Cisco Cisco Aironet 1130 AG Access Point 릴리즈 노트
22
Release Notes for Cisco Aironet Access Points for Cisco IOS Release 12.3(8)JEA
OL-11186-01
Troubleshooting
•
CSCsd38762—Scan period is now observed by mobile bridge client when rate shifts down
•
CSCsd41574—Irregular characters are no longer found in debug dot11 station connection failure
•
CSCsd62312—Signal-to-noise ratio is now displayed on GUI associations pages
•
CSCse03352—CISCO-DOT11-QOS-MIB objects now agrees with default values
•
CSCse17002—Traceback or crashes no longer occur when unconfiguring Vlan in automated
regression
regression
•
CSCse47006—Workgroup bridge now filters only channel 14 when set to Japan channel set.
•
CSCsf04754—Multiple Cisco products contain either of two authentication vulnerabilities in the
Simple Network Management Protocol version 3 (SNMPv3) feature. These vulnerabilities can be
exploited when processing a malformed SNMPv3 message. These vulnerabilities could allow the
disclosure of network information or may enable an attacker to perform configuration changes to
vulnerable devices. The SNMP server is an optional service that is disabled by default. Only
SNMPv3 is impacted by these vulnerabilities. Workarounds are available for mitigating the impact
of the vulnerabilities described in this document.
Simple Network Management Protocol version 3 (SNMPv3) feature. These vulnerabilities can be
exploited when processing a malformed SNMPv3 message. These vulnerabilities could allow the
disclosure of network information or may enable an attacker to perform configuration changes to
vulnerable devices. The SNMP server is an optional service that is disabled by default. Only
SNMPv3 is impacted by these vulnerabilities. Workarounds are available for mitigating the impact
of the vulnerabilities described in this document.
The United States Computer Emergency Response Team (US-CERT) has assigned Vulnerability
Note VU#878044 to these vulnerabilities.
Note VU#878044 to these vulnerabilities.
Common Vulnerabilities and Exposures (CVE) identifier CVE-2008-0960 has been assigned to
these vulnerabilities.
these vulnerabilities.
This advisory will be posted at
If You Need More Information
If you need information about a specific caveat that does not appear in these release notes, you can use
the Cisco Bug Toolkit to find select caveats of any severity. Click this URL to browse to the Bug Toolkit:
the Cisco Bug Toolkit to find select caveats of any severity. Click this URL to browse to the Bug Toolkit:
(If you request a defect that cannot be displayed, the defect number might not exist, the defect might not
yet have a customer-visible description, or the defect might be marked Cisco Confidential.)
yet have a customer-visible description, or the defect might be marked Cisco Confidential.)
Troubleshooting
For the most up-to-date, detailed troubleshooting information, refer to the Cisco TAC website at
. Click Technology Support, choose Wireless
from the menu on the left, and click Wireless LAN.
Documentation Updates
This section lists changes, errors, and omissions from user documentation for access points.
Changes
This section describes changes to access point and bridge documentation for this release.