Table Of Contents
Release Notes for Cisco 800 Series Integrated Services Routers with Cisco IOS Release 12.4(15)XZ
Determining the Software Version
Upgrading to a New Software Release
New Hardware Features in Cisco IOS Release 12.4(15)XZ5
New Software Features in Cisco IOS Release 12.4(15)XZ5
New Hardware Features in Cisco IOS Release 12.4(15)XZ2
New Software Features in Cisco IOS Release 12.4(15)XZ2
New Hardware Features in Cisco IOS Release 12.4(15)XZ1
New Software Features in Cisco IOS Release 12.4(15)XZ1
New Hardware Features in Cisco IOS Release 12.4(15)XZ
3G Cellular Data WAN Connectivity
New Software Features in Cisco IOS Release 12.4(15)XZ
Adaptive Control Technology (ACT)
Support for Cisco Unified CME 4.3
G.722-64 and iLBC Codec Support
Configurable SIP Listening Port
Cisco Secure Router 520 Series
Subscription-based Cisco IOS Content Filtering
Embedded Access Point HTML GUI
Open Caveats - Release 12.4(15)XZ5
Resolved Caveats - Release 12.4(15)XZ5
Open Caveats - Release 12.4(15)XZ2
Resolved Caveats - Release 12.4(15)XZ2
Open Caveats - Release 12.4(15)XZ1
Resolved Caveats - Release 12.4(15)XZ1
Open Caveats - Release 12.4(15)XZ
Resolved Caveats - Release 12.4(15)XZ
Cisco IOS Software Documentation Set
Release Notes for Cisco 800 Series Integrated Services Routers with Cisco IOS Release 12.4(15)XZ
First Released: April 14, 2008Last Revised: March 25, 2009Cisco IOS Release 12.4(15)XZ2OL-16729-02 Third ReleaseThese release notes describe new features and significant software components for the Cisco 800 series Integrated Services Routers (ISRs) that support Cisco IOS Release 12.4(15)XZ. These release notes are updated as needed. Use these release notes with the Cross-Platform Release Notes for Cisco IOS Release 12.4T and About Cisco IOS Release Notes.
For a list of the software caveats that apply to the Release 12.4(15)XZ releases, see the "Caveats" section, and see the online Caveats for Cisco IOS Release 12.4(15)T document. The caveats document is updated for every 12.4T maintenance release.
Contents
•Embedded Access Point HTML GUI
System Requirements
This section describes the system requirements for Cisco IOS Release 12.4(15)XZ and includes the following sections:
•Determining the Software Version
•Upgrading to a New Software Release
Memory Requirements
lists the memory requirements for the Cisco IOS feature sets that are supported by Cisco IOS Release 12.4(15)XZ on the Cisco 800 series routers.
Hardware Supported
Cisco IOS Release 12.4(15)XZ supports the following routers:
•Cisco 851
•Cisco 857
•Cisco 861
•Cisco 876
•Cisco 871
•Cisco 877
•Cisco 878
•Cisco 881
•Cisco 888
For detailed descriptions of new hardware features and which features are supported on each router, see the "New and Changed Information" section.
Determining the Software Version
To determine the version of Cisco IOS software currently running on your Cisco 800 series router, see About Cisco IOS Release Notes located at http://www.cisco.com/en/US/docs/ios/12_4/12_4x/12_4xy15/ReleaseNote.html.
Upgrading to a New Software Release
For general information about upgrading to a new software release, see About Cisco IOS Release Notes located at http://www.cisco.com/en/US/docs/ios/12_4/12_4x/12_4xy15/ReleaseNote.html.
Feature Set Tables
For information about Feature Set Tables, see About Cisco IOS Release Notes located at http://www.cisco.com/en/US/docs/ios/12_4/12_4x/12_4xy15/ReleaseNote.html.
New and Changed Information
•New Hardware Features in Cisco IOS Release 12.4(15)XZ2
•New Software Features in Cisco IOS Release 12.4(15)XZ2
•New Hardware Features in Cisco IOS Release 12.4(15)XZ1
•New Software Features in Cisco IOS Release 12.4(15)XZ1
•New Hardware Features in Cisco IOS Release 12.4(15)XZ
•New Software Features in Cisco IOS Release 12.4(15)XZ
•New Features in Release 12.4T
New Hardware Features in Cisco IOS Release 12.4(15)XZ5
There are no new hardware features in this release.
New Software Features in Cisco IOS Release 12.4(15)XZ5
There are no new software features in this release.
New Hardware Features in Cisco IOS Release 12.4(15)XZ2
There are no new hardware features in this release.
New Software Features in Cisco IOS Release 12.4(15)XZ2
There are no new software features in this release.
New Hardware Features in Cisco IOS Release 12.4(15)XZ1
There are no new hardware features in this release.
New Software Features in Cisco IOS Release 12.4(15)XZ1
There are no new software features in this release.
New Hardware Features in Cisco IOS Release 12.4(15)XZ
The new hardware features are:
•3G Cellular Data WAN Connectivity
USB Port
A Universal Serial Bus (USB 1.1-compliant) port is located on the front panel. The USB port provides connection for USB devices such as security tokens, flash memory, and printers.
Power over Ethernet Module
The Power over Ethernet (PoE) module provides power to devices connected to the Ethernet ports. The 2-port PoE module is an option available only for the Cisco 880 series ISRs.
Real Time Clock
A real-time clock (RTC) provides date and time when the system is powered on. The RTC is used to verify the validity of the Certification Authority stored on the router.
3G Cellular Data WAN Connectivity
The 3G (Evolution Data Only [EVDO], Universal Mobile Telecommunications Systems [UMTS]) cellular interface is intended for use as a backup data link, but it can also be used as a primary WAN data link. The 3G technology is third-generation wide-area cellular technology that is used in voice telephony and broadband wireless data in a mobile environment.
The Cisco 88xG models come with a 34-mm card slot ready for use with a commercial 3G card radio. The 3G card slot is located on the front panel. For the list of supported 3G cards see the data sheet.
4-port 10/100 FE LAN Switch
This switch provides four ports of 10/100BASE-T FE connection for LANs, access points, or IP phones. In addition, an upgrade is available that gives Power over Ethernet (PoE) on two of the ports to provide power to access points or phones.
Wireless LAN Connectivity
The embedded wireless device is pre installed in the router as an optional feature. The wireless device provides 802.11n wireless connectivity and supports autonomous features and network configurations.
New Software Features in Cisco IOS Release 12.4(15)XZ
The new software features are:
•Adaptive Control Technology (ACT)
•Support for Cisco Unified CME 4.3
•G.722-64 and iLBC Codec Support
•Configurable SIP Listening Port
•Cisco Secure Router 520 Series
•Subscription-based Cisco IOS Content Filtering
802.11n Wireless LAN Option
This option provides the router with an integrated 802.11n module for wireless LAN connectivity. The router can then act as an access point in the local infrastructure.
Adaptive Control Technology (ACT)
The Cisco Adaptive Control Technology (ACT) solution is an innovative policy framework that enables network administrators to promptly respond to unusual network incidents and obtain deeper insight into network behavior for advanced troubleshooting. Cisco ACT leverages Cisco routers and switches to rapidly push out dynamic, network-wide policy changes to control network issues until more permanent actions can take place. The ACT solution enables the entire network to respond to security threats, troubleshoot changing conditions, trial possible remedies, and recover to a desired state.
Support for Cisco Unified CME 4.3
Cisco Unified Communications Manager Express 4.3 (Cisco Unified CME) introduces new features for SCCP IP phones including the following:
•Eight Lines Per Button (Octo-Line Directory Number)
•Conference Barge
•Privacy and Privacy on Hold
•Call Transfer Recall
•Consultative Transfer Enhancements
•Transfer to Voice Mail
•Directory Search Enhancement
•Voice Hunt-Group Enhancements
•Live Record
•Ephone-Type Configuration
•Speed Dial/Fast Dial Phone User Interface
•Support for the Cisco 3200 Series Mobile Access Router
See the Cisco Unified Communications Manager Express System Administrator Guide at the following URL for more information:
http://www.cisco.com/en/US/docs/voice_ip_comm/cucme/admin/configuration/guide/cmeadm.html
G.722-64 and iLBC Codec Support
G.722-64 and iLBC Codec Support on Cisco Unified Communications Manager Express, Cisco Unified Border Elements, DSP Farm, and Voice Gateways The G.722-64 and iLBC codecs are supported for Cisco Unified Communications Manager Express, Cisco Unified Border Elements (Cisco UBEs), DSP Farm, and voice gateways. Conferencing and universal transcoding are supported on both codecs. The G.722-64 and iLBC codecs can be used to enable conferencing and transcoding on Cisco IOS voice gateways in a Cisco Unified Communications Manager network. Digital signal processor (DSP) farms provide conferencing and transcoding services using DSP resources on high-density digital voice/fax network modules.
To configure conferencing and transcoding for voice gateway routers, see the "Configuring Enhanced Conferencing and Transcoding for Voice Gateway Routers" chapter of the Cisco CallManager and Cisco IOS Interoperability Guide at the following URL:
http://www.cisco.com/en/US/docs/ios/12_3/vvf_c/interop/intcnf2.html
Configurable SIP Listening Port
Allows users the ability to configure the port that SIP messages are listened on. See the following URL for more information:
http://cisco.com/en/US/docs/ios/voice/cube/configuration/guide/vb-gw-sipsip.html
Cisco Secure Router 520 Series
The Cisco Secure Router 520 Series routers are designed for small businesses with up to 50 users and teleworkers who want secure connectivity to corporate LANs and to the Internet. These routers provide advanced security features that include secure Virtual Private Network (VPN) access and comprehensive threat defense with Cisco IOS Firewall, Intrusion Prevention Solution (IPS), and URL filtering. The Cisco Secure Router 520 Series routers also provide dynamic routing and advanced quality of service (QoS) features. They are available in two Ethernet models and four DSL models. See the following URL for more information:
http://www.cisco.com/en/US/products/ps9305/tsd_products_support_series_home.html
Subscription-based Cisco IOS Content Filtering
The Subscription-based Cisco IOS Content Filtering feature is part of the Cisco IOS Firewall feature set. The feature interacts with the Trend Micro URL filtering service so that HTTP requests can be allowed, blocked, or simply logged, based on a content filtering policy. The content filtering policy specifies how to handle items such as categories, reputations, security ratings, trusted domains, untrusted domains, and keywords. URLs are cached on the router for better performance. In addition, support for 3rd-party filtering servers such as SmartFilter and Websense are still available.
For more information, see:
http://www.cisco.com/en/US/docs/ios/sec_data_plane/configuration/guide/sec_url_filtering.htmlSecurity Features
The Cisco 800 platforms provide the following security features:
•Intrusion Prevention System (IPS)
•Dynamic multipoint VPN (DMVPN)
•IPSec
•Quality of Service (QoS)
•Firewall
•Public Key Infrastructure (PKI) support
•20 IPSec tunnels
•Cisco Easy VPN client and server
•NAT transparency
•Secure HTTP (HTTPS), FTP, and Telnet authentication proxy
New Features in Release 12.4T
For information regarding the features supported in Cisco IOS Release 12.4T, see the Cross-Platform Release Notes links at: http://www.cisco.com/en/US/products/ps6441/prod_release_notes_list.html
Embedded Access Point HTML GUI
The Cisco 800 Series ISRs provide HTML GUI access and configuration for the wireless device. First, establish a wireless configuration session to the access wireless device, and then you can access the HTML GUI through a browser using the IP address of the BVI interface. This HTML GUI is based on Cisco Aironet 1250 Access Point's GUI and reflects the same features and functionality. Differences in feature support are noted below:
•Repeater mode is not supported, therefore 'Repeater' has been removed from the GUI.
•WLSE is not supported, therefore the appearance of 'SWAN architecture' on the Wireless Services page, under 'AP' config is removed from the GUI.
•The GigabitEthernet0 interface is internal and can not be shut down, therefore the 'shut down' option for the GigabitEthernet0 interface is removed from the GUI.
Note There is an exception with the 'External Antenna Configuration' settings. The Cisco 800 series ISRs have fixed antennas, however the enable option for 'External Antenna Configuration' remains in the GUI, so no action will occur if this option is chosen.
Caveats
For general information on caveats and the bug toolkit, see About Cisco IOS Release Notes located at http://www.cisco.com/en/US/docs/ios/12_4/12_4x/12_4xy15/ReleaseNote.html.
This section contains the following caveat information:
•Open Caveats - Release 12.4(15)XZ2
•Resolved Caveats - Release 12.4(15)XZ2
•Open Caveats - Release 12.4(15)XZ1
•Resolved Caveats - Release 12.4(15)XZ1
•Open Caveats - Release 12.4(15)XZ
•Resolved Caveats - Release 12.4(15)XZ
Open Caveats - Release 12.4(15)XZ5
There are no open caveats in this release.
Resolved Caveats - Release 12.4(15)XZ5
CSCso96729
A FIPS certifiication crypto self-test can cause the router to reboot.
Open Caveats - Release 12.4(15)XZ2
There are no open caveats in this release.
Resolved Caveats - Release 12.4(15)XZ2
•CSCsv04836
Multiple Cisco products are affected by denial of service (DoS) vulnerabilities that manipulate the state of Transmission Control Protocol (TCP) connections. By manipulating the state of a TCP connection, an attacker could force the TCP connection to remain in a long-lived state, possibly indefinitely. If enough TCP connections are forced into a long-lived or indefinite state, resources on a system under attack may be consumed, preventing new TCP connections from being accepted. In some cases, a system reboot may be necessary to recover normal system operation. To exploit these vulnerabilities, an attacker must be able to complete a TCP three-way handshake with a vulnerable system.
In addition to these vulnerabilities, Cisco Nexus 5000 devices contain a TCP DoS vulnerability that may result in a system crash. This additional vulnerability was found as a result of testing the TCP state manipulation vulnerabilities.
Cisco has released free software updates for download from the Cisco website that address these vulnerabilities. Workarounds that mitigate these vulnerabilities are available.
This advisory is posted at http://www.cisco.com/warp/public/707/cisco-sa-20090908-tcp24.shtml.
CSCsr16693A series of TCP packets may cause a denial of service (DoS) condition on Cisco IOS devices that are configured as Easy VPN servers with the Cisco Tunneling Control Protocol (cTCP) encapsulation feature. Cisco has released free software updates that address this vulnerability. No workarounds are available; however, the IPSec NAT traversal (NAT-T) feature can be used as an alternative.
This advisory is posted at http://www.cisco.com/warp/public/707/cisco-sa-20090325-ctcp.shtml.
Note: The March 25, 2009, Cisco IOS Security Advisory bundled publication includes eight Security Advisories. All of the advisories address vulnerabilities in Cisco IOS Software. Each advisory lists the releases that correct the vulnerability or vulnerabilities in the advisory. The following table lists releases that correct all Cisco IOS Software vulnerabilities that have been published in Cisco Security Advisories on March 25, 2009, or earlier.
http://www.cisco.com/en/US/products/products_security_advisories_listing.html
CSCsu21828A series of TCP packets may cause a denial of service (DoS) condition on Cisco IOS devices that are configured as Easy VPN servers with the Cisco Tunneling Control Protocol (cTCP) encapsulation feature. Cisco has released free software updates that address this vulnerability. No workarounds are available; however, the IPSec NAT traversal (NAT-T) feature can be used as an alternative.
This advisory is posted at http://www.cisco.com/warp/public/707/cisco-sa-20090325-ctcp.shtml.
Note: The March 25, 2009, Cisco IOS Security Advisory bundled publication includes eight Security Advisories. All of the advisories address vulnerabilities in Cisco IOS Software. Each advisory lists the releases that correct the vulnerability or vulnerabilities in the advisory. The following table lists releases that correct all Cisco IOS Software vulnerabilities that have been published in Cisco Security Advisories on March 25, 2009, or earlier.
http://www.cisco.com/en/US/products/products_security_advisories_listing.html
CSCsv38166The server side of the Secure Copy (SCP) implementation in Cisco IOS software contains a vulnerability that could allow authenticated users with an attached command-line interface (CLI) view to transfer files to and from a Cisco IOS device that is configured to be an SCP server, regardless of what users are authorized to do, per the CLI view configuration. This vulnerability could allow valid users to retrieve or write to any file on the device's file system, including the device's saved configuration and Cisco IOS image files, even if the CLI view attached to the user does not allow it. This configuration file may include passwords or other sensitive information.
The Cisco IOS SCP server is an optional service that is disabled by default. CLI views are a fundamental component of the Cisco IOS Role-Based CLI Access feature, which is also disabled by default. Devices that are not specifically configured to enable the Cisco IOS SCP server, or that are configured to use it but do not use role-based CLI access, are not affected by this vulnerability.
This vulnerability does not apply to the Cisco IOS SCP client feature.
Cisco has released free software updates that address this vulnerability.
There are no workarounds available for this vulnerability apart from disabling either the SCP server or the CLI view feature if these services are not required by administrators.
This advisory is posted at the following link:
http://www.cisco.com/warp/public/707/cisco-sa-20090325-scp.shtml.
CSCsu11522A vulnerability exists in the Session Initiation Protocol (SIP) implementation in Cisco IOS software that can be exploited remotely to cause a reload of the Cisco IOS device.
Cisco has released free software updates that address this vulnerability. There are no workarounds available to mitigate the vulnerability apart from disabling SIP, if the Cisco IOS device does not need to run SIP for VoIP services. However, mitigation techniques are available to help limit exposure to the vulnerability.
This advisory is posted at the following link:
http://www.cisco.com/warp/public/707/cisco-sa-20090325-sip.shtml.
CSCsr29468Cisco IOS software contains a vulnerability in multiple features that could allow an attacker to cause a denial of service (DoS) condition on the affected device. A sequence of specially crafted TCP packets can cause the vulnerable device to reload.
Cisco has released free software updates that address this vulnerability.
Several mitigation strategies are outlined in the workarounds section of this advisory.
This advisory is posted at http://www.cisco.com/warp/public/707/cisco-sa-20090325-tcp.shtml
CSCsu54436 packets are being re-routed back out of the switch port on c880.Before you use an AP801 Series Lightweight Access Point with controller
software release 5.2, you must upgrade the software in the Cisco 800 Series
Integrated Services.
CSCsq50366 Last digit getting truncated when prefix is set to its max value of 32.Symptom Last digit getting truncated when prefix is configured with a length of 32 under the dial-peer.
Conditions When the prefix is configured with a length of 32 under the dial-peer only 31 digits are being sent across and the calls fails as there is no matching dial-peer at the other end. When the prefix is configured for 31 digits, then all the digits are sent correctly and the call is successful.
This is seen in the following call scenario:
1. Configure E1R2 ds0 groups between callgen and UUT:
2. Callgen calls into the UUT using ds0-group1.
3. The UUT has DID configured.
4. The UUT directs the call to ds0-group2 which is connected back to callgen.
5. Callgen has DID configured for the incoming call.
6. Callgen directs the call to ds0-group3 which is connected back to the UUT
7. The uut establishes a VoIP call leg back to callgen.
Workaround None.
CSCsr68545 Error %DATACORRUPTION-1-DATAINCONSISTENCY when running ipsla with rtt.Symptom Error message occurs:
000302: Jul 24 13:00:13.575 CDT: %DATACORRUPTION-1-DATAINCONSISTENCY: copy error -Traceback= 0x410FD1A4 0x41119DB0 0x41138324 0x41DE5714
Conditions IP SLA configured with RTT.
Workaround None.
CSCsr27960 Traceback observed after configuring credential under sip-ua.Symptom Traceback observed when configuring credentials CLI under sip-ua.
Conditions This happens when user configures credentials CLI with username length more than 32 characters.
Workaround None.
CSCso58935 Caller ID still display Barge for point-to-point call between sccp share.Symptom Caller ID still display To Barge for point to point call between two sccp shared line phones after the other party drops out from cBarge conference.
Workaround None.
CSCsr14658 CLI Cannot handle Double quotes.Symptom CME 4.3. IOS 12.4.15XZ SP Services. Under telephony-service the following url services was configured:
http://10.1.1.1 "My service"
Note the quotes. On the running config you see the above command without the quotes and everything works fine. When you type wr, then you again see the same command without the quotes. The issue is that, when you reload the router, the command is there, but it is not accepted and you have to type it again. Also, if you type url services http://10.1.1.1 My service, then you get an error of invalid input.
Conditions Normal operation.
Workaround Use one word and underscore instead of space.
CSCsq48167 CME DN description command may allow for open-ended quote delimination.Symptom The CME description command under the ephone-dn potentially allows for the description string to be saved to the router configuration without a trailing quote. This leaves an open-ended delimination in the configuration for the description string, and will cause the CME GUI to fail to load with an "unterminated string constant" error.
Conditions There are two ways that the configuration can get a description with no closing quote:
1. Description is entered with quotes on both sides, and total string length is between 33 and 40 characters.
<i>Entering</i>
Router(config)#ephone-dn 1
Router(config-ephone-dn)#description "01234567890123456789012345678912345"
<i>Appears as</i>
ephone-dn 1
description "01234567890123456789012345678912
2. Description is entered with quotes only on beginning of string.
<i>Entering</i>
Router(config)#ephone-dn 1
Router(config-ephone-dn)#description "test
<i>Appears as</i>
ephone-dn 1
description "test
Enter the description without any quotes via the CLI.
Open Caveats - Release 12.4(15)XZ1
There are no open caveats in this release.
Resolved Caveats - Release 12.4(15)XZ1
•CSCsq58779
Cisco IOS devices that are configured for Cisco Unified Communications Manager Express (CME) and the Extension Mobility feature are vulnerable to a buffer overflow vulnerability. Successful exploitation of this vulnerability may result in the execution of arbitrary code or a Denial of Service (DoS) condition on an affected device.
Cisco has released free software updates that address this vulnerability.
This advisory is posted at http://www.cisco.com/warp/public/707/cisco-sa-20090923-cme.shtml
CSCso67655 S2 CFD: Secure DSPFarm doesn't register after a reload of the routerSymptom After Reload Secure Conference profile does not register with CCM
Conditions This happens when a specific trustpoint is specified for CCM cert authentication during TLS handshake.
Workaround The workaround is not to specify the truspoint when configuring Call Manager CCM using CLI "sccp ccm <ip address> tag version <x>."
CSCsm71666 eem changes for LLP64 in mcp_devCSCsh23090 Police action cannot be allowed for a policy to be attached to self zoneSymptom Police action gets configured on a policy associated to self zone.
Conditions This symptom is observed only when the user tries to edit a policy associated to self zone to include police action. Associating a policy configured with police action to self zone will fail.
Workaround Do not configure police action to a policy when it is associated to self zone.
CSCsk42373 Memory leak in ctid_set_changetime functionSymptom Memory leak is observed after the device boots up. 'sh mem debug leaks chunks' will show the leak. The memory leak shows up against "SNMP SMALL CHUNK" as the memory is allowed by MakeOctetString, called from reg_invoke_ctid_get_octet_string.
CSCsl08086 Ping Traffic Dropped: Dialer based PPPoECSCsl26908 ASSERTION FAILED: file "../les/if_les_bri_i3081.c", line 744Symptom Assertion message displays.
CSCsl99275 High CPU on 5400XM when doing show flashSymptom High CPU can be seen on Cisco AS5400XM after given uptime.
Conditions Occurs after 2-3 weeks uptime. CPU usage increases because of "Background Loade" process.
Workaround Reload the access server.
CSCsm34706 CUBE sends fixed DTMF duration and ignores received H.245 User InputSymptom CUBE sends a fixed 800 time units for every digit pressed (sent via RFC 2833) regardless of what it receives in the duration of a H.245 User Input field.
Conditions In H323-SIP networking scenario on CUBE, for DTMF conversion from h245-alphanumeric to RFC2833, regardless of the duration received in H.245 User Input field, CUBE always sends a fixed 800 ms for every digit pressed (sent via RFC 2833).
Workaround There is no workaround.
CSCsm37093 CME 4.1after security is enabled 7970 will register with US localeSymptom After security is enabled locale in the phone 7970 cannot be changed.
Conditions User cannot leave security enabled as the user cannot configure their locale.This issue is not seen in 7960 and 7940 as they have the firmware locally stored (flash).
Workaround There is no workaround.
CSCsm64258 ephone-hunt group does NOT present calls to overlaid DNsSymptom When an ephone hunt-group is configured with 'present-call idle-phone', the ephone hunt-group skips the DNs which are configured as overlay.
Conditions The problem is observed when the ephone hunt-group is configured with 'present-call idle-phone' and DN is configured as overlay.
Workaround Remove the 'present-call idle-phone' configuration from the ephone-hunt and do not use overlaying.
CSCsm69056 IEC error (Software Error) seen on CME & CUBE when doing Call Fwd No AnsSymptom CME and CUBE may display the following error message when forwarding a call. "CCAPI: Internal Error (Software Error)"
Conditions The error may display if this is Call Forward No Answer.
Workaround There is no workaround.
CSCsm74560 sdatar phone does not look for network locale file for user defined languagesSymptom Wireless IP phone 7920 doesn't download the 7960-tones.xml files when user defined network locale is configured
Conditions CME writes incomplete XML tags in the phone config file, for user defined language network locale. So phone cannot generate the query for the relevant network locale file.
Workaround Along with User defined, we also need to define inbuilt network locale.
For example DE - Germany
telephony-service
network-locale DE
create cnf-files
Now rename the user defined file to 'germany_7960-tones.xml'
Replace the file under ITS directory with the new 'germany_7960-tones.xml' (Make sure the name is the system defined name)
DO NOT run 'create cnf-file' as it will again override with the system defined parameters
Reboot the 7921 wireless phone
In case if you have to issue 'create cnf-file', then ensure to repeat all the steps mentioned above again.
CSCsm88771 CME trunk optimized calls being put on hold automaticallySymptom Answering a trunk call transferred from another phone is automatically put on hold and cannot be resumed.
Conditions The call originally came in on a trunk dn and is transferred to another extension on a phone sharing that trunk. Trunk optimization takes place.
Workaround There is no workaround.
CSCsm89158 7921 does not display call park number while the call is parked
Symptom 7921 does not show the parked number when the call is parked.
Conditions UC520W-16U-4FXO-K9 and 7921(CP7921G-1.0.3.LOADS)
Workaround There is no workaround.
CSCso45208 Unable to specify ephone-hunt extensions in ascending orderSymptom Cannot set ephone-hunt list members in certain orders during configurations.
Conditions If there are multiple ephone-dn w/ different preference matches one ephone-hunt list member and the preference difference among one ephone-hunt member + number of ephone-hunt list members >10.
Workaround There is no workaround.
CSCso48788 ActiveLine not reset back to 0 when offhook timer expiredSymptom When the phone is onhold call and if you press another button to seize a new call but left offhook till timer expired (the seize call will back onhook), the button become un-usable after that.
Conditions Put call onhold and offhook another line.
Workaround Seize another button.
CSCso56129 %SYS-2-BADSHARE: Bad refcount in datagram_done monitoring cme/cue callsSymptom Bad Refcount with tracebacks.
Conditions Using AIM-IPS-K9 to monitor interfaces with ephones registered to the CME on the same router and have ephone check voice mail. This is in a branch in a box setup. UUT serves as a CME as well as having the voice mail AIM in the same router.
Workaround There is no workaround.
CSCso64585 redundant CallRemoteMultiLine sccp msg to monitor park DNSymptom Jitter or voice quality issue may occur.
Conditions If there are a lot of ephones, say there are 50, monitoring same park DN, there will be 2500 same sccp messages sent to these 50 phones respectively in few mili seconds.
Workaround There is no workaround.
CSCso66843 CUBE and CME do not change embedded SSRC in RTCP packetsSymptom Different SSRC in RTCP compared to RTP after transcoding.
Conditions Voice call with transcoding in CUBE or CME. For a voice call passing through transcoding on CUBE or CME, the SSRC value contained within the RTCP is passed unchanged, whereas the SSRC value contained within the RTP is changed. This creates a mismatch between the SSRC between RTP and RTCP at the final destination.
Workaround There is no workaround.
CSCso67655 S2 CFD: Secure DSPFarm doesn't register after a reload of the routerSymptom After Reload Secure Conference profile does not register with CCM.
Conditions This happens when a specific trustpoint is specified for CCM cert authentication during TLS handshake
Workaround The workaround is not to specify the truspoint when configuring Call Manager CCM using CLI "sccp ccm <ip address> tag version <x>
CSCso74656 MG2:device-based BLF shown incorrect status for EMCSCso75055 SysObjID Missed in SR 520 RoutersCSCso78702 7961 IP Phone acct softkey get "no park number available"Symptom 2851 Version 12.4(15)T4 press the ACCT SoftKey and get "NO PARK NUMBER AVAILABLE".
CSCso79611 cBarge:Traceback found at x40C66334:SkinnyHWConfAPI(0x40c628c0)+0x3a74Symptom Trace back appears while doing transfer of barge call from barge initiator to a SIP phone.
Conditions This is observed during transfer of barge call between SCCP & SIP phone.
Workaround There is no workaround.
CSCso82469 Improper message displayed when user tries to create new mailSymptom When the user tries to create new mail and OWA displays an improper message like the "page cannot be displayed".
Workaround There is no workaround.
CSCso83726 Ignore CFA for voice hunt-groups similar to ephone-huntSymptom Call Forward setting are NOT ignored for members of "voice hunt group" on Cisco Unified Communications Manager Express.
Conditions When phones are member of "voice hunt group" and call forward is enabled.
Workaround There is no workaround.
CSCso83948 Tracebacks pointing to CS_ProcessRerouteFailure - No release note enclosureCSCso88429 CME/CUBE rejects incoming SIP INVITE if Max-Forwards > 70Symptom CME or CUBE will reject an inbound SIP INVITE if Max-Forwards is greater than 70.
Conditions The Max-Forwards header field in SIP INVITE is greater than 70.
The Max-Forwards header field must be used with any SIP method to limit the number of proxies or gateways that can forward the request to the next downstream server. This can also be useful when the client is attempting to trace a request chain that appears to be failing or looping in mid-chain. The Max-Forwards value is an integer in the range 0-255 indicating the remaining number of times this request message is allowed to be forwarded. This count is decremented by each server that forwards the request. The recommended initial value is 70. This header field should be inserted by elements that can not otherwise guarantee loop detection. For example, a B2BUA should insert a Max-Forwards header field.
Workaround There is no workaround.
CSCso89001 Reload Steeler cause LWAPP AP change BOOT to autonomous modeSymptom When AP is in LWAPP mode and C880 reloads, C880 first comes up, console session to AP right away, you can see AP displays invalid license messages. Also show boot on AP points to an autonomous image.
Conditions The Cisco 880 router reloads. When Access Point reloads in LWAPP mode, Access Point boot may also points to autonomous image.
Workaround When AP is in LWAPP mode and show boot on AP points to autonomous image, after AP reboot, AP goes back to autonomous mode. AP needs to go through LWAPP upgrade process, namely via recovery image to finally go back to LWAPP mode.
CSCso95643 sRTP Package missing in c1861
Symptom MGCP srtp-package option is not available in c1861 platform.
Workaround This occurs only on Cisco1861.
CSCso99426 Ringing delay of approx 3 secs on some ephones of blast hunt grpSymptom 3 sec delay experienced in some ephones as hunt group members with shared DNs/monitor DN's
Conditions This occurs if ephones have shared DN's/monitor buttons.
Workaround There is no workaround.
CSCsq01339 CME - increase support for local entries to 250CSCsq07606 Blast:Memory leak at AFW_application ivr: rerouteNumber SSrerouteInfo_tSymptom Memory leak at AFW_application ivr: rerouteNumber SSrerouteInfo_t
Conditions 1) Two parallel hunt groups are created & final number on one parallel hunt group is configured with call forward all to pilot number of second hunt group. 2) Call from ephone 1 to 2 and ephone 2 answers and gets connected. Now from ephone 2 do blind transfer call to pilot # of first hunt group with 32 numbers. 3) All 32 phones will ring & upon no answer, the call is forwarded to final number which is configured with call forward all to the pilot number of second hunt group. 4) All the phones in the second hunt group rings and the first phone in the list answers the call.
Workaround There is no workaround.
CSCsq10768 Intermittent Live-Record failure in CMESymptom Random failure of Live-Record functionality in CUCME may be observed. The phone indicates a message "Live Record Failed!".
Conditions This is observed on IOS version 12.4(15)XZ.
Workaround Disconnect that active voice call, re-establish voice call between same parties and attempt Live-Record again.
CSCsq15064 RDT: crash seen with null pointer during reload on C860w (with AP)Symptom On steelers, issues command reload and say 'yes' to reload AP, the system crash.
Conditions . This occurs only when reload command is issued with AP in reload.
Workaround Do a reset command and continue the reload process. There is no service impact as Steelers and AP are going through reload.
CSCsq15847 Watch button can't exist with normal dn and causes no ringingSymptom The phone may not ring if the incoming call is designated to the overlaid DN which is also configured on other button as a W or M button.
Conditions A DN is configured on both overlay button and W or M button.
Workaround There is no workaround.
CSCsq17862 CME 4.3/ TSP Caller ID not displayed in TAPI clientSymptom The Caller ID is not displayed on UCC client when using CME 4.3. When the IP phone is tied to UCC, it displays the Caller ID.
Conditions This is observed in CME 4.3.
Workaround Use CME 4.2 or earlier.
CSCsq25714 present-call should not be an option for CLI callqueueSymptom The CLI "present-call" is available under "callqueue". It is shown outside of the ephone-hunt.
Conditions After configuring present-call under ephone-hunt, the NVRAM would show it also outside of the ephone-hunt.
Workaround There is no workaround.
CSCsq26111 Name for the line or speeddial button may be truncated by SRSTSymptom The extension number and speed dial number may not be displayed in full length on a fallback ephone.
Conditions The number is display incorrectly after an ephone falls back to the SRST.
Workaround There is no workaround.
CSCsq31077 Router crash at bootup, trace ending in cce_dp_policy_get_class_instance CSCsq33020 hall c88x machine check exception informationSymptom Router crashes if the same inspect policy is applied to more than 7 zone-apirs.
Workaround The crash happens when the same policy is applied on more than 7 different zone-pairs. So the work around is to create another copy of 'GLOBAL-POLICY'(say GLOBAL-POLICY-DUP) and apply GLOBAL-POLICY on the first 7 zone-pairs and GLOBAL-POLICY-DUP on the next 7.
CSCsq36422 URLF:need have unified deny-page format for different browsersSymptom The display of deny-page is different with different browsers.
Conditions Deny-page in IE doesn't indicate the real reason for this URL.
Workaround There is no workaround.
CSCsq39195 Apply QE_QMC patch to Steelers data BRISymptom New FPGA to solve Steelers BRI lock up issue.
Conditions VLAN traffic.
Workaround There is no workaround.
CSCsq41137 max-reserved-bandwidth config is lost after reloadSymptom max-reserved-bandwidth is removed upon reload.
Workaround add the command back in manually.
CSCsq41189 Memory Leak - "Presence Process"Symptom Memory Leak with "Presence Process", this could lead to router crash.
Workaround There is no workaround.
CSCsq42134 JPN: 7921 XML Services are displayed as squaresSymptom 7921 directories are displayed as squires in CME Userlocale: JP environment.
Conditions 7921: 1.1.1, CME: 4.2 (IOS 12.4(11)XW7), Locale File: CME-locale-jp_JP-4.1.0.1.tar
Workaround There is no workaround.
CSCsq42153 Move up CCE Firewall switching path hook next to CCE Post NATSymptom Firewall classification is done prior to few other features.
Conditions FW is configured on the box.
Workaround There is no workaround.
CSCsq42689 JPN: XML parse error when accessing My Phone Apps > Speed Dial ButtonsCSCsq49894 SIP TNP phone fails to ring after receiving INVITE messageCSCsq51090 DSPware 23.6.1 Release IOS CommitCSCsq51500 TTI petitioner page fails to bring up when using ezsdd/welcomeSymptom 7970 SIP phone fails to ring and connect after receiving INVITE message.The SCCP phone involved in the scenario registers fine. The 7970 SIP phone gets registered initially, but later the dial-peer does not come up so the phone un-registers.
Conditions OODR call is being made between a SCCP phone and a SIP 7970 phone.
Workaround There is no workaround.
CSCsq52296 Overlay numbers are ignored on single button extension mobility phonesSymptom Overlay numbers are ignored.
Conditions Apply voice profile on single button phones.
Workaround There is no workaround.
CSCsq54601 SCCP&SIP Registration failure with Ezvpn and NATSymptom SCCP&SIP Registration failure with Ezvpn and NAT.
Conditions When SCCP Registration traffic is passing through NAT Router. This affects the Voice traffic.
Workaround There is no workaround.
CSCsq54690 dx 3G modem sw locking: remove the Generic GSM SKU id supportCSCsq56103 Service-policy is not attached with priority by removing in serial intSymptom Causes configuration issues for serial interface.
Conditions -When a strict policy is applied on a serial interface, if the user re-configures the strict priority configuration under the same class in the same policy, it will fail.
Conditions -
Conditions When the user tries to remove the service policy from the serial interface. The HQF data structure is not cleaned up. (i.e. the class default blt and physical interface blt are not deleted.)
Workaround There is no workaround.
CSCsq62269 3270 crash if no startup configurationSymptom If 3270 has no startup configuration, it will crash by following or terminating the auto install.
Conditions No startup configuration and c3270-adventerprisek9-mz.124-15.XZ.bin.
Workaround Execute tftpdnld -r in rommon to boot c3270-entbase-mz.124-15.XZ.bin. Say no to auto install. Save the default configuration and reboot it with c3270-adventerprisek9-mz.124-15.XZ.bin.
CSCsq64715 EM login credential could be set to stack junk in error conditionSymptom EM login username and password may be set to random values in process stack in case the actual input from the phone is in an invalid format. And if both string picked up from the stack happened to match a username/password pair in a configured user profile, EM will login the user accidentally.
Conditions This is seen as normal behavior.
Workaround There is no workaround.
CSCsq74767 CME transfers hold to different phone with overlay on Stimulus messageSymptom A call put on hold is picked up by another user in an overlay situation.
Conditions The phone that held the call, and the phone that picked up the call, are on same overlay configuration lines. The call also has to be on the last dn of the overlay set.
Workaround Transfer the call back to the original party.
CSCsq90567 TSP gets stuck at connected state when a shared dn is resumedSymptom The TSP gets stuck in connected state.
Conditions After resuming an onhold shared DN from the associated ephone, the TAPI gets stuck.
Workaround There is no workaround but you can reboot the ephone and the TAPI.
CSCsq92958 Typical intercom ext # not added to voice-logout profileSymptom Numbers with alphabetic characters are ignored in EM profile.
Conditions This behavior is normal.
Workaround Use numeric numbers in EM profile.
CSCsq93564 Only 8 button are available for phones with addon module 7914/7915/7916Symptom When 7975 (7965) IP phone with add-on module (7914/7915/7916) fallback to SRST4.3, only 8 (6) lines are available during SRST fallback.
Conditions This problem occurs when phones which register on Call Manager 6.1 fallback to SRST4.3.
Workaround There is no workaround.
CSCsq94677 SRST4.3 The last channel of all DNs is invalid after 2nd fallbackSymptom The 2nd channel for a dual-line DN or the 8th channel for octo-line DN is not available for a fallback phone.
Conditions This problem occurs when a phone falls back to the SRST the 2nd time after the SRST reboots.
Workaround There is no workaround.
CSCsr02593 incoming call wrongly ring SCCP overlay because of memory corruptionSymptom An incoming call for DN 2 rings both the SCCP phone A which has the DN and another SCCP phone B without it but has an overlay line. DN 2 and overlay line aren't shared line. Incoming call for the overlay only rings the overlay but incoming call for DN 2 will ring both.
Workaround Remove the overlay button from phone B, restart it, make an incoming to DN 2, add the overlay button back, restart phone. However, the problem will happen again after reload.
CSCek78623 ISSU infra test using expect & SESUTCSCsg56685 Handle review comments about PRR#126487CSCsj42809 GLBP flaps after SSO (fix: RF_PROG_ACTIVE_FAST; proc priority)CSCsj46764 ancaz VLAN Manual LB - HA SupportCSCsj55804 HSRP flaps after SSO with 100 peers and default timerCSCsk11684 Remove unused MRIB RP proxy codeCSCsk25878 alignment error flow_exp_v9_adjust_length flow_common_send_dataSymptom An alignment error may occur. This can cause a crash on certain routers and a traceback on others.
Conditions This symptom is observed when using the v9 export protocol with Flexible Netflow.
Workaround There is no workaround.
CSCsl32593 IPv6 SLA: Need to add flow_label to in6_pktinfo for the responderCSCsl50516 FNF possible alignment errors when wring v9 headerSymptom An alignment error may occur, which may also lead to crash.
Conditions This symptom is observed when using the v9 export protocol with Flexible Netflow. Sending FNF export packets may cause this problem to be seen.
Workaround There is no workaround.
CSCsm12905 FNF: monitor can not be removed when interface removedCSCsm54873 EEM some time are not triggered properlySymptom Embedded Event Manager (EEM) rules may not trigger properly when performing SIP OIR.
Conditions EEM policies that interact with the IOS CLI through the command
Conditions action command and EEM TCL policies that use the CLI library may not interact properly when triggered. Incorrect sequencing with the IOS CLI may result when the policies are triggered resulting in the IOS CLI commands not being invoked.This problem exists on all shipped versions of IOS XE.
Workaround There is no workaround.
Further Problem Description: This can impact customers that use the Embedded Event Manager with EEM applets or policies that interact with the CLI. It was seen on the ASR platform and other platforms when "sched heapchecks process" was enabled. A timing issue can cause EEM action CLI commands to not coordinate with the IOS exec properly.The SIP2 is probably related to the ASR platform. An OIR event issued to trigger the specific EEM policy. This should occur with any EEM type policy however.
SXF is not impacted by this bug.
CSCsm58164 Default publish timers are not set properly when configured.CSCsm62598 EEM action cns_event missing from Tcl action list.CSCsm83056 FNF - FLOW MON: '<name>' could not setup cache control planeCSCsm84550 WI08: Unable to remove eem cli event by using 'no event cli'Symptom Unable to remove EEM cli event by using 'no event cli'.
Conditions When using EEM CLI ED to create a EEM APPLET. This is EEM CLI ED only issue. No other EDs i.e. applets using other EDs are effected.
Workaround This is EEM 2.4 issue only.
CSCsm84550 WI08: Unable to remove eem cli event by using 'no event cli'CSCso01595 VS2: ~ 31000 Remote registry calls with VIRTUAL_SW:79 in fh_server.procCSCso17255 FNF - IPv6 payload chunk has arbitrary data after the end of the payloadCSCso29011 MF:Ipv6 mtu isn't restricted by smaller L2 mtu, becomes invalid afterCSCso32575 Move issue, chkpt and rf client ids to true component system-idCSCso39518 fh_policy_dir.proc process crash when activate 0E patchSymptom Before applying patch with EEM policy dir subsystem in it, there is one or more EEM applets configured, after the patch is activated, trigger an EEM applet.
Unconfigure all the EEM applet config before patching, then apply all the EEM applet config after activate the patch.This would lead to (fh_policy_dir.proc)process crash, not a device crash. This bug is specific to modular IOS image.
Workaround There is no workaround.
CSCso43772 Adding matched syslog info to syslog EDCSCso50752 Buffer size should match the msg queue size in the syslog EDCSCso53727 Need to add new hm test in diags to test LTL memory consistencyCSCso57084 improve "Process Forced Exit" console messageCSCso70327 C2W2: process deadlock encountered during ISSU rollbackCSCso76885 call-home diagnostic message is sent for every diag HM failureCSCso83318 EEM: Build failure in v2,3CSCso99953 /vob/cisco.comp/ipv6_forwarding/icmp/src/ipv6_icmp.c:memory leakOpen Caveats - Release 12.4(15)XZ
There are no open caveats in this release.
Resolved Caveats - Release 12.4(15)XZ
CSCsl62609Multiple vulnerabilities exist in the Session Initiation Protocol (SIP) implementation in Cisco IOS that can be exploited remotely to trigger a memory leak or to cause a reload of the Cisco IOS device.
Cisco has released free software updates that address these vulnerabilities. Fixed Cisco IOS software listed in the Software Versions and Fixes section contains fixes for all vulnerabilities addressed in this advisory.
There are no workarounds available to mitigate the effects of any of the vulnerabilities apart from disabling the protocol or feature itself, if administrators do not require the Cisco IOS device to provide voice over IP services.
This advisory is posted at http://www.cisco.com/warp/public/707/cisco-sa-20080924-sip.shtml.
CSCso57523- Call from SIP trunk to route point fails due to MALLOC failureSymptom No audio and memory allocation failures when an incoming call through SIP trunk is connecting to route point(AA/ICD).
Conditions This is seen on C3845 in CME interoperating with UCCX.
Workaround To use PSTN trunks for incoming calls to CME.
CSCsm15782 -CCE-FW: Class-map with 'match class-map' does not seem to match trafficSymptom Traffic may not match a class which contains 'match class-map' statement.
Conditions The traffic is expected to match a nested class inside a class-map.
Workaround Do not do nested class-map.
CSCsi01875- IPIP gateway rejects a second TCSSymptom Placing a video call from a Polycom device. The call gets rejected because Polycom sends a TCS before receiving the TCS ACK.
Conditions Polycom video endpoints and IP IP gateway.
Workaround N/A
CSCsl38148- GSM:Download from the network file when a abort sequence detectedSymptom When trying to download a video over the network, after a while the download stops. To start the download again, the TTY line has to cleared and the call established and again, or the router needs to be power cycled.
Conditions Seen more frequently when trying to download a large Video file over the web.
Workaround None
CSCsl88522- TNP problem with Skinny version 9 v2 messages while in SRST modeSymptom TNP phone doesn't handle incoming StationLineStatV2Message during phone fallback to SRST mode. Also Phone doesn't send V2 messages to SRST box. So TNP phone doesn't have V2 support incorporated in it.
Conditions Phone send alarm for StationConfigStatV2Message to SRST as it doesn't have that V2 message support for either incoming messages or outgoing messages. i.e., LineStatV2 nor SpeedDialStatV2.
Workaround None
CSCsm12220- SS-DO calls are failing interworking with CUCMSymptom H323-SlowStart to SIP-DelayedOffer call fails on CUBE
Conditions Failure is seen when call lands onto CUCM and Offer is generated by CUCM in 183 response.
Workaround Disable PRACK on SIP leg so that Offer is generated in 200OK response.
CSCso34468- Reduce IOMEM size to 10% from 25% on C3250CSCso03073- Steelers: Seeing %PARSER-4-INVLDLINE: Invalid line in NV generationCSCsm86531- Basic Hold/Resume fails with two CUBEs having H.323 and SIP legsCSCsm33761- VIC3-2FXS-E/DID supportCSCsm68868- IPIPGW Spurious Mem Access while processing DiversionCSCsm25556- c8xx crashes when refuse-message is entered under line vtyCSCsm12911- Need to change console message when doing firmware upgradeCSCsl77047- Memoryleak @CCH323_CT when Universal Xcoding call for H323-SIP on IPIPGWCSCsl60102- Tx/Rx Interrupt Counters displayed twice in show controller f0 outputCSCsm72881- Router crashes after removing ipv6-addressCSCso14297 -parser validation is wrong for usb-devices with most of the CLIsCSCsm31048- CTM server dos not compile with CTC 9.0CSCsm17819- Need number of temp sensor return to hostLimitations and Restrictions
The ISDN lease line feature is not supported in this release.
Additional References
Use this release note with the documents and websites in this release note and the documents listed in the section Release-Specific Documents.
Release-Specific Documents
The following documents are specific to Release 12.4 and apply to Release 12.4(15)XZ.
•Cross-Platform Release Notes for Cisco IOS Release 12.4)T
•Cisco IOS Software Releases 12.4 Special and Early Deployments
•Caveats for Cisco IOS Release 12.4(15)T
Cisco IOS Software Documentation Set
The Cisco IOS software documentation set consists of the Cisco IOS configuration guides, Cisco IOS command references, and several other supporting documents.
Documentation Modules
Each module in the Cisco IOS documentation set consists of one or more configuration guides and one or more corresponding command references. Chapters in a configuration guide describe protocols, configuration tasks, and Cisco IOS software functionality, and contain comprehensive configuration examples. Chapters in a command reference provide complete command syntax information. Use each configuration guide with its corresponding command reference. Cisco IOS Software Documentation is available in html or pdf form.
Select your release and click the command references, configuration guides, or any other Cisco IOS documentation you need.
Notices
See the "Notices" section in About Cisco IOS Release Notes located at:
http://www.cisco.com/en/US/docs/ios/12_4/12_4x/12_4xy15/ReleaseNote.html.
Use this document in conjunction with the documents listed in the "Additional References" section.
CCDE, CCENT, Cisco Eos, Cisco HealthPresence, the Cisco logo, Cisco Lumin, Cisco Nexus, Cisco StadiumVision, Cisco TelePresence, Cisco WebEx, DCE, and Welcome to the Human Network are trademarks; Changing the Way We Work, Live, Play, and Learn and Cisco Store are service marks; and Access Registrar, Aironet, AsyncOS, Bringing the Meeting To You, Catalyst, CCDA, CCDP, CCIE, CCIP, CCNA, CCNP, CCSP, CCVP, Cisco, the Cisco Certified Internetwork Expert logo, Cisco IOS, Cisco Press, Cisco Systems, Cisco Systems Capital, the Cisco Systems logo, Cisco Unity, Collaboration Without Limitation, EtherFast, EtherSwitch, Event Center, Fast Step, Follow Me Browsing, FormShare, GigaDrive, HomeLink, Internet Quotient, IOS, iPhone, iQuick Study, IronPort, the IronPort logo, LightStream, Linksys, MediaTone, MeetingPlace, MeetingPlace Chime Sound, MGX, Networkers, Networking Academy, Network Registrar, PCNow, PIX, PowerPanels, ProConnect, ScriptShare, SenderBase, SMARTnet, Spectrum Expert, StackWise, The Fastest Way to Increase Your Internet Quotient, TransPath, WebEx, and the WebEx logo are registered trademarks of Cisco Systems, Inc. and/or its affiliates in the United States and certain other countries.
All other trademarks mentioned in this document or website are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (0812R)
Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be actual addresses and phone numbers. Any examples, command display output, network topology diagrams, and other figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses or phone numbers in illustrative content is unintentional and coincidental.
© 2008-2009, Cisco Systems, Inc. All rights reserved.