Download Print this page

Cisco RF Gateway 10 Release Notes page 32

Release notes in ios release 12.2sq
Hide thumbs Also See for RF Gateway 10:

Advertisement

Caveats
Caveat
CSCsz18634
CSCtg47129
CSCtr66271
CSCtr86415
Release Notes for Cisco RF Gateway 10 in Cisco IOS Release 12.2SQ
32
Description
Symptoms: The input and output packet rate is always displayed with "0" at the
interface level, even though packets are flowing on the ports normally.
Router# show interface gigabitEthernet 4/1
GigabitEthernet4/1 is up, line protocol is up (connected)
......
Output queue: 0/40 (size/max)
30 second input rate 0 bits/sec, 0 packets/sec
30 second output rate 0 bits/sec, 0 packets/sec
3411001 packets input, 567007874 bytes, 0 no buffer
Received 818876 broadcasts (725328 multicasts)
Conditions: This issue was first observed in Cisco IOS Release 12.2(46)SG.
Workaround: There is no workaround.
The Cisco IOS Software implementation of the virtual routing and forwarding
(VRF) aware network address translation (NAT) feature contains a vulnerability
when translating IP packets that could allow an unauthenticated, remote attacker
to cause a denial of service (DoS) condition.
Cisco has released free software updates that address this vulnerability.
Workarounds that mitigate this vulnerability are not available.
This advisory is available at the following link:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-2
0130327-nat
Note: The March 27, 2013, Cisco IOS Software Security Advisory bundled
publication includes seven Cisco Security Advisories. All advisories address
vulnerabilities in Cisco IOS Software. Each Cisco IOS Software Security
Advisory lists the Cisco IOS Software releases that correct the vulnerability or
vulnerabilities detailed in the advisory as well as the Cisco IOS Software releases
that correct all Cisco IOS Software vulnerabilities in the March 2013 bundled
publication.
Individual publication links are in "Cisco Event Response: Semiannual Cisco IOS
Software Security Advisory Bundled Publication" at the following link:
http://www.cisco.com/web/about/security/intelligence/Cisco_ERP_mar13.html
Symptoms: Traceback observed after power off and power on of the
Cisco RFGW-10 line cards.
Conditions: This issue occurs after issuing the no hw-module slot power and
hw-module slot power commands.
Workaround: There is no workaround.
Symptoms: Telnet needs to be enabled on Cisco RFGW-10 line cards for
licensing. Cisco RFGW-10 reserves IP address space 10.0.0.1 to 10.0.0.14 for
accessing line cards from Supervisor card. Using these addresses for other
interfaces is prohibited.
Conditions: This issue occurs when RFGW does not allow configuration of IP
address 10.0.0.1 to 10.0.0.14 addresses on other interfaces by default.
Workaround: Use VRF while configuring 10.0.0.1 to 10.0.0.14 addresses for
other interfaces.
<<<<<<<<<<<
<<<<<<<<<<<
OL-18677-10

Advertisement

loading