Примечания к выпуску для Cisco Cisco 2106 Wireless LAN Controller

Скачать
Страница из 66
 
58
Release Notes for Cisco Wireless LAN Controllers and Lightweight Access Points for Release 5.2.193.0
OL-31336-01
  Caveats
CSCsm19182—When an 802.11n radio is operating on channels 52 through 140, the channel width 
is configured for 40 MHz, and a radar event is detected, it is possible for the radio interface to 
become disabled instead of moving to another channel. This problem occurs when the access point 
is operating in the vicinity of radar operations or under extreme traffic conditions (when a false radar 
detection might occur).
CSCsm32845—The Guest LAN parameter on the Interfaces > Edit page of the controller GUI has 
been modified to avoid confusion for users.
CSCso05337—Devices that are running Cisco IOS software and configured for the mobile IP 
network address translation (NAT) traversal feature or mobile IPv6 are vulnerable to a 
denial-of-service (DoS) attack that could result in a blocked interface. Cisco has released free 
software updates that address these vulnerabilities. This advisory is posted at the following link:
CSCsq23806—Guest tunneling now works when the WLAN on the foreign controller is created by 
the controller GUI and the WLAN on the anchor controller is created by WCS.
CSCsq41190—The controller GUI now lists WEP settings in industry standard increments.
CSCsr58034—Rogue rules and friendly access points are now uploaded and downloaded properly.
CSCsr60506—The controller no longer unexpectedly reboots at spamReceiveTask with a signal 11 
error (segmentation fault).
CSCsr70862—A Cisco WiSM controller running software release 4.2.130.0 no longer reboots 
because of a software failure of the instruction located at 0x1038a140(ewsInternalAbort+348).
CSCsr72301—Three separate Cisco IOS Hypertext Transfer Protocol (HTTP) cross-site scripting 
(XSS) vulnerabilities and a cross-site request forgery (CSRF) vulnerability have been reported to 
Cisco by three independent researchers. The Cisco Security Response is posted at the following link:
CSCsr89694—Cisco WiSM controllers running software release 4.2.130.0 no longer randomly 
generate trap logs indicating that the control path between two random mobility members is down. 
CSCsu57111—The following tracebacks no longer appear in the controller message logs: 
“apf_foreignap.c:1292 APF-1-CHANGE_ORPHAN_PKT_IP: Changing orphan packet IP address 
for station00:11:22:33:44:55 from x.x.x.x --->y.y.y.y- Traceback:  100cd4c0 100cddd0 100e40a8 
10409864 10c064cc 10d748d8.”
CSCsu62060—The 4400 series controller no longer reboots because of a software failure of the 
tplusTransportThread task.
CSCsu71747—On a Catalyst 3750G Wireless LAN Controller Switch running software release 
5.1.151.0, the integer value returned by the SNMP object now returns three indexes.
CSCsu96916—When you issue the show run-config CLI command using SSH on a 4400 series 
controller running software release 4.2.130.0 with paging disabled, the output no longer locks up.
CSCsv00108—The controller might report an invalid message integrity check (MIC) on beacon 
frames.
CSCsv01844—When you filter clients using the controller GUI, the controller no longer repeats the 
last two characters of the filter text, and the filter now works.
CSCsv12308—When the controller has to use its default gateway to talk to an access point, the 
access point now sees the join reply from the controller.
CSCsv34354—When you use SNMP to change the session timeout for a WLAN, the ACL name is 
no longer set to None.