Примечания к выпуску для Cisco Cisco Aironet 1400 Wireless Bridge
9
Release Notes for Cisco Aironet 1410 Bridges for Cisco IOS Release 12.2(11)JA3
OL-5761-01
Troubleshooting
•
CSCed38527
A vulnerability in the Transmission Control Protocol (TCP) specification (RFC793) has been
discovered by an external researcher. The successful exploitation enables an adversary to reset any
established TCP connection in a much shorter time than was previously discussed publicly.
Depending on the application, the connection may get automatically re-established. In other cases,
a user will have to repeat the action (for example, open a new Telnet or SSH session). Depending
upon the attacked protocol, a successful attack may have additional consequences beyond
terminated connection which must be considered. This attack vector is only applicable to the
sessions which are terminating on a device (such as a router, switch, or computer) and not to the
sessions that are only passing through the device (for example, transit traffic that is being routed by
a router). In addition, this attack vector does not directly compromise data integrity or
confidentiality.
discovered by an external researcher. The successful exploitation enables an adversary to reset any
established TCP connection in a much shorter time than was previously discussed publicly.
Depending on the application, the connection may get automatically re-established. In other cases,
a user will have to repeat the action (for example, open a new Telnet or SSH session). Depending
upon the attacked protocol, a successful attack may have additional consequences beyond
terminated connection which must be considered. This attack vector is only applicable to the
sessions which are terminating on a device (such as a router, switch, or computer) and not to the
sessions that are only passing through the device (for example, transit traffic that is being routed by
a router). In addition, this attack vector does not directly compromise data integrity or
confidentiality.
All Cisco products which contain TCP stack are susceptible to this vulnerability.
This advisory is available at
and it describes this vulnerability as it applies to Cisco products that run Cisco IOS® software.
A companion advisory that describes this vulnerability for products that do not run Cisco IOS
software is available at
software is available at
Troubleshooting
For the most up-to-date, detailed troubleshooting information, refer to the Cisco TAC website at
. Click Technology Support, choose Wireless
from the menu on the left, and click Wireless LAN.
Documentation Updates
The Cisco Aironet 1400 Series Wireless Bridge Mounting Instructions provides detailed instructions for
installing and mounting the bridge.
installing and mounting the bridge.
Stacking Bridges Section Changes
The separation distance between the two stacked bridge antennas is a minimum of 6.56 feet (2 meters).