Specifications

11
Caveats for Cisco IOS Release 12.0
78-6455-12
Miscellaneous
CSCds38006
Unicast traffic fails on a specified interface when the ip mroute-cache command in interface
configuration mode is used.
Example:
interface FastEthernet3/0/0 ip address 4.4.4.4 255.255.255.0 ip pim sparse-dense-mode
ip route-cache distributed ip mroute-cache distributed
ping 4.4.4.5
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 4.4.4.5, timeout is 2 seconds: ..... Success rate is
0 percent (0/5)
Workaround: Disable multicast distributed switching at interface. Use multicast fast switching
instead.
CSCds38187
A Cisco router may appear to fast-switch multicast traffic. When the router is configured for
distributed switching, the following command output is produced:
! interface FastEthernet3/0/0 ip address 4.4.4.4 255.255.255.0 ip pim sparse-dense-mode
no ip route-cache distributed ip mroute-cache distributed
wac-7513#sh int fa3/0/0 stat FastEthernet3/0/0 Switching path Pkts In Chars In Pkts Out
Chars Out Processor 3192 408632 13005 1188753 Route cache 0 0 32400 3693600 Distributed
cache 0 0 0 0 Total 3192 408632 45405 4882353
Continue to fast-switch until a Cisco IOS upgrade release is available.
There is no workaround.
CSCds39835
After interface flap, the Open Shortest Path First (OSPF) state for the interface may remain down.
This condition can be seen through the show ip ospf EXEC command.
Workaround: Restart the OSPF process.
CSCds41217
On Cisco 7507 and 7206 routers running Cisco IOS Release 12.0.12, Open Shortest Path First
(OSPF) shows the neighbor as full, but pinging the neighbor that shows up with “full” status under
show ip ospf neighbor EXEC command, comes back with 20 to 50 percent packet loss. The
neighbor is connected to the core router via an ATM link. The core router is the router that has the
problem. Other neighbors on the router do not display the same symptom; only the two routers on
the ATM0/0/0.1 & ATM0/0/0.2 of the cCore0.msp have this problem.
There is no workaround.
Miscellaneous
CSCdj88434
A router may reload when bad packets, whose datagram size is smaller than the IP total length
carried in the IP header, are received by the router and also classified for encryption. This situation
affects Cisco Encryption Technology (CET) only; it does not affect IP Security (IPSec).
Workaround: Upgrade to Cisco IOS Release 12.1(4).