Cisco Cisco Aironet 1310 Access Point Bridge 릴리즈 노트

다운로드
페이지 9
 
7
Release Notes for Cisco Aironet Access Points for Cisco IOS Release 12.3(8)JEA2
OL-14260-01
  New Features
New Features
No new features are introduced in Cisco IOS Release 12.3(8)JEA2.
Caveats
This section lists open and resolved caveats.
Open Caveats
These caveats are open in Cisco IOS Release 12.3(8)JEA2:
CSCsc94510—GUI can set illegal combination of Low Latency Rates
The GUI can set an illegal combination of low latency rates on the access point. Rates of 48 and 
54Mbps set as both nominal and non-nominal can occur. Once the rates are set, you can not disable 
them and they stay set as non-nominal.
CSCsc83206—A nested repeater access point fails to notify radar detection
If radar is detected on a nested repeater in a nested repeater chain, no action is being taken by either 
the repeater or root/parent to notify the detection.
CSCse34644—Shared authentication with a non-native vlan does not operate properly
CSCsd69733—Hot standby access point cannot associate
The hot standby access point almost always fails to authenticate with the error cannot associate: Not 
standby parent (from incorrect mac address
. The incorrect mac address is the mac address of another 
access point on the same network but not its parent device's mac address. In other words, the hot 
standby unit attempts to authenticate with an access point that is not it's parent and fails. 
CSCsd62542—WPA(LEAP/EAP-FAST) reauthentication takes a long time and fails initially
Reauthentication fails initially and takes more than 45 seconds with LEAP and EAP-FAST 
authentication with WPA key management configured.
Resolved Caveats 
These caveats are resolved in Cisco IOS Release 12.3(8)JEA2:
CSCse56501
A device running Cisco IOS software that has Internet Protocol version 6 (IPv6) enabled may be 
subject to a denial of service (DoS) attack. For the device to be affected by this vulnerability the 
device also has to have certain Internet Protocol version 4 (IPv4) User Datagram Protocol (UDP) 
services enabled. To exploit this vulnerability an offending IPv6 packet must be targeted to the 
device. Packets that are routed throughout the router can not trigger this vulnerability. Successful 
exploitation will prevent the interface from receiving any additional traffic. The only exception is 
Resource Reservation Protocol (RSVP) service, which if exploited, will cause the device to crash. 
Only the interface on which the vulnerability was exploited will be affected.
Cisco is providing fixed software to address this issue. There are workarounds available to mitigate 
the effects of the vulnerability.