Guest

Cisco IOS Software Releases 12.3 Special and Early Deployments

Cisco 1700 Series - Release Notes for Cisco IOS Release 12.3(2)XA

 Feedback

Table Of Contents

Release Notes for the Cisco 1700 Series Routers for Cisco IOS Release 12.3(2)XA

Contents

System Requirements

Memory Requirements

Hardware Supported

Determining the Software Version

Upgrading to a New Software Release

Feature Set Tables

New and Changed Information

New Software Features in Release 12.3(2)XA

Analog CAMA E911 Trunk

VPN Access Control Using 802.1x Authentication

NAT - Static IP Support

New Software Features in Release 12.3(2)T

Limitations

Analog CAMA E911 Trunk

VPN Access Control Using 802.1x Authentication

Caveats

Resolved Caveats - Cisco IOS Release 12.3(2)XA7

Open Caveats - Cisco IOS Release 12.3(2)XA7

Resolved Caveats for Release 12.3(2)XA

CSCea24089

CSCeb10842

CSCeb44999

CSCeb45670

CSCeb68733

CSCeb74702

CSCeb77509

CSCeb83747

CSCeb84031

CSCeb87159

CSCec02611

CSCec02631

CSCec08995

CSCec14126

Open Caveats for Release 12.3(2)XA

CSCea90721

CSCea93774

CSCeb19169

CSCeb56827

CSCeb44319

CSCeb45476

CSCeb46738

CSCeb55390

CSCeb56827

CSCeb57896

CSCeb66294

CSCea90721

CSCea93774

CSCin52562

Resolved Caveats for Cisco IOS Release 12.3(2)XA

CSCeb24587

CSCeb40987

CSCeb44319

CSCeb45476

CSCeb53094

CSCeb63813

CSCeb66294

CSCea72489

Related Documentation

Release-Specific Documents

Platform-Specific Documents

Obtaining Documentation

World Wide Web

Documentation CD-ROM

Ordering Documentation

Documentation Feedback

Obtaining Technical Assistance

Cisco.com

Technical Assistance Center

Cisco TAC Web Site

Cisco TAC Escalation Center

Obtaining Additional Publications and Information


Release Notes for the Cisco 1700 Series Routers for Cisco IOS Release 12.3(2)XA


March 21, 2008

These release notes describe new features and significant software components for the Cisco 1700 series routers that support the Cisco IOS Release 12.3(2)T, up to and including Release 12.3(2)XA. These release notes are updated as needed to describe new memory requirements, new features, new hardware support, software platform deferrals, microcode or modem code changes, related document changes, and any other important changes. Use these release notes with the Cross-Platform Release Notes for Cisco IOS Release 12.3(2)T located on Cisco.com and the Documentation CD.

For a list of the software caveats that apply to Release 12.3(2)XA, see the "Caveats" section and Caveats for Cisco IOS Release 12.3(2)T. The online caveats document is updated for every maintenance release and is located on Cisco.com and the Documentation CD.

Contents

These release notes include the following topics:

System Requirements

New and Changed Information

Limitations

Caveats

Related Documentation

Obtaining Documentation

Obtaining Technical Assistance

Obtaining Additional Publications and Information

System Requirements

This section describes the system requirements for Release 12.3(2)XA and includes the following sections:

Memory Requirements

Hardware Supported

Determining the Software Version

Upgrading to a New Software Release

Feature Set Tables

Memory Requirements

Table 1 describes the memory requirements for the Cisco IOS feature sets supported by the Cisco IOS Release 12.3(2)XA on the Cisco 1700 series routers.

Table 1 Recommended Memory Requirements for the Cisco 1700 Series - Legacy Images 

Platform

Feature Set

Image Name

Image File Name

Recommended
Flash Memory

Recommended

DRAM

SDM Supported

Runs from

Cisco 1710

IP/FW/IDS PLUS IPSEC 3DES

Cisco 1700 IOS IP/FW/IDS PLUS IPSEC 3DES

c1710-k9o3sy-mz

16 MB

64 MB

Cisco 1710-no

RAM

Cisco 1710

IP/IPX/AT/IBM/FW/IDS PLUS IPSEC 3DES

Cisco 1700 IOS IP/IPX/AT/IBM/FW/IDS PLUS IPSEC

c1710-bk9no3r2sy-mz

16 MB

64 MB

Cisco 1710-no

RAM

Cisco 1751-V and1760

IP/ADSL/VOX PLUS

Cisco 1700 IOS IP/ADSL/VOX PLUS

c1700-sv8y7-mz

32 MB

96 MB

Cisco 1751-V and 1760 - yes

RAM

Cisco 1751-V and1760

IP/ADSL/VOX/FW/IDS PLUS IPSEC 3DES

Cisco 1700 IOS IP/ADSL/VOX/FW/IDS PLUS IPSEC 3DES

c1700-k9o3sv8y7-mz

32 MB

96 MB

Cisco 1751-V and 1760 - yes

RAM

Cisco 1751-V and 1760

IP ADSL/IPX/
AT/IBM/VOX/ FW/IDS PLUS IPSEC 3DES

Cisco 1700 IOS IP ADSL/IPX/
AT/IBM/VOX/ FW/IDS PLUS IPSEC 3DES

c1700-bk9no3r2sv8y7-mz

32 MB

96 MB

Cisco 1751-V and 1760 - yes

RAM

Cisco 1701, 1721, 1751, 1751-V and 1760

IP ADSL/PLUS

Cisco 1700 IOS IP ADSL PLUS

c1700-sy7-mz

16 MB

64 MB

Cisco 1701, 1721,

1751, 1751-V and 1760 - yes

RAM

Cisco 1720, 1721, 1751, 1751-V and 1760

IP

Cisco 1700 IOS IP

c1700-y-mz

16 MB

32 MB

Cisco 1720, 1721, 1751, 1751-V and1760 - yes

RAM

Cisco 1701, 1721, 1751, 1751-V and 1760

IP ADSL/IPX/ AT/IBM PLUS

Cisco 1700 IOS IP ADSL/IPX/ AT/IBM PLUS

c1700-bnr2sy7-mz

16 MB

64 MB

Cisco 1701, 1721, 1751, 1751-V and 1760 - yes

RAM

Cisco 1701, 1711, 1712, 1751-V and 1760

IP ADSL/IPX/
AT/IBM/FW/ IDS PLUS IPSEC 3DES

Cisco 1700 IOS IP ADSL/IPX/
AT/IBM/FW/ IDS PLUS IPSEC 3DES

c1700-bk9no3r2sy7-mz

32 MB

96 MB

Cisco 1701, 1711, 1712, 1751-V and 1760 - yes

RAM

Cisco 1701, 1720, 1721, 1751, 1751-V, and 1760

IP/ADSL

Cisco 1700 IOS IP/ADSL

c1700-y7-mz

16 MB

48 MB

Cisco 1701, 1720, 1721, 1751, 1751-V and 1760 - yes

RAM

Cisco 1701, 1711, 1712, 1721, 1751, 1751-V and 1760

IP/ADSL/FW/IDS PLUS IPSEC 3DES

Cisco 1700 IOS IP/ADSL/FW/IDS PLUS IPSEC 3DES

c1700-k9o3sy7-mz

16 MB

64 MB

Cisco 1701, 1711, 1712, 1751-V and 1760 - yes

Cisco 1721 and 1751 - no

RAM


Table 2 Recommended Memory Requirements for Cisco 1700 Series Routers - Cross-Platform Images

Platform1

Feature Set

Image Name

Image File Name

Recommended Flash Memory

Recommended DRAM

SDM Supported

Runs from

Cisco 1751-V and 1760

IP Voice

(2)

c1700-ipvoice-mz

32 MB

96 MB

Cisco 1751-V and 1760 - yes

RAM

Cisco 1701, 1751-V and 1760

Advanced IP Services

(2)

c1700-advipservicesk9-mz

32 MB

96 MB

Cisco 1751-V and 1760 - yes

RAM

Cisco 1701, 1751-V, and 1760

SP Services

(2)

c1700-spservicesk9-mz

32 MB

96 MB

Cisco 1701, 1751-V and 1760 - yes

RAM

Cisco 1701, 1751-V and 1760

Enterprise Services

(2)

c1700-entservicesk9-mz

32 MB

96 MB

Cisco 1701, 1711, 1712, 1751-V and 1760 - yes

RAM

Cisco 1701, 1711, 1712, 1751-V and 1760

Advanced Enterprise Services

(2)

c1700-adventerprisek9-mz

32 MB

96 MB

1751-V and1760 - yes

RAM

Cisco 1701, 1721, 1751, 1751-V and 1760

IP Base

(2)

c1700-ipbase-mz

16 MB

48 MB

Cisco 1701, 1721, 1751, 1751-V and 1760 - yes

RAM

Cisco 1701, 1721, 1751, 1751-V and 1760

Enterprise Base

(2)

c1700-entbase-mz

16 MB

64 MB

Cisco 1701, 1721, 1751, 1751-V and 1760 - yes

RAM

Cisco 1701, 1711, 1712, 1721, 1751, 1751-V and 1760

Advanced Security

(2)

c1700-advsecurityk9-mz

16 MB

64 MB

Cisco 1701, 1711, 1712, 1751-V and 1760 - yes

1721 and 1751 - no

RAM

1 Security Device Manager (SDM) is not supported on the Cisco 1710 Router.

1   2.) Please see the product bulletin "Cisco IOS Software Release 12.3 Mainline and 12.3T Feature Sets for Cisco 1700 Series Routers".


Hardware Supported

Cisco IOS Release 12.3(2)XA supports the following Cisco 1700 series router:

Cisco 1701 router

Cisco 1710 router

Cisco 1711 router

Cisco 1712 router

Cisco 1720 router

Cisco 1721 router

Cisco 1751 and 1751-V routers

Cisco 1760 router

The Cisco 1701, Cisco 1710, Cisco 1711, Cisco 1712, Cisco 1720, and Cisco 1721routers run data images only. The Cisco 1751, Cisco 1751-V, and Cisco 1760 routers run data or data-and-voice images, providing digital and analog voice support. The Cisco 1711 and Cisco 1712 routers run select IPSec Triple Data Encryption Standard (3DES) images only (the Cisco 1700 IOS IP/ADSL/IPX/AT/IBM/FW/IDS PLUS IPSEC 3DES, Cisco 1700 IOS IP/ADSL/FW/IDS PLUS IPSEC 3DES, Cisco 1700 Advanced Security, and Cisco 1700 Advanced Enterprise Services images).

For descriptions of existing hardware features and supported modules, see the hardware installation guides, configuration and command reference guides, and additional documents specific to the Cisco 1700 series routers, which are available on Cisco.com and the Documentation CD at the following location:

http://www.cisco.com/univercd/cc/td/doc/product/access/acs_mod/1700/index.htm 

This URL is subject to change without notice. If it changes, point your web browser to Cisco.com, and click the following path:

Cisco Product DocumentationAccess Servers and Access RoutersModular  Access RoutersCisco 1700 Series Routers<platform_name>

Determining the Software Version

To determine which version of Cisco IOS software is currently running on your Cisco 1700 series router, log in to the router and enter the show version EXEC command. The following sample output from the show version command indicates the version number.

router> show version
Cisco Internetwork Operating System Software
IOS (tm) C1700 Software (C1700-NY-MZ), Version 12.3(2)XA1, EARLY DEPLOYMENT RELEASE 
SOFTWARE (fc1)
Synched to technology version 12.3(1.6)T

Upgrading to a New Software Release

For general information about upgrading to a new software release, refer to the Software Installation and Upgrade Procedures located at http://www.cisco.com/warp/public/130/upgrade_index.shtml.

Feature Set Tables

The Cisco IOS software is packaged in feature sets consisting of software images, depending on the platform. Each feature set contains a specific set of Cisco IOS features. Release 12.3(2)XA supports the same feature sets as Releases 12.3 and 12.3(2)T, but Release 12.3(2)XA includes new features that are supported by the Cisco 1700 series routers.


Caution The Cisco IOS images with strong encryption (including, but not limited to, 168-bit [3DES] data encryption feature sets) are subject to United States government export controls and have limited distribution. Strong encryption images to be installed outside the United States will likely require an export license. Customer orders can be denied or subject to delay as a result of United States government regulations. When applicable, the purchaser/user must obtain local import and use authorizations for all encryption strengths. Please contact your sales representative or distributor for more information, or send an e-mail to export@cisco.com.

Table 3 to Table 17 list the features and feature sets supported in the Cisco IOS Release 12.3(2)XA.

The tables use the following conventions:

Yes—The feature is supported in the software image.

No—The feature is not supported in the software image.

In—The number in the "In" column indicates the Cisco IOS release in which the feature was introduced. For example, "12.3(2)XA" indicates that the feature was introduced in 12.3(2)XA. If a cell in this column is empty, the feature was included in a previous release or in the initial base release.


Note These feature set tables contain only a selected list of features, which are cumulative for Release 12.3(2)nn early deployment releases only (nn identifies each early deployment release). The tables do not list all features in each image—additional features are listed in Cross-Platform Release Notes for Cisco IOS Release 12.3(2)T and Release 12.3(2)T Cisco IOS documentation.


Table 3 Feature List by Cisco 1700 Legacy Feature Set for Cisco 1710 Routers 

Feature
In
Feature Set
IP/IPX/AT/
IBM/FW/IDS Plus IPSec 3DES
IP/FW/IDS Plus IPSec 3DES

Analog CAMA E911 Trunk

12.3(2)XA

No

No

VPN Access Control Using 802.1x Authentication

12.3(2)XA

Yes

Yes

NAT - Static IP Support

12.3(2)XA

Yes

Yes


Table 4 Feature List by Cisco 1700 Legacy Feature Set for Cisco 1751-V and 1760 Routers 

Feature
In
Feature Set
IP/ADSL/VOX Plus
IP/ADSL/VOX/
FW/IDS Plus IPSec 3DES
IP/ADSL/IPX/AT/IBM/VOX/FW/IDS Plus IPSec 3DES

Analog CAMA E911 Trunk

12.3(2)XA

Yes

Yes

Yes

VPN Access Control Using 802.1x Authentication

12.3(2)XA

No

Yes

Yes

NAT - Static IP Support

12.3(2)XA

No

Yes

Yes


Table 5 Feature List by Cisco 1700 Legacy Feature Set for Cisco 1721, 1751, 1751-V, and 1760 Routers 

Feature
In
Feature Set
IP/ADSL Plus

Analog CAMA E911 Trunk

12.3(2)XA

No

VPN Access Control Using 802.1x Authentication

12.3(2)XA

No

NAT - Static IP Support

12.3(2)XA

No


Table 6 Feature List by Cisco 1700 Legacy Feature Set for Cisco 1720, 1721, 1751, 1751-V, and 1760 Routers 

Feature
In
Feature Set
IP

Analog CAMA E911 Trunk

12.3(2)XA

No

VPN Access Control Using 802.1x Authentication

12.3(2)XA

No

NAT - Static IP Support

12.3(2)XA

No


Table 7 Feature List by Cisco 1700 Legacy Feature Set for Cisco 1701, 1721, 1751, 1751-V, and 1760 Routers 

Feature
In
Feature Set
IP/ADSL/IPX/AT/IBM Plus

Analog CAMA E911 Trunk

12.3(2)XA

No

VPN Access Control Using 802.1x Authentication

12.3(2)XA

No

NAT - Static IP Support

12.3(2)XA

No


Table 8 Feature List by Cisco 1700 Legacy Feature Set for Cisco 1701, 1711, 1712, 1751-V, and 1760 Routers 

Feature
In
Feature Set
IP/ADSL/IPX/
AT/IBM/FW/
IDS Plus IPSec 3DES

Analog CAMA E911 Trunk

12.3(2)XA

No

VPN Access Control Using 802.1x Authentication

12.3(2)XA

Yes

NAT - Static IP Support

12.3(2)XA

Yes


Table 9 Feature List by Cisco 1700 Legacy Feature Set for Cisco 1701, 1720, 1721, 1751, 1751-V, and 1760 Routers 

Feature
In
Feature Set
IP ADSL

Analog CAMA E911 Trunk

12.3(2)XA

No

VPN Access Control Using 802.1x Authentication

12.3(2)XA

No

NAT - Static IP Support

12.3(2)XA

No


Table 10 Feature List by Cisco 1700 Legacy Feature Set for Cisco 1701, 1711, 1712, 1721, 1751, 1751-V, and 1760 Routers 

Feature
In
Feature Set
IP/ADSL/FW/
IDS Plus IPSec 3DES

Analog CAMA E911 Trunk

12.3(2)XA

No

VPN Access Control Using 802.1x Authentication

12.3(2)XA

Yes

NAT - Static IP Support

12.3(2)XA

Yes


Table 11 Feature List by Cross-Platform Feature Set for Cisco 1751-V and 1760 Routers 

Feature
In
Feature Set
IP Voice

Analog CAMA E911 Trunk

12.3(2)XA

Yes

VPN Access Control Using 802.1x Authentication

12.3(2)XA

No

NAT - Static IP Support

12.3(2)XA

No


Table 12 Feature List by Cross-Platform Feature Set for Cisco 1701, 1751-V, and 1760 Routers 

Feature
In
Feature Set
Advanced IP Services

Analog CAMA E911 Trunk

12.3(2)XA

Yes1

VPN Access Control Using 802.1x Authentication

12.3(2)XA

Yes

NAT - Static IP Support

12.3(2)XA

Yes

1 The Cisco 1701 routers do not support the Analog CAMA E911 Trunk feature.


Table 13 Feature List by Cross-Platform Feature Set for Cisco 1701, 1711, 1712, 1751-V, and 1760 Routers 

Feature
In
Feature Set
Advanced Enterprise Services

Analog CAMA E911 Trunk

12.3(2)XA

Yes1

VPN Access Control Using 802.1x Authentication

12.3(2)XA

Yes

NAT - Static IP Support

12.3(2)XA

Yes

1 The Cisco 1701, 1711, and 1712 routers do not support the Analog CAMA E911 Trunk feature.


Table 14 Feature List by Cross-Platform Feature Set for Cisco 1701, 1751-V, and 1760 Routers 

Feature
In
Feature Set
SP Services

Analog CAMA E911 Trunk

12.3(2)XA

Yes

VPN Access Control Using 802.1x Authentication

12.3(2)XA

No

NAT - Static IP Support

12.3(2)XA

Yes


Table 15 Feature List by Cross-Platform Feature Set for Cisco 1701, 1721, 1751, 1751-V, and 1760 Routers 

Feature
In
Feature Set
IP Base
Enterprise Base

Analog CAMA E911 Trunk

12.3(2)XA

No

No

VPN Access Control Using 802.1x Authentication

12.3(2)XA

Yes

No

NAT - Static IP Support

12.3(2)XA

No

No


Table 16 Feature List by Cross-Platform Feature Set for Cisco 1701, 1751-V, and 1760 Routers 

Feature
In
Feature Set
Enterprise Services

Analog CAMA E911 Trunk

12.3(2)XA

Yes

VPN Access Control Using 802.1x Authentication

12.3(2)XA

No

NAT - Static IP Support

12.3(2)XA

Yes


Table 17 Feature List by Cross-Platform Feature Set for Cisco 1701, 1711, 1712, 1721, 1751, 1751-V, and 1760 Routers 

Feature
In
Feature Set
Advanced Security

Analog CAMA E911 Trunk

12.3(2)XA

No

VPN Access Control Using 802.1x Authentication

12.3(2)XA

Yes

NAT - Static IP Support

12.3(2)XA

Yes


New and Changed Information

The following sections list the new software features supported by the Cisco 1700 series routers for Release 12.3(2)XA.

New Software Features in Release 12.3(2)XA

The following sections describe the new software features supported by the Cisco 1700 series routers for Release 12.3(2)XA.

Analog CAMA E911 Trunk

The Cisco 1751 and 1760 routers now support Analog Centralized Automatic Message Accounting (CAMA) trunks on the two- and four-port Foreign Exchange Office (FXO) cards. The VIC2-2FXO and VIC2-4FXO cards are now user configurable for CAMA mode operation on a port-by-port basis. For example, on the VIC2-2FXO card, the Port 0 can be configured for CAMA and port 1 can be configured for FXO-M1 operation.

The CAMA feature offers the following benefits:

Direct connection to the E911 network

Meets current legislation requiring enterprises to connect directly to the E911 network

Trunk capabilities to emergency services that are not currently supported on any Cisco product

Configuration on H.323 Voice over IP (VoIP)

For more details, refer to the following URL:

http://www.cisco.com/univercd/cc/td/doc/product/software/ios122/122newft/122t/122t11/acam_911.htm

VPN Access Control Using 802.1x Authentication

The 802.1x authentication feature is an Institute of Electrical and Electronics Engineers (IEEE) standards-based authentication technology. This feature enhances the Cisco IOS technology by supporting 802.1x authentication. It allows classification of users into authenticated and non-authenticated categories, based on the user credentials provided using the 802.1x port-based authentication specification. This feature also allows separate processing of traffic coming from authenticated users and non-authenticated users. Authenticated users are allowed to access a corporate IPSec tunnel. Unauthenticated or guest users are allowed to access local interconnections as well as connectivity to the Internet, but not a corporate IPSec tunnel.

In Cisco IOS Release 12.3(2)XA, the 802.1x user authentication support will be used in conjunction with Easy VPN Server and Easy VPN Remote (also called Easy VPN Client [EZVPN Client]).

For details on Cisco Easy VPN, refer to the following URL:

http://www.cisco.com/en/US/partner/products/sw/secursw/ps5299/index.html

How to enable 802.1x authentication on PCs running Microsoft Windows 2000/XP


Step 1 Make sure that the Microsoft Windows Service Pack 3 or later is installed in the PC.

Step 2 Refer to the following URL to download and install 802.1x client on Microsoft Windows 2000 PC. http://www.microsoft.com/windows2000/server/evaluation/news/bulletins/8021xclient.asp

If the link is not active, refer to the following URL to search for Microsoft Knowledge Base Article - 313664:

http://www.microsoft.com/windows2000/downloads/recommended/q313664/default.asp

Step 3 Follow the instructions, and install the 802.1x authentication client.

Step 4 Reboot the PC after installing the 802.1x authentication client.


An alternative to Microsoft's 802.1x authentication client, AEGIS 802.1x software for Microsoft Windows, can be found at the following URL:

http://www.mtghouse.com

NAT - Static IP Support

Public WAN networks use dynamic IP address allocation, and expect their users to be able to be provided an IP Address dynamically using Dynamic Host Configuration Protocol (DHCP).

When a customer's IP address is statically configured, the users cannot connect to the Internet and/or their corporation's Virtual Private Network (VPN).

With the static IP enhancement, users whose IP address is statically configured will be provided an IP address dynamically and will be able to establish an IP session (with the Internet or other destination networks).

The Cisco IOS Network Address Translation (NAT) feature will detect the fact that the user is statically configured and will provide the user with a working IP address within the public WAN network allowing the user to establish an IP session.

Support for user configurable CAMA operation is on a port-by-port basis.

New Software Features in Release 12.3(2)T

For information regarding the features supported in the Cisco IOS Release 12.3(2)T, refer to the Cross-Platform Release Notes and New Feature Documentation links at the following location on Cisco.com:

http://www.cisco.com/univercd/cc/td/doc/product/software/ios123/123relnt/xprn123/index.htm 

This URL is subject to change without notice. If it changes, point your web browser to Cisco.com, and click the following path:

Service & Support: Technical Documents: Cisco IOS Software: Release 12.3: Release Notes:  Cross-Platform Release Notes (Cisco IOS Release 12.3(2)T) 

Limitations

The following sections describe limitations concerning the new hardware and software features supported by the Cisco 1700 series routers for Release 12.3(2)XA.

Analog CAMA E911 Trunk

Use of the CAMA mode of operation on the VIC2-2FXO and VIC2-4FXO has the following restrictions:

Configuration in Media Gateway Control Protocol (MCGP) is not supported.

VIC-2FXO and VIC2-4FXO under Cisco Call Manager MGCP control are currently not supported. The CAMA port must be configured as an H.323 endpoint.

Direct trunking is not supported.

Current implementation does not support ringback and callback functionality.

Reverse Automatic Location Information (ALI) lookup is not supported.

Neither alternate routing for busy traffic nor night service for power failure is supported.

Number expansion is not supported.

ALI/Data Management Systems (DMS) Reverse ALI lookup features of E911 are not supported.

Called Party Control is not supported in the Cisco IOS for CAMA trunks. Calls to emergency numbers will be disconnected when the caller hangs up.

In a CAMA network, when a caller calls an emergency number (such as 911), the call should not be disconnected even when the caller hangs up. Once established, the call should be entirely under control of the emergency service provider (this feature is Called Party Control).

The station number of the CAMA port can not be used as the calling number. Only the originating port number can be used.

VPN Access Control Using 802.1x Authentication

The 802.1x authentication for VLAN interface is not supported in this release and switches (even for switches with native 802.1x authentication support) are not supported in this release.

Caveats

Caveats describe unexpected behavior or defects in the Cisco IOS software releases. Severity 1 caveats are the most serious caveats, severity 2 caveats are less serious, and severity 3 caveats are the least serious of these three severity levels.

Caveats in Cisco IOS Release 12.3(2)T are also in Release 12.3(2)XA. For information on caveats in Cisco IOS Release 12.3(2)T, refer to the Caveats for Cisco IOS Release 12.3(2)T document. This document lists severity 1 and 2 caveats; the documents are located on Cisco.com and the Documentation CD.


Note If you have an account with Cisco.com, you can also use the Bug Toolkit to find select caveats of any severity. To reach the Bug Toolkit, log in to Cisco.com and click Service & Support: Technical Assistance Center: Tool Index: Bug Toolkit. Another option is to go to http://www.cisco.com/pcgi-bin/Support/Bugtool/launch_bugtool.pl


Resolved Caveats - Cisco IOS Release 12.3(2)XA7

There are no resolved caveats for Cisco IOS Release 12.3(2)XA7.

Open Caveats - Cisco IOS Release 12.3(2)XA7

There are no open caveats for Cisco IOS Release (2)XA7.

Resolved Caveats for Release 12.3(2)XA

This section list the resolved caveats for Cisco IOS Release Release 12.3(2)XA.

CSCea24089

Symptom

The serial communication controller in an asymmetric digital subscriber line (ADSL)-ATM interface that is installed in an NM-FE2W or NM-2W network module may lock up in the receiving path and not recover. This symptom is observed when the ADSL-ATM interface is stressed to 10 Mbps downstream.

Workaround

Enter the shutdown interface configuration command followed by the no shutdown interface configuration command on the affected interface.

CSCeb10842

Symptom

When configuring cns config ... and then receiving a configuration that has an XML error in it, a SYS-2-FREEBAD traceback will be generated.

Workaround

The traceback can be ignored as it does not affect the operation of the router.

CSCeb44999

Symptom

If cns config notify is configured and then a configuration command containing control characters is entered, the entered control characters may not be formatted in an escape sequence.

Workaround

None.

CSCeb45670

Symptom

If CNS config partial, initial, or retrieve is configured, and a banner command larger than 256 characters is applied, the entire banner may not be applied.

Workaround

None.

CSCeb68733

Symptom

Cisco routers and switches running Cisco IOS software and configured to process Internet Protocol version 4 (IPv4) packets are vulnerable to a Denial of Service (DoS) attack. A rare sequence of crafted IPv4 packets sent directly to the device may cause the input interface to stop processing traffic once the input queue is full. No authentication is required to process the inbound packet. Processing of IPv4 packets is enabled by default. Devices running only IP version 6 (IPv6) are not affected.

CSCeb74702

Symptom

When PPPoA is configured on any of the xDSL interfaces in a Cisco 1700, the router might reload, when the outbound traffic rate is more than the configured PVC traffic shaping rate.

Workaround

None.

CSCeb77509

Symptom

The router may hang when the pri-group timeslot 1-24 service mgcp controller interface command is entered on an unconfigured router.

Workaround

Configure the router and load the configuration file before entering thepri-group timeslot 1-24 service mgcp controller interface command.

CSCeb83747

Symptom

A pointer to an internal master DES key is not cleared before the memory is returned to the heap.

Workaround

None.

CSCeb84031

Symptom

The default format of the MAC address sent in a DHCP Accounting packet (to SSG) is in "non-dotted" notation.

Workaround

None.

CSCeb87159

Symptom

When the CNS event agent service is configured by the cns event configuration command with the keepalive option, The CNS event agent does not detect when the connection to the server breaks.

Workaround

None.

CSCec02611

Symptom

Not all password encryption keys needs are zeroed out from their memory location when they are removed.

Workaround

None.

CSCec02631

Symptom

The private configuration key configured using the command key config-key 1 <xxx> cannot be removed using the no form of the command no key config-key 1 <xxx>

Workaround

None.

CSCec08995

Symptom

A 1700 router may reload or record spurious memory access when IRB (Integrated Routing and Bridging) is enabled.

Workaround

None.

CSCec14126

Symptom

Checksumming of text-segment is disabled since the Text-segment region is set as READ-ONLY.

Workaround

None.

Open Caveats for Release 12.3(2)XA

The following sections list the open caveats for the Cisco IOS Release 12.3(2)XA.

CSCea90721

Symptom

The router might not be able to access Internet when Unicast Reverse Path Forwarding (uRPF) is enabled.

Workaround

Remove the ip verify unicast source reachable-via rx 100 command from the interface configuration.

CSCea93774

Symptom

When AutoSecure Context-Based Access Control (CBAC) is enabled with Basic Rate Interface (BRI), the outbound traffic doesn't go through.

Workaround

After configuring AutoSecure CBAC, enter the shutdown command followed by the no shutdown command on the BRI.

CSCeb19169

Symptom

The CAMA port fails to transmit its caller ID.

Workaround

None.

CSCeb56827

Symptom

The rebooting of Easy VPN Client router with VPN mod enable command will stop encryption.

A Cisco 83x router configured as an Easy VPN Client by using the VPN mod enable command will not encrypt any packets after the router is rebooted. A VPN tunnel will be established, but there will be no encryption.

Workaround

The disable VPN card or remove and reapply the crypto map from the interface. Use Advanced Encryption Standard (AES) in software or Triple Data Encryption Standard (3DES) on hardware, and do not change intermittently.

CSCeb44319

Symptom

Traceback occurs after the 802.1x authentication succeeds.

CSCeb45476

Symptom

The easy VPN tunnel fails to come up after rebooting the router.

Workaround

After rebooting, remove the Easy VPN client configuration from the interface, and configure the tunnel again.

CSCeb46738

Symptom

Easy VPN tunnel stays up with wrong password.

Workaround

Try again after ISAKMP SA table is flushed. The tunnel should not come up.

CSCeb55390

Symptom

Easy VPN crashes during xauth prompting process.

Workaround

Use the "save-password" option instead of entering the username and the password on the command-line interface (CLI).

CSCeb56827

Symptom

Packets will not be encrypted when a Cisco 1721 router with VPN mode enabled is configured as the Easy VPN Client and then rebooted. The VPN tunnel will get established, but there will be no encryption.

Workaround

Disable the VPN card or remove and reapply the crypto map to the interface.

CSCeb57896

Symptom

When the hardware crypto is enabled on an IP compression-supported image, the IPSec Transform sets are out of order and the tunnel might not come up with the correct transform sets.

Workaround

Disable the hardware crypto and reboot the router.

CSCeb66294

Symptom

The Microsoft Windows XP client always binds to the Ethernet interface of the router.

Workaround

None.

CSCea90721

Symptom

Cannot access Internet when Unicast Reverse Path Forwarding (uRPF) is enabled.

Workaround

Remove ip verify unicast source reachable-via rx 100 configuration from interface.

CSCea93774

Symptom

Telnet from inside to outside fails for BRI.

Workaround

Configure shutdown and no shutdown commands on the BRI after configuring AutoSecure Context-based Access Control (CBAC).

CSCin52562

Symptom

The Router might crash when the same crypto map that is defined on the server for one client is then defined for another. The crash occurs only after entering clear commands.

Workaround

Configure more than one network address translation (NAT) pool address in the Easy VPN server.

Resolved Caveats for Cisco IOS Release 12.3(2)XA

This section list the resolved caveats for Cisco IOS Release 12.3(2)XA.

CSCeb24587

Symptom

When running an IPSec script, the router might crash.

Workaround

None.

CSCeb40987

Symptom

When the router is configured for the Easy VPN client and tries to establish a tunnel with the remote end, frequent crypto debugs might appear on the router. This happens only with hardware crypto enable.

Workaround

None.

CSCeb44319

Symptom

A Trace back might occur after the 802.1x authentication succeeds.

Workaround

None.

CSCeb45476

Symptom

After the router is rebooted, the aggressive mode key exchange might fail on the router.

Workaround

None.

CSCeb53094

Symptom

Spurious memory access might occur in the Easy VPN client when the group name and the key is removed.

Workaround

None.

CSCeb63813

Symptom

When using Easy VPN, the crypto socket connections might not properly refresh.

Workaround

None.

CSCeb66294

Symptom

Upon an authentication failure, the Windows XP client is always bound to Ethernet interface.

Workaround

None.

CSCea72489

Symptom

The show auto secure configuration command might say there is no snmp-server when SNMP is being used to manage the router.

Workaround

None.

Related Documentation

The following sections describe the documentation available for the Cisco 1700 series routers. Typically, these documents consist of hardware and software installation guides, Cisco IOS configuration and command references, system error messages, feature modules, and other documents. Documentation is available as printed manuals or electronic documents, except for feature modules, which are available online on Cisco.com and the Documentation CD.

Use these release notes with the documents listed in the following sections:

Release-Specific Documents

Platform-Specific Documents

Release-Specific Documents

The following documents are specific to Release 12.3 and apply to Release 12.3(2)XA. They are located on Cisco.com and the Documentation CD (under the heading Service & Support):

To reach the Cross-Platform Release Notes for Cisco IOS Release 12.3(2)T, click this path:

Technical Documents: Cisco IOS Software: Release 12.3: Release Notes: Cisco IOS  Release 12.3(2)T 

To reach product bulletins, field notices, and other release-specific documents, click this path:

Technical Documents: Product Bulletins 

To reach the Caveats for Cisco IOS Release 12.3 and Caveats for Cisco IOS Release 12.3(2)T documents, which contain caveats applicable to all platforms for all maintenance releases of Release 12.3, click this path:

Technical Documents: Cisco IOS Software: Release 12.3: Caveats 


Note If you have an account with Cisco.com, you can also use the Bug Toolkit to find selected caveats of any severity. To reach the Bug Toolkit, log in to Cisco.com, and click Service & Support: Technical Assistance Center: Tool Index: Bug Toolkit. Another option is to go to http://www.cisco.com/pcgi-bin/Support/Bugtool/launch_bugtool.pl


Platform-Specific Documents

Hardware installation guides, configuration and command reference guides, and additional documents specific to the Cisco 1700 series routers are available on Cisco.com and the Documentation CD at the following location:

http://www.cisco.com/univercd/cc/td/doc/product/access/acs_mod/1700/index.htm 

This URL is subject to change without notice. If it changes, point your web browser to Cisco.com, and click the following path:

Cisco Product Documentation: Access Servers and Access Routers: Modular Access RoutersCisco 1700 Series Routers: <platform_name>

Obtaining Documentation

These sections explain how to obtain documentation from Cisco Systems.

World Wide Web

You can access the most current Cisco documentation on the World Wide Web at this URL:

http://www.cisco.com

Translated documentation is available at this URL:

http://www.cisco.com/public/countries_languages.shtml

Documentation CD-ROM

Cisco documentation and additional literature are available in a Cisco Documentation CD-ROM package, which is shipped with your product. The Documentation CD-ROM is updated monthly and may be more current than printed documentation. The CD-ROM package is available as a single unit or through an annual subscription.

Ordering Documentation

You can order Cisco documentation in these ways:

Registered Cisco.com users (Cisco direct customers) can order Cisco product documentation from the Networking Products MarketPlace:

http://www.cisco.com/public/ordsum.html

Registered Cisco.com users can order the Documentation CD-ROM through the online Subscription Store:

http://www.cisco.com/go/subscription

Nonregistered Cisco.com users can order documentation through a local account representative by calling Cisco Systems Corporate Headquarters (California, U.S.A.) at 408 526-7208 or, elsewhere in North America, by calling 800 553-NETS (6387).

Documentation Feedback

You can submit comments electronically on Cisco.com. In the Cisco Documentation home page, click the Fax or Email option in the "Leave Feedback" section at the bottom of the page.

You can e-mail your comments to bug-doc@cisco.com.

You can submit your comments by mail by using the response card behind the front cover of your document or by writing to the following address:

Cisco Systems
Attn: Document Resource Connection
170 West Tasman Drive
San Jose, CA 95134-9883

We appreciate your comments.

Obtaining Technical Assistance

Cisco provides Cisco.com as a starting point for all technical assistance. Customers and partners can obtain online documentation, troubleshooting tips, and sample configurations from online tools by using the Cisco Technical Assistance Center (TAC) Web Site. Cisco.com registered users have complete access to the technical support resources on the Cisco TAC Web Site.

Cisco.com

Cisco.com is the foundation of a suite of interactive, networked services that provides immediate, open access to Cisco information, networking solutions, services, programs, and resources at any time, from anywhere in the world.

Cisco.com is a highly integrated Internet application and a powerful, easy-to-use tool that provides a broad range of features and services to help you with these tasks:

Streamline business processes and improve productivity

Resolve technical issues with online support

Download and test software packages

Order Cisco learning materials and merchandise

Register for online skill assessment, training, and certification programs

If you want to obtain customized information and service, you can self-register on Cisco.com. To access Cisco.com, go to this URL:

http://www.cisco.com

Technical Assistance Center

The Cisco Technical Assistance Center (TAC) is available to all customers who need technical assistance with a Cisco product, technology, or solution. Two levels of support are available: the Cisco TAC Web Site and the Cisco TAC Escalation Center.

Cisco TAC inquiries are categorized according to the urgency of the issue:

Priority level 4 (P4)—You need information or assistance concerning Cisco product capabilities, product installation, or basic product configuration.

Priority level 3 (P3)—Your network performance is degraded. Network functionality is noticeably impaired, but most business operations continue.

Priority level 2 (P2)—Your production network is severely degraded, affecting significant aspects of business operations. No workaround is available.

Priority level 1 (P1)—Your production network is down, and a critical impact to business operations will occur if service is not restored quickly. No workaround is available.

The Cisco TAC resource that you choose is based on the priority of the problem and the conditions of service contracts, when applicable.

Cisco TAC Web Site

You can use the Cisco TAC Web Site to resolve P3 and P4 issues yourself, saving both cost and time. The site provides around-the-clock access to online tools, knowledge bases, and software. To access the Cisco TAC Web Site, go to this URL:

http://www.cisco.com/tac

All customers, partners, and resellers who have a valid Cisco service contract have complete access to the technical support resources on the Cisco TAC Web Site. The Cisco TAC Web Site requires a Cisco.com login ID and password. If you have a valid service contract but do not have a login ID or password, go to this URL to register:

http://www.cisco.com/register/

If you are a Cisco.com registered user, and you cannot resolve your technical issues by using the Cisco TAC Web Site, you can open a case online by using the TAC Case Open tool at this URL:

http://www.cisco.com/tac/caseopen

If you have Internet access, we recommend that you open P3 and P4 cases through the Cisco TAC Web Site.

Cisco TAC Escalation Center

The Cisco TAC Escalation Center addresses priority level 1 or priority level 2 issues. These classifications are assigned when severe network degradation significantly impacts business operations. When you contact the TAC Escalation Center with a P1 or P2 problem, a Cisco TAC engineer automatically opens a case.

To obtain a directory of toll-free Cisco TAC telephone numbers for your country, go to this URL:

http://www.cisco.com/warp/public/687/Directory/DirTAC.shtml

Before calling, please check with your network operations center to determine the level of Cisco support services to which your company is entitled: for example, SMARTnet, SMARTnet Onsite, or Network Supported Accounts (NSA). When you call the center, please have available your service agreement number and your product serial number.

Obtaining Additional Publications and Information

Information about Cisco products, technologies, and network solutions is available from various online and printed sources.

The Cisco Product Catalog describes the networking products offered by Cisco Systems, as well as ordering and customer support services. Access the Cisco Product Catalog at this URL:

http://www.cisco.com/en/US/products/products_catalog_links_launch.html

Cisco Press publishes a wide range of networking publications. Cisco suggests these titles for new and experienced users: Internetworking Terms and Acronyms Dictionary, Internetworking Technology Handbook, Internetworking Troubleshooting Guide, and the Internetworking Design Guide. For current Cisco Press titles and other information, go to Cisco Press online at this URL:

http://www.ciscopress.com

Packet magazine is the Cisco quarterly publication that provides the latest networking trends, technology breakthroughs, and Cisco products and solutions to help industry professionals get the most from their networking investment. Included are networking deployment and troubleshooting tips, configuration examples, customer case studies, tutorials and training, certification information, and links to numerous in-depth online resources. You can access Packet magazine at this URL:

http://www.cisco.com/go/packet

iQ Magazine is the Cisco bimonthly publication that delivers the latest information about Internet business strategies for executives. You can access iQ Magazine at this URL:

http://www.cisco.com/go/iqmagazine

Internet Protocol Journal is a quarterly journal published by Cisco Systems for engineering professionals involved in designing, developing, and operating public and private Internets and Intranets. You can access the Internet Protocol Journal at this URL:

http://www.cisco.com/en/US/about/ac123/ac147/about_cisco_the_internet_protocol_journal.html

Training—Cisco offers world-class networking training. Current offerings in network training are listed at this URL:

http://www.cisco.com/en/US/learning/le31/learning_recommended_training_list.html