|
|
June 21, 1999
These release notes describe new features and significant software components for the Cisco 805 router supported by Cisco IOS Release 12.0(4)XM. Use these release notes with the Cross-Platform Release Notes for Cisco IOS Release 12.0 T located on CCO and the Documentation CD-ROM.
![]() | Caution Cisco IOS Release 12.0(4)XM does not support Cisco 801, 802, 803, or 804 routers. |
For a list of the software caveats that apply to Release 12.0(4)XM, refer to the Caveats for Cisco IOS Release 12.0 T document that accompanies these release notes. The caveats document is updated for every maintenance release and is located on Cisco Connection Online (CCO) and the Documentation CD-ROM.
These release notes discuss the following topics:
This section describes the system requirements and includes the following sections:
This section describes the memory requirements for the Cisco IOS feature sets supported by Cisco IOS Release 12.0(4)XM on the Cisco 805 router.
| Platform/Feature Set | Image Name | Required Flash Memory | Required DRAM Memory | Runs From |
|---|---|---|---|---|
IP | c805-y6-mw | 4 MB Flash | 8 MB DRAM | RAM |
IP Plus | c805-sy6-mw | 4 MB Flash | 8 MB DRAM | RAM |
IP/IPX Plus | c805-nsy6-mw | 4 MB Flash | 8 MB DRAM | RAM |
IP Firewall | c805-oy6-mw | 4 MB Flash | 8 MB DRAM | RAM |
The Cisco 805 router connects small professional offices over serial lines to corporate networks and to the Internet. Table 2 summarizes Cisco 805 router ports.
Ethernet Port | One 10BaseT (RJ-45) |
Serial Port | One WAN interface (RS-232, RS-449, RS-530 and RS-530A, V.35, and X.21) |
Console Port | RJ-45 |
The Cisco 805 router provides the following key features:
To determine the version of Cisco IOS software currently running on your Cisco 805 router, log in to the Cisco 805 router and enter the show version EXEC command. The following sample output from the show version command indicates the version number on the second output line:
router> show version Cisco Internetwork Operating System Software IOS (tm) c805 Software (c805-y6-mw), Version 12.0(4)XM, RELEASE SOFTWARE
Additional command output lines include more information, such as processor revision numbers, memory amounts, hardware IDs, and partition information.
For information about upgrading to a new software release, refer to the Cisco IOS Software Release 12.0 Upgrade Paths and Packaging Simplification product bulletin located at the following URL:
http://www.cisco.com/kobayashi/library/12.0/120MigrPaths.pdf
If you do not have an account on CCO, you can access general information about upgrading to a new software release by referring to the Cisco IOS Software Release 12.0 T Upgrade Paths and Packaging Simplification (#819: 1/99) product bulletin located on CCO.
On CCO, click on this path:
Service & Support: Product Bulletins: Software
Under Cisco IOS12.0, click Cisco IOS Software Release 12.0 T Upgrade Paths and Packaging Simplification (#819: 1/99).
This product bulletin does not contain information specific to Cisco IOS Release 12.0 but provides generic upgrade information that may apply to Cisco IOS Release 12.0.
For information on upgrading to a new software release, refer to the Cisco IOS Software Release 12.0 T Upgrade Paths and Packaging Simplification (#819: 1/99) product bulletin located on CCO.
On CCO, click on this path:
Service & Support: Product Bulletins: Software
Under Cisco IOS 12.0, click Cisco IOS Software Release 12.0 T Upgrade (#819: 1/99).
The following list shows which feature sets are supported on the Cisco 805 router. These feature sets only apply to Cisco IOS Releases 12.0(4)XM:
The Cisco IOS software is packaged in feature sets consisting of software images---depending on the platform. Each feature set contains a specific set of Cisco IOS features.
![]() | Caution Cisco IOS images with strong encryption (including, but not limited to 168-bit (3DES) data encryption feature sets) are subject to United States government export controls and have limited distribution. Strong encryption images to be installed outside the United States are likely to require an export license. Customer orders may be denied or subject to delay due to United States government regulations. When applicable, purchaser/user must obtain local import and use authorizations for all encryption strengths. Please contact your sales representative or distributor for more information, or send an e-mail to export@cisco.com. |
Table 3 lists the features and feature sets supported by the Cisco 805 router in Cisco IOS Release 12.0(4)XM and uses the following conventions:
| Feature Set | ||||
|---|---|---|---|---|
| Features | IP | IP Plus | IP/IPX Plus | IP Firewall |
| Address Conservation |
|
|
|
|
| Yes | Yes | Yes | Yes |
| Yes | Yes | Yes | Yes |
| No | No | No | No |
| Yes | Yes | Yes | Yes |
| Asynchronous | ||||
| Yes | Yes | Yes | Yes |
| Yes | Yes | Yes | Yes |
| Ease of Use and Deployment |
|
|
|
|
| Yes | Yes | Yes | Yes |
| Yes | Yes | Yes | Yes |
| Yes | Yes | Yes | Yes |
| Yes | Yes | Yes | Yes |
| Yes | Yes | Yes | Yes |
| Yes | Yes | Yes | Yes |
| LAN | ||||
| No | No | No | No |
| Yes | Yes | Yes | Yes |
| No | No | Yes | No |
| Yes | Yes | Yes | Yes |
| Yes | Yes | Yes | Yes |
| Management |
|
|
|
|
| Yes | Yes | Yes | Yes |
| Yes | Yes | Yes | Yes |
| Yes | Yes | Yes | Yes |
| No | Yes | Yes | No |
| Routing |
|
|
|
|
| No | No | No | No |
| No | No | No | No |
| No | No | No | No |
| No | Yes | Yes | No |
| No | Yes | Yes | No |
| No | Yes | Yes | No |
| No | No | No | No |
| No | No | Yes | No |
| No | No | No | No |
| Yes | Yes | Yes | Yes |
| Yes | Yes | Yes | Yes |
| Security |
|
|
|
|
| No | No | No | No |
| No | No | No | No |
| Yes | Yes | Yes | Yes |
| No | No | No | No |
| No | No | No | No |
| No | No | No | No |
| No | No | No | No |
| No | Yes | Yes | No |
| No | No | No | No |
| No | No | No | No |
|
|
|
|
|
| No | No | No | Yes |
| No | No | No | Yes |
| No | No | No | Yes |
| No | No | No | Yes |
| No | No | No | No |
| Yes | Yes | Yes | Yes |
| No | No | No | No |
| No | No | No | No |
| Yes | Yes | Yes | Yes |
| Yes | Yes | Yes | Yes |
| No | No | No | No |
| Yes | Yes | Yes | Yes |
| WAN |
|
|
|
|
| Yes | Yes | Yes | Yes |
| Yes | Yes | Yes | Yes |
| Yes | Yes | Yes | Yes |
| Yes | Yes | Yes | Yes |
| No | No | No | No |
| Yes | Yes | Yes | Yes |
| No | No | No | No |
| Yes | Yes | Yes | Yes |
| No | Yes | Yes | No |
| WAN Optimization |
|
|
|
|
| Yes | Yes | Yes | Yes |
| Yes | Yes | Yes | Yes |
| No | No | No | No |
| No | No | Yes | No |
| Yes | Yes | Yes | Yes |
| Yes | Yes | Yes | Yes |
| Yes | Yes | Yes | Yes |
| Yes | Yes | Yes | Yes |
| No | Yes | Yes | No |
The following sections list the new hardware and software features supported by the Cisco 805 router for Release 12.0(4)XM.
The following new hardware enhancements are supported by the Cisco 805 router for Release 12.0(4)XM and above. For more information about Cisco 805 router hardware, see the "Platform-Specific Documents" section.
Cisco IOS Release 12.0(4)XM includes support for the Cisco 805 router, which offers flexibility to small offices requiring secure and manageable Internet, intranet, and corporate LAN access. The Cisco 805 router has a fixed hardware configuration with one 10BaseT Ethernet port and one serial port. The serial port can connect X.21, V.35, RS-232, RS-449, RS-530 and RS-530A DTE and DCE.
The following new software capabilities are supported by the Cisco 805 router for Release 12.0(4)XM.
Cisco IOS Release 12.0(4)XM provides support for the Cisco 805 router.
![]() | Caution The Cisco 805 router runs Cisco IOS Release 12.0(4)XM and above only. Cisco IOS Release 12.0(4)XM does not support Cisco 801, 802, 803, or 804 routers. |
The Cisco IOS Firewall feature set is now available on the Cisco 805 router. This feature set is available on the IP Firewall image only; the product code for this image is S805C-12.0.4XM. This feature set provides the following capabilities:
The Cisco IOS Firewall Feature Set feature module provides several sample firewall configurations, including the following examples for small-office environments:
If you want to configure a firewall in an IP-network-to-Internet network, you can use the Cisco 805 series Fast Step application (recommended for inexperienced network administrators) or the Cisco IOS software command-line interface (CLI) (recommended for more experienced network administrators). You can also configure a firewall by using Cisco ConfigMaker software version 2.3.
With the Cisco 805 Fast Step application, you can configure CBAC only. If you want to configure a firewall in a remote-office-to-corporate-office network, you must use the Cisco IOS CLI.
For information on how to use the Cisco 805 Fast Step application, refer to the application online help. For information on how to configure a firewall using the CLI, refer to the Cisco IOS Firewall Feature Set feature module.
This section contains the following important notes about Cisco IOS Release 12.0(4)XM that apply to the Cisco 805 router:
The Cisco 805 router limits the maximum operating speed of synchronous interfaces to a maximum of 512 K in both DTE mode and DCE mode.When the Cisco 805 router is in DTE mode and the clock rate exceeds 512 K, the serial link is shut down and the following message appears on the console:
WARNING:MAXIMUM INTERFACE SPEED OF 512KB EXCEEDED
SHUTTING DOWN INTERFACE.
Certain versions of Cisco IOS software may fail or hang when they receive invalid User Datagram Protocol (UDP) packets sent to their syslog ports (port 514). At least one commonly used Internet scanning tool generates packets that cause such problems. This fact has been published on public Internet mailing lists, which are widely read both by security professionals and by security crackers. This information should be considered in the public domain.
Attackers can cause Cisco IOS devices to repeatedly fail and reload, resulting in a completely disabled Cisco IOS device that needs to be reconfigured by its administrator. Some Cisco IOS devices have been observed to hang instead of failing when attacked. These devices do not recover until they are manually restarted by reset or power cycling. An administrator must personally visit an attacked, hung device to restart it, even if the attacker is no longer actively sending any traffic. Some devices have failed without providing stack traces; some devices may indicate that they were "restarted by power-on," even when that is not the case.
Assume that any potential attacker is likely to know that existence of this problem and the ways to exploit it. An attacker can use tools available to the public on the Internet and does not need to write any software to exploit the vulnerability. Minimal skill is required and no special equipment is required.
Despite Cisco specifically inviting such reports, Cisco has received no actual reports of malicious exploitation of this problem.
This vulnerability notice was posted on Cisco's World Wide Web site:
http://www.cisco.com/warp/public/770/iossyslog-pub.shtml
This information was also sent to the following e-mail and USENET news recipients:
Vulnerable devices and software versions are specified in Table 4, Affected and Repaired Software Versions. Affected versions include Releases 11.3 AA, 11.3 DB, and all 12.0 versions (including 12.0 mainline, 12.0 S, 12.0 T, and any other regular released version whose number starts with 12.0), up to the repaired releases listed in Table 4. Cisco is correcting the problem in certain special releases and will correct it in future maintenance and interim releases. See Table 4, Affected and Repaired Software Versions for details. Cisco intends to provide fixes for all affected IOS variants.
No particular configuration is needed to make a Cisco IOS device vulnerable. It is possible to filter out attack traffic by using access lists. See the "Workarounds" section for techniques. However, except at Internet firewalls, the appropriate filters are not common in customer configurations. Carefully evaluate your configuration before assuming that any filtering you have protects you against this attack.
The most commonly used or asked-about products are listed below. If you are unsure whether your device is running Cisco IOS software, log in to the device and issue the show version command. Cisco IOS software will identify itself simply as "IOS" or "Internetwork Operating System Software". Other Cisco devices will not have the show version command, or they will identify themselves differently in their output. The most common Cisco devices that run Cisco IOS software include the following:
Affected software versions, which are relatively new, are not necessarily available on every device listed above. If you are not running Cisco IOS software, you are not affected by this problem.
The following Cisco devices are not affected:
This vulnerability has been assigned Cisco bug ID CSCdk77426.
Cisco offers free software updates to correct this vulnerability for all affected customers---regardless of their contract status. However, because this vulnerability information has been disseminated by third parties, Cisco has released this notice before updates are available for all software versions. Table 4 gives Cisco's projected fix dates.
Make sure your hardware has adequate RAM to support the new software before installing it. The amount of RAM is seldom a problem when you upgrade within a major release (say, from 11.2[11]P to 11.2[17]P), but it is often a factor when you upgrade between major releases (say, from 11.2 P to 11.3 T).
Because fixes will be available for all affected releases, this vulnerability will rarely, if ever, require an upgrade to a new major release. Cisco recommends very careful planning for any upgrade between major releases. Make certain no known bugs will prevent the new software from working properly in your environment.
Further upgrade planning assistance is available on Cisco's World Wide Web site at:
If you have service contracts you can obtain new software through your regular update channels (generally through Cisco's World Wide Web site). You can upgrade to any software release, but you must remain within the boundaries of the feature sets you have purchased.
If you do not have service contracts, you can upgrade to obtain only the bug fixes; free upgrades are restricted to the minimum upgrade required to resolve the defects. In general, you will be restricted to upgrading within a single row of Table 4, except when no upgrade within the same row is available in a timely manner. Obtain updates by contacting one of the following Cisco Technical Assistance Centers (TACs):
Give the URL of this notice (http://www.cisco.com/warp/public/770/iossyslog-pub.shtml) as evidence for a free update. Non-contract customers must request free updates through the TAC. Please do not contact either "psirt@cisco.com" or "security-alert@cisco.com" for software updates.
You can work around this vulnerability by preventing any affected Cisco IOS device from receiving or processing UDP datagrams addressed to its port 514. This can be done either by using packet filtering on surrounding devices, or by using input access list filtering on the affected IOS device itself.
If you use an input access list, apply that list to all interfaces to which attackers may be able to send datagrams. Interfaces include not only physical LAN and WAN interfaces but also virtual subinterfaces of those physical interfaces, as well as virtual interfaces and interface templates corresponding to GRE, L2TP, L2F, and other tunneling protocols.
The input access list must block traffic destined for UDP port 514 at any of the Cisco IOS device's own IP addresses, as well as at any broadcast or multicast addresses on which the Cisco IOS device may be listening. Be sure to block both old-style "all-zeros" broadcasts and new-style "all-ones" broadcasts. It is not necessary to block traffic being forwarded to other hosts---only traffic actually addressed to the Cisco IOS device is of interest.
No single input access list works in all configurations. Know the effect of your access list in your specific configuration before activating it.
The following example shows a possible access list for a three-interface router, along with the configuration commands needed to apply the list. The example assumes input filtering is not needed, other than as a workaround for this problem:
! Deny all multicasts, and all unspecified-net broadcasts, to port 514 access-list 101 deny udp any 224.0.0.0 31.255.255.255 eq 514 ! Deny old-style unspecified-net broadcasts access-list 101 deny udp any host 0.0.0.0 eq 514 ! Deny network-specific broadcasts. This example assumes that all of ! the local interfaces are on the class B network 172.16.0.0, subnetted ! everywhere with mask 255.255.255.0. This will differ from network ! to network. Note that we block both new-style and old-style broadcasts. access-list 101 deny udp any 172.16.0.255 0.0.255.0 eq 514 access-list 101 deny udp any 172.16.0.0 0.0.255.0 eq 514 ! Deny packets sent to the addresses of our own network interfaces. access-list 101 deny udp any host 172.16.1.1 eq 514 access-list 101 deny udp any host 172.16.2.1 eq 514 access-list 101 deny udp any host 172.16.3.3 eq 514 ! Permit all other traffic (default would be to deny) access-list 101 permit ip any any ! Apply the access list to the input side of each interface interface ethernet 0 ip address 172.16.1.1 255.255.255.0 ip access-group 101 in interface ethernet 2 ip address 172.16.2.1 255.255.255.0 ip access-group 101 in interface ethernet 3 ip address 172.16.3.3 255.255.255.0 ip access-group 101 in
Listing all possible addresses---especially all possible broadcast addresses---to which attack packets may be sent is complicated. If you do not need to forward any legitimate syslog traffic received on an interface, you can block all syslog traffic arriving on that interface. Remember that blocking will affect traffic routed through the Cisco IOS device as well as traffic destined to the device; if the IOS device is expected to forward syslog packets, you will have to do the detailed filtering. Because input access lists impact system performance, install them with caution---especially on systems running very near their capacity.
Many Cisco software images have been or will be specially reissued to correct this vulnerability. For example, regular released Cisco IOS version 12.0(2) is vulnerable, as are interim versions 12.0(2.1) through 12.0(2.3). The first fixed interim version of Release12.0 mainline software is Release12.0(2.4). However, a special release, 12.0(2a), contains only the fix for this vulnerability and does not include any other bug fixes from later 12.0 interim releases.
If you are running Release 12.0(2) and want to fix this problem without risking possible instability presented by installing the 12.0(2.4) interim release, you can upgrade to Release 12.0(2a). Release 12.0(2a) is a "code branch" from the Release 12.0(2) base, which will merge back into the Release 12.0 mainline at Release 12.0(2.4).
Special releases, like 12.0(2a), are one-time, spot fixes, and they will not be maintained. Thus, the upgrade path from Release 12.0(2a) is to Release 12.0(3).
Table 4 specifies information about affected and repaired software versions.
| Cisco IOS Major Release | Description | Special Fix1 | First Fixed Interim Release2 | Fixed Maintenance Release3 |
|---|---|---|---|---|
| Unaffected Releases | ||||
11.2 and earlier releases---all variants | Unaffected early releases (no syslog server) | Unaffected | Unaffected | Unaffected |
11.3, 11.3 T, 11.3 DA, 11.3 MA, 11.3 NA, 11.3 WA, 11.3(2)XA | 11.3 releases without syslog servers | Unaffected | Unaffected | Unaffected |
| Releases Based on 11.3 | ||||
11.3 AA | 11.3 early deployment for AS58xx | 11.3(7)AA2, 8-JAN-19994 | 11.3(7.2)AA | 11.3(8)AA, 15-FEB-1999 |
11.3 DB | 11.3 for Cisco NRP routing blade in Cisco 6400 xDSL DSLAM |
|
| 11.3(7)DB2, 18-JAN-1999 |
| Releases Based on 12.0 | ||||
12.0 | 12.0 Mainline | 12.0(2a), 8-JAN-1999 | 12.0(2.4) | 12.0(3), 1-FEB-1999 |
12.0 T | 12.0 new technology early deployment | 12.0(2a)T1, 11-JAN-1999 | 12.0(2.4)T | 12.0(3)T, 15-FEB-1999 |
12.0 S | ISP support; 7200, RSP, GSR |
| 12.0(2.3)S, 27-DEC-1998 | 12.0(2)S5, 18-JAN-1999 |
12.0 DB | 12.0 for Cisco 6400 universal access concentrator node switch processor (lab use) |
|
| 12.0(2)DB, 18-JAN-1999 |
12.0(1)W | 12.0 for Catalyst 8500 and LS1010 | 12.0(1)W5(5a) and 12.0(1a)W5(5b) (LS1010 platform only) | 12.0(1)W5(5.15) | 12.0(1)W5(6) (platform support for Catalyst 8540M will be in 12.0(1)W5(7)) |
12.0(0.6)W5 | One-time early deployment for CH-OC-12 module in Catalyst 8500 series switches | Unaffected; one-time release | Unaffected | Unaffected; To upgrade use 12.0(1)W5 releases. |
12.0(1)XA3 | Short-life release; merged to 12/0T at 12.0(2)T | Obsolete | Merged | Upgrade to 12.0(2a)T1 or to 12.0(3)T. |
12.0(1)XB | Short-life release for Cisco 800 series; merged to 12.0 T and 12.0 (3)T | 12.0(1)XB1 | Merged | Upgrade to 12.0(3)T. |
12.0(2)XC | Short-life release for new features in Cisco 2600, Cisco 3600, uBR7200, uBR900 series; merged to 12.0 T at 12.0(3)T | 12.0(2)XC1, 7-JAN-1999 | Merged | Upgrade to 12.0(3)T |
12.0(2)XD | Short-life release for ISDN voice features; merged to 12.0 T at 12.0(3)T | 12.0(2)XD1, 18-JAN-1999 | Merged | Upgrade to 12.0(3)T |
12.0(1)XE | Short-life release | 12.0(2)XE, 18-JAN-1999 | Merged | Upgrade to 12.0(3)T |
Caveats describe unexpected behavior or defects in Cisco IOS software releases. Severity 1 caveats are the most serious caveats; severity 2 caveats are less serious. All caveats in Release 12.0 and 12.0 T are also in Release 12.0(4)XM.
For information on caveats in Cisco IOS Release 12.0 T, refer to the Caveats for Cisco IOS Release 12.0 T document. For information on caveats in Cisco IOS Release 12.0, refer to the Caveats for Cisco IOS Release 12.0 document. Both of these documents list severity 1 and 2 caveats and are located on CCO and the Documentation CD-ROM.
The following sections describe the documentation available for the Cisco 805 router. Typically, these documents consist of hardware and software installation guides, Cisco IOS configuration and command references, system error messages, feature modules, and other documents.
Documentation is available as printed manuals or electronic documents, except for feature modules, which are available online on CCO and the Documentation CD-ROM.
Use these release notes with the documents listed in the following sections:
The following documents are specific to Release 12.0. They are located on CCO and the Documentation CD-ROM:
These documents are available for the Cisco 805 router on CCO and the Documentation CD-ROM.
To reach Cisco 805 router documentation from CCO, click on this path:
Service & Support: Documentation Home Page: Access Servers and Access Routers: Fixed Access Routers: Cisco 805 Router
To reach Cisco 805 router documentation on the Documentation CD-ROM, click on this path:
Cisco Product Documentation: Access Servers and Access Routers: Fixed Access Routers: Cisco 805 Router
Feature modules describe new features supported by Release 12.0 T and are updates to the Cisco IOS documentation set. A feature module consists of a brief overview of the feature, benefits, configuration tasks, and a command reference. As updates, the feature modules are available online only. Feature module information is incorporated in the next printing of the Cisco IOS documentation set.
To reach the feature modules from CCO, click on this path:
Service & Support: Documentation Home Page: Cisco IOS Software Configuration: Cisco IOS Release 12.0: New Feature Documentation
To reach the feature modules on the Documentation CD-ROM, click on this path:
Cisco Product Documentation: Cisco IOS Software Configuration: Cisco IOS Release 12.0: New Feature Documentation
The Cisco IOS software documentation set consists of the Cisco IOS configuration guides, Cisco IOS command references, and several other supporting documents. These documents are shipped with your order in electronic form on the Documentation CD-ROM---unless you specifically ordered the printed versions.
Each module in the Cisco IOS documentation set consists of two books: a configuration guide and a corresponding command reference. Chapters in a configuration guide describe protocols, configuration tasks and Cisco IOS software functionality, and they contain comprehensive configuration examples. Chapters in a command reference provide complete command syntax information. Use each configuration guide with its corresponding command reference.
On CCO and the Documentation CD-ROM, two master hot-linked documents provide information for the Cisco IOS software documentation set: configuration guides and command references.
To reach these documents from CCO, click on this path:
Service & Support: Documentation Home Page: Cisco IOS Software Configuration: Cisco IOS Release 12.0: Configuration Guides and Command References
To reach these documents on the Documentation CD-ROM, click on this path:
Cisco Product Documentation: Cisco IOS Software Configuration: Cisco IOS Release 12.0: Configuration Guides and Command References
Table 5 describes the contents of the Cisco IOS Release 12.0 software documentation set, which is available in electronic form and in printed form upon request.
To reach the Cisco IOS documentation set from CCO, click on this path:
Service & Support: Documentation Home Page: Cisco IOS Software Configuration: Cisco IOS Release 12.0
To reach the Cisco IOS documentation set on the Documentation CD-ROM, click on this path:
Cisco Product Documentation: Cisco IOS Software Configuration: Cisco IOS Release 12.0
| Books | Chapter Topics |
|---|---|
| Configuration Fundamentals Overview |
| Transparent Bridging |
| Dial-In Port Setup |
| Interface Configuration Overview |
| IP Addressing |
| AppleTalk |
| Apollo Domain |
| AAA Security Services |
| Switching Paths for IP Networks |
| ATM |
| Voice over IP |
| Classification |
|
|
For service and support for a product purchased from a reseller, contact the reseller. Resellers offer a wide variety of Cisco service and support programs that are described in the "Service and Support" section of the Cisco Information Packet shipped with your product.
For service and support for a product purchased directly from Cisco, use CCO.
If you have a CCO login account, you can access the following URL, which contains links and helpful tips on configuring your Cisco products:
http://www.cisco.com/kobayashi/serv_tips.shtml
This URL is subject to change without notice. If it changes, point your Web browser to CCO and click on this path: Products & Technologies: Products: Technical Tips.
The following sections are provided from the Technical Tips page:
Cisco Connection Online (CCO) is Cisco Systems' primary, real-time support channel. Maintenance customers and partners can self-register on CCO to obtain additional information and services.
Available 24 hours a day, 7 days a week, CCO provides a wealth of standard and value-added services to Cisco's customers and business partners. CCO services include product information, product documentation, software updates, release notes, technical tips, the Bug Navigator, configuration notes, brochures, descriptions of service offerings, and download access to public and authorized files.
CCO serves a wide variety of users through two interfaces that are updated and enhanced simultaneously: a character-based version and a multimedia version that resides on the World Wide Web (WWW). The character-based CCO supports Zmodem, Kermit, Xmodem, FTP, and Internet e-mail, and it is excellent for quick access to information over lower bandwidths. The WWW version of CCO provides richly formatted documents with photographs, figures, graphics, and video, as well as hyperlinks to related information.
You can reach CCO in the following ways:
For a copy of CCO's Frequently Asked Questions (FAQ), contact cco-help@cisco.com. For additional information, contact cco-team@cisco.com.
Cisco documentation and additional literature are available in a CD-ROM package, which package that ships with your product. The Documentation CD-ROM, a member of the Cisco Connection Family, is updated monthly. Therefore, it might be more current than printed documentation. To order additional copies of the Documentation CD-ROM, contact your local sales representative or call customer service. The CD-ROM package is available as a single package or as an annual subscription. You can also access Cisco documentation on the World Wide Web at http://www.cisco.com, http://www-china.cisco.com, or http://www-europe.cisco.com.
If you are reading Cisco product documentation on the World Wide Web, you can submit comments electronically. Click Feedback in the toolbar and select Documentation. After you complete the form, click Submit to send it to Cisco. We appreciate your comments.

![]()
![]()
![]()
![]()
![]()
![]()
![]()
Posted: Sun May 14 22:01:51 PDT 2000
Copyright 1989 - 2000©Cisco Systems Inc.