Примечания к выпуску для Cisco Cisco Aironet 1200 Access Point

Скачать
Страница из 27
   
22
Release Notes for Cisco Aironet 350, 1100, 1130AG, 1200, and 1230AG Series Access Points for Cisco IOS Release 12.3(2)JA
OL-6252-01
Caveats
Resolved Caveats
These caveats are resolved in Cisco IOS Release 12.3(2)JA:
CSCeb40058—This release includes the logging snmp-trap global configuration command to 
specify syslog severity levels that are sent as SNMP traps. This example shows how to configure the 
access point to send all severity levels as traps:
AP1100#config term
Enter configuration commands, one per line.  End with CNTL/Z.
AP1100(config)#logging snmp-trap 0 7
AP1100(config)#exit
CSCec25430—Access points no longer reload when they receive a corrupt CDP packet.
CSCec55763, CSCec57354—When both the 802.11g and 802.11a radios in a 1200 series access 
point simultaneously operate under extremely high data loads for an extended period, the 802.11a 
radio no longer freezes and the access point no longer reboots. 
CSCec74066—The access point GUI now includes a Restart button to reset a standby access point 
that has taken the place of the monitored unit. When the monitored access point comes back online, 
browse to the Services: Hot Standby page on the standby access point and click Restart to put the 
standby unit back into standby mode.
CSCed03154—The access point no longer indicates that a client device is associated when the client 
is not associated.
CSCed25530—The Ethernet interface input queue on a 350 series access point running Cisco IOS 
software no longer hangs after a period of operation.
CSCed57726—An access point configured as the WDS device no longer displays tracebacks when 
under a heavy load of client reauthentications.
CSCed62173—The access point now sends the list of adjacent access points to qualified client 
devices when they associate to the access point and when the list of adjacent access points is 
updated.
CSCed63953—The access point information element now transmits the value that you enter for 
default QoS CWMin value for best effort regardless of the value that you enter for that setting.
CSCed75292—The access point radio no longer reboots when a client device attempts to 
authenticate at the same time that you enter this command on the access point CLI:
show aaa user all
CSCed78149—A document that describes how the Internet Control Message Protocol (ICMP) could 
be used to perform a number of Denial of Service (DoS) attacks against the Transmission Control 
Protocol (TCP) has been made publicly available. This document has been published through the 
Internet Engineering Task Force (IETF) Internet Draft process, and is entitled “ICMP Attacks 
Against TCP” (draft-gont-tcpm-icmp-attacks-03.txt).
These attacks, which only affect sessions terminating or originating on a device itself, can be of 
three types:
1. Attacks that use ICMP “hard” error messages 
2. Attacks that use ICMP “fragmentation needed and Don’t Fragment (DF) bit set” messages, also 
known as Path Maximum Transmission Unit Discovery (PMTUD) attacks 
3. Attacks that use ICMP “source quench” messages
Successful attacks may cause connection resets or reduction of throughput in existing connections, 
depending on the attack type.