Cisco 7600-ES20-GE3CXL-RF - Ethernet Services 20G Line Card Switch Manual de usuario Pagina 6

  • Descarga
  • Añadir a mis manuales
  • Imprimir
  • Pagina
    / 398
  • Tabla de contenidos
  • MARCADORES
  • Valorado. / 5. Basado en revisión del cliente
Vista de pagina 5
452
Caveats for Cisco IOS Release 12.2(33)SRD through 12.2(33)SRD8
OL-10394-05 Rev. R0
CSCth25634
Symptoms: The password is prompted for twice for authentication that is falling over to the line
password.
Conditions: This symptom is observed when login authentication has the line password as fallback
and RADIUS as primary. For example:
aaa authentication login default group radius line
Workaround: Change the login authentication to fall back to the enable password that is configured
on the UUT. For example:
enable password keyword
aaa authentication login default group radius enable
Further Information: The fix for this bug also fixes an unrelated problem that may allow
unauthorized users access to EXEC mode if the “line” authentication method is configured with
fallback to the “none” authentication method. In other words, if the following is configured:
aaa new-model
aaa authentication login MYMETHOD line none
line con 0
login authentication MYMETHOD
password some password
then users providing the wrong password at the password prompt will be granted access.
This issue was originally introduced by Cisco Bug ID CSCee85053, and fixed in some Cisco IOS
releases via Cisco Bug IDs CSCsb26389 (“Failover for aaa authentication method LINE is broken”)
and CSCsv06823 (“Authentication request does not failover to any method after enable”). However,
the fix for this problem was not integrated into some Cisco IOS releases and this bug (CSCth25634)
takes care of that.
Note that Cisco Bug ID CSCti82605 (“AAA line password failed and access to switch still passed”)
is a recent bug that was filed once it was determined that the fix for CSCee85053 was still missing
from some Cisco IOS releases. CSCti82605 was then made a duplicate of this bug (CSCth25634)
since the fix for this bug also fixes CSCti82605.
CSCth69364
Cisco IOS Software contains a memory leak vulnerability in the Data-Link Switching (DLSw)
feature that could result in a device reload when processing crafted IP Protocol 91 packets.
Cisco has released free software updates that address this vulnerability.
This advisory is posted at http://www.cisco.com/warp/public/707/cisco-sa-20110928-dlsw.shtml.
CSCtj22457
Symptoms: ISSU fails with config sync failure mcl.
Conditions: This symptom is seen during the commitversion of ISSU.
Workaround: There is no workaround.
CSCtj38606
Symptoms: The following error message is seen:
%SYSTEM_CONTROLLER-3-MISTRAL_RESET: System Controller is reset:Normal Operation
continues
The show ibc exec command reports increments of the following counter:
Hazard Illegal packet length = 7580
Conditions: The symptom is observed on a Cisco 7600 series router.
Workaround: There is no workaround.
Vista de pagina 5
1 2 3 4 5 6 7 8 9 10 11 ... 397 398

Comentarios a estos manuales

Sin comentarios