Cisco Cisco Aironet 1200 Access Point 릴리즈 노트

다운로드
페이지 19
 
16
Release Notes for Cisco Aironet 350, 1100, and 1200 Series Access Points for Cisco IOS Release 12.2(13)JA2
OL-5428-01
Caveats
sessions that are only passing through the device (for example, transit traffic that is being routed by 
a router). In addition, this attack vector does not directly compromise data integrity or 
confidentiality. 
All Cisco products which contain TCP stack are susceptible to this vulnerability. 
This advisory is available at 
and it describes this vulnerability as it applies to Cisco products that run Cisco IOS® software. 
A companion advisory that describes this vulnerability for products that do not run Cisco IOS 
software is available at 
CSCed21588—Access points no longer disassociate client devices when WEP is enabled on the 
access point.
CSCed26579—When you upgrade a 1200 series access point in the EMEA regulatory domain from 
VxWorks to Cisco IOS software, the upgrade no longer changes the maximum transmit power on 
the 2.4-GHz radio to 100 mW.
These caveats are resolved in Cisco IOS Release 12.2(13)JA, 12.2(13)JA1, and 12.2(13)JA2:
CSCec55720—The access point now allows multiple IEEE 802.11b clients to simultaneously 
associate without losing connectivity to some of the clients.
CSCec85569—The access point radio firmware correctly reads the IEEE 802.11b radio power tables 
and no longer causes the radio to become inoperable.
CSCdx45005, CSCeb84981, CSCeb87018—SSH now operates correctly with RADIUS 
authentication and authorization.
CSCea79363, CSCec03974, CSCec09390—The Compaq Wireless LAN Multiport W200 client 
device now associates successfully to 1100 or 1200 series access points.
CSCea82021—When DNS is configured on the access point, the show running-config command 
sometimes displays a server’s IP address instead of its name. This expected behavior is now 
accurately described in the Cisco IOS Software Configuration Guide for Cisco Aironet Access 
Points
.
CSCea88706, CSCeb51208, CSCec03118, CSCec16687, CSCec16708—You can now modify 
existing MAC address and Ethertype filters on the access point web-browser interface. 
CSCea88862—You can now run a link test using thousands of packets on the web-browser interface. 
CSCea89985—The access point no longer generates a traceback when you configure hot standby 
mode using a broadcast MAC address to specify the access point to be monitored. 
CSCea91378—When you run a carrier busy test on the web-browser interface when the access point 
radio is disabled, the web-browser interface no longer reports that the test failed. 
CSCea91424—When a CCKM client device roams successfully to a foreign network using proxy 
Mobile IP, the access point no longer displays error messages.
CSCeb06139—When several mobile clients are using Cisco Centralized Key Management 
(CCKM), the access point no longer reboots when you enter the show wlccp wds mn detail 
command. 
CSCeb15588—The access point now accepts the aironet RADIUS attribute in the Cisco 
vendor-specific attribute (VSA), and the Cisco PEAP supplicant now works correctly with Cisco 
ACS version 3.1.1.