Table Of Contents
Release Notes for Cisco AS5400 Universal Gateways for Cisco IOS Release 12.2(15)ZK5
Determining the Software Version
Upgrading to a New Software Release
New Hardware and Software Features in Cisco IOS Release 12.2(15)ZK2 to Cisco IOS Release 12.2(15)ZK5
New Hardware Features in Cisco IOS Release 12.2(15)ZK1
New Software Features in Cisco IOS Release 12.2(15)ZK1
Signal ISDN B-Channel ID to Enable Application Control of Voice Gateway Trunks
New Hardware Features in Cisco IOS Release 12.2(15)ZK
New Software Features in Cisco IOS Release 12.2(15)ZK
Attribute 104 and Policy-Based Route Map
Caveats for Cisco IOS Release 12.2(15)ZK
Open Caveats—Cisco IOS Release 12.2(15)ZK5
Resolved Caveats—Cisco IOS Release 12.2(15)ZK5
Open Caveats—Cisco IOS Release 12.2(15)ZK4
Resolved Caveats—Cisco IOS Release 12.2(15)ZK4
Open Caveats—Cisco IOS Release 12.2(15)ZK3
Resolved Caveats—Cisco IOS Release 12.2(15)ZK3
Open Caveats—Cisco IOS Release 12.2(15)ZK2
Resolved Caveats—Cisco IOS Release 12.2(15)ZK2
Open Caveats—Cisco IOS Release 12.2(15)ZK1
Resolved Caveats—Cisco IOS Release 12.2(15)ZK1
Open Caveats—Cisco IOS Release 12.2(15)ZK
Resolved Caveats—Cisco IOS Release 12.2(15)ZK
Release Notes for Cisco AS5400 Universal Gateways for Cisco IOS Release 12.2(15)ZK5
August 18, 2004
Cisco IOS Release 12.2(15)ZK5
OL-4770-01 Rev. E1
These release notes for the Cisco AS5400 universal gateway describe the enhancements provided in Cisco IOS Release 12.2(15)ZK5. These release notes are updated as needed.
For a list of the software caveats that apply to Cisco IOS Release 12.2(15)ZK4, see "Caveats for Cisco IOS Release 12.2(15)ZK" section. See also Caveats for Cisco IOS Release 12.2, which is updated for every maintenance release and is located on Cisco.com and the Documentation CD-ROM.
Use these release notes with Cross-Platform Release Notes for Cisco IOS Release 12.2 T for Cisco IOS Release 12.2(15)T9 located on Cisco.com and the Documentation CD-ROM.
Cisco recommends that you view the field notices for this release to see if your software or hardware platforms are affected. If you have an account on Cisco.com, you can find field notices at http://www.cisco.com/warp/customer/tech_tips/index/fn.html. If you do not have a Cisco.com login account, you can find field notices at http://www.cisco.com/warp/public/tech_tips/index/fn.html.
Contents
These release notes describe the following topics:
•
MIBs
•
Caveats for Cisco IOS Release 12.2(15)ZK
Inheritance Information
Cisco IOS Release 12.2(15)ZK5 is based on Cisco IOS Release 12.2(15)T9. All features in Cisco IOS Release 12.2(15)T9 are in Cisco IOS Release 12.2(15)ZK5.
Table 1 lists sections of the Cross-Platform Release Notes for Cisco IOS Release 12.2 T that apply to Cisco IOS Release 12.2(15)ZK5.
Table 1 References for the Cross-Platform Release Notes for Cisco IOS Release 12.2 T
Topic Location•
Introductory information about the Cisco AS5400 universal gateway
•
Hardware Supported
•
Feature Set Tables
•
Additional Notes for the Cisco AS5400 Universal Gateways
On Cisco.com at:
Products & Services: IOS Software: Cisco IOS Software Releases 12.2 T: Instructions and Guides: Release Notes: Cross-Platform Release Notes for Cisco IOS Release 12.2 T, Part 2: Platform-Specific Information
Or at: http://www.cisco.com/univercd/cc/td/doc/product/software/ios122/ 122relnt/xprn122t/122tfeat.htm
•
Determining the Software Version
•
Upgrading to a New Software Release
On Cisco.com at:
Products & Services: IOS Software: Cisco IOS Software Releases 12.2 T: Instructions and Guides: Release Notes: Cross-Platform Release Notes for Cisco IOS Release 12.2 T, Part 1: System Requirements
Or at:
http://www.cisco.com/univercd/cc/td/doc/product/software/ios122/ 122relnt/xprn122t/122treqs.htm
•
Feature Descriptions (New and Changed Information)
•
MIBs
•
Important Notes
On Cisco.com at:
Products & Services: IOS Software: Cisco IOS Software Releases 12.2 T: Instructions and Guides: Release Notes: Cross-Platform Release Notes for Cisco IOS Release 12.2 T, Part 3: New Features and Important Notes
Or at:
http://www.cisco.com/univercd/cc/td/doc/product/software/ios122/ 122relnt/xprn122t/122tnewf.htm
•
Related Documentation
•
Obtaining Documentation
•
Obtaining Technical Assistance
On Cisco.com at:
Products & Services: IOS Software: Cisco IOS Software Releases 12.2 T: Instructions and Guides: Release Notes: Cross-Platform Release Notes for Cisco IOS Release 12.2 T, Part 4: Related Documentation
Or at:
http://www.cisco.com/univercd/cc/td/doc/product/software/ios122/ 122relnt/xprn122t/122tdocs.htm
Introduction
For information on new features and Cisco IOS commands supported by Cisco IOS Release 12.2(15)ZK5, see the "New and Changed Information" section.
Early Deployment Releases
These release notes describe the Cisco AS5400 universal gateway for Cisco IOS Release 12.2(15)ZK5, which is an early deployment (ED) release based on Cisco IOS Release 12.2(15)T9. Early deployment releases contain fixes for software caveats and support for new Cisco hardware and software features. Table 2 shows recent early deployment releases for the CiscoAS5400 universal gateway.
Table 2 Early Deployment Release New Features for the Cisco AS5400 Universal Gateway
ED Release Maintenance Release Additional Software Features Additional Hardware Features AvailabilityCisco IOS Release 12.2(15)ZK5
12.2(15)ZK5
None
None
Now
Cisco IOS Release 12.2(15)ZK4
12.2(15)ZK4
None
None
Now
Cisco IOS Release 12.2(15)ZK3
12.2(15)ZK3
None
None
Now
Cisco IOS Release 12.2(15)ZK2
12.2(15)ZK2
None
None
Now
Cisco IOS Release 12.2(15)ZK1
12.2(15)ZK1
Signal ISDN B-Channel ID to Enable Application Control of Voice Gateway Trunks
None
Now
Cisco IOS Release 12.2(15)ZK
None
Now
System Requirements
This section describes the system requirements for Cisco IOS Release 12.2(15)ZK5 and includes the following sections:
•
Determining the Software Version
•
Upgrading to a New Software Release
Memory Recommendations
Supported Hardware
Cisco IOS Release 12.2(15)ZK5 supports the Cisco AS5400 universal gateway:
For detailed descriptions of the new hardware features, see the "New and Changed Information" section.
For additional information about supported hardware for this platform and release, please refer to the Hardware/Software Compatibility Matrix in the Cisco Software Advisor at the following location:
http://www.cisco.com/cgi-bin/front.x/Support/HWSWmatrix/hwswmatrix.cgi
Table 4 Supported Interfaces for the Cisco AS5400 Universal Gateway
Interface, Network Module, or Data Rate Product Description Supported Platforms Dial/Voice Feature Cards 1AS54-DFC-CT3
All Cisco AS5400 universal gateway platforms
AS54-DFC-60NP
All Cisco AS5400 universal gateway platforms
AS54-DFC-108NP
All Cisco AS5400 universal gateway platforms
2 PRI DFC, 4 PRI DFC, 8 PRI DFC
All Cisco AS5400 universal gateway platforms
LAN InterfacesFast Ethernet 10/100BaseT (RJ-45)
All Cisco AS5400 universal gateway platforms
Trunk/Backhaul Interface Options2PRI CT1/CE1 DFC, 4PRI CT1/CE1 DFC, 8PRI CT1/CE1 DFC
All Cisco AS5400 universal gateway platforms
CT3 DFC
All Cisco AS5400 universal gateway platforms
2 serial ports on the motherboard
All Cisco AS5400 universal gateway platforms
1 The Voice/Fax network modules require Cisco IOS Plus feature sets.
Determining the Software Version
To determine the version of Cisco IOS software running on your Cisco AS5400 universal gateway, log in to the Cisco AS5400 universal gateway and enter the show version EXEC command:
Router> show versionCisco Internetwork Operating System SoftwareIOS (tm) 5400 Software (C5400-IS-MZ), Version 12.2(15)ZK4, EARLY DEPLOYMENT RELEASE SOFTWAREUpgrading to a New Software Release
For general information about upgrading to a new software release, refer to Software Installation and Upgrade Procedures located at the following URL:
http://www.cisco.com/warp/public/130/upgrade_index.shtml
Feature Set Tables
The Cisco IOS software is packaged in feature sets consisting of software images—depending on the platform. Each feature set contains a specific set of Cisco IOS features.
Cisco IOS Release 12.2(15)ZK5 supports the same feature sets as Cisco IOS Release 12.2, but Cisco IOS Release 12.2(15)ZK5 can include new features supported by the Cisco AS5400 universal gateway.
![]()
CautionCisco IOS images with strong encryption (including, but not limited to, 168-bit Triple Data Encryption Standard [3DES] data encryption feature sets) are subject to United States government export controls and have limited distribution. Strong encryption images to be installed outside the United States are likely to require an export license. Customer orders may be denied or subject to delay because of United States government regulations. When applicable, purchaser and user must obtain local import and use authorizations for all encryption strengths. Please contact your sales representative or distributor for more information, or send an e-mail to export@cisco.com.
Table 5 lists the features and feature sets supported by the Cisco AS5400 universal gateway in Cisco IOS Release 12.2(15)ZK5 and uses the following conventions:
•
Yes—The feature is supported in the software image.
•
No—The feature is not supported in the software image.
•
In—The number in the "In" column indicates the Cisco IOS release in which the feature was introduced. For example, 12.2(15)ZK5 means a feature was introduced in 12.2(15)ZK5. If a cell in this column is empty, the feature was included in the initial base release.
![]()
Note
The parent release for Cisco IOS Release 12.2(15)ZK5 is Cisco IOS Release 12.2(15)T. For information about inherited features, refer to Cisco.com or Cisco Feature Navigator. For Cisco.com, either go to Cisco.com and select the appropriate software release under Products and Service and IOS Software or go to http://www.cisco.com/univercd/home/index.htm and select the appropriate software release under Cisco IOS Software and Release Notes. If you have a Cisco.com login account, you can use the Cisco Feature Navigator tool at http://www.cisco.com/cgi-bin/Support/FeatureNav/FN.pl.
Table 5 Feature List by Feature Set for the Cisco AS5400 Universal Gateways
In Software Images by Feature Set Features IP Plus IP Plus
IPsec 56 Enterprise Plus Enterprise PlusIPsec 56 Enterprise Plus Voice12.2(15)ZK
Yes
Yes
Yes
Yes
Yes
12.2(15)ZK
Yes
Yes
Yes
Yes
Yes
Signal ISDN B-Channel ID to Enable Application Control of Voice Gateway Trunks
12.2(15)ZK1
Yes
Yes
Yes
Yes
Yes
New and Changed Information
The following sections list the new hardware and software features supported by the Cisco AS5400 universal gateway for Cisco IOS Release 12.2(15)ZK5.
New Hardware and Software Features in Cisco IOS Release 12.2(15)ZK2 to Cisco IOS Release 12.2(15)ZK5
No new hardware or software features are supported by the Cisco AS5400 universal gateway for Cisco IOS Release 12.2(15)ZK2 to Cisco IOS Release 12.2(15)ZK5.
New Hardware Features in Cisco IOS Release 12.2(15)ZK1
No new hardware features are supported by the Cisco AS5400 universal gateway for Cisco IOS Release 12.2(15)ZK1.
New Software Features in Cisco IOS Release 12.2(15)ZK1
The following new software feature is supported by the Cisco AS5400 universal gateway for Cisco IOS Release 12.2(15)ZK1:
Signal ISDN B-Channel ID to Enable Application Control of Voice Gateway Trunks
The B-Channel ID features enables call management applications to identify the specific ISDN B-channel used during a voice gateway call to enable port specific features, such as voice recording and call transfer.
New Hardware Features in Cisco IOS Release 12.2(15)ZK
No new hardware features are supported by the Cisco AS5400 universal gateway for Cisco IOS Release 12.2(15)ZK.
New Software Features in Cisco IOS Release 12.2(15)ZK
The following new software features are supported by the Cisco AS5400 universal gateway for Cisco IOS Release 12.2(15)ZK:
Attribute 104 and Policy-Based Route Map
Attribute 104 and Policy-Based Route Map provides Permit Route Map, Default Private Route, Local PBR, and Pseudo Next-Hop Address.
Policy-Based Routing
Policy-Based routing (PBR) provides a mechanism for expressing and implementing forwarding and routing of data packets based on defined policies. The policies are based on decisions independent of the destination address such as the type of service, source address, precedence, port numbers, and protocol type.
MIBs
To locate and download MIBs for selected platforms, Cisco IOS releases, and feature sets, use Cisco MIB Locator found at the following URL:
http://tools.cisco.com/ITDIT/MIBS/servlet/index
If Cisco MIB Locator does not support the MIB information that you need, you can also obtain a list of supported MIBs and download MIBs from the Cisco MIBs page at the following URL:
http://www.cisco.com/public/sw-center/netmgmt/cmtk/mibs.shtml
To access Cisco MIB Locator, you must have an account on Cisco.com. If you have forgotten or lost your account information, send a blank e-mail to cco-locksmith@cisco.com. An automatic check will verify that your e-mail address is registered with Cisco.com. If the check is successful, account details with a new random password will be e-mailed to you. Qualified users can establish an account on Cisco.com by following the directions found at this URL:
http://tools.cisco.com/RPF/register/register.do
Limitations and Restrictions
Attribute 104 increases the processing load on the route switch controller (RSC). Cisco IOS Release 12.2(15)ZK4 supports 40 percent of the maximum published total number of calls when running Attribute 104. Each Attribute 104 call can have up to 25 private routes.
Important Notes
The following sections contain important notes about Cisco IOS Release 12.2(15)ZK4 that can apply to the Cisco AS5400 universal gateway.
Field Notices and Bulletins
For general information about the types of documents listed in this section, refer to the following document:
http://www.cisco.com/warp/customer/cc/general/bulletin/software/general/1654_pp.htm
•
Field Notices—Cisco recommends that you view the field notices for this release to see if your software or hardware platforms are affected. If you have an account on Cisco.com, you can find field notices at http://www.cisco.com/warp/customer/tech_tips/index/fn.html. If you do not have a Cisco.com login account, you can find field notices at http://www.cisco.com/warp/public/tech_tips/index/fn.html.
•
Product Bulletins—If you have an account on Cisco.com, you can find product bulletins at http://www.cisco.com/warp/customer/cc/general/bulletin/index.shtml. If you do not have a Cisco.com login account, you can find product bulletins at http://www.cisco.com/warp/public/cc/general/bulletin/iosw/index.shtml.
•
What's New for IOS—What's New for IOS lists recently posted Cisco IOS software releases and software releases that have been removed from Cisco.com. If you have an account on Cisco.com, you can access What's New for IOS at http://www.cisco.com/kobayashi/sw-center/sw-ios.shtml or by logging into Cisco.com and selecting Technical Support: Software Center: Products and Downloads: Cisco IOS Software.
Caveats for Cisco IOS Release 12.2(15)ZK
Caveats describe unexpected behavior in Cisco IOS software releases. Severity 1 caveats are the most serious caveats; severity 2 caveats are less serious. Severity 3 caveats are moderate caveats, and only select severity 3 caveats are included in the caveats document.
This section contains open and resolved caveats for the current Cisco IOS maintenance release.
All caveats in Cisco IOS Release 12.2 and Cisco IOS Release 12.2 T that apply to the Cisco AS5400 universal gateway are also in Cisco IOS Release 12.2(15)ZK4.
For information on caveats in Cisco IOS Release 12.2, see Caveats for Cisco IOS Release 12.2.
For information on caveats in Cisco IOS Release 12.2 T, see Caveats for Cisco IOS Release 12.2 T, which lists severity 1 and 2 caveats and select severity 3 caveats and is located on Cisco.com and the Documentation CD-ROM.
![]()
Note
If you have an account on Cisco.com, you can also use the Bug Toolkit to find select caveats of any severity. To reach the Bug Toolkit, log in to Cisco.com and click Products and Services: Cisco IOS Software: Cisco IOS Software Releases 12.2: Troubleshooting: Bug Toolkit. Another option is to go to http://www.cisco.com/cgi-bin/Support/Bugtool/launch_bugtool.pl.
Open Caveats—Cisco IOS Release 12.2(15)ZK5
There are no open caveats specific to Cisco IOS Release 12.2(15)ZK5 that require documentation in the release notes.
Resolved Caveats—Cisco IOS Release 12.2(15)ZK5
All the caveats listed in this section are resolved in Cisco IOS Release 12.2(15)ZK5 and describes only severity 1 and 2 caveats and select severity 3 caveats.
Open Caveats—Cisco IOS Release 12.2(15)ZK4
This section documents possible unexpected behavior by Cisco IOS Release 12.2(15)ZK4 and describes only severity 1 and 2 caveats and select severity 3 caveats.
Resolved Caveats—Cisco IOS Release 12.2(15)ZK4
All the caveats listed in this section are resolved in Cisco IOS Release 12.2(15)ZK4 and describes only severity 1 and 2 caveats and select severity 3 caveats.
Table 8 Resolved Caveats for Cisco IOS Release 12.2(15)ZK4
DDTS ID Number DescriptionCSCdu53656
A Cisco device running IOS and enabled for the Border Gateway Protocol (BGP) is vulnerable to a Denial of Service (DOS) attack from a malformed BGP packet. The BGP protocol is not enabled by default, and must be configured in order to accept traffic from an explicitly defined peer. Unless the malicious traffic appears to be sourced from a configured, trusted peer, it would be difficult to inject a malformed packet. BGP MD5 is a valid workaround for this problem.
Cisco has made free software available to address this problem. For more details, please refer to this advisory, available at http://www.cisco.com/warp/public/707/cisco-sa-20040616-bgp.shtml.
CSCea28131
A Cisco device running IOS and enabled for the Border Gateway Protocol (BGP) is vulnerable to a Denial of Service (DOS) attack from a malformed BGP packet. The BGP protocol is not enabled by default, and must be configured in order to accept traffic from an explicitly defined peer. Unless the malicious traffic appears to be sourced from a configured, trusted peer, it would be difficult to inject a malformed packet. BGP MD5 is a valid workaround for this problem.
Cisco has made free software available to address this problem. For more details, please refer to this advisory, available at http://www.cisco.com/warp/public/707/cisco-sa-20040616-bgp.shtml.
CSCed09146
Unwanted Extra STOP record seen for calls failing on authentication
Symptoms: Extra network Accounting STOP record may be seen when an async call fails on authentication. These are unwanted records and should not be generated.
Conditions: Seen for an Async call on 5300-T1 platform running 12.3(5.8) This problem was seen quite often and its may not be completely reproducible at will. This could be service affecting .
Workaround: there is no workaround at this time.
CSCed27956
TCP checks should verify ack sequence number
A vulnerability in the Transmission Control Protocol (TCP) specification (RFC793) has been discovered by an external researcher. The successful exploitation enables an adversary to reset any established TCP connection in a much shorter time than was previously discussed publicly. Depending on the application, the connection may get automatically re-established. In other cases, a user will have to repeat the action (for example, open a new Telnet or SSH session). Depending upon the attacked protocol, a successful attack may have additional consequences beyond terminated connection which must be considered. This attack vector is only applicable to the sessions which are terminating on a device (such as a router, switch, or computer) and not to the sessions that are only passing through the device (for example, transit traffic that is being routed by a router). In addition, this attack vector does not directly compromise data integrity or confidentiality.
All Cisco products which contain TCP stack are susceptible to this vulnerability.
This advisory is available at http://www.cisco.com/warp/public/707/cisco-sa-20040420-tcp-ios.shtml, and it describes this vulnerability as it applies to Cisco products that run Cisco IOS® software.
A companion advisory that describes this vulnerability for products that do not run Cisco IOS software is available at http://www.cisco.com/warp/public/707/cisco-sa-20040420-tcp-nonios.shtml.
CSCed38527
TCP checks should verify ack sequence number
A vulnerability in the Transmission Control Protocol (TCP) specification (RFC793) has been discovered by an external researcher. The successful exploitation enables an adversary to reset any established TCP connection in a much shorter time than was previously discussed publicly. Depending on the application, the connection may get automatically re-established. In other cases, a user will have to repeat the action (for example, open a new Telnet or SSH session). Depending upon the attacked protocol, a successful attack may have additional consequences beyond terminated connection which must be considered. This attack vector is only applicable to the sessions which are terminating on a device (such as a router, switch, or computer) and not to the sessions that are only passing through the device (for example, transit traffic that is being routed by a router). In addition, this attack vector does not directly compromise data integrity or confidentiality.
All Cisco products which contain TCP stack are susceptible to this vulnerability.
This advisory is available at http://www.cisco.com/warp/public/707/cisco-sa-20040420-tcp-ios.shtml, and it describes this vulnerability as it applies to Cisco products that run Cisco IOS® software.
A companion advisory that describes this vulnerability for products that do not run Cisco IOS software is available at http://www.cisco.com/warp/public/707/cisco-sa-20040420-tcp-nonios.shtml.
Open Caveats—Cisco IOS Release 12.2(15)ZK3
This section documents possible unexpected behavior by Cisco IOS Release 12.2(15)ZK3 and describes only severity 1 and 2 caveats and select severity 3 caveats.
Resolved Caveats—Cisco IOS Release 12.2(15)ZK3
All the caveats listed in this section are resolved in Cisco IOS Release 12.2(15)ZK3 and describes only severity 1 and 2 caveats and select severity 3 caveats.
Open Caveats—Cisco IOS Release 12.2(15)ZK2
This section documents possible unexpected behavior by Cisco IOS Release 12.2(15)ZK2 and describes only severity 1 and 2 caveats and select severity 3 caveats.
Resolved Caveats—Cisco IOS Release 12.2(15)ZK2
All the caveats listed in this section are resolved in Cisco IOS Release 12.2(15)ZK2 and describes only severity 1 and 2 caveats and select severity 3 caveats.
Table 12 Resolved Caveats for Cisco IOS Release 12.2(15)ZK2
DDTS ID Number DescriptionCSCdy32346
Calltracker displays MLPPP calls as PPP.
Symptoms: Calltracker records currently display the service type as PPP instead of multilink PPP (MLPPP).
Workaround: There is no workaround.
CSCea28285
Attribute[61] shows Virtual with Tcp-clear calls
Symptoms: Attribute [61], Nas-Port-Type shows "Virtual" with TCP-Clear calls. This may affect service.
Workaround: There is no workaround.
CSCeb62876
No AAA accounting gigawords in not functioning correctly
Symptoms: After turning off the aaa accounting gigawords command and rebooting the router, it continues to send 64-bit counters in accounting records. These counters also are invalid.
Workaround: There is no workaround.
CSCec06617
Getting two Acco. Stop Records when a telnet connection times out
Symptoms: Configure the router to send accounting start and stop records for an EXEC connection and configure the command aaa accounting send stop-record authen fail.
Telnet to the router from any other router. Do not enter anything when the router prompts you to enter a username. After some time, the session times out and prompts "[Connection to <IP Addr> closed by foreign host]".
When the Telnet connection times out, two accounting stop records are generated.
Workaround: There is no workaround.
CSCec16481
A Cisco device running Internetwork Operating System (IOS) and enabled for the Open Shortest Path First (OSPF) Protocol is vulnerable to a Denial of Service (DoS) attack from a malformed OSPF packet. The OSPF protocol is not enabled by default.
The vulnerability is only present in IOS release trains based on 12.0S, 12.2, and 12.3. Releases based on 12.0, 12.1 mainlines and all IOS images prior to 12.0 are not affected. Refer to the Security Advisory for a complete list of affected release trains.
Further details and the workarounds to mitigate the effects are explained in the Security Advisory which is available at the following URL:
http://www.cisco.com/warp/public/707/cisco-sa-20040818-ospf.shtml.
CSCec29993
Add RXTYPE_PPPOE to as5400_scattered_fs_protocol - if_as5400_amdp2.h
Symptoms: Particles are coalesce when they are CEF switched, because PPPoE is not in the list eligible fast switch protocols.
Conditions: This happens for packets passing through PPPoE tunnel.
Workaround: There is no workaround.
CSCec31161
Outgoing LSDO call not forwarded to other SGBP peer if T1s are down
Symptoms: Outgoing large scale dial out (LSDO) calls may not be forwarded to other Stack Group Bidding Protocol (SGBP) members from a NAS which has all the trunks down. This happens with an SGBP configuration only when NAS is running Cisco IOS Release 12.2(15)T2.
Workaround: There is no workaround.
CSCin52071
L2TP sess cannot be established as PPP says Lower Layer not up
Symptoms: Virtual private dialup network (VPDN) sessions cannot be established at the Layer 2 Tunneling Protocol (L2TP) network server (LNS).
Conditions: This symptom is observed on a Cisco LNS that is running Cisco IOS Release 12.3 because PPP does not allow packets to be processed. The following debug message appears:
195: ppp4 LCP: Lower layer not up, discarding packetWorkaround: There is no workaround.
Open Caveats—Cisco IOS Release 12.2(15)ZK1
This section documents possible unexpected behavior by Cisco IOS Release 12.2(15)ZK1 and describes only severity 1 and 2 caveats and select severity 3 caveats.
Resolved Caveats—Cisco IOS Release 12.2(15)ZK1
All the caveats listed in this section are resolved in Cisco IOS Release 12.2(15)ZK1 and describes only severity 1 and 2 caveats and select severity 3 caveats.
Open Caveats—Cisco IOS Release 12.2(15)ZK
This section documents possible unexpected behavior by Cisco IOS Release 12.2(15)ZK and describes only severity 1 and 2 caveats and select severity 3 caveats.
Resolved Caveats—Cisco IOS Release 12.2(15)ZK
All the caveats listed in this section are resolved in Cisco IOS Release 12.2(15)ZK and describes only severity 1 and 2 caveats and select severity 3 caveats.
![]()