Cisco Cisco Aironet 1400 Wireless Bridge 發佈版本通知
6
Release Notes for Cisco Aironet 1410 Bridges for Cisco IOS Release 12.3(7)JA5
OL-14263-01
Caveats
On wireless bridges, all VLANs traversing the bridge link must use the same encryption settings. To
avoid confusion, do not use the “vlan <vlan-id> keyword on the encryption command as shown in
the following example:
avoid confusion, do not use the “vlan <vlan-id> keyword on the encryption command as shown in
the following example:
interface dot11radio0
encryption key 1 size 128bit AAAAABBBBBCCCCCDDDDDEEEEEF transmit-key
encryption mode wep mandatory mic
•
CSCsa68144—Default bridge configuration is invalid.
When a defaulted 1400 series bridge boots up, it displays an error that the RTS threshold contains
invalid input. The RTS threshold is set to 4000. Entering a ? after entering RTS threshold indicates
the maximum value is 4000 but a system error occurs when attempting to set it. The maximum value
that the CLI allows is 2347.
invalid input. The RTS threshold is set to 4000. Entering a ? after entering RTS threshold indicates
the maximum value is 4000 but a system error occurs when attempting to set it. The maximum value
that the CLI allows is 2347.
•
CSCsb04925—Bridge displays junk characters when show controllers command is issued.
When show controllers dot110 is entered, it displays a serial number with a junk character.
Resolved Caveats
These caveats are resolved in Cisco IOS Release 12.3(7)JA5:
•
CSCsf04754—Multiple Cisco products contain either of two authentication vulnerabilities in the
Simple Network Management Protocol version 3 (SNMPv3) feature. These vulnerabilities can be
exploited when processing a malformed SNMPv3 message. These vulnerabilities could allow the
disclosure of network information or may enable an attacker to perform configuration changes to
vulnerable devices. The SNMP server is an optional service that is disabled by default. Only
SNMPv3 is impacted by these vulnerabilities. Workarounds are available for mitigating the impact
of the vulnerabilities described in this document.
Simple Network Management Protocol version 3 (SNMPv3) feature. These vulnerabilities can be
exploited when processing a malformed SNMPv3 message. These vulnerabilities could allow the
disclosure of network information or may enable an attacker to perform configuration changes to
vulnerable devices. The SNMP server is an optional service that is disabled by default. Only
SNMPv3 is impacted by these vulnerabilities. Workarounds are available for mitigating the impact
of the vulnerabilities described in this document.
The United States Computer Emergency Response Team (US-CERT) has assigned Vulnerability
Note VU#878044 to these vulnerabilities.
Note VU#878044 to these vulnerabilities.
Common Vulnerabilities and Exposures (CVE) identifier CVE-2008-0960 has been assigned to
these vulnerabilities.
these vulnerabilities.
This advisory will be posted at
•
CSCsh58082—When receiving a series of packets destined for port 5060, Cisco devices running an
affected version of IOS that supports Session Initiation Protocol (SIP) may be required to reload the
device. This issue is compounded by a related bug that allows traffic to TCP 5060 and UDP port
5060 on devices not configured for SIP.
affected version of IOS that supports Session Initiation Protocol (SIP) may be required to reload the
device. This issue is compounded by a related bug that allows traffic to TCP 5060 and UDP port
5060 on devices not configured for SIP.
•
CSCsj44081—Cisco IOS Software has been enhanced with the introduction of additional software
checks to signal improper use of data structures. This feature has been introduced in select Cisco
IOS Software releases published after April 5, 2007.
checks to signal improper use of data structures. This feature has been introduced in select Cisco
IOS Software releases published after April 5, 2007.
Details: The %DATACORRUPTION-1-DATAINCONSISTENCY error message is preceded by a
timestamp: May 17 10:01:27.815 UTC: %DATACORRUPTION-1-DATAINCONSISTENCY: copy
error. The error message is then followed by a traceback.
timestamp: May 17 10:01:27.815 UTC: %DATACORRUPTION-1-DATAINCONSISTENCY: copy
error. The error message is then followed by a traceback.