Полезная информация

cc/td/doc/product/software/ios120/relnote
hometocprevnextglossaryfeedbacksearchhelp
PDF

Table of Contents

Release Notes for the Cisco 1700 Series Routers for Cisco  IOS  Release  12.0 T

Release Notes for the Cisco 1700 Series Routers for Cisco  IOS  Release  12.0 T

January 11, 1999

These release notes describe the new features and significant software components for Cisco  IOS Release 12.0 T, up to and including Release 12.0(2)T, for Cisco 1700 series routers. These release notes contain information about Cisco Release 12.0 T Early Deployment (ED) software, which should always be tried in a test network before being deployed in a production network. To maximize network operational stability, use a Release 12.0 mainline software release only.


Note The Cisco 1700 series routers support a subset of the Cisco IOS features described in these release notes. The Cisco IOS features that are available for the Cisco 1700 series routers are listed in the section "Cisco IOS Feature Sets for Cisco 1700 Series Routers".

Contents

These release notes discuss the following topics:

System Requirements

This section describes the system requirements for Release 12.0(2)T and includes the following sections:

Memory Requirements

Table 1 describes the memory requirements for the Cisco IOS feature sets supported by Cisco IOS Release 12.0(2)T on Cisco 1700 series routers.

Table 1: Release 12.0 Memory Requirements for Cisco 1700 Routers
Platform/Feature Set Image Name Minimum Required Code Memory Required Main Memory Release 12.0 Runs from

IP

c1700-y-mz

4 MB Flash

16 MB DRAM

RAM

IP Plus

c1700-sy-mz

4 MB Flash

16 MB DRAM

RAM

IP Plus 40

c1700-sy40-mz

4 MB Flash

16 MB DRAM

RAM

IP Plus 56

c1700-sy56-mz

4 MB Flash

20 MB DRAM

RAM

IP/IPX

c1700-ny-mz

4 MB Flash

16 MB DRAM

RAM

IP/IPX/AT/IBM

c1700-bnr2y-mz

4 MB Flash

20 MB DRAM

RAM

IP Plus/IPX/AT/IBM

c1700-bnr2sy-mz

8 MB Flash

24 MB DRAM

RAM

IP/Firewall

c1700-oy-mz

4 MB Flash

16 MB DRAM

RAM

IP/Firewall Plus IPSEC 56

c1700-osy56i-mz

4 MB Flash

20 MB DRAM

RAM

IP/IPX/Firewall Plus

c1700-nosy-mz

4 MB Flash

20 MB DRAM

RAM

IP/IPX/AT/IBM/Firewall Plus IPSEC 56

c1700-bnor2sy56i-mz

8 MB Flash

24 MB DRAM

RAM

IP Plus IPSEC 3DES

c1700-k2sy-mz

4 MB Flash

20 MB DRAM

RAM

IP/Firewall Plus IPSEC 3DES

c1700-k2osy-mz

4 MB Flash

20 MB DRAM

RAM

IP/IPX/AT/IBM/Firewall Plus IPSEC 3DES

c1700-bk2nor2sy-mz

8 MB Flash

24 MB DRAM

RAM

Cisco 1720 Router

The Cisco 1720 router extends the leadership established by Cisco's 1700 series routers for small businesses and small branch offices, offering more functionality and flexibility for higher-end applications. In addition to meeting the needs of Internet and intranet access, the Cisco 1720 router offers the following key advantages:

The Cisco 1720 router offers the following key components:

The flexible Cisco 1720 router supports any combination of one or two of the following WAN interface cards:

These WAN interface cards are shared with the Cisco 1600, 2600, and 3600 routers.

Determining Your Cisco IOS Software Release

To view the version of Cisco IOS software that is running on your Cisco 1700 series router, log in to the router, and enter the show version user EXEC command:

router> show version
 

Output from the command is displayed in the second line, as follows:

Cisco Internetwork Operating System Software 
IOS (tm) 1700 Software (C1700-NOSY-MZ), Version 12.0(2)T, RELEASE SOFTWARE
 

Additional command output lines include more information, such as:

Cisco IOS Feature Sets for Cisco  1700 Series Routers

The Cisco  IOS software is packaged into "feature sets" (also called "software images"). There are many different feature sets available, and each feature set contains a specific subset of Cisco  IOS features. The following list shows which feature sets are supported on the Cisco 1600 series routers and access servers. These feature sets only apply to Cisco  IOS Release  12.0(2)T:

Feature Set Tables

To determine what features are available with each feature set (software image), see Table 2. The table summarizes the features you can use when running a specific feature set on the Cisco 1700 series routers for Cisco IOS Release 12.0(2)T. The feature set table uses the following symbol conventions to identify features:


Note This feature set table lists only new features. This table is not a cumulative or complete representation of all the features in each image. For a full list of all the features available in each image, refer to the Cisco Product Catalog.


Table 2: Cisco IOS Software Feature Sets for the Cisco 1700 Routers, Part 1
Feature Set
Features IP IP Plus IP Plus 40 IP Plus 56 IP/FW IP/FW Plus IPSec 56
IBM Support

Bridging Code Rework

Yes

Yes

Yes

Yes

Yes

Yes

IP Routing

IP Type of Service and Precedence for GRE Tunnels

Yes

Yes

Yes

Yes

Yes

No

OSPF Point to Multipoint

Yes

Yes

Yes

Yes

Yes

Yes

Management

Cisco IOS File System

Yes

Yes

Yes

Yes

Yes

Yes

Entity MIB

Yes

Yes

Yes

Yes

Yes

Yes

Expression MIB

Yes

Yes

Yes

Yes

Yes

Yes

Conditionally Triggered Debugging

Yes

Yes

Yes

Yes

Yes

Yes

Multimedia

Protocol-Independent Multicasts Version 2

Yes

Yes

Yes

Yes

Yes

Yes

WAN Services

Always On/Direct ISDN

Yes

Yes

Yes

Yes

Yes

Yes

Dialer Watch

Yes

Yes

Yes

Yes

Yes

Yes

MPPC-MS PPP Compression

Yes

Yes

Yes

Yes

Yes

Yes

MS Callback

Yes

Yes

Yes

Yes

Yes

Yes

VPDN MIB Feature

No

Yes

Yes

Yes

No

Yes


Table 3: Cisco IOS Software Feature Sets for the Cisco 1700 Routers, Part 2
Feature Set
Features IP/IPX IP/IPX/
FW Plus
IP/IPX/
AT/IBM
IP/IPX/
AT/IBM/FW Plus IPSec 56
IP Plus IPSec 3DES IP/FW Plus IPSec 3DES IP/IPX/
AT/IBM/FW Plus IPSec 3DES
IBM Support

Bridging Code Rework

Yes

Yes

Yes

Yes

Yes

Yes

Yes

IP Routing

IP Type of Service and Precedence for GRE Tunnels

Yes

Yes

Yes

Yes

Yes

Yes

Yes

OSPF Point to Multipoint

Yes

Yes

Yes

Yes

Yes

Yes

Yes

Management

Cisco IOS File System

Yes

Yes

Yes

Yes

Yes

Yes

Yes

Entity MIB

Yes

Yes

Yes

Yes

Yes

Yes

Yes

Expression MIB

Yes

Yes

Yes

Yes

Yes

Yes

Yes

Conditionally Triggered Debugging

Yes

Yes

Yes

Yes

Yes

Yes

Yes

Multimedia

Protocol-Independent Multicasts Version 2

Yes

Yes

Yes

Yes

Yes

Yes

Yes

WAN Services

Always On/Direct ISDN

Yes

Yes

Yes

Yes

Yes

Yes

Yes

Dialer Watch

Yes

Yes

Yes

Yes

Yes

Yes

Yes

MPPC-MS PPP Compression

Yes

Yes

Yes

Yes

Yes

Yes

Yes

MS Callback

Yes

Yes

Yes

Yes

Yes

Yes

Yes

VPDN MIB Feature

No

Yes

No

Yes

Yes

Yes

Yes

New and Changed Information

The following sections list the new features supported by the Cisco 1700 series routers in Cisco IOS Release 12.0(2)T.

New Hardware Features in Release 12.0(2)T

This section describes the new hardware supported only in Release 12.0(2)T and above. For more information about new hardware, see the section titled "Hardware Documents."

Support for Cisco 1720

Cisco IOS Release 12.0(2)T includes support for the Cisco 1720 router.

New Software Features in Release 12.0(2)T

There are no new software features in release 12.0(2)T.

New Software Features in Release 12.0(1)T

This section describes the new software features available only in Release 12.0(1)T and above. For more information about configuring the following new features, from CCO go to Cisco Product Documentation, select Cisco IOS Software Configuration, click Cisco IOS Release 12.0, select Cisco IOS 12.0 T New Features, and then click 12.0(1)T New Features. This information is also available on the Documentation CD-ROM.

The following subjects are included in this section:

RSM/TR-VLAN

The Token Ring VLAN support on the Route Switch Module (RSM) enables a Catalyst 5000 switch to provide the functionality of bridging and multi-protocol routing for Token Ring VLANs. The installation of an RSM in a Catalyst 5000 supplements the existing switching capabilities with the functionality of a standalone router that performs inter-VLAN routing and bridging. If the Token Ring RSM is associated with a VIP2 board, it provides direct external network connections through a variety of media using the standard port adapters on the VIP2 and offers functionality similar to a Cisco 7500 series router.

The RSM module can either route or bridge Token Ring packets, thereby functioning as a router or as a bridge. In Cisco IOS Release 12.0(1) T, both APPN and DLSW+ are supported on the RSM's Token Ring VLANs. RSRB, however, is not supported on the RSM.

IOS IEEE 802.1Q Support

Cisco IOS IEEE 802.1Q provides support for IEEE 802.1Q encapsulation for Virtual LANs (VLANs). Use this feature for VLANs consisting of IEEE 802.1Q compliant switches.

Mobile IP

Mobile IP provides users the freedom to roam beyond their home subnet while consistently maintaining their home IP address. This enables transparent routing of IP datagrams to mobile users during their movement, so that data sessions can be initiated to them while they roam; it also enables sessions to be maintained in spite of physical movement between points of attachment to the Internet or other networks. Cisco's implementation of Mobile IP is fully compliant with the Internet Engineering Task Force's (IETF's) proposed standard defined in Request for Comments (RFC)    2002.

Easy IP Phase 2-DHCP Server

With the introduction of Easy IP Phase 2, Cisco IOS software also supports Intelligent DHCP Relay functionality. A DHCP Relay Agent is any host that forwards DHCP packets between clients and servers. A DHCP Relay Agent enables the client and server to reside on separate subnets. If the Cisco IOS DHCP server cannot satisfy a DHCP request from its own database, it can forward the DHCP request to one or more secondary DHCP servers defined by the network administrator using standard Cisco IOS ip helper-address functionality.

Smart-init (Mars FE2P)

The smart-init feature is an extension to the existing memory split program of the Cisco IOS software running on Cisco 3600 series routers. It computes iomem size by looking at the network modules installed in the system and uses this iomem for carrying out the memory split. Also, compatibility with older IOS configurations is maintained by retaining support for the memory-size configuration command. The user can disable smart-init and set iomem percentage to the required value by issuing the memory-size configuration command.

OSPF Packet Pacing

The former OSPF implementation for sending update packets needed to be more efficient. Some update packets were getting lost in cases where the link was slow, a neighbor could not receive the updates fast enough, or the router was out of buffer space. For example, packets might be dropped if either of these topologies existed:

OSPF update packets are now automatically paced by a delay of 33 milliseconds. Pacing is also added between retransmissions to increase efficiency and minimize lost retransmissions.

OSPF update and retransmission packets are sent more efficiently. Also, you can display the LSAs waiting to be sent out an interface.

Time-Based Access Lists

It is now possible to implement access lists based on the time of day. To do so, you create a time range that defines specific times of the day and week. The time range is identified by a name, and then referenced by a function, so that those time restrictions are imposed on the function itself.

Currently, IP and IPX extended access lists are the only functions that can use time ranges. The time range allows the network administrator to define when the permit or deny statements in the access list are in effect. Prior to this feature, access list statements were always in effect once they were applied. Both named or numbered access lists can reference a time range.

RIP Enhancements

Triggered extensions to IP RIP increase efficiency of RIP on point-to-point, serial interfaces.

Routers are used on connection-oriented networks to allow potential connectivity to many remote destinations. Circuits on the WAN are established on demand and are relinquished when the traffic subsides. Depending on the application, the connection between any two sites for user data could be short and relatively infrequent.

There were two problems using RIP to connect to a WAN:

To overcome these limitations, triggered extensions to RIP cause RIP to send information on the WAN only when there has been an update to the routing database. Periodic update packets are suppressed over the interface on which this feature is enabled.

Cisco IOS Firewall Feature Set Platform Support

The Cisco IOS Firewall feature set is now available on 2600 and 3600 series products.

The Cisco IOS Firewall feature set extends the security technology currently available in Cisco IOS software to provide firewall specific capabilities:

The Cisco IOS Firewall feature set adds advanced filtering capabilities to existing security functionality in Cisco routers. Some existing Cisco IOS security features include packet filtering via access control lists (ACLs), Network Address Translation (NAT), network-layer encryption, and TACACS+ authentication.

ISDN MIB RFC2127

The new Integrated Services Digital Network (ISDN) Management Information Base (MIB) RFC2127 has been designed to provide useful information in accordance with the IETF's new standard for the management of ISDN interfaces. It controls all aspects of ISDN interfaces. RFC2127 provides information on the physical Basic Rate Interfaces (BRIs), control and statistical information for B (bearer) and D (signaling) channels, terminal endpoints, and directory numbers.

IOS STP Enhancements

IOS Spanning Tree Protocol enhancements broaden the original IOS STP implementation with increased port identification capability, improved path cost determination, and support for a new VLAN bridge spanning-tree protocol.

Layer Two Tunneling Protocol (L2TP)

Layer Two Tunneling Protocol (L2TP) is an emerging Internet Engineering Task Force (IETF) standard that combines the best features of two existing tunneling protocols: Cisco's Layer Two Forwarding (L2F) and Microsoft's Point-to-Point Tunneling Protocol (PPTP). L2TP is an extension to the Point-to-Point Protocol (PPP), which is an important component for Access Virtual Private Networks (VPNs). Access VPNs allow mobile users to connect to their corporate intranets or extranets, thus improving flexibility and reducing costs.

Traditional dial-up networking services only supported registered IP address, which limited the types of applications that could be implemented over Virtual Private Networks (VPNs). L2TP supports multiple protocols and unregistered and privately administered IP addresses over the Internet. This allows the existing access infrastructure, such as the Internet, modems, access servers, and ISDN terminal adaptors (TAs), to be used.

L2TP can be initiated wherever PPTP or L2F is currently deployed and can be operated as a client initiated tunnel, such as PPTP, or a network access server (NAS) initiated tunnel, such as L2F.

PPP Over Frame Relay

The PPP over Frame Relay feature allows a router to establish end-to-end Point-to-Point Protocol (PPP) sessions over Frame Relay. IP datagrams are transported over the PPP link using RFC 1973 compliant Frame Relay framing. This feature is useful for remote users running PPP to access their Frame Relay corporate networks.

PPP over Frame Relay provides the following benefits:

IETF Compliant PPP over ATM Scalability

Point-to-Point Protocol (PPP) over Asynchronous Transfer Mode (ATM) is now available on an ATM CES port adapter in a Cisco 7200-series router.

In previous releases of PPP over ATM, you configured permanent virtual circuits (PVCs) for PPP over ATM on point-to-point subinterfaces. In this release, each PPP over ATM connection no longer requires two interfaces, a virtual access interface and ATM subinterface. Instead, you can configure multiple PVCs for PPP over ATM on multipoint subinterfaces, thereby providing a significant increase in the number of PPP over ATM sessions per router. Also in this release, PPP over ATM is enhanced to support virtual circuit (VC) multiplexed encapsulation and complies with the Internet Engineering Task Force (IETF) draft on multiplexed encapsulation titled PPP over AAL5. The previous version of PPP over ATM supported only the Frame Forwarding data encapsulation (aal5ciscoppp).


Note The IETF PPP over ATM feature does not currently support LLC encapsulated PPP over ATM Adaptation Layer 5 (AAL5).

This release of the PPP over ATM feature provides support for IETF-compliant PPP over ATM and significantly increases the maximum number of PPP over ATM sessions running on a router. The maximum number of PPP over ATM sessions supported on a platform depends on available system resources such as memory and CPU speed.

Data Compression Advanced Interface Module

This document describes how to configure, verify, and troubleshoot the Data Compression features of the Advanced Interface Module (AIM) on Cisco 2600 Series Routers. The Data Compression AIM provides hardware-based compression and decompression of packet data transmitted and received on the serial network interfaces of Cisco 2600 Series Routers without occupying the Port Module Slot, that might otherwise be used for additional customer network ports. Supported are the industry standard LZS and MPPC compression algorithms. The Data Compression AIM requires Cisco IOS Release 12.0(1) T, or later 12.0 T releases.

ATM PVC Trap Support

The ATM PVC Trap Support feature provides Simple Network Management Protocol (SNMP) notification for permanent virtual circuit (PVC) failures, and it provides SNMP access to PVC status tables.

Normally, a management station is not notified when an Asynchronous Transfer Mode (ATM) PVC goes down. The ATM PVC Trap Support feature enables an agent to send the required PVC traps for this notification. It also provides support for these PVC status tables: atmCurrentlyFailingPVclTable and atmInterfaceExtTable.

Upgrading to a New Software Release

If you are upgrading to Cisco IOS Release 12.0 from an earlier Cisco IOS software release, you should save your current configuration file before configuring your access server with the Cisco IOS Release 12.0 T software. An unrecoverable error could occur during download or configuration.

Before downloading a software upgrade, read Product Bulletin #703, Cisco  IOS Software Release Upgrade Paths and Packaging Simplification. The information in this bulletin supersedes all previous instructions. This bulletin is in the following locations on CCO:

Caveats

This section contains the open caveats for the current Cisco IOS maintenance release only. The software caveats are also located in the Caveats for Cisco IOS Release 12.0 T document that accompanies these release notes.The caveats document is located on CCO and the Documentation CD-ROM.

If you have an account with CCO, you can use Bug Navigator II to find caveats of any severity for any release. Bug Navigator II is at http://www.cisco.com/support/bugtools, or from CCO, select Software & Support: Technical Tools: Bug Toolkit II

Open Caveats---12.0(2)T

This section describes possibly unexpected behavior by Release 12.0(2)T. This section describes only severity 1 and 2 caveats.

Basic System Services

The [no] atm rmon collect group-num command does not properly take effect when invoked. The ATM-RMON feature (available only on the LS-1010 platform) is fully functional, except when you assign ATM interfaces to ATM-RMON collection groups. In this situation, you must set the associated MIB objects with SNMP. See the portSelTable definitions in the ATM-RMON-MIB.my MIB document for more information. There is no workaround.

IP Routing Protocols

When you use sparse-mode PIM multicast, the multicast tree may take a few minutes to stabilize after the routers are booted. During this period, "PATH" messages sent to multicast addresses are not delivered, and RSVP path and reservation sessions are not established. This is a transient phenomenon that occurs only when the routers are being booted. Once the multicast tree stabilizes, paths and reservations are established quickly. This problem does not occur in unicast or dense-mode multicast networks.
Workaround: Use sparse-dense or dense mode PIM multicast, if possible.

Miscellaneous

The Token Ring Inter-Switch Link (TR-ISL) feature is currently not supported on either the Cisco  3620  router or the Cisco  3640  router. There is no workaround.
If flow-acceleration is enabled, then disabled, and encryption is subsequently enabled, the router may unexpectedly reload.
Workaround: Avoid enabling and then disabling flow-acceleration.
The IP portion of an incoming call might not terminate correctly if the caller closes the connection. This situation is the result of rare timing conditions. There is no workaround.
A Cisco  1600  router or Cisco  3600  series  router will reload when IPSEC is configured over the ISDN link. This condition is caused by the IP route-cache that is enabled by default on all interfaces.
Workaround: turn off fast switching with the no ip route-cache command on the ISDN interfaces.
If a User Datagram Protocol (UDP) packet with an invalid length is sent to port 514 (the "syslog" port) on an IOS device, the device is likely to reload. In this situation, a stack trace might not be saved. Such packets are sent by the popular nmap port scanning program.
Workaround:
You can work around this vulnerability by preventing any affected Cisco IOS device from receiving or processing UDP datagrams addressed to its port 514. This can be done either using packet filtering on surrounding devices, or by using input access list filtering on the affected IOS device itself. Input access lists have an impact on system performance, and should be installed with a degree of caution, especially on systems that are running very near their capacity limits.
If you use an input access list, that list should be applied to all interfaces to which attackers may be able to send datagrams. This includes not only physical LAN and WAN interfaces, but virtual subinterfaces of those physical interfaces, as well as virtual interfaces and/or interface templates corresponding to GRE, L2TP, L2F, and other tunnelling protocols.
The input access list must block traffic destined for any of the Cisco IOS device's own IP addresses, as well as for any broadcast or multicast addresses on which the Cisco IOS device may be listening. It's important to remember to block old-style "all-zeroes" broadcasts as well as new-style "all-ones" broadcasts.
There is no single input access list that will work in all configurations. It is very important that you understand the effect of your access list in your specific configuration before you activate
the list.
The following example shows a possible access list for a three-interface router, along with the configuration commands needed to apply that access list. The example assumes no need for input filtering other than as a workaround for this vulnerability.
      ! Deny all multicasts, and all unspecified-net broadcasts, to port 514
      access-list 101 deny udp any 224.0.0.0 31.255.255.255 eq 514
      ! Deny old-style unspecified-net broadcasts
      access-list 101 deny udp any host 0.0.0.0 eq 514
      ! Deny network-specific broadcasts. This example assumes that all of
      ! the local interfaces are on the class B network 172.16.0.0, subnetted
      ! everywhere with mask 255.255.255.0. This will differ from network
      ! to network. Note that we block both new-style and old-style broadcasts.
      access-list 101 deny udp any 172.16.0.255 0.0.255.0 eq 514
      access-list 101 deny udp any 172.16.0.0   0.0.255.0 eq 514
      ! Deny packets sent to the addresses of our own network interfaces.
      access-list 101 deny udp any host 172.16.1.1 eq 514
      access-list 101 deny udp any host 172.16.2.1 eq 514
      access-list 101 deny udp any host 172.16.3.3 eq 514
      ! Permit all other traffic (default would be to deny)
      access-list 101 permit ip any any
 
      ! Apply the access list to the input side of each interface
      interface ethernet 0
      ip address 172.16.1.1 255.255.255.0
      ip access-group 101 in
 
      interface ethernet 2
      ip address 172.16.2.1 255.255.255.0
      ip access-group 101 in
 
      interface ethernet 3
      ip address 172.16.3.3 255.255.255.0
      ip access-group 101 in
 
It can be complicated to list all possible addresses, and especially all possible broadcast addresses, to which attack packets might be sent. If you do not expect to receive any legitimate syslog traffic on an interface, you may wish to simply block all syslog traffic arriving on that interface. Remember that this will affect traffic routed through the Cisco IOS device as well as traffic destined to the device.
The command tftpdnld does not work. The failure occurs in two ways after the image transfers from tftpdnld:
 1) Example from c2600-js-mz.120-2.4.T:    
    File reception completed.
    TFTP copy: operation terminated due to bad checksum comparison.
 
 2) Example from c2600-i-mz.120-2.4.T: 
    File reception completed.
    TFTP flash copy: Error, image size (3427504) mismatches netsize (3112960). 
 
Workaround:
For most cases, set the rommon variable TFTP_CHECKSUM to "TFTP_CHECKSUM=0". This causes tftpdnld to proceed even with a bad checksum in the header.

Novell IPX, XNS, and Apollo Domain

IPX allows the primary interface and multiple ISL subinterfaces to have the same IPX network number and encapsulation.
Workaround: Do not configure interfaces with the same IPX network number.

Wide-Area Networking

A Cisco router might fail to reply to an Address Resolution Protocol (ARP) incoming on the Bridged Virtual Interface (BVI) when the ARP table is clean. The following error message appears if "debug arp" is turned on: "00:50:23: IP ARP req filtered src 10.1.1.254 0000.0c32.ed77, dst 10.1.1.1 0000.0000.0000 wrong cable, interface Virtual-Access."
Workaround: To install the ARP entries, initiate traffic from the router and force an incoming ARP BVI reply.
Removing a dialer interface while a call is up can result in the loss of use of one B channel.
Workaround: A reload of the router will bring the B channel back.

Resolved Caveats---Release 12.0(2)T

All the caveats listed in this section are resolved in Release 12.0(2)T. This section describes only severity 1 and 2 caveats.

IP Routing Protocols

On some platforms, for example the Cisco  7200  series  routers, RIP does not get enabled on Token Ring interfaces. The output of the sh ip proto command will indicate "Reset all is OK."
Workaround: Configure router rip on the router before configuring the address on the interface. A shut command followed by a no shut command might also bring up RIP on the interface.

Miscellaneous

RADIUS accounting does not work if you have separate authentication and accounting servers.
An IP client might not be able to ping the Route Switch Module (RSM). This situation might occur during Token Ring virtual LAN (TR VLAN) configuration on the RSM. It is most common when the IP client sends an Address Resolution Protocol (ARP) without a routing information field (RIF), and then sends an ARP with a RIF. The situation might also occur if the concentrator relay function (CRF) to which the client is connected is configured for source-route bridging (SRB).
Workaround: Change the CRF mode from SRB to source-route transparent (SRT) bridging.

Novell IPX, XNS, and Apollo Domain

The Internetwork Packet Exchange (IPX) input process might run out of stack, causing a system reload or reduced performance. There is no workaround.

Related Documentation

The following sections describe the documentation available for the Cisco 1700 series routers. Typically these documents consist of hardware installation guides, software installation guide guides, Cisco IOS configuration and command references, system error messages, and feature modules, which are updates to the Cisco IOS documentation. Documentation is available as printed manuals or electronic documents, except for feature modules, which are available online only.

The most up-to-date documentation can be found on the Web via Cisco Connection Online (CCO) and on the latest Documentation CD-ROM. These electronic documents might contain updates and modifications made after the paper documents were printed. For information on CCO, refer to the "Cisco Connection Online" section later in this document. For more information on to the CD-ROM, refer to the "Documentation CD-ROM" section later in this document.

The following sections describe the documentation related to these release notes:

Cisco IOS Software Documentation

Release 12.0(2)T release notes should be used in conjunction with the Release Notes for Cisco IOS Release 12.0 T. This document describes the release from which the current special release is derived.

Additional documentation for Cisco IOS Release 12.0 T is listed below.

To access release-specific documents on CCO, follow this path:

Products and Ordering: Cisco Documentation: Cisco Product Documentation/Cisco IOS Software Configuration/Cisco IOS Release 12.0

To access release-specific documentation on the documentation CD-ROM, follow this path:

Cisco Product Documentation: Cisco Product Documentation/Cisco IOS Software Configuration/Cisco IOS Release 12.0

The following documents apply to Cisco IOS Release 12.0(2)T:

Hardware Documents

Hardware documentation for the Cisco 1700 series routers is listed below. These documents ship with the Cisco 1700 series routers.

To access hardware documents on CCO, follow this path:

Products and Ordering: Cisco Documentation: Cisco Product Documentation/Access Servers and Access Routers/Modular Access Routers/Cisco 1700

To access hardware documentation on the documentation CD-ROM, follow this path:

Cisco Product Documentation: Cisco Product Documentation/Access Servers and Access Routers/Modular Access Routers/Cisco 1700

The following documents are specific to the Cisco 1700 series routers:

Software Documents

Cisco IOS software documentation is listed in Table 4. Software documentation consists of the Cisco  IOS configuration guides and command references and also includes several supporting documents. These documents are shipped with the Cisco 1700 series routers in electronic form on the Documentation CD-ROM, unless you specifically ordered the printed version of the documents.

To access software documents on CCO, follow this path:

Products and Ordering: Cisco Documentation: Cisco IOS Software Configuration: Cisco IOS Release 12.0

To access software documentation on the documentation CD-ROM, follow this path:

Cisco Product Documentation: Cisco IOS Software Configuration: Cisco IOS Release 12.0

Table 4: Software Documents for Cisco 1700 Series Routers
Books Chapter Topics

  • Configuration Fundamentals Configuration Guide

  • Configuration Fundamentals Command Reference

Configuration Fundamentals Overview
Cisco IOS User Interfaces
File Management
System Management

  • Bridging and IBM Networking Configuration Guide

  • Bridging and IBM Networking Command Reference

Transparent Bridging
Source-Route Bridging
Token Ring Inter-Switch Link
Remote Source-Route Bridging
DLSw+
STUN and BSTUN
LLC2 and SDLC
IBM Network Media Translation
DSPU and SNA Service Point
SNA Frame Relay Access Support
APPN
Cisco Database Connection
NCIA Client/Server Topologies
Cisco Mainframe Channel Connection
Airline Product Set

  • Dial Solutions Configuration Guide

  • Dial Solutions Command Reference

Dial-In Port Setup
Dial-In Terminal Services
Dial-on-Demand Routing (DDR)
Dial Backup
Dial-Out Modem Pooling
Large-Scale Dial Solutions
Cost-Control Solutions
ISDN
X.25 over ISDN
VPDN
Dial Business Solutions and Examples

  • Cisco IOS Interface Configuration Guide

  • Cisco IOS Interface Command Reference

Interface Configuration Overview

  • Network Protocols Configuration Guide, Part 1

  • Network Protocols Command Reference, Part 1

IP Addressing
IP Services
IP Routing Protocols

  • Network Protocols Configuration Guide, Part 2

  • Network Protocols Command Reference, Part 2

AppleTalk
Novell IPX

  • Network Protocols Configuration Guide, Part 3

  • Network Protocols Command Reference, Part 3

Apollo Domain
Banyan VINES
DECnet
ISO CLNS
XNS

  • Security Configuration Guide

  • Security Command Reference

AAA Security Services
Security Server Protocols
Traffic Filtering and Firewalls
IP Security and Encryption
Passwords and Privileges
Neighbor Router Authentication
IP Security Options

  • Cisco IOS Switching Services Configuration Guide

  • Cisco IOS Switching Services Command Reference

Switching Paths for IP Networks
Virtual LAN (VLAN) Switching and Routing

  • Wide-Area Networking Configuration Guide

  • Wide-Area Networking Command Reference

ATM
Frame Relay
SMDS
X.25 and LAPB

  • Voice, Video, and Home Applications Configuration Guide

  • Voice, Video, and Home Applications Command Reference

Voice over IP
Voice over Frame Relay
Voice over ATM
Voice over HDLC
Video Support
Universal Broadband Features

  • Quality of Service Solutions Configuration Guide1

  • Quality of Service Solutions Command Reference1

Classification
Scheduling
Packet Drop
Traffic Shaping
ATM QoS
SNA QoS
Line Protocols

  • Cisco IOS Software Command Summary

  • Dial Solutions Quick Configuration Guide

  • System Error Messages

  • Debug Command Reference

1This book will not be available until January 1999.


Note The Cisco Management Information Base (MIB) User Quick Reference publication is no longer being published. For the latest list of MIBs supported by Cisco, see the Cisco Network Management Toolkit on Cisco Connection Online. On CCO, go to Software and Support, select Software Center, and click Network Management Products. Next, select Cisco Network Management Toolkit, and click Cisco MIBs.

Service and Support

For service and support for a product purchased from a reseller, contact the reseller. Resellers offer a wide variety of Cisco service and support programs, which are described in the section "Service and Support" in the information packet that shipped with your product.


Note If you purchased your product from a reseller, you can access CCO as a guest. CCO is Cisco Systems' primary real-time support channel. Your reseller offers programs that include direct access to CCO services.

For service and support for a product purchased directly from Cisco, use CCO.

Software Configuration Tips on the Cisco TAC Home Page

The following URL contains links to access helpful tips on configuring your Cisco products:

http://www.cisco.com/kobayashi/serv_tips.shtml

This URL is subject to change without notice. If it changes, point your web browser to http://www.cisco.com/, and follow this path: Software & Support, Technical Tips (button on left margin).

"Hot Tips" are popular tips and hints gathered from the Cisco Technical Assistance Center (TAC). Most of these documents are available from the TAC fax-on-demand service. To access fax-on-demand and receive documents at your fax machine from the USA, call 888-50-CISCO (888-502-4726). From other areas, call 415-596-4408.

The following sections are provided from the Technical Tips page:

Cisco Connection Online

Cisco Connection Online (CCO) is Cisco Systems' primary, real-time support channel. Maintenance customers and partners can self-register on CCO to obtain additional information and services.

Available 24 hours a day, 7 days a week, CCO provides a wealth of standard and value-added services to Cisco's customers and business partners. CCO services include product information, product documentation, software updates, release notes, technical tips, the Bug Navigator, configuration notes, brochures, descriptions of service offerings, and download access to public and authorized files.

CCO serves a wide variety of users through two interfaces that are updated and enhanced simultaneously: a character-based version and a multimedia version that resides on the World Wide Web (WWW). The character-based CCO supports Zmodem, Kermit, Xmodem, FTP, and Internet e-mail, and it is excellent for quick access to information over lower bandwidths. The WWW version of CCO provides richly formatted documents with photographs, figures, graphics, and video, as well as hyperlinks to related information.

You can access CCO in the following ways:

For a copy of CCO's Frequently Asked Questions (FAQ), contact cco-help@cisco.com. For additional information, contact cco-team@cisco.com.


Note If you are a network administrator and need personal technical assistance with a Cisco product that is under warranty or covered by a maintenance contract, contact Cisco's Technical Assistance Center (TAC) at 800  553-2447, 408  526-7209, or tac@cisco.com. To obtain general information about Cisco Systems, Cisco products, or upgrades, contact 800  553-6387, 408  526-7208, or cs-rep@cisco.com.

Documentation CD-ROM

Cisco documentation and additional literature are available in a CD-ROM package, which ships with your product. The Documentation CD-ROM, a member of the Cisco Connection Family, is updated monthly. Therefore, it might be more current than printed documentation. To order additional copies of the Documentation CD-ROM, contact your local sales representative or call customer service. The CD-ROM package is available as a single package or as an annual subscription. You can also access Cisco documentation on the World Wide Web at http://www.cisco.com, http://www-china.cisco.com, or http://www-europe.cisco.com.

If you are reading Cisco product documentation on the World Wide Web, you can submit comments electronically. Click Feedback in the toolbar and select Documentation. After you complete the form, click Submit to send it to Cisco. We appreciate your comments.



hometocprevnextglossaryfeedbacksearchhelp

Copyright 1989-1999©Cisco Systems Inc.