Cisco Cisco Aironet 1310 Access Point Bridge

ページ / 22
 
19
Release Notes for Cisco Aironet Access Points and Bridges for Cisco IOS Release 12.4(10b)JA
OL-14517-01
  Caveats
CSCsk44106—SNMP returns incorrect cipher values for some clients when multiple ciphers are 
defined on an interface. This condition only affects some of the clients when there are multiple 
ciphers on the interface.
Workaround: None.
CSCsk58820—Station roles have different possible RTS threshold values (some 4000 some 2347).
Workaround: None.
CSCsk63453—Tracebacks occur on 1200 series access points when the Taiwan carrier set is 
enabled.
Workaround: None.
CSCsk65207—1310 series bridges sometimes ignore a fixed channel under the dot11radio0 
interface even when it is the least congested channel.
Workaround: None.
CSCsk78264—A change in the RF domain name takes effect only after a reboot.
Workaround: Reboot the controller after changing the RF domain name.
Resolved Caveats 
These caveats are resolved in Cisco IOS Release 12.4(10b)JA:
CSCse56501
A device running Cisco IOS software that has Internet Protocol version 6 (IPv6) enabled may be 
subject to a denial of service (DoS) attack. For the device to be affected by this vulnerability the 
device also has to have certain Internet Protocol version 4 (IPv4) User Datagram Protocol (UDP) 
services enabled. To exploit this vulnerability an offending IPv6 packet must be targeted to the 
device. Packets that are routed throughout the router can not trigger this vulnerability. Successful 
exploitation will prevent the interface from receiving any additional traffic. The only exception is 
Resource Reservation Protocol (RSVP) service, which if exploited, will cause the device to crash. 
Only the interface on which the vulnerability was exploited will be affected.
Cisco is providing fixed software to address this issue. There are workarounds available to mitigate 
the effects of the vulnerability.
This advisory is posted at 
CSCsc04907—Resetting the access point to factory defaults does not clear the static IP address.
CSCse49342—DHCP_SERVER_FAILURE observed in 1300 series in WGB mode.
CSCsg69625—The access point does not mark the DSCP on the IP GRE header.
CSCsg71454—System sometimes restarts because of unknown reload cause.
CSCsg71997—Hostname not assigned to access point when IP address obtained from DHCP server.
CSCsh17037—In rare circumstances, a memory leak may develop in the SSH process.
CSCsi10234—An access point in HREAP mode sometimes gets out of sync with the controller on 
which WLANS are active if the access point loses connection with the controller and the WLAN 
configuration on the controller is changed.
CSCsi18135—Add dynamic WLAN functionality for Diagnostic WLAN.