Cisco Cisco Aironet 1310 Access Point Bridge 릴리즈 노트
7
Release Notes for Cisco Aironet Access Points for Cisco IOS Release 12.3(8)JEA2
OL-14260-01
New Features
New Features
No new features are introduced in Cisco IOS Release 12.3(8)JEA2.
Caveats
This section lists open and resolved caveats.
Open Caveats
These caveats are open in Cisco IOS Release 12.3(8)JEA2:
•
CSCsc94510—GUI can set illegal combination of Low Latency Rates
The GUI can set an illegal combination of low latency rates on the access point. Rates of 48 and
54Mbps set as both nominal and non-nominal can occur. Once the rates are set, you can not disable
them and they stay set as non-nominal.
54Mbps set as both nominal and non-nominal can occur. Once the rates are set, you can not disable
them and they stay set as non-nominal.
•
CSCsc83206—A nested repeater access point fails to notify radar detection
If radar is detected on a nested repeater in a nested repeater chain, no action is being taken by either
the repeater or root/parent to notify the detection.
the repeater or root/parent to notify the detection.
•
CSCse34644—Shared authentication with a non-native vlan does not operate properly
•
CSCsd69733—Hot standby access point cannot associate
The hot standby access point almost always fails to authenticate with the error cannot associate: Not
standby parent (from incorrect mac address. The incorrect mac address is the mac address of another
access point on the same network but not its parent device's mac address. In other words, the hot
standby unit attempts to authenticate with an access point that is not it's parent and fails.
standby parent (from incorrect mac address. The incorrect mac address is the mac address of another
access point on the same network but not its parent device's mac address. In other words, the hot
standby unit attempts to authenticate with an access point that is not it's parent and fails.
•
CSCsd62542—WPA(LEAP/EAP-FAST) reauthentication takes a long time and fails initially
Reauthentication fails initially and takes more than 45 seconds with LEAP and EAP-FAST
authentication with WPA key management configured.
authentication with WPA key management configured.
Resolved Caveats
These caveats are resolved in Cisco IOS Release 12.3(8)JEA2:
•
CSCse56501
A device running Cisco IOS software that has Internet Protocol version 6 (IPv6) enabled may be
subject to a denial of service (DoS) attack. For the device to be affected by this vulnerability the
device also has to have certain Internet Protocol version 4 (IPv4) User Datagram Protocol (UDP)
services enabled. To exploit this vulnerability an offending IPv6 packet must be targeted to the
device. Packets that are routed throughout the router can not trigger this vulnerability. Successful
exploitation will prevent the interface from receiving any additional traffic. The only exception is
Resource Reservation Protocol (RSVP) service, which if exploited, will cause the device to crash.
Only the interface on which the vulnerability was exploited will be affected.
subject to a denial of service (DoS) attack. For the device to be affected by this vulnerability the
device also has to have certain Internet Protocol version 4 (IPv4) User Datagram Protocol (UDP)
services enabled. To exploit this vulnerability an offending IPv6 packet must be targeted to the
device. Packets that are routed throughout the router can not trigger this vulnerability. Successful
exploitation will prevent the interface from receiving any additional traffic. The only exception is
Resource Reservation Protocol (RSVP) service, which if exploited, will cause the device to crash.
Only the interface on which the vulnerability was exploited will be affected.
Cisco is providing fixed software to address this issue. There are workarounds available to mitigate
the effects of the vulnerability.
the effects of the vulnerability.