Cisco Cisco Aironet 1400 Wireless Bridge Notas de publicación

Descargar
Página de 9
 
6
Release Notes for Cisco Aironet 1410 Bridges for Cisco IOS Release 12.3(7)JA3
OL-10096-01
  Caveats
On wireless bridges, all VLANs traversing the bridge link must use the same encryption settings. To 
avoid confusion, do not use the “vlan <vlan-id> keyword on the encryption command as shown in 
the following example:
interface dot11radio0
encryption key 1 size 128bit AAAAABBBBBCCCCCDDDDDEEEEEF transmit-key
encryption mode wep mandatory mic
CSCsa68144—Default bridge configuration is invalid.
When a defaulted 1400 series bridge boots up, it displays an error that the RTS threshold contains 
invalid input. The RTS threshold is set to 4000. Entering a ? after entering RTS threshold indicates 
the maximum value is 4000 but a system error occurs when attempting to set it. The maximum value 
that the CLI allows is 2347.
CSCsb04925—Bridge displays junk characters when show controllers command is issued.
When show controllers dot110 is entered, it displays a serial number with a junk character.
Resolved Caveats in Cisco IOS Release 12.3(7)JA3
The following caveats were resolved in Cisco IOS Release 12.3(7)JA3:
CSCsc60665—A non-root bridge now associates with a root bridge after being power cycled. 
CSCsc64976—HTTP server now scrubs embedded HTML tags from command output.
Resolved Caveats in Cisco IOS Release 12.3(7)JA2
No caveats for the 1400 series bridge were resolved in Cisco IOS release 12.3(7)JA2.
Resolved Caveats in Cisco IOS Release 12.3(7)JA1
CSCej08390—Reboot loop with snmp-server ifindex persist configured no longer occurs.
CSCef83274—Bridge now sends RADIUS state information.
CSCef77951—Excessive processor memory is no longer held by IRB/CRB rxtypes.
CSCee36192—The no snmp-server enable traps tty command is effective through reload.
Resolved Caveats in Cisco IOS Release 12.3(7)JA
The following caveats are resolved in Cisco IOS Release 12.3(7)JA:
CSCeg45312—Radius authentication bypassed when configured with a none fallback method.
Remote Authentication Dial In User Service (RADIUS) authentication on a device that is running 
certain versions of Cisco Internetworking Operating System (IOS) and configured with a fallback 
method to none can be bypassed. Systems that are configured for other authentication methods or 
that are not configured with a fallback method to none are not affected. Only the systems that are 
running certain versions of Cisco IOS are affected. Not all configurations using RADIUS and none 
are vulnerable to this issue. Some configurations using RADIUS, none and an additional method are 
not affected.