Cisco Cisco Aironet 1200 Access Point 릴리즈 노트

다운로드
페이지 10
   
8
Release Notes for Cisco Aironet 1130AG, 1200, 1230AG, and 1240AG Series Access Points for Cisco IOS Release 12.3(7)JX9
OL-14252-01
Caveats
Caveats
This section lists open and resolved caveats in Cisco IOS Release 12.3(7)JX9.
Open Caveats
These caveats are open in Cisco IOS Release 12.3(7)JX9:
CSCsb47748—When the Rogue Location Discovery Protocol (RLDP) is enabled on a controller, 
associated access points converted to lightweight mode do not detect rogue access points as a threat.
CSCei65293—The 5-GHz, RM-21A radio module on 1200 series access points has an articulating 
antenna with a dual function: diversity omni or patch antenna. When the antenna is folded flat to the 
access point housing it is in 9-dBi patch mode, and when it is in any other position it is in 5-dBi 
omni mode. When you change the antenna position to switch antenna modes you must reset the 
access point to apply the change.
CSCsb68069—When all eight wireless LANS are defined on 1130AG and 1240AG access points 
converted to lightweight mode, and the radio environment is very busy, access point transmission 
attempts can be delayed. The 802.11g radios sometimes report this error:
%DOT11-2-RADIO_FAILED: Interface Dot11Radio0, failed - Radio command failed, cmd 121 
(FF80,0,0) status 7F21 (5,0,0)
When the failure occurs, the radio restarts, all clients are disassociated, the failure is logged, and 
normal operation resumes.
Workaround: Reduce the number of wireless LANs in use.
Resolved Caveats
The following caveats are resolved in Cisco IOS Release 12.3(7)JX9:
CSCse56501
A device running Cisco IOS software that has Internet Protocol version 6 (IPv6) enabled may be 
subject to a denial of service (DoS) attack. For the device to be affected by this vulnerability the 
device also has to have certain Internet Protocol version 4 (IPv4) User Datagram Protocol (UDP) 
services enabled. To exploit this vulnerability an offending IPv6 packet must be targeted to the 
device. Packets that are routed throughout the router can not trigger this vulnerability. Successful 
exploitation will prevent the interface from receiving any additional traffic. The only exception is 
Resource Reservation Protocol (RSVP) service, which if exploited, will cause the device to crash. 
Only the interface on which the vulnerability was exploited will be affected.
Cisco is providing fixed software to address this issue. There are workarounds available to mitigate 
the effects of the vulnerability.
This advisory is posted at 
.
CSCsj44081—Cisco IOS Software has been enhanced with the introduction of additional software 
checks to signal improper use of data structures. This feature has been introduced in select Cisco 
IOS Software releases published after April 5, 2007.