Cisco Cisco Aironet 1310 Access Point Bridge Release Notes

Page of 18
   
14
Release Notes for Cisco Aironet 1310 Outdoor Access Point/Bridge for Cisco IOS Release 12.3(2)JA5
OL-8218-01
  Caveats
CSCef11167—When polling cDot11ActiveWireless Clients via SNMP, the response may have a 
value of 4294967292. This occurs in the CiscoWorks Wireless Solution Engine (WLSE) as AP in 
Overloaded state.
There is no workaround for this caveat.
CSCef45010—The access point/bridge GUI performs poorly when half duplex and a specified speed 
are part of its configuration. 
If you hardcode the duplex and speed into a configuration for the fast Ethernet interface, the GUI 
becomes extremely slow. You may also experience a high number of input errors when you try to 
use the GUI. Telnet or console traffic is not affected. 
Workaround: Set the 1310 Ethernet port settings to Auto Speed and Auto Negotiation. 
CSCef65076—The access point GUI sometimes reports this error when you add a RADIUS server 
hostname to the access point:
HTTP 400 - Bad Request
Workaround: Enter the server IP address instead of the hostname.
CSCsa40042, CSCsa40045—The user interfaces on the access point/bridge allow you to configure 
the bridge to fall back to repeater mode if the Ethernet link fails. However, repeater mode is not 
supported on the access point/bridge.
Resolved Caveats in Cisco IOS Release 12.3(2)JA5
The following caveat is resolved in Cisco IOS Release 12.3(2)JA5:
CSCei61732
Cisco IOS may permit arbitrary code execution after exploitation of a heap-based buffer overflow 
vulnerability. Cisco has included additional integrity checks in its software, as further described 
below, that are intended to reduce the likelihood of arbitrary code execution.
Cisco has made free software available that includes the additional integrity checks for affected 
customers.
This advisory is posted at 
.
CSCei76358—Through normal software maintenance processes, Cisco is removing depreciated 
functionality. These changes have no impact on system operation or feature availability.
Resolved Caveats in Cisco IOS Release 12.3(2)JA
These caveats are resolved in Cisco IOS Release 12.3(2)JA for the access point/bridge:
CSCee51985—Access points now correctly apply QoS priorities to DSCP-tagged packets.
CSCee90230—When the access point is configured for TACACS+ administrator authentication and 
uses an IP address from the DHCP server, tracebacks no longer occur when the access point reboots.
CSCef60659, CSCsa59600—A document that describes how the Internet Control Message Protocol 
(ICMP) could be used to perform a number of Denial of Service (DoS) attacks against the 
Transmission Control Protocol (TCP) has been made publicly available. This document has been 
published through the Internet Engineering Task Force (IETF) Internet Draft process, and is entitled 
“ICMP Attacks Against TCP” (draft-gont-tcpm-icmp-attacks-03.txt).