Cisco Cisco Aironet 1310 Access Point Bridge 릴리즈 노트
13
Release Notes for Cisco Aironet 1310 Outdoor Access Point/Bridge for Cisco IOS Release 12.3(2)JA2
OL-6723-02
Caveats
•
CSCef11167—When polling cDot11ActiveWireless Clients via SNMP, the response may have a
value of 4294967292. This occurs in the CiscoWorks Wireless Solution Engine (WLSE) as AP in
Overloaded state.
value of 4294967292. This occurs in the CiscoWorks Wireless Solution Engine (WLSE) as AP in
Overloaded state.
There is no workaround for this caveat.
•
CSCef45010—The 1310 access point/bridge GUI performs poorly when half duplex and a specified
speed are part of its configuration.
speed are part of its configuration.
If you hardcode the duplex and speed into a configuration for the fast Ethernet interface, the GUI
becomes extremely slow. You may also experience a high number of input errors when you try to
use the GUI. Telnet or console traffic is not affected.
becomes extremely slow. You may also experience a high number of input errors when you try to
use the GUI. Telnet or console traffic is not affected.
Workaround: Set the 1310 Ethernet port settings to Auto Speed and Auto Negotiation.
•
CSCef65076—The access point GUI sometimes reports this error when you add a RADIUS server
hostname to the access point:
hostname to the access point:
HTTP 400 - Bad Request
Workaround: Enter the server IP address instead of the hostname.
•
CSCsa40042, CSCsa40045—The user interfaces on the 1310 access point/bridge allow you to
configure the bridge to fall back to repeater mode if the Ethernet link fails. However, repeater mode
is not supported on the 1310 access point/bridge.
configure the bridge to fall back to repeater mode if the Ethernet link fails. However, repeater mode
is not supported on the 1310 access point/bridge.
Resolved Caveats
These caveats are resolved in Cisco IOS Release 12.3(2)JA2 for the 1310 access point/bridge:
•
CSCee51985—Access points now correctly apply QoS priorities to DSCP-tagged packets.
•
CSCee90230—When the access point is configured for TACACS+ administrator authentication and
uses an IP address from the DHCP server, tracebacks no longer occur when the access point reboots.
uses an IP address from the DHCP server, tracebacks no longer occur when the access point reboots.
•
CSCef60659, CSCsa59600—A document that describes how the Internet Control Message Protocol
(ICMP) could be used to perform a number of Denial of Service (DoS) attacks against the
Transmission Control Protocol (TCP) has been made publicly available. This document has been
published through the Internet Engineering Task Force (IETF) Internet Draft process, and is entitled
“ICMP Attacks Against TCP” (draft-gont-tcpm-icmp-attacks-03.txt).
(ICMP) could be used to perform a number of Denial of Service (DoS) attacks against the
Transmission Control Protocol (TCP) has been made publicly available. This document has been
published through the Internet Engineering Task Force (IETF) Internet Draft process, and is entitled
“ICMP Attacks Against TCP” (draft-gont-tcpm-icmp-attacks-03.txt).
These attacks, which only affect sessions terminating or originating on a device itself, can be of
three types:
three types:
1. Attacks that use ICMP “hard” error messages
2. Attacks that use ICMP “fragmentation needed and Don’t Fragment (DF) bit set” messages, also
known as Path Maximum Transmission Unit Discovery (PMTUD) attacks
3. Attacks that use ICMP “source quench” messages
2. Attacks that use ICMP “fragmentation needed and Don’t Fragment (DF) bit set” messages, also
known as Path Maximum Transmission Unit Discovery (PMTUD) attacks
3. Attacks that use ICMP “source quench” messages
Successful attacks may cause connection resets or reduction of throughput in existing connections,
depending on the attack type.
depending on the attack type.
Multiple Cisco products are affected by the attacks described in this Internet draft.
Cisco has made free software available to address these vulnerabilities. In some cases there are
workarounds available to mitigate the effects of the vulnerability.
workarounds available to mitigate the effects of the vulnerability.
This advisory is posted at
.