Примечания к выпуску для Cisco Cisco Aironet 1400 Wireless Bridge
8
Release Notes for Cisco Aironet 1410 Bridges for Cisco IOS Release 12.2(11)JA3
OL-5761-01
Caveats
•
CSCeb10911—Linktest reports higher RSSI readings for the remote site.
There is no workaround for this problem.
•
CSCeb12740—The virtual ratio connection cannot be made after the station role is changed.
After you change the station role of two bridges while the link is active, the radios get associated
but the virtual radio interfaces do not function.
but the virtual radio interfaces do not function.
Workaround: After changing the station roles, you must restart both root and non-root bridges using the
browser interface (System Software > System Configuration > Restart) or the CLI reload command.
browser interface (System Software > System Configuration > Restart) or the CLI reload command.
•
CSCeb14603—Telnet session locks up under heavy traffic.
There is no workaround for this problem.
•
CSCeb15923—Radio firmware recovery does not work reliably.
There is no workaround for this problem.
•
CSCeb17296—Clear dot client command does not work with traffic being passed.
When traffic is being passed through the bridges at around 30 to 40 percent CPU utilization, the CLI
clear dot client H.H.H command does not clear the counters on the non-root bridge even though
the association did clear.
clear dot client H.H.H command does not clear the counters on the non-root bridge even though
the association did clear.
There is no workaround for this problem.
•
CSCea77473—HTTP software upgrade with Netscape version 7.x intermittently fails.
When you are upgrading software with Netscape version 7.x, the Web interface cascades through all open
Netscape windows. The upgrade intermittently fails or the browser states that the upgrade failed when in
fact the upgrade actually worked.
Netscape windows. The upgrade intermittently fails or the browser states that the upgrade failed when in
fact the upgrade actually worked.
Workaround: Use Netscape version 4.7 or another browser.
Resolved Caveats
These caveats are resolved in Cisco IOS release 12.2(11)JA3:
•
CSCed27956
A vulnerability in the Transmission Control Protocol (TCP) specification (RFC793) has been
discovered by an external researcher. The successful exploitation enables an adversary to reset any
established TCP connection in a much shorter time than was previously discussed publicly.
Depending on the application, the connection may get automatically re-established. In other cases,
a user will have to repeat the action (for example, open a new Telnet or SSH session). Depending
upon the attacked protocol, a successful attack may have additional consequences beyond
terminated connection which must be considered. This attack vector is only applicable to the
sessions which are terminating on a device (such as a router, switch, or computer) and not to the
sessions that are only passing through the device (for example, transit traffic that is being routed by
a router). In addition, this attack vector does not directly compromise data integrity or
confidentiality.
discovered by an external researcher. The successful exploitation enables an adversary to reset any
established TCP connection in a much shorter time than was previously discussed publicly.
Depending on the application, the connection may get automatically re-established. In other cases,
a user will have to repeat the action (for example, open a new Telnet or SSH session). Depending
upon the attacked protocol, a successful attack may have additional consequences beyond
terminated connection which must be considered. This attack vector is only applicable to the
sessions which are terminating on a device (such as a router, switch, or computer) and not to the
sessions that are only passing through the device (for example, transit traffic that is being routed by
a router). In addition, this attack vector does not directly compromise data integrity or
confidentiality.
All Cisco products which contain TCP stack are susceptible to this vulnerability.
This advisory is available at
and it describes this vulnerability as it applies to Cisco products that run Cisco IOS® software.
A companion advisory that describes this vulnerability for products that do not run Cisco IOS
software is available at
software is available at