Cisco Cisco Aironet 1400 Wireless Bridge 릴리즈 노트

다운로드
페이지 12
 
9
Release Notes for Cisco Aironet 1410 Bridges for Cisco IOS Release 12.3(2)JA1
OL-6252-01
Caveats
Caveats
This section lists open and resolved caveats in Cisco IOS Release 12.3(2)JA1 for the bridge.
Open Caveats
These caveats are open in Cisco IOS Release 12.3(2)JA1 for the bridge:
CSCec78900—High CPU use sometimes slows throughput on bridges.
CSCef96804—The RSSI DC output port gives an incorrect signal strength indication.
Workaround: When installing the bridge link, use the bridge LEDs for antenna alignment. If the 
bridges are already installed, use the dot11 d0 linktest target H.H.H privileged exec CLI command 
to start a link test between the root and non-root bridge and display the RSSI measurement.
Resolved Caveats
These caveats are resolved in Cisco IOS Release 12.3(2)JA1:
CSCeg27630—A bridge configured at the factory for use in the United States now provides the full 
range of transmit power allowed in the US regulatory domain.
These caveats are resolved in Cisco IOS Release 12.3(2)JA and in 12.3(2)JA1:
CSCec25430—Bridges no longer reload when they receive a corrupt CDP packet.
CSCed46039—After a reboot, the bridge’s CCA noise floor setting no longer changes from 62, 
which is the default setting, to 0.
CSCed68575—The SNMP process no longer triggers the bridge to reload its image.
CSCee23653—Administrative packets no longer cause the bridge link to fail.
CSCee26301—SSH now operates correctly when you change the bridge host name.
CSCee30632—Bridges now support SNTP.
CSCee45192—You can now enable both debugging notifications and Syslog messages on the bridge 
GUI.
CSCee51677—When you configure a time zone on the bridge GUI, the bridge configuration viewed 
on the CLI now matches the GUI setting.
CSCed78149—A document that describes how the Internet Control Message Protocol (ICMP) could 
be used to perform a number of Denial of Service (DoS) attacks against the Transmission Control 
Protocol (TCP) has been made publicly available. This document has been published through the 
Internet Engineering Task Force (IETF) Internet Draft process, and is entitled “ICMP Attacks 
Against TCP” (draft-gont-tcpm-icmp-attacks-03.txt).
These attacks, which only affect sessions terminating or originating on a device itself, can be of 
three types:
1. Attacks that use ICMP “hard” error messages. 2. Attacks that use ICMP “fragmentation needed 
and Don’t Fragment (DF) bit set” messages, also known as Path Maximum Transmission Unit 
Discovery (PMTUD) attacks. 3. Attacks that use ICMP “source quench” messages.
Successful attacks may cause connection resets or reduction of throughput in existing connections, 
depending on the attack type.