Cisco Cisco Aironet 1400 Wireless Bridge

ページ / 8
 
6
Release Notes for Cisco Aironet 1410 Bridges for Cisco IOS Release 12.3(7)JA5
OL-14263-01
  Caveats
On wireless bridges, all VLANs traversing the bridge link must use the same encryption settings. To 
avoid confusion, do not use the “vlan <vlan-id> keyword on the encryption command as shown in 
the following example:
interface dot11radio0
encryption key 1 size 128bit AAAAABBBBBCCCCCDDDDDEEEEEF transmit-key
encryption mode wep mandatory mic
CSCsa68144—Default bridge configuration is invalid.
When a defaulted 1400 series bridge boots up, it displays an error that the RTS threshold contains 
invalid input. The RTS threshold is set to 4000. Entering a ? after entering RTS threshold indicates 
the maximum value is 4000 but a system error occurs when attempting to set it. The maximum value 
that the CLI allows is 2347.
CSCsb04925—Bridge displays junk characters when show controllers command is issued.
When show controllers dot110 is entered, it displays a serial number with a junk character.
Resolved Caveats
These caveats are resolved in Cisco IOS Release 12.3(7)JA5:
CSCsf04754—Multiple Cisco products contain either of two authentication vulnerabilities in the 
Simple Network Management Protocol version 3 (SNMPv3) feature. These vulnerabilities can be 
exploited when processing a malformed SNMPv3 message. These vulnerabilities could allow the 
disclosure of network information or may enable an attacker to perform configuration changes to 
vulnerable devices. The SNMP server is an optional service that is disabled by default. Only 
SNMPv3 is impacted by these vulnerabilities. Workarounds are available for mitigating the impact 
of the vulnerabilities described in this document. 
The United States Computer Emergency Response Team (US-CERT) has assigned Vulnerability 
Note VU#878044 to these vulnerabilities. 
Common Vulnerabilities and Exposures (CVE) identifier CVE-2008-0960 has been assigned to 
these vulnerabilities. 
This advisory will be posted at 
CSCsh58082—When receiving a series of packets destined for port 5060, Cisco devices running an 
affected version of IOS that supports Session Initiation Protocol (SIP) may be required to reload the 
device. This issue is compounded by a related bug that allows traffic to TCP 5060 and UDP port 
5060 on devices not configured for SIP.
CSCsj44081—Cisco IOS Software has been enhanced with the introduction of additional software 
checks to signal improper use of data structures. This feature has been introduced in select Cisco 
IOS Software releases published after April 5, 2007.
Details: The %DATACORRUPTION-1-DATAINCONSISTENCY error message is preceded by a 
timestamp: May 17 10:01:27.815 UTC: %DATACORRUPTION-1-DATAINCONSISTENCY: copy 
error. The error message is then followed by a traceback.