Cisco Cisco Aironet 1200 Access Point

Página de 23
   
19
Release Notes for Cisco Aironet 350, 1100, 1130AG, 1200, and 1230AG Series Access Points for Cisco IOS Release 12.3(4)JA1
OL-8215-01
Caveats
CSCsa71233—When you configure an 1100 series access point for LEAP authentication and hot 
standby, the standby access point sometimes reboots when it authenticates to the monitored access 
point. After it reboots it operates correctly in standby mode.
CSCsa74148—Existing SSIDs become invalid when you configure VLANs for the first time. When 
no VLANs are configured, encryption is applied to the radio interface, but when you configure 
VLANs, encryption is applied to the VLANs. 
CSCsa74153—WPAv2 accounting start/stop records sometimes appear in the ACS 3.3 RADIUS 
accounting log with the client card MAC address as the username instead of the real username. 
CSCsa75865—The radio interface sometimes fails and reloads firmware when multiple BSSIDs are 
enabled and the beacon period is configured for the minimum setting, 20 kilomicroseconds. 
Workaround: Increase the beacon period.
CSCsa76662—When multiple BSSIDs are configured, the access point does not send the secondary 
SSIDL information element (IE) in beacons. However, the access point still sends the SSIDL IE in 
broadcast probe responses.
Workaround: If multiple BSSIDs are configured on the access point, disable the SSIDL feature.
CSCsa76923—During an access point radio scan controlled by WLSE, the access point sometimes 
sends out several deauthentication frames with zero MAC addresses in the source and BSSID fields. 
This problem wastes bandwidth on the wireless LAN but has no other adverse effects.
CSCsa77487—After an access point radio scan controlled by a WLSE running software release 
2.11, the transmit power is sometimes set to -1 dBm on the RM22A 802.11a radio module in 1200 
series access points and the 802.11a radio in 1130AG access points. The problem occurs after an 
active access point scan, which starts when you select run now on the WLSE interface. The problem 
does not occur after scheduled scans. You must manually reconfigure the transmit power setting on 
the affected radio.
Resolved Caveats in Cisco IOS Release 12.3(4)JA1
The following caveat is resolved in Cisco IOS Release 12.3(4)JA1:
CSCei61732
Cisco IOS may permit arbitrary code execution after exploitation of a heap-based buffer overflow 
vulnerability. Cisco has included additional integrity checks in its software, as further described 
below, that are intended to reduce the likelihood of arbitrary code execution.
Cisco has made free software available that includes the additional integrity checks for affected 
customers.
This advisory is posted at 
.
CSCei76358—Through normal software maintenance processes, Cisco is removing depreciated 
functionality. These changes have no impact on system operation or feature availability..
Resolved Caveats in Cisco IOS Release 12.3(4)JA
These caveats are resolved in Cisco IOS Release 12.3(4)JA:
CSCeb82510—You can now configure authentication, authorization, and accounting (AAA) 
methods for telnet and HTTP independent of the console.