Cisco Cisco Aironet 1310 Access Point Bridge 릴리즈 노트

다운로드
페이지 16
   
13
Release Notes for Cisco Aironet 1310 Outdoor Access Point/Bridge for Cisco IOS Release 12.3(2)JA2
OL-6723-02
  Caveats
CSCef11167—When polling cDot11ActiveWireless Clients via SNMP, the response may have a 
value of 4294967292. This occurs in the CiscoWorks Wireless Solution Engine (WLSE) as AP in 
Overloaded state.
There is no workaround for this caveat.
CSCef45010—The 1310 access point/bridge GUI performs poorly when half duplex and a specified 
speed are part of its configuration. 
If you hardcode the duplex and speed into a configuration for the fast Ethernet interface, the GUI 
becomes extremely slow. You may also experience a high number of input errors when you try to 
use the GUI. Telnet or console traffic is not affected. 
Workaround: Set the 1310 Ethernet port settings to Auto Speed and Auto Negotiation. 
CSCef65076—The access point GUI sometimes reports this error when you add a RADIUS server 
hostname to the access point:
HTTP 400 - Bad Request
Workaround: Enter the server IP address instead of the hostname.
CSCsa40042, CSCsa40045—The user interfaces on the 1310 access point/bridge allow you to 
configure the bridge to fall back to repeater mode if the Ethernet link fails. However, repeater mode 
is not supported on the 1310 access point/bridge.
Resolved Caveats
These caveats are resolved in Cisco IOS Release 12.3(2)JA2 for the 1310 access point/bridge:
CSCee51985—Access points now correctly apply QoS priorities to DSCP-tagged packets.
CSCee90230—When the access point is configured for TACACS+ administrator authentication and 
uses an IP address from the DHCP server, tracebacks no longer occur when the access point reboots.
CSCef60659, CSCsa59600—A document that describes how the Internet Control Message Protocol 
(ICMP) could be used to perform a number of Denial of Service (DoS) attacks against the 
Transmission Control Protocol (TCP) has been made publicly available. This document has been 
published through the Internet Engineering Task Force (IETF) Internet Draft process, and is entitled 
“ICMP Attacks Against TCP” (draft-gont-tcpm-icmp-attacks-03.txt).
These attacks, which only affect sessions terminating or originating on a device itself, can be of 
three types:
1. Attacks that use ICMP “hard” error messages 
2. Attacks that use ICMP “fragmentation needed and Don’t Fragment (DF) bit set” messages, also 
known as Path Maximum Transmission Unit Discovery (PMTUD) attacks 
3. Attacks that use ICMP “source quench” messages
Successful attacks may cause connection resets or reduction of throughput in existing connections, 
depending on the attack type.
Multiple Cisco products are affected by the attacks described in this Internet draft.
Cisco has made free software available to address these vulnerabilities. In some cases there are 
workarounds available to mitigate the effects of the vulnerability.
This advisory is posted at 
.