Cisco Cisco Aironet 1200 Access Point 릴리즈 노트

다운로드
페이지 27
   
23
Release Notes for Cisco Aironet 350, 1100, 1130AG, 1200, and 1230AG Series Access Points for Cisco IOS Release 12.3(2)JA
OL-6252-01
Caveats
Multiple Cisco products are affected by the attacks described in this Internet draft.
Cisco has made free software available to address these vulnerabilities. In some cases there are 
workarounds available to mitigate the effects of the vulnerability.
This advisory is posted at 
.
The disclosure of these vulnerabilities is being coordinated by the National Infrastructure Security 
Coordination Centre (NISCC), based in the United Kingdom. NISCC is working with multiple 
vendors whose products are potentially affected. Its posting can be found at: 
http://www.niscc.gov.uk/niscc/docs/re-20050412-00303.pdf?lang=en.
CSCed82111—An access point configured as a WDS device now authenticates successfully with a 
Funk RADIUS server.
CSCed84527—The access point no longer deauthenticates roaming client devices when the 1 and 2 
Mbps datarates are disabled on the access point.
CSCed86456—TKIP/WPA now has replay detection for bridge links with concatenation enabled.
CSCed87329—Access points now use only one DHCP client identifier when they boot.
CSCed90455—Client devices no longer reauthenticate unexpectedly when WDS is configured on 
your network.
CSCed91130—When an 802.11g radio in an access point configured for use in Japan is set to 
channel 14, you can no longer select Best Throughput for the data rate setting on the access point 
GUI.
CSCed92054—The access point now uses the same MAC address format for both authentication and 
accounting when sending MAC addresses to the RADIUS server.
CSCee05762, CSCed21433—Entry fields on the access point GUI now accept all characters except 
the following:

]
+
/
Tab
Trailing space
CSCee09515—The Associations page on the access point GUI now includes all associated client 
devices in its count of associated clients.
CSCee09624—The transmitted fragment counter on the access point now counts all transmitted 
fragments.
CSCee12053—Access points do not support the service compress-config command, and the 
command has no effect on access points when you enter it.
CSCee14096—If the access point is not configured as a local authenticator, the access point no 
longer reboots when you enter the clear radius local-server user user command.
CSCee14599—Access points in standby mode no longer allow client associations when the Ethernet 
port is disabled.
CSCee22037—When you convert an access point from VxWorks to Cisco IOS software and you 
have SNMP traps enabled before the conversion, the access point GUI now indicates as enabled only 
the SNMP traps that are enabled after the conversion.
CSCee24611—After several days of connectivity, access points no longer fail to communicate with 
workgroup bridges that are LEAP authenticated.