
488
Caveats for Cisco IOS Release 12.2(33)SRD through 12.2(33)SRD8
OL-10394-05 Rev. R0
• CSCsu89656
Symptoms: A router may reload when a user reconfigures ATM AToM VP.
Conditions: There is slim timing window that the router may reload when a user issues the
commands to reconfigure the ATM VP.
Workaround: There is no workaround.
• CSCsu92300
Symptoms: After the IP address of the loopback interface at the PE router is changed, some Mroute
entries are in a pruned state.
Conditions: The symptom is observed after changing the IP address of the loopback interface which
is configured as the source interface for an MDT tunnel.
Workaround: Use the clear ip /jointfilesconvert/422273/bgp * command.
• CSCsu96698
Symptoms: More specific routes are advertised and withdrawn later even if config
aggregate-address net mask summary-only is configured. The BGP table shows the specific
prefixes as suppressed with s>
Conditions: This occurs only with very large configurations.
Workaround: Configure a distribute-list in BGP process that denies all of the aggregation child
routes.
• CSCsu99270
Symptoms: A Cisco Catalyst 6500 system running with VPNSPA in crypto-connect mode may see
high CPU utilization on the RP. Generally, high CPU will be associated with the ARP input process.
Conditions: The symptom will be seen when the VPNSPA is configured to be in crypto-connect
mode.
Workaround: There is no workaround.
Further Problem Description: The problem can be verified by running the command show crypto
vlan, noting down the port-VLAN (for example: Vlan 710, hex 2C6), logging into the switch remote
log switch and running the command test mcast ltl index Cxxx, where xxx is the hex-value of the
port-VLAN (in this case, C2C6).
If the command shows the RP as part of this LTL index and there is high CPU utilization then it is
possible that you are hitting this issue. If this issue is suspected then you should also determine what
packets are hitting the route-processor.
• CSCsv09467
Symptoms: Router crashes when interface is defaulted with port-security sticky MAC address
configured.
Conditions: The symptom is observed under the following conditions:
1. On a router that is running Cisco IOS Release 12.2(33)SRD.
2. . “Switchport” is configured with port-security and sticky MAC address:
interface <>
switchport
switchport mode access
switchport access vlan <>
switchport port-security
switchport port-security mac-address sticky
Komentáře k této Příručce