cc/td/doc/product/software/ssr91
hometocprevnextglossaryfeedbacksearchhelp
PDF

Table of Contents

Communication Server Release Notes for Software Release 9.1

Communication Server Release Notes for Software Release 9.1

These release notes describe the features, modifications, and caveats for Software Release 9.1, up to and including Release 9.1(16). Refer to the Communication Server Configuration and Reference publication, dated September 1992, for complete communication server product documentation for Software Release 9.1.


Note Release 9.1(16) is the last maintenance release of Release 9.1. If you want to continue to use Release 9.1 after Cisco maintenance releases end, you must maintain a version of the software on a TFTP server at your site. If you are considering upgrading your software, the preferred upgrade path for Release 9.1 users as of April 17, 1995, is Cisco Internetwork Operating System (IOS) Release 10.0(9) or Release 10.2(5).

Introduction

Cisco's communication server product line, including the 500-CS and ASM-CS, provides all the features of the Software Release 9.0 terminal servers as well as the new features listed in these release notes.

These release notes describe the following topics:

Current Software Versions

As of Software Release 9.1, all software capabilities are included in a single image. According to the software license agreement that accompanies each system, you are restricted to using only those software capabilities that you ordered from Cisco Systems. Refer to the Cisco Price List for the version number and ordering instructions.

New Features in Release 9.1(9)

You can now configure your communication server as an AppleTalk Remote Access (ARA) server. Cisco's implementation of ARA connectivity gives Macintosh users direct access to information and resources at a remote location. Macintosh users can connect to another Macintosh computer or AppleTalk network over standard telephone lines. For more information, see the AppleTalk Remote Access Protocol Addendum to Communication Server Configuration and Reference publication.

Hardware Features

The following new hardware features are supported in Release 9.1:

Software Features

This section describes new software features.

X.25 Blacker Emergency Mode

Blacker Front-end (BFE) encryption is required in secure DDN X.25 network applications. The Cisco communication server is considered to be the host that is connected to the BFE.

The Blacker Emergency Mode feature allows the communication server to support BFE if the routing host or gateway is unavailable. The BFE device, upon discovering the loss of the routing host, enters Blacker Emergency Mode and sends a message to the communication server that it is entering or requesting to enter Blacker Emergency Mode. At this point the communication server, depending upon the user configuration, also enters Blacker Emergency Mode. It then either ignores the message, or approves or denies authorization to enter Blacker Emergency Mode.

You can administratively configure the communication server to enter Blacker Emergency Mode. The choices are never, always, or based upon a decision. The decision depends on the specific configuration of BFE, which may or may not be allowed to enter Blacker Emergency Mode. After it enters Blacker Emergency Mode, the communication server has the additional facility for address translation information for the Blacker internet addresses of remote hosts and gateways.

New commands are as follows:

x25 remote-red host-ip-address remote-black blacker-internet-address
x25 bfe-emergency {never|always|decision}
x25 bfe-decision {no|yes|ask}
bfe {enter|leave} interface-type unit
show x25 remote-red

PPP Encapsulation

Point-to-Point Protocol (PPP) encapsulation is supported for serial line IP. To use this encapsulation, configure the interface with the following interface subcommand:

encapsulation ppp

Connection Authentication (CHAP)

Dial-on-demand routing (DDR) was provided in the 9.0 software release. No security features were built into the support for DDR until support for the Challenge Handshake Authentication Protocol (CHAP). CHAP is defined in RFC 1334 and is part of the PPP Link Control Procedures. It defines the process by which a router that is called is able to verify and control the access of a remote calling router.

The CHAP implementation in Software Releases 9.1(2) and later complies with RFC 1334 and interoperates with other conforming implementations. With this change, CHAP in 9.1(2) and later releases does not interoperate with the implementation in 9.1(1), although the CHAP feature in 9.1(1) interoperates with other Cisco routers using 9.1(1).

New commands are as follows:

ppp authentication chap
username
name password secret

Frame Relay IETF Encapsulation for IP

Cisco has added support for the encapsulation of IP packets in conformance with IETF RFC 1294 entitled "Multiprotocol Interconnect over Frame Relay."

The new command is as follows:

[no] encapsulation frame-relay [ietf]

Using SLIP for IP Routing

The following commands support SLIP for IP routing:

slip address address [mask]
slip address dynamic [
default-address]
slip header-compression [on|off|passive]
slip [/compressed]
{address|default}
slip routing

ICMP Router Discovery Protocol (IRDP)

The Router Discovery Protocol (RDP) outlined in RFC 1256 provides a standard way for IP hosts to discover routers. When operating as an IP router, RDP packets are generated, and when operating as a host, RDP packets are received.

The new interface subcommands are as follows:

[no] ip irdp
show ip irdp

Use the following interface subcommands to change IRDP parameters:

ip irdp preference number
ip irdp maxadvertinterval seconds
ip irdp minadvertinterval seconds
ip irdp holdtime seconds
ip irdp address
address [number]

Variable Length Subnet Mask Support (OSPF and Static Routes Only)

A Cisco communication server now can support more than one mask for the same network number. All masks must be left-contiguous (that is, there cannot be any zero bits to the left of a one bit).

The command changes that follow apply to static routes only.

The following display has been modified:

show ip route [network [mask]]

A new command has been added to display the masks used for network [address] and the number of subnets using each mask. This command is used mostly for debugging.

show ip masks [address]

Each of these commands adds an optional mask:

show ip route [address [mask]]
clear ip route [
address [mask]]

For the following command, a mandatory mask has been added:

ip route network mask {address|interface} [distance]

The following command has been obsoleted:

ip default-network [subnet]

Default subnets can now be translated into network-level routes.

Using DTR to Initiate Automatic Dialing

With Cisco's dial-up capability, you can set a modem to automatically dial the phone number of a remote communication server. This feature offers cost savings because you pay for using the phone line only when there is data to be received (or sent).

XRemote Sessions between Communication Servers

New XRemote capabilities allow users on X display servers that are not running XRemote to run a client program from a host on another network.

Setting Character Widths to Support International Characters

These commands allow you to add special graphical and international characters in banners and prompts and to add special characters such as software flow control characters.

The new commands are as follows:

exec-character-bits {8|7}
special-character-bits {8|7}
terminal exec-character-bits {8|7}
terminal special-character-bits {8|7}

System Management Features

This section describes new system management features.

Encrypted Passwords

You can increase access security on your communication server by encrypting both the privileged command password and the console and virtual terminal line access passwords using the following new command:

[no] service password-encryption

Interface Statistics (Per-Protocol/Per-Interface Accounting)

Interface statistics are kept for the number of packets of each protocol type that have been sent through the interface. The accounting keyword has been added to the show interfaces command as follows:

show interfaces [type unit] [accounting]

DEC LAT Commands

The following commonly used DEC LAT EXEC commands are supported on Cisco's systems:

help
logout

Use the help command to obtain information about EXEC commands. Use the logout command to exit EXEC mode and free the line.

The new LAT display commands are as follows:

show node [all|node-name] [counters|status|summary]
show service [service-name]

Real-Time Debugging Enhancements

Timestamping enhances real-time debugging by recording the relative timing of logged events. This information is especially useful when users send debugging output to technical support personnel for assistance.

To configure the system for timestamping, use the following global command:

[no] service timestamps

Enhanced show line Command

The show line command display now provides more information on the average
24-line screen.

Asynchronous IP Routing

With Software Release 9.1, the communication server supports the IP routing functionality offered on Cisco routers. This includes IP routing protocols. This section lists the IP routing commands.

Debugging the IP Network

debug ip-tcp-header-compression debug probe

IP Global Configuration Command Summary

[no] arp internet-address hardware-address type [alias]
[no] async-bootp
tag [:hostname] data ...
[no] ip accounting-list ip-address mask
[no] ip accounting-threshold threshold
[no] ip accounting-transits count
[no] ip default-network network
[no] ip hp-host name [TCP-port-number] address1 [address2...address8]
[no] ip hp-host hostname ip-address
[no] ip ipname-lookup
[no] ip mtu bytes
[no] ip probe proxy
[no] ip routing

Note Unlike the router, IP routing is disabled by default in the communication server.
[no] ip source-route
[no] ip subnet-zero

IP Interface Subcommand Summary

[no] access-group list
[no] arp {arpa|probe|snap}
[
no] arp timeout seconds
[no] ip accounting
[no] ip address address mask [secondary]
[
no] ip broadcast-address [address]
[no] ip directed-broadcast
[no] ip forward-protocol {udp|nd} [port]
[
no] ip helper-address address
[no] ip mask-reply
[no] ip proxy-arp
[no] ip redirects
[no] ip security add
ip security dedicated level authority [authority...]
[no] ip security extended-allowed
[no] ip security first
[no] ip security ignore-authorities
[no] ip security implicit-labelling [level authority [authority...]]
ip security multilevel level1 [authority...] to level2 authority2 [authority2...]
[no] ip security strip
[no] ip tcp compression-connections number
[no] ip tcp header-compression [passive]
[no] ip unnumbered interface-name
[no] ip unreachables
transmit-interface
interface-name

Debugging IP Routing

debug ip-bgp
debug ip-bgp-events
debug ip-bgp-updates
debug ip-egp [ip-address]
debug ip-egp-events [ip-address]
debug ip-hello
debug ip-igrp
debug ip-ospf-adj
debug ip-ospf-events
debug ip-ospf-flood
debug ip-ospf-packet
debug ip-ospf-spf
debug ip-rip
debug ip-routing
debug ip-tcp
debug ip-tcp-packet line
debug ip-udp

IP Routing Protocols Global Configuration Command Summary

[no] autonomous-system local-AS
[no] ip as-path access-list list [permit|deny] as-regular-expression
[no] ip default-network network-number
ip route network mask {address|interface} [distance]
[no] router egp 0
[no] router hello
[no] router protocol [autonomous-system]
[no] router ospf ospf-process-id
[no] router rip

IP Routing Protocols Subcommand Summary

[no] area area-id authentication
[no] area
area-id range address mask
[no] area
area-id stub
[no] area
area-id default-cost cost
[no] area
area-id virtual-link router-id [hello-interval number-of-seconds]
[retransmit-interval
number-of-seconds]
[transmit-delay
number-of-seconds]
[dead-interval
number-of-seconds]
[authentication-key
password]
[no] default-information allowed {in|out}
[no] default-information originate
[no] default-information originate metric
metric-value metric-type type-value
[no] default-metric bandwidth delay reliability loading mtu
[no] default-metric number
[no] distance bgp external-distance internal-distance local-distance
[no] distance weight [address mask] [access-list-number]
[no] distribute-list access-list-number in [interface-name]
[no] distribute-list access-list-number out [interface-name|routing-process]
[no] ip irdp
ip irdp preference number
ip irdp maxadvertinterval seconds
ip irdp minadvertinterval seconds
ip irdp holdtime seconds
ip irdp address address [number]
[no] metric holddown
[no] metric maximum-hops hops
[no] metric weights tos k1 k2 k3 k4 k5
[no] neighbor address
[no] neighbor address distribute-list list {in|out}
neighbor address filter-list list {in|out|weight weight}
neighbor address remote-as number
no neighbor address
[no] neighbor address third-party third-party-ip-address [internal|external]
[no] neighbor address weight weight
[no] neighbor any [list]
[no] neighbor any [list]
[no] neighbor any third-party address [internal|external]
[no] neighbor ip-address
[no] neighbor ip-address version value
[no] network address backdoor
[no] network address wildcard-mask area area-id
[no] network network-number
[no] offset-list list {in|out} offset
[no] passive-interface interface
[no] redistribute process-name [AS-number]
[no] redistribute protocol [source-id]
[metric metric-value]
[metric-type type-value]
[tag tag-value]
[subnets]
[no] redistribute ospf ospf-process-id
[metric metric-value]
[match internal|external type-value|external type-value]
[no] synchronization
[no] timers basic update invalid holddown flush [sleeptime]
[no] timers bgp keepalive holdtime
[no] timers egp hello polltime
[no] variance multiplier

IP Routing Protocols Interface Subcommands

[no] ip address address mask [secondary]
[no] ip gdp
[no] ip gdp holdtime seconds
[no] ip gdp priority number
[no] ip gdp reporttime seconds
[no] ip ospf authentication-key password
[no] ip ospf cost cost
[no] ip ospf dead-interval seconds
[no] ip ospf hello-interval seconds
[no] ip ospf priority 8-bit-number
[no] ip ospf retransmit-interval seconds
[no] ip ospf transmit-delay seconds
[no] keepalive [seconds]

Important Notes

This section describes warning and cautions about using the Release 9.1 software. The information in this section supplements that given in the section 9.1(16) Caveats, page 13.

Cisco 500-CS Images

The software image provided in Cisco 500-CS communication servers is cs500-kr, which runs from ROM. This is a new image and is not documented in the Communication Server Configuration and Reference publication. To obtain a copy of the previously used cs500-k image, which can be booted from a network server and which runs from RAM, access CIO as described on page 27. Note that a minimum of 4 MB of system memory is required to boot Release 9.1(9) and later cs500-k images from a network server.

Cisco 500-CS Jumpers

When you upgrade your EEPROMs to the Software Release 9.1(9) or later cs500-kr image, you need to install or move jumpers on the Cisco 500-CS system card. Table 1 indicates the locations of the jumpers. For more information, refer to the Cisco 500-CS Memory and Software Upgrade Instructions document.


J4 Jumper Settings

Software Version

Place Jumpers on Pins ...

9.1(9) and later 7 and 8
9 and 10
13 and 14
9.1(8) and earlier 7 and 8
11 and 12

Booting 9.1 Software from Flash or over a Network

The following discussion concerns all users whose systems meet the following conditions:

When attempting to boot a 9.1 software image, you may see a message indicating a buffer overflow error. If you see this message, you must compress the software image before booting it.

When a server netboots or Flash boots software, the image being booted and the running image must both fit into memory.

The uncompressed 9.1 software image is in certain cases larger than half the available memory of a CSC/3 processor. However, a compressed 9.1 image is smaller than half the available memory and can be network-booted or Flash-booted into the CSC/3.

You can produce a compressed software image on any UNIX platform using the "compress" program. Refer to your UNIX platform's documentation for the exact usage of the "compress" program.


Note Many UNIX "compress" programs produce a file whose name ends in a .Z. In certain instances (notably, booting with the b command from the ROM monitor), uppercase names are not understood by the system. To ensure the ability to boot the software in all cases, rename such output files from the UNIX "compress" facility to a name that does not contain any uppercase characters.

Bandwidth Caveat

When setting the bandwidth, the bandwidth that is displayed with the show interfaces command may not match in some higher bandwidth cases because some roundoff is performed on the number you entered. The values shown match those seen in IGRP update packets and hence are more useful for debugging.

IP Default Routes

As of Software Release 9.1, the system automatically translates old default network commands into appropriate static routes. The translation is completely transparent.

Writing Core Files on UNIX BSD-derived Systems

In BSD-derived UNIX systems, the block number in the TFTP header file is a short instead of a unsigned short. Because of this, you cannot write core on a 16M CSC4 to some UNIX systems, because the last block will never be accepted by the UNIX TFTP daemon. However, the entire core file, except for the last 512-byte block is successfully written, so you still can use the incomplete core file for debugging system problems. This was previously reported as Cisco bug CSCdi07776.

Obtaining CCL Scripts to Support AppleTalk Remote Access and TACACS

You can use TACACS security with AppleTalk Remote Access (ARA) if you have configured a TACACS server and if the CCL script on the client Macintosh is modified for TACACS security. For several of the most commonly used modems, Cisco has developed CCL logic that you can use to modify CCL scripts. You can obtain Cisco's CCL logic by downloading the file TACACS.sit.hqx from ftp.cisco.com. For information about how to use Cisco's CCL logic to modify a CCL script, see the AppleTalk Remote Access Protocol Addendum to Communication Server Configuration and Reference publication.

Once you have modified the CCL script and installed it in the Extensions folder on the Macintosh, use the Remote Access Setup control panel to select the modified script.

Once the modified CCL script is selected, a user who makes an AppleTalk Remote Access connection should select Guest login from the standard Login dialog box. Regardless of the user's selection in the Login dialog box, the user is prompted for their TACACS username and password after the ARA connection is established.

9.1(16) Caveats

This section describes possibly unexpected behavior by Release 9.1(16). Unless otherwise noted, these caveats apply to all 9.1 releases up to and including 9.1(16). The caveats listed here describe only the serious problems. For the most current list of caveats against this release, access CIO as described in the section "Cisco Information Online" later in this document.

IP Routing Protocols

9.1(15) Caveats/9.1(16) Modifications

This section describes possibly unexpected behavior by Release 9.1(15). Unless otherwise noted, these caveats apply to all 9.1 releases up to and including 9.1(15). For additional caveats applicable to Release 9.1(15), see the caveats sections for newer 9.1 releases. The caveats for newer releases precede this section.

No serious bugs were resolved in Release 9.1(16). For the most current list of caveats against this release, access CIO as described in the section "Cisco Information Online" later in this document.

9.1(13) and 9.1(14) Caveats/9.1(15) Modifications

This section describes possibly unexpected behavior by Releases 9.1(13) and 9.1(14). Unless otherwise noted, these caveats apply to all 9.1 releases up to and including 9.1(14). For additional caveats applicable to Releases 9.1(13) and 9.1(14), see the caveats sections for newer 9.1 releases. The caveats for newer releases precede this section.

The caveats listed here describe only the serious problems. For a most current list of caveats against this release, access CIO as described in the section "Cisco Information Online" later in this document.

All the caveats listed in this section are resolved in Release 9.1(15).

Basic System Services

9.1(12) Caveats/9.1(13) Modifications

This section describes possibly unexpected behavior by Release 9.1(12). Unless otherwise noted, these caveats apply to all 9.1 releases up to and including 9.1(12). For additional caveats applicable to Release 9.1(12), see the caveats sections for newer 9.1 releases. The caveats for newer releases precede this section.

The caveats listed here describe only the serious problems. For the most current list of caveats against this release, access CIO as described in the section "Cisco Information Online" later in this document.

All the caveats listed in this section are resolved in Release 9.1(13).

IP Routing Protocols

Protocol Translation

TCP/IP Host-Mode Services

Wide-Area Networking

9.1(11) Caveats/9.1(12) Modifications

This section describes possibly unexpected behavior by Release 9.1(11). Unless otherwise noted, these caveats apply to all 9.1 releases up to and including 9.1(11). For additional caveats applicable to Release 9.1(11), see the caveats sections for newer 9.1 releases. The caveats for newer releases precede this section.

The caveats listed here describe only the serious problems. For the most current list of caveats against this release, access CIO as described in the section "Cisco Information Online" later in this document.

All the caveats listed in this section are resolved in Release 9.1(12).

Basic System Services

Interfaces and Bridging

IP Routing Protocols

TCP/IP Host-Mode Services

Wide-Area Networking

9.1(10) Caveats/9.1(11) Modifications

This section describes possibly unexpected behavior by Release 9.1(10). Unless otherwise noted, these caveats apply to all 9.1 releases up to and including 9.1(10). For additional caveats applicable to Release 9.1(10), see the caveats sections for newer 9.1 releases. The caveats for newer releases precede this section.

The caveats listed here describe only the serious problems. For the most current list of caveats against this release, access CIO as described in the section "Cisco Information Online" later in this document.

All the caveats listed in this section are resolved in Release 9.1(11).

IP Routing Protocols

TCP/IP Host-Mode Services

Wide-Area Networking

9.1(9) Caveats/9.1(10) Modifications

This section describes possibly unexpected behavior by Release 9.1(9). Unless otherwise noted, these caveats apply to all 9.1 releases up to and including 9.1(9). For additional caveats applicable to Release 9.1(9), see the caveats sections for newer 9.1 releases. The caveats for newer releases precede this section.

The caveats listed here describe only the serious problems. For the most current list of caveats against this release, access CIO as described in the section "Cisco Information Online" later in this document.

All the caveats listed in this section are resolved in Release 9.1(10).

Protocol Translation

9.1(8) Caveats/9.1(9) Modifications

This section describes possibly unexpected behavior by Release 9.1(8). Unless otherwise noted, these caveats apply to all 9.1 releases up to and including 9.1(8). For additional caveats applicable to Release 9.1(8), see the caveats sections for newer 9.1 releases. The caveats for newer releases precede this section.

The caveats listed here describe only the serious problems. For the most current list of caveats against this release, access CIO as described in the section "Cisco Information Online" later in this document.

All the caveats listed in this section are resolved in Release 9.1(9).

TN3270

Wide-Area Networking

9.1(7) Caveats/9.1(8) Modifications

This section describes possibly unexpected behavior by Release 9.1(7). Unless otherwise noted, these caveats apply to all 9.1 releases up to and including 9.1(7). For additional caveats applicable to Release 9.1(7), see the caveats sections for newer 9.1 releases. The caveats for newer releases precede this section.

The caveats listed here describe only the serious problems. For the most current list of caveats against this release, access CIO as described in the section "Cisco Information Online" later in this document.

All the caveats listed in this section are resolved in Release 9.1(8).

Basic System Services

LAT

Terminal Service

Wide-Area Networking

9.1(6) Caveats/9.1(7) Modifications

This section describes possibly unexpected behavior by Release 9.1(6). Unless otherwise noted, these caveats apply to all 9.1 releases up to and including 9.1(6). For additional caveats applicable to Release 9.1(6), see the caveats sections for newer 9.1 releases. The caveats for newer releases precede this section.

The caveats listed here describe only the serious problems. For the most current list of caveats against this release, access CIO as described in the section "Cisco Information Online" later in this document.

All the caveats listed in this section are resolved in Release 9.1(7).

Basic System Services

Terminal Service

Wide-Area Networking

9.1(5) Caveats/9.1(6) Modifications

This section describes possibly unexpected behavior by Release 9.1(5). Unless otherwise noted, these caveats apply to all 9.1 releases up to and including 9.1(5). For additional caveats applicable to Release 9.1(5), see the caveats sections for newer 9.1 releases. The caveats for newer releases precede this section.

The caveats listed here describe only the serious problems. For the most current list of caveats against this release, access CIO as described in the section "Cisco Information Online" later in this document.

All the caveats listed in this section are resolved in Release 9.1(5).

Interfaces and Bridging

TN3270

Wide-Area Networking

9.1(4) Caveats/9.1(5) Modifications

This section describes possibly unexpected behavior by Release 9.1(4). Unless otherwise noted, these caveats apply to all 9.1 releases up to and including 9.1(4). For additional caveats applicable to Release 9.1(4), see the caveats sections for newer 9.1 releases. The caveats for newer releases precede this section.

The caveats listed here describe only the serious problems. For the most current list of caveats against this release, access CIO as described in the section "Cisco Information Online" later in this document.

All the caveats listed in this section are resolved in Release 9.1(5).

Basic System Services

EXEC and Configuration Parser

Interfaces and Bridging

IP Routing

TCP/IP Host-Mode Services

Wide-Area Networking

9.1(3) Caveats/9.1(4) Modifications

This section describes possibly unexpected behavior by Release 9.1(3). Unless otherwise noted, these caveats apply to all 9.1 releases up to and including 9.1(3). For additional caveats applicable to Release 9.1(3), see the caveats sections for newer 9.1 releases. The caveats for newer releases precede this section.

The caveats listed here describe only the serious problems. For the most current list of caveats against this release, access CIO as described in the section "Cisco Information Online" later in this document.

All the caveats listed in this section are resolved in Release 9.1(4).

Basic System Services

Interfaces and Bridging

IP Routing

TCP/IP Host-Mode Services

Wide-Area Networking

9.1(2) Caveats/9.1(3) Modifications

This section describes possibly unexpected behavior by Release 9.1(2). Unless otherwise noted, these caveats apply to all 9.1 releases up to and including 9.1(2). For additional caveats applicable to Release 9.1(2), see the caveats sections for newer 9.1 releases. The caveats for newer releases precede this section.

The caveats listed here describe only the serious problems. For the most current list of caveats against this release, access CIO as described in the section "Cisco Information Online" later in this document.

All the caveats listed in this section are resolved in Release 9.1(3).

Interfaces and Bridging

LAT

Local Services

(boot)ROUTER#debug tokenring 
	%SYS-2-INTSCHED: event dismiss at level 4 
	-Process = "Exec", level= 4, pid= 11
 	-Traceback= A87C A8D6 1418C 9422 9EB2 15FA 304D8 70DEC 
	%SYS-2-INTSCHED: event dismiss at level 4 
	-Process = "Exec", level= 4, pid= 11 
	-Traceback= A87C A8D6 1418C 9422 9 

Terminal Service

Wide-Area Networking

9.1(1) Caveats/9.1(2) Modifications

This section describes possibly unexpected behavior by Release 9.1(1). Unless otherwise noted, these caveats apply to all 9.1 releases up to and including 9.1(1). For additional caveats applicable to Release 9.1(1), see the caveats sections for newer 9.1 releases. The caveats for newer releases precede this section.

The caveats listed here describe only the serious problems. For the most current list of caveats against this release, access CIO as described in the section "Cisco Information Online" later in this document.

All the caveats listed in this section are resolved in Release 9.1(2).

Basic System Services

Interfaces and Bridging

Local Services

TCP/IP Host-Mode Services

Terminal Service

Wide-Area Networking

is used as a diagnostic aid; although an unexpected condition was detected and reported, the operation of the system and the X.25 protocol are not affected. If this message is produced, contact technical support; include the text and traceback of this message as well as the information from the show version command. [CSCdi07238]

Cisco Information Online

Cisco Information Online (CIO) is Cisco Systems' primary, real-time support channel. Maintenance customers and partners can self-register on CIO to obtain additional content and services.

Available 24 hours a day, 7 days a week, CIO provides a wealth of standard and value-added services to Cisco's customers and business partners. CIO services include product information, software updates, release notes, technical tips, the Bug Navigator, configuration notes, brochures, descriptions of service offerings, and download access to public and authorized files.

CIO serves a wide variety of users through two interfaces that are updated and enhanced simultaneously--a character-based version and a multimedia version that resides on the World Wide Web (WWW). The character-based CIO (called "CIO Classic") supports Zmodem, Kermit, Xmodem, FTP, Internet e-mail, and fax download options, and is excellent for quick access to information over lower bandwidths. The WWW version of CIO provides richly formatted documents with photographs, figures, graphics, and video, as well as hyperlinks to related information.

You can access CIO in the following ways:

For a copy of CIO's Frequently Asked Questions (FAQ), contact  cio-help@cisco.com. For additional information, contact  cio-team@cisco.com.


Note If you are a network administrator and need personal technical assistance with a Cisco product that is under warranty or covered by a maintenance contract, contact Cisco's Technical Assistance Center (TAC) at 800 553-2447, 408 526-7209, or tac@cisco.com. To obtain general information about Cisco Systems, Cisco products, or upgrades, contact 800 553-6387, 408 526-7208, or cs-rep@cisco.com.

UniverCD

The complete caveats against this release are available on UniverCD, which is the Cisco Systems library of product information on CD-ROM. On UniverCD, access the Release 9.1 Caveats in the Release 9.1 database.

hometocprevnextglossaryfeedbacksearchhelp
Copyright 1989-1997 © Cisco Systems Inc.