Cisco Cisco Aironet 1400 Wireless Bridge 릴리즈 노트

다운로드
페이지 9
 
6
Release Notes for Cisco Aironet 1410 Bridges for Cisco IOS Release 12.2(13)JA
OL-4530-01
Caveats
Caveats
This section lists open and resolved caveats in Cisco IOS Release 12.2(13)JA for the bridge.
Open Caveats
These caveats are open in Cisco IOS Release 12.2(13)JA for the bridge:
CSCeb14603—When the bridge is transmitting and receiving heavy traffic, you cannot start a Telnet 
session and existing Telnet sessions freeze or hang. There is no workaround for this issue.
CSCec40452—When you run a link test or install the bridge using the autoinstall mode, the RSSI 
reading is 4 dB lower than actual at room temperature and 8 dB lower than actual when the outdoor 
ambient temperature is higher than approximately 45° C. There is no workaround for this issue.
CSCin57580—MAC address filtering sometimes fails to stop traffic from filtered addresses. There 
is no workaround for this issue.
Resolved Caveats
These caveats are resolved in Cisco IOS Release 12.2(13)JA:
CSCdu53656—A Cisco device running IOS and enabled for the Border Gateway Protocol (BGP) is 
vulnerable to a Denial of Service (DOS) attack from a malformed BGP packet. The BGP protocol 
is not enabled by default, and must be configured in order to accept traffic from an explicitly defined 
peer. Unless the malicious traffic appears to be sourced from a configured, trusted peer, it would be 
difficult to inject a malformed packet. BGP MD5 is a valid workaround for this problem.
Cisco has made free software available to address this problem. For more details, please refer to this 
advisory, available at 
.
CSCea28131—A Cisco device running IOS and enabled for the Border Gateway Protocol (BGP) is 
vulnerable to a Denial of Service (DOS) attack from a malformed BGP packet. The BGP protocol 
is not enabled by default, and must be configured in order to accept traffic from an explicitly defined 
peer. Unless the malicious traffic appears to be sourced from a configured, trusted peer, it would be 
difficult to inject a malformed packet. BGP MD5 is a valid workaround for this problem.
Cisco has made free software available to address this problem. For more details, please refer to this 
advisory, available at 
.
CSCea28990—The bridge now passes IP traffic when the bridge # route IP command is configured. 
CSCea57649—The CLI Help command no longer produces incorrect output for the radio interface. 
CSCea77473—HTTP software upgrade no longer fails with Netscape version 7.x.
CSCea81730—The web interface for the non-root bridge now correctly displays the root-bridge MAC 
address on the radio page.
CSCeb05835— The web interface no longer shows incorrect STP Root information on a bridge 
setup with multiple VLANs.
CSCeb12740—The virtual radio connection can now be made after the station role is changed.
CSCeb15923—Radio firmware recovery now works reliably.
CSCeb17296—The clear dot client command now works with traffic being passed.