Cisco Cisco Aironet 1310 Access Point Bridge Notas de publicación

Descargar
Página de 15
 
12
Release Notes for Cisco Aironet 1300 Series Outdoor Access Point/Bridge for Cisco IOS Release 12.3(7)JA
OL-8060-01
  Caveats
Caveats
This section lists 
 in Cisco IOS Release 12.3(7)JA for the access 
point/bridge.
Open Caveats
These caveats are open in Cisco IOS Release 12.3(7)JA for the access point/bridge:
CSCed17799—Warning message does not display for a sufficient period of time.
When user attempts to delete an infrastructure SSID using the GUI, the warning popup message 
displays for approximately one second.
CSCej08390—Access points and bridges sometimes continuously reboot when the configuration 
contains this line:
snmp-server ifindex persist
Remove this line from the configuration before upgrading to this release. If you upgrade to this 
release and the configuration contains this line, remove the line and delete the ifIndex-table file from 
NVRAM.
CSCsa74809—TEA wireless bridge crashes on SNMP polling.
The root bridges crash frequently in a wireless network consisting of 1300 series access 
point/bridges in workgroup bridge mode. In most cases, the root bridge writes the crashinfo file and 
reloads.
There is no workaround for this condition.
CSCsb29038—A 1310 with integrated antenna shows diversity options on GUI.
The GUI shows the diversity options even though diversity is not supported on integrated antenna 
configurations. If the user configures diversity, an HTTP error 404 displays when attempting to 
apply the change.
Resolved Caveats
These caveats are resolved in Cisco IOS Release 12.3(7)JA for the access point/bridge:
CSCsb24007
Multiple voice-related vulnerabilities are identified in Cisco IOS software, one of which is also 
shared with Cisco Unified Communications Manager. These vulnerabilities pertain to the following 
protocols or features:
Session Initiation Protocol (SIP) 
Media Gateway Control Protocol (MGCP) 
Signaling protocols H.323, H.254 
Real-time Transport Protocol (RTP) 
Facsimile reception 
Cisco has made free software available to address these vulnerabilities for affected customers. Fixed 
Cisco IOS software listed in the Software Versions and Fixes section contains fixes for all 
vulnerabilities mentioned in this advisory.