Cisco Cisco Aironet 1200 Access Point Release Notes
24
Release Notes for Cisco Aironet 350, 1100, 1130AG, 1200, and 1230AG Series Access Points for Cisco IOS Release 12.3(2)JA6
OL-10201-01
Caveats
•
CSCeg34056—AIR-RM21A and AIR-RM22A radio modules measure transmit power in decibels
per milliwatt (dBm), but earlier versions of 802.11a radios in Cisco Aironet access points measure
power in milliwatts (mW). Because power settings in mW do not translate directly to settings in
dBm, the access point usually uses the default power setting of maximum when you install a new
AIR-RM21A or AIR-RM22A radio module. See
per milliwatt (dBm), but earlier versions of 802.11a radios in Cisco Aironet access points measure
power in milliwatts (mW). Because power settings in mW do not translate directly to settings in
dBm, the access point usually uses the default power setting of maximum when you install a new
AIR-RM21A or AIR-RM22A radio module. See
for a list of 802.11a transmit power settings
in mW and the power settings that the access point assigns to a new radio module.
•
CSCeg34694—The access point now accepts TACACS+ commands while using TFTP to download
a configuration file.
a configuration file.
•
CSCeg36818—Access points configured as WDS devices no longer use up all UDP ports on the
RADIUS server when an infrastructure access point repeatedly sends the wrong credentials to the
server.
RADIUS server when an infrastructure access point repeatedly sends the wrong credentials to the
server.
•
CSCeg46554—Enabling the QBSS element on the access point no longer blocks calls from Cisco
7920 IP phones.
7920 IP phones.
•
CSCeg51737—Access points now include I/O memory information in core dumps to an FTP server.
•
CSCin46434—The access point now correctly prompts for the password when configured for
TACACS+ authentication.
TACACS+ authentication.
•
CSCin82864—The MIB object ciscoFlashCopyTable now returns a correct response.
•
CSCsa39460—When a 1310 series access point in workgroup bridge mode roams from one access
point to another, the client devices connected to the workgroup bridge no longer lose their network
connection.
point to another, the client devices connected to the workgroup bridge no longer lose their network
connection.
•
CSCsa42723, CSCuk25470—Access points no longer reboot when receiving SNMP traps.
•
CSCsa43898—1310 series access points in workgroup bridge mode now correctly perform LEAP
authentication.
authentication.
•
CSCsa44872—Access points now correctly forward multicast and broadcast messages from the
LAN interface to radio interfaces.
LAN interface to radio interfaces.
•
CSCsa45409—Access points no longer fail to boot when the file flash:env_vars is missing.
•
CSCsa45470—The boot system flash: command no longer generates an unexpected exception
error.
error.
•
CSCsa47527—An access point configured as the WDS device no longer incorrectly blocks client
devices that attempt to reauthenticate using EAP.
devices that attempt to reauthenticate using EAP.
•
CSCsa59600—A document that describes how the Internet Control Message Protocol (ICMP) could
be used to perform a number of Denial of Service (DoS) attacks against the Transmission Control
Protocol (TCP) has been made publicly available. This document has been published through the
Internet Engineering Task Force (IETF) Internet Draft process, and is entitled “ICMP Attacks
Against TCP” (draft-gont-tcpm-icmp-attacks-03.txt).
be used to perform a number of Denial of Service (DoS) attacks against the Transmission Control
Protocol (TCP) has been made publicly available. This document has been published through the
Internet Engineering Task Force (IETF) Internet Draft process, and is entitled “ICMP Attacks
Against TCP” (draft-gont-tcpm-icmp-attacks-03.txt).
These attacks, which only affect sessions terminating or originating on a device itself, can be of
three types:
three types:
1. Attacks that use ICMP “hard” error messages
2. Attacks that use ICMP “fragmentation needed and Don’t Fragment (DF) bit set” messages, also
known as Path Maximum Transmission Unit Discovery (PMTUD) attacks
3. Attacks that use ICMP “source quench” messages
2. Attacks that use ICMP “fragmentation needed and Don’t Fragment (DF) bit set” messages, also
known as Path Maximum Transmission Unit Discovery (PMTUD) attacks
3. Attacks that use ICMP “source quench” messages
Successful attacks may cause connection resets or reduction of throughput in existing connections,
depending on the attack type.
depending on the attack type.
Multiple Cisco products are affected by the attacks described in this Internet draft.