Cisco Cisco Aironet 1400 Wireless Bridge Notas de publicación
6
Release Notes for Cisco Aironet 1410 Bridges for Cisco IOS Release 12.3(7)JA3
OL-10096-01
Caveats
On wireless bridges, all VLANs traversing the bridge link must use the same encryption settings. To
avoid confusion, do not use the “vlan <vlan-id> keyword on the encryption command as shown in
the following example:
avoid confusion, do not use the “vlan <vlan-id> keyword on the encryption command as shown in
the following example:
interface dot11radio0
encryption key 1 size 128bit AAAAABBBBBCCCCCDDDDDEEEEEF transmit-key
encryption mode wep mandatory mic
•
CSCsa68144—Default bridge configuration is invalid.
When a defaulted 1400 series bridge boots up, it displays an error that the RTS threshold contains
invalid input. The RTS threshold is set to 4000. Entering a ? after entering RTS threshold indicates
the maximum value is 4000 but a system error occurs when attempting to set it. The maximum value
that the CLI allows is 2347.
invalid input. The RTS threshold is set to 4000. Entering a ? after entering RTS threshold indicates
the maximum value is 4000 but a system error occurs when attempting to set it. The maximum value
that the CLI allows is 2347.
•
CSCsb04925—Bridge displays junk characters when show controllers command is issued.
When show controllers dot110 is entered, it displays a serial number with a junk character.
Resolved Caveats in Cisco IOS Release 12.3(7)JA3
The following caveats were resolved in Cisco IOS Release 12.3(7)JA3:
–
CSCsc60665—A non-root bridge now associates with a root bridge after being power cycled.
–
CSCsc64976—HTTP server now scrubs embedded HTML tags from command output.
Resolved Caveats in Cisco IOS Release 12.3(7)JA2
No caveats for the 1400 series bridge were resolved in Cisco IOS release 12.3(7)JA2.
Resolved Caveats in Cisco IOS Release 12.3(7)JA1
•
CSCej08390—Reboot loop with snmp-server ifindex persist configured no longer occurs.
•
CSCef83274—Bridge now sends RADIUS state information.
•
CSCef77951—Excessive processor memory is no longer held by IRB/CRB rxtypes.
•
CSCee36192—The no snmp-server enable traps tty command is effective through reload.
Resolved Caveats in Cisco IOS Release 12.3(7)JA
The following caveats are resolved in Cisco IOS Release 12.3(7)JA:
•
CSCeg45312—Radius authentication bypassed when configured with a none fallback method.
Remote Authentication Dial In User Service (RADIUS) authentication on a device that is running
certain versions of Cisco Internetworking Operating System (IOS) and configured with a fallback
method to none can be bypassed. Systems that are configured for other authentication methods or
that are not configured with a fallback method to none are not affected. Only the systems that are
running certain versions of Cisco IOS are affected. Not all configurations using RADIUS and none
are vulnerable to this issue. Some configurations using RADIUS, none and an additional method are
not affected.
certain versions of Cisco Internetworking Operating System (IOS) and configured with a fallback
method to none can be bypassed. Systems that are configured for other authentication methods or
that are not configured with a fallback method to none are not affected. Only the systems that are
running certain versions of Cisco IOS are affected. Not all configurations using RADIUS and none
are vulnerable to this issue. Some configurations using RADIUS, none and an additional method are
not affected.