Примечания к выпуску для Cisco Cisco Aironet 1200 Access Point
19
Release Notes for Cisco Aironet Access Points for Cisco IOS Release 12.3(8)JEC2
OL-17694-01
Caveats
to a specific access point. For example, when the train travels toward access point 020, the
workgroup bridge associates with it and wired clients associate with this workgroup bridge. After
the workgroup bridge roams to the next access point (for example 021, 022, or 023), some wired
clients still show up under access point 020 even though the workgroup bridge has moved to a new
access point. As a result, the wired clients associated with the workgroup bridge lose their
connection with the outside network.
workgroup bridge associates with it and wired clients associate with this workgroup bridge. After
the workgroup bridge roams to the next access point (for example 021, 022, or 023), some wired
clients still show up under access point 020 even though the workgroup bridge has moved to a new
access point. As a result, the wired clients associated with the workgroup bridge lose their
connection with the outside network.
Workaround: None.
•
CSCsv48416—Suppress debug logs on 1100 series access point.
Debug messages appear even though debug is not enabled.
Resolved Caveats
These caveats are resolved in Cisco IOS Release 12.3(8)JEC2:
•
CSCsl00363—Changing 802.1x credentials on workgroup bridge for EAP-FAST requires a reboot
•
CSCso70124—Failing to populate SNMP instance for non-VLAN (cd11IfVlanSecurityTable)
•
CSCsl22194—CLI command show dot11 association shows negative values
•
CSCsm34905— Wrong dynamic VLAN assigned after re-authentication
•
CSCso10119—1231 access point reboots
•
CSCsm78141—Access point never sends authenticate-fail trap
•
CSCso62119—CLI command WlanEncryptionMode always returns WEP mode even when
encryption is set to AES
encryption is set to AES
•
CSCso02086—Unable to apply QoS settings on the standalone AP through GUI
•
CSCsq29310—Javascript error in file ap_contextmgr_ap.shtml
•
CSCsm73025—Workgroup bridge dependent CLI commands not cleared after uncofiguring
•
CSCso57659—More events needed in syslog logging levels severity feature support
•
CSCsk42319—No error message is generated when key management WPAv1 with AES-CCM
•
CSCek69256—A —dot11_mgr_disp.c: coding error
•
CSCsq34053—power client and no power client local added after access point reloads.
•
CSCsl49327—ADU 2.x eap-fast does not work in Cisco IOS Release 12.3(8)JEC.
•
CSCsr11909—Access point ARPing for non local WLSM tunnel loopback destination address.
•
CSCsr27699—Roaming operation does not work correctly.
•
CSCsu41132—IP http timeout-policy does not log a user out.
•
CSCsm80730—1240 series access point does not send a reassociation response to client.
•
CSCir02221—CCKM issue with 1240 series access points.
This caveat is resolved in Cisco IOS Release 12.3(8)JEC3:
•
CSCsv04836—Multiple Cisco products are affected by denial of service (DoS) vulnerabilities that
manipulate the state of Transmission Control Protocol (TCP) connections. By manipulating the state
of a TCP connection, an attacker could force the TCP connection to remain in a long-lived state,
possibly indefinitely. If enough TCP connections are forced into a long-lived or indefinite state,
resources on a system under attack may be consumed, preventing new TCP connections from being
manipulate the state of Transmission Control Protocol (TCP) connections. By manipulating the state
of a TCP connection, an attacker could force the TCP connection to remain in a long-lived state,
possibly indefinitely. If enough TCP connections are forced into a long-lived or indefinite state,
resources on a system under attack may be consumed, preventing new TCP connections from being