Cisco Cisco Aironet 1200 Access Point 릴리즈 노트
23
Release Notes for Cisco Aironet 350, 1100, 1130AG, 1200, and 1230AG Series Access Points for Cisco IOS Release 12.3(2)JA
OL-6252-01
Caveats
Multiple Cisco products are affected by the attacks described in this Internet draft.
Cisco has made free software available to address these vulnerabilities. In some cases there are
workarounds available to mitigate the effects of the vulnerability.
workarounds available to mitigate the effects of the vulnerability.
This advisory is posted at
.
The disclosure of these vulnerabilities is being coordinated by the National Infrastructure Security
Coordination Centre (NISCC), based in the United Kingdom. NISCC is working with multiple
vendors whose products are potentially affected. Its posting can be found at:
http://www.niscc.gov.uk/niscc/docs/re-20050412-00303.pdf?lang=en.
Coordination Centre (NISCC), based in the United Kingdom. NISCC is working with multiple
vendors whose products are potentially affected. Its posting can be found at:
http://www.niscc.gov.uk/niscc/docs/re-20050412-00303.pdf?lang=en.
•
CSCed82111—An access point configured as a WDS device now authenticates successfully with a
Funk RADIUS server.
Funk RADIUS server.
•
CSCed84527—The access point no longer deauthenticates roaming client devices when the 1 and 2
Mbps datarates are disabled on the access point.
Mbps datarates are disabled on the access point.
•
CSCed86456—TKIP/WPA now has replay detection for bridge links with concatenation enabled.
•
CSCed87329—Access points now use only one DHCP client identifier when they boot.
•
CSCed90455—Client devices no longer reauthenticate unexpectedly when WDS is configured on
your network.
your network.
•
CSCed91130—When an 802.11g radio in an access point configured for use in Japan is set to
channel 14, you can no longer select Best Throughput for the data rate setting on the access point
GUI.
channel 14, you can no longer select Best Throughput for the data rate setting on the access point
GUI.
•
CSCed92054—The access point now uses the same MAC address format for both authentication and
accounting when sending MAC addresses to the RADIUS server.
accounting when sending MAC addresses to the RADIUS server.
•
CSCee05762, CSCed21433—Entry fields on the access point GUI now accept all characters except
the following:
the following:
“
]
+
/
Tab
Trailing space
]
+
/
Tab
Trailing space
•
CSCee09515—The Associations page on the access point GUI now includes all associated client
devices in its count of associated clients.
devices in its count of associated clients.
•
CSCee09624—The transmitted fragment counter on the access point now counts all transmitted
fragments.
fragments.
•
CSCee12053—Access points do not support the service compress-config command, and the
command has no effect on access points when you enter it.
command has no effect on access points when you enter it.
•
CSCee14096—If the access point is not configured as a local authenticator, the access point no
longer reboots when you enter the clear radius local-server user user command.
longer reboots when you enter the clear radius local-server user user command.
•
CSCee14599—Access points in standby mode no longer allow client associations when the Ethernet
port is disabled.
port is disabled.
•
CSCee22037—When you convert an access point from VxWorks to Cisco IOS software and you
have SNMP traps enabled before the conversion, the access point GUI now indicates as enabled only
the SNMP traps that are enabled after the conversion.
have SNMP traps enabled before the conversion, the access point GUI now indicates as enabled only
the SNMP traps that are enabled after the conversion.
•
CSCee24611—After several days of connectivity, access points no longer fail to communicate with
workgroup bridges that are LEAP authenticated.
workgroup bridges that are LEAP authenticated.