Cisco Cisco Aironet 1200 Access Point Notas de publicación
9
Release Notes for Cisco Aironet 1200 Series Access Points Running VxWorks Firmware Version 12.04
OL-5158-01
Important Notes
Important Notes
This section lists important information about access points running VxWorks firmware version 12.04.
MAC Address Filtering
Version 12.04 has added a new method of MAC address filtering. The filter is based on whether or not
the address is a client. A new “Client Disallowed” button on the Address Filters page allows users to
determine whether or not a client having a specific MAC address is allowed to associate to the access
point. Using the “Client Disallowed” feature prevents clients from assuming sensitive MAC addresses
on the user’s network.
the address is a client. A new “Client Disallowed” button on the Address Filters page allows users to
determine whether or not a client having a specific MAC address is allowed to associate to the access
point. Using the “Client Disallowed” feature prevents clients from assuming sensitive MAC addresses
on the user’s network.
Setting ACS Session Timeout
Version 12.04 has added a MAC authentication timeout featurette which is used in conjunction with
MAC authentication caching. It enables administrators to control MAC authentication session time in
seconds by configuring the ACS with RADIUS attribute Session-Timeout (27). When the session time
expires, the access point deauthenticates the client and removes the cached MAC authenticated entry.
When the client re-associates, the access point performs a MAC authentication operation with the ACS.
MAC authentication caching. It enables administrators to control MAC authentication session time in
seconds by configuring the ACS with RADIUS attribute Session-Timeout (27). When the session time
expires, the access point deauthenticates the client and removes the cached MAC authenticated entry.
When the client re-associates, the access point performs a MAC authentication operation with the ACS.
Note
This featurette addresses resolved caveats CSCec08844, CSCec35327, and CSCeb61728.
SQL Worm Virus Vulnerability
In certain situations, the access point could be affected by the SQL Worm virus. The signature of this
worm appears as high volumes of UDP traffic to port 1434. Symptoms on Cisco devices include but are
not limited to high CPU usage and traffic drops on the input interfaces.
worm appears as high volumes of UDP traffic to port 1434. Symptoms on Cisco devices include but are
not limited to high CPU usage and traffic drops on the input interfaces.
The worm has been referenced by several names including Slammer, Sapphire, and MS SQL.
Cisco has prepared a security notice containing details about this virus and how to eliminate it. The
document is on Cisco.com at the following link:
document is on Cisco.com at the following link:
Cisco Aironet Software Requires Completion of Encryption Authorization Form
In order to access Cisco Aironet software from the Software Center on Cisco.com, you must now fill out
a form to receive authorization to download encrypted software. Registered Cisco.com users are required
to fill out the form only once, but public users must do so once each session, each time software is
downloaded. A form is automatically created for public users. The form for registered Cisco.com users
is located at the following URL:
a form to receive authorization to download encrypted software. Registered Cisco.com users are required
to fill out the form only once, but public users must do so once each session, each time software is
downloaded. A form is automatically created for public users. The form for registered Cisco.com users
is located at the following URL: