Примечания к выпуску для Cisco Cisco Aironet 1310 Access Point Bridge

Скачать
Страница из 15
 
13
Release Notes for Cisco Aironet 1300 Series Outdoor Access Point/Bridge for Cisco IOS Release 12.3(7)JA
OL-8060-01
  Caveats
There are no workarounds available to mitigate the effects of any of the vulnerabilities apart from 
disabling the protocol or feature itself. 
This advisory is posted at 
.
CSCeb52431—When logging into a TACACS+ server, access points sometimes send hundreds of 
additional authentication requests to the server after a successful authentication.
CSCeh42053—Access point/bridge no longer shows dot11radio 0 enabled.
CSCeh42504—When VLANs are configured and the radio interface goes down, the traceback 
INTERFACE_ACE_API-3-NOADDSUBBLOCK no longer displays.
CSCeh65538 (duplicate of CSCei09772)—Access point/bridge now accepts associations after a 
traffic burst.
CSCei09744—The access point/bridge roams within specifications.
CSCei09772—The access point/bridge no longer shuts down the radio interface after roaming.
CSCsb06824—Open authentication is no longer added to an EAP SSID when a non-root bridge 
configuration is loaded.
CSCsb12321—The access point bridge table is now correct when a workgroup bridge roams.
CSCsb14224—Reverse ARP now works on all VLANs.
CSCsb26690—The access point/bridge no longer crashes when more than 20 devices are associated.
CSCsb31323, CSCsa98906—In non-root bridge or workgroup bridge mode, the access point/bridge 
no longer requires an infrastructure SSID.
CSCsa53019—Access point/bridge experiences UDP traffic performance problem when using WEP
Cisco has been unable to reproduce this caveat.
CSCsa54608—The Cisco IOS Firewall Authentication Proxy for FTP and/or Telnet Sessions feature 
in specific versions of Cisco IOS software is vulnerable to a remotely-exploitable buffer overflow 
condition. 
Devices that do not support, or are not configured for Firewall Authentication Proxy for FTP and/or 
Telnet Services are not affected. 
Devices configured with only Authentication Proxy for HTTP and/or HTTPS are not affected. 
Only devices running certain versions of Cisco IOS are affected. 
Cisco has made free software available to address this vulnerability. There are workarounds 
available to mitigate the effects of the vulnerability.
This advisory will be posted at 
CSCeh88199—Critical temperature threshold established for access point/bridge.
CSCeh84137—Dot11 arp cache causes the access point/bridge to reload.
Cisco has been unable to reproduce this caveat.
CSCsa98961—dot11RetryCount SNMP counters now agree with the CLI.