
DDTS Number Caveat Resolved Caveat Open
CSCsb08386 12.4(4)XD10 12.4(4)XD10
CSCsb15164 12.4(4)XD11 No
CSCsb25337 12.4(4)XD2 12.4(4)XD2
CSCsb40304 12.4(4)XD5 12.4(4)XD5
CSCsb42470 12.4(4)XD3 12.4(4)XD3
CSCsb52717 12.4(4)XD3 12.4(4)XD3
CSCsb55483 12.4(4)XD4 12.4(4)XD4
CSCsb58590 12.4(4)XD3 12.4(4)XD3
CSCsb78345 12.4(4)XD10 12.4(4)XD10
CSCsb82123 12.4(4)XD4 12.4(4)XD4
CSCsb93407 12.4(4)XD3 12.4(4)XD3
CSCsc22696 No 12.4(4)XD3
CSCsc64217 12.4(4)XD10 12.4(4)XD10
CSCsc70114 12.4(4)XD11 No
CSCsc72722 No 12.4(4)XD3
CSCsc77704 12.4(4)XD12
CSCsc86307 12.4(4)XD11 No
CSCsc97727 12.4(4)XD10 12.4(4)XD10
CSCsc98725 12.4(4)XD3 12.4(4)XD3
CSCsd13899 No 12.4(4)XD3
CSCsd24183 12.4(4)XD7 12.4(4)XD7
CSCsd24814 No 12.4(4)XD1
CSCsd28214 12.4(4)XD8 12.4(4)XD8
CSCsd38693 No 12.4(4)XD8
CSCsd39684 No 12.4(4)XD1
CSCsd42053 12.4(4)XD8 12.4(4)XD8
CSCsd42073 No 12.4(4)XD
CSCsd44501 12.4(4)XD3 12.4(4)XD2
CSCsd53289 No 12.4(4)XD1
CSCsd58381 12.2(4)XD2 12.2(4)XD2
CSCsd59381 12.4(4)XD12
CSCsd62214 No 12.4(4)XD1
CSCsd75854 12.4(4)XD8 12.4(4)XD8
CSCsd89790 No 12.4(4)XD2
Release Notes for Cisco 7000 Family for Cisco IOS Release 12.4XD
26 OL-10395-13
Caveats for Cisco IOS Release 12.4XD
Software Release
12.4(4)XD
DDTS Number Caveat Resolved Caveat Open
CSCsd91454 12.4(4)XD5 12.4(4)XD5
CSCsd92405 12.4(4)XD5 12.4(4)XD5
CSCse05642 12.4(4)XD4 12.4(4)XD4
CSCse07013 No 12.4(4)XD3
CSCse09256 No 12.4(4)XD5/12.4(4)XD6
CSCse17976 No 12.4(4)XD2
CSCse18854 No 12.4(4)XD2
CSCse19109 No 12.4(4)XD2
CSCse23502 No 12.4(4)XD3
CSCse24889 12.4(4)XD8 12.4(4)XD8
CSCse51820 12.4(4)XD3 12.4(4)XD3
CSCse53002 12.4(4)XD3 12.4(4)XD3
CSCse56501 12.4(4)XD7 12.4(4)XD7
CSCse56800 12.4(4)XD10 No
CSCse58419 12.4(4)XD8 12.4(4)XD8
CSCse66625 12.4(4)XD6 12.4(4)XD6
CSCse68138 12.4(4)XD4 12.4(4)XD4
CSCse69102 12.4(4)XD3 12.4(4)XD3
CSCse73065 No 12.4(4)XD3
CSCse79443 No 12.4(4)XD1
CSCse81609 No 12.4(4)XD2
CSCse85068 No 12.4(4)XD2
CSCse85329 12.4(4)XD8 12.4(4)XD8
CSCse93621 12.4(4)XD11 No
CSCsf04754 12.4(4)XD3 12.4(4)XD3
CSCsf05474 No 12.4(4)XD3
CSCsf05718 No 12.4(4)XD3
CSCsf06323 12.4(4)XD3 12.4(4)XD3
CSCsf12577 No 12.4(4)XD3
CSCsf16469 No 12.4(4)XD8
CSCsf25106 12.4(4)XD4 12.4(4)XD4
CSCsf28840 12.4(4)XD5 12.4(4)XD5
CSCsf32623 12.4(4)XD4 12.4(4)XD4
CSCsf33015 12.4(4)XD5 12.4(4)XD3
Release Notes for Cisco 7000 Family for Cisco IOS Release 12.4XD
OL-10395-13 27
Caveats for Cisco IOS Release 12.4XD
Software Release
12.4(4)XD
DDTS Number Caveat Resolved Caveat Open
CSCsf97252 No 12.4(4)XD3
CSCsg00102 12.4(4)XD11 No
CSCsg01964 12.4(4)XD4 12.4(4)XD3
CSCsg05375 12.4(4)XD4 12.4(4)XD4
CSCsg06794 No 12.4(4)XD4
CSCsg11150 No 12.4(4)XD5/12.4(4)XD6
CSCsg16186 12.4(4)XD5 12.4(4)XD4
CSCsg16908 12.4(4)XD4 12.4(4)XD4
CSCsg18075 12.4(4)XD5 12.4(4)XD5
CSCsg23462 12.4(4)XD5 12.4(4)XD5
CSCsg31742 12.4(4)XD4 12.4(4)XD4
CSCsg38143 No 12.4(4)XD4
CSCsg40482 12.4(4)XD7 12.4(4)XD7
CSCsg43916 12.4(4)XD9 12.4(4)XD8
CSCsg48725 12.4(4)XD8 12.4(4)XD8
CSCsg51538 12.4(4)XD7 12.4(4)XD7
CSCsg55591 12.4(4)XD8 12.4(4)XD8
CSCsg58391 12.4(4)XD8 12.4(4)XD8
CSCsg59037 12.4(4)XD8 12.4(4)XD8
CSCsg65169 12.4(4)XD11 No
CSCsg69458 12.4(4)XD7 12.4(4)XD7
CSCsg76715 12.4(4)XD7 12.4(4)XD7
CSCsg81961 12.4(4)XD8 12.4(4)XD8
CSCsg84732 12.4(4)XD8 12.4(4)XD8
CSCsg86048 12.4(4)XD6 12.4(4)XD5
CSCsg89647 12.4(4)XD6 12.4(4)XD5
CSCsg91306 12.4(4)XD10 No
CSCsg92743 12.4(4)XD8 12.4(4)XD8
CSCsg95813 12.4(4)XD7 12.4(4)XD7
CSCsh02315 12.4(4)XD8 12.4(4)XD8
CSCsh30855 12.4(4)XD7 12.4(4)XD7
CSCsh30863 12.4(4)XD8 12.4(4)XD8
CSCsh48919 12.4(4)XD11 No
CSCsh70906 12.4(4)XD8 12.4(4)XD8
Release Notes for Cisco 7000 Family for Cisco IOS Release 12.4XD
28 OL-10395-13
Caveats for Cisco IOS Release 12.4XD
Software Release
12.4(4)XD
DDTS Number Caveat Resolved Caveat Open
CSCsh71247 12.4(4)XD8 12.4(4)XD8
CSCsh89164 12.4(4)XD12
CSCsh90413 12.4(4)XD7 12.4(4)XD7
CSCsi09530 12.4(4)XD8 12.4(4)XD8
CSCsi13344 12.4(4)XD12
CSCsi15195 12.4(4)XD7 12.4(4)XD7
CSCsi17113 No 12.4(4)XD7
CSCsi20225 12.4(4)XD8 12.4(4)XD8
CSCsi25540 No 12.4(4)XD7
CSCsi27015 No 12.4(4)XD8
CSCsi32334 No 12.4(4)XD8
CSCsi53716 12.4(4)XD8 12.4(4)XD8
CSCsi53827 12.4(4)XD10 12.4(4)XD8
CSCsi54780 12.4(4)XD8 12.4(4)XD8
CSCsi56413 12.4(4)XD10 12.4(4)XD10
CSCsi58461 12.4(4)XD12
CSCsi62406 12.4(4)XD9 12.4(4)XD8
CSCsi68543 12.4(4)XD12
CSCsi78118 12.4(4)XD8 12.4(4)XD8
CSCsi82427 12.4(4)XD8 12.4(4)XD8
CSCsi90974 12.4(4)XD11 No
CSCsi96149 12.4(4)XD8 12.4(4)XD8
CSCsi98120 12.4(4)XD9 12.4(4)XD9
CSCsi99217 12.4(4)XD8 12.4(4)XD8
CSCsj07936 12.4(4)XD8 12.4(4)XD8
CSCsj13380 12.4(4)XD8 12.4(4)XD8
CSCsj17304 No 12.4(4)XD8
CSCsj25395 12.4(4)XD9 12.4(4)XD9
CSCsj27963 12.4(4)XD11 No
CSCsj52491 No 12.4(4)XD8
CSCsj68052 12.4(4)XD9 12.4(4)XD9
CSCsj85065 12.4(4)XD11 No
CSCsj99980 12.4(4)XD10 12.4(4)XD10
CSCsk02368 No 12.4(4)XD8
Release Notes for Cisco 7000 Family for Cisco IOS Release 12.4XD
OL-10395-13 29
Caveats for Cisco IOS Release 12.4XD
Software Release
12.4(4)XD
DDTS Number Caveat Resolved Caveat Open
CSCsk04350 12.4(4)XD11 No
CSCsk09735 12.4(4)XD11 No
CSCsk19565 12.4(4)XD11 No
CSCsk23972 12.4(4)XD11 No
CSCsk25697 12.4(4)XD11 No
CSCsk32150 12.4(4)XD10 12.4(4)XD10
CSCsk40413 12.4(4)XD9 12.4(4)XD9
CSCsk62253 12.4(4)XD11
CSCsk65796 12.4(4)XD9 12.4(4)XD9
CSCsk66240 12.4(4)XD11 No
CSCsk73104 12.4(4)XD10 12.4(4)XD10
CSCsk88637 12.4(4)XD10 12.4(4)XD10
CSCsl34280 12.4(4)XD10 12.4(4)XD10
CSCsl34481 12.4(4)XD11 No
CSCsl47915 12.4(4)XD11 No
CSCsl59294 12.4(4)XD11 No
CSCsl62609 12.4(4)XD11 No
CSCsl69445 12.4(4)XD11 No
CSCsl96254 12.4(4)XD11 No
CSCsm34361 12.4(4)XD11 No
CSCsm61105 12.4(4)XD11 No
CSCsm66688 12.4(4)XD11 No
CSCsm77199 12.4(4)XD11 No
CSCso21611 12.4(4)XD11 No
CSCso97927 12.4(4)XD12
CSCsq13348 12.4(4)XD11 No
CSCsq44013 12.4(4)XD11 No
CSCsq50944 12.4(4)XD12
CSCsq62976 12.4(4)XD11 No
CSCsq88866 12.4(4)XD12
CSCsr08094 12.4(4)XD12
CSCsr15607 12.4(4)XD11 No
CSCsr27960 12.4(4)XD12
CSCsr53390 12.4(4)XD12
Release Notes for Cisco 7000 Family for Cisco IOS Release 12.4XD
30 OL-10395-13
Caveats for Cisco IOS Release 12.4XD
Software Release
12.4(4)XD
DDTS Number Caveat Resolved Caveat Open
CSCsr70035 12.4(4)XD11 No
CSCsr73973 12.4(4)XD12
CSCsr74835 12.4(4)XD12
CSCsr97753 12.4(4)XD11 No
CSCsu35475 12.4(4)XD12
CSCsu47128 12.4(4)XD12
CSCsu97934 12.4(4)XD12
CSCsv04836 12.4(4)XD12
CSCsv67618 12.4(4)XD12
CSCsv75974 12.4(4)XD12
CSCsv91602 12.4(4)XD12
CSCsx44223 12.4(4)XD12
Release Notes for Cisco 7000 Family for Cisco IOS Release 12.4XD
OL-10395-13 31
Caveats for Cisco IOS Release 12.4XD
This condition is observed when the LNS sets the Priority bit for all the LCP packets using
l2tp_fixup_l2tp_header. The Priority bit should only be set if the packet has been marked as
PAK_PRIORITY_CRUCIAL.
Workaround: There is no known workaround.
• CSCin78805
The VCs are made INACTIVE.
This condition is observed when the Auto VC is configured as part of range on point-to-point
sub-interface.
Workaround: There is no known workaround.
• CSCsa86801
Alignment errors or a crash may occur while changing route-map configuration.
This condition is observed when the route-map command is configured in the global configurations
mode resulting in traceback messages.
Workaround: There is no known workaround.
• CSCsc77704
A Cisco router may become inaccessible via console or telnet. Router must be reloaded to recover.
Workaround: There is no known workaround.
• CSCsd59381
Accessing the secondary disk or disk2 device by IOS results in the following error message:
%Error opening disk2:/ (No such device)
This condition is observed on c7200 platform with an NPE-G2 processor card that is running an IOS
image with the fix for CSCec77703.
Workaround: There is no known workaround.
• CSCsh89164
ARP table is accessed at interrupt level which is forbidden resulting in an error message on the
console.
This condition is observed when shutdown and no shutdown command is issued on serial interface
with lapb encapsulation.
Workaround: There is no known workaround.
• CSCsi58461
A router may crash in an IOS boot helper image during system bootup.
This condition is observed when the router with a dedicated PPP connection (a leased line) to
another active system is loading and booting up its regular image.
The router must be configured to autoboot with a "boot helper" image. Additionally, the system must
have an active serial line, configured for PPP encapsulation, with Multilink enabled. The Multilink
connected to a remote system that actively attempts to negotiate PPP (with Multilink) while the local
router is booting. This issue has only been observed on a 7200VXR NPE-G2 system (the "c7200p"
series of routers)
Workaround: You can use one of the following two methods:
– Deactivate the serial connection to router while the bootup is performed.
Release Notes for Cisco 7000 Family for Cisco IOS Release 12.4XD
32 OL-10395-13
Caveats for Cisco IOS Release 12.4XD
– Delete the boot bootldr command from the configuration if there is no some special
requirement to use custom boot helper image. This will allow the router boot using its default
boot image (the image contained in its boot ROM) and avoid this issue.
• CSCsi68543
If TLS is deconfigured and reactivated, the corresponding ethernet interface fails to set to
promiscuous mode.
This condition is observed when an originally configured TLS is deconfigured and reactivated.
Workaround: Do not disable the TLS once it is enabled.
• CSCso97927
The performance of Cisco 7200 router is affected during OIR operation due to high CPU utilization.
This condition is observed when OIR operation is performed on Cisco 7200 router.
Workaround: There is no known workaround.
• CSCsq50944
Traceback message is displayed when a user enters a password greater than the max limit while
performing filesystem operations.
This condition is observed when a password of more than 16 characters long is entered due to
incorrect handling of password field.
Workaround: There is no known workaround.
• CSCsq88866
Following a crash, the Cisco 7200 router prints junk on the console. Power cycle is required to
reboot the router to working state.
This condition is observed on NPE-G2 if the crash occurs while console logging enabled.
Workaround: Disable console logging.
• CSCsr08094
The L2TP control packets that should be dropped as "udp checksum error" are dropped with some
other reason. The VPDN process is ignoring udp checksum configuration of the L2TP control
packet.
This condition is observed when L2TP control packets are configured using vpdn ip udp ignore
checksum command.
Workaround: There is no known workaround.
• CSCsr27960
Traceback messages is displayed while configuring the credentials CLI.
This condition is observed when the user configures a username with more than 32 characters in the
credentials CLI.
Workaround: There is no known workaround.
• CSCsr53390
The onboard Gigabit ethernet ports on the NPE-G2, with flow control enabled, fails to send pause
frames on experiencing a resource problem. However, the ethernet ports continue to receive pause
frames and function accordingly.
This condition is observed when flow control is enabled on the NPE-G2 Gigabit ethernet ports.
Workaround: There is no known workaround.
Release Notes for Cisco 7000 Family for Cisco IOS Release 12.4XD
OL-10395-13 33
Caveats for Cisco IOS Release 12.4XD
• CSCsr73973
The output of Show controller gig0/<x> command returns negative value in the tx_end_count
counter.
This condition is observed in Native gig ports in Cisco 7200 router with NPE-G2 processor due to
continuous traffic flow.
Workaround: There is no known workaround.
• CSCsr74835
Potential overflow of the destination buffer due to unspecified bounding length.
Workaround: There is no known workaround.
• CSCsu35475
The output queue of a gigabit interface on a NPE-G1 hangs after removing a two level policy-map.
This condition is observed on a NPE-G1 after removing a two level service policy where the first
level was shaping the traffic and at the second level it had LLQ and CBWFQ.
Workaround: Perform shut/no shut operation on the physical interface using shutdown and no
shutdown command to solve this issue.
• CSCsu47128
The following error message appears repeatedly in the logs:
%SYS-2-INTSCHED: 'idle' at level 4 -Process= "Virtual Exec"
This condition is observed when a user run reload command in IOS.
Workaround: There is no known workaround.
• CSCsu97934
The NPE-G1 is crashing after pppoe_sss_holdq_enqueue function.
Workaround: Enter the deb pppoe error command to solve this issue.
• CSCsv04836
Multiple Cisco products are affected by denial of service (DoS) vulnerabilities that manipulate the
state of Transmission Control Protocol (TCP) connections. By manipulating the state of a TCP
connection, an attacker could force the TCP connection to remain in a long-lived state, possibly
indefinitely. If enough TCP connections are forced into a long-lived or indefinite state, resources on
a system under attack may be consumed, preventing new TCP connections from being accepted. In
some cases, a system reboot may be necessary to recover normal system operation. To exploit these
vulnerabilities, an attacker must be able to complete a TCP three-way handshake with a vulnerable
system.
In addition to these vulnerabilities, Cisco Nexus 5000 devices contain a TCP DoS vulnerability that
may result in a system crash. This additional vulnerability was found as a result of testing the TCP
state manipulation vulnerabilities.
Cisco has released free software updates for download from the Cisco website that address these
vulnerabilities. Workarounds that mitigate these vulnerabilities are available.
This advisory is posted at http://www.cisco.com/warp/public/707/cisco-sa-20090908-tcp24.shtml.
• CSCsv67618
The sh ip bgp vpnv4 all command does not show all the routes in routing table.
This condition is observed on c7200 with 12.4(15)T8.fc2 image.
Workaround: There is no known workaround.
Release Notes for Cisco 7000 Family for Cisco IOS Release 12.4XD
34 OL-10395-13
Caveats for Cisco IOS Release 12.4XD
• CSCsv75974
The show atm int atm command does not show increments in out drop when packets are dropped
due to traffic shaping.
This condition is observed due to high traffic rate on an ATM interface with traffic shaping enabled.
Workaround: There is no known workaround.
• CSCsv91602
Cisco 7201 router with Gi0/3 experiences communication failure.
Workaround: Perform a shut/no shut operation on the Gi0/3 using shutdown and no shutdown
command. This may solve the problem.
• CSCsx44223
Packet loss occurs due to IP checksum error if MPF supported image is used.
This condition is observed if a lot of IPv6 Multicast Packets are received and MPF supported image
is in use.
Workaround: Use non MPF supported image.
Release Notes for Cisco 7000 Family for Cisco IOS Release 12.4XD
OL-10395-13 35
Caveats for Cisco IOS Release 12.4XD
Deconfiguring a member interface from a multilink bundle and adding it to another multilink bundle
results in continuos error message.
Workaround: There is no known workaround.
• CSCek52673
A single UDP packet sent to port 67 caused the router to reload.
This condition is observed when a router that has DHCP server enabled receives a malformed UDP
packet.
Workaround: There is no known workaround.
• CSCek75931
The router may experience CPUHOG condition.
This condition is observed when more than 2000 sessions are established on the router.
Workaround: There is no known workaround.
• CSCsa55031
The router shows high CPU utilization resulting in impact on router performance.
This condition is observed when Turbo ACL is enabled resulting in repeated Turbo ACL
compilations.
Workaround: There is no known workaround.
• CSCsb15164
The router permits unauthorized packets even when these packets are denied in the standard Access
List.
This condition is observed when the order of ACL entries for permitting and denying packets are
reordered. As a result, the permit entry may be placed above the deny entry.
Workaround: Use extended ACLs.
• CSCsc70114
Router crashes when NAT entries time out.
This condition is observed on routers running 12.4(3) configured with VRF and NAT using
route-map.
Workaround: There is no known workaround.
• CSCsc86307
The router crashes due to bus error.
This condition is observed on executing show interface command.
Workaround: There is no known workaround.
• CSCse93621
ISDN B-channel is not brought to in-service state after sending restart acknowledgement
(RESTART ACK).
Workaround: Use BCAC feature to bring channel service state in sync with peer.
• CSCsg65169
The router gives data path error.
The reason for this condition is not known.
Workaround: There is no known workaround.
Release Notes for Cisco 7000 Family for Cisco IOS Release 12.4XD
36 OL-10395-13
Caveats for Cisco IOS Release 12.4XD
• CSCsh48919
A router with an ATA flash card failed when the dir disk_name0: command was executed.
This condition is observed when the router has a removable flash card (such as an ATA flash car or
CF card) that is formatted to use DOSFS and the file or directory name stored on disk contains
embedded spaces.
Workaround: Remove or rename all files and directories having names with embedded spaces.
• CSCsi90974
MPF drops all traffic for a particular client on the network while the traffic for other clients remains
consistent.
This condition is observed due to incorrect MPF RPF and adjancency entries.
Workaround: You can implement the following workarounds:
– Unload/reload MPF software module.
– Reboot the system
– Execute clear adjacency command to purge old MPF adjacencies and reinstall the current
existing ones.
• CSCsj27963
A router running Cisco IOS may show the following error when performing a "write memory"
operation:
%SYS-4-NV_BLOCK_INITFAIL: Unable to initialize the geometry of nvram
This condition is observed when the size of configuration is greater than the size of NVRAM.
Workaround: You can implement one of the following workarounds:
– Use service compress-config command to compress the configuration before 'write memory'
operation.
– Erase the nvram, unconfigure configurations to fit them into nvram, and issue write memory
operation. Repeat these steps until this error is resolved.
– Save the configuration to another file system other than nvram.
– If the router is reloaded, use write erase command to reinitialise nvram and allow write memory
operation.
• CSCsj85065
The router crashes while processing an SSL packet.
This condition is observed during the termination of an SSL-based session. The offending packet is
not malformed and is normally received as part of the packet exchange.
Workaround: Cisco has released free software updates that address this vulnerability. Apart from
disabling affected services, there are no available workaround to resolve problem.
This advisory is posted at http://www.cisco.com/warp/public/707/cisco-sa-20080924-ssl.shtml.
• CSCsk04350
The router takes too many CPU cycles to print the syslog messages to the system console.
This condition is observed when burst L2TP LNS session authentication fails and the vpdn logging
global configuration is enabled.
Release Notes for Cisco 7000 Family for Cisco IOS Release 12.4XD
OL-10395-13 37
Caveats for Cisco IOS Release 12.4XD
Workaround: Disable system console logging using the no logging console global configuration
command.
• CSCsk09735
A router crashes when the mkdir .../.../ EXEC command is executed, followed by reload EXEC and
show file system EXEC command.
This condition is observed on a router that runs Cisco IOS software using a storage device that is
formatted with the DOS file system.
Workaround: Avoid creating a subdirectory with "." characters.
• CSCsk19565
The ipv6 traffic-filter command may not work on multiple subinterfaces on a router.
This condition is observer when ipv6 traffic-filter command is used to deny multicast packets out
of multiple subinterfaces under the same physical interface.
Workaround: Disable and re-enable ipv6 cef.
• CSCsk23972
A router running an IOS image may stop accepting incoming TELNET connections.
This condition is observed when 20 or more VRFs are configured on a router and each VRF has
incoming TCP connection requests arriving at the host for non-existing services from different
VRFs.
Workaround: Follow the following steps to resolve this problem:
– Use show tcp brief all command to view TCB that have local and foreign addresses as "*.*",
and
– Clear those entries using the clear tcp tcb address of the TCB command.
• CSCsk25697
A router with DNS server configured may show CPUHOG tracebacks when it receives repeated
crafted UDP packets to its port 53.
This condition is observed when DNS server is not configured on the router to listen to UDP port 53.
Workaround: Apply rate limit to port 53 to interfaces facing untrusted networks using the following
commands:
access-list 100 permit udp any any eq domain
access-list 100 deny ip any any
interface GigabitEthernet0/0
ip address 10.2.2.2 255.255.255.0
rate-limit input access-group 100 8000 1500 2000 conform-action transmit
exceed-action drop
• CSCsk62253
Cisco IOS software contains two vulnerabilities within the Cisco IOS WebVPN or Cisco IOS
SSLVPN feature (SSLVPN) that can be remotely exploited without authentication to cause a denial
of service condition. Both vulnerabilities affect both Cisco IOS WebVPN and Cisco IOS SSLVPN
features:
1. Crafted HTTPS packet will crash device - Cisco Bug ID CSCsk62253.
2. SSLVPN sessions cause a memory leak in the device - Cisco Bug ID CSCsw24700.
Cisco has released free software updates that address these vulnerabilities. There is no known
workaround that mitigate these vulnerabilities. This advisory is posted at the following link:
http://www.cisco.com/warp/public/707/cisco-sa-20090325-webvpn.shtml
Release Notes for Cisco 7000 Family for Cisco IOS Release 12.4XD
38 OL-10395-13
Caveats for Cisco IOS Release 12.4XD
• CSCsk66240
An error message is received on the ingress PE. Sample message:
*Mar 10 23:48:12.395: %BGP-3-INVALID_MPLS: Invalid MPLS label (3)
received in update for prefix 1:1:10.254.5.0/24 from 10.100.1.5
*Mar 10 23:48:51.743: %BGP-3-INVALID_MPLS: Invalid MPLS label (3)
received in update for prefix 1:1:10.254.2.1/32 from 10.100.1.5
This condition is observed with the following network configuration:
– A CE (CE1) is connected to an ingress PE (PE1), and
– The ingress PE is connected to a router reflector, and
– The router reflector is connected to other two (egress) PEs (PE2a and PE2b), and
– Both the egresses PEs are connected to the same CE (CE2).
When the link flaps between one of these two PEs and the CE (CE2) the error message is generated.
Workaround: There is no known workaround.
• CSCsl34481
Router crashes due to IPv6 multicast routing.
This condition is observed on applying/removing multicast routing configurations.
Workaround: There is no known workaround.
• CSCsl47915
Redistribution from OSPF into RIP using a route map based on a prefix list may not work for some
routes. The show ip route network command shows that a network is not advertised by RIP.
This condition is observed when the prefix list is changed. The RIP database is not updated with the
new network that was added to the prefix list.
Workaround: Issue the clear ip route network command.
• CSCsl59294
A Cisco router may see the following error shortly after bootup:
*Nov 21 15:16:28 CDT: %DATACORRUPTION-1-DATAINCONSISTENCY: copy error, -PC=
0x416DE178 -Traceback= 0x412593C0 0x41276250 0x412947F4 0x416DE178
0x416DE650 0x423E303C 0x423E3020 *Nov 21 15:16:28 CDT:
%DATACORRUPTION-1-DATAINCONSISTENCY: copy error, -PC= 0x416DE188
-Traceback= 0x412593C0 0x41276250 0x412947F4 0x416DE188 0x416DE650
0x423E303C 0x423E3020
This condition is observed Cisco router running Cisco IOS Release 12.4(13d).
Workaround: Use the following commands to disable configuration on the router:
– voice hpi capture buffer size
– voice hpi capture destination filename
• CSCsl62609
The Session Initiation Protocol (SIP) implementation in Cisco IOS could be exploited remotely to
trigger a memory leak or reload the IOS device.
Cisco has released free software updates that address these vulnerabilities. Fixed Cisco IOS
software listed in the Software versions and fixes section contains fixes for all vulnerabilities
addressed in this advisory.
Workaround: There are no known workaround.
This advisory is posted at http://www.cisco.com/warp/public/707/cisco-sa-20080924-sip.shtml
Release Notes for Cisco 7000 Family for Cisco IOS Release 12.4XD
OL-10395-13 39
Caveats for Cisco IOS Release 12.4XD
• CSCsl69445
The attribute, containedIn, returns zero as value for chassis and module components.
This condition is observed only on Cisco 7201 routers.
Workaround: There is no known workaround.
• CSCsl96254
If an EIGRP distribute-list applied to an interface allows a route, the route will be installed into the
routing table without verifying the global distribute-list.
This condition is observed when a router has a running EIGRP with interface distribute lists and a
global distribute list.
Workaround: Apply the global distribute list to each interface distribute list.
• CSCsm34361
TCP ports may not show open during port scanning using NMAP.
This condition is observed on a Cisco 7200 router.
Workaround: There is no workaround.
• CSCsm61105
The router crashes due to bus error on removing virtual-template interfaces under ATM.
This condition is observed when there are approximately 3000 PPPoE and PPPoEoA sessions open
and the no interface virtual-template number command is executed repeatedly under ATM
interfaces:
Workaround: There is no workaround.
• CSCsm66688
The router crashes due to watchdog timeout or hangs.
This condition is observed when:
– The turbo-ACL is enabled. (indicating that ip access-list compiled or ip access-list compiled
reuse commands are enabled)
– The QoS and/or ACL configuration is modified.
Workaround: Disable turbo-ACL using either ip access-list compiled or ip access-list compiled
reuse command.
• CSCsm77199
For a router with HTTP secure server capability, the switch shows the following error message:
"%DATACORRUPTION-1-DATAINCONSISTENCY: copy error"
This condition is observed when ip http server is configured.
Workaround: Use the no ip http server command to disable HTTP server.
• CSCso21611
The router crashes due to memory allocation issue.
This conditions is observed on Cisco 7200 routers.
Workaround: There is no known workaround.
• CSCsq13348
Release Notes for Cisco 7000 Family for Cisco IOS Release 12.4XD
40 OL-10395-13
Caveats for Cisco IOS Release 12.4XD
The Cisco IOS Intrusion Prevention System (IPS) feature contains a vulnerability in the processing
of certain IPS signatures that use the SERVICE.DNS engine. This vulnerability may cause a router
to crash or hang, resulting in a denial of service condition.
Cisco has released free software updates that address this vulnerability. There is a workaround for
this vulnerability.
This advisory is posted at http://www.cisco.com/warp/public/707/cisco-sa-20080924-iosips.shtml.
Note This vulnerability is not related in any way to CVE-2008-1447 - Cache poisoning attacks. Cisco Systems
has published a Cisco Security Advisory for that vulnerability, which can be found at
http://www.cisco.com/en/US/products/products_security_advisory09186a00809c2168.shtml.
• CSCsq44013
The CPE does not reply to the DNS query from the client for the first attempt, the first response is
being dropped.
This condition is observed on a router running 12.4T IOS image configured with Split DNS.
Workaround: There is no known workaround.
• CSCsq62976
The Router may crash when clearing vpdn l2tp tunnels.
This condition is observed in a 7301 router which is acting as LAC in a multiple LNS env with load
balancing.
Workaround: There is no known workaround.
• CSCsr15607
The Cisco 7201 router running 12.2(31)SB9/SB12 has the following issues when any MQC QoS is
applied to Gig0/3:
– Unable to send traffic out
– Output queue gradually fills above maximum
– The I/O memory is slowly depleted in HQF pool
This condition is observed on Cisco 7201 routers running 12.2(31)SB9 or 12.2(31)SB12 IOS
version.
Workaround: Use 12.2(33)SRC1 IOS version.
• CSCsr70035
The $_info_syslog_hist_msg_32 variable returned extraset of caracters, ^Z.
This condition is observed when
Workaround: There is no known workaround.
• CSCsr97753
The router becomes inaccessible via all its subinterfaces on executing no xconnect 10.0.0.51 1435
encapsulation mpls command. In addition, the router looses routing connectivity and LDP
connectivity.
This condition is observed when xconnect is unconfigured.
Workaround: Perform shutdown and no shutdown operation using shut and no shut commands.
Release Notes for Cisco 7000 Family for Cisco IOS Release 12.4XD
OL-10395-13 41
Caveats for Cisco IOS Release 12.4XD
Release Notes for Cisco 7000 Family for Cisco IOS Release 12.4XD
42 OL-10395-13
Caveats for Cisco IOS Release 12.4XD
• CSCse56800
Multiple vulnerabilities exist in the Session Initiation Protocol (SIP) implementation in Cisco IOS
that can be exploited remotely to trigger a memory leak or to cause a reload of the Cisco IOS device.
Cisco has released free software updates that address these vulnerabilities. Fixed Cisco IOS
software listed in the Software Versions and Fixes section contains fixes for all vulnerabilities
addressed in this advisory.
There are no workarounds available to mitigate the effects of any of the vulnerabilities apart from
disabling the protocol or feature itself, if administrators do not require the Cisco IOS device to
provide voice over IP services.
This advisory is posted at http://www.cisco.com/warp/public/707/cisco-sa-20080924-sip.shtml.
• CSCsg91306
Multiple vulnerabilities exist in the Session Initiation Protocol (SIP) implementation in Cisco IOS
that can be exploited remotely to trigger a memory leak or to cause a reload of the Cisco IOS device.
Cisco has released free software updates that address these vulnerabilities. Fixed Cisco IOS
software listed in the Software Versions and Fixes section contains fixes for all vulnerabilities
addressed in this advisory.
There are no workarounds available to mitigate the effects of any of the vulnerabilities apart from
disabling the protocol or feature itself, if administrators do not require the Cisco IOS device to
provide voice over IP services.
This advisory is posted at http://www.cisco.com/warp/public/707/cisco-sa-20080924-sip.shtml.
• CSCsi53827
A bogus source IP address occurs in replicated packets when using Service Independent
Intercept (SII) to do lawful intercept.
This condition occurs on a Cisco 7200 router with an NPE-G2. Typically, the source IP address
matches the loopback address for the router, the IP address, or the interface actually used to connect
to network with path to mediation device.
There are no known workarounds.
• CSCsi56413
The output may be stuck on a POS interface that is configured for Frame Relay encapsulation. When
this situation occurs, the output queue is not emptied, and the Local Management Interface (LMI)
remains down.
This condition occurs on a Cisco router that runs Cisco IOS Release 12.4(12) or later, and occurs
only with very specific hardware configurations including an NPE-G1 and PA-POS-OC3SMI. The
issue has been observed when the PA-POS-OC3SMI is located in slot 4 and has not been seen with
other hardware configurations.
Workaround: Place the POS PA in one of the other slot(s). PA location reconfiguration in chassis
should fix the problem.
• CSCsj99980
The user is not able to configure Any Transport over MPLS (AToM) Xconnects on interfaces that
use PA-POS-1OC3 cards. The following error message is displayed:
MPLS encap is not supported on this circuit
There are no known workarounds.
Release Notes for Cisco 7000 Family for Cisco IOS Release 12.4XD
OL-10395-13 43
Caveats for Cisco IOS Release 12.4XD
• CSCsk32150
A Cisco 7200 series router running c7200-advipservicesk9_mpf-mz.124-4.XD8 with configuration
for virtual private dialup network (VPDN) and virtual template may produce the following log
message with additional tracebacks:
%FF-4-MSGAWOL: mp_send_msg(module) at IPL-0
There are no known workarounds.
• CSCsk73104
Cisco IOS contains multiple vulnerabilities in the Data-link Switching (DLSw) feature that may
result in a reload or memory leaks when processing specially crafted UDP or IP Protocol 91 packets.
Cisco has released free software updates that address these vulnerabilities. Workarounds are
available to mitigate the effects of these vulnerabilities.
This advisory is posted at http://www.cisco.com/warp/public/707/cisco-sa-20080326-dlsw.shtml
• CSCsk88637
Operation, Administration, and Maintenance (OAM) cells are not generated when a new
Asynchronous Transfer Mode (ATM) subinterface and permanent virtual circuit (PVC) are
configured.
To diagnose this problem, check the subinterface and PVC status and enable the debug atm oam
interface atmx/x.xxx command. Although the subinterface shows as up/up, the PVC is down, and
no debug output is seen.
This condition occurs in various Cisco IOS 12.4 images.
Workaround: Perform the shut/no shut commands on the ATM subinterface.
• CSCsl34280
Excessive TX underruns are observed on GigabitEthernet Interfaces 0/1 and 0/2 of a Cisco 7301
router causing substantial packet loss. A symptom of this problem is an increasing number of CRC
errors reported by the GigabitEthernet interfaces of a switch connecting the respective interfaces of
the Cisco 7301 router.
This condition occurs when the router is configured as an L2TP network server (LNS) and runs
Cisco IOS release 12.4(4)XD6. The GigabitEthernet Interface 0/0 used to terminate the Layer 2
Tunneling Protocol (L2TP) tunnels is not affected by the TX underruns.
Workaround: There are no known workarounds.
Further Information: A trigger for this issue is not known currently. There are also Cisco 7301
routers having the same configuration and similar load as well as the same IOS release, which are
not impacted. Although currently only Cisco 7301 routers are impacted by this issue, other
platforms with other Cisco IOS releases may be impacted as well.
Release Notes for Cisco 7000 Family for Cisco IOS Release 12.4XD
44 OL-10395-13
Caveats for Cisco IOS Release 12.4XD
Release Notes for Cisco 7000 Family for Cisco IOS Release 12.4XD
OL-10395-13 45
Caveats for Cisco IOS Release 12.4XD
• CSCsk65796
All frames received on a Gigabit Ethernet interface are dropped. All drops are reported as overruns
in the output of show interfaces and show controllers commands.
This condition occurs on Gigabit Ethernet interfaces on the NPE-G2 network processor of
Cisco 7200 series routers. All IOS trains that support NPE-G2 are affected. The symptom occurs
only when the Gigabit Ethernet controller is in promiscuous mode with a moderate traffic rate. The
line protocol on the interface remains up when the error condition is present.
Workaround: There are no known workarounds. When the Gigabit Ethernet controller falls into this
condition, the only way to recover is to power-cycle the router as a soft reload will not clear the
problem.
Further Problem Description: The Gigabit Ethernet controller can go into promiscuous mode under
the following two conditions:
– When bridging is configured on the interface.
– When the number of MAC addresses that have to be stored in the MAC address filter table
exceed the capacity of the table. This situation can happen when a large number of Hot Standby
Router Protocol (HSRP) groups are configured, or a large number of IP multicast groups are to
be received on the interface.
Release Notes for Cisco 7000 Family for Cisco IOS Release 12.4XD
46 OL-10395-13
Caveats for Cisco IOS Release 12.4XD
• CSCsf16469
When executing a scalability test case for a dynamic crypto map for 2000 tunnels, tracebacks appear
on the responder after applying the crypto map.
There are no known workarounds.
• CSCsg43916
When configuring Xconnect on the PA-MC-E3 and PA-MC-T3 port adapters on a Cisco 7200
(NPEG1) router, the following error occurs:
MPLS encap is not supported on this circuit error
Release Notes for Cisco 7000 Family for Cisco IOS Release 12.4XD
OL-10395-13 47
Caveats for Cisco IOS Release 12.4XD
• CSCsk02368
Traceback occurs after the interface is shut on a Cisco 7200 router.
There are no known workarounds.
Release Notes for Cisco 7000 Family for Cisco IOS Release 12.4XD
48 OL-10395-13
Caveats for Cisco IOS Release 12.4XD
• CSCek61276
When you first disable and then re-enable IPv6 on an interface, IPv6 traffic stops on the Cisco router.
Workaround: Enter the shutdown interface configuration command, and then enter the no
shutdown interface configuration command on the affected interface.
• CSCek71805
The following two conditions occur on a Cisco 7200 series router that is configured with an NPE-G2
and a PA-8B-ST port adapter. These conditions do not occur with an NPE-G1:
Condition 1: A PA-8B-ST port adapter powers down when you boot the router.
Workaround 1: Perform a software online insertion and removal (OIR) to bring up the port adapter.
Condition 2: The ISDN layers do not come up.
Workaround 2: Enter the debug bri-interface command to bring up the ISDN layers.
• CSCek73386
A Cisco 7200 series router running an 12.4XD image crashes if a ESCORT jacket card is present.
There are no known workarounds.
• CSCek75633
A router may crash when you attach a virtual circuit (VC) class to an Asynchronous Transfer Mode
(ATM) bundle.
This condition has been observed on a Cisco 7200 series router, but is platform-independent.
There are no known workarounds.
• CSCsd28214
A Cisco router may crash because of a watch dog timeout while running the Routing Information
Protocol (RIP).
This condition occurs on a router when an interface changes state at the exact same time that a RIP
route that was learned on this interface is being replaced with a better metric redistributed route. For
example, when RIP has learned the 192.168.1.0 network from Fast Ethernet 1/0 interface and then
RIP learns the 192.168.1.0 network from a redistributed protocol that has a better metric, the RIP
route is removed. If, during this interval, the Fast Ethernet 1/0 interface goes down, the router may
crash because of a watch dog timeout.
There are no known workarounds.
• CSCsd42053
The show run command displays the resource policy command in the global configuration even
though you do not want to configure any resource policy. In addition, the resource policy command
can not be removed from the configuration.
There are no known workarounds.
• CSCsd75854
A router generates a malformed PPPoE Active Discovery Offer (PADO) packet with two 802.1q
tags. The first 802.1q tag contains the correct VLAN ID.
This condition occurs on a Cisco router when the Service-Name field in the PPPoE Active Discovery
Initiation (PADI) packet is empty and not equal to the one that is configured on the router.
Workaround: Ensure that a correct Service-Name field in used in the PADI packet.
Release Notes for Cisco 7000 Family for Cisco IOS Release 12.4XD
OL-10395-13 49
Caveats for Cisco IOS Release 12.4XD
• CSCse24889
Malformed Secure Shell (SSH) version 2 packets may cause a memory leak, causing the platform
to operate under a degraded condition. Under rare circumstances, the platform may reload to recover
itself.
This condition occurs on a Cisco platform that is configured for SSH version 2 after it has received
malformed SSHv2 packets.
Workaround: As an interim solution until the affected platform can be upgraded to a Cisco IOS
software image that contains the fix for caveat CSCse24889, configure SSH version 1 from the
global configuration mode, as in the following example:
config t
ip ssh version 1
end
Alternate Workaround: Permit only known trusted hosts and/or networks to connect to the router by
creating a vty access list, as in the following example:
10.1.1.0/24 is a trusted network that is permitted access to the router, all other
access is denied
access-list 99 permit 10.1.1.0 0.0.0.255
access-list 99 deny any
line vty 0 4
access-class 99 in
end
For information about configuring vty access lists, see the Controlling Access to a Virtual Terminal
Line document:
http://www.cisco.com/en/US/products/ps6441/products_configuration_guide_chapte
r09186a0080716ec2.html
For information about SSH, see the Configuring Secure Shell on Routers and Switches Running
Cisco IOS document:
http://www.cisco.com/warp/public/707/ssh.shtml
• CSCse58419
Memory consumption by the Chunk Manager process increases over time.
This condition can occur when Network Address Translation (NAT) is configured. When NAT
Virtual Interface (NVI) with virtual routing/forwarding (VRF) is set in the system, the memory leaks
rapidly. When NAT with VRF is set in the system, plus there is embedded address translation needed
or Skinny protocol traffic, the memory leaks at a slow pace.
There are no known workarounds.
• CSCse85329
When you re-insert a PA-MC-8TE1+ port adapter into the same slot of a Cisco 7200 series router
during an online insertion and removal (OIR), the serial interface may enter the Down/Down state.
When you enter the shutdown command followed by the no shutdown command on the T1 or E1
controller, the serial interface may transition to the Up/Down state, still preventing traffic from
passing.
Workaround: Reload the router.
Release Notes for Cisco 7000 Family for Cisco IOS Release 12.4XD
50 OL-10395-13
Caveats for Cisco IOS Release 12.4XD
• CSCsg48725
A Translational Bridging (TLB) exception occurs on a Cisco platform that functions as a Provider
Edge (PE) router in an Multiprotocol Label Switching (MPLS) environment. The following error
message is generated:
TLB (load or instruction fetch) exception, CPU signal 10 (BadVaddr : DEADBEF3)
This condition occurs on a Cisco platform when Terminal Access Controller Access Control System
(TACACS) accounting and authorization is enabled, and the TACACs server is reachable through
the global routing table.
Workaround: Disable Authentication, Authorization, and Accounting (AAA). If disabling AAA is
not an option, there are no known workarounds.
• CSCsg55591
When there are link flaps in the network, various Provider Edge (PE) routers receive the error
message:
%BGP-3-INVALID_MPLS: Invalid MPLS label (1) received in update for prefix
155:14344:10.150.3.22/32 from 10.2.2.1 OR Local label is not programmed into
forwarding table for a sourced BGP VPNv4 network
This condition occurs when an internal BGP (iBGP) path for a VPNv4 Border Gateway Protocol
(BGP) network is present, and then a sourced path for the same route distinguisher (RD) and prefix
is brought up afterwards.
Workarounds: (1) Remove the iBGP path. If the sourced path comes up first, the problem does not
occur. (2) Use different RDs with the different PEs. If the RD+ prefix does not exactly match
between the iBGP path and the sourced path, the problem does not occur.
• CSCsg58391
When the clear interface command is issued for a Hot Standby Router Protocol (HSRP) router, the
the HSRP does not resume.
There are no known workarounds.
• CSCsg81961
SYS-3-BADLIST_DESTROY error messages with tracebacks appear on the console relating to File
Transfer Protocol (FTP). The router may also crash.
This condition occurs when the router has ip inspect name ftp configured to an attached ios firewall
inspection policy, and FTP traffic is passing through the router.
Workaround: Disable FTP inspection with the no ip inspect name ftp command. If your clients are
on the protected side of the firewall, and you are connecting to servers running active FTP, you can
try specifying an access-list to permit source port 20 for certain FTP servers in your inbound security
access-list. Note that specifying source port 20 is only an option if your security policy allows this
port to be added.
• CSCsg84732
%IPRT-4-IPROUTING_INT_ERR displays when reverse Telnet is executed on a peer router that is
busy.
There are no known workarounds.
• CSCsg92743
The router reloads after repeatedly issuing the show buffers usage command.
There are no known workarounds.
Release Notes for Cisco 7000 Family for Cisco IOS Release 12.4XD
OL-10395-13 51
Caveats for Cisco IOS Release 12.4XD
• CSCsh02315
Selective client traffic may be dropped on a Multi-Processor Forwarding (MPF) system or all traffic
for one client may be dropped. Traffic for other clients will be fine.
This condition occurs when an Layer 2 Tunneling Protocol (L2TP) network server (LNS) with MPF
functionality is used with an NPE-G1, and access control lists (ACLs) are used on the system.
Workaround: Unloading/reloading the MPF software module can help. Reboot the system to clear
the problem.
• CSCsh30863
A Cisco 7206VXR (NPE-G1) router crashes during the boot-up process. After the crash, the router
has to be reloaded using the reload command. Sometimes the router has to be power-cycled, and
sometimes the router goes into ROMMON after the crash.
All of the routers that experienced this crash had PA-POS-OC3SMI and/or PA-A3-OC3SMI
installed on them.
Workaround: Disable malloclite using the global configuration no memory lite command. When the
router is reloaded the next time, the boot loader image will not use malloclite and the crash can be
avoided. Note that disabling malloclite can have a negative impact on the memory utilization of a
Cisco IOS device so ample testing of the affects of this change is advised.
Another possible workaround is to use a bootloader image that does not have malloclite support.
Malloclite was introduced into Cisco IOS release 12.3(8)T.
Further Problem Description The following message can be seen in crashinfo file:
%ALIGN-1-FATAL: Illegal access to a low address TLB (store) exception, CPU signal 10.
• CSCsh70906
The debug pppoe events command displays the wrong VLAN ID.
This condition occurs when there are a lot of session establish requests of PPP over Ethernet
(PPPoE).
There are no known workarounds.
• CSCsh71247
Cisco Express Forwarding (CEF) may not function correctly over Point-to-Point (PPP) sessions, and
the output of the show adjacency command shows information similar to the following:
Protocol Interface Address IP Virtual-Access3 point2point(8) (incomplete)
This condition occurs on a Cisco router when PPP is used on a full virtual-access interface or
multilink bundle.
Workaround: Disable CEF.
• CSCsi09530
When the authenticate register command is configured under the voice register global command,
the Communications Manager Express (CME) Session Initiation Protocol (SIP) fails to register.
This condition occurs when the CME is acting as a registrar.
Workaround: Disable the authenticate register command under the voice register global
command.
Further Problem Description: In registrar functionality, CME challenges an inbound register request
with a 401 response. If the authenticate register command is configured under the voice register
global command, the Registering Endpoint ends a Register Request with Credentials. As a result,
the gateway stack is not processing this request and is dropping it.
Release Notes for Cisco 7000 Family for Cisco IOS Release 12.4XD
52 OL-10395-13
Caveats for Cisco IOS Release 12.4XD
• CSCsi20225
Continuous trace backs are seen on an L2TP network server (LNS) on a Cisco 7201 router when
running Cisco IOS Release 12.4(4) XD7. These trace backs occur continuously when bringing up
(PPP over Ethernet or PPP over ATM)/Layer 2 Tunneling Protocol (L2TP) sessions over multiple
tunnels.
This issue does not seem to impact the performance.
There are no known workarounds.
• CSCsi53716
When a named IPv6 access control list (ACL) is used, the following entries are logged by Cisco IOS:
%ALIGN-3-SPURIOUS: Spurious memory access made at 0x61BCF2BC reading 0x8
%ALIGN-3-TRACE: -Traceback= 0x61BCF2BC 0x61BCF6B4 0x61BF0720 0x60A49E84 0x60A65E98
0x617689AC 0x61768990 0x0
Workaround: Where possible, consider using a route-map name instead of a named IPv6 ACL.
• CSCsi54780
An MV64460 interface flaps when a service-policy is applied or removed.
There are no known workarounds.
• CSCsi78118
A traceback may be generated at the iphc_decompress function.
This condition occurs on Cisco routers configured for Internet Protocol Header Compression
(IPHC).
There are no known workarounds.
• CSCsi82427
Ping fails when a native Gigabit Ethernet (GigE) interface is configured with speed auto/duplex
auto/ no neg auto and its peer is configured for fixed speed/duplex with media type rj45.
Workaround: Configure the same speed /duplex on both sides.
• CSCsi96149
The build breaks as a result of CSCek71805.
There are no known workarounds.
• CSCsi99217
When 6000 Layer 2 Tunneling Protocol (L2TP) sessions are disconnected, a Cisco IOS L2TP
network server (LNS) router gets stuck on High CPU Utilization (99% or 100%) for the PPP IP route
process for 5 minutes.
There are no known workarounds.
• CSCsj07936
On a Cisco 7200 router with an NPE-G2 engine, packets may be forwarded even if they are not
destined for the router. This condition only occurs when the interface controller is in Promiscuous
mode ON. (For example, configuring the Hot Standby Routing Protocol (HSRP) would cause the
interface controller to go into Promiscuous mode ON.)
Workaround: If HSRP is used, use the standby use-bia command as a workaround. You might also
need to enter shut/no-shut to change the controller state.
Release Notes for Cisco 7000 Family for Cisco IOS Release 12.4XD
OL-10395-13 53
Caveats for Cisco IOS Release 12.4XD
• CSCsj13380
Data corruption messages are displayed, and the show isdn active command displays incorrect
information for the calling number on outgoing calls.
The occurrence of this problem is inconsistent, however it shows up most frequently when the isdn
test call command is used.
There are no known workarounds.
The OSPF update is retransmitted by the Cisco 7200 series router; there is no operational impact.
This condition occurs only with NPE-G2 and PA-POS-OC3 when the POS link is busy (over
100Mbps), and there are many OSPF packets to be sent. This condition does not seem to occur when
the packets are small, but as the packets get larger, it is more noticeable.
Workaround: Use the newer PA-POS-1OC3 or PA-POS-2OC3 port adapter, instead of
PA-POS-OC3. This problem does not occur when using these newer port adapters.
• CSCsi25540
A Cisco 7200 VXR router with an NPE-G2 and a Port Adapter Jacket Card crashes continuously.
There are no known workarounds.
Release Notes for Cisco 7000 Family for Cisco IOS Release 12.4XD
54 OL-10395-13
Caveats for Cisco IOS Release 12.4XD
Release Notes for Cisco 7000 Family for Cisco IOS Release 12.4XD
OL-10395-13 55
Caveats for Cisco IOS Release 12.4XD
• CSCsg40482
An Integrated Services Digital Networks (ISDN) Layer 2 (L2) interface remains in the
TEI_ASSIGNED state after you have performed a hard online insertion and removal (OIR) of a
PA-MC-4T1 port adapter.
Workaround: There are no known workarounds to prevent the condition from occurring. After the
condition has occurred, reload the router.
• CSCsg51538
On rare occasions, a router acting as a L2TP access concentrator (LAC) with remote end customer
PCs running Cisco IOS 12.4(4)T4 crashes with a bus error.
There are no known workarounds.
• CSCsg69458
On a GigabitEthernet interface on an NPE-G2 on a Cisco 7200 series router, when a link goes down
and comes up due to a cable being pulled, a burst of packets are seen coming out of the interface.
There are no known workarounds.
• CSCsg76715
A device crashes when you delete an access control entry (ACE) that was inserted in the middle of
the access control list (ACL) rather than added at the end of the list.
This condition occurs when all of the following preconditions are present:
– The inserted ACE has a destination prefix length of 0, that is, it has an "any" statement instead
of a destination address.
– The ACL already has another ACE with the same SRC prefix length and an destination prefix
length that is greater than 0 (that is, other than an "any" statement), and the inserted ACE has a
lower sequence number than this other ACE.
– The other ACE with a destination prefix length that is greater than 0 is deleted before you delete
the inserted ACE.
Workaround: First, delete the inserted ACE. Then, delete the other ACE with the same SRC prefix
length and an destination prefix length that is greater than 0.
Alternate Workaround: Delete the complete ACL.
• CSCsg95813
The Layer 2 Tunneling Protocol Version 3 (L2TPv3) Xconnect interface does not work with IPv6
multicast. The L2TPv3 session will not send data packets.
This condition occurs if you configure Xconnect and IPv6 under same physical interface but not
under the same subinterface.
Workaround: Configure ipv6 multicast-routing under global configuration.
• CSCsh30855
A Cisco 7200 series router with an NPE-G2 crashes if the test c7200 pci dump command is
executed.
Workaround: Refrain from using the test c7200 pci dump command.
• CSCsh90413
The processor identifier (PID) for the Cisco 7201 router is missing from the show inv command
output.
There are no known workarounds.
Release Notes for Cisco 7000 Family for Cisco IOS Release 12.4XD
56 OL-10395-13
Caveats for Cisco IOS Release 12.4XD
• CSCsi15195
When a Cisco 7201 router is configured with 1K Layer 2 Tunneling Protocol Version 3 (L2TPv3)
Ethernet sessions for any packet size, if the traffic is sent at a rate slightly higher than the No Drop
Rate (NDR), the following message appears:
ENVM-3-BLOWER: Fan 1 may have failed
If the chassis is opened with this condition, all the fans seem to be working fine. This message goes
away only after reloading the box and reducing the traffic rate to the NDR. This condition has been
seen intermittently for fan1 and fan3.
There are no known workarounds.
Release Notes for Cisco 7000 Family for Cisco IOS Release 12.4XD
OL-10395-13 57
Caveats for Cisco IOS Release 12.4XD
Release Notes for Cisco 7000 Family for Cisco IOS Release 12.4XD
58 OL-10395-13
Caveats for Cisco IOS Release 12.4XD
Release Notes for Cisco 7000 Family for Cisco IOS Release 12.4XD
OL-10395-13 59
Caveats for Cisco IOS Release 12.4XD
Release Notes for Cisco 7000 Family for Cisco IOS Release 12.4XD
60 OL-10395-13
Caveats for Cisco IOS Release 12.4XD
Cisco has made free software available to address these vulnerabilities for affected customers. There
are workarounds available to mitigate the effects of these vulnerabilities.
This advisory is posted at http://www.cisco.com/warp/public/707/cisco-sa-20070522-SSL.shtml.
Note Another related advisory has been posted with this advisory. This additional advisory also
describes a vulnerability related to cryptography that affects Cisco IOS. This related advisory is
available at the following link:
http://www.cisco.com/warp/public/707/cisco-sa-20070522-crypto.shtml.
A combined software table for Cisco IOS is available to aid customers in choosing a software
releases that fixes all security vulnerabilities published as of May 22, 2007. This software table is
available at the following link:
http://www.cisco.com/warp/public/707/cisco-sa-20070522-cry-bundle.shtml.
• CSCsd91454
Voice traffic is dropped in one direction due to Internet Protocol Header Compression (IPHC)
IPCRC error.
This condition occurs some time after the voice call has been established. When the problem is
occurring, the logs show IPHC error messages.
Workaround: Use process switching.
• CSCsd92405
Cisco IOS device may crash while processing malformed Secure Sockets Layer (SSL) packets. In
order to trigger these vulnerabilities, a malicious client must send malformed packets during the SSL
protocol exchange with the vulnerable device.
Successful repeated exploitation of any of these vulnerabilities may lead to a sustained
Denial-of-Service (DoS); however, vulnerabilities are not known to compromise either the
confidentiality or integrity of the data or the device. These vulnerabilities are not believed to allow
an attacker will not be able to decrypt any previously encrypted information.
Cisco IOS is affected by the following vulnerabilities:
– Processing ClientHello messages, documented as Cisco bug ID CSCsb12598
– Processing ChangeCipherSpec messages, documented as Cisco bug ID CSCsb40304
– Processing Finished messages, documented as Cisco bug ID CSCsd92405
Cisco has made free software available to address these vulnerabilities for affected customers. There
are workarounds available to mitigate the effects of these vulnerabilities.
This advisory is posted at http://www.cisco.com/warp/public/707/cisco-sa-20070522-SSL.shtml.
Note Another related advisory has been posted with this advisory. This additional advisory also
describes a vulnerability related to cryptography that affects Cisco IOS. This related advisory is
available at the following link:
http://www.cisco.com/warp/public/707/cisco-sa-20070522-crypto.shtml.
A combined software table for Cisco IOS is available to aid customers in choosing a software
releases that fixes all security vulnerabilities published as of May 22, 2007. This software table is
available at the following link:
http://www.cisco.com/warp/public/707/cisco-sa-20070522-cry-bundle.shtml.
Release Notes for Cisco 7000 Family for Cisco IOS Release 12.4XD
OL-10395-13 61
Caveats for Cisco IOS Release 12.4XD
• CSCsf28840
A vulnerability exists in the Data-link Switching (DLSw) feature in Cisco IOS where an invalid
value in a DLSw message could result in a reload of the DLSw device. Successful exploitation of
this vulnerability requires that an attacker be able to establish a DLSw connection to the device.
There are workarounds available for this vulnerability.
This advisory is posted at http://www.cisco.com/warp/public/707/cisco-sa-20070110-dlsw.shtml
• CSCsf33015
Line protocol up and down messages occur at three minutes intervals when NPE-G2 GigabitEthernet
negotiation is disabled at an interface and the remote peer interface is in the shut state.
Workaround: Enable negotiation.
• CSCsg16186
When a PA-MCX-8TE1+ is in the system and 256MB I/O memory is configured, the system may
crash during bootup. This condition will generate an SCM abort message in the crash info file.
Workaround: Reduce the I/O memory in the configuration.
• CSCsg18075
A Multi-Processor Forwarding (MPF) router crashes when the router is used as an L2TP access
concentrator (LAC).
This condition occurs when there are more than 3000 VLAN subinterfaces and PPP over Ethernet
(PPPoE) sessions with some traffic.
There are no known workarounds.
• CSCsg23462
When the PPPoE Circuit ID Tag Processing feature is tested using the test pppoe command for both
the PPP over Ethernet (PPPoE) client and L2TP access concentrator (LAC), the debug looks clean.
But with sniffer traces, PPPoE Active Discovery Requests (PADRs) and PPPoE Active Discovery
Session-confirmations (PADSs) are found that contain duplicated circuit ID tags.
This condition occurs in Cisco IOS releases 12.4(9)T1 and 12.4(4)T.
There are no known workarounds.
Release Notes for Cisco 7000 Family for Cisco IOS Release 12.4XD
62 OL-10395-13
Caveats for Cisco IOS Release 12.4XD
• CSCsg16186
When a PA-MCX-8TE1+ is in the system and 256MB I/O memory is configured, the system may
crash during bootup. This condition will generate an SCM abort message in the crash info file.
Workaround: Reduce the I/O memory in the configuration.
• CSCsg38143
If you remove a disk from a running system, a reload occurs. If the disk is reinserted it is recognized
physically but cannot be read, and the reload fails until a power failure occurs.
Workaround: Keep the disk in the system all the time.
Release Notes for Cisco 7000 Family for Cisco IOS Release 12.4XD
OL-10395-13 63
Caveats for Cisco IOS Release 12.4XD
There are no workarounds available to mitigate the effects of any of the vulnerabilities apart from
disabling the protocol or feature itself.
This advisory is posted at
http://www.cisco.com/warp/public/707/cisco-sa-20070808-IOS-voice.shtml
• CSCse68138
Multiple voice-related vulnerabilities are identified in Cisco IOS software, one of which is also
shared with Cisco Unified Communications Manager. These vulnerabilities pertain to the following
protocols or features:
– Session Initiation Protocol (SIP)
– Media Gateway Control Protocol (MGCP)
– Signaling protocols H.323, H.254
– Real-time Transport Protocol (RTP)
– Facsimile reception
Cisco has made free software available to address these vulnerabilities for affected customers. Fixed
Cisco IOS software listed in the Software Versions and Fixes section contains fixes for all
vulnerabilities mentioned in this advisory.
There are no workarounds available to mitigate the effects of any of the vulnerabilities apart from
disabling the protocol or feature itself.
This advisory is posted at
http://www.cisco.com/warp/public/707/cisco-sa-20070808-IOS-voice.shtml
• CSCsf25106
After issuing a loopback network payload command on a PA-T3/PA-T3+, the remote end user sees
cyclic redundancy check (CRC) and overrun errors.
This condition only affects newer Cisco IOS 12.4/12.4T releases.
Workaround: Issue the no loopback network payload command.
• CSCsf32623
The on-board GigabitEthernet interfaces increase the ignored and input errors counters under
normal, non-error circumstances.
This condition occurs in Cisco IOS Release12.4(4)XD2 after the fix for CSCsd19400 has been
added. The ignored counter increases if the GE controller drops a frame due to mac address filtering
because the frame was not meant for that interface and was not a multicast/broadcast frame. The
ignored counter can also increase if the controller does not have enough particles to copy the frame
packet to the routers memory. Although dropping a frame because of mac address filtering is not an
error condition, in 12.4(4)XD2 they are counted as input errors because the input errors counter is
a compilation of multiple counters, including the ignored counter.
There are no known workarounds.
• CSCsg01964
A Cisco 7206VXR router with NPE-G2 running Cisco IOS Release 12.4(4)XD2 does not recognize
SFP-GE-Z on the G0/2 and G0/3.
There are no known workarounds.
• CSCsg05375
An NPE-G2 running 12.4(4)XD2 reloads unexpectedly due to a SegV exception.
There are no known workarounds.
Release Notes for Cisco 7000 Family for Cisco IOS Release 12.4XD
64 OL-10395-13
Caveats for Cisco IOS Release 12.4XD
• CSCsg16908
Multiple vulnerabilities exist in the Cisco IOS File Transfer Protocol (FTP) Server feature. These
vulnerabilities include Denial of Service, improper verification of user credentials and the ability to
read or write any file in the device's filesystem, including the device's saved configuration, which
may include passwords or other sensitive information.
The Cisco IOS FTP Server is an optional service that is disabled by default. Devices that are not
specifically configured to enable the Cisco IOS FTP Server service are unaffected by these
vulnerabilities.
This vulnerability does not apply to the Cisco IOS FTP Client feature.
This advisory is posted at
http://www.cisco.com/warp/public/707/cisco-sa-20070509-iosftp.shtml.
• CSCsg31742
False environment warnings about certain voltages are posted to the NPE-G2 console.
There are no known workarounds. These false warnings can be ignored.
Release Notes for Cisco 7000 Family for Cisco IOS Release 12.4XD
OL-10395-13 65
Caveats for Cisco IOS Release 12.4XD
• CSCek51696
Static Virtual Tunnel Interface (VTI) into Multiprotocol Label Switching (MPLS) does not work
with the Border Gateway Protocol (BGP). A Cisco 7200 or 7300 router using BGP through IPSec
Static Virtual Tunnel Interfaces (SVTI) for terminating IPSec traffic into MPLS does not forward
packets from the MPLS side to the SVTI spoke.
This condition occurs when a Cisco 7200 or 7300 router is using IPSec SVTI tunnels to terminate
IPSec tunnels from remote spokes across the Internet into virtual routing/forwarding (VRF)
instances, and thus, into an MPLS core. The problem exists when using BGP across the SVTI tunnel
for dynamic routing between the spoke and 7200, and then distributing these routes into the MPLS
core using multiprotocol BGP. End-to-end routing works fine. Traffic from the spoke reaches the
7200, is decrypted, and sent tag-switched to the MPLS network. However, traffic from the MPLS
side is received by the 7200 and dropped, instead of being encrypted and forwarded to the spoke.
Workaround: Use static routes or OSPF/EIGRP across the SVTI tunnel instead of BGP.
• CSCek53837
Static Reverse Route Injection (RRI) routes are not deleted after stateless IPSec failover.
This condition occurs when two Cisco 7200 series routers are being used for Hot Standby Router
Protocol (HSRP) IPSec stateless failover at a VPN hub, and site-to-site IPSec tunnels have been
configured with RRI static using the reverse-route static command. Only the active 7200 should
have these static RRI routes installed; the standby 7200 should not have these routes. When a
failover occurs, and the active 7200 becomes standby, it does not delete the static RRI routes. As a
result, both 7200s can be advertising these routes to the hub LAN network. This can cause return
traffic to get directed to the standby 7200 and be dropped.
Workaround: If possible, avoid the static keyword and dynamic crypto maps.
• CSCek53865
The RF_LAST_CLIENT should never give a timer expiration, but an RF-3-NOTIF-TMO message
for the RF last client is displayed.
If this message is followed by peer loss, it is not a problem because the Stream Control Transmission
Protocol (SCTP) timer for the B2B is 50 seconds, while the RF timer is set for 30seconds, and under
these circumstances this message is to be expected. However, if the message is received without a
peer loss, it may indicate a problem.
There are no known workarounds.
• CSCek53980
When in VRF mode, if the user shuts down the High Availability (HA) primary router Hot Standby
Router Protocol (HSRP) interface, it may trigger a new active router and incur an RF-Reload.
This condition occurs because the HA primary router sends an HSRP coup message, which causes
the secondary to reload.
There are no known workarounds.
• CSCek54071
When bringing up the High Availability (HA) active/standby router, the standby router may miss one
or two IPSec security associations (SAs).
There are no known workarounds.
Release Notes for Cisco 7000 Family for Cisco IOS Release 12.4XD
66 OL-10395-13
Caveats for Cisco IOS Release 12.4XD
• CSCek54073
IPSec accounting is not accurate after a stateful failover.
This condition occurs when a Cisco 7200 series router is acting as an IPSec hub in a Stateful
Switchover (SSO) IPSec failover topology. If a failover occurs when using IPSec accounting, the
resulting IPSec accounting logs may not reflect the correct values for packets or bytes encrypted and
decrypted.
There are no known workarounds.
• CSCek54331
When a Cisco 7200 series router that is using the VSA encryption module and acting as an IPSec
hub in a Stateful Switchover (SSO) IPSec failover topology reloads, a stream of the following error
messages can appear on the console: %CHKPT-4-INVALID: Invalid checkpoint client ID.
This condition occurs regardless of when the reload occurs manually or because of a
failover-triggered reload.
There are no known workarounds.
• CSCek56991
A Cisco 7200 series router may send a corrupted packet via a 2-port T3 serial, enhanced port adapter
(PA-2T3+). The rate of corrupted packets is very low.
This condition is observed on a Cisco 7200 series router that runs Cisco IOS Release 12.2SB,
Release 12.4T, or Release 12.4(4)XD3 and occurs when the router functions under high stress
conditions such as a high CPU load and an oversubscribed interface of the PA-2T3+.
Workaround: Avoid a high CPU load and oversubscription of the interface of the PA-2T3+.
• CSCsc22696
High Availability (HA) + Stateful Switchover (SSO) IPSec security associations (SAs) are not
cleared after synchronization verification. During the testing of security Security Association
Database (SADB) synchronization, IPSec SAs are not cleared on both active and standby devices
when they are cleared on the initiator.
This condition occurs after a series of SADB synchronization tests.
There are no known workarounds.
• CSCsc72722
Transmission Control Protocol (TCP) connections that are opened through a Cisco IOS Firewall
(CBAC) may not timeout.
This condition occurs with the Cisco IOS Firewall (CBAC) enabled because the Transmission
Control Protocol (TCP) idle timer for a session may be reset even by TCP packets that fail TCP
inspection and are subsequently dropped. This can lead to the TCP session not timing out.
There are no known workarounds.
Release Notes for Cisco 7000 Family for Cisco IOS Release 12.4XD
OL-10395-13 67
Caveats for Cisco IOS Release 12.4XD
• CSCsd13899
The fragment count displayed by the show ip traffic command has a delay of one packet if the
packet is fragmented by the C7200 VSA. This counter is updated only when the next outbound
packet is received. For example, if 50 packets are fragmented, the counters will show 49, until
another packet is sent in the outbound direction.
This condition occurs because the hardware does not give any output to indicate the packet was
fragmented. It confirms that all the fragments are received and updates the fragment count only it
receives the next packet. As a result, there is a delay of one packet in accounting for the outbound
traffic in the case of fragmentation.
Workaround: This behavior is as designed.
• CSCse07013
Prefrag is not working on bundled security associations (SAs). If a transform set is configured with
both Authentication Header (AH) and Encapsulating Security Payload (ESP) transforms, VSA
always does fragmentation after encryption.
This condition occurs because Prefrag is disabled for bundled SAs. When a transform set is
configured with both AH and ESP transforms, VSA always does fragmentation after encryption.
Workaround: This is a hardware limitation. If this is unacceptable, use ESP or AH.
• CSCse23502
The clear cry sa command does not get an updated lifetime for a virtual tunnel interface (VTI). The
show crypto ipsec sa command shows that the IPSec tunnel does not get the new configured
lifetime.
Workaround: To work around this issue:
1. Bounce the tunnel interface, as in the following example:
conf t
int tunnel1
shutdown
no shut
end
When the tunnel comes back up, it will get the latest configured lifetime.
2. Remove the configuration for interface tunnel and reconfigure it.
• CSCse73065
Maximum transmission unit (MTU) values for the Dynamic Virtual Tunnel Interface (DVTI) IPSec
tunnels are not set properly. The show crypto ipsec sa command shows the MTU value for DVTI
tunnel as follows:
path mtu 0, ip mtu -1, ip mtu idb
Fragmentation is not working as expected. The show crypto ipsec sa command shows that the IPSec
tunnel does not get the new configured lifetime.
There are no known workarounds.
• CSCsf05474
Memory leaks occur for Crypto Internet Key Management Protocol (IKMP), IPSec Key processes.
These memory leaks can be seen with the tracebacks for the Crypto IKMP and IPSec Key Engine
processes.
This condition occurs in VRF-aware IPSec scenarios.
There are no known workarounds.
Release Notes for Cisco 7000 Family for Cisco IOS Release 12.4XD
68 OL-10395-13
Caveats for Cisco IOS Release 12.4XD
• CSCsf05718
When using a Cisco IOS software to Win2k setup with Layer 2 Tunnel Protocol (L2TP) and IPSec
and port address translation (PAT) (Network Address Translation (NAT) overload) in between, only
one client is able to connect at a given time. When a second client tries to connect, Internet Key
Exchange (IKE) negotiation fails at MM_SA_SETUP.
This condition only occurs with PAT; dynamic NAT works fine. Also, this condition only occurs
when the second client is using the same username. If each client uses a different username to login,
then the PAT setup also works.
Workaround: Use a different username for each client machine.
• CSCsf12577
A router configured with Static Virtual Tunnel Interface (SVTI) crashes when copying an SVTI
configuration file from disk media into running-config.
This condition occurs when a router has SVTI IPSec peers established to remote SVTI peers, its
current running configuration is stored in disk media (for example, disk2:) rather than
startup-config, and it is rebooted, while the remote SVTI IPSec peers are still sending inbound
traffic. After the reload, a crash occurs when the SVTI configuration stored in disk media is copied
into running-config.
Workaround: Prior to copying the configuration file from disk media to running-config, shutdown
all physical interfaces that receive traffic from the remote SVTI IPSec peers. Then, copy the
configuration file into running-config. After the copy is complete, enter the no shutdown command
on previously shut interfaces.
• CSCsf33015
When NPEG2 Gigabit Ethernet negotiation is disabled and its peer interface is in the shut state, the
line protocol up and down message can appear at three minutes intervals on the console.
Workaround: Enable negotiation.
• CSCsf97252
Packets in priority class are dropped by the VSA.
This condition occurs when Low Latency Queuing (LLQ) for IPSec Encryption Engines is
configured and there is over-subscription over the VSA.
There are no known workarounds.
• CSCsg01964
A Cisco 7206VXR router with NPE-G2 running Cisco IOS Release 12.4(4)XD2 does not recognize
SFP-GE-Z on the G0/2 and G0/3.
There are no known workarounds.
Release Notes for Cisco 7000 Family for Cisco IOS Release 12.4XD
OL-10395-13 69
Caveats for Cisco IOS Release 12.4XD
• CSCej21681
Traceback occurs while using a Point-to-Point Protocol (PPP) configuration with c7200-js-mz.
There are no known workarounds.
• CSCsb42470
The output of the show interfaces sum and the show interfaces tunnel commands is inconsistent.
For example, the output of the show interfaces tunnel command displays incorrect values for the
number of packets that are switched per second and the number of bytes that have been switched.
This condition occurs when CEF switching is enabled, and when IPsec tunnel protection or a virtual
interface (VTI) is applied to a tunnel interface.
Workaround: Disable CEF switching, and use fast-switching or process-switching.
• CSCsb52717
A Cisco router configured for multicast VPN may reload after receiving a malformed Multicast
Distribution Tree (MDT) data group join packet.
This condition affects all IOS versions that support mVPN MDT.
Workaround: Filter out MDT Data Join messages from the router sending the malformed packet
using the Receive Access Control List (rACL) feature. Note that by doing this, the offending router
will not be able to participate within the mVPN data trees.
The following example shows how to block malformed MDT Data Join messages that are sent from
the device's IP addresses using a receive ACL:
!
ip receive access-list 111
!
access-list 111 deny udp host ip-address-of-router-sending-malformed-join-request host
224.0.0.13 eq 3232
access-list 111 permit ip any any
!
Note Ensure that the rACL does not filter critical traffic such as routing protocols or interactive access
to the routers. Filtering necessary traffic could result in an inability to remotely access the router,
thus requiring a console connection. For this reason, lab configurations should mimic the actual
deployment as closely as possible. As always, Cisco recommends that you test this feature in the
lab prior to deployment. For more information on rACLs, refer to "Protecting Your Core:
Infrastructure Protection Access Control Lists" at:
http://www.cisco.com/warp/public/707/racl.html.
• CSCsb58590
The EzVPN server crashes when the debug crypto isakmp detail command is enabled on the
EzVPN server and the client tries to establish a connection.
There are no known workarounds.
Release Notes for Cisco 7000 Family for Cisco IOS Release 12.4XD
70 OL-10395-13
Caveats for Cisco IOS Release 12.4XD
• CSCsb93407
With H323 call service stopped, the router still listens on tcp port 1720 and completes connection
attempts.
This condition occurs when H323 is disabled using the following configuration commands:
voice service voip
h323
call service stop
Workaround: Deploy an interface access list that blocks access to the Transmission Control Protocol
(TCP) port 1720 for traffic that is destined for any of the IP addresses of the router.
• CSCsc98725
Spurious memory access messages occur when keepalive is configured on a template.
There are no known workarounds.
• CSCsd44501
The line protocol flaps for PA CT3,CE3, MC-8TE1 with any serial encaps configuration.
This condition occurs only with following midplane revision chassis:
– CISCO7206VXR (midplane) hardware version less than 2.8 - 800-04667-11
– CISCO7204VXR (midplane) hardware version less than 2.8 - 800-04766-11.
There are no known workarounds.
• CSCse51820
The PA-POS-2OC3 interface flaps after the interface is up.
This condition always occurs on SB-related images.
Workaround: After rebooting, enter the following commands at the CLI:
test c7200 memory write F1000A18 002E0000
test c7200 memory write F1000A20 002D0020
• CSCse53002
Memory leaks occur at the IPSec key engine process.
This condition occurs whenever there is traffic.
There are no known workarounds.
• CSCse69102
Spurious memory access occurs at ike_profile_remove.
This condition occurs on a Cisco router that runs Cisco IOS 12.4(6)T3, when there is at least one
Internet Key Exchange (IKE) or IPSec security association (SA), and the profile is removed using
the CLI with debug crypto isakmp turned on.
Workaround: Turn off crypto isakmp debugs or clear all the crypto sessions and then remove the
isakmp profile.
• CSCsf04754
Multiple Cisco products contain either of two authentication vulnerabilities in the Simple Network
Management Protocol version 3 (SNMPv3) feature. These vulnerabilities can be exploited when
processing a malformed SNMPv3 message. These vulnerabilities could allow the disclosure of
network information or may enable an attacker to perform configuration changes to vulnerable
Release Notes for Cisco 7000 Family for Cisco IOS Release 12.4XD
OL-10395-13 71
Caveats for Cisco IOS Release 12.4XD
devices. The SNMP server is an optional service that is disabled by default. Only SNMPv3 is
impacted by these vulnerabilities. Workarounds are available for mitigating the impact of the
vulnerabilities described in this document.
The United States Computer Emergency Response Team (US-CERT) has assigned Vulnerability
Note VU#878044 to these vulnerabilities.
Common Vulnerabilities and Exposures (CVE) identifier CVE-2008-0960 has been assigned to
these vulnerabilities.
This advisory will be posted at
http://www.cisco.com/warp/public/707/cisco-sa-20080610-snmpv3.shtml
• CSCsf06323
When using IP inspection and process switching, the outbound crypto access-check ACL is only
processed by the first packet, which also triggers the IP inspect session. For subsequent packets, the
access-list is not processed at all.
Workaround: Use CEF or fast switching with IP inspection.
Release Notes for Cisco 7000 Family for Cisco IOS Release 12.4XD
72 OL-10395-13
Caveats for Cisco IOS Release 12.4XD
• CSCse19109
The router crashes when frequent start/stop of the traffic stream occurs for an MC-STM1 port
adapter on an Escort slot.
This condition occurs intermittently.
There are no known workarounds.
• CSCse81609
NPE-G2 crashes with a program exception error when the reset command is issued after jumping to
ROMMON for a send break. NPE-G2 goes into a loop and can only recover by a power cycle.
There are no known workarounds.
• CSCse85068
A ping packet with a packet size greater than 1498 bytes cannot pass from the L2TP access
concentrator (LAC) through the L2TP network server (LNS) to the client.
Workaround: Enlarge the maximum transmission unit (MTU) of the LAC-facing physical interface
on the client to be greater than or equal to1502.
Release Notes for Cisco 7000 Family for Cisco IOS Release 12.4XD
OL-10395-13 73
Caveats for Cisco IOS Release 12.4XD
There are workarounds available to mitigate the effects of the vulnerability. The workaround
depends on if Mobile IPv6 is used and what version on Cisco IOS is being currently used.
This advisory is posted at
http://www.cisco.com/warp/public/707/cisco-sa-20070124-IOS-IPv6.shtml
Release Notes for Cisco 7000 Family for Cisco IOS Release 12.4XD
74 OL-10395-13
Related Documentation
Related Documentation
The following sections describe the documentation available for the Cisco 7000 family of routers. These
documents consist of hardware and software installation guides, Cisco IOS configuration guides and
command references, system error messages, feature modules, and other documents.
Documentation is available as printed manuals or electronic documents, except for feature modules,
which are available online on Cisco.com and http://www.cisco.com/univercd/home/index.htm.
Use these release notes with these documents:
• Release-Specific Documents, page 76
• Platform-Specific Documents, page 76
• Feature Modules, page 77
• Cisco Feature Navigator, page 77
• Cisco IOS Software Documentation Set, page 77
Release Notes for Cisco 7000 Family for Cisco IOS Release 12.4XD
OL-10395-13 75
Related Documentation
Release-Specific Documents
The following documents are specific to Cisco IOS Release 12.4 T and are located on Cisco.com and
http://www.cisco.com/univercd/home/index.htm:
• Cross-Platform Release Notes for Cisco IOS Release 12.4 T
On Cisco.com at:
Products and Services > Cisco IOS Software > Cisco IOS Software Releases 12.4T > General
Information> Release Notes
On http://www.cisco.com/univercd/home/index.htm at:
Cisco IOS Software > Cisco IOS Release 12.4T > Release Notes
• Product bulletins, field notices, and other release-specific documents at
http://www.cisco.com/univercd/home/index.htm
• Caveats for Cisco IOS Release 12.4 T
As a supplement to the caveats listed in “Caveats for Cisco IOS Release 12.4XD” in these release
notes, see Caveats for Cisco IOS Release 12.4 T, which contains caveats applicable to all platforms
for all maintenance releases of Cisco IOS Release 12.4 T.
On Cisco.com at:
Products and Services > Cisco IOS Software > Cisco IOS Software Releases 12.4T > General
Information > Release Notes > Cross-Platform Release Notes for Cisco IOS Release 12.4T, Part
5: Caveats
On http://www.cisco.com/univercd/home/index.htm at:
Cisco IOS Software > Cisco IOS Release 12.4T > Release Notes > Cross-Platform Release
Notes for Cisco IOS Release 12.4T, Part 5: Caveats
Note If you have an account on Cisco.com, you can also use the Bug Toolkit to find select caveats of any
severity. To reach the Bug Toolkit, log in to Cisco.com and click Products and Services > Cisco IOS
Software > Cisco IOS Software Releases 12.2 Mainline> Troubleshoot and Alerts > Bug Toolkit.
Another option is to go to http://www.cisco.com/cgi-bin/Support/Bugtool/launch_bugtool.pl. (If the
defect that you have requested cannot be displayed, this may be due to one or more of the following
reasons: the defect number does not exist, the defect does not have a customer-visible description yet,
or the defect has been marked Cisco Confidential.)
Platform-Specific Documents
These documents are available for the Cisco 7000 family of routers on Cisco.com:
• Cisco7200 VXR Installation and Configuration Guide
• Cisco 7200 VXR Routers Quick Start
On http://www.cisco.com/univercd/home/index.htm at:
Routers > Cisco 7200VXR
Release Notes for Cisco 7000 Family for Cisco IOS Release 12.4XD
76 OL-10395-13
Related Documentation
Feature Modules
Feature modules describe new features supported by Cisco IOS Release 12.4(4)XD and are updates to
the Cisco IOS documentation set. A feature module consists of a brief overview of the feature, benefits,
configuration tasks, and a command reference. As updates, the feature modules are available online only.
Feature module information is incorporated in the next printing of the Cisco IOS documentation set.
On Cisco.com at:
Products and Services > Cisco IOS Software > Cisco IOS Release 12.4T > Configure> Feature
Guides
On http://www.cisco.com/univercd/home/index.htm at:
Cisco IOS Software > Cisco IOS Release 12.4 > New Feature Documentation> 12.4(x) New
Features
Documentation Modules
Each module in the Cisco IOS documentation set consists of one or more configuration guides and one
or more corresponding command references. Chapters in a configuration guide describe protocols,
configuration tasks, and Cisco IOS software functionality, and contain comprehensive configuration
examples. Chapters in a command reference provide complete command syntax information. Use each
configuration guide with its corresponding command reference.
Release Notes for Cisco 7000 Family for Cisco IOS Release 12.4XD
OL-10395-13 77
Related Documentation
On Cisco.com at:
Products and Services > Cisco IOS Software > Cisco IOS Software Releases 12.4T > Configure >
Configuration Guides
Products and Services > Cisco IOS Software > Cisco IOS Software Releases 12.4T > Reference
Guides > Command References
On http://www.cisco.com/univercd/home/index.htm at:
Cisco IOS Software > Cisco IOS Release 12.4T Configuration Guides
Cisco IOS Software > Cisco IOS Release 12.4T Command References
Release Notes for Cisco 7000 Family for Cisco IOS Release 12.4XD
78 OL-10395-13
Related Documentation
Note Some of the configuration guides in the following table reference Cisco IOS Release12.4 versions of
these documents. In these instances, no distinct Cisco IOS Release 12.4T version of the guide exists and
the necessary configuration information is in the Cisco IOS Release12.4 version of the document. Keep
in mind that Cisco IOS Release 12.4(4)XD is based on Cisco IOS Release 12.4(4)T. All features in Cisco
IOS Release 12.4(4)T are in Cisco IOS Release 12.4(4)XD. The references to Cisco IOS Release 12.4
configuration guides in the following table do not indicate that all features in Cisco IOS Release 12.4
are in Cisco IOS Release 12.4(4)XD.
Table 23 Cisco IOS Release 12.4T Configuration Guides and Command References
Release Notes for Cisco 7000 Family for Cisco IOS Release 12.4XD
OL-10395-13 79
Related Documentation
Table 23 Cisco IOS Release 12.4T Configuration Guides and Command References (Continued)
Release Notes for Cisco 7000 Family for Cisco IOS Release 12.4XD
80 OL-10395-13
Related Documentation
Table 23 Cisco IOS Release 12.4T Configuration Guides and Command References (Continued)
Release Notes for Cisco 7000 Family for Cisco IOS Release 12.4XD
OL-10395-13 81
Related Documentation
Table 23 Cisco IOS Release 12.4T Configuration Guides and Command References (Continued)
Release Notes for Cisco 7000 Family for Cisco IOS Release 12.4XD
82 OL-10395-13
Related Documentation
Table 23 Cisco IOS Release 12.4T Configuration Guides and Command References (Continued)
Release Notes for Cisco 7000 Family for Cisco IOS Release 12.4XD
OL-10395-13 83
Related Documentation
Table 23 Cisco IOS Release 12.4T Configuration Guides and Command References (Continued)
Release Notes for Cisco 7000 Family for Cisco IOS Release 12.4XD
84 OL-10395-13
Related Documentation
Table 24 lists the documents and resources that support the Cisco IOS Release 12.4T software
configuration guides and command references.
Release Notes for Cisco 7000 Family for Cisco IOS Release 12.4XD
OL-10395-13 85
Open Source License Notices
License Issues
The OpenSSL toolkit stays under a dual license, i.e. both the conditions of the OpenSSL License and the
original SSLeay license apply to the toolkit. See below for the actual license texts. Actually both licenses
are BSD-style Open Source licenses. In case of any license issues related to OpenSSL please contact
openssl-core@openssl.org.
OpenSSL License:
Copyright © 1998-2007 The OpenSSL Project. All rights reserved.
Redistribution and use in source and binary forms, with or without modification, are permitted provided
that the following conditions are met:
1. Redistributions of source code must retain the copyright notice, this list of conditions and the
following disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions, and
the following disclaimer in the documentation and/or other materials provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the following
acknowledgment: “This product includes software developed by the OpenSSL Project for use in the
OpenSSL Toolkit (http://www.openssl.org/)”.
4. The names “OpenSSL Toolkit” and “OpenSSL Project” must not be used to endorse or promote
products derived from this software without prior written permission. For written permission, please
contact openssl-core@openssl.org.
5. Products derived from this software may not be called “OpenSSL” nor may “OpenSSL” appear in
their names without prior written permission of the OpenSSL Project.
6. Redistributions of any form whatsoever must retain the following acknowledgment:
“This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit
(http://www.openssl.org/)”.
THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT “AS IS”' AND ANY EXPRESSED OR
IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN
NO EVENT SHALL THE OpenSSL PROJECT OR ITS CONTRIBUTORS BE LIABLE FOR ANY
DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
(INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
Release Notes for Cisco 7000 Family for Cisco IOS Release 12.4XD
86 OL-10395-13
Open Source License Notices
Release Notes for Cisco 7000 Family for Cisco IOS Release 12.4XD
OL-10395-13 87
Obtaining Documentation
Obtaining Documentation
Cisco documentation and additional literature are available on Cisco.com. Cisco also provides several
ways to obtain technical assistance and other technical resources. These sections explain how to obtain
technical information from Cisco Systems.
Cisco.com
You can access the most current Cisco documentation at this URL:
http://www.cisco.com/techsupport
You can access the Cisco website at this URL:
http://www.cisco.com
You can access international Cisco websites at this URL:
http://www.cisco.com/public/countries_languages.shtml
Ordering Documentation
Beginning June 30, 2005, registered Cisco.com users may order Cisco documentation at the Product
Documentation Store in the Cisco Marketplace at this URL:
http://www.cisco.com/go/marketplace/
Nonregistered Cisco.com users can order technical documentation from 8:00 a.m. to 5:00 p.m.
(0800 to 1700) PDT by calling 1 866 463-3487 in the United States and Canada, or elsewhere by
calling 011 408 519-5055. You can also order documentation by e-mail at
tech-doc-store-mkpl@external.cisco.com or by fax at 1 408 519-5001 in the United States and Canada,
or elsewhere at 011 408 519-5001.
Release Notes for Cisco 7000 Family for Cisco IOS Release 12.4XD
88 OL-10395-13
Documentation Feedback
Documentation Feedback
You can rate and provide feedback about Cisco technical documents by completing the online feedback
form that appears with the technical documents on Cisco.com.
You can send comments about Cisco documentation to bug-doc@cisco.com.
You can submit comments by using the response card (if present) behind the front cover of your
document or by writing to the following address:
Cisco Systems
Attn: Customer Document Ordering
170 West Tasman Drive
San Jose, CA 95134-9883
We appreciate your comments.
Release Notes for Cisco 7000 Family for Cisco IOS Release 12.4XD
OL-10395-13 89
Obtaining Technical Assistance
Tip We encourage you to use Pretty Good Privacy (PGP) or a compatible product to encrypt any sensitive
information that you send to Cisco. PSIRT can work from encrypted information that is compatible with
PGP versions 2.x through 8.x.
Never use a revoked or an expired encryption key. The correct public key to use in your correspondence
with PSIRT is the one linked in the Contact Summary section of the Security Vulnerability Policy page
at this URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html
The link on this page has the current PGP key ID in use.
Note Use the Cisco Product Identification (CPI) tool to locate your product serial number before submitting
a web or phone request for service. You can access the CPI tool from the Cisco Technical Support &
Documentation website by clicking the Tools & Resources link under Documentation & Tools. Choose
Cisco Product Identification Tool from the Alphabetical Index drop-down list, or click the Cisco
Product Identification Tool link under Alerts & RMAs. The CPI tool offers three search options: by
product ID or model name; by tree view; or for certain products, by copying and pasting show command
output. Search results show an illustration of your product with the serial number label location
highlighted. Locate the serial number label on your product and record the information before placing a
service call.
Release Notes for Cisco 7000 Family for Cisco IOS Release 12.4XD
90 OL-10395-13
Obtaining Technical Assistance
Release Notes for Cisco 7000 Family for Cisco IOS Release 12.4XD
OL-10395-13 91
Obtaining Additional Publications and Information
Release Notes for Cisco 7000 Family for Cisco IOS Release 12.4XD
92 OL-10395-13
Obtaining Additional Publications and Information
This document is to be used in conjunction with the documents listed in the “Related Documentation” section on page 75.
CCDE, CCENT, Cisco Eos, Cisco Lumin, Cisco Nexus, Cisco StadiumVision, the Cisco logo, DCE, and Welcome to the Human Network are trademarks; Changing the Way We
Work, Live, Play, and Learn is a service mark; and Access Registrar, Aironet, AsyncOS, Bringing the Meeting To You, Catalyst, CCDA, CCDP, CCIE, CCIP, CCNA, CCNP,
CCSP, CCVP, Cisco, the Cisco Certified Internetwork Expert logo, Cisco IOS, Cisco Press, Cisco Systems, Cisco Systems Capital, the Cisco Systems logo, Cisco Unity,
Collaboration Without Limitation, EtherFast, EtherSwitch, Event Center, Fast Step, Follow Me Browsing, FormShare, GigaDrive, HomeLink, Internet Quotient, IOS, iPhone, iQ
Expertise, the iQ logo, iQ Net Readiness Scorecard, iQuick Study, IronPort, the IronPort logo, LightStream, Linksys, MediaTone, MeetingPlace, MGX, Networkers, Networking
Academy, Network Registrar, PCNow, PIX, PowerPanels, ProConnect, ScriptShare, SenderBase, SMARTnet, Spectrum Expert, StackWise, The Fastest Way to Increase Your
Internet Quotient, TransPath, WebEx, and the WebEx logo are registered trademarks of Cisco Systems, Inc. and/or its affiliates in the United States and certain other countries.
All other trademarks mentioned in this document or Website are the property of their respective owners. The use of the word partner does not imply a partnership relationship
between Cisco and any other company. (0805R)
Release Notes for Cisco 7000 Family for Cisco IOS Release 12.4XD
OL-10395-13 93
Obtaining Additional Publications and Information
Release Notes for Cisco 7000 Family for Cisco IOS Release 12.4XD
94 OL-10395-13