Cisco Cisco Aironet 1200 Access Point 發佈版本通知

下载
页码 24
 
21
Release Notes for Cisco Aironet Access Points for Cisco IOS Release 12.3(7)JA4
OL-11512-01
  Caveats
CSCeh30775—Intel 2100 card no longer drops data when CMIC is enabled.
CSCeh46596—show dot11 association command returns correct infrastructure client state.
CSCeh50286—The dot11 arp cache frees memory when a client disassociates.
CSCeh59709 (duplicate of CSCeh54960)—Short slot time no longer enables after rebooting.
CSCeh59723—Shared authentications are now allowed on more than one SSID.
CSCeh68031—Broadcast storms no longer cause I/O memory depletion on 350 series access points.
CSCeh68511—Radius VLAN assignments now work with WPA/TKIP.
CSCeh80318—1200 series access point no longer fails to upgrade the radio firmware.
CSCeh88870—Infrastructure SSID can now be set using the GUI for a 1200 series access point in 
workgroup bridge mode 
CSCei02959—GUI and CLI differences for allowed SSID characters is corrected.
CSCei12722—Access point authentication requests are correct when MBSSID is enabled.
CSCei18019—Wireless client IP address now learned when Layer 3 Mobility enabled on the access 
point and mobility trust enabled on the tunnel.
CSCsa53672—Console history buffer now operates correctly when connected via WLSM console 
port.
CSCsa81364—Access point no longer adds two sets of IP/GRE headers if tunnel IP address not 
resolved.
CSCsa85447—AES-CCMP messages are no longer replayed when a 1200 series access points 
reassociates with a 1200 series access point in workgroup bridge mode.
CSCsa87643—Access point no longer crashes when configuring subinterfaces on the CLI.
CSCsa90418—WDS access points no longer fail to communicate with WLSE.
CSCsb04359—NTP configurations are replaced by SNTP configurations.
CSCsb06768—350 series access points no longer experience high CPU, CPU Hog messages, or 
watchdog timeouts.
CSCsb08986—An error message displays when entering 25 characters for a 128-bit WEP key.
CSCsb12321—The access point bridge table is now correct when a workgroup bridge roams.
CSCed49127—AAA method list and server group configurations now function normally on reload.
CSCeg51714—MIC errors no longer occur during FTP session.
CSCeh71021—Neighbor TLV CDP support has been added to this release.
CSCsa67267—The mbssid and no mbssid commands function properly. 
CSCeg45312—Radius authentication bypassed when configured with a none fallback method.
Remote Authentication Dial In User Service (RADIUS) authentication on a device that is running 
certain versions of Cisco Internetworking Operating System (IOS) and configured with a fallback 
method to none can be bypassed. Systems that are configured for other authentication methods or 
that are not configured with a fallback method to none are not affected. Only the systems that are 
running certain versions of Cisco IOS are affected. Not all configurations using RADIUS and none 
are vulnerable to this issue. Some configurations using RADIUS, none and an additional method are 
not affected. 
Cisco has made free software available to address this vulnerability. There are workarounds 
available to mitigate the effects of the vulnerability.