Table Of Contents
Release Notes for Cisco IAD2430 Series Integrated Access Devices with Cisco IOS Release 12.4(15)XZ
Cisco IAD 2430 Series Integrated Access Device
MGCP Endpoint Naming Convention
Determining the Software Version
Upgrading to a New Software Release
New Hardware Features in Cisco IOS Release 12.4(15)XZ2
New Software Features in Cisco IOS Release 12.4(15)XZ2
Open Caveats - Cisco IOS Release 12.4(15)XZ2
Resolved Caveats - Cisco IOS Release 12.4(15)XZ2
Cisco IOS Software Documentation Set
Release Notes for Cisco IAD2430 Series Integrated Access Devices with Cisco IOS Release 12.4(15)XZ
First Released: February 24, 2009Last Revised: March 25, 2009Cisco IOS Release 12.4(15)XZ2OL-19158-01 First ReleaseThese release notes for the Cisco IAD2430 Series Integrated Access Devices (IAD) describe the product-related enhancements provided in Cisco IOS Release 12.4(15)XZ.
These release notes are updated as needed. Use these release notes with the Cross-Platform Release Notes for Cisco IOS Release 12.4T and About Cisco
IOS Release Notes.For a list of the software caveats that apply to Cisco IOS Release 12.4(15)XZ, see the "Caveats" section and the online Caveats for Cisco IOS Release 12.4(20)T. The caveats document is updated for every 12.4T maintenance release.
Contents
These release notes describe the following topics:
Introduction
The Cisco IAD2430 is the next generation integrated voice and data services platform for Service Providers, building on the industry leading Cisco IAD2420 series IAD. The Cisco IAD2430 series offers a major leap forward in price performance and enhanced software functionality such as MGCP SRST used to accelerate the migration from time division multiplexing (TDM) to VoIP cost efficiently. The Cisco IAD2430 series harnesses the maturity of the Cisco IAD2420 series software and enhances functionality by providing more capabilities such as denser interfaces (up to 24 FXS and up to 2 voice or 2 data T1s), encryption, and DC power back up while maintaining it's 1RU form factor for space saving Service Provider Managed Services deployment.
For information on new features and Cisco IOS commands supported by Cisco IOS Release 12.4(15)XZ, see the "New and Changed Information" section.
Cisco IAD 2430 Series Integrated Access Device
The Cisco IAD2430 Series Integrated Access Device consists of the following five models:
•Cisco 2430-24FXS IAD
•Cisco 2431-8FXS IAD
•Cisco 2431-16FXS IAD
•Cisco 2431-1T1E1 IAD
•Cisco 2432-24FXS IAD
The following WAN interface cards (WICs) and Voice Interface Cards (VICs) are supported:
•VIC2-2FXO
•VIC2-2FXS
•VIC-4FXS/DID
•VIC2-2BRI-NT/TE
•VWIC-2MFT-T1
•VWIC-2MFT-E1
•WIC-1T
•WIC-1ADSL
•WIC-1SHDSL
•WIC-1ADSL-DG
•WIC-1SHDSL-V2
Port Numbering
Port numbering conventions for the Cisco IAD2430 Series Integrated Access Device differs from the Cisco IAD2420 Series Integrated Access Device:
•An external compact flash card is numbered slot 0.
•10/100Base-T Fast Ethernet ports are numbered Fast Ethernet 0/0 and Fast Ethernet 0/1 from right to left.
•T1/E1 ports are numbered T1 or E1 1/0 and T1 or E1 1/1 from right to left.
•The slot for WICs and VICs is numbered slot 0. WIC and VIC interfaces are numbered by interface face with this slot number and an interface number, beginning with 0 and running from right to left.
•FXS voice port numbering begins at 2/0 and extends to 2/7, 2/15, or 2/23, depending on the number of voice ports.
MGCP Endpoint Naming Convention
The Media Gateway Control Protocol (MGCP) endpoint naming convention for Cisco IAD2430 Series IAD differs from the Cisco IAD2420 Series IAD. The MGCP naming convention for the Cisco IAD2430 Series IAD is the following:
Cisco IAD2431-1T1E1
S1/DS1-0/1@iad2430-digital
S1/DS1-0/2@iad2430-digital
. . .
S1/DS1-0/24@iad2430-digitalS1/DS1-1/1@iad2430-digital
S1/DS1-1/2@iad2430-digital
. . .
S1/DS1-1/24@iad2430-digitalCisco IAD2430-24FXS, IAD2431-8FXS, IAD2431-16FXS, IAD2432-24FXS
AALN/S2/0@iad2430-analog
AALN/S2/1@iad2430-analog
. . .
AALN/S2/23@iad2430-analogVoice Analog Ports
AALN/S0/0@iad2430-analog
AALN/S0/1@iad2430-analog
AALN/S0/2@iad2430-analog
AALN/S0/3@iad2430-analogSystem Requirements
This section describes the system requirements for the Cisco IOS Release 12.4(15)XZ releases and includes the following sections:
•Determining the Software Version
•Upgrading to a New Software Release
Memory Requirements
Table 1 lists the memory recommendations of the Cisco IOS feature sets for the Cisco IAD2430 series IAD for Cisco IOS Release 12.4(15)XZ. Cisco IAD2430 series IAD are available with a 32-MB Flash memory card.
Hardware Supported
Cisco IOS Release 12.4(15)XZ supports the following platforms:
•Cisco IAD2430
•Cisco IAD2431
•Cisco IAD2432
For detailed descriptions of the new hardware features, see the "New and Changed Information" section.
Determining the Software Version
To determine the version of Cisco IOS software currently running on your Cisco IAD2430 series router, see About Cisco IOS Release Notes located at http://www.cisco.com/en/US/docs/ios/12_4/12_4x/12_4xy15/ReleaseNote.html.
Upgrading to a New Software Release
For general information about upgrading to a new software release, see About Cisco IOS Release Notes located at http://www.cisco.com/en/US/docs/ios/12_4/12_4x/12_4xy15/ReleaseNote.html.
Feature Set Tables
For information about Feature Set Tables, see About Cisco IOS Release Notes located at http://www.cisco.com/en/US/docs/ios/12_4/12_4x/12_4xy15/ReleaseNote.html.
New and Changed Information
The following sections list the new hardware products and software features supported by the Cisco IAD2430 series IAD in Cisco IOS Release 12.4(15)XZ:
•New Hardware Features in Cisco IOS Release 12.4(15)XZ2
•New Software Features in Cisco IOS Release 12.4(15)XZ2
•New Features in Release 12.4T
New Hardware Features in Cisco IOS Release 12.4(15)XZ2
There are no new hardware features in this release.
New Software Features in Cisco IOS Release 12.4(15)XZ2
There are no new software features in this release.
New Features in Release 12.4T
For information regarding the features supported in Cisco IOS Release 12.4T, see the Cross-Platform Release Notes links at: http://www.cisco.com/en/US/products/ps6441/prod_release_notes_list.html
Limitations and Restrictions
There are no known limitations or restrictions in this release.
Caveats
For general information on caveats and the bug toolkit, see About Cisco IOS Release Notes located at http://www.cisco.com/en/US/docs/ios/12_4/12_4x/12_4xy15/ReleaseNote.html.
This section contains the following caveat information:
•Open Caveats - Cisco IOS Release 12.4(15)XZ2
•Resolved Caveats - Cisco IOS Release 12.4(15)XZ2
Open Caveats - Cisco IOS Release 12.4(15)XZ2
There are no open caveats in this release.
Resolved Caveats - Cisco IOS Release 12.4(15)XZ2
CSCsr16693 A series of TCP packets may cause a denial of service (DoS) condition on Cisco IOS devices that are configured as Easy VPN servers with the Cisco Tunneling Control Protocol (cTCP) encapsulation feature.Cisco has released free software updates that address this vulnerability. No workarounds are available; however, the IPSec NAT traversal (NAT-T) feature can be used as an alternative.
This advisory is posted at http://www.cisco.com/warp/public/707/cisco-sa-20090325-ctcp.shtml.
Note: The March 25, 2009, Cisco IOS Security Advisory bundled publication includes eight Security Advisories. All of the advisories address vulnerabilities in Cisco IOS Software. Each advisory lists the releases that correct the vulnerability or vulnerabilities in the advisory. The following table lists releases that correct all Cisco IOS Software vulnerabilities that have been published in Cisco Security Advisories on March 25, 2009, or earlier.
http://www.cisco.com/warp/public/707/cisco-sa-20090325-bundle.shtml
CSCsu21828 A series of TCP packets may cause a denial of service (DoS) condition on Cisco IOS devices that are configured as Easy VPN servers with the Cisco Tunneling Control Protocol (cTCP) encapsulation feature.Cisco has released free software updates that address this vulnerability. No workarounds are available; however, the IPSec NAT traversal (NAT-T) feature can be used as an alternative.
This advisory is posted at http://www.cisco.com/warp/public/707/cisco-sa-20090325-ctcp.shtml.
Note: The March 25, 2009, Cisco IOS Security Advisory bundled publication includes eight Security Advisories. All of the advisories address vulnerabilities in Cisco IOS Software. Each advisory lists the releases that correct the vulnerability or vulnerabilities in the advisory. The following table lists releases that correct all Cisco IOS Software vulnerabilities that have been published in Cisco Security Advisories on March 25, 2009, or earlier.
http://www.cisco.com/warp/public/707/cisco-sa-20090325-bundle.shtml
CSCsv38166 The server side of the Secure Copy (SCP) implementation in Cisco IOS software contains a vulnerability that could allow authenticated users with an attached command-line interface (CLI) view to transfer files to and from a Cisco IOS device that is configured to be an SCP server, regardless of what users are authorized to do, per the CLI view configuration.This vulnerability could allow valid users to retrieve or write to any file on the device's file system, including the device's saved configuration and Cisco IOS image files, even if the CLI view attached to the user does not allow it. This configuration file may include passwords or other sensitive information.
The Cisco IOS SCP server is an optional service that is disabled by default. CLI views are a fundamental component of the Cisco IOS Role-Based CLI Access feature, which is also disabled by default. Devices that are not specifically configured to enable the Cisco IOS SCP server, or that are configured to use it but do not use role-based CLI access, are not affected by this vulnerability.
This vulnerability does not apply to the Cisco IOS SCP client feature.
Cisco has released free software updates that address this vulnerability.
There are no workarounds available for this vulnerability apart from disabling either the SCP server or the CLI view feature if these services are not required by administrators.
This advisory is posted at the following link:
http://www.cisco.com/warp/public/707/cisco-sa-20090325-scp.shtml.
CSCsu11522 A vulnerability exists in the Session Initiation Protocol (SIP) implementation in Cisco IOS software that can be exploited remotely to cause a reload of the Cisco IOS device.Cisco has released free software updates that address this vulnerability. There are no workarounds available to mitigate the vulnerability apart from disabling SIP, if the Cisco IOS device does not need to run SIP for VoIP services. However, mitigation techniques are available to help limit exposure to the vulnerability.
This advisory is posted at the following link:
http://www.cisco.com/warp/public/707/cisco-sa-20090325-sip.shtml.
CSCsr29468 Cisco IOS software contains a vulnerability in multiple features that could allow an attacker to cause a denial of service (DoS) condition on the affected device. A sequence of specially crafted TCP packets can cause the vulnerable device to reload.Cisco has released free software updates that address this vulnerability.
Several mitigation strategies are outlined in the workarounds section of this advisory.
This advisory is posted at http://www.cisco.com/warp/public/707/cisco-sa-20090325-tcp.shtml
CSCsq50366 Last digit getting truncated when prefix is set to its max value of 32.Symptom Last digit getting truncated when prefix is configured with a length of 32 under the dial-peer.
Conditions When the prefix is configured with a length of 32 under the dial-peer only 31 digits are being sent across and the calls fails as there is no matching dial-peer at the other end. When the prefix is configured for 31 digits, then all the digits are sent correctly and the call is successful.
This is seen in the following call scenario:
1. Configure E1R2 ds0 groups between callgen and UUT:
2. Callgen calls into the UUT using ds0-group1.
3. The UUT has DID configured.
4. The UUT directs the call to ds0-group2 which is connected back to callgen.
5. Callgen has DID configured for the incoming call.
6. Callgen directs the call to ds0-group3 which is connected back to the UUT
7. The uut establishes a VoIP call leg back to callgen.
Workaround None.
CSCsr68545 Error %DATACORRUPTION-1-DATAINCONSISTENCY when running ipsla with rtt.Symptom Error message occurs:
000302: Jul 24 13:00:13.575 CDT: %DATACORRUPTION-1-DATAINCONSISTENCY: copy error -Traceback= 0x410FD1A4 0x41119DB0 0x41138324 0x41DE5714
Conditions IP SLA configured with RTT.
Workaround None.
CSCsr27960 Traceback observed after configuring credential under sip-ua.Symptom Traceback observed when configuring credentials CLI under sip-ua.
Conditions This happens when user configures credentials CLI with username length more than 32 characters.
Workaround None.
CSCso58935 Caller ID still display Barge for point-to-point call between sccp share.Symptom Caller ID still display To Barge for point to point call between two sccp shared line phones after the other party drops out from cBarge conference.
Workaround None.
CSCsr14658 CLI Cannot handle Double quotes.Symptom CME 4.3. IOS 12.4.15XZ SP Services. Under telephony-service the following url services was configured:
http://10.1.1.1 "My service"
Note the quotes. On the running config you see the above command without the quotes and everything works fine. When you type wr, then you again see the same command without the quotes. The issue is that, when you reload the router, the command is there, but it is not accepted and you have to type it again. Also, if you type url services http://10.1.1.1 My service, then you get an error of invalid input.
Conditions Normal operation.
Workaround Use one word and underscore instead of space.
CSCsq48167 CME DN description command may allow for open-ended quote delimination.Symptom The CME description command under the ephone-dn potentially allows for the description string to be saved to the router configuration without a trailing quote. This leaves an open-ended delimination in the configuration for the description string, and will cause the CME GUI to fail to load with an "unterminated string constant" error.
Conditions There are two ways that the configuration can get a description with no closing quote:
1. Description is entered with quotes on both sides, and total string length is between 33 and 40 characters.
<i>Entering</i>
Router(config)#ephone-dn 1
Router(config-ephone-dn)#description "01234567890123456789012345678912345"
<i>Appears as</i>
ephone-dn 1
description "01234567890123456789012345678912
2. Description is entered with quotes only on beginning of string.
<i>Entering</i>
Router(config)#ephone-dn 1
Router(config-ephone-dn)#description "test
<i>Appears as</i>
ephone-dn 1
description "test
Workaround Enter the description without any quotes via the CLI.
Additional References
Use this release note with the documents and websites in this release note and the documents listed in the following sections:
Release-Specific Documents
The following documents are specific to Release 12.4 and apply to Release 12.4(15)XZ.
•Cross-Platform Release Notes for Cisco IOS Release 12.4T
•Cisco IOS Software Releases 12.4 Special and Early Deployments
•Caveats for Cisco IOS Release 12.4(15)T
Platform-Specific Documents
Hardware installation guides, configuration and command reference guides, and additional documents specific to the Cisco IAD2430 are at:
http://www.cisco.com/en/US/products/hw/gatecont/ps887/tsd_products_support_series_home.html
Cisco IOS Software Documentation Set
The Cisco IOS software documentation set consists of the Cisco IOS configuration guides, Cisco IOS command references, and several other supporting documents.
Documentation Modules
Each module in the Cisco IOS documentation set consists of one or more configuration guides and one or more corresponding command references. Chapters in a configuration guide describe protocols, configuration tasks, and Cisco IOS software functionality, and contain comprehensive configuration examples. Chapters in a command reference provide complete command syntax information. Use each configuration guide with its corresponding command reference. Cisco IOS Software Documentation is available in html or pdf form.
Select your release and click the command references, configuration guides, or any other Cisco IOS documentation you need.
Notices
See the "Notices" section in About Cisco IOS Release Notes located at: http://www.cisco.com/en/US/docs/ios/12_4/12_4x/12_4xy15/ReleaseNote.html.
Use this document in conjunction with the documents listed in the "Additional References" section.
CCDE, CCENT, Cisco Eos, Cisco HealthPresence, the Cisco logo, Cisco Lumin, Cisco Nexus, Cisco StadiumVision, Cisco TelePresence, Cisco WebEx, DCE, and Welcome to the Human Network are trademarks; Changing the Way We Work, Live, Play, and Learn and Cisco Store are service marks; and Access Registrar, Aironet, AsyncOS, Bringing the Meeting To You, Catalyst, CCDA, CCDP, CCIE, CCIP, CCNA, CCNP, CCSP, CCVP, Cisco, the Cisco Certified Internetwork Expert logo, Cisco IOS, Cisco Press, Cisco Systems, Cisco Systems Capital, the Cisco Systems logo, Cisco Unity, Collaboration Without Limitation, EtherFast, EtherSwitch, Event Center, Fast Step, Follow Me Browsing, FormShare, GigaDrive, HomeLink, Internet Quotient, IOS, iPhone, iQuick Study, IronPort, the IronPort logo, LightStream, Linksys, MediaTone, MeetingPlace, MeetingPlace Chime Sound, MGX, Networkers, Networking Academy, Network Registrar, PCNow, PIX, PowerPanels, ProConnect, ScriptShare, SenderBase, SMARTnet, Spectrum Expert, StackWise, The Fastest Way to Increase Your Internet Quotient, TransPath, WebEx, and the WebEx logo are registered trademarks of Cisco Systems, Inc. and/or its affiliates in the United States and certain other countries.
All other trademarks mentioned in this document or website are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (0812R)
Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be actual addresses and phone numbers. Any examples, command display output, network topology diagrams, and other figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses or phone numbers in illustrative content is unintentional and coincidental.
© 2009, Cisco Systems, Inc. All rights reserved.