Cisco Cisco Aironet 1400 Wireless Bridge Notas de publicación
7
Release Notes for Cisco Aironet 1410 Bridges for Cisco IOS Release 12.3(4)JA
OL-7095-01
Troubleshooting
•
CSCsa59600—A document that describes how the Internet Control Message Protocol (ICMP) could
be used to perform a number of Denial of Service (DoS) attacks against the Transmission Control
Protocol (TCP) has been made publicly available. This document has been published through the
Internet Engineering Task Force (IETF) Internet Draft process, and is entitled “ICMP Attacks
Against TCP” (draft-gont-tcpm-icmp-attacks-03.txt).
be used to perform a number of Denial of Service (DoS) attacks against the Transmission Control
Protocol (TCP) has been made publicly available. This document has been published through the
Internet Engineering Task Force (IETF) Internet Draft process, and is entitled “ICMP Attacks
Against TCP” (draft-gont-tcpm-icmp-attacks-03.txt).
These attacks, which only affect sessions terminating or originating on a device itself, can be of
three types:
three types:
1. Attacks that use ICMP “hard” error messages 2. Attacks that use ICMP “fragmentation needed
and Don’t Fragment (DF) bit set” messages, also known as Path Maximum Transmission Unit
Discovery (PMTUD) attacks 3. Attacks that use ICMP “source quench” messages
and Don’t Fragment (DF) bit set” messages, also known as Path Maximum Transmission Unit
Discovery (PMTUD) attacks 3. Attacks that use ICMP “source quench” messages
Successful attacks may cause connection resets or reduction of throughput in existing connections,
depending on the attack type.
depending on the attack type.
Multiple Cisco products are affected by the attacks described in this Internet draft.
Cisco has made free software available to address these vulnerabilities. In some cases there are
workarounds available to mitigate the effects of the vulnerability.
workarounds available to mitigate the effects of the vulnerability.
This advisory is posted at
The disclosure of these vulnerabilities is being coordinated by the National Infrastructure Security
Coordination Centre (NISCC), based in the United Kingdom. NISCC is working with multiple
vendors whose products are potentially affected. Its posting can be found at
Coordination Centre (NISCC), based in the United Kingdom. NISCC is working with multiple
vendors whose products are potentially affected. Its posting can be found at
•
CSCsa64627—STP now functions properly when the native VLAN is not VLAN 1.
Troubleshooting
For the most up-to-date, detailed troubleshooting information, refer to the Cisco TAC website at
. Click Technology Support, choose Wireless
from the menu on the left, and click Wireless LAN.
Documentation Updates
The Cisco Aironet 1400 Series Wireless Bridge Mounting Instructions provides detailed instructions for
installing and mounting the bridge.
installing and mounting the bridge.
Stacking Bridges Section Changes
The separation distance between the two stacked bridge antennas is a minimum of 6.56 ft (2 m).
Related Documentation
These documents describe the installation and configuration of the bridge:
•
Quick Start Guide: Cisco Aironet 1400 Series Wireless Bridge
•
Cisco Aironet 1400 Series Wireless Bridge Software Configuration Guide