Cisco Cisco Aironet 1310 Access Point Bridge Release Notes
![Cisco](https://files.manualsbrain.com/attachments/7380d0050044647c30f5c24bbbf5d0c0b6d9bb84/common/fit/150/50/faa183d287233c52228cfea3dbc2a127fe780f60564fcb0955d9c3d1cd23/brand_logo.png)
19
Release Notes for Cisco Aironet Access Points and Bridges for Cisco IOS Release 12.4(10b)JA
OL-14517-01
Caveats
•
CSCsk44106—SNMP returns incorrect cipher values for some clients when multiple ciphers are
defined on an interface. This condition only affects some of the clients when there are multiple
ciphers on the interface.
defined on an interface. This condition only affects some of the clients when there are multiple
ciphers on the interface.
Workaround: None.
•
CSCsk58820—Station roles have different possible RTS threshold values (some 4000 some 2347).
Workaround: None.
•
CSCsk63453—Tracebacks occur on 1200 series access points when the Taiwan carrier set is
enabled.
enabled.
Workaround: None.
•
CSCsk65207—1310 series bridges sometimes ignore a fixed channel under the dot11radio0
interface even when it is the least congested channel.
interface even when it is the least congested channel.
Workaround: None.
•
CSCsk78264—A change in the RF domain name takes effect only after a reboot.
Workaround: Reboot the controller after changing the RF domain name.
Resolved Caveats
These caveats are resolved in Cisco IOS Release 12.4(10b)JA:
•
CSCse56501
A device running Cisco IOS software that has Internet Protocol version 6 (IPv6) enabled may be
subject to a denial of service (DoS) attack. For the device to be affected by this vulnerability the
device also has to have certain Internet Protocol version 4 (IPv4) User Datagram Protocol (UDP)
services enabled. To exploit this vulnerability an offending IPv6 packet must be targeted to the
device. Packets that are routed throughout the router can not trigger this vulnerability. Successful
exploitation will prevent the interface from receiving any additional traffic. The only exception is
Resource Reservation Protocol (RSVP) service, which if exploited, will cause the device to crash.
Only the interface on which the vulnerability was exploited will be affected.
subject to a denial of service (DoS) attack. For the device to be affected by this vulnerability the
device also has to have certain Internet Protocol version 4 (IPv4) User Datagram Protocol (UDP)
services enabled. To exploit this vulnerability an offending IPv6 packet must be targeted to the
device. Packets that are routed throughout the router can not trigger this vulnerability. Successful
exploitation will prevent the interface from receiving any additional traffic. The only exception is
Resource Reservation Protocol (RSVP) service, which if exploited, will cause the device to crash.
Only the interface on which the vulnerability was exploited will be affected.
Cisco is providing fixed software to address this issue. There are workarounds available to mitigate
the effects of the vulnerability.
the effects of the vulnerability.
This advisory is posted at
•
CSCsc04907—Resetting the access point to factory defaults does not clear the static IP address.
•
CSCse49342—DHCP_SERVER_FAILURE observed in 1300 series in WGB mode.
•
CSCsg69625—The access point does not mark the DSCP on the IP GRE header.
•
CSCsg71454—System sometimes restarts because of unknown reload cause.
•
CSCsg71997—Hostname not assigned to access point when IP address obtained from DHCP server.
•
CSCsh17037—In rare circumstances, a memory leak may develop in the SSH process.
•
CSCsi10234—An access point in HREAP mode sometimes gets out of sync with the controller on
which WLANS are active if the access point loses connection with the controller and the WLAN
configuration on the controller is changed.
which WLANS are active if the access point loses connection with the controller and the WLAN
configuration on the controller is changed.
•
CSCsi18135—Add dynamic WLAN functionality for Diagnostic WLAN.