Cisco Cisco Aironet 1400 Wireless Bridge Release Notes
6
Release Notes for Cisco Aironet 1410 Bridges for Cisco IOS Release 12.2(13)JA
OL-4530-01
Caveats
Caveats
This section lists open and resolved caveats in Cisco IOS Release 12.2(13)JA for the bridge.
Open Caveats
These caveats are open in Cisco IOS Release 12.2(13)JA for the bridge:
•
CSCeb14603—When the bridge is transmitting and receiving heavy traffic, you cannot start a Telnet
session and existing Telnet sessions freeze or hang. There is no workaround for this issue.
session and existing Telnet sessions freeze or hang. There is no workaround for this issue.
•
CSCec40452—When you run a link test or install the bridge using the autoinstall mode, the RSSI
reading is 4 dB lower than actual at room temperature and 8 dB lower than actual when the outdoor
ambient temperature is higher than approximately 45° C. There is no workaround for this issue.
reading is 4 dB lower than actual at room temperature and 8 dB lower than actual when the outdoor
ambient temperature is higher than approximately 45° C. There is no workaround for this issue.
•
CSCin57580—MAC address filtering sometimes fails to stop traffic from filtered addresses. There
is no workaround for this issue.
is no workaround for this issue.
Resolved Caveats
These caveats are resolved in Cisco IOS Release 12.2(13)JA:
•
CSCdu53656—A Cisco device running IOS and enabled for the Border Gateway Protocol (BGP) is
vulnerable to a Denial of Service (DOS) attack from a malformed BGP packet. The BGP protocol
is not enabled by default, and must be configured in order to accept traffic from an explicitly defined
peer. Unless the malicious traffic appears to be sourced from a configured, trusted peer, it would be
difficult to inject a malformed packet. BGP MD5 is a valid workaround for this problem.
vulnerable to a Denial of Service (DOS) attack from a malformed BGP packet. The BGP protocol
is not enabled by default, and must be configured in order to accept traffic from an explicitly defined
peer. Unless the malicious traffic appears to be sourced from a configured, trusted peer, it would be
difficult to inject a malformed packet. BGP MD5 is a valid workaround for this problem.
Cisco has made free software available to address this problem. For more details, please refer to this
advisory, available at
advisory, available at
.
•
CSCea28131—A Cisco device running IOS and enabled for the Border Gateway Protocol (BGP) is
vulnerable to a Denial of Service (DOS) attack from a malformed BGP packet. The BGP protocol
is not enabled by default, and must be configured in order to accept traffic from an explicitly defined
peer. Unless the malicious traffic appears to be sourced from a configured, trusted peer, it would be
difficult to inject a malformed packet. BGP MD5 is a valid workaround for this problem.
vulnerable to a Denial of Service (DOS) attack from a malformed BGP packet. The BGP protocol
is not enabled by default, and must be configured in order to accept traffic from an explicitly defined
peer. Unless the malicious traffic appears to be sourced from a configured, trusted peer, it would be
difficult to inject a malformed packet. BGP MD5 is a valid workaround for this problem.
Cisco has made free software available to address this problem. For more details, please refer to this
advisory, available at
advisory, available at
.
•
CSCea28990—The bridge now passes IP traffic when the bridge # route IP command is configured.
•
CSCea57649—The CLI Help command no longer produces incorrect output for the radio interface.
•
CSCea77473—HTTP software upgrade no longer fails with Netscape version 7.x.
•
CSCea81730—The web interface for the non-root bridge now correctly displays the root-bridge MAC
address on the radio page.
address on the radio page.
•
CSCeb05835— The web interface no longer shows incorrect STP Root information on a bridge
setup with multiple VLANs.
setup with multiple VLANs.
•
CSCeb12740—The virtual radio connection can now be made after the station role is changed.
•
CSCeb15923—Radio firmware recovery now works reliably.
•
CSCeb17296—The clear dot client command now works with traffic being passed.