Cisco Cisco Aironet 1200 Access Point Notas de publicación

Descargar
Página de 26
 
24
Release Notes for Cisco Aironet 350, 1100, 1130AG, 1200, and 1230AG Series Access Points for Cisco IOS Release 12.3(2)JA6
OL-10201-01
Caveats
CSCeg34056—AIR-RM21A and AIR-RM22A radio modules measure transmit power in decibels 
per milliwatt (dBm), but earlier versions of 802.11a radios in Cisco Aironet access points measure 
power in milliwatts (mW). Because power settings in mW do not translate directly to settings in 
dBm, the access point usually uses the default power setting of maximum when you install a new 
AIR-RM21A or AIR-RM22A radio module. See 
 for a list of 802.11a transmit power settings 
in mW and the power settings that the access point assigns to a new radio module.
CSCeg34694—The access point now accepts TACACS+ commands while using TFTP to download 
a configuration file.
CSCeg36818—Access points configured as WDS devices no longer use up all UDP ports on the 
RADIUS server when an infrastructure access point repeatedly sends the wrong credentials to the 
server.
CSCeg46554—Enabling the QBSS element on the access point no longer blocks calls from Cisco 
7920 IP phones.
CSCeg51737—Access points now include I/O memory information in core dumps to an FTP server.
CSCin46434—The access point now correctly prompts for the password when configured for 
TACACS+ authentication.
CSCin82864—The MIB object ciscoFlashCopyTable now returns a correct response.
CSCsa39460—When a 1310 series access point in workgroup bridge mode roams from one access 
point to another, the client devices connected to the workgroup bridge no longer lose their network 
connection.
CSCsa42723, CSCuk25470—Access points no longer reboot when receiving SNMP traps.
CSCsa43898—1310 series access points in workgroup bridge mode now correctly perform LEAP 
authentication.
CSCsa44872—Access points now correctly forward multicast and broadcast messages from the 
LAN interface to radio interfaces.
CSCsa45409—Access points no longer fail to boot when the file flash:env_vars is missing.
CSCsa45470—The boot system flash: command no longer generates an unexpected exception 
error.
CSCsa47527—An access point configured as the WDS device no longer incorrectly blocks client 
devices that attempt to reauthenticate using EAP.
CSCsa59600—A document that describes how the Internet Control Message Protocol (ICMP) could 
be used to perform a number of Denial of Service (DoS) attacks against the Transmission Control 
Protocol (TCP) has been made publicly available. This document has been published through the 
Internet Engineering Task Force (IETF) Internet Draft process, and is entitled “ICMP Attacks 
Against TCP” (draft-gont-tcpm-icmp-attacks-03.txt).
These attacks, which only affect sessions terminating or originating on a device itself, can be of 
three types:
1. Attacks that use ICMP “hard” error messages 
2. Attacks that use ICMP “fragmentation needed and Don’t Fragment (DF) bit set” messages, also 
known as Path Maximum Transmission Unit Discovery (PMTUD) attacks 
3. Attacks that use ICMP “source quench” messages
Successful attacks may cause connection resets or reduction of throughput in existing connections, 
depending on the attack type.
Multiple Cisco products are affected by the attacks described in this Internet draft.