
510
Cross-Platform Release Notes for Cisco IOS Release 12.0S
OL-1617-14 Rev. Q0
Caveats
Resolved Caveats—Cisco IOS Release 12.0(32)S11
Conditions: This symptom has been observed in Cisco IOS Release 12.0(32)S2, on routers with
scaled configurations, after RPR+ switchovers.
Workaround: There is no workaround.
• CSCse50781
Symptoms: After executing the no ipv6 multicast-routing command on a dual-RP router, IPC
communication to the standby RP may be broken, and the following messages may be seen every
minute:
%IPCGRP-3-ERROR: standby set time: timeout seen
Conditions: This symptom is observed on a Cisco 12000 series router that is running the
c12kprp-p-mz image of Cisco IOS Release 12.0(32)SY.
Workaround: Reload the router.
Further Problem Description: This bug is seen only while operating in SSO mode (not in RPR
mode).
• CSCse52184
Symptoms: Traffic may be interrupted for a short duration because of FIB updates. This issue
happens very frequently and affects traffic forwarding.
Conditions: This issue is seen when MPLS TE tunnels are configured.
This issue is triggered when an interface is shut down and then brought back up if that interface is
carrying a large rate of traffic. The problem is intensified by two factors:
1) Tunnel interface is kept flapping because of:
a) Reoptimization
b) Connection down
2) One tunnel flapping could trigger entire (or a very large number of) FIB updates.
So if we do not have 2), then traffic may just be lost for a very short duration, and it will not impact
application.
Workaround: There is no workaround.
• CSCse56501
A device running Cisco IOS software that has Internet Protocol version 6 (IPv6) enabled may be
subject to a denial of service (DoS) attack. For the device to be affected by this vulnerability the
device also has to have certain Internet Protocol version 4 (IPv4) User Datagram Protocol (UDP)
services enabled. To exploit this vulnerability an offending IPv6 packet must be targeted to the
device. Packets that are routed throughout the router can not trigger this vulnerability. Successful
exploitation will prevent the interface from receiving any additional traffic. The only exception is
Resource Reservation Protocol (RSVP) service, which if exploited, will cause the device to crash.
Only the interface on which the vulnerability was exploited will be affected.
Cisco is providing fixed software to address this issue. There are workarounds available to mitigate
the effects of the vulnerability.
This advisory is posted at:
http://www.cisco.com/warp/public/707/cisco-sa-20080326-IPv4IPv6.shtml
• CSCsf20947
Symptoms: A default route that is originated and advertised to a BGP peer using the neighbor
default-originate command may be ignored by the peer in favor of a traditional default route (from
the BGP table) that is advertised to the same peer.
Comentarios a estos manuales