
32
Cisco IOS XE 3S Release Notes for the Cisco ASR 903 Router
OL-26630-12
Caveats in Cisco IOS XE 3.9S Releases
Conditions:
Occurs when you issue the default interface command and immediately restore the
configuration. The issue occurs with configurations containing either a large number of EFPs or
features that impact EFP programming at a lesser scale, such as QoS.
Workaround:
Wait for the router to clear the old EFP configuration before adding a new
configuration.
•
CSCtu39377
Symptoms:
"sh running" , "sh romvar" in exec mode and "set" command in rommon mode, displays
multiple entries for the license being used.
Conditions:
ASr903 with appropriate license and boot level set.
Workaround:
No workaround.
•
CSCtx44513
Symptoms:
The router stops passing traffic on an interface
Conditions:
Occurs when you remove all classes from a QoS policy-map attached to an interface.
Workaround:
Remove and re-attach the policy-map.
•
CSCtx44688
Symptoms:
Cannot configure policing and marking together in the same class of the egress
policy-map.
Conditions:
Set and police statements together in the same class of a policy is rejected at the CLI.
Workaround:
In order to achieve marking and policing at the ingress we can use a conditional
policer but this is not supported at the egress.
•
CSCtx70302
Symptoms:
Traceback and Log message seen on performing a multilink bundle shut on ASR903 as
described in the summary.
Conditions:
Traffic should be flowing over the multilink bundle. Multiple ways to trigger the same
issue, but traffic and mlppp bundle remain common to each scenario.
Workaround:
None. Harmless traceback.
•
CSCty73682
Symptoms:
A small percentage of IPv6 packets that should be blocked by an interface ACL is
instead pass through
Conditions:
In certain conditions, when an IPv6 ACL is applied to an interface, a small percentage
of IPv6 packets that would otherwise be dropped, will instead bypass an ACL and get through.
Workaround:
None
PSIRT Evaluation:
The Cisco PSIRT has assigned this bug the following CVSS version 2 score.
The Base and Temporal CVSS scores as of the time of evaluation are 5/4.8:
https://intellishield.cisco.com/security/alertmanager/cvssCalculator.do?dispatch=1&version=2&ve
ctor=AV:N/AC:L/Au:N/C:P/I:N/A:N/E:F/RL:U/RC:C CVE ID CVE-2012-3946 has been assigned
to document this issue. Additional information on Cisco’s security vulnerability policy can be found
at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html
•
CSCtz20839
Symptoms:
IMA functionality does not work properly.
Conditions:
Occurs after an RSP switchover when the router is running an IMA configuration.