Cisco Cisco Aironet 1310 Access Point Bridge
14
Release Notes for Cisco Aironet 1310 Outdoor Access Point/Bridge for Cisco IOS Release 12.3(2)JA5
OL-8218-01
Caveats
•
CSCef11167—When polling cDot11ActiveWireless Clients via SNMP, the response may have a
value of 4294967292. This occurs in the CiscoWorks Wireless Solution Engine (WLSE) as AP in
Overloaded state.
value of 4294967292. This occurs in the CiscoWorks Wireless Solution Engine (WLSE) as AP in
Overloaded state.
There is no workaround for this caveat.
•
CSCef45010—The access point/bridge GUI performs poorly when half duplex and a specified speed
are part of its configuration.
are part of its configuration.
If you hardcode the duplex and speed into a configuration for the fast Ethernet interface, the GUI
becomes extremely slow. You may also experience a high number of input errors when you try to
use the GUI. Telnet or console traffic is not affected.
becomes extremely slow. You may also experience a high number of input errors when you try to
use the GUI. Telnet or console traffic is not affected.
Workaround: Set the 1310 Ethernet port settings to Auto Speed and Auto Negotiation.
•
CSCef65076—The access point GUI sometimes reports this error when you add a RADIUS server
hostname to the access point:
hostname to the access point:
HTTP 400 - Bad Request
Workaround: Enter the server IP address instead of the hostname.
•
CSCsa40042, CSCsa40045—The user interfaces on the access point/bridge allow you to configure
the bridge to fall back to repeater mode if the Ethernet link fails. However, repeater mode is not
supported on the access point/bridge.
the bridge to fall back to repeater mode if the Ethernet link fails. However, repeater mode is not
supported on the access point/bridge.
Resolved Caveats in Cisco IOS Release 12.3(2)JA5
The following caveat is resolved in Cisco IOS Release 12.3(2)JA5:
•
CSCei61732
Cisco IOS may permit arbitrary code execution after exploitation of a heap-based buffer overflow
vulnerability. Cisco has included additional integrity checks in its software, as further described
below, that are intended to reduce the likelihood of arbitrary code execution.
vulnerability. Cisco has included additional integrity checks in its software, as further described
below, that are intended to reduce the likelihood of arbitrary code execution.
Cisco has made free software available that includes the additional integrity checks for affected
customers.
customers.
This advisory is posted at
.
•
CSCei76358—Through normal software maintenance processes, Cisco is removing depreciated
functionality. These changes have no impact on system operation or feature availability.
functionality. These changes have no impact on system operation or feature availability.
Resolved Caveats in Cisco IOS Release 12.3(2)JA
These caveats are resolved in Cisco IOS Release 12.3(2)JA for the access point/bridge:
•
CSCee51985—Access points now correctly apply QoS priorities to DSCP-tagged packets.
•
CSCee90230—When the access point is configured for TACACS+ administrator authentication and
uses an IP address from the DHCP server, tracebacks no longer occur when the access point reboots.
uses an IP address from the DHCP server, tracebacks no longer occur when the access point reboots.
•
CSCef60659, CSCsa59600—A document that describes how the Internet Control Message Protocol
(ICMP) could be used to perform a number of Denial of Service (DoS) attacks against the
Transmission Control Protocol (TCP) has been made publicly available. This document has been
published through the Internet Engineering Task Force (IETF) Internet Draft process, and is entitled
“ICMP Attacks Against TCP” (draft-gont-tcpm-icmp-attacks-03.txt).
(ICMP) could be used to perform a number of Denial of Service (DoS) attacks against the
Transmission Control Protocol (TCP) has been made publicly available. This document has been
published through the Internet Engineering Task Force (IETF) Internet Draft process, and is entitled
“ICMP Attacks Against TCP” (draft-gont-tcpm-icmp-attacks-03.txt).