Cisco Cisco Aironet 1310 Access Point Bridge Notas de publicación
12
Release Notes for Cisco Aironet 1300 Series Outdoor Access Point/Bridge for Cisco IOS Release 12.3(7)JA
OL-8060-01
Caveats
Caveats
This section lists
in Cisco IOS Release 12.3(7)JA for the access
point/bridge.
Open Caveats
These caveats are open in Cisco IOS Release 12.3(7)JA for the access point/bridge:
•
CSCed17799—Warning message does not display for a sufficient period of time.
When user attempts to delete an infrastructure SSID using the GUI, the warning popup message
displays for approximately one second.
displays for approximately one second.
•
CSCej08390—Access points and bridges sometimes continuously reboot when the configuration
contains this line:
contains this line:
snmp-server ifindex persist
Remove this line from the configuration before upgrading to this release. If you upgrade to this
release and the configuration contains this line, remove the line and delete the ifIndex-table file from
NVRAM.
release and the configuration contains this line, remove the line and delete the ifIndex-table file from
NVRAM.
•
CSCsa74809—TEA wireless bridge crashes on SNMP polling.
The root bridges crash frequently in a wireless network consisting of 1300 series access
point/bridges in workgroup bridge mode. In most cases, the root bridge writes the crashinfo file and
reloads.
point/bridges in workgroup bridge mode. In most cases, the root bridge writes the crashinfo file and
reloads.
There is no workaround for this condition.
•
CSCsb29038—A 1310 with integrated antenna shows diversity options on GUI.
The GUI shows the diversity options even though diversity is not supported on integrated antenna
configurations. If the user configures diversity, an HTTP error 404 displays when attempting to
apply the change.
configurations. If the user configures diversity, an HTTP error 404 displays when attempting to
apply the change.
Resolved Caveats
These caveats are resolved in Cisco IOS Release 12.3(7)JA for the access point/bridge:
•
CSCsb24007
Multiple voice-related vulnerabilities are identified in Cisco IOS software, one of which is also
shared with Cisco Unified Communications Manager. These vulnerabilities pertain to the following
protocols or features:
shared with Cisco Unified Communications Manager. These vulnerabilities pertain to the following
protocols or features:
–
Session Initiation Protocol (SIP)
–
Media Gateway Control Protocol (MGCP)
–
Signaling protocols H.323, H.254
–
Real-time Transport Protocol (RTP)
–
Facsimile reception
Cisco has made free software available to address these vulnerabilities for affected customers. Fixed
Cisco IOS software listed in the Software Versions and Fixes section contains fixes for all
vulnerabilities mentioned in this advisory.
Cisco IOS software listed in the Software Versions and Fixes section contains fixes for all
vulnerabilities mentioned in this advisory.