Guest

Cisco Aironet 1240 AG Series

Release Notes for Access Point on Cisco 860, 880, and 890 Integrated Services Routers for Cisco IOS Release 12.4(10b)JY

  • Viewing Options

  • PDF (102.1 KB)
  • Feedback
Release Notes for Access Point on Cisco 860, 880, and 890 Integrated Services Routers for Cisco IOS Release 12.4(10b)JY

Table Of Contents

Release Notes for Access Point on Cisco 860, 880, and 890 Integrated Services Routers for Cisco IOS Release 12.4(10b)JY

Contents

Introduction

System Requirements

Determining the Software Version

New and Changed Information

New Hardware Features in Release 12.4(10b)JY

New Software Features in Release 12.4(10b)JY

Caveats

Open Caveats - Release 12.4(10b)JY

Resolved Caveats - Release 12.4(10b)JY

Related Documentation


Release Notes for Access Point on Cisco 860, 880, and 890 Integrated Services Routers for Cisco IOS Release 12.4(10b)JY


First Published: March 16, 2009
Last Revised: March 15, 2009
OL-19145-01

These release notes describe caveats and features for Cisco IOS Release 12.4(10b)JY.

Contents

These release notes contain the following sections:

Introduction

System Requirements

New and Changed Information

Caveats

Related Documentation

Introduction

The Cisco Access Point supported on the fixed ISRs - Cisco 860, 880, and 890 series - is a wireless LAN transceiver that acts as a connection point between wireless and wired networks or a center point of a standalone wireless network. The access points supported on the Cisco 860, 880, and 890 can be configured and monitored by using the command-line interface (CLI), the web-browser interface or Simple Network Management Protocol (SNMP).

System Requirements

You can install the Cisco IOS Release 12.4(10b)JY on all the access points supported on the Cisco 860, 880, and 890 fixed ISR platforms.

Determining the Software Version

To find the version of Cisco IOS software running on your access point, use a Telnet session to log into the access point, and enter the show version EXEC command. This example shows command output from an access point running Cisco IOS Release 12.4(10b)JY:

ap>show version
Cisco IOS Software, AP801 Software (AP801-K9W7-M), Version 12.4(10b)JY, RELEASE SOFTWARE 
(fc2)
Technical Support: http://www.cisco.com/techsupport
Copyright (c) 1986-2009 by Cisco Systems, Inc.

New and Changed Information

This section contains the following information:

New Hardware Features in Release 12.4(10b)JY

New Software Features in Release 12.4(10b)JY

New Hardware Features in Release 12.4(10b)JY

There are no new hardware features in this release.

New Software Features in Release 12.4(10b)JY

The following new feature is supported:

Compliance with FCC (US and Canada) Regulations effective October 2008 on Dynamic Frequency Selection (DFS) in the 5 GHz bands.

Caveats

These caveats describe unexpected behavior in Cisco IOS Release 12.4(10b)JY software releases. Severity 1 caveats are the most serious caveats. Severity 2 caveats are less serious. Severity 3 caveats are moderate caveats, and only selected severity 3 caveats are included in the caveats document.


Note If you have an account on Cisco.com, you can use Bug Toolkit to find caveats of any severity. The Bug Toolkit is at:http://tools.cisco.com/Support/BugToolKit/


Open Caveats - Release 12.4(10b)JY

The following caveat is open in Cisco IOS Release 12.4(10b)JY:

CSCsw40965 Cannot use 802.11n data rate after changing WEP to no encryption.

Conditions   Change from WEP and WPA-TKIP to no encryption or WPA2-AES will not change the maximum data rate from 54.0 Mbps to 144 Mbps.

Workaround   Save configuration and reload AP.

Resolved Caveats - Release 12.4(10b)JY

These caveats are resolved in Cisco IOS Release 12.4(10b)JY:

CSCsw49097 FCC DFS test fails at certain off-center frequencies.

CSCsw80092 Low upstream TCP throughput with antenna diversity with 802.11A or G clients.

CSCsu63811 AP801 RBCP is not in steady state when it is at Init Config Dialog.

CSCsv04836

Multiple Cisco products are affected by denial of service (DoS) vulnerabilities that manipulate the state of Transmission Control Protocol (TCP) connections. By manipulating the state of a TCP connection, an attacker could force the TCP connection to remain in a long-lived state, possibly indefinitely. If enough TCP connections are forced into a long-lived or indefinite state, resources on a system under attack may be consumed, preventing new TCP connections from being accepted. In some cases, a system reboot may be necessary to recover normal system operation. To exploit these vulnerabilities, an attacker must be able to complete a TCP three-way handshake with a vulnerable system.

In addition to these vulnerabilities, Cisco Nexus 5000 devices contain a TCP DoS vulnerability that may result in a system crash. This additional vulnerability was found as a result of testing the TCP state manipulation vulnerabilities.

Cisco has released free software updates for download from the Cisco website that address these vulnerabilities. Workarounds that mitigate these vulnerabilities are available.

This advisory is posted at http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20090908-tcp24.

Related Documentation

For instructions on installing access point software for your access point, see the section Basic Wireless Device Configuration in the Cisco 860 and Cisco 880 Series Integrated Services Routers Software Configuration Guide:

http://www.cisco.com/en/US/docs/routers/access/800/860-880-890/software/configuration/guide/wlan.html


This document is to be used in conjunction with the documents listed in the "Related Documentation" section.