Cisco OL-4015-08 Manuel d'utilisateur Page 13

  • Télécharger
  • Ajouter à mon manuel
  • Imprimer
  • Page
    / 678
  • Table des matières
  • MARQUE LIVRES
  • Noté. / 5. Basé sur avis des utilisateurs
Vue de la page 12
365
Cross-Platform Release Notes for Cisco IOS Release 12.0S
OL-1617-14 Rev. Q0
Caveats
Resolved Caveats—Cisco IOS Release 12.0(33)S9
In this case, we have superneted an IP address.
Workaround: If we have this scenario [superneted IP address], workaround is to use the clear ip
route * command.
CSCtc72553
Symptoms: An E5 linecard on a Cisco 12000 crashes.
Conditions: This symptom occurs with high traffic on OC48, E5, and possibly corrupt packets
(MPLS packets without an MPLS label) received on the linecard.
The logs show the following:
Sep 30 01:41:01.958 PRC: %MBUS_SYS-3-NOBUFFER: Message from slot 1 in stream 1 dropped
Sep 30 01:41:02.062 PRC: %FIB-2-FIBDISABLE: Fatal error, slot 1: IPC Failure: timeout
Sep 30 01:41:02.062 PRC: %RP-4-RSTSLOT: Resetting the card in the slot: 1,Event: CEF
failure
Workaround: There is no workaround.
Further Problem Description: The crash is seen on E5 OC48. Forwarding engine error interrupts are
observed.
There is a basic configuration on the interface; a plain IPv4 configuration without MPLS.
CSCtg22674
Symptoms: The router experiences high CPU for several minutes due to “MPLS TE LM” process.
Conditions: This symptom occurs when a router has many (perhaps as few as 100) MPLS TE tunnels
that traverse over a link which experiences repeated flapping in a short duration.
Workaround: There is no workaround.
Further Problem Description: Use the show process cpu command to determine CPU utilization. If
this problem exists, the MPLS TE LM process holds greater than 90-percent resources for 5 minutes
or more.
CPU utilization for five seconds: 100%/0%; one minute: 100%; five minutes: 100% PID
Runtime(ms) Invoked uSecs 5Sec 1Min 5Min TTY Process 216 867694836 18357673 47266
99.67% 99.09% 99.11% 0 MPLS TE LM
CSCth87458
Symptoms: Memory leak detected in SSH process during internal testing. Authentication is required
in order for a user to cause the memory leak.
Conditions: This was experienced during internal protocol robustness testing.
Workaround: Allow SSH connections only from trusted hosts.
PSIRT Evaluation: The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The
Base and Temporal CVSS scores as of the time of evaluation are 6.8/5.6:
https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&ve
ctor=AV:N/AC:L/Au:S/C:N/I:N/A:C/E:F/RL:OF/RC:C CVE ID CVE-2011-2568
Has been assigned to document this issue. Additional information on Cisco’s security vulnerability
policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html
CSCtj44454
Symptoms: The “SCP Read” process is at 99 percent, and the SCP session is stuck or not responding
to commands.
Vue de la page 12
1 2 ... 8 9 10 11 12 13 14 15 16 17 18 ... 677 678

Commentaires sur ces manuels

Pas de commentaire