Table Of Contents
Release Notes for Cisco 7000 Family for Cisco IOS Release 12.2 DX
Determining the Software Version
Upgrading to a New Software Release
New Hardware Features in Cisco IOS Release 12.2(2)DX3
New Software Features in Cisco IOS Release 12.2(2)DX3
New Hardware Features in Cisco IOS Release 12.2(2)DX2
New Software Features in Cisco IOS Release 12.2(2)DX2
New Hardware Features in Cisco IOS Release 12.2(2)DX1
New Software Features in Cisco IOS Release 12.2(2)DX1
New Hardware Features in Cisco IOS Release 12.2(1)DX1
New Software Features in Cisco IOS Release 12.2(1)DX1
New Hardware Features in Cisco IOS Release 12.2(1)DX
New Software Features in Cisco IOS Release 12.2(1)DX
Quality of Service Features for Parallel Express Forwarding (PXF)
Virtual Private Dial-up Network Extended Fail-over Conditions
Deprecated and Replacement MIBs
Open Caveats—Cisco IOS Release 12.2(2)DX3
Resolved Caveats—Cisco IOS Release 12.2(2)DX3
Open Caveats—Cisco IOS Release 12.2(2)DX2
Resolved Caveats—Cisco IOS Release 12.2(2)DX2
Open Caveats—Cisco IOS Release 12.2(2)DX1
Resolved Caveats—Cisco IOS Release 12.2(2)DX1
Open Caveats—Cisco IOS Release 12.2(1)DX1
Resolved Caveats—Cisco IOS Release 12.2(1)DX1
Cisco IOS Software Documentation Set
Cisco IOS Release 12.2 Documentation Set Contents
Obtaining Technical Assistance
Contacting TAC by Using the Cisco TAC Website
Release Notes for Cisco 7000 Family for Cisco IOS Release 12.2 DX
January 20, 2003
Cisco IOS Release 12.2(2)DX3
OL-2930-03
These release notes for the Cisco 7000 family describe the enhancements provided in Cisco IOS Release 12.2(2)DX3. These release notes are updated as needed.
For a list of the software caveats that apply to Cisco IOS Release 12.2(2)DX3, see the "Caveats" section and Caveats for Cisco IOS Release 12.2. The caveats document is updated for every maintenance release and is located on Cisco.com and the Documentation CD-ROM.
Use these release notes with Cross-Platform Release Notes for Cisco IOS Release 12.2 located on Cisco.com and the Documentation CD-ROM.
Contents
These release notes contain the following sections:
•MIBs
•Obtaining Technical Assistance
Early Deployment Releases
These release notes describe the Cisco 7000 family for Cisco IOS Release 12.2(2)DX3, which is an early deployment (ED) release based on Cisco IOS Release 12.2 T. Early deployment releases contain fixes for software caveats and support for new Cisco hardware and software features. Table 1 shows recent early deployment releases for the Cisco 7000 family.
Table 1 Early Deployment Releases for the Cisco IOS Release 12.2 DX
ED Release Maintenance Release Additional Software Features Additional Hardware Features AvailabilityCisco IOS Release 12.2 DX
(2)DX3
Cisco IOS Release 12.2(2)DX3 contains no additional software or hardware features.
Cisco IOS Release 12.2(2)DX3 includes caveat fixes only. For more information, see the "Caveats" section
01/20/2003
Cisco IOS Release 12.2 DX
(2)DX2
Cisco IOS Release 12.2(2)DX2 contains no additional software or hardware features.
Cisco IOS Release 12.2(2)DX2 includes caveat fixes only. For more information, see the "Caveats" section
10/13/2002
Cisco IOS Release 12.2 DX
(2)DX1
Cisco IOS Release 12.2(2)DX1 contains no additional software or hardware features.
Cisco IOS Release 12.2(2)DX1 includes caveat fixes only. For more information, see the "Caveats" section
07/01/2002
Cisco IOS Release 12.2 DX
(1)DX1
Cisco IOS Release 12.2(1)DX1 contains no additional software or hardware features.
Cisco IOS Release 12.2(1)DX1 includes caveat fixes only. For more information, see the "Caveats" section
02/14/2002
Cisco IOS Release 12.2 DX
(1)
Per VRF AAA
PPPoE over Gigabit Ethernet
PPPoE Session Limit
Quality of Service Features for Parallel Express Forwarding (PXF)
RADIUS Attribute Screening
Virtual Private Dial-up Network Extended Fail-over Conditions
VPDN Group Session Limiting
7401ASR
PA-2FE
06/4/2001
System Requirements
This section describes the system requirements for Cisco IOS Release 12.2 DX and includes the following sections:
•Determining the Software Version
•Upgrading to a New Software Release
Memory Recommendations
Supported Hardware
Cisco IOS Release 12.2(2)DX3 supports the following Cisco 7000 family platforms:
•Cisco 7200 series routers (including the Cisco 7202, Cisco 7204, and Cisco 7206)
•Cisco 7200 VXR routers (including the Cisco 7204VXR and Cisco 7206VXR)
•Cisco 7400 series routers (including the Cisco 7401)
For detailed descriptions of the new hardware features, see the "New and Changed Information" section.
Determining the Software Version
To determine the version of Cisco IOS software running on your Cisco 7000 family router, log in to the Cisco 7000 family router and enter the show version EXEC command. The following sample show version command output is from a router running a Cisco 7200 series software image with Cisco IOS Release 12.2(2)DX3:
Router> show versionCisco Internetwork Operating System SoftwareIOS (tm) 12.2 DX Software (c7200-js-mz), Version 12.2(2)DX3, RELEASE SOFTWAREUpgrading to a New Software Release
For general information about upgrading to a new software release, refer to Software Installation and Upgrade Procedures located at the following URL:
http://www.cisco.com/warp/public/130/upgrade_index.shtml
Feature Set Tables
The Cisco IOS software is packaged in feature sets consisting of software images—depending on the platform. Each feature set contains a specific set of Cisco IOS features.
Cisco IOS Release 12.2(2)DX3 supports the same feature sets as Cisco IOS Release 12.2, but Cisco IOS Release 12.2(2)DX3 can include new features supported by the Cisco 7000 family.
All Cisco 7200 platform supported features in Cisco IOS Release 12.2(2)DX3 support the 7200 Enterprise Feature Set of images.
All Cisco 7400 platform supported features in Cisco IOS Release 12.2(2)DX3 support the 7400 Enterprise Feature Set of images.
Caution Cisco IOS images with strong encryption (including, but not limited to, 168-bit Triple Data Encryption Standard [3DES] data encryption feature sets) are subject to United States government export controls and have limited distribution. Strong encryption images to be installed outside the United States are likely to require an export license. Customer orders may be denied or subject to delay because of United States government regulations. When applicable, purchaser and user must obtain local import and use authorizations for all encryption strengths. Please contact your sales representative or distributor for more information, or send an e-mail to export@cisco.com.
New and Changed Information
The following sections list the new hardware and software features supported by the Cisco 7000 family for Cisco IOS Release 12.2 DX.
New Hardware Features in Cisco IOS Release 12.2(2)DX3
There are no new hardware features supported in Cisco IOS Release 12.2(2)DX3.
New Software Features in Cisco IOS Release 12.2(2)DX3
There are no new software features supported in Cisco IOS Release 12.2(2)DX3.
New Hardware Features in Cisco IOS Release 12.2(2)DX2
There are no new hardware features supported in Cisco IOS Release 12.2(2)DX2.
New Software Features in Cisco IOS Release 12.2(2)DX2
There are no new software features supported in Cisco IOS Release 12.2(2)DX2.
New Hardware Features in Cisco IOS Release 12.2(2)DX1
There are no new hardware features supported in Cisco IOS Release 12.2(2)DX1.
New Software Features in Cisco IOS Release 12.2(2)DX1
There are no new software features supported in Cisco IOS Release 12.2(2)DX1.
New Hardware Features in Cisco IOS Release 12.2(1)DX1
There are no new hardware features supported in Cisco IOS Release 12.2(1)DX1.
New Software Features in Cisco IOS Release 12.2(1)DX1
There are no new software features supported in Cisco IOS Release 12.2(1)DX1.
New Hardware Features in Cisco IOS Release 12.2(1)DX
The following new hardware features are supported by the Cisco 7000 family for Cisco IOS Release 12.2(1)DX:
7401ASR Router
Platforms: 7400 series routers
The Cisco 7401ASR router provides application-specific features for broadband subscriber aggregation and network application services with high processing performance.
The Cisco 7401ASR router supports the following features:
•Online insertion and removal (OIR)—Allows you to add, replace, or remove port adapters without interrupting the system.
•Environmental monitoring and reporting functions—Allow you to maintain normal system operation by resolving adverse environmental conditions prior to loss of operation.
•Downloadable software—Allows you to load new images into Flash memory remotely, without having to physically access the router, for fast, reliable upgrades.
•Small form-factor—One rack-unit (RU) high with stacking capability: 1.72 in. x 17.3 in. x 11.80 in. (4.27 cm x 43.9 cm x 30 cm). The weight is approximately 10.5 lbs (4.76 kg).
•Front-to-back airflow—Allows you to mount the router from either front or back into telco or 19- inch racks and 21-23-inch four-post racks.
The Cisco 7401ASR router supports:
•Two native Ethernet interfaces—Each interface has two physical ports, a Gigabit Ethernet (1000 Mbps) port that uses a Gigabit Interface Converter (GBIC) and a Fast Ethernet/Ethernet port (10/100 Mbps) with an RJ-45 connector. Any two of the four ports are available at any one time.
•Both 25-MHz and 50-MHz port adapter operation.
•A 64- or 128-MB compact Flash disk.
•A single power supply that is available in four options: AC, single -24V DC, single -48V DC, and dual -48V DC.
PA-2FE
Platforms: Cisco 7200 series and Cisco 7500 series routers
The PA-2FE port adapter provides two 10/100-Mbps, 10/100BASET Fast Ethernet/Inter-Switch Link (ISL) interfaces and supports both full-duplex and half-duplex operation. The PA-2FE comes in two models, the PA-2FE-TX and the PA-2FE-FX.
Each Fast Ethernet port on the PA-2FE-TX has an RJ-45 connector to attach to Category 5 unshielded twisted-pair (UTP) cable for 100BASETX. Each Fast Ethernet port on the PA-2FE-FX has an SC-type fiber-optic connector for 100BASEFX.
New Software Features in Cisco IOS Release 12.2(1)DX
The following new software features are supported by the Cisco 7000 family for Cisco IOS Release 12.2(1)DX:
Per VRF AAA
Platforms: Cisco 7200 and Cisco 7400 series routers
Using the Per VRF AAA feature, Internet Service Providers (ISPs) can partition authentication, authorization, and accounting (AAA) services based on Virtual Route Forwarding (VRF). This permits the Virtual Home Gateway (VHG) to communicate directly with the customer RADIUS server associated with the customer VPN, without having to go through a RADIUS proxy. Thus, ISPs can scale their VPN offerings more efficiently because they no longer need to proxy AAA to provide their customers the flexibility demanded.
To support Per VRF AAA, AAA must be VRF aware. ISPs must be able to define multiple instances of the same operational parameters—such as AAA server groups, method lists, system accounting, and protocol-specific parameters—and secure the parameters to the VRF partitions.
If an AAA configuration, such as a method list, is uniquely defined many times across the network access server (NAS), the specification of the AAA server, which is based on IP addresses and port numbers, may create an overlapping of private addresses between VRFs. Securing AAA method lists to a VRF can be accomplished from one or more of the following sources:
•Virtual Template—Used as a generic interface configuration.
•Service Provider AAA server—Used to associate a remote user with a specific VPN based on the domain name or Dialed Number Identification Service (DNIS). The server then provides the VPN-specific configuration for the virtual access interface, which includes the IP address and port number of the customer AAA server.
•Customer VPN AAA server—Used to authenticate the remote user and to provide user-specific configurations for the virtual access interface.
Global AAA accounting configurations and some AAA protocol-specific parameters cannot be logically grouped under the Virtual Template configuration.
PPPoE over Gigabit Ethernet
Platforms: Cisco 7200 series routers
The PPPoE over Gigabit Ethernet feature enhances PPP over Ethernet (PPPoE) functionality by adding support for PPPoE and PPPoE over IEEE 802.1Q VLANs on Gigabit Ethernet interfaces. The PPPoE over Gigabit Ethernet feature is supported on Cisco 7200 series routers with Gigabit Ethernet line cards.
PPPoE Session Limit
Platforms: Cisco 7200 and Cisco 7400 series routers
The PPPoE Session Limit feature enables you to limit the number of PPPoE sessions that can be created on a router or on an ATM PVC, PVC range, or VC class, or Ethernet subinterface.
Before the introduction of this feature, there was no way to limit the number of PPPoE sessions that could be created on a router. Not having a limit was potentially a problem because it was possible that the router could create so many PPPoE sessions that it would run out of memory.
To prevent the router from using too much memory for virtual access, the PPPoE Session Limit feature introduces a new command and a modification to an existing command that enable you to specify the maximum number of PPPoE sessions that can be created. The new pppoe limit max-sessions command limits the number of PPPoE sessions that can be created on the router. The modified pppoe max-sessions command limits the number of PPPoE sessions that can be created on an ATM PVC, PVC range, VC class, or Ethernet subinterface.
Quality of Service Features for Parallel Express Forwarding (PXF)
Platform: Cisco 7200 VXR using a Network Services Engine (NSE)
The Modular Quality of Service Command-Line Interface (Modular QoS CLI) and many of the associated class-based QoS features are now available on PXF.
The following class-based QoS features are being introduced for PXF:
•Traffic Policing—The police command in policy map class configuration mode.
•Class-Based Weighted Fair Queueing (CBWFQ)—The bandwidth and fair-queue commands in policy map class configuration mode.
•Low Latency Queueing (LLQ)—The priority command used in policy map class configuration mode.
•Class-Based Weighted Random Early Detection (CBWRED) and Differentiated Services- Compliant Weighted Random Early Detection (DiffServ-Compliant WRED)—The random-detect command used simultaneously with the bandwidth command in policy map class configuration mode.
•Flow-Based Weighted Random Early Detection—The random-detect command used simultaneously with the bandwidth command in policy map class configuration mode.
•Class-Based Marking—The set command used in policy map class configuration mode. Class-Based Marking support is limited to 32 traffic classes per traffic policy, and QoS group marking (set qos-group) is not supported.
The Committed Access Rate (CAR) feature configured to use an access list with rate-limiting policies (the access-list rate-limit command in interface configuration mode) is also now available on PXF. If you wish to rate-limit traffic without using an ACL, use the Modular QoS CLI to configure the Traffic Policing feature.
Because of the addition of the Modular QoS CLI, traditional WRED (the random-detect command in interface configuration mode) and Fair Queueing (the fair-queue command in interface configuration mode) are no longer configurable. If you would like to configure WRED or Fair Queueing, you can use the Modular QoS CLI to configure Class-Based WRED or Class-Based Weighted Fair Queueing on a per-class rather than a per-interface basis.
The Modular QoS CLI on PXF does not currently support the following match criteria that are available on other Modular QoS CLI-supported platforms:
•Destination address
•Input Interface
•Internet Protocol (IP) values
•Multiprotocol Label Switching (MPLS) values
•Protocol
•Quality of Service (QoS) group values
•Source address
For additional information on the Modular QoS CLI, see the Modular Quality of Service Command-Line Interface document.
RADIUS Attribute Screening
Platforms: Cisco 7200 and Cisco 7400 series routers
The RADIUS Attribute Screening feature allows users to configure a list of "accept" or "reject" RADIUS attributes on the network access server (NAS) for purposes such as authorization or accounting.
If a NAS accepts and processes all RADIUS attributes received in an Access-Accept packet, unwanted attributes may be processed, creating a problem for wholesale providers who do not control their customers' authentication, authorization, and accounting (AAA) servers. For example, there may be attributes that specify services to which the customer has not subscribed, or there may be attributes that may degrade service for other wholesale dial users. The ability to configure the NAS to restrict the use of specific attributes has therefore become a requirement for many users.
The RADIUS Attribute Screening feature should be implemented in one of the following ways:
•To allow the NAS to accept and process all standard RADIUS attributes for a particular purpose, except for those on a configured reject list
•To allow the NAS to reject (filter out) all standard RADIUS attributes for a particular purpose, except for those on a configured accept list
Virtual Private Dial-up Network Extended Fail-over Conditions
Platforms: Cisco 7200 and Cisco 7400 series routers
The Virtual Private Dial-up Network (VPDN) failover has been extended to occur in instances where the receiving node sends an error message to the transmitting node. Before this feature, the failover mechanism would only occur when the transmitting node did not receive a response from the receiving node.
This feature occurs automatically when failover is configured, so this feature has no new command. Failover is configured in the VPDN group by using the initiate-to command.
VPDN Group Session Limiting
Platforms: Cisco 7200 and Cisco 7400 series routers
Before the introduction of the VPDN Group Session Limiting feature, you could only globally limit the number of VPDN sessions on a router with limits applied equally to all VPDN groups. Using the VPDN Group Session Limiting feature, you can limit the number of VPDN sessions allowed per VPDN group. This feature is implemented with the introduction of the session-limit number command in VPDN configuration mode. VPDN group session limiting is applied after the global VPDN session limiting (which is configured via the vpdn session-limit session command in configuration mode) is enforced.
MIBs
Current MIBs
To obtain lists of supported MIBs by platform and Cisco IOS release, and to download MIB modules, go to the Cisco MIB website on Cisco.com at http://www.cisco.com/public/sw-center/netmgmt/cmtk/mibs.shtml.
Deprecated and Replacement MIBs
Old Cisco MIBs will be replaced in a future release. Currently, OLD-CISCO-* MIBs are being converted into more scalable MIBs without affecting existing Cisco IOS products or network management system (NMS) applications. You can update from deprecated MIBs to the replacement MIBs as shown in Table 3.
Caveats
Caveats describe unexpected behavior in Cisco IOS software releases. Severity 1 caveats are the most serious caveats; severity 2 caveats are less serious. Severity 3 caveats are moderate caveats, and only select severity 3 caveats are included in the caveats document.
This section contains only open and resolved caveats for the current Cisco IOS maintenance release.
All caveats in Cisco IOS Release 12.2 and Cisco IOS Release 12.2 T are also in Cisco IOS Release 12.2(2)DX3.
For information on caveats in Cisco IOS Release 12.2, see Caveats for Cisco IOS Release 12.2.
For information on caveats in Cisco IOS Release 12.2 T, see Caveats for Cisco IOS Release 12.2 T, which lists severity 1 and 2 caveats and select severity 3 caveats and is located on Cisco.com and the Documentation CD-ROM.
Note If you have an account with Cisco.com, you can use Bug Navigator II to find caveats of any severity for any release. To reach Bug Navigator II, log in to Cisco.com and click Software Center: Cisco IOS Software: Bug Toolkit: Bug Navigator II. Another option is to go to http://www.cisco.com/support/bugtools/.
Because Cisco IOS Release 12.2(1)DX is the initial base release, there are no resolved caveats. For a list of the resolved caveats, see the next set of release notes for this release version.
Open Caveats—Cisco IOS Release 12.2(2)DX3
This section documents possible unexpected behavior by Cisco IOS Release 12.2(2)DX3 and describes only severity 1 and 2 caveats and select severity 3 caveats.
There are no known open caveats for Cisco IOS Release 12.2(2)DX3.
Resolved Caveats—Cisco IOS Release 12.2(2)DX3
All the caveats listed in this section are resolved in Cisco IOS Release 12.2(2)DX3. This section describes only severity 1 and 2 caveats and select severity 3 caveats.
•CSCdt41215
A Cisco 7200 or Cisco 7500 series router that is running Cisco IOS Release 12.0(10)S3 or 12.1(5) and that has PA-A3-OC3 port adapter may stop forwarding packets on one or more virtual connections (VCs).
Workaround: Restore the original working condition by entering the clear interface privileged EXEC command.
•CSCdt88614
A router may experience a Spurious Memory Access when sending an SNMP trap on a Link Down event. Spurious access is an attempt by Cisco IOS Software to access memory in a restricted location.
This error has typically no impact on router behavior.
Spurious accesses are counted and recorded, if possible, by Cisco IOS Software. This information is available with the show alignment command. The traceback information is necessary to determine the cause and the fix of the spurious accesses.
This condition indicates a software failure. Enter the show log, show alignment and show tech-support commands, contact your Cisco technical support representative, and provide the representative with the gathered information.
There are no known workarounds.
•CSCdv40244
The following continuous stream of "%POT1E1-3-FWFATAL" error messages may occur on a router:
%POT1E1-3-FWFATAL: Bay 5: firmware needsresetdue to fw watchdog timeout%POT1E1-3-FWFATAL: Bay 4: firmware needsresetdue to fatal software errorsThis symptom is observed on a Cisco 7206VXR router that is running Cisco IOS Release 12.1(8.04)and a Cisco 7500 router running Cisco IOS release 12.0(21)S2 configured with a PA-MC-8T1 port adapter, but may also affect the PA-MC-2T1, PA-MC-4T1, PA-MC-8DSX1, PA-MC- 2E1/120, and PA-MC-8E1/120 port adapters.
There are no known workarounds.
•CSCdy07954
"session-limit 0" is seen once "initiate-to ip x.x.x.x" is configured in L2TP configuration and deleted by "no initiate-to ip x.x.x.x" Although "session-limit 0" is supposed to be visible only when "accept-dialin" or "request-dialout" option is configured under the vpdn-group, it is also seen when "request-dialin" option is configured under the vpdn-group. The image file is "c7200-is-mz.122-2.DX".
"session-limit 0" is seen once "initiate-to ip x.x.x.x" is configured in L2TP configuration and deleted by "no initiate-to ip x.x.x.x".
Workaround: "session-limit 0" can be deleted by re-configuring "initiate-to ip x.x.x.x".
•CSCdy11785
A Cisco 7206VXR may be restarted because of a bus error at executing show env last comand processes and display the following crashinfo messages:
CMD: 'show env last' 16:50:54 JST Thu Jul 4 2002-Traceback= 6060A0CC 60608C74 60716E90 60722340 606268FC 60634A9C 60696A9C60696A88signal= 0xA, code= 0x8, context= 0x62245C90This symptom is observed on a Cisco 7206VXR that is running Cisco IOS Release 12.2(2)DD4.
There is no known workarounds.
•CSCdy18789
A system may run out of memory because of a leak in the routing table structures. No explicit triggers (other than routes in the table) are needed to cause this symptom.
The conditions under which this symptom occurs are not known at this time.
There is no workaround.
•CSCdz60229
Cisco devices which run IOS and contain support for the Secure Shell (SSH) server are vulnerable to a Denial of Service (DoS) if the SSH server is enabled on the device. A malformed SSH packet directed at the affected device can cause a reload of the device. No authentication is necessary for the packet to be received by the affected device. The SSH server in Cisco IOS is disabled by default.
Cisco will be making free software available to correct the problem as soon as possible.
The malformed packets can be generated using the SSHredder test suite from Rapid7, Inc. Workarounds are available. The Cisco PSIRT is not aware of any malicious exploitation of this vulnerability.
This advisory is available at
http://www.cisco.com/warp/public/707/ssh-packet-suite-vuln.shtml
Open Caveats—Cisco IOS Release 12.2(2)DX2
This section documents possible unexpected behavior by Cisco IOS Release 12.2(2)DX2 and describes only severity 1 and 2 caveats and select severity 3 caveats.
There are no known open caveats for Cisco IOS Release 12.2(2)DX2.
Resolved Caveats—Cisco IOS Release 12.2(2)DX2
All the caveats listed in this section are resolved in Cisco IOS Release 12.2(2)DX2. This section describes only severity 1 and 2 caveats and select severity 3 caveats.
•CSCdu46694
A Cisco 7500 router may experience some packet loss between hosts after Cisco Express Forwarding (CEF) is enabled.
There are no known workarounds.
•CSCdv57640
When a virtual-template interface is configured for IP virtual routing and forwarding (VRF) in a Layer 2 Tunnel Protocol (L2TP) dial-in setup, only about 50 percent of the data packets are able to make it across the tunnel.
Workaround: Disable the ip route-cache cef as well as "ip route-cache" interface configuration commands on the virtual template interface to allow all packets to go through the process-switching.
In addition to fixing the above problem, this also fixes the problem with Vaccess counters, observed after CSCdw01642. The problem was that the counters on the Vaccess interfaces used for L2TP sessions (on LAC and LNS) showed wrong values. That happened only when IP CEF was enabled on high end routers.
•CSCdw65173
PA-A3 on 7200 stops transmitting traffic when the adapter experiences a very high number of carrier transitions. Carrier transitions in this scenario are due to a clocking loop in the ATM network. After recovery of the ATM network, by rectifying the clocking loop, the ATM PA-A3 does not recover. The ATM PA-A3 exhibits output drops in the show interface output.
Workaround: shut/no shut the interface.
•CSCdx36497
A c7200 might crash while running different 12.2T based releases due to a software forced crash per memory corruption in the I/O pool, displaying messages (among others) as follows:
memory pool type is I/O%SYS-3-OVERRUN: Block overrun at 7333CF8 (red zone 372F5C60)This might happen in systems with high loads on the FE interface, due to an error on the FE driver. This FE driver is specific of the following part numbers equipped with the DEC21140 controller:
PA-2FEISL-TX=PA-FE-TX=C7200-I/O-FE=There are no known workarounds.
•CSCin02516
When "no ip address" occurs on an interface, the associated adjacency entries have not been removed. If the previous interface's ip address is re-assigned in its subinterface, the adjacency entry is still pointing to the previous main interface.
The problem occurs with static arp entries who's ip addresses are on the same subnet of the interface.
Workaround: Remove static arp configuration.
Open Caveats—Cisco IOS Release 12.2(2)DX1
This section documents possible unexpected behavior by Cisco IOS Release 12.2(2)DX1 and describes only severity 1 and 2 caveats and select severity 3 caveats.
There are no known open caveats for Cisco IOS Release 12.2(2)DX1.
Resolved Caveats—Cisco IOS Release 12.2(2)DX1
All the caveats listed in this section are resolved in Cisco IOS Release 12.2(2)DX1. This section describes only severity 1 and 2 caveats and select severity 3 caveats.
•CSCds53368
SNMP query on ciscoFlashPartitionEntry object in CISCO-FLASH-MIB for a 7200 device takes approximately 55 secs to return data. We have only seen this problem in the devices with ATA file system.
There are no known workarounds.
•CSCdt97325
Cisco routers that are running Cisco IOS Release 12.1, 12.2, or 12.0S with an Advanced Technology Attachment (ATA) sandisk card (of any capacity) may pause indefinitely or be slow to respond to command-line interface (CLI) command input when the SNMP FlashMIB is queried. The FlashMIB queries may also timeout. This problem occurs when the inode numbers of the files in the ATA sandisk are not sequential and when there is a large difference in the inode numbers.
The following is an example of a directory list with inode numbers that are likely to cause an SNMP timeout when the Flash MIB is queried:
gt3-7200-3#dir disk1: Directory of disk1:/3 -rw- 1690 shankar4 -rw- 1690 sara5 -rw- 1690 sara16 -rw- 1690 sara127 -rw- 1690 sara1238 -rw- 1690 sara123410 -rw- 1690 sara1234511 -rw- 1690 sara12345612 -rw- 1690 79 drw- 0 directory-one15 -rw- 8623108 c7200-is-mz.121-7.414 -rw- 3578452 c7200-boot-mz.del960422994 -rw- 4307448 c7200-boot-mz.flo960424046 -rw- 3578544 c7200-boot-mz.del96042firstWorkaround: Exclude the ciscoFlashFileEntry MIB from FlashMIB queries.
•CSCdx24368
Acct-Session-Time[46] in Network STOP record may report the value as zero for sessions expanding more than 49 days.
There are no known workarounds.
•CSCdx35300
GigaEthernet input queue wedged like bellow and excessive input queue drops can be seen on C7401ASR(12.2(2)DD4).
There are no known workarounds.
•CSCuk34244
This symptom may be seen on Cisco 7200 or Cisco 7400 platforms when a packet is received via one tunnel and CEF-switched into another tunnel. If a condition occurs after the first tunnel encapsulation has been replaced with the second tunnel encapsulation that requires the newly tunnel-encapsulated packet to be punted from CEF switching to a slower switching path, the router may reload with a DMA error.
There are no known workarounds.
Open Caveats—Cisco IOS Release 12.2(1)DX1
This section documents possible unexpected behavior by Cisco IOS Release 12.2(1)DX1 and describes only severity 1 and 2 caveats and select severity 3 caveats.
There are no known open caveats for Cisco IOS Release 12.2(1)DX1.
Resolved Caveats—Cisco IOS Release 12.2(1)DX1
All the caveats listed in this section are resolved in Cisco IOS Release 12.2(1)DX1. This section describes only severity 1 and 2 caveats and select severity 3 caveats.
•CSCdw65903
An error can occur with management protocol processing. Please use the following URL for further information:
http://www.cisco.com/cgi-bin/bugtool/onebug.pl?bugid=CSCdw65903
Related Documentation
The following sections describe the documentation available for the Cisco 12.2(2)DX3. These documents consist of hardware and software installation guides, Cisco IOS configuration guides and command references, system error messages, feature modules, and other documents.
Documentation is available as printed manuals or electronic documents, except for feature modules, which are available online on Cisco.com and the Documentation CD-ROM.
Use these release notes with these documents:
•Cisco IOS Software Documentation Set
Release-Specific Documents
The following documents are specific to Cisco IOS Release 12.2 and are located on Cisco.com and the Documentation CD-ROM:
•Cross-Platform Release Notes for Cisco IOS Release 12.2
On Cisco.com at:
Technical Documents: Documentation Home Page: Cisco IOS Software Configuration: Cisco IOS Release 12.2: Release Notes: Cross-Platform Release Notes
On the Documentation CD-ROM at:
Cisco Product Documentation: Cisco IOS Software Configuration: Cisco IOS Release 12.2: Release Notes: Cross-Platform Release Notes
•Product bulletins, field notices, and other release-specific documents on Cisco.com at:
Technical Documents
•Caveats for Cisco IOS Release 12.2
As a supplement to the caveats listed in "Caveats" in these release notes, see Caveats for Cisco IOS Release 12.2 document, which contains caveats applicable to all platforms for all maintenance releases of Cisco IOS Release 12.2.
•Caveats for Cisco IOS Release 12.2 T
As a supplement to the caveats listed in Caveats for Cisco IOS Release 12.2 T, which contains caveats applicable to all platforms for all maintenance releases of Cisco IOS Release 12.2 T.
On Cisco.com at:
Technical Documents: Documentation Home Page: Cisco IOS Software Configuration: Cisco IOS Release 12.2: Release Notes: Caveats
On the Documentation CD-ROM at:
Cisco Product Documentation: Cisco IOS Software Configuration: Cisco IOS Release 12.2: Caveats
Note If you have an account on Cisco.com, you can also use the Bug Toolkit to find select caveats of any severity. To reach the Bug Toolkit, log in to Cisco.com and click Service & Support: Software Center: Cisco IOS Software: BUG TOOLKIT. Another option is to go to http://www.cisco.com/cgi-bin/Support/Bugtool/launch_bugtool.pl.
`Platform-Specific Documents
These documents are available for the Cisco 7000 family of routers on Cisco.com and the Documentation CD-ROM:
•Cisco 7000 Hardware Installation and Maintenance
•Cisco 7000 User Guide
•Cisco 7010 User Guide
•Cisco 7200 VXR Installation and Configuration Guide
•Cisco 7200 VXR Quick Start Guide
•Cisco 7202 Installation and Configuration Guide
•Cisco 7204 Installation and Configuration Guide
•Cisco 7206 Installation and Configuration Guide
•Cisco 7206 Quick Start Guide
•Cisco 7401 ASR Installation and Configuration Guide
•Cisco 7401 ASR Quick Start Guide
•Quick Reference for Cisco 7204 Installation
•Quick Start Guide Cisco 7100 Series VPN Router
On Cisco.com at:
Technical Documents: Documentation Home Page: Core/High-End Routers
On the Documentation CD-ROM at:
Cisco Product Documentation: Core/High-End Routers
Feature Modules
Feature modules describe new features supported by Cisco IOS Release 12.2(2)DX3 and are updates to the Cisco IOS documentation set. A feature module consists of a brief overview of the feature, benefits, configuration tasks, and a command reference. As updates, the feature modules are available online only. Feature module information is incorporated in the next printing of the Cisco IOS documentation set.
On Cisco.com at:
Technical Documents: Documentation Home Page: Cisco IOS Software Configuration: Cisco IOS Release 12.2: New Feature Documentation: New Features in 12.2-Based Limited Lifetime Releases: New Features in 12.2 X Releases: New Features in Release 12.2 DX
On the Documentation CD-ROM at:
Cisco Product Documentation: Cisco IOS Software Configuration: Cisco IOS Release 12.2: New Feature Documentation: New Features in 12.2-Based Limited Lifetime Releases: New Features in 12.2-Based Limited Lifetime Releases: New Features in 12.2 X Releases: New Features in Release 12.2 DX
Cisco IOS Software Documentation Set
The Cisco IOS software documentation set consists of the Cisco IOS configuration guides, Cisco IOS command references, and several other supporting documents. The Cisco IOS software documentation set is shipped with your order in electronic form on the Documentation CD-ROM—unless you specifically ordered the printed versions.
Documentation Modules
Each module in the Cisco IOS documentation set consists of one or more configuration guides and one or more corresponding command references. Chapters in a configuration guide describe protocols, configuration tasks, and Cisco IOS software functionality, and contain comprehensive configuration examples. Chapters in a command reference provide complete command syntax information. Use each configuration guide with its corresponding command reference.
On Cisco.com at:
Technical Documents: Cisco IOS Software Configuration: Cisco IOS Release 12.2: Configuration Guides and Command References
On the Documentation CD-ROM at:
Cisco Product Documentation: Cisco IOS Software Configuration: Cisco IOS Release 12.2: Configuration Guides and Command References
Cisco IOS Release 12.2 Documentation Set Contents
Table 5 lists the contents of the Cisco IOS Release 12.2 software documentation set, which is available in electronic form and in printed form if ordered.
Note You can find the most current Cisco IOS documentation on Cisco.com and the Documentation CD-ROM. These electronic documents may contain updates and modifications made after the hard-copy documents were printed.
On Cisco.com at:
Technical Documents: Cisco IOS Software Configuration: Cisco IOS Release 12.2
On the Documentation CD-ROM at:
Cisco Product Documentation: Cisco IOS Software Configuration: Cisco IOS Release 12.2
Obtaining Documentation
The following sections provide sources for obtaining documentation from Cisco Systems.
World Wide Web
The most current Cisco documentation is available on the World Wide Web at http://www.cisco.com. Translated documentation can be accessed at http://www.cisco.com/public/countries_languages.shtml.
Documentation CD-ROM
Cisco documentation and additional literature are available in a CD-ROM package, which ships with your product. The Documentation CD-ROM is updated monthly and may be more current than printed documentation. The CD-ROM package is available as a single unit or as an annual subscription.
Ordering Documentation
Cisco documentation is available in the following ways:
•Registered Cisco Direct Customers can order Cisco product documentation from the Networking Products MarketPlace:
http://www.cisco.com/cgi-bin/order/order_root.pl
•Registered Cisco.com users can order the Documentation CD-ROM through the online Subscription Store:
http://www.cisco.com/go/subscription
•Nonregistered Cisco.com users can order documentation through a local account representative by calling Cisco corporate headquarters (California, USA) at 408 526-7208 or, in North America, by calling 800 553-NETS(6387).
Documentation Feedback
If you are reading Cisco products documentation on the World Wide Web, you can submit technical comments electronically. Click Feedback in the toolbar and select Documentation. After you complete the form, click Submit to send it to Cisco.
You can e-mail your comments to bug-doc@cisco.com.
For your convenience, many documents contain a response card behind the front cover for submitting your comments by mail. Otherwise, you can mail your comments to the following address:
Cisco Systems, Inc.
Document Resource Connection
170 West Tasman Drive
San Jose, CA 95134-9883We appreciate your comments.
Obtaining Technical Assistance
The following sections provide sources for obtaining technical assistance from Cisco Systems.
Cisco.com
Cisco.com is the foundation of a suite of interactive, networked services that provides immediate, open access to Cisco information and resources at anytime, from anywhere in the world. This highly integrated Internet application is a powerful, easy-to-use tool for doing business with Cisco.
Cisco.com provides a broad range of features and services to help customers and partners streamline business processes and improve productivity. Through Cisco.com, you can find information about Cisco and our networking solutions, services, and programs. In addition, you can resolve technical issues with online technical support, download and test software packages, and order Cisco learning materials and merchandise. Valuable online skill assessment, training, and certification programs are also available.
Customers and partners can self-register on Cisco.com to obtain additional personalized information and services. Registered users can order products, check on the status of an order, access technical support, and view benefits specific to their relationships with Cisco.
To access Cisco.com, go to the following website:
http://www.cisco.com
Technical Assistance Center
The Cisco TAC website is available to all customers who need technical assistance with a Cisco product or technology that is under warranty or covered by a maintenance contract.
Contacting TAC by Using the Cisco TAC Website
If you have a priority level 3 (P3) or priority level 4 (P4) problem, contact TAC by going to the TAC website:
http://www.cisco.com/tac
P3 and P4 level problems are defined as follows:
•P3—Your network performance is degraded. Network functionality is noticeably impaired, but most business operations continue.
•P4—You need information or assistance on Cisco product capabilities, product installation, or basic product configuration.
In each of the above cases, use the Cisco TAC website to quickly find answers to your questions.
To register for Cisco.com, go to the following website:
http://www.cisco.com/register/
Cisco.com registered users who cannot resolve a technical issue by using the TAC online resource can open a case online by using the TAC Case Open tool at the following website:
http://www.cisco.com/tac/caseopen
Contacting TAC by Telephone
If you have a priority level 1(P1) or priority level 2 (P2) problem, contact TAC by telephone and immediately open a case. To obtain a directory of toll-free numbers for your country, go to the following website:
http://www.cisco.com/warp/public/687/Directory/DirTAC.shtml
P1 and P2 level problems are defined as follows:
•P1—Your production network is down, causing a critical impact to business operations if service is not restored quickly. No workaround is available.P2—Your production network is severely degraded, affecting significant aspects of your business operations. No workaround is available.