Guest

Cisco Aironet 1400 Series

Release Notes for Cisco Aironet 1410 Bridges for Cisco IOS Release 12.3(7)JA3

  • Viewing Options

  • PDF (227.3 KB)
  • Feedback
Release Notes for Cisco Aironet 1410 Bridges for Cisco IOS Release 12.3(7)JA3

Table Of Contents

Release Notes for Cisco Aironet 1410 Bridges for Cisco IOS Release 12.3(7)JA3

Contents

Introduction

System Requirements

Finding the Software Version

Upgrading to a New Software Release

New Features

AAA Cache and Profile

SSH v2 Server Support

Installation Notes

Bridge Installation

Stacking Bridges

Important Notes

Default SSID and Distance Settings Change When You Change Role in Radio Network

Default Encryption Key 2 Is Set by Bridge

Limitation to PAgP Redundancy on Switches Connected by Bridge Links

CLI Command power client n Is Not Supported

Default Infrastructure SSID

ARP Table Is Corrupted When Multiple BVIs Are Configured

Bridge Power Up LED Colors

Telnet Session Sometimes Hangs or Will Not Start During Heavy Traffic

Caveats

Open Caveats

Resolved Caveats in Cisco IOS Release 12.3(7)JA3

Resolved Caveats in Cisco IOS Release 12.3(7)JA2

Resolved Caveats in Cisco IOS Release 12.3(7)JA1

Resolved Caveats in Cisco IOS Release 12.3(7)JA

If You Need More Information

Troubleshooting

Documentation Updates

Stacking Bridges Section Changes

Optional Antenna Clarification

Related Documentation

Obtaining Documentation and Submitting a Service Request

If You Need More Information

Troubleshooting

Documentation Updates

Stacking Bridges Section Changes


Release Notes for Cisco Aironet 1410 Bridges for Cisco IOS Release 12.3(7)JA3


March 23, 2006

These release notes describe new features and open and resolved caveats for Cisco IOS Release 12.3(7)JA3. They also provide important information about the Cisco Aironet 1410 Wireless Bridge (hereafter called bridge).

Contents

These release notes contain the following sections:

Introduction

System Requirements

New Features

Installation Notes

Important Notes

Caveats

Troubleshooting

Documentation Updates

Related Documentation

Obtaining Documentation and Submitting a Service Request

Introduction

The Cisco Aironet 1400 Series Bridge is a wireless device designed for building-to-building wireless connectivity. Operating in the 5.8-GHz UNII 3 band (5725 to 5825 MHz), derived from the 802.11a standard, the bridge delivers 6 to 54 Mbps data rates without the need for a license. The bridge is a self-contained unit designed for outdoor installations, providing differing antenna gains as well as coverage patterns and supports both point-to-point and point-to-multipoint configurations.

The bridge uses a browser-based management system, but you can also configure the bridge using the command-line interface (CLI) through a Telnet session, Cisco IOS commands, or Simple Network Management Protocol (SNMP).

System Requirements

You can install Cisco IOS Release 12.3(7)JA3 on all 1400 series bridges.

Finding the Software Version

To find the version of Cisco IOS software running on your bridge, use a Telnet session to log into the bridge and enter the show version EXEC command. This example shows command output from a bridge running Cisco IOS Release 12.2(13)JA2:

bridge> show version
Cisco Internetwork Operating System Software
IOS (tm) C1410 Software (C1410-K9W7-M), Version 12.2(13)JA2
Copyright (c) 1986-2003 by Cisco Systems, Inc.
 
   

You can also find the software version on the System Software Version page in the bridge's web-browser interface.

Upgrading to a New Software Release

For instructions on installing access point software for your access point:

1. Click this link to go to the Product/Technology Support page:

http://www.cisco.com/cisco/web/psa/default.html

Choose Wireless > Outdoor Wireless > Cisco Aironet 1400 Series, scroll down and click Configure Guides.

2. Click this link to browse to the Cisco IOS Software Center on Cisco.com:

http://www.cisco.com/cisco/software/navigator.html

On the Web page, log in to access the Feature Navigator or the Cisco IOS Upgrade Planner, or click Wireless Software to go to the Wireless LAN Software page.

New Features

This release does not contain new features. It supports the features introduced in Cisco IOS Release 12.3(7)JA. This section lists new features in Cisco IOS Release 12.3(7)JA.

AAA Cache and Profile

AAA cache and profile is a new capability to cache the information returned from the RADIUS or TACACS+ server a more efficient handling of the authentication process.

SSH v2 Server Support

SSH v2 server support is a standards-based protocol to provide secure Telnet capability for router configuration and administration.

Installation Notes

This section contains important information to keep in mind when installing your bridge.

Bridge Installation

The bridge is available in two configurations:

Integrated antenna bridge (with 22.5-dBi directional antenna)

External antenna bridge (with antenna connector for use with an external antenna)


Note To meet regulatory restrictions, the external antenna bridge configuration and the external antenna must be professionally installed.



Note When installing the dual-coax cable, it is acceptable to unzip or pull the two cables apart at the ends if more separation is needed between the male F connectors.


Personnel installing the bridge must understand wireless bridging techniques, antenna alignment and adjustment, and grounding methods. The integrated antenna configuration can be installed by an experienced IT professional.

Stacking Bridges

You can double the throughput or create a standby link by stacking two bridges. A stacked installation consists of two bridge systems installed at the same physical location. For detailed mounting instructions refer to the Cisco Aironet 1400 Series Wireless Bridge Mounting Instructions that shipped with your bridge.


Note The bridge antennas must be separated by a minimum of 6.56 ft (2 m) from each other and from other co-located antennas.


Important Notes

This section describes important information about the bridge.

Default SSID and Distance Settings Change When You Change Role in Radio Network

If the bridge's SSID has not been changed from the default setting and you select Install Automatic Mode as the bridge's role in radio network setting, the SSID automatically changes from tsunami to autoinstall. When you change the role in radio network from Install Automatic Mode to Root or Non-Root, the SSID changes automatically from autoinstall back to tsunami. However, if you change the SSID from its default setting, changing the role in radio network setting does not change the SSID.

In Install Automatic Mode, the default distance setting is 99 km. When you change the role in radio network from Install Automatic Mode to Root or Non-Root, the distance setting changes automatically from 99 km to 0 km.

Default Encryption Key 2 Is Set by Bridge

The encryption key in slot 2 is the transmit key by default. If you enable WEP with MIC, use the same WEP key as the transmit key in the same key slot on both root and non-root bridges.

Limitation to PAgP Redundancy on Switches Connected by Bridge Links

When two switches configured for Port Aggregation Protocol (PAgP) are connected by redundant wireless bridge links, the PAgP switchover takes at least 30 seconds, which is too slow to maintain TCP sessions from one port to another.

CLI Command power client n Is Not Supported

The bridge does not support the power client n configuration interface command in the web-browser or CLI interfaces. The bridge does not perform any action when you enter this command.

Default Infrastructure SSID

When VLAN is enabled, the WEP encryption mode and the WEP key are applicable only to a native VLAN. Any SSID configured should have the Infrastructure-SSID parameter enabled for that SSID. With the Infrastructure-SSID parameter enabled, the bridge ensures that a non-native VLAN cannot be assigned to that SSID.

ARP Table Is Corrupted When Multiple BVIs Are Configured

The bridge supports only one bridge virtual interface (BVI). Multiple BVIs should not be configured because the ARP table may become corrupted.

Bridge Power Up LED Colors

During power up the bridge LEDs display the following color sequences:

1. The Install LED is initially turned off.

2. The Install LED turns amber.

3. The Status LED turns amber during the boot loader process.

4. The Ethernet, Status, and Radio LEDs turn green during the loading of the operating system.

5. The Ethernet, Status, and Radio LEDs turn amber during the loop-back test.

6. The Status LED starts to blink green then the Ethernet LED starts to blink green.

7. The Ethernet, Status, and Radio LEDs blink amber twice to indicate that the auto install process has started.

8. During the auto install process, the Ethernet, Status, and Radio LEDs turn off for a short time period then go through a blinking sequence twice. Each LED sequentially blinks at the following rates before becoming continuously amber:

a. Slow blinking rate of 1 blink per second.

b. Medium blinking rate of 2 blinks per second.

c. Fast blinking rate of 4 blinks per second.

9. The Install LED starts to blink amber to indicate that the bridge is searching for a root bridge.

10. When the bridge associates to a root bridge, the Install LED turns amber.

11. When the bridge becomes a root bridge and is waiting for a non-root bridge to associate, the Install LED blinks green.

12. When the root bridge has a non-root bridge associated, the Install LED turns green.

Telnet Session Sometimes Hangs or Will Not Start During Heavy Traffic

When the bridge is transmitting and receiving heavy traffic, you sometimes cannot start a Telnet session and some existing Telnet sessions freeze or hang. However, this behavior is expected because the bridge gives top priority to data traffic and a lower priority to Telnet traffic.

Caveats

This section lists open and resolved caveats for the bridge.

Open Caveats

These caveats are open in Cisco IOS Release 12.3(7)JA, 12.3(7)JA1, 12.3(7)JA2, and 12.3(7)JA3:

CSCed36477—VLAN keyword with encryption command on bridges is limited.

Wireless bridges, such as the BR1410, do not support using different crypto settings on different VLANs.

CSCed36462—Per-VLAN crypto settings are nonfunctional with wireless bridges.

On wireless bridges, all VLANs traversing the bridge link must use the same encryption settings. To avoid confusion, do not use the "vlan <vlan-id> keyword on the encryption command as shown in the following example:

interface dot11radio0 
encryption key 1 size 128bit AAAAABBBBBCCCCCDDDDDEEEEEF transmit-key 
encryption mode wep mandatory mic
 
   

CSCsa68144—Default bridge configuration is invalid.

When a defaulted 1400 series bridge boots up, it displays an error that the RTS threshold contains invalid input. The RTS threshold is set to 4000. Entering a ? after entering RTS threshold indicates the maximum value is 4000 but a system error occurs when attempting to set it. The maximum value that the CLI allows is 2347.

CSCsb04925—Bridge displays junk characters when show controllers command is issued.

When show controllers dot110 is entered, it displays a serial number with a junk character.

Resolved Caveats in Cisco IOS Release 12.3(7)JA3

The following caveats were resolved in Cisco IOS Release 12.3(7)JA3:

CSCsc60665—A non-root bridge now associates with a root bridge after being power cycled.

CSCsc64976—HTTP server now scrubs embedded HTML tags from command output.

Resolved Caveats in Cisco IOS Release 12.3(7)JA2

No caveats for the 1400 series bridge were resolved in Cisco IOS release 12.3(7)JA2.

Resolved Caveats in Cisco IOS Release 12.3(7)JA1

CSCej08390—Reboot loop with snmp-server ifindex persist configured no longer occurs.

CSCef83274—Bridge now sends RADIUS state information.

CSCef77951—Excessive processor memory is no longer held by IRB/CRB rxtypes.

CSCee36192—The no snmp-server enable traps tty command is effective through reload.

Resolved Caveats in Cisco IOS Release 12.3(7)JA

The following caveats are resolved in Cisco IOS Release 12.3(7)JA:

CSCeg45312—Radius authentication bypassed when configured with a none fallback method.

Remote Authentication Dial In User Service (RADIUS) authentication on a device that is running certain versions of Cisco Internetworking Operating System (IOS) and configured with a fallback method to none can be bypassed. Systems that are configured for other authentication methods or that are not configured with a fallback method to none are not affected. Only the systems that are running certain versions of Cisco IOS are affected. Not all configurations using RADIUS and none are vulnerable to this issue. Some configurations using RADIUS, none and an additional method are not affected.

Cisco has made free software available to address this vulnerability. There are workarounds available to mitigate the effects of the vulnerability.

More details can be found in the security advisory which posted at the following URL:

http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20050629-aaa

CSCsb06824—Open authentication is no longer added to an EAP SSID when a non-root bridge configuration is loaded.

CSCsa72936—The results for the show controller d0 command now includes the radio serial number.

CSCsb08590—Bridge now flashes radio firmware correctly on IOS upgrade.

CSCeb52431—Bridge no longer bombards AAA server with HTTP authentication requests.

CSCsb14318—Bridge out-of-box boot behavior has been reverted to its original behavior.

CSCsa54608—The Cisco IOS Firewall Authentication Proxy for FTP and/or Telnet Sessions feature in specific versions of Cisco IOS software is no longer vulnerable to a remotely-exploitable buffer overflow condition.

If You Need More Information

If you need information about a specific caveat that does not appear in these release notes, you can use the Cisco Bug Toolkit to find select caveats of any severity. Click this URL to browse to the Bug Toolkit:

http://www.cisco.com/cgi-bin/Support/Bugtool/launch_bugtool.pl

(If you request a defect that cannot be displayed, the defect number might not exist, the defect might not yet have a customer-visible description, or the defect might be marked Cisco Confidential.)

Troubleshooting

For the most up-to-date, detailed troubleshooting information, refer to the Cisco TAC website at http://www.cisco.com/tac. Click Technology Support, choose Wireless from the menu on the left, and click Wireless LAN.

Documentation Updates

The Cisco Aironet 1400 Series Wireless Bridge Mounting Instructions provides detailed instructions for installing and mounting the bridge.

Stacking Bridges Section Changes

The separation distance between the two stacked bridge antennas is a minimum of 6.56 ft (2 m).

Optional Antenna Clarification

The Quick Start Guide: Cisco Aironet 1400 Series Wireless Bridge states on page 6 that the external antenna version of the bridge connects to an optional antenna. The statement is incorrect. The external antenna of the bridge has no installed antenna. The customer must purchase the antenna for the this version. There are three antenna options available for the external antenna version and the customer must purchase at least one to make the bridge operational.

A revision to this guide will be released at a future date.

Related Documentation

These documents describe the installation and configuration of the bridge:

Quick Start Guide: Cisco Aironet 1400 Series Wireless Bridge

Cisco Aironet 1400 Series Wireless Bridge Software Configuration Guide

Cisco Aironet 1400 Series Wireless Bridge Hardware Installation Guide

Cisco IOS Command Reference for Access Points and Bridges

Cisco Aironet 1400 Series Wireless Bridge Mounting Instructions

Cisco Aironet 1400 Series Wireless Bridge 9-dBi Omnidirectional Antenna

Cisco Aironet 1400 Series Wireless Bridge 10-dBi Sector Antenna

Cisco Aironet 1400 Series Wireless Bridge 28-dBi Dish Antenna

Cisco Aironet 1400 Series Wireless Bridge Roof Mount Assembly Instructions

Obtaining Documentation and Submitting a Service Request

For information on obtaining documentation, submitting a service request, and gathering additional information, see What's New in Cisco Product Documentation at: http://www.cisco.com/en/US/docs/general/whatsnew/whatsnew.html.

Subscribe to What's New in Cisco Product Documentation, which lists all new and revised Cisco technical documentation, as an RSS feed and deliver content directly to your desktop using a reader application. The RSS feeds are a free service.


Cisco has made free software available to address this vulnerability. There are workarounds available to mitigate the effects of the vulnerability.

More details can be found in the security advisory which posted at the following URL:

http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20050629-aaa

CSCsb06824—Open authentication is no longer added to an EAP SSID when a non-root bridge configuration is loaded.

CSCsa72936—The results for the show controller d0 command now includes the radio serial number.

CSCsb08590—Bridge now flashes radio firmware correctly on IOS upgrade.

CSCeb52431—Bridge no longer bombards AAA server with HTTP authentication requests.

CSCsb14318—Bridge out-of-box boot behavior has been reverted to its original behavior.

CSCsa54608—The Cisco IOS Firewall Authentication Proxy for FTP and/or Telnet Sessions feature in specific versions of Cisco IOS software is no longer vulnerable to a remotely-exploitable buffer overflow condition.

If You Need More Information

If you need information about a specific caveat that does not appear in these release notes, you can use the Cisco Bug Toolkit to find select caveats of any severity. You can access the Bug Toolkit at:

http://tools.cisco.com/Support/BugToolKit/action.do?hdnAction=searchBugs

(If you request a defect that cannot be displayed, the defect number might not exist, the defect might not yet have a customer-visible description, or the defect might be marked Cisco Confidential.)


Note You need to have a user login and password to use the Bug Toolkit.


Troubleshooting

For the most up-to-date, detailed troubleshooting information, refer to the Cisco TAC website at http://www.cisco.com/cisco/web/support/index.html. Click Technology Support, choose Wireless from the menu on the left, and click Wireless LAN.

Documentation Updates

The Cisco Aironet 1400 Series Wireless Bridge Mounting Instructions provides detailed instructions for installing and mounting the bridge.

Stacking Bridges Section Changes

The separation distance between the two stacked bridge antennas is a minimum of 6.56 ft (2 m).