|
Table Of Contents
Release Notes for the Cisco 10000 Series Internet Router for Cisco IOS Release 12.2(16)BX
Upgrading to a New Software Release
New Features—Cisco IOS Release 12.2(16)BX
Cisco 10000 Series Router MIB Enhancements
Software Features Supported on the Cisco 10000 Series Router
QoS Service Policy on a Virtual Access Interface
Controlling the Rate of Logging Messages
Testing Performance of High-Speed Interfaces
Open Caveats—Cisco IOS Release 12.2(16)BX
Resolved Caveats—Cisco IOS Release 12.2(16)BX
Obtaining Technical Assistance
Obtaining Additional Publications and Information
Release Notes for the Cisco 10000 Series Internet Router for Cisco IOS Release 12.2(16)BX
June 17, 2004
These release notes provide information about Cisco IOS Release 12.2(16)BX, which provides Service Selection Gateway features for the Cisco 10000 series Internet router.
These release notes are updated as needed to describe new features, memory requirements, hardware support, software platform deferrals, and changes to the microcode and related documents.
Cisco IOS Release 12.2(16)BX is based on the following releases:
•Cisco IOS Release 12.2(15)BX
•Cisco IOS Release 12.2(15)BZ
•Cisco IOS Release 12.2(4)BZ1
•Cisco IOS Release 12.0(20)ST for features specific to the Cisco 10000 router
•Cisco IOS Release 12.2B for platform-independent features
To review the release notes for Cisco IOS Release 12.0(20)ST, go to the following URL:
http://www.cisco.com/univercd/cc/td/doc/product/software/ios120/relnote/7000fam/rn120st.htm
To review the release notes for Cisco IOS Release 12.2, go to the following URL:
http://www.cisco.com/univercd/cc/td/doc/product/software/ios122/122relnt/xprn122/index.htm
Contents
This document contains the following sections:
• New Features—Cisco IOS Release 12.2(16)BX
• Software Features Supported on the Cisco 10000 Series Router
• Limitations and Restrictions
• Open Caveats—Cisco IOS Release 12.2(16)BX
• Resolved Caveats—Cisco IOS Release 12.2(16)BX
• Obtaining Technical Assistance
• Obtaining Additional Publications and Information
Cisco Security Advisory
Cisco routers and switches that are running Cisco IOS software and that are configured to process Internet Protocol Version 4 (IPv4) packets are vulnerable to a Denial of Service (DoS) attack. A rare sequence of crafted IPv4 packets sent directly to the device might cause the input interface to stop processing traffic when the input queue is full. No authentication is required to process the inbound packet. Processing of IPv4 packets is enabled by default. Devices that are running only IP Version 6 (IPv6) are not affected.
Cisco has made software available, free of charge, to correct the problem. For more information, refer to the Cisco Security Advisory: Cisco IOS Interface Blocked by IPv4 Packet, located at the following URL:
http://www.cisco.com/warp/public/707/cisco-sa-20030717-blocked.shtml
System Requirements
Cisco IOS Release 12.2(16)BX requires that you have the performance routing engine (PRE), Part Number ESR-PRE2 installed in the Cisco 10000 chassis. To verify which PRE is installed in the router, use the show version command.
Upgrading to a New Software Release
For specific information about upgrading your Cisco 10000 series router to a new software release, refer to the Cisco 10000 Series Internet Router Software Configuration Guide.
For general information about upgrading to a new software release, refer to the product bulletin Cisco IOS Upgrade Ordering Instructions.
For additional information about ordering Cisco IOS software, refer to the Cisco IOS Software Releases.
New Features—Cisco IOS Release 12.2(16)BX
The following new features and improvements are supported on the Cisco 10000 series Internet router in Cisco IOS Release 12.2(16)BX:
The following sections describe these features.
Service Selection Gateway
The Cisco 10000 series router supports the following Service Selection Gateway (SSG) features in Cisco IOS Release 12.2(16)BX:
Access Protocols
•Subscriber side—PPPoE, PPPoA, RBE, RFC 2684 IP
•Network side—ATM PVCs and subinterfaces, Ethernet interfaces and subinterfaces, POS interfaces, serial and channelized interfaces
SSG Logon and Logoff
• SSG Prepaid and SSG Prepaid Idle Timeout
• SSG Session and Idle Timeout
Authentication and Accounting
• SSG Full Username RADIUS Attribute
• Service Connection and Termination
Service Selection Methods
Service Connection
• Mutually Exclusive Service Selection
Service Profiles
• Service Profiles and Cached Service Profiles
Interface Configuration
• Multicast Protocols on SSG Interfaces
Policing
Redirection
Miscellaneous Features
• VPI/VCI Static Binding to a Service Profile
• RADIUS Virtual Circuit Logging
• AAA Server Group Support for Proxy Services
The following sections describe the Service Selection Gateway features. For more information on configuring these features, refer to the Cisco 10000 Series Internet Router Service Selection Gateway Configuration Guide.
Single Host Logon
The Single Host Logon feature enables SESM to authenticate subscribers by using the PPP authenticated information from the SSG; a subscriber does not need to log on to the SESM. To log on to a service through the SESM web application, a subscriber enters authentication information once for the PPP session and once for the service.
For non-PPP users, when a subscriber authenticates using the SESM application, the subscriber does not have to log on again for the remainder of the non-PPP session. However, the subscriber still has to log on to services.
SSG Autologoff
The SSG Autologoff feature enables SSG to verify connectivity with each host. SSG checks the status of the connection with each host at configured intervals. If SSG finds that a host is not reachable, SSG automatically initiates the logoff of that host. SSG has two methods of checking the connectivity of hosts: ARP ping and ICMP ping.
SSG Prepaid and SSG Prepaid Idle Timeout
The SSG Prepaid feature allows a user to connect to a service if the user has prepaid for the service. The SSG Prepaid feature is time-based only.
When SSG Prepaid is configured, SSG checks a subscriber's available credit to determine whether to connect the subscriber to the service and how long the connection can last. The billing server administers the subscriber's credit as a series of quotas. These quotas are allotments of available credit and represent the duration of use.
The SSG Prepaid Idle Timeout feature enables SSG to return residual quotas (allotments of prepaid credit) to the billing server from services that a user is logged into but not actively using. The SSG can reauthorize a user before the user completely consumes the allocated quota. The SSG Prepaid Idle Timeout feature also enhances the handling of a returned zero quota from the billing server. A user's connection to services can be open even when the billing server returns a zero quota. The SSG can notify the billing server when a connection fails, enabling the billing server to free quota reserved for the failed connection.
SSG Session and Idle Timeout
The Session-Timeout RADIUS attribute and the Idle-Timeout RADIUS attribute are two mechanisms used to prevent the SSG from continuing to allow traffic to pass from the IP address of a user who has disconnected from the network access server without logging out from the SSG. These attributes specify the following:
•Session-Timeout RADIUS attribute—Specifies the maximum length of time for which a host or connection object can remain continuously active.
•Idle-Timeout RADIUS attribute—Specifies the maximum length of time for which a session or connection can remain idle before it is disconnected.
SSG Full Username RADIUS Attribute
The Full Username RADIUS attribute allows SSG to include the user's full username and domain (user@service) in the RADIUS authentication and accounting requests.
Account Login and Logout
SSG sends a RADIUS accounting-request record to the local RADIUS server when a user logs in to or out of the SSG. The Acct-Status-Type attribute included in the accounting-request record indicates if the accounting-request marks the start of the user service or the end of the service.
When a user logs in, SSG sends an accounting-start record to RADIUS. When a user logs out, SSG sends an accounting-stop record.
Service Connection and Termination
SSG also sends a RADIUS accounting-request record to the local RADIUS server when a user accesses or terminates a service. The Acct-Status-Type attribute included in the accounting-request record indicates whether the accounting-request marks the start of the user service or the end of the service.
When a user accesses a service, SSG sends an accounting-start record to RADIUS. When a user terminates a service, SSG sends an accounting-stop record.
PPP Terminated Aggregation
PPP terminated aggregation (PTA) is a PPP selection method in which service selection is based on a structured domain name (for example, username@service.com). PTA terminates the PPP session into a single routing domain. Users can only access one service and users do not have access to the default network or SESM.
The PTA-MD exclusion list allows you to create a set of domains that you want to exclude from SSG processing.
PTA-Multidomain
PTA-Multidomain (PTA-MD) is a PPP selection method in which service selection is based on a structured domain name (for example, username@service.com). PTA-MD terminates the PPP sessions into multiple IP routing domains. SSG features and processing are applied to the user traffic and users can access one or more services at a time. PTA-MD service selection supports a wholesale VPN model where each domain is isolated from the other and has the capability to support overlapping IP addresses.
Web Service Selection
Web service selection enables users to concurrently access multiple on-demand services from a list of personalized services. The Cisco 10000 series Internet router supports the Cisco Subscriber Edge Services Manager (SESM) application for web service selection.
The SESM application provides subscriber authentication, service selection, and service connection capabilities to subscribers of Internet services. Subscribers interact with the SESM web application using a standard Internet browser. They do not need to download any software or plug-ins to use the SESM web pages. After a subscriber successfully authenticates, the SESM web application presents a list of services that the subscriber is currently authorized to use. The subscriber can gain access to one or more of those services by selecting them from a web page. Alternatively, an automatic connection feature might provide automatic connection to services.
SSG AutoDomain
The SSG AutoDomain feature allows users to automatically connect to a service based on the domain part of the structured username specified in an Access-Request. When SSG AutoDomain is configured, user authentication is performed at the service (for example, at the AAA server within a corporate network), instead of at the network access server (NAS).
SSG Open Garden
An Open Garden is a collection of networks or web sites that subscribers can access as long as they have physical access to the network. Subscribers do not have to provide authentication information before accessing the networks in an Open Garden. The network is not restricted by service selection, subscription, or policing.
SSG Port-Bundle Host Key
The SSG Port-Bundle Host Key feature enhances communication and functionality between SSG and SESM by introducing a mechanism that uses the host source IP address and source port to identify and monitor subscribers. With the SSG Port-Bundle Host Key feature, SSG performs port-address translation (PAT) and network-address translation (NAT) on the HTTP traffic between the subscriber and the SESM server.
Exclude Networks
The Exclude Networks feature allows you to specify networks that you do not want users to automatically log on to.
Mutually Exclusive Service Selection
The Mutually Exclusive Service Selection feature restricts a subscriber to accessing only one service at a time in a specified group of services.
Service Profiles and Cached Service Profiles
Service profiles define the services that subscribers can select. Each service that is accessible has a profile that defines the attributes of the service. Service profiles are configured on the RADIUS server or directly on the Cisco 10000 series Internet router. The RADIUS server or SESM downloads the service profiles to the router as needed.
The Cached Service Profiles feature enables SSG to use a cached copy of a service profile instead of downloading the profile from RADIUS every time a user logs on to the service.
SSG Hierarchical Policing
The traffic policing feature limits the transmission rate of traffic entering or leaving a node. In SSG, traffic policing can be used to allocate bandwidth between subscribers and between services to a particular subscriber to ensure all types of services are allocated a proper amount of bandwidth. SSG uses per-user and per-service policing to ensure bandwidth is distributed properly between subscribers (per-user policing) and between services to a particular subscriber (per-session policing). Because these policing techniques are hierarchical in nature (bandwidth can be first policed between users and then policed again between services to a particular user), the feature is called SSG Hierarchical Policing.
Transparent Passthrough
The Transparent Passthrough feature allows unauthenticated traffic to pass through an interface. Interfaces configured as transparent passthrough are treated as Cisco IOS interfaces and not SSG interfaces. The Cisco 10000 series Internet router can receive transparent passthrough traffic on both the access side and the network side. When an interface is configured as transparent passthrough, SSG does not process the traffic to and from the interface or apply SSG features. Instead, Cisco IOS software processes the traffic and applies Cisco IOS features.
Multicast Protocols on SSG Interfaces
SSG supports multicast traffic, which includes normal multicast packets and Internet Group Management Protocol (IGMP) packets. The multicast traffic is separate from the SSG traffic and is routed through normal Cisco IOS processing and features; it is not routed through SSG authentication or features such as per-service statistics or hierarchical policing.
SSG TCP Redirect
The SSG TCP Redirect feature redirects certain user packets to an alternative location that can handle the packets in a suitable manner. This feature works in conjunction with the SESM web interface. SSG TCP Redirect forces subscribers to authenticate before accessing the network or specific services and ensures that subscribers are only allowed to access the services that the service provider wants them to.
The SSG TCP Redirect feature supports the following:
•Redirection for unauthenticated users
•Redirection for unauthorized services
•Initial captivation
For more information, refer to the "Service Selection Gateway" chapter in the Cisco 10000 Series Internet Router Service Selection Gateway Configuration Guide.
VPI/VCI Static Binding to a Service Profile
The VPI/VCI Static Binding to a Service Profile feature allows users accessing SSG through a VPI/VCI or a range of VPI/VCIs to access the server. When a user session arrives on a VPI/VCI or a VPI/VCI range and the session specifies the username but does not specify the domain name, SSG maps the user session to the service to which the VPI/VCI or VPI/VCI range is bound.
RADIUS Virtual Circuit Logging
RADIUS Virtual Circuit (VC) Logging extends and modifies the RADIUS network access server (NAS) port field to carry VPI/VCI information. With RADIUS VC Logging enabled, the Cisco 10000 Internet router (the SSG node) can send NAS port information to the RADIUS server, accurately recording the virtual path interface (VPI) and virtual circuit interface (VCI) of an incoming user or subscriber session. The VPI/VCI of the incoming permanent virtual circuit (PVC) is recorded at the point of entry on SSG, which offers the RADIUS client a unique VPI/VCI for each incoming PVC. This information is logged in the RADIUS accounting record that was created at session startup.
AAA Server Group Support for Proxy Services
The AAA Server Group Support for Proxy Services feature allows you to configure multiple AAA servers for redundancy. The RADIUS Server attribute enables AAA server group support for proxy services. Each group is associated with a service that requires proxy RADIUS AAA. You can configure each remote RADIUS server with timeout and retransmission parameters. When necessary, the SSG performs failover among the servers in the predefined group.
Packet Filtering
The Cisco 10000 series Internet router supports per-user access control lists (ACLs) to prevent users from accessing specific IP addresses and ports. When an ACL attribute is added to a user profile, the attribute applies globally to all the user's traffic.
SSG accepts Cisco IOS ACLs and SSG ACLs. SSG ACLs take precedence over Cisco IOS ACLs when both Cisco IOS and SSG ACLs are configured on the same SSG interface.
An SSG ACL can have a maximum of 8 access-list entries (ACEs). If you use the TCP Redirect feature, TCP Redirect uses one of the 8 ACEs; therefore, you can configure only 7 ACEs.
SSG Unconfig
The SSG Unconfig feature enhances your ability to disable SSG at any time and releases the data structures and system resources created by SSG when SSG is unconfigured.
SSG Unconfig removes SSG allocated resources when you globally disable SSG after it was enabled. When you enable SSG, the SSG subsystem in the Cisco IOS software acquires system resources that are never released, even after you disable SSG. The SSG Unconfig feature enables you to release and clean up system resources when SSG is not in use.
Per-Service Statistics
The Cisco 10000 series Internet router collects statistics about router interfaces and the connections to them in both the input and output directions. Cisco CLI commands, such as show interface, are used to display information about the interfaces. SSG commands, such as show ssg connection, are used to display information about the connection to the router.
Field Diagnostics
Field Diagnostics provides customers with a method of testing and verifying line card hardware problems.
If you would like to perform a hardware diagnostic test on any line card in your Cisco 10000 series router, a Field Diagnostic image can be downloaded free of charge from Cisco Systems and used to test whether the line card problems are indeed due to faulty hardware. The test results will verify whether or not the hardware is faulty.
For additional information on Field Diagnostic tests, refer to the Field Diagnostics for the Cisco 10000 Series Router located at the following URL:
http://www.cisco.com/univercd/cc/td/doc/product/aggr/10000/tblshoot/fdiags/index.htm
8-Port DS3/E3 ATM Line Card
The 8-port DS3/E3 ATM line card is a full height card that provides eight DS3 or E3 connections to ATM networks. The line card functionality focuses on Layer 2 ATM services and relies on the performance routing engine (PRE, Part Number ESR-PRE2) to provide Layer 3 services. The DS3/E3 ATM line card receives and transmits ATM cells on the physical interfaces while transmitting and receiving packets from the backplane.
The 8-port DS3/E3 ATM line card provides the following hardware features:
•8 DS3/E3 ports on a full height, single slot line card
•Rear chassis cabling with BNC connectors
•DS3 features:
–Per interface M23 or C-bit parity framing mode
–Per line card DSX3 modes: T3 ADM, T3 PLCP
–DS3 line or payload loopback
–Internal or loop timing
–Per interface line build out: 450 ft. of 75 ohm coaxial cable
•E3 features:
–Per interface G.751 or G.832 framing mode
–Per line card DSX3 modes: E3 ADM, E3 PLCP
–E3 line or payload loopback
–Internal or loop timing
•ATM features:
–Supports up to 32,000 VCs per line card, maximum of 4,000 VCs per port, all 16 VCI and 8 VPI bits are available
–Supports AAL5 data transport, F4 and F5 OAM cells
–Per VC and per VP traffic shaping
•64 MB packet memory in each direction
Mixing DSX3 modes on a per port basis is not supported. When you configure the 8-port E3/DS3 ATM line card for a DSX3 mode, all eight ports of the line card operate in the mode you have selected.
The DS3/E3 ATM line card supports the following throughput rates and ATM framing for the specified DSX3 modes:
DSX3 Mode Throughput Rate ATM FramingT3 ADM
44200 Kbps
CBIT or M23
T3 PLCP
40700 Kbps
CBIT or M23
E3 ADM
34000 Kbps
G.751 or G.832
E3 PLCP
30600 Kbps
G.751 only
For more information, refer to the "Configuring the 8-Port E3/DS3 ATM Line Card" i n the Cisco 10000 Series Internet Router Software Configuration Guide.
Cisco 10000 Series Router MIB Enhancements
Cisco IOS Release 12.2(16)BX adds support for the CISCO-SSG-MIB. For more information about the MIB capabilities on the router, refer to the Cisco 10000 Series Broadband MIB Specifications Guide. (Chapter 3, "MIB Specifications," lists MIBs constraints.)
Software Features Supported on the Cisco 10000 Series Router
Table 1 lists the leased line features based on Cisco IOS Release 12.0(20)ST, and supported in the Cisco 10000 series router.
Limitations and Restrictions
This section describes limitations and restrictions for the following areas. Be sure to review these limitations and restrictions before you use the Cisco 10000 series router.
• Broadband Aggregation Groups
• QoS Service Policy on a Virtual Access Interface
• Controlling the Rate of Logging Messages
• Testing Performance of High-Speed Interfaces
L2TP Tunnel Authorization
Cisco 10000 router supports L2TP tunnel authorization. However, RADIUS does not provide attributes for such parameter values as L2TP tunnel timeouts, L2TP tunnel hello intervals, and L2TP tunnel receive window size. When the Cisco 10000 router does not receive a RADIUS attribute for a parameter, the router uses the default value.
Broadband Aggregation Groups
Cisco IOS Release 12.2(15)BX or later does not support the configuration of Broadband Aggregation (BBA) groups using RADIUS. You must configure BBA groups manually.
ATM PXF Queuing
If you intend to disable ATM PXF queuing, to ensure reliable operation you must enter the no atm pxf queuing mode command before you configure any VCs on an interface. If you have already configured VCs on an interface and you need to change the mode of ATM PXF queuing, remove the VCs from the configuration and then change the ATM PXF queuing mode.
Dynamic Bandwidth Selection
The Cisco 10000 series router does not support Dynamic Bandwidth Selection (DBS) on VP tunnels.
QoS Service Policy on a Virtual Access Interface
If you apply an output QoS service policy on a virtual-access interface, and that virtual access interface is L2TP tunneled (When the router is configured as an LNS, for example) and the service policy indicates that the TOS or DSCP bits should be set (with the set ip command, for example), the router sends the packets as-is, without changing the IP Precedence bits or DSCP bits. The outer header gets the correct value, but the inner header is not changed.
CISCO-VPDN-MGMT MIB
SNMP limits the size of Virtual Private Dialup Network (VPDN) template names to 128 characters. This affects the functionality of the CISCO-VPDN-MGMT MIB. Due to this restriction, if any template name (cvpdnTemplateName) in the cvpdnTemplateTable exceeds 128 characters, you cannot use an SNMP getmany request to retrieve any table entries. Instead, you must use individual getone requests to retrieve each template name that does not exceed 128 characters. For more information, refer to the Cisco 10000 Series Internet Router Broadband MIB Specifications Guide.
AAA Method Lists
Cisco IOS Release 12.2(14)BX supports a maximum of 99 authentication, authorization, and accounting (AAA) method lists. If you configure more than 99 AAA method lists using the aaa authentication ppp or aaa authorization network command, traceback messages appear on the console.
Unshaped UBR PVCs
Cisco IOS Release 12.2(15)BX or later supports a maximum of 8000 unshaped UBR VCs on the OC-12 ATM line card. An unshaped UBR PVC is a PVC that has no rate configured on it. You can configure up to 16,000 shaped UBR VCs per port on the OC-12 line card if you configure the VCs with a shaped rate of less than 299 Mbps.
Shaped UBR PVCs
The Cisco 10000 series router does not support shaped UBR in low VC mode.
Controlling the Rate of Logging Messages
It is important that you limit the rate that system messages are logged by the Cisco 10000 series router. This helps to avoid a situation in which the router becomes unstable and the CPU is overloaded. To control the output of messages from the system, use the logging rate-limit command.
We recommend that you configure the logging rate-limit command as follows:
Router(config)# logging rate-limit console all 10 except critical
This rate-limits all messages to the console to 10 per second, except for messages with critical priority (level 3) or greater.
For more information on the logging rate-limit command, refer to the Cisco IOS Configuration Fundamentals Command Reference.
Testing Performance of High-Speed Interfaces
Cisco IOS software running on the Cisco 10000 series router has multiple queues for all classes of traffic over high-speed interfaces. The software selects a queue based on the source and destination address of the packet. This ensures that a traffic flow always uses the same queue and the packets are transmitted in proper order.
When the Cisco 10000 series router is installed in a real network, the high-speed interfaces work efficiently to spread traffic flow equally over the queues. However, using single traffic streams in a laboratory environment might result in less-than-expected performance.
Therefore, to ensure accurate test results, you should test the throughput of the gigabit Ethernet, POS, or ATM uplink with multiple source or destination addresses.
Tip To determine if traffic is being properly distributed, use the show pxf cpu queue command.
Important Notes
This section provides important information about the following items for Cisco IOS Release 12.2(16)BX:
Provisioning for Scaling
The following configuration parameters enhance scalability on the Cisco 10000 series router:
• PPPoA Sessions with IP QoS Static Routes
• AAA Authentication on the NME Port
To configure the Cisco 10000 series router for high scalability, be sure to configure the configuration parameters as described in the sections that follow.
For more information, refer to the Cisco 10000 Series Internet Router Broadband Aggregation Configuration Guide.
PPPoA Sessions with IP QoS Static Routes
To scale to 32,000 PPPoA sessions with IP QoS enabled, you must limit the number of IP QoS static routes to 4,000 unidirectional QoS static routes.
AAA Authentication on the NME Port
If you use AAA authentication on the NME port, set both the in and out interface hold queues to 4096. For example:
Router(config)# int fa 0/0/0
Router(config-if)# hold-queue 4096 in
Router(config-if)# hold-queue 4096 out
Call Admission Control
We recommend that you set the Call Admission Control (CAC) to a maximum of 95. For example:
Router(config)# call admission limit 95
Inserting a New Line Card
Unlike other Cisco routers, if you insert a new or different line card into a Cisco 10000 chassis slot that previously had a line card installed, the line card initially reports that it is administratively up.
Open Caveats—Cisco IOS Release 12.2(16)BX
Table 2 describes Open Caveats in Cisco IOS Release 12.2(16)BX.
Resolved Caveats—Cisco IOS Release 12.2(16)BX
This section describes caveats that were fixed in Cisco IOS Release 12.2(16)BX:
CSCdu53656
A Cisco device running IOS and enabled for the Border Gateway Protocol (BGP) is vulnerable to a Denial of Service (DOS) attack from a malformed BGP packet. The BGP protocol is not enabled by default, and must be configured in order to accept traffic from an explicitly defined peer. Unless the malicious traffic appears to be sourced from a configured, trusted peer, it would be difficult to inject a malformed packet. BGP MD5 is a valid workaround for this problem.
Cisco has made free software available to address this problem. For more details, please refer to this advisory, available at http://www.cisco.com/warp/public/707/cisco-sa-20040616-bgp.shtml.
CSCea28131
A Cisco device running IOS and enabled for the Border Gateway Protocol (BGP) is vulnerable to a Denial of Service (DOS) attack from a malformed BGP packet. The BGP protocol is not enabled by default, and must be configured in order to accept traffic from an explicitly defined peer. Unless the malicious traffic appears to be sourced from a configured, trusted peer, it would be difficult to inject a malformed packet. BGP MD5 is a valid workaround for this problem.
Cisco has made free software available to address this problem. For more details, please refer to this advisory, available at http://www.cisco.com/warp/public/707/cisco-sa-20040616-bgp.shtml.
CSCea51673
If you enter the show ip dhcp pool command, and if the output to the console is paused (requiring that you press any key to view the second page of that output), the statistics might be incorrect. This has been fixed.
CSCea52771
When a PPPoE over Ethernet sessions is connected to the Cisco 10000 series router and the RADIUS NAS-Port format is format a, NAS-Port[5] is set as Virtual (60000 plus the interface number) in SSG. This has been fixed.
CSCea78489
(Duplicate of CSCea34862) When an AAA server group is defined in the startup configuration file, the eboot image c10k2-eboot-mz displays the following message on the console:
% Image does not support any AAA protocols.
% Image does not support any AAA protocols.
The eboot image does not need to support AAA because the eboot image does not initialize the AAA routines. The AAA commands in the startup configuration cause this message to appear during system startup. Ignore the message. Cisco IOS Release 12.2(16)BX supports AAA and it is available when the router is initialized.
CSCea78899
If you have an OC-48 line card installed in the Cisco 10000 series router that is transmitting and receiving traffic, and you remove it and install a channelized CT3 line card, and you then remove the channelized CT3 line card and re-insert the OC-48 line card, the POS interface flaps continuously.
The online insertion and removal (OIR) feature for the Cisco 10000 series router does not retain configurations when you insert a different type of line card in the same slot. This is expected behavior.
CSCeb01423
A memory leak might occur on the Cisco 10000 series router during the installation of per user access control lists (ACLs) that are downloaded from a RADIUS server. This has been fixed.
CSCeb02966
(Duplicate of CSCea40788) When you use the range command to create an oversubscription of VCs in a virtual path (VP), the Cisco 10000 series router cannot create the VCs due to the oversubscription, and returns an error. The router then stops responding. This has been fixed.
CSCeb02896
SSG fails after a PPP client attempts to log out. This problem happens when an ACL is configured with a PPP user host key. This has been fixed.
CSCeb05601
Users cannot log back in after the primary PRE switches-over to the redundant PRE. This has been fixed.
CSCeb12470
When numerous per-user ACLs are configured on the router, the following error and traceback messages might display if the router is busy deleting the unused ACLs of disconnected sessions.
May 9 18:24:26.286: %SYS-3-CPUHOG: Task ran for 2692 msec (64/1),
process = TurboACL, PC = 60B99A88.-Traceback= 60B99A90 602AB000 602AB27C 602ADF20 602AE0B4 602AE3B4
This has been fixed.
CSCeb13130
When a Path Link Mismatch (PLM) alarm exists on the 1-port channelized OC-12 line card or the 4-port channelized OC-3 line card, the show controller command for T1 or E1 controller that is configured for SDH framing does not display the PLM alarm. The alarm does display correctly if SONET framing is configured. This has been fixed.
CSCeb24714
The Cisco 10000 series router takes longer than expected (approximately 90 minutes) to load the 16M configuration file. The elog file indicated that the fib-get-auto-adjacency_fibidb function was sampled at a large percentage (approximately 11%). This has been fixed.
CSCeb24732
The Cisco 10000 series router takes longer than expected to load the router configuration. If you enter the show parser stat command while the router is loading the configuration, a lot of cache misses display. This has been fixed.
CSCeb24738
The Cisco 10000 series router is slow to boot when you add the static route improvement patch code. This has been fixed.
CSCeb24747
The Cisco 10000 series router is slow to load while you set up subinterfaces. This has been fixed.
CSCeb26584
After the absolute timeout expires for PPPoE sessions with per user ACLs, the router disconnects the sessions. If you then enter the show pxf cpu access-list security command, numerous "Unneeded ACLs" display. This has been fixed.
CSCeb29038
A bus error occurs when executing the show pxf cpu access-lists security command after sessions time out and start to disconnect. This has been fixed.
CSCeb29043
A memory leak might occur in the process AAA Per-User when PPPoE sessions are brought up, then torn down, then brought up again. This has been fixed.
CSCeb29165
You cannot ping the default network when the ip verify unicast reverse-path command is configured under the Virtual Template. You can only ping the default network when you are logged in to the service. This has been fixed. The routes to a downlink interface and SSG hosts are now added to the service VRF tables, which allows RPF checks for SSG hosts that have not yet logged on to any services.
This does not work with static routes added for RPF checks. Only interface network addresses are added to the SSG VRFs. Static routes for hosts are not added to the SSG VRFs and RPF checks might fail. This can occur if you configure the ip unnumbered command on downlink interfaces with static routes.
SSG adds the route when binding the interface. If you change the interface address after the interface is bound, SSG cannot track the interface.
CSCeb29285
When a user logs out of a session with accounting, the network access server (NAS) ID is incorrect. This problem occurs with the Accounting Stop packet in a PPPoE configuration. This has been fixed.
CSCeb31501
The Cisco 10000 series router does not send out a TERMREQ when the router clears a PPPoA virtual access interface. This has been fixed.
CSCeb31520
The Cisco 10000 series router stops responding when you enter the clear interface virtual-access number command for a PPPoA virtual access interface (VAI) with a conditional debug interface turned on. This has been fixed.
CSCeb31714
On an ATM interface with UBR traffic shaping configured, the router shapes the traffic incorrectly. This does not occur when you set high thresholds. Be careful not to set the thresholds so high that with typical traffic patterns, the SAR buffer becomes full.
CSCeb33336
The session connection rate appears to be unacceptably slow when SSG accounting is enabled. This has been fixed.
The connection rate for sessions with SSG accounting enabled are typically 3 to 4 percent higher than the connection rate for sessions with SSG accounting disabled. This is due to the time required for the SSG router to receive the accounting information from RADIUS.
CSCeb38319
The line cards go down and remain down after the Cisco 10000 series router reloads or a forced failover to the redundant performance routing engine (PRE) is executed. This has been fixed.
CSCeb39442
The Cisco 10000 series router does not update the QoS shaping parameters for a VC when Dynamic Bandwidth Selection (DBS) is enabled on a VC class.
If you enter the show atm pvc dbs command when a PPPoA session is established, the output from the command indicates that RADIUS is sending the AV pairs, but the shaping parameters for the VC are unchanged. The Cisco 10000 series router does not change the VC and instead displays an error message similar to the following:
Jun 5 13:21:19.200: %C10K DBS: validate_params() 2/111, vcd 11,
QoS type 5, PCR 50, SCR 38Jun 5 13:21:19.200: %C10K DBS: validate() QoS update rejected
PVC 2/111 on VP tunnel
This has been fixed.
CSCeb39820
The Cisco 10000 series router might stop responding while processing turbo ACLs. This has been fixed.
Other Caveats
This section includes caveats listed in previous release notes that are regarded as resolved because they are either unreproducible, they were reported in error, or they do not affect the behavior of the Cisco 10000 series router. If a caveat listed in this section causes problems, contact Cisco customer service.
CSCdy64397
The L2TP network server (LNS) sends keepalives at an incorrect interval. We have been unable to reproduce this problem.
CSCea33889
Previously, it was reported that the output of the show controller e1 command showed the status of the E1 controller on the 24-port channelized E1/T1 line card as down when it was actually up. We have been unable to reproduce this problem.
CSCea78453
In rare circumstances, if you enter the hw-module slot <slot> shutdown command followed by the no card command, the router reloads unexpectedly. This problem rarely occurs and you are unlikely to experience it. We have been unable to reproduce this problem.
Obtaining Documentation
The following sections provide sources for obtaining documentation from Cisco Systems.
World Wide Web
You can access the most current Cisco documentation on the World Wide Web at the following sites:
•http://www.cisco.com
•http://www-china.cisco.com
•http://www-europe.cisco.com
Documentation CD-ROM
Cisco documentation and additional literature are available in a CD-ROM package, which ships with your product. The Documentation CD-ROM is updated monthly and may be more current than printed documentation. The CD-ROM package is available as a single unit or as an annual subscription.
Ordering Documentation
Cisco documentation is available in the following ways:
•Registered Cisco Direct Customers can order Cisco Product documentation from the Networking Products MarketPlace:
http://www.cisco.com/cgi-bin/order/order_root.pl
•Registered Cisco.com users can order the Documentation CD-ROM through the online Subscription Store:
http://www.cisco.com/go/subscription
•Nonregistered Cisco.com users can order documentation through a local account representative by calling Cisco corporate headquarters (California, USA) at 408 526-7208 or, in North America, by calling 800 553-NETS (6387).
Documentation Feedback
If you are reading Cisco product documentation on the World Wide Web, you can submit technical comments electronically. Click Feedback in the toolbar and select Documentation. After you complete the form, click Submit to send it to Cisco.
You can e-mail your comments to bug-doc@cisco.com.
To submit your comments by mail, use the response card behind the front cover of your document, or write to the following address:
Attn. Document Resource Connection
Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134-9883We appreciate your comments.
Obtaining Technical Assistance
Cisco provides Cisco.com as a starting point for all technical assistance. Customers and partners can obtain documentation, troubleshooting tips, and sample configurations from online tools. For Cisco.com registered users, additional troubleshooting tools are available from the TAC website.
Cisco.com
Cisco.com is the foundation of a suite of interactive, networked services that provides immediate, open access to Cisco information and resources at anytime, from anywhere in the world. This highly integrated Internet application is a powerful, easy-to-use tool for doing business with Cisco.
Cisco.com provides a broad range of features and services to help customers and partners streamline business processes and improve productivity. Through Cisco.com, you can find information about Cisco and our networking solutions, services, and programs. In addition, you can resolve technical issues with online technical support, download and test software packages, and order Cisco learning materials and merchandise. Valuable online skill assessment, training, and certification programs are also available.
Customers and partners can self-register on Cisco.com to obtain additional personalized information and services. Registered users can order products, check on the status of an order, access technical support, and view benefits specific to their relationships with Cisco.
To access Cisco.com, go to the following website:
http://www.cisco.com
Technical Assistance Center
The Cisco TAC website is available to all customers who need technical assistance with a Cisco product or technology that is under warranty or covered by a maintenance contract.
Contacting TAC by Using the Cisco TAC Website
If you have a priority level 3 (P3) or priority level 4 (P4) problem, contact TAC by going to the TAC website:
http://www.cisco.com/tac
P3 and P4 level problems are defined as follows:
•P3—Your network performance is degraded. Network functionality is noticeably impaired, but most business operations continue.
•P4—You need information or assistance on Cisco product capabilities, product installation, or basic product configuration.
In each of the above cases, use the Cisco TAC website to quickly find answers to your questions.
To register for Cisco.com, go to the following website:
http://www.cisco.com/register/
If you cannot resolve your technical issue by using the TAC online resources, Cisco.com registered users can open a case online by using the TAC Case Open tool at the following website:
http://www.cisco.com/tac/caseopen
Contacting TAC by Telephone
If you have a priority level 1 (P1) or priority level 2 (P2) problem, contact TAC by telephone and immediately open a case. To obtain a directory of toll-free numbers for your country, go to the following website:
http://www.cisco.com/warp/public/687/Directory/DirTAC.shtml
P1 and P2 level problems are defined as follows:
•P1—Your production network is down, causing a critical impact to business operations if service is not restored quickly. No workaround is available.
•P2—Your production network is severely degraded, affecting significant aspects of your business operations. No workaround is available.
Obtaining Additional Publications and Information
Information about Cisco products, technologies, and network solutions is available from various online and printed sources.
•The Cisco Product Catalog describes the networking products offered by Cisco Systems, as well as ordering and customer support services. Access the Cisco Product Catalog at this URL:
http://www.cisco.com/en/US/products/products_catalog_links_launch.html
•Cisco Press publishes a wide range of networking publications. Cisco suggests these titles for new and experienced users: Internetworking Terms and Acronyms Dictionary, Internetworking Technology Handbook, Internetworking Troubleshooting Guide, and the Internetworking Design Guide. For current Cisco Press titles and other information, go to Cisco Press online at this URL:
•Packet magazine is the Cisco quarterly publication that provides the latest networking trends, technology breakthroughs, and Cisco products and solutions to help industry professionals get the most from their networking investment. Included are networking deployment and troubleshooting tips, configuration examples, customer case studies, tutorials and training, certification information, and links to numerous in-depth online resources. You can access Packet magazine at this URL:
http://www.cisco.com/go/packet
•iQ Magazine is the Cisco bimonthly publication that delivers the latest information about Internet business strategies for executives. You can access iQ Magazine at this URL:
http://www.cisco.com/go/iqmagazine
•Internet Protocol Journal is a quarterly journal published by Cisco Systems for engineering professionals involved in designing, developing, and operating public and private internets and intranets. You can access the Internet Protocol Journal at this URL:
http://www.cisco.com/en/US/about/ac123/ac147/about_cisco_the_internet_protocol_journal.html
•Training—Cisco offers world-class networking training. Current offerings in network training are listed at this URL:
http://www.cisco.com/en/US/learning/le31/learning_recommended_training_list.html
Posted: Thu Jun 17 09:05:36 PDT 2004
All contents are Copyright © 1992--2004 Cisco Systems, Inc. All rights reserved.
Important Notices and Privacy Statement.