Cisco Cisco Aironet 1400 Wireless Bridge Notas de publicación

Descargar
Página de 9
 
7
Release Notes for Cisco Aironet 1410 Bridges for Cisco IOS Release 12.3(7)JA3
OL-10096-01
  Troubleshooting
Cisco has made free software available to address this vulnerability. There are workarounds 
available to mitigate the effects of the vulnerability. 
More details can be found in the security advisory which posted at the following URL:
CSCsb06824—Open authentication is no longer added to an EAP SSID when a non-root bridge 
configuration is loaded.
CSCsa72936—The results for the show controller d0 command now includes the radio serial 
number.
CSCsb08590—Bridge now flashes radio firmware correctly on IOS upgrade.
CSCeb52431—Bridge no longer bombards AAA server with HTTP authentication requests.
CSCsb14318—Bridge out-of-box boot behavior has been reverted to its original behavior.
CSCsa54608—The Cisco IOS Firewall Authentication Proxy for FTP and/or Telnet Sessions feature 
in specific versions of Cisco IOS software is no longer vulnerable to a remotely-exploitable buffer 
overflow condition.
If You Need More Information
If you need information about a specific caveat that does not appear in these release notes, you can use 
the Cisco Bug Toolkit to find select caveats of any severity. Click this URL to browse to the Bug Toolkit:
(If you request a defect that cannot be displayed, the defect number might not exist, the defect might not 
yet have a customer-visible description, or the defect might be marked Cisco Confidential.)
Troubleshooting
For the most up-to-date, detailed troubleshooting information, refer to the Cisco TAC website at 
. Click Technology Support, choose Wireless from the menu on the left, and 
click Wireless LAN.
Documentation Updates
The Cisco Aironet 1400 Series Wireless Bridge Mounting Instructions provides detailed instructions for 
installing and mounting the bridge.
Stacking Bridges Section Changes
The separation distance between the two stacked bridge antennas is a minimum of 6.56 ft (2 m).
Cisco has made free software available to address this vulnerability. There are workarounds 
available to mitigate the effects of the vulnerability. 
More details can be found in the security advisory which posted at the following URL:
CSCsb06824—Open authentication is no longer added to an EAP SSID when a non-root bridge 
configuration is loaded.
CSCsa72936—The results for the show controller d0 command now includes the radio serial 
number.
CSCsb08590—Bridge now flashes radio firmware correctly on IOS upgrade.
CSCeb52431—Bridge no longer bombards AAA server with HTTP authentication requests.
CSCsb14318—Bridge out-of-box boot behavior has been reverted to its original behavior.
CSCsa54608—The Cisco IOS Firewall Authentication Proxy for FTP and/or Telnet Sessions feature 
in specific versions of Cisco IOS software is no longer vulnerable to a remotely-exploitable buffer 
overflow condition.
If You Need More Information
If you need information about a specific caveat that does not appear in these release notes, you can use 
the Cisco Bug Toolkit to find select caveats of any severity. You can access the Bug Toolkit at:
(If you request a defect that cannot be displayed, the defect number might not exist, the defect might not 
yet have a customer-visible description, or the defect might be marked Cisco Confidential.)
Note
You need to have a user login and password to use the Bug Toolkit.
For the most up-to-date, detailed troubleshooting information, refer to the Cisco TAC website at 
. Click Technology Support, choose Wireless 
from the menu on the left, and click Wireless LAN.
Documentation Updates
The Cisco Aironet 1400 Series Wireless Bridge Mounting Instructions provides detailed instructions for 
installing and mounting the bridge.
Stacking Bridges Section Changes
The separation distance between the two stacked bridge antennas is a minimum of 6.56 ft (2 m).