Cisco Cisco Aironet 1400 Wireless Bridge 發佈版本通知

下载
页码 10
8
Release Notes for Cisco Aironet 1410 Bridges for Cisco IOS Release 12.2(11)JA3
OL-5761-01
Caveats
CSCeb10911—Linktest reports higher RSSI readings for the remote site.
There is no workaround for this problem.
CSCeb12740—The virtual ratio connection cannot be made after the station role is changed.
After you change the station role of two bridges while the link is active, the radios get associated 
but the virtual radio interfaces do not function.
Workaround: After changing the station roles, you must restart both root and non-root bridges using the 
browser interface (System Software > System Configuration > Restart) or the CLI reload command.
CSCeb14603—Telnet session locks up under heavy traffic.
There is no workaround for this problem.
CSCeb15923—Radio firmware recovery does not work reliably.
There is no workaround for this problem.
CSCeb17296—Clear dot client command does not work with traffic being passed.
When traffic is being passed through the bridges at around 30 to 40 percent CPU utilization, the CLI 
clear dot client H.H.H command does not clear the counters on the non-root bridge even though 
the association did clear.
There is no workaround for this problem.
CSCea77473—HTTP software upgrade with Netscape version 7.x intermittently fails.
When you are upgrading software with Netscape version 7.x, the Web interface cascades through all open 
Netscape windows. The upgrade intermittently fails or the browser states that the upgrade failed when in 
fact the upgrade actually worked.
Workaround: Use Netscape version 4.7 or another browser.
Resolved Caveats
These caveats are resolved in Cisco IOS release 12.2(11)JA3:
CSCed27956
A vulnerability in the Transmission Control Protocol (TCP) specification (RFC793) has been 
discovered by an external researcher. The successful exploitation enables an adversary to reset any 
established TCP connection in a much shorter time than was previously discussed publicly. 
Depending on the application, the connection may get automatically re-established. In other cases, 
a user will have to repeat the action (for example, open a new Telnet or SSH session). Depending 
upon the attacked protocol, a successful attack may have additional consequences beyond 
terminated connection which must be considered. This attack vector is only applicable to the 
sessions which are terminating on a device (such as a router, switch, or computer) and not to the 
sessions that are only passing through the device (for example, transit traffic that is being routed by 
a router). In addition, this attack vector does not directly compromise data integrity or 
confidentiality. 
All Cisco products which contain TCP stack are susceptible to this vulnerability. 
This advisory is available at 
and it describes this vulnerability as it applies to Cisco products that run Cisco IOS® software. 
A companion advisory that describes this vulnerability for products that do not run Cisco IOS 
software is available at