Cisco 7600-ES20-GE3CXL-RF - Ethernet Services 20G Line Card Switch Manual de usuario Pagina 156

  • Descarga
  • Añadir a mis manuales
  • Imprimir
  • Pagina
    / 398
  • Tabla de contenidos
  • MARCADORES
  • Valorado. / 5. Basado en revisión del cliente
Vista de pagina 155
602
Caveats for Cisco IOS Release 12.2(33)SRD through 12.2(33)SRD8
OL-10394-05 Rev. R0
CSCsv35120
Symptoms: The ES20-GE3C/GE3CXL line card may crash if the explicit-path of an MPLS Traffic
Engineering (TE) tunnel is changed so that it no longer goes out a core-facing port-channel
interface.
Conditions: Seen only when the following conditions are met:
- Virtual Private LAN Services (VPLS) traffic passes over the MPLS Traffic Engineering tunnel.
- Traffic going out the tunnel initially goes over a port-channel interface.
- Five or more ports on the ES20 line card are used in the port-channel interface.
- The explicit-path specified avoids the port-channel interface
Workaround: Shut down the port-channel interface first before changing the tunnel’s explicit-path.
CSCsv36266
Symptoms: E1 and SonetVT layers are down even though serial (Upper Layer) ifOperStatus is UP
Serial1/0/0.1/2/1/1:1 ifOperStatus.156 = up(1)
E1 1/0/0.1/2/1/1 ifOperStatus.157 = lowerLayerDown(7
TU 1/0/0.1/2/1/1 ifOperStatus.158 = down(2)
tug 3-2 tug 2-1 e1-1:chgrp1
AU-4 1, TUG-3 2, TUG-2 1, E1 1 (C-12 1/2/1/1) is up
156 Se1/0/0.1/2/1/1:11500512KUP UP
157 E1 1/0/0.1/2/1/102.05MUP <blank>
158 TU 1/0/0.1/2/1/102.05MUP down
Conditions: Occurs on serial interfaces of SPA-1XCHSTM1/OC3.
Workaround: There is no workaround.
CSCsv36892
Symptoms: TCLsh mode is not exited when the session is disconnected or times out. The next user
to connect and authenticate is put in TCLsh mode.
Conditions: Occurs on high availability systems with an active and standby RP.
Workaround: Explicitly exit TCLsh mode rather than disconnecting or allowing the session to time
out.
CSCsv38166
The server side of the Secure Copy (SCP) implementation in Cisco IOS software contains a
vulnerability that could allow authenticated users with an attached command-line interface (CLI)
view to transfer files to and from a Cisco IOS device that is configured to be an SCP server,
regardless of what users are authorized to do, per the CLI view configuration. This vulnerability
could allow valid users to retrieve or write to any file on the device’s file system, including the
device’s saved configuration and Cisco IOS image files, even if the CLI view attached to the user
does not allow it. This configuration file may include passwords or other sensitive information.
The Cisco IOS SCP server is an optional service that is disabled by default. CLI views are a
fundamental component of the Cisco IOS Role-Based CLI Access feature, which is also disabled by
default. Devices that are not specifically configured to enable the Cisco IOS SCP server, or that are
configured to use it but do not use role-based CLI access, are not affected by this vulnerability.
This vulnerability does not apply to the Cisco IOS SCP client feature.
Vista de pagina 155
1 2 ... 151 152 153 154 155 156 157 158 159 160 161 ... 397 398

Comentarios a estos manuales

Sin comentarios