Table Of Contents
Release Notes for Cisco 800 Series Routers with Cisco IOS Release 12.4(15)XY
Determining the Software Version
Upgrading to a New Software Release
New Hardware Features in Cisco IOS Release 12.4(15)XY5
New Software Features in Cisco IOS Release 12.4(15)XY5
New Hardware Features in Cisco IOS Release 12.4(15)XY4
New Software Features in Cisco IOS Release 12.4(15)XY4
New Hardware Features in Cisco IOS Release 12.4(15)XY3
New Software Features in Cisco IOS Release 12.4(15)XY3
New Hardware Features in Cisco IOS Release 12.4(15)XY2
New Software Features in Cisco IOS Release 12.4(15)XY2
New Hardware Features in Cisco IOS Release 12.4(15)XY1
New Software Features in Cisco IOS Release 12.4(15)XY1
New Hardware Features in Cisco IOS Release 12.4(15)XY
New Software Features in Cisco IOS Release 12.4(15)XY
Open Caveats - Cisco IOS Release 12.4(15)XY5
Resolved Caveats - Cisco IOS Release 12.4(15)XY5
Open Caveats - Cisco IOS Release 12.4(15)XY4
Resolved Caveats - Cisco IOS Release 12.4(15)XY4
Open Caveats - Cisco IOS Release 12.4(15)XY3
Resolved Caveats - Cisco IOS Release 12.4(15)XY3
Open Caveats - Cisco IOS Release 12.4(15)XY2
Resolved Caveats - Cisco IOS Release 12.4(15)XY2
Open Caveats - Cisco IOS Release 12.4(15)XY
Resolved Caveats - Cisco IOS Release12.4(15)XY
Cisco IOS Software Documentation Set
Obtaining Documentation, Obtaining Support, and Security Guidelines
Release Notes for Cisco 800 Series Routers with Cisco IOS Release 12.4(15)XY
First Released: December 17, 2007Last Revised: March 25, 2009Cisco IOS Release 12.4(15)XY5OL-15673-02 Fifth ReleaseThese release notes describe new features and significant software components for the Cisco 800 series routers that support the Cisco IOS Release 12.4(15)XY releases. These release notes are updated as needed. Use these release notes with the Cross-Platform Release Notes for Cisco IOS Release 12.4T and About Cisco IOS Release Notes.
For a list of the software caveats that apply to the Release 12.4(15)XY releases, see the "Caveats" section. See also Caveats for Cisco IOS Release 12.4T. The online caveats document is updated for every maintenance release.
Contents
System Requirements
This section describes the system requirements for Release 12.4(15)XY and includes the following sections:
•Determining the Software Version
•Upgrading to a New Software Release
Memory Requirements
Table 1 lists the memory requirements for the Cisco IOS feature sets supported by Cisco IOS Release 12.4(15)XY on the Cisco 800 series routers.
Hardware Supported
Cisco IOS Release12.4(15)XY supports the following Cisco 800 series routers:
•Cisco 815
•Cisco 871
•Cisco 876
For descriptions of existing hardware features and supported modules, see the hardware installation guides, configuration and command reference guides, and additional documents specific to the Cisco 800 series routers, which are available at:
http://www.cisco.com/en/US/products/hw/routers/ps380/tsd_products_support_series_home.html
Determining the Software Version
To determine the version of Cisco IOS software currently running on your Cisco 800 series router, see About Cisco IOS Release Notes located at
http://www.cisco.com/en/US/docs/ios/12_4/12_4x/12_4xy15/ReleaseNote.html
Upgrading to a New Software Release
For general information about upgrading to a new software release, see About Cisco IOS Release Notes located at
http://www.cisco.com/en/US/docs/ios/12_4/12_4x/12_4xy15/ReleaseNote.html.
Feature Set Tables
For information about Feature Set Tables, see About Cisco IOS Release Notes located at
http://www.cisco.com/en/US/docs/ios/12_4/12_4x/12_4xy15/ReleaseNote.html.
New and Changed Information
This section contains the following information:
•New Hardware Features in Cisco IOS Release 12.4(15)XY5
•New Software Features in Cisco IOS Release 12.4(15)XY5
•New Hardware Features in Cisco IOS Release 12.4(15)XY5
•New Software Features in Cisco IOS Release 12.4(15)XY4
•New Hardware Features in Cisco IOS Release 12.4(15)XY3
•New Software Features in Cisco IOS Release 12.4(15)XY3
•New Hardware Features in Cisco IOS Release 12.4(15)XY2
•New Software Features in Cisco IOS Release 12.4(15)XY2
•New Hardware Features in Cisco IOS Release 12.4(15)XY1
•New Software Features in Cisco IOS Release 12.4(15)XY1
•New Hardware Features in Cisco IOS Release 12.4(15)XY
•New Software Features in Cisco IOS Release 12.4(15)XY
New Hardware Features in Cisco IOS Release 12.4(15)XY5
There are no new hardware features in this release.
New Software Features in Cisco IOS Release 12.4(15)XY5
There are no new software features in this release.
New Hardware Features in Cisco IOS Release 12.4(15)XY4
There are no new hardware features in this release.
New Software Features in Cisco IOS Release 12.4(15)XY4
There are no new software features in this release.
New Hardware Features in Cisco IOS Release 12.4(15)XY3
There are no new hardware features in this release.
New Software Features in Cisco IOS Release 12.4(15)XY3
There are no new software features in this release.
New Hardware Features in Cisco IOS Release 12.4(15)XY2
There are no new hardware features in this release.
New Software Features in Cisco IOS Release 12.4(15)XY2
There are no new software features in this release.
New Hardware Features in Cisco IOS Release 12.4(15)XY1
There are no new hardware features in this release.
New Software Features in Cisco IOS Release 12.4(15)XY1
There are no new software features in this release.
New Hardware Features in Cisco IOS Release 12.4(15)XY
There are no new hardware features in this release.
New Software Features in Cisco IOS Release 12.4(15)XY
HFC RIP Relay
The HFC RIP Relay feature allows the delivery of Routing Information Protocol (RIP) messages from a Cisco IOS router containing a cable High-Speed WAN Interface Card (HWIC) to the Hybrid Fiber-Coaxial (HFC) Cable Modem Termination system (CMTS) when they are on different subnets. Configuring a static IP address is now also supported on a cable modem interface.
For more information see:
http://www.cisco.com/en/US/docs/ios/iproute/configuration/guide/irp_rip_hfc.html
New Features in Release 12.4T
For information regarding the features supported in Cisco IOS Release 12.4T, see the Release Notes and Feature Guides links at:
http://www.cisco.com/en/US/products/ps6441/tsd_products_support_series_home.html
Caveats
For general information on caveats and the bug toolkit, see About Cisco IOS Release Notes located at
http://www.cisco.com/en/US/docs/ios/12_4/12_4x/12_4xy15/ReleaseNote.html.
This section contains the following caveat information:
•Open Caveats - Cisco IOS Release 12.4(15)XY5
•Resolved Caveats - Cisco IOS Release 12.4(15)XY5
•Open Caveats - Cisco IOS Release 12.4(15)XY4
•Resolved Caveats - Cisco IOS Release 12.4(15)XY4
•Open Caveats - Cisco IOS Release 12.4(15)XY3
•Resolved Caveats - Cisco IOS Release 12.4(15)XY3
•Open Caveats - Cisco IOS Release 12.4(15)XY2
•Resolved Caveats - Cisco IOS Release 12.4(15)XY2
•Open Caveats - Cisco IOS Release 12.4(15)XY
•Resolved Caveats - Cisco IOS Release12.4(15)XY
Open Caveats - Cisco IOS Release 12.4(15)XY5
There are no open caveats in this release.
Resolved Caveats - Cisco IOS Release 12.4(15)XY5
•CSCsv04836
Multiple Cisco products are affected by denial of service (DoS) vulnerabilities that manipulate the state of Transmission Control Protocol (TCP) connections. By manipulating the state of a TCP connection, an attacker could force the TCP connection to remain in a long-lived state, possibly indefinitely. If enough TCP connections are forced into a long-lived or indefinite state, resources on a system under attack may be consumed, preventing new TCP connections from being accepted. In some cases, a system reboot may be necessary to recover normal system operation. To exploit these vulnerabilities, an attacker must be able to complete a TCP three-way handshake with a vulnerable system.
In addition to these vulnerabilities, Cisco Nexus 5000 devices contain a TCP DoS vulnerability that may result in a system crash. This additional vulnerability was found as a result of testing the TCP state manipulation vulnerabilities.
Cisco has released free software updates for download from the Cisco website that address these vulnerabilities. Workarounds that mitigate these vulnerabilities are available.
This advisory is posted at http://www.cisco.com/warp/public/707/cisco-sa-20090908-tcp24.shtml.
CSCsm97220Devices that are running Cisco IOS Software and configured for Mobile IP Network Address Translation (NAT) Traversal feature or Mobile IPv6 are vulnerable to a denial of service (DoS) attack that may result in a blocked interface.
Cisco has released free software updates that address these vulnerabilities.
This advisory is posted at the following link http://www.cisco.com/warp/public/707/cisco-sa-20090325-mobileip.shtml
CSCsr29468Cisco IOS software contains a vulnerability in multiple features that could allow an attacker to cause a denial of service (DoS) condition on the affected device. A sequence of specially crafted TCP packets can cause the vulnerable device to reload.
Cisco has released free software updates that address this vulnerability.
Several mitigation strategies are outlined in the workarounds section of this advisory.
This advisory is posted at http://www.cisco.com/warp/public/707/cisco-sa-20090325-tcp.shtml
CSCso04657Symptoms: SSLVPN service stops accepting any new SSLVPN connections.
Conditions: A device configured for SSLVPN may stop accepting any new SSLVPN connections, due to a vulnerability in the processing of new TCP connections for SSLVPN services. If "debug ip tcp transactions" is enabled and this vulnerability is triggered, debug messages with connection queue limit reached will be observed. This vulnerability is documented in two separate Cisco bug IDs, both of which are required for a full fix: CSCso04657 and CSCsg00102.
CSCsk40676 C1812 12.4.15.T / certain pkt size block inside interface of ezvpn conn.Symptom The inside interface of a Cisco router running EZVPN may become unresponsive when sending ICMP messages from a remote VPN client connection.
Conditions Occurs when LZS compression is used on a Windows Vista client.
Workaround Disable LZS compression.
CSCse85652 HTTP should deny access if no enable password is configured.CSCsg04630 7600BB: DHCP:STB crash MEM corruption at dhcpd_add_binding_to_radix_tree.CSCsk32970 ccm switchover fails as ACL does not deny properly.Symptom Alternative packets are not being dropped by Extended ACL with deny statements in cef switching path.
Conditions When CEF is enabled.
Workaround Disable CEF or use standard ACL.
CSCsk58014 Module fails to boot up after reset.Symptom The module will not return to the steady state after a reset.
Conditions This symptom is observed whenever the module is reset.
Workaround There is no workaround.
CSCsk61991 dsl controller with auto linemode is down with peer in 4-wire linemode.Symptom Ping failure is seen over ATM interface in 4-wire line mode as the ATM interface does not come up.
Conditions With the UUT configured as auto the ATM interface continues to be down after the peer changes from 2-wire to 4-wire enhanced. This happens only on WIC-1SHDSL with UUT configured as auto which is not recommended.
Workaround Do not configure the line mode as auto.
CSCsk63655 MGCP gateway returns 524 instead of 200 for a valid LCO param in CRCX.Symptom A Media Gateway Control Protocol (MGCP) gateway may return a 524 or 510 error code with the reason as "invalid local connection option" for a valid "L:" parameter in a CRCX message.
Conditions The symptoms can be observed on a router that is running Cisco IOS Interim Release 12.4(17.4)T1 or later, when the <CmdBold>debug mgcp parser<noCmdBold> command with verbose tracelevel is disabled.
Workaround Enable <CmdBold>debug mgcp parser<noCmdBold> with verbose tracelevel.
CSCsk70060 crafted packets to UDP port 2887 with AP HWIC may cause queue wedge.Symptom Crafted packets to UDP port 2887 with AP HWIC may cause queue wedge.
Conditions The router must have AP HWIC installed, and UDP port 2887open.
Workaround None.
CSCsk92135 UUT with ADSL over POTS card goes to hang state while booting IOS.Symptom Routers with ADSL over POTS card hang on booting Cisco IOS Release 12.4(16.14)T4 and above.
Conditions Issue seems to be specific to the ADSL over POTS card.
Workaround There is no workaround.
CSCsk93241 Chunk memory corruption on LFDp Input Proc.Cisco IOS Software Multi Protocol Label Switching (MPLS) Forwarding Infrastructure (MFI) is vulnerable to a Denial of Service (DoS) attack from specially crafted packets. Only the MFI is affected by this vulnerability. Older Label Forwarding Information Base (LFIB) implementation, which is replaced by MFI, is not affected. Cisco has released free software updates that address this vulnerability.
This advisory is posted at
http://www.cisco.com/warp/public/707/cisco-sa-20080924-mfi.shtml
CSCsl04399 PRI FAX calls failing for E1 controller.Symptom Fax call is aborted while testing PRI E1 feature.
Conditions Occurs in routers running a pre-release version of Cisco IOS Release 12.4(15)T2.
Workaround Use the <CmdBold>fax rate disable<noCmdBold> command to disable the fax relay feature under the VoIP dialpeer.
CSCsl22080 12.4.15T: WebVPN stops working with TCP connection queue limit reached.Symptom WebVPN hangs after a few days of working. When this happens, no WebVPN connections are active and no new connections can be established. The <CmdBold>debug ip tcp transaction<noCmdBold> command shows <CmdBold>connection queue limit reached: port 443<noCmdBold> errors. The <CmdBold>show tcp brief<noCmdBold> command displays many sessions in SYNRCVD and TIMEWAIT states. Problem is recovered either by reload or by entering the <CmdBold>clear tcp tcb *<noCmdBold> command. There are few stale sessions in CLOSED state left after clearing TCP.
Conditions Issue seen in Cisco IOS Release 12.4.15T and Cisco IOS Release 12.4.15T1 when WebVPN is configured. The issue is intermittent and happens after a few days or weeks of working.
Workaround To restore TCP connectivity, issue <CmdBold>clear tcp tcb *<noCmdBold> or reload the router. Note that this will clear all TCP sessions on the router.
CSCsm45113 RIB installs duplicate routes for the same prefix.Symptom Router may install duplicate routes or incorrect route netmask into routing table. It could happen on any routing protocol. Additionally, for OSPF, crash was observed.
Conditions The problem is triggered by SNMP polling of ipRouteTable MIB. The problem is introduced by CSCsj50773, see the Integrated-in field of CSCsj50773 for affected images.
Workaround Do not poll ipRouteTable MIB, poll newer replacement ipForward MIB, instead. The ipRouteTable MIB was replaced by ipForward MIB in RFC 1354.
Further Problem Description: The <CmdBold>clear ip route *<noCmdBold> command can correct the routing table until the next poll of ipRouteTable MIB.
CSCso18940 snmpwalk on 'ipRouteTable' returns error - OID not increasing.CSCso60174 Multiple duplicate descriptions found for mmoip aaa commands.CSCsq15993 PBR is not supported in CEF switching path on 12.4(15)XY releaseCSCsq56291 Remove several subsystems from unused c10k makefiles.CSCsr15478 Input Queue Wedging.Symptom An input wedge is observed on an interface, when multicast traffic is flowing.
Conditions The symptom is observed in a DMVPN hub-spoke scenario with a point-to-multipoint (P2MP) GRE tunnel having tunnel protection configuration. When multicast traffic flows from hub to spoke through these tunnel interfaces, the incoming interface of the hub is getting wedged and even the ping to peer stops working.
Workaround There is no workaround, other than reloading the router.
CSCsu64215 ip tcp adjust-mss command results in packet loss for non-TCP traffic.Open Caveats - Cisco IOS Release 12.4(15)XY4
There are no open caveats in this release.
Resolved Caveats - Cisco IOS Release 12.4(15)XY4
•CSCsq58779
Cisco IOS devices that are configured for Cisco Unified Communications Manager Express (CME) and the Extension Mobility feature are vulnerable to a buffer overflow vulnerability. Successful exploitation of this vulnerability may result in the execution of arbitrary code or a Denial of Service (DoS) condition on an affected device.
Cisco has released free software updates that address this vulnerability.
This advisory is posted at http://www.cisco.com/warp/public/707/cisco-sa-20090923-cme.shtml
CSCso56129 %SYS-2-BADSHARE: Bad refcount in datagram_done monitoring cme/cue callsSymptom Bad Refcount is seen with tracebacks.
Conditions Using AIM-IPS-K9 to monitor interfaces with ephones registered to the CME on the same router and have ephone check voice mail. This is in a branch in a box setup. UUT serves as a CME as well as having the voice mail AIM in the same router.
Workaround There is no workaround.
CSCso66843 CUBE and CME do not change embedded SSRC in RTCP packetsSymptom Different SSRC in RTCP compared to RTP after transcoding.
Conditions Voice call with transcoding in CUBE or CME.For a voice call passing through transcoding on CUBE or CME, the SSRC value contained within the RTCP is passed unchanged, whereas the SSRC value contained within the RTP is changed. This creates a mismatch between the SSRC between RTP and RTCP at the final destination.
Workaround There is no workaround.
CSCso67655 S2 CFD: Secure DSPFarm doesn't register after a reload of the routerSymptom After Reolad Secure Conference profile does not register with CCM.
Conditions This happens when a specific trustpoint is specified for CCM cert authentication during TLS handshake.
Workaround The workaround is not to specify the truspoint when configuring callmanger CCM using CLI "sccp ccm <ip address> tag version <x>.
CSCsq44013 View used twice with logging enabledSymptom The CPE does not reply to the DNS query from the client for the first try, first response is being dropped.
Conditions This is seen on a router running 12.4T IOS image configured with split DNS.
Workaround There is no workaround.
Open Caveats - Cisco IOS Release 12.4(15)XY3
There are no open caveats in this release.
Resolved Caveats - Cisco IOS Release 12.4(15)XY3
CSCsk62253Cisco IOS software contains two vulnerabilities within the Cisco IOS WebVPN or Cisco IOS SSLVPN feature (SSLVPN) that can be remotely exploited without authentication to cause a denial of service condition. Both vulnerabilities affect both Cisco IOS WebVPN and Cisco IOS SSLVPN features:
1. Crafted HTTPS packet will crash device - Cisco Bug ID CSCsk62253.
2. SSLVPN sessions cause a memory leak in the device - Cisco Bug ID CSCsw24700.
Cisco has released free software updates that address these vulnerabilities. There are no workarounds that mitigate these vulnerabilities. This advisory is posted at the following link: http://www.cisco.com/warp/public/707/cisco-sa-20090325-webvpn.shtml
CSCsk42759Multiple vulnerabilities exist in the Session Initiation Protocol (SIP) implementation in Cisco IOS that can be exploited remotely to trigger a memory leak or to cause a reload of the Cisco IOS device.
Cisco has released free software updates that address these vulnerabilities. Fixed Cisco IOS software listed in the Software Versions and Fixes section contains fixes for all vulnerabilities addressed in this advisory.
There are no workarounds available to mitigate the effects of any of the vulnerabilities apart from disabling the protocol or feature itself, if administrators do not require the Cisco IOS device to provide voice over IP services.
This advisory is posted at http://www.cisco.com/warp/public/707/cisco-sa-20080924-sip.shtml.
CSCsl62609Multiple vulnerabilities exist in the Session Initiation Protocol (SIP) implementation in Cisco IOS that can be exploited remotely to trigger a memory leak or to cause a reload of the Cisco IOS device.
Cisco has released free software updates that address these vulnerabilities. Fixed Cisco IOS software listed in the Software Versions and Fixes section contains fixes for all vulnerabilities addressed in this advisory.
There are no workarounds available to mitigate the effects of any of the vulnerabilities apart from disabling the protocol or feature itself, if administrators do not require the Cisco IOS device to provide voice over IP services.
This advisory is posted at http://www.cisco.com/warp/public/707/cisco-sa-20080924-sip.shtml.
CSCso81854Multiple Cisco products are vulnerable to DNS cache poisoning attacks due to their use of insufficiently randomized DNS transaction IDs and UDP source ports in the DNS queries that they produce, which may allow an attacker to more easily forge DNS answers that can poison DNS caches.
To exploit this vulnerability an attacker must be able to cause a vulnerable DNS server to perform recursive DNS queries. Therefore, DNS servers that are only authoritative, or servers where recursion is not allowed, are not affected.
Cisco has released free software updates that address these vulnerabilities.
This advisory is posted at http://www.cisco.com/warp/public/707/cisco-sa-20080708-dns.shtml.
This security advisory is being published simultaneously with announcements from other affected organizations.
CSCsk42419Symptom The Secure Shell server (SSH) implementation in Cisco IOS contains multiple vulnerabilities that allow unauthenticated users the ability to generate a spurious memory access error or, in certain cases, reload the device.
The IOS SSH server is an optional service that is disabled by default, but its use is highly recommended as a security best practice for management of Cisco IOS devices. SSH can be configured as part of the AutoSecure feature in the initial configuration of IOS devices, AutoSecure run after initial configuration, or manually. Devices that are not configured to accept SSH connections are not affected by these vulnerabilities.
Common Vulnerabilities and Exposures (CVE) identifier CVE-2008-1159 has been assigned to this bug.
The Security Advisory for this issue is posted at
http://www.cisco.com/warp/public/707/cisco-sa-20080521-ssh.shtmlCSCsk60020Symptom The Secure Shell server (SSH) implementation in Cisco IOS contains multiple vulnerabilities that allow unauthenticated users the ability to generate a spurious memory access error or, in certain cases, reload the device.
The IOS SSH server is an optional service that is disabled by default, but its use is highly recommended as a security best practice for management of Cisco IOS devices. SSH can be configured as part of the AutoSecure feature in the initial configuration of IOS devices, AutoSecure run after initial configuration, or manually. Devices that are not configured to accept SSH connections are not affected by these vulnerabilities.
Common Vulnerabilities and Exposures (CVE) identifier CVE-2008-1159 has been assigned to this bug.
The Security Advisory for this issue is posted at
http://www.cisco.com/warp/public/707/cisco-sa-20080521-ssh.shtml.CSCsk29999 AIM-IPS-K9:TCP intercept not entering aggressive modeSymptom When configuring the AIM-IPS-K9 with tcp intercept, the tcp intercept may not enter aggressive mode. Traffic is not impacted.
Conditions When the performance level of passing packets to the IPS application is below the window size at which the IPS application enters aggressive mode, it will not enter aggressive mode. On low-end platforms where the router is a constrictor on traffic sent to the card, this problem may be more pronounced.
Workaround Do not configure tcp intercept with AMI-IPS-K9.
CSCsl61734 CUBE slow start h323 to sip transfer = dead airSymptom Slow start H323 to SIP calls may experience no-way audio if the call is transferred after initially connected.
Conditions This only occurs with slow start H323.
Workaround Use fast start H323.
CSCsl68798%SYS-2-PAK_SUBBLOCK_SETSIZE traceback at control_plane_init() at bootSymptom At boot-time an IOS device may generate tracebacks of the form:
*Mar 1 00:00:10.339:%SYS-2-PAK_SUBBLOCK_SETSIZE: 28 -Process= "Init", ipl= 3, pid= 3, -Traceback= 0x601597F4 0x60260E80 0x602C3928 0x6014E588 0x6014E7E4 0x6028B680 0x6028B664Conditions This behaviour is observed on an IOS device installed with 12.5(0.5) or later or 12.4(15)XY IOS releases.
Workaround There is no known workaround.
CSCsl88956 Primary nvram is not properly restored after it is corruptedSymptom when the Cisco 28xx and 38xx routers is reloaded, they loose the running configuration and startup configuration.
Conditions If the last physical sector of nvram which is shared by nvram and licensing subsystem is corrupted, primary nvram is not restored properly.
Workaround There is no known workaround.
Open Caveats - Cisco IOS Release 12.4(15)XY2
There are no open caveats in this release.
Resolved Caveats - Cisco IOS Release 12.4(15)XY2
CSCsi01875 IPIP gateway rejects a second TCSSymptom Placing a video call from a Polycom device. The call gets rejected because Polycom sends a TCS before receiving the TCS ACK.
Conditions Polycom video endpoints and IP gateway.
Workaround There is no workaround.
CSCse60897 call-manager-fallback does not allow more than 5 redirectsSymptom After 5 redirects, calls fail with busy tone when in call-manager-fallback.
Conditions The maximum redirects seem to be 5 only.
Workaround There is no workaround.
CSCsk09472 printf_ptr warnings still exist after CSCsj92597Symptom The printf_ptr warnings that would appear during a build of the obj-m8500-c1800/c180x-broadband-mz no longer appear.
Workaround Moving the define for printf_ptr to another file solved the issue.
CSCsl70220 Entity hierarchy issue in 1805 deviceSymptom The root entity is pointing to modem card instead of chassis.
Conditions It will affect SNMP based management application like CiscoView.
Workaround There is no workaround.
CSCsl72097 Alignment Error seen in 3800 while making E1/r2 call.Symptom While making E1/r2 calls alignment tracebacks were seen. The traceback reported where for alignment corrections.
Conditions The alignment errors were seen as we were accessing (writing into) non-aligned address.
Workaround Write using PUTLONG which will do a 4-byte write on un-aligned memory will fix this issue.
CSCsm34933 Refresh Re-Invite disconnect call because CUBE does not send out 200 OKSymptom In 12.4(15)XY, when cube receives the session refresh re-invite with sdp then it sends 100 trying but no 200 OK and therefore call gets dropped.
Conditions Call gets dropped since no 200 OK sent by CUBE
Workaround There is no workaround.
CSCsm44512 Router crash when unconfigure PVC from ATM interfaceSymptom Router might crash if unconfig the PVC from ATM interface without shutting down the interface first.
Conditions Crash only observed when interface was up before the PVC removal.
Workaround Shut down the ATM interface first before the PVC removal.
CSCsm44792 input gain auto-control -9 is added automatically to voice-ports.Symptom The command is added automatically to the voice-port configuration: input gain auto-control -9. In addition, this command can not be removed by the "no input gain auto-control -9". This issue causes voice issues to the VTG in the IPICS system.
Conditions This issue is seen after upgrading router from 12.4(6)T6 or 12.5(15)T1 to 12.(4)15XY.
Workaround No known workaround.
This is a sample configuration of the voice port: voice-port 0/2/0:0 voice-class permanent 1 auto-cut-through lmr m-lead audio-gate-in lmr e-lead voice input gain auto-control -9 no echo-cancel enable playout-delay nominal 100 playout-delay minimum high no comfort-noise timeouts call-disconnect 3 timeouts tear down lmr infinity timing hookflash-in 0 timing hangover 40 connection trunk 19990929090 description #0/2/0:0#0# INUSE 1221.
CSCsm73703- RIPv2: Enhancement Request: Supernet Support on Cable Modem HWICSymptom When a supernet ip address is configured on a cable modem HWIC interface with RIP running, RIP updates will no longer be sent via the cable modem HWIC and the route will not be visible.
Conditions Example Configuration: Class C with /23 Router#show int c0/0/0 Cable-Modem0/0/0 is up, line protocol is up HFC state is OPERATIONAL, HFC MAC address is 0018.19b6.37a8, Hardware is Cable modem, address is 0015.6310.918e (bia 0015.6310.918e), Internet address is 208.125.238.2/23.
Workaround Workaround is to update to IOS containing the RIPv2 Supernet Support for the platform.
Open Caveats - Cisco IOS Release 12.4(15)XY
There are no open caveats in this release.
Resolved Caveats - Cisco IOS Release12.4(15)XY
CSCsj85065A Cisco IOS device may crash while processing an SSL packet. This can happen during the termination of an SSL-based session. The offending packet is not malformed and is normally received as part of the packet exchange.
Cisco has released free software updates that address this vulnerability.
Aside from disabling affected services, there are no available workarounds to mitigate an exploit of this vulnerability.
This advisory is posted at http://www.cisco.com/warp/public/707/cisco-sa-20080924-ssl.shtml.
CSCsj81296 - Multiple RTP tracebacks seen on IPIPGW when transcoding callsSymptom Multiple tracebacks are seen on 5400XM operating as an IPIPGW while transcoding calls from G.729r8 to G.711.
Conditions This issue is seen on 12.4(15)T under normal circumstances even with a single call.
Workaround There is no workaround
CSCsl41697 - After disconnect, fetching doc more than 20s causes VXML session leakSymptom The VXML session is not released, causes memory leakage when loading VXML document and takes more than 20 seconds after the user is disconnected.
Workaround There is no workaround.
CSCsj81015 - IPIP Gateway crash ccsip_bridgeSymptom Cisco Multiservice IP-to-IP Gateway (IPIPGW) crashes during a stress scenario.
Conditions This symptom occurs in a stress scenario with 100 SIP-H323 calls + 150 SIP-H323 DTMF interworking (rtp-nte to h245-alpha) calls.
Workaround There is no workaround.
CSCsk60054 Configuration buffer full. Cannot display show runSymptom Upon certain configuration changes, the running configuration might not be able to be displayed and the following error message might appear:
% Configuration buffer full, can't add command:!%Aborting Save. Compress the config, Save it to flash or Free up space on deviceConditions The issue is seen either using or not using service compress-config on a Cisco IOS Router running CallManager Express (CME) when configuring more than 22 voice user-profiles
Workaround There is no workaround.
CSCsj66774- No video with CUVA 2.0.2 and 7970 8-3-1S registered to CME 4.1Symptom No video is seen on PC's using CVTA with 7970 ip phones registered to a CME 4.1 system.
Conditions CVTA is being used with a 7970 phone running firmware 8.3.1S
Workaround Downgrade 7970 firmware to 8.2.2SR1
CSCsk48250 - SW_MGR-3-SM_ERROR: Tracebacks found while establishing l2tpv3 tunnelSymptom SW_MGR-3-SM_ERROR: Tracebacks found while establishing l2tpv3 tunnel and the tunnel is not established.
Conditions This issue is seen in the image 12.4(17.4)T1.
Workaround There is no workaround.
CSCsk90315 - router crashes while making voice calls with RSVP configurationCSCsk67885 - Loading sudialog with record utterance fail cause memory leakageSymptom When VXML script loading sudialog with record utterance, but record utterance loading fails, the VXML session is not freed. This causes memory leakage.
Conditions Loading recording utterance failure is an error case. It could be caused by ASR server configuration problem, or IOS configuration problem.
Workaround There is no workaround.
CSCsk64021 - VXML failing during record - Can not submit a streaming recordingSymptom A VXML gateway intermittently fails to submit a recording.
Conditions This symptom is observed in Cisco IOS Release 12.4.
Workaround There is no workaround.
CSCsk97130 - VXML tree not release when subdialog root document is sharedSymptom For a VXML application, if the calling document and called document of a subdialog shared the same root document, the tree structure used for the root document will not be released after the call session is finished. This causes memory leakage.
CSCsk53133 - VXML session not freed when disconnect event return from subdialogSymptom BVXML session is not freed with the disconnect event returned from subdialog, and the event handler has exit tag. BConditions:BNABWorkaround:BNA
CSCsj97602 - Memory leak on mem_pool:: in Dead poolSymptom A Cisco access server may run out of free processor memory. This symptom can be seen in the <CmdBld>show process memory<noCmdBld> command. Increased memory utilization will be seen in the Dead pool.
Conditions This symptom has been observed only in access servers that participate in Cisco Customer Voice Portal (CVP). When a VXML application is configured with fetchaudio, the fetchaudio playout fails after user disconnect. The fetchaudio should have been removed from the prompt list, but it was not. This causes the session not to be freed when the application is finished.
Workaround A reload will temporarily free the leaked memory.
CSCsj34213 Traceback detected at AFW_Leg_ConnectCSCsk48052 - HQF:HQF support for HDLC32 driver for 36/26/37XX in SpideyCSCsj49237 - Memory leak found at make_fact_attr_list_maxCSCsl03149 - CUBE: SIP-H.323 call - Bad enqeue message and Tracebacks seenCSCsj27183 - Transcoding: Call fails for H323--SIP Fast start callSymptom H323-->SIP interworking fails for a Fast start call when transcoding is enabled on an IPIPGW. Transcoding is done between G711ulaw and G729r8 codecs.
Conditions This failure is seen for H323--SIP--SIP--SIP and H323--SIP--SIP-- H323 call flows when transcoding is enabled on IPIPGW1. It is also seen on H323--H323--H323--SIP call flow for transcoding on IPIPGW2.This is seen only with a Fast Start call (both with H245 Tunnel enabled and disabled), and the call passes with a slow start call.
Workaround There is no workaround
CSCsl17037 - CME: Local Directory IssueSymptom Directory numbers that are configured in local directory of CME are not being shown in Received Calls directory. The number and name shows while call in Ringing state but is not showing during Connected state.
Conditions Inbound Call
Workaround There is no workaround.
CSCsl04115 - CM call to CME when Put on Hold, CME Hears FastBusy instead of TOHSymptom Cisco IP Phone placed on hold hears fastbusy instead of tone-on-hold. A Cisco IP Phone registered with a Cisco Unified CallManager Express (CME) may hear a fastbusy tone when placed on hold. This can occur when interworking with Cisco Unified CallManager (CCM) as shown here:
IPPhoneA---CM---H323---CME---IpPhoneB- Phone A calls Phone B- Phone A puts Phone B on Hold.- Instead of playing Tone On Hold, Phone B user hears a fastbusy tone.Workaround This behavior was introduced in 12.4(15)T. Either downgrade the IOS version on the CUCME or configure music-on-hold (MOH) to be played from CUCM, instead of TOH
CSCsk83750 Unexpected number of hashed queues invalid after attaching policyCSCsk80620 - Tracebacks at send_vtsp_setup_request_to_csmSymptom Traceback is seen on vtsp_ic_notify.
Conditions Traceback observed during a modem call
Workaround There is no workaround.
CSCsk92440 Traceback seen at vtsp_ic_notify in AS5350Symptom Traceback is seen on vtsp_ic_notify.
Conditions Traceback observed even after single e1-r2 call.
Workaround There is no workaround.
CSCsk96251 H323 calls fails when non-default signaling port is usedSymptom H323 calls fails when non-default signaling port is used in dialpeer session target.
example: session target ipv4:192.168.1.1:2437Conditions Failure is seen only when any specific signaling port is configured.
Workaround Configure only IP address so that it picks the default signaling port.
example: session target ipv4:192.168.1.1CSCsi21389 One-way multicast traffic over wirelessSymptom Routers that have the ability to use the optional 802.11b/g card, such as the Cisco ISR series do not pass multicast traffic across the wireless interface.
Conditions Cisco routers that have the 802.11 b/g HWIC card do not pass
Conditions multicast traffic across the wireless interface, though multicast routing is enabled and otherwise is configured normally. Wireless hosts cannot pass multicast traffic between each other, and multicast traffic from the wired network will not be transmitted out the wireless interface.
Workaround There is no workaround.
CSCsj55923 hwic-fe silently drops input packets > 1000bytes @ >4kppsSymptom HWIC-1FE is silently dropping ~2% input packets
Conditions HWIC-1FE in a CISCO2821 chassis running 12.4(11)XV The dropped packet are >1000b and >4kpps
Workaround There is no workaround.
Further Problem Description:
silent drops because the packets are seen by the driver (as per sh controller | i Unicast) and the software level interface (as per sh interface) does not account the same number of input packets and doesn't show any drops nor errors.
CSCsk44535 Tracebacks are seen for H323(SS)---SIP(DM) on IPIPGW2Symptom Tracebacks are seen for H323(SS)---SIP(DM) on IPIPGW2
Conditions Traceback occurred in the following topology: Callgen1----OGW(H323 SS)-----(H323 SS)IPIPGW1(SIP DM)-----(SIP DM)IPIPGW2(H323 SS)---- (H323 SS)TGW----Callgen1
Workaround There is no workaround.
Further Problem Description:
Tracebacks are seen on IPIPGW2 If Call is made from OGW to TGW. Verified by making a call from TGW to OGW and found similar Tracebacks on IPIPGW1.
CSCsj66265 Assertion failed: at bgp_tcp_read_notify()Symptom Router halts with an assertion error.
Conditions The failure usually occurs while closing connections.
Workaround There is no workaround.
CSCsj25356 SIP DO_EO: Memory leak in IPIP channels during stress testCSCsk83813 sip call will pick up the wrong codec type from voice class codecSymptom When this problem occurs, the tone remote control functionality does not work and voice becomes distorted due to the codec mismatch.
Conditions A SIP call consistently uses the incorrect codec type from the "voice class codec" configuration. It should use the value that is configured for "codec preference 1," but instead it uses the value that is configured for the "codec preference 2" setting. This issue occurs when the following configuration is used:
voice class codec 1codec preference 1 g729r8codec preference 2 g711ulawdial-peer voice 9191916 potsdescription #1/1:16#0# INUSE 163destination-pattern 19900001429191916port 1/1:16dial-peer voice 555 voiprtp payload-type lmr-tone 107rtp payload-type nte-tone 108voice-class codec 1session protocol sipv2incoming called-number.dtmf-relay rtp-nteno vadUsing 2811Cisco IOS versions: 12.4(17.4)PI1b and 12.4(17.4)PI1aWorkaround There is no workaround.
CSCsl12443 CME: TNP phones may experience one way audioSymptom IP phone with FXO trunk config may experience intermittent one way audio.
Conditions Debug ephone detail will show the following error:
OpenReceiveChannelAck status orcError on socketWorkaround Reboot the phone.
CSCsk93064 Banaras-QSIG: Calls failedCSCsl04993 uc520 devices does not get reload via SNMPSymptom Cisco Unified Communications Series Integrated Services routers are not reloaded through SNMP.
Conditions Cisco Unified Communications Series Integrated Services routers (ISRs) are not reloaded using SNMP when you restore the device configuration. Cisco Monitor Manager sends a device-reload request to the device after configuration file is restored; however, Cisco Unified Communications 500 Series ISRs do not accept this request through SNMP.
Workaround To work around this problem, reload the device manually after restoring the configuration file.
CSCsk74181 SIP DO-DO - Basic Fax call failsSymptom Fax call fails for a SIP DO-DO call.
Conditions When the CUBE receives a ReINVITE with fax params, it does not forward the same. Instead it sends a BYE and the call gets disconnected.
Workaround There is no workaround.
CSCsk66907 %SYS-3-CPUHOG: due to Skinny MOH Server processSymptom CPU Hog due to Skinny MOH Server causing phones to unregister:
%SYS-3-CPUHOG: Task is running for (xxx)msecs, more than (xxx)msecs(xxxxxx),process = Skinny MOH Server.Conditions Occurs if Music on Hold (MOH) is being streamed from flash in IOS 12.4(11)XW3.
Workaround Use the live feed option by plugging in a CD player or iPOD or any such device to the MOH port on the UC500. Disable MOH from flash that implies tone on hold (or beep on hold).
CSCsk17498 Per Port Storm-Control is brokenCSCsk52683 System crashed when wireless client is trying to associate with APSymptom System crashes when there are clients trying to associate with AP
Conditions When AAA authentication fails with mis-configuration in the system or the wireless clients given wrong password to try to associate.
Workaround Make sure the AAA config is setup correctly and client password is configured correctly.
CSCsk86210 Tracebacks seen while testing After hours callblock featureSymptom When making override after-hour call, intermittently gets traceback for buffer overflow.
CSCsk89542 CRAZYHAWK: crazyhawk_tx_start NULL/FAILED msgs with traffic stressCSCsk82709 CABLE_MODEM_HWIC-3-FAILURE_DETECT: after CM firmware upgrade/rebootSymptom After an upgrade of the cable modem firmware, or a reset of the cable modem daughter card, a message could be displayed about failure of cable modem card.
%CABLE_MODEM_HWIC-3-FAILURE_DETECT: The CableModem Daughtercard has failed on interface Cable-Modem0/0/0.Conditions This could happen after a cable modem firmware upgrade or reset from IOS. The message is misleading because it is not really a failure of the cable modem card but a reset.
Workaround There is no workaround.
CSCsk16153 Modem won't be disconnected on exitSymptom Modem connection is still active on exit.
Conditions This is seen after "exiting" from the modem session.
Workaround There is no workaround.
CSCsk65748 If POE 48V fails to come up, we need to retry 3 timesCSCsk28946 CRAZYHAWK: no ip cef crashes UUT due to corrupted magic valueCSCsk54492 CRAZYHAWK:potential issue working with DetoxCSCsj66492 SPUD: cable-modem QOS not workingSymptom When a service policy is configured under the cable modem interface and matching traffic passed through it, the policy-map counters do not go up.
Conditions when a service policy is configured - something like below:
nterface cable-modem 0/0/0service-flow primary upstreamservice-policy outputand matching traffic passed, the service policy should take affect for primary service flow packets. However, it does not.Workaround There is no workaround.
CSCsk41133 TCP Interception not working on HWIC 1GE and NM-1GE interfaceAdditional References
Use this release note with the documents and websites in this release note and the documents listed in the following sections:
Release-Specific Documents
The following documents are specific to Release 12.4 and apply to Release 12.4(11)XW:
•Cross-Platform Release Notes for Cisco IOS Release 12.4(15)T
•Cisco IOS Release 12.4 Special and Early Deployments
•http://www.cisco.com/en/US/products/ps6706/prod_release_notes_list.html
•Caveats for Cisco IOS Release 12.4 and Caveats for Cisco IOS Release 12.4(15)T http://www.cisco.com/cgi-bin/Support/Bugtool/launch_bugtool.pl
Platform-Specific Documents
Hardware installation guides, configuration and command reference guides, and additional documents specific to the Cisco 800 series routers are available at:
http://www.cisco.com/en/US/products/hw/routers/ps380/tsd_products_support_series_home.html
Cisco IOS Software Documentation Set
The Cisco IOS software documentation set consists of the Cisco IOS configuration guides, Cisco IOS command references, and several other supporting documents.
Documentation Modules
Each module in the Cisco IOS documentation set consists of one or more configuration guides and one or more corresponding command references. Chapters in a configuration guide describe protocols, configuration tasks, and Cisco IOS software functionality, and contain comprehensive configuration examples. Chapters in a command reference provide complete command syntax information. Use each configuration guide with its corresponding command reference.Cisco IOS Software Documentation is available in html or pdf form.
Select your release and click the command references, configuration guides, or any other Cisco IOS documentation you need.
Obtaining Documentation, Obtaining Support, and Security Guidelines
For information on obtaining documentation, obtaining support, providing documentation feed-back, security guidelines, and also recommended aliases and general Cisco documents, see the monthly What's New in Cisco Product Documentation, which also lists all new and revised Cisco technical documentation at:
http://www.cisco.com/en/US/docs/general/whatsnew/whatsnew.html
Notices
See the "Notices" section in About Cisco IOS Release Notes located at
http://www.cisco.com/en/US/docs/ios/12_4/12_4x/12_4xy15/ReleaseNote.html.
Use this document in conjunction with the documents listed in the "Additional References" section.
CCDE, CCENT, Cisco Eos, Cisco HealthPresence, the Cisco logo, Cisco Lumin, Cisco Nexus, Cisco StadiumVision, Cisco TelePresence, Cisco WebEx, DCE, and Welcome to the Human Network are trademarks; Changing the Way We Work, Live, Play, and Learn and Cisco Store are service marks; and Access Registrar, Aironet, AsyncOS, Bringing the Meeting To You, Catalyst, CCDA, CCDP, CCIE, CCIP, CCNA, CCNP, CCSP, CCVP, Cisco, the Cisco Certified Internetwork Expert logo, Cisco IOS, Cisco Press, Cisco Systems, Cisco Systems Capital, the Cisco Systems logo, Cisco Unity, Collaboration Without Limitation, EtherFast, EtherSwitch, Event Center, Fast Step, Follow Me Browsing, FormShare, GigaDrive, HomeLink, Internet Quotient, IOS, iPhone, iQuick Study, IronPort, the IronPort logo, LightStream, Linksys, MediaTone, MeetingPlace, MeetingPlace Chime Sound, MGX, Networkers, Networking Academy, Network Registrar, PCNow, PIX, PowerPanels, ProConnect, ScriptShare, SenderBase, SMARTnet, Spectrum Expert, StackWise, The Fastest Way to Increase Your Internet Quotient, TransPath, WebEx, and the WebEx logo are registered trademarks of Cisco Systems, Inc. and/or its affiliates in the United States and certain other countries.
All other trademarks mentioned in this document or website are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (0812R)
Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be actual addresses and phone numbers. Any examples, command display output, network topology diagrams, and other figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses or phone numbers in illustrative content is unintentional and coincidental.
© 2008, Cisco Systems, Inc. All rights reserved.