cc/td/doc/product/software/ios123/123relnt
hometocprevnextglossaryfeedbacksearchhelp
PDF

Table Of Contents

Release Notes for Cisco 3200 Series Mobile Access Routers for Cisco IOS Release 12.3(2)JK1

Contents

System Requirements

Memory Requirements

Hardware Supported

Determining the Software Version

Upgrading to a New Software Release

Feature Set Tables

New and Changed Information

New Hardware Features in Release 12.3(2)JK1

New Hardware Features in Release 12.3(2)JK

New Software Features in Release 12.3(2)JK1

New Software Features in Release 12.3.(2)JK

Limitations and Restrictions

Caveats

Resolved Caveats - Release 12.3(2)JK1

Resolved Caveats - Release 12.3(2)JK

Open Caveats - Release 12.3(2)JK

Related Documentation

Release-Specific Documents

Platform-Specific Documents

Cisco Feature Navigator

Cisco IOS Software Documentation Set

Obtaining Documentation

Cisco.com

Ordering Documentation

Documentation Feedback

Obtaining Technical Assistance

Cisco TAC Website

Opening a TAC Case

TAC Case Priority Definitions

Obtaining Additional Publications and Information


Release Notes for Cisco 3200 Series Mobile Access Routers for Cisco IOS Release 12.3(2)JK1


September 19, 2005

These release notes describe new features and significant software components for the Cisco 3200 Series Mobile Access Router that support the Cisco IOS Release 12.3(2)T, up to and including Release 12.3(2)JK1.

These release notes are updated as needed to describe new memory requirements, new features, new hardware support, software platform deferrals, microcode or modem code changes, related document changes, and any other important changes. Use these release notes with the Cross-Platform Release Notes and Caveats for Cisco IOS Release 12.3T located on Cisco.com.

For a list of the software caveats that apply to 12.3(2)JK1, see the "Caveats" section. The online caveats document is updated for every maintenance release and is located on Cisco.com.

Contents

System Requirements

New and Changed Information

Limitations and Restrictions

Caveats

Related Documentation

Obtaining Documentation

Documentation Feedback

Obtaining Technical Assistance

Obtaining Additional Publications and Information

System Requirements

This section describes the system requirements for Cisco IOS 12.3(2)JK1, and includes the following sections:

Memory Requirements

Hardware Supported

Determining the Software Version

Upgrading to a New Software Release

Feature Set Tables

Memory Requirements

Table 1 describes the memory requirements for the Cisco IOS feature sets supported by the Cisco IOS 12.3(2)JK1 on the Cisco 3200 series routers.

Table 1 Recommended Memory for the Cisco 3200 Series Mobile Access Router 

Platform
Image Name
Feature Set
Image
Flash Memory
DRAM Memory
Runs from

4.9-GHz (US Only, Public Safety) Wireless Mobile Interface Card (WMIC)

Cisco 3202 WMIC WLAN

Wireless LAN

c3202-k9w7-tar

8 MB

32 MB

RAM


Hardware Supported

The Cisco IOS Release 12.3(2)JK1 supports the 4.9-GHz (US Only, Public Safety) Wireless Mobile Interface Card (WMIC) of Cisco 3200 Series Mobile Access Router.

For descriptions of existing hardware features and supported modules, see the configuration guides and additional documents specific to the Cisco 3200 Series Mobile Access Router, which are available on Cisco.com at the following location:

http://www.cisco.com/univercd/cc/td/doc/product/access/mar_3200/index.htm

This URL is subject to change without notice. If it changes, point your web browser to Cisco.com, and click the following path:

Technical Documentation: Access Servers & Routers: Mobile Access Router

Determining the Software Version

To determine which version of Cisco IOS software is currently running on your Cisco 3200 series WMIC, log in to the WMIC and enter the show version EXEC command. The following sample output from the show version command indicates the version number.

bridge> show version
Cisco Internetwork Operating System Software
IOS (tm) C3202 Software (C3202-K9W7-M), Version 12.3(2)JK1, EARLY DEPLOYMENT RELEASE SOFTWARE (fcl)
Copyright (c) 1986-2005 by cisco Systems, Inc.

Upgrading to a New Software Release

For general information about upgrading to a new software release, refer to the Software Installation and Upgrade Procedures located at http://www.cisco.com/warp/public/130/upgrade_index.shtml.

Feature Set Tables

The Cisco IOS software is packaged in feature sets consisting of software images, depending on the platform. Each feature set contains a specific set of Cisco IOS features.


Caution The Cisco IOS images with strong encryption (including, but not limited to, 168-bit [3DES] data encryption feature sets) are subject to United States government export controls and have limited distribution. Strong encryption images to be installed outside the United States will likely require an export license. Customer orders can be denied or subject to delay as a result of United States government regulations. When applicable, the purchaser/user must obtain local import and use authorizations for all encryption strengths. Please contact your sales representative or distributor for more information, or send an e-mail to export@cisco.com.

Table 2 lists the features and feature sets supported in Cisco 3200 Series Mobile Access Router software with which Release 12.3(2)JK1 software interacts.

The table uses the following conventions:

In—The number in the "In" column indicates the Cisco IOS release in which the feature was introduced. For example, "12.3(2)JK" indicates that the feature was introduced in 12.3(2)JK. If a cell in this column is empty, the feature was included in a previous release or in the initial base release.

Yes—The feature is supported in the software image.

No—The feature is not supported in the software image.


Note This feature set table contains only a list of selected features, which are cumulative for Release 12.3(2)nn early deployment releases only (nn identifies each early deployment release). The table does not list all features in each image; additional features are listed in Cross-Platform Release Notes for Cisco IOS Release 12.3T and in Release 12.3T Cisco IOS documentation.


Table 2 Feature List by Feature Set for the Cisco 3200 Series Mobile Access Routers 

Feature
In
Platform and Feature Set
IP
IP PLUS/IPSec
AAA Server, RADIUS, TACACS

RADIUS

12.2(11)YQ

Yes

Yes

TACACS

12.2(11)YQ

Yes

Yes

Quality of Service

Generic Traffic Shaping (GTS)

12.2(11)YQ

Yes

Yes

Class-Based Weighted Fair Queuing (CBWFQ)

12.2(11)YQ

Yes

Yes

Committed Access Rate (CAR)

12.2(11)YQ

No

Yes

DiffServ Compliant WRED

12.2(11)YQ

Yes

Yes

Flow-Based WRED

12.2(11)YQ

Yes

Yes

Low Latency Queuing (LLQ)

12.2(11)YQ

Yes

Yes

Priority Queuing (PQ)

12.2(11)YQ

Yes

Yes

QoS Packet Marking

12.2(11)YQ

Yes

Yes

Random Early Detection (RED)

12.2(11)YQ

Yes

Yes

Weighted Fair Queuing (WFQ)

12.2(11)YQ

Yes

Yes

Weighted RED (WRED)

12.2(11)YQ

Yes

Yes

Link Fragmentation and Interleaving (LFI)

12.2(11)YQ

Yes

Yes

Resource Reservation Protocol (RSVP)

12.2(11)YQ

No

Yes

Class-Based Ethernet CoS Matching and Marking (802.1p CoS)

12.2(11)YQ

Yes

Yes

802.1p CoS Features Service

12.2(11)YR

Yes

Yes

PPP and Related Protocols

PPP

12.2(11)YQ

Yes

Yes

Multilink PPP

12.2(11)YQ

Yes

Yes

PPP over Frame Relay

12.2(11)YQ

Yes

Yes

Challenge Handshake Authentication Protocol (CHAP)

12.2(11)YQ

Yes

Yes

MS-CHAP Support

12.2(11)YQ

Yes

Yes

Password Authentication Protocol (PAP)

12.2(11)YQ

Yes

Yes

Easy IP, DHCP, AutoInstall

Easy IP (Phase I)

12.2(11)YQ

Yes

Yes

DHCP Client

12.2(11)YQ

Yes

Yes

DHCP Relay

12.2(11)YQ

Yes

Yes

DHCP Relay Agent Support for Unnumbered Interface

12.2(11)YQ

Yes

Yes

DHCP Server

12.2(11)YQ

Yes

Yes

DHCP Server Options - Import and Autoconfig

12.2(11)YQ

Yes

Yes

DHCP Server - Easy IP Phase 2

12.2(11)YQ

Yes

Yes

AutoInstall using DHCP for LAN interfaces

12.2(11)YQ

Yes

Yes

HTTP Security

12.2(11)YQ

Yes

Yes

NAT

NAT - Support for NetMeeting Directory (ILS)

12.2(11)YQ

Yes

Yes

Dialer

Dial Backup

12.2(11)YQ

Yes

Yes

Dial-on-Demand

12.2(11)YQ

Yes

Yes

Dialer Idle Timer Inbound Traffic Configuration

12.2(11)YQ

Yes

Yes

Dialer Profiles

12.2(11)YQ

Yes

Yes

Firewall

Firewall Feature Set

12.2(11)YQ

No

Yes

Firewall Intrusion Detection System

12.2(11)YQ

No

Yes

Context-Based Access Control (CBAC)

12.2(11)YQ

No

Yes

Port to Application Mapping (PAM)

12.2(11)YQ

No

Yes

Frame Relay

Frame Relay

12.2(11)YQ

Yes

Yes

Frame Relay Encapsulation

12.2(11)YQ

Yes

Yes

Frame Relay End-to-End Keepalive

12.2(11)YQ

Yes

Yes

Frame Relay Fragmentation (FRF.12)

12.2(11)YQ

Yes

Yes

Frame Relay FRF.9 Payload Compression

12.2(11)YQ

Yes

Yes

Frame Relay PVC Interface Priority Queuing

12.2(11)YQ

Yes

Yes

Frame Relay Switching Diagnostics and Troubleshooting

12.2(11)YQ

Yes

Yes

Frame Relay Traffic Shaping (FRTS)

12.2(11)YQ

Yes

Yes

IP Routing and Other Routing Protocols

IPv4

12.2(11)YQ

Yes

Yes

IPv6

12.2(11)YQ

No

Yes

IP Enhanced Interior Gateway Routing Protocol (IGRP) Route Authentication

12.2(11)YQ

Yes

Yes

IP Named Access Control List

12.2(11)YQ

Yes

Yes

IP Precedence for GRE Tunnels

12.2(11)YQ

Yes

Yes

IP Summary Address for RIPv2

12.2(11)YQ

Yes

Yes

Cisco Discovery Protocol (CDP)

12.2(11)YQ

Yes

Yes

Open Shortest Path First (OSPF)

12.2(11)YQ

Yes

Yes

OSPF Flooding Reduction

12.2(11)YQ

Yes

Yes

OSPF Not-So-Stubby Areas (NSSA)

12.2(11)YQ

Yes

Yes

OSPF Packet Pacing

12.2(11)YQ

Yes

Yes

Routing Information Protocol (RIP)

12.2(11)YQ

Yes

Yes

Enhanced IGRP (EIGRP)

12.2(11)YQ

Yes

Yes

Enhanced IGRP Stub Routing

12.2(11)YQ

Yes

Yes

Generic Routing Encapsulation (GRE)

12.2(11)YQ

Yes

Yes

Hot Standby Router Protocol (HSRP)

12.2(11)YQ

Yes

Yes

HSRP Support for Internet Control Message Protocol (ICMP) Redirects

12.2(11)YQ

Yes

Yes

Integrated Routing and Bridging (IRB)

12.2(11)YQ

Yes

Yes

Internet Protocol Control Protocol (IPCP) Address Negotiation

12.2(11)YQ

Yes

Yes

Policy-Based Routing (PBR)

12.2(11)YQ

Yes

Yes

RTP Header Compression

12.2(11)YQ

Yes

Yes

Stacker (STAC) Compression

12.2(11)YQ

Yes

Yes

Transparent Bridging

12.2(11)YQ

Yes

Yes

UDLR Tunnel Address Resolution Protocol (ARP) and Interior Gateway Management Protocol (IGMP) Proxy

12.2(11)YQ

Yes

Yes

Unidirectional Link Routing (UDLR)

12.2(11)YQ

Yes

Yes

IP CEF

Cisco Express Forwarding (CEF) Support for IP Routing between IEEE 802.1Q VLANS.

12.2(11)YQ

Yes

Yes

Cisco Express Forwarding/distributed Cisco Express Forwarding (CEF/dCEF)

12.2(11)YQ

Yes

Yes

VLANs and Layer 2 Protocols

Spanning-Tree Protocol (STP)

12.2(11)YR

Yes

Yes

Spanning-Tree Protocol (STP) Extension

12.2(11)YQ

Yes

Yes

Turbo Flooding of UDP Datagrams

12.2(11)YQ

Yes

Yes

IEEE 802.1Q VLAN Support

12.2(11)YQ

Yes

Yes

Virtual LAN

12.2(11)YR

Yes

Yes

Port-Based VLAN

12.2(11)YR

Yes

Yes

802.1q Trunking Support

12.2(11)YR

Yes

Yes

Inter-Virtual LAN Routing Support

12.2(11)YR

Yes

Yes

Virtual Terminal Protocol (VTP) Support

12.2(11)YR

Yes

Yes

IP Multicast

PIM Version 1

12.2(11)YQ

Yes

Yes

PIM Version 2

12.2(11)YQ

Yes

Yes

IGMP Version 1

12.2(11)YQ

Yes

Yes

IGMP Version 2

12.2(11)YQ

Yes

Yes

IP Multicast Load Splitting Across Equal-Cost Paths

12.2(11)YQ

Yes

Yes

IGMP Snooping

12.2(11)YR

Yes

Yes

Virtual Private Network (VPN)

Virtual Private Dial-Up Network (VPDN)

12.2(11)YQ

Yes

Yes

VPN Tunnel Management

12.2(11)YQ

Yes

Yes

Layer 2 Tunneling Protocol (L2TP)

12.2(11)YQ

Yes

Yes

L2TP Dial-Out

12.2(11)YQ

Yes

Yes

L2TP Tunnel Preservation or IP Type of Service (ToS)

12.2(11)YQ

Yes

Yes

IPSec

IPSec Network Security

12.2(11)YQ

No

Yes

IPSec Triple DES (3DES)

12.2(11)YQ

No

Yes

Internet Key Exchange (IKE) Extended Authentication (Xauth)

12.2(11)YQ

No

Yes

IKE Mode Configuration

12.2(11)YQ

No

Yes

IKE Security Protocol

12.2(11)YQ

No

Yes

IKE Shared Secret Using Authentication, Authorization, and Accounting (AAA) Server

12.2(11)YQ

No

Yes

Certification Authority Interoperability (CA)

12.2(11)YQ

No

Yes

Wildcard Pre-Shared Key

12.2(11)YQ

No

Yes

Dynamic Crypto Map

12.2(11)YQ

No

Yes

Tunnel Endpoint Discovery

12.2(11)YQ

No

Yes

Manual Security Association

12.2(11)YQ

No

Yes

Secure Shell Version 1

Secure Shell (SSH) Version 1 Integrated Client

12.2(11)YQ

No

Yes

SSH Version 1 Server Support

12.2(11)YQ

No

Yes

Mobile IP

Mobile IP

12.2(11)YQ

Yes

Yes

Mobile Networks

12.2(11)YQ

Yes

Yes

Home Agent/Mobile Router Redundancy

12.2(11)YQ

No

No

Mobile Router Preferred Interfaces

12.2(11)YQ

Yes

Yes

Mobile Router Reverse Tunneling

12.2(11)YQ

Yes

Yes

Mobile Router Asymmetric Links

12.2(11)YQ

Yes

Yes

Mobile Router Static and Dynamic Networks

12.2(11)YQ

Yes

Yes

Mobile Router Static Collocated Care-of Address (CCoA)

12.2(11)YQ

Yes

Yes

AAA Server and Mobile IP

12.2(11)YQ

Yes

Yes

Mobile IP - Mobile Networks Deployment MIB

12.3(2)XF

Yes

Yes

Mobile IP - Mobile Router DHCP Support for DCCoA and FA Processing

12.3(7)XR

Yes

Yes

Foreign Agent Route Optimization

12.3(8)YD

Yes

Yes

X.25

X.25

12.2(11)YQ

Yes

Yes

X.25 Closed User Group (CUG)

12.2(11)YQ

Yes

Yes

X.25 Failover

12.2(11)YQ

Yes

Yes

X.25 Load Balancing

12.2(11)YQ

Yes

Yes

X.25 over Frame Relay (Annex G)

12.2(11)YQ

Yes

Yes

X.25 over TCP (XOT)

12.2(11)YQ

Yes

Yes

X.25 Remote Failure Detection

12.2(11)YQ

Yes

Yes

X.25 Switch Local Acknowledgement

12.2(11)YQ

Yes

Yes

X.28 Emulation

12.2(11)YQ

Yes

Yes

Packet Assembler/Disassembler (PAD) Subaddressing

12.2(11)YQ

Yes

Yes

CUG Selection Facility Suppress Option

12.2(11)YQ

Yes

Yes

X.25 Switch Function (routing/PVC)

12.2(11)YQ

Yes

Yes

SA Agent

Service Assurance (SA) Agent

12.2(11)YQ

Yes

Yes

Response Time Reporter (RTR)

12.2(11)YQ

Yes

Yes

RTR Enhancements

12.2(11)YQ

Yes

Yes

SNMP

Simple Network Management Protocol (SNMP)

12.2(11)YQ

Yes

Yes

SNMP Support for VLAN Interfaces

12.2(11)YQ

Yes

Yes

SNMP Version 3.0

12.2(11)YQ

Yes

Yes

SNMPv2C

12.2(11)YQ

Yes

Yes

Interface Index Persistence

12.2(11)YQ

Yes

Yes

Network Management and MIB Support

12.2(11)YR

Yes

Yes

Miscellaneous Features

Network Time Protocol (NTP)

12.2(11)YQ

Yes

Yes

Lock-and-Key

12.2(11)YQ

Yes

Yes

Standard IP Access List Logging

12.2(11)YQ

Yes

Yes

Time-Based Access List

12.2(11)YQ

Yes

Yes

Time-Based Access Lists Using Time Ranges

12.2(11)YQ

Yes

Yes

Command-Line Interface (CLI) String Search

12.2(11)YQ

Yes

Yes

Commented IP Access List Entries

12.2(11)YQ

Yes

Yes

Parser Cache

12.2(11)YQ

Yes

Yes

Basic Layer 2 Switching

12.2(11)YR

Yes

Yes

Switch-Based Broadcast/Multicast/Unicast Storm Control

12.2(11)YR

Yes

Yes

Source MAC Address/Secure Port

12.2(11)YR

Yes

Yes

Autonegotiation and Auto-Media-Dependent Interface/Media-Dependent Interface Crossover (MDI/MDIX)

12.2(11)YR

Yes

Yes

NetFlow

12.3(2)XF

Yes

Yes

Class Based Traffic Shaping with Hierarchical Policy Map Support on Cisco 3200 MAR FESMIC Interfaces

12.3(7)XS

Yes

Yes

Declassification or Zeroization

12.3(8)YD

Yes

Yes


New and Changed Information

The following sections list the features supported by the Cisco 3200 Series Mobile Access Router for Cisco IOS Release 12.3(2)JK1. Cisco IOS Release 12.3(2)JK1 supports the same features as Cisco IOS Release 12.3(2)JK.

New Hardware Features in Release 12.3(2)JK1

There are no new hardware features in Cisco IOS Release 12.3(2)JK1.

New Hardware Features in Release 12.3(2)JK

The 4.9-GHz (US Only, Public Safety) Wireless Mobile Interface Card (WMIC) is a mobile interface card (MIC) in a standard PC/104-Plus form factor. It is one component of the Cisco 3200 Series Mobile Access Router and provides a 4.9-GHz (US Only, Public Safety) wireless interface.

The 4.9-GHz (US Only, Public Safety) Wireless Mobile Interface Card (WMIC) can be configured as an

wireless access point

wireless root bridge

wireless work group bridge

wireless non-root bridge without clients.

The Wireless Mobile Interface Card (WMIC) connects to the router internally through a 10/100 Fast Ethernet interface on the Fast Ethernet Switch Mobile Interface Card (FESMIC).

The key features of the Wireless Mobile Interface Card (WMIC) include the following:

Ruggedized components.

One autosensing switched 10/100 Fast Ethernet interface.

The FCC has recently allocated a 50MHz licensed bandwidth in the 4.9GHz frequency band for public safety applications in the United States of America. The 4.9GHz WMIC is a new addition to the Cisco 3200 Series router product line, the foundation for Cisco Metro Mobile Networks (MMN) architecture. The Cisco MMN offers the benefits of a combined Layer 2 and Layer 3 (routing) functionality, with multiple integrated radios (up to five), that supports Mesh topology and eliminates unnecessary WAN backhauls.

As an end-to-end solution, Cisco MMN creates a broadband wireless access infrastructure for public safety personnel and vehicles with Cisco 3200 Series routers that leverage MoIP for seamless roaming across different types of wireless networks.

The 4.9-GHz (US Only, Public Safety) WMIC integrates into the Cisco 3200 Series router, together with other mobile interface cards (MICs) including the 802.11b/g 2.4GHz WMIC. The 4.9-GHz (US Only, Public Safety) WMIC, as well as the entire Cisco 3200 Series router product line, are fully ruggedized and suitable for both outdoor and vehicular deployments.

To reduce the cross channel interference and in compliance with FCC Docket #00-32 on 4.9GHz ruling, the WMIC supports Direct Short Range Communications (DSRC) Mask C for all power output levels. As a component of the MMN, the 4.9-GHz (US Only, Public Safety) WMIC is independently configurable (through CLI or management) to operate as either a Root Bridge (RB), a Non Root Bridge (NRB), a Work Group Bridge (WGB), or an Access Point. For additional flexibility in the deployment of the 4.9GHz based MMN, the router supports 5MHz and 10MHz channels.

New Software Features in Release 12.3(2)JK1

There are no new software features in Cisco IOS Release 12.3(2)JK1.

New Software Features in Release 12.3.(2)JK

For information regarding the features supported in Cisco IOS Release 12.3(2)JK, refer to the Cross-Platform Release Notes and New Feature Documentation links at the following location on Cisco.com:

http://www.cisco.com/univercd/cc/td/doc/product/software/ios123/123relnt/xprn123t/index.htm

This URL is subject to change without notice. If it changes, point your web browser to Cisco.com, and click the following path:

Service & Support: Technical Documents: Cisco IOS Software: Release 12.3: Release NotesCross-Platform Release Notes (Cisco IOS Release 12.3(2)T) 

Limitations and Restrictions

The following sections contain limitations that apply to the Cisco 3200 Series Mobile Access Router for Cisco IOS Release 12.3(2)T.

CSCed79373

Drop rate is not updated by the show policy-map interface d0 command.

CSCee15368

IAPP lost for WGB to Cisco Aironet 1100 access point while configuring LEAP.

Caveats

Caveats describe unexpected behavior or defects in the Cisco IOS software releases. Severity 1 caveats are the most serious caveats, severity 2 caveats are less serious, and severity 3 caveats are the least serious of these three severity levels.


Note If you have an account with Cisco.com, you can also use the Bug Toolkit to find select caveats of any severity. To reach the Bug Toolkit, log in to Cisco.com and click Service & Support: Technical Assistance Center: Tool Index: Bug Toolkit. Another option is to go to http://www.cisco.com/cgi-bin/Support/Bugtool/launch_bugtool.pl. 


Resolved Caveats - Release 12.3(2)JK1

CSCei61732

Cisco IOS may permit arbitrary code execution after exploitation of a heap-based buffer overflow vulnerability. Cisco has included additional integrity checks in its software, as further described below, that are intended to reduce the likelihood of arbitrary code execution.

Cisco has made free software available that includes the additional integrity checks for affected customers.

This advisory is posted at http://www.cisco.com/warp/public/707/cisco-sa-20051102-timers.shtml.

CSCei57922

Update channelization scheme as per TIA TR-8 spec.

CSCeb85136

IP packets with invalid checksum are not discarded.

CSCeg15044

Not able to telnet to card (No Free TTYs error).

CSCsa54608

The Cisco IOS Firewall Authentication Proxy for FTP and/or Telnet Sessions feature in specific versions of Cisco IOS software is vulnerable to a remotely-exploitable buffer overflow condition.

Devices that do not support, or are not configured for Firewall Authentication Proxy for FTP and/or Telnet Services are not affected.

Devices configured with only Authentication Proxy for HTTP and/or HTTPS are not affected.

Only devices running certain versions of Cisco IOS are affected.

Cisco has made free software available to address this vulnerability. There are workarounds available to mitigate the effects of the vulnerability.

This advisory will be posted at http://www.cisco.com/warp/public/707/cisco-sa-20050907-auth_proxy.shtml

Resolved Caveats - Release 12.3(2)JK

CSCin82407

Cisco Internetwork Operating System (IOS) Software release trains 12.2T, 12.3 and 12.3T may contain vulnerabilities in processing certain Internet Key Exchange (IKE) Xauth messages when configured to be an Easy VPN Server.

Successful exploitation of these vulnerabilities may permit an unauthorized user to complete authentication and potentially access network resources.

This advisory will be posted to http://www.cisco.com/warp/public/707/cisco-sa-20050406-xauth.shtml

CSCef68324

Cisco Internetwork Operating System (IOS) software is vulnerable to a Denial of Service (DoS) and potentially an arbitrary code execution attack from a specifically crafted IPv6 packet. The packet must be sent from a local network segment. Only devices that have been explicitly configured to process IPv6 traffic are affected. Upon successful exploitation, the device may reload or be open to further exploitation.

Cisco has made free software available to address this vulnerability for all affected customers.

More details can be found in the security advisory that is posted at http://www.cisco.com/warp/public/707/cisco-sa-20050729-ipv6.shtml.

CSCee45312

Remote Authentication Dial In User Service (RADIUS) authentication on a device that is running certain versions of Cisco Internetworking Operating System (IOS) and configured with a fallback method to none can be bypassed.

Systems that are configured for other authentication methods or that are not configured with a fallback method to none are not affected.

Only the systems that are running certain versions of Cisco IOS are affected.

Not all configurations using RADIUS and none are vulnerable to this issue. Some configurations using RADIUS, none and an additional method are not affected.

Cisco has made free software available to address this vulnerability. There are workarounds available to mitigate the effects of the vulnerability.

Refer to the Security Advisory at the following URL for more details

http://www.cisco.com/warp/public/707/cisco-sa-20050629-aaa.shtml

CSCeh96419

Description: WGB may crash after roaming (due to a weak signal) between two roots for a half hour or longer. After roaming (with mobile station and open authentication), the WGB may also lose association and the dot11 interface will go down and stay down.

Workaround: Kick start the uplink state machine to scan whenever the WGB link is down after it has associated more than one time. To bring back up a down dot11 interface, toggle the dot11 interface.

Open Caveats - Release 12.3(2)JK

CSCef91557

UUT can not pass traffic with packet size 256 B with IPSec.

CSCef88449

Traceback is displayed after bootup.

CSCei22618

Description: With Mobile Station enabled, the WGB sometimes roams from Root (with good signal strength) to another Root2 (with weaker signal strength).

Workaround: There is no workaround.

CSCei15816

Description: After the WMIC configured as root device boots up, changing it to non-root bridge or workgroup bridge may cause it to crash.

Workaround: To avoid the reload, shutdown interface do before changing the station role from Root Bridge to Workgroup Bridge or Non-Root Bridge. Then perform "no shutdown" on interface do to bring the link back up.

CSCeh80367

Description: When all radios are configured with CCKM and AES, after clearing the interface Dot11Radio 0 on the AP, the WGB will continue to show association to the AP. The AP will not show that the WGB is associated. Ping traffic cannot pass at this state.

Workaround: This issue will not happen on the WDS master or when the WDS client is configured as a root bridge.

CSCei03750

Description: After the WDS master has been up for several days, it may fail to send any traffic to the ACS.

Workaround: Reload the WDS master with the same running configuration.

CSCei20888

Description: The config interface dot110 to bridge-group 2 command causes the error message "STP was not added to Dot11Radio0" and a traceback message.

Workaround: None. This feature is not supported in this Cisco IOS release.

CSCeh65092

Description: The WMIC FE LED does not blink continuously when pinging. When the WMIC initiate a ping to the MARC, the WMIC FE LED blinks once every 3 seconds. When the MARC initiate a ping to the WMIC, the WMIC FE LED blinks once every 7 seconds.

Workaround: There is no workaround.

CSCeg89199

Description: The RF LED appears solid green when there is continuous traffic on the RF link.

Workaround: There is no workaround.

CSCeh90990

Description: Two WMICs will not ping each other when the following situation occurs:

The first WMIC boots up as "root ap-only."

The second WMIC boots up as "WGB."

The role on the first WMIC is switched to "root."

The role on the second WMIC is switched to "non-root."

Workaround: Save the configuration and reload, booting up the first WMIC as "root."

CSCei15259

Description: After station role change, a WMIC configured with "root ap-only" and "infrastructure client" will not ping a WGB but can ping clients behind the WGB. The problem occurs when the following situation occurs:

Boot up the WMIC as "root"

Switch role to "root ap-only" with "infrastructure client" configured by default.

Workaround: Save the WMIC configuration and reload (boot up as "root ap-only").

CSCeh54703

Description: The following MIBs reflect the supported data rates of the 2.4 GHz radio, and not the 4.9 GHz radio, for the objects listed below:

CISCO-DOT11-IF-MIB:

cd11IfPrivacyOptionMaxRate.1 = 108

cd11IfSuppDataRatesPrivacyValue.1.1 = 12

cd11IfSuppDataRatesPrivacyValue.1.2 = 18

cd11IfSuppDataRatesPrivacyValue.1.3 = 24

cd11IfSuppDataRatesPrivacyValue.1.4 = 36

cd11IfSuppDataRatesPrivacyValue.1.5 = 48

cd11IfSuppDataRatesPrivacyValue.1.6 = 72

cd11IfSuppDataRatesPrivacyValue.1.7 = 96

cd11IfSuppDataRatesPrivacyValue.1.8 = 108

cd11IfPhyDsssMaxCompatibleRate.1 = 108

2. IEEE802DOT11-MIB:

dot11SupportedDataRatesTxValue.1.2 = 18

dot11SupportedDataRatesTxValue.1.3 = 24

dot11SupportedDataRatesTxValue.1.4 = 36

dot11SupportedDataRatesTxValue.1.5 = 48

dot11SupportedDataRatesTxValue.1.6 = 72

dot11SupportedDataRatesTxValue.1.7 = 96

dot11SupportedDataRatesTxValue.1.8 = 108

dot11SupportedDataRatesRxValue.1.1 = 12

dot11SupportedDataRatesRxValue.1.2 = 18

dot11SupportedDataRatesRxValue.1.3 = 24

dot11SupportedDataRatesRxValue.1.4 = 36

dot11SupportedDataRatesRxValue.1.5 = 48

dot11SupportedDataRatesRxValue.1.6 = 72

dot11SupportedDataRatesRxValue.1.7 = 96

dot11SupportedDataRatesRxValue.1.8 = 108

3.CISCO-DOT11-ASSOCIATION-MIB:

cDot11ClientDataRateSet = 0c 12 18 24 30 48 60 6c

Workaround: There is no workaround.

Related Documentation

The following sections describe the documentation available for the Cisco 3200 series routers. These documents consist of hardware and software installation guides, Cisco IOS configuration guides and command references, system error messages, feature modules, and other documents.

Documentation is available as printed manuals or electronic documents, except for feature modules, which are available online on Cisco.com and http://www.cisco.com/univercd/home/index.htm.

Use these release notes with these documents:

Release-Specific Documents

Platform-Specific Documents

Cisco Feature Navigator

Release-Specific Documents

The following documents are specific to Cisco IOS Release 12.2 and are located on Cisco.com and http://www.cisco.com/univercd/home/index.htm:

Cross-Platform Release Notes for Cisco IOS Release 12.2(15)T

On Cisco.com at:

Products and Solutions: Cisco IOS Software: Cisco IOS Software Releases 12.2: Instructions and Guides: Release Notes

On http://www.cisco.com/univercd/home/index.htm at:

Cisco IOS Software: Cisco IOS Release 12.2: Release Notes: Cross-Platform Release Notes


Note Cross-Platform Release Notes for Cisco IOS Release 12.2 T are located on Cisco.com or on http://www.cisco.com/univercd/home/index.htm at Cisco IOS Software: Cisco IOS Release 12.2: Release Notes: Cisco IOS Release 12.2 T.


Product bulletins, field notices, and other release-specific documents at http://www.cisco.com/univercd/home/index.htm

Caveats for Cisco IOS Release 12.2

As a supplement to the caveats listed in these release notes, see Caveats for Cisco IOS Release 12.2 and Caveats for Cisco IOS Release 12.2 T, which contain caveats applicable to all platforms for all maintenance releases of Cisco IOS Release 12.2 and Cisco IOS Release 12.2 T.

On Cisco.com at:

Products & Services: IOS Software: Cisco IOS Software Releases 12.2: Instructions and Guides: Release Notes: Release Notes for Cisco IOS Release 12.3, Part 5: Caveats

On http://www.cisco.com/univercd/home/index.htm at:

Cisco IOS Software: Cisco IOS Release 12.2: Release Notes: Caveats

If you have an account on Cisco.com, you can also use the Bug Toolkit to find select caveats of any severity. To reach the Bug Toolkit, log in to Cisco.com and click Products and Solutions: Cisco IOS Software: Cisco IOS Software Releases 12.2: Troubleshooting: Bug Toolkit. Another option is to go to http://www.cisco.com/cgi-bin/Support/Bugtool/launch_bugtool.pl.

Platform-Specific Documents

Documentation specific to the Cisco 3200 Series Mobile Access Router is available on Cisco.com and the Documentation CD at the following location:

http://www.cisco.com/univercd/cc/td/doc/product/access/mar_3200/index.htm 

On Cisco.com at:

Products and Solutions: Routers: All Routers: Cisco 3200 Series Mobile Access Routers

On http://www.cisco.com/univercd/home/index.htm at:

Technical Documentation: Access Servers & Routers: Mobile Access Router

Cisco Feature Navigator

Cisco IOS software is packaged in feature sets that are supported on specific platforms. To get updated information regarding platform support for this feature, access Cisco Feature Navigator. Cisco Feature Navigator dynamically updates the list of supported platforms as new platform support is added for the feature.

Cisco Feature Navigator is a web-based tool that enables you to quickly determine which Cisco IOS software images support a specific set of features and which features are supported in a specific Cisco IOS image. You can search by feature or release. Under the release section, you can compare releases side by side to display both the features unique to each software release and the features in common.

To access Cisco Feature Navigator, you must have an account on Cisco.com. If you have forgotten or lost your account information, send a blank e-mail to cco-locksmith@cisco.com. An automatic check will verify that your e-mail address is registered with Cisco.com. If the check is successful, account details with a new random password will be e-mailed to you. Qualified users can establish an account on Cisco.com by following the directions found at this URL:

http://tools.cisco.com/RPF/register/register.do

Cisco Feature Navigator is updated regularly when major Cisco IOS software releases and technology releases occur. For the most current information, go to the Cisco Feature Navigator home page at the following URL:

http://tools.cisco.com/ITDIT/CFN/jsp/index.jsp

Cisco IOS Software Documentation Set

The Cisco IOS software documentation set consists of the Cisco IOS configuration guides, Cisco IOS command references, and several other supporting documents. The Cisco IOS software documentation set is shipped with your order in electronic form on the Documentation CD-ROM—unless you specifically ordered the printed versions.

Documentation Modules

Each module in the Cisco IOS documentation set consists of one or more configuration guides and one or more corresponding command references. Chapters in a configuration guide describe protocols, configuration tasks, and Cisco IOS software functionality, and contain comprehensive configuration examples. Chapters in a command reference provide complete command syntax information. Use each configuration guide with its corresponding command reference.

On Cisco.com at:

Products and Solutions: Cisco IOS Software: Cisco IOS Releases 12.3: Instructions and Guides

On http://www.cisco.com/univercd/home/index.htm at:

Cisco IOS Software: Cisco IOS Release 12.3: Configuration Guides and Command References

Cisco IOS Release 12.3 Documentation Set Contents

Table 3 lists the contents of the Cisco IOS Release 12.3 software documentation set, which is available in electronic form and in printed form if ordered.

On Cisco.com at:

Products and Solutions: Cisco IOS Software: Cisco IOS Releases 12.3: Instructions and Guides

On http://www.cisco.com/univercd/home/index.htm at:

Cisco IOS Software: Cisco IOS Release 12.3

Table 3 Cisco IOS Release 12.3 Documentation Set 

Books
Major Topics

Cisco IOS Configuration Fundamentals and Network Management Configuration Guide

Cisco IOS Configuration Fundamentals and Network Management Command Reference

Configuration Fundamentals Overview
Cisco IOS User Interfaces
File Management
System Management

Cisco IOS Bridging and IBM Networking Configuration Guide

Cisco IOS Bridging and IBM Networking Command Reference, Volume 1 of 2: Bridging

Cisco IOS Bridging and IBM Networking Command Reference, Volume 2 of 2: IBM Networking

Transparent Bridging
SRB
Token Ring Inter-Switch Link
Token Ring Route Switch Module
RSRB
DLSw+
Serial Tunnel and Block Serial Tunnel
LLC2 and SDLC
IBM Network Media Translation
SNA Frame Relay Access
NCIA Client/Server
Airline Product Set
DSPU and SNA Service Point
SNA Switching Services
Cisco Transaction Connection
Cisco Mainframe Channel Connection
CLAW and TCP/IP Offload
CSNA, CMPC, and CMPC+
TN3270 Server

Cisco IOS Dial Technologies Configuration Guide

Cisco IOS Dial Technologies Command Reference

Preparing for Dial Access
Modem and Dial Shelf Configuration and Management
ISDN Configuration
Signaling Configuration
Dial-on-Demand Routing Configuration
Dial Backup Configuration
Dial Related Addressing Service
Virtual Templates, Profiles, and Networks
PPP Configuration
Callback and Bandwidth Allocation Configuration
Dial Access Specialized Features
Dial Access Scenarios

Cisco IOS Interface and Hardware Component Configuration Guide

Cisco IOS Interface and Hardware Component Command Reference

LAN Interfaces
Serial Interfaces
Logical Interfaces

Cisco IOS IP Configuration Guide

Cisco IOS IP Command Reference, Volume 1 of 4: Addressing and Services

Cisco IOS IP Command Reference, Volume 2 of 4: Routing Protocols

Cisco IOS IP Command Reference, Volume 3 of 4: Multicast

Cisco IOS IP Command Reference, Volume 4 of 4: IP Mobility

IP Addressing and Services
IP Routing Protocols
IP Multicast

Cisco IOS AppleTalk and Novell IPX Configuration Guide

Cisco IOS AppleTalk and Novell IPX Command Reference

AppleTalk
Novell IPX

Cisco IOS Apollo Domain, Banyan VINES, DECnet, ISO CLNS, and XNS Configuration Guide

Cisco IOS Apollo Domain, Banyan VINES, DECnet, ISO CLNS, and XNS Command Reference

Apollo Domain
Banyan VINES
DECnet
ISO CLNS
XNS

Cisco IOS Voice Configuration Library

Cisco IOS Voice Command Reference

Voice over IP
Call Control Signaling
Voice over Frame Relay
Voice over ATM
Telephony Applications
Trunk Management
Fax, Video, and Modem Support

Cisco IOS Quality of Service Solutions Configuration Guide

Cisco IOS Quality of Service Solutions Command Reference

Packet Classification
Congestion Management
Congestion Avoidance
Policing and Shaping
Signaling
Link Efficiency Mechanisms

Cisco IOS Security Configuration Guide

Cisco IOS Security Command Reference

AAA Security Services
Security Server Protocols
Traffic Filtering and Firewalls
IP Security and Encryption
Passwords and Privileges
Neighbor Router Authentication
IP Security Options
Supported AV Pairs

Cisco IOS Switching Services Configuration Guide

Cisco IOS Switching Services Command Reference

Cisco IOS Switching Paths
NetFlow Switching
Multiprotocol Label Switching
Multilayer Switching
Multicast Distributed Switching
Virtual LANs
LAN Emulation

Cisco IOS Wide-Area Networking Configuration Guide

Cisco IOS Wide-Area Networking Command Reference

ATM
Broadband Access
Frame Relay
SMDS
X.25 and LAPB

Cisco IOS Mobile Wireless Configuration Guide

Cisco IOS Mobile Wireless Command Reference

General Packet Radio Service

Cisco IOS Terminal Services Configuration Guide

Cisco IOS Terminal Services Command Reference

ARA
LAT
NASI
Telnet
TN3270
XRemote
X.28 PAD
Protocol Translation

Cisco IOS Configuration Guide Master Index

Cisco IOS Command Reference Master Index

Cisco IOS Debug Command Reference

Cisco IOS Software System Messages

 


Obtaining Documentation

Cisco documentation and additional literature are available on Cisco.com. Cisco also provides several ways to obtain technical assistance and other technical resources. These sections explain how to obtain technical information from Cisco Systems.

Cisco.com

You can access the most current Cisco documentation on the World Wide Web at this URL:

http://www.cisco.com/univercd/home/home.htm

You can access the Cisco website at this URL:

http://www.cisco.com

International Cisco websites can be accessed from this URL:

http://www.cisco.com/public/countries_languages.shtml

Ordering Documentation

You can find instructions for ordering documentation at this URL:

http://www.cisco.com/univercd/cc/td/doc/es_inpck/pdi.htm

You can order Cisco documentation in these ways:

Registered Cisco.com users (Cisco direct customers) can order Cisco product documentation from the Ordering tool:

http://www.cisco.com/en/US/partner/ordering/index.shtml

Nonregistered Cisco.com users can order documentation through a local account representative by calling Cisco Systems Corporate Headquarters (California, USA) at 408 526-7208 or, elsewhere in North America, by calling 800 553-NETS (6387).

Documentation Feedback

You can submit e-mail comments about technical documentation to bug-doc@cisco.com.

You can submit comments by using the response card (if present) behind the front cover of your document or by writing to the following address:

Cisco Systems

Attn: Customer Document Ordering

170 West Tasman Drive

San Jose, CA 95134-9883

We appreciate your comments.

Obtaining Technical Assistance

For all customers, partners, resellers, and distributors who hold valid Cisco service contracts, the Cisco Technical Assistance Center (TAC) provides 24-hour-a-day, award-winning technical support services, online and over the phone. Cisco.com features the Cisco TAC website as an online starting point for technical assistance. If you do not hold a valid Cisco service contract, please contact your reseller.

Cisco TAC Website

The Cisco TAC website provides online documents and tools for troubleshooting and resolving technical issues with Cisco products and technologies. The Cisco TAC website is available 24 hours a day, 365 days a year. The Cisco TAC website is located at this URL:

http://www.cisco.com/tac

Accessing all the tools on the Cisco TAC website requires a Cisco.com user ID and password. If you have a valid service contract but do not have a login ID or password, register at this URL:

http://tools.cisco.com/RPF/register/register.do

Opening a TAC Case

Using the online TAC Case Open Tool is the fastest way to open P3 and P4 cases. (P3 and P4 cases are those in which your network is minimally impaired or for which you require product information.) After you describe your situation, the TAC Case Open Tool automatically recommends resources for an immediate solution. If your issue is not resolved using the recommended resources, your case will be assigned to a Cisco TAC engineer. The online TAC Case Open Tool is located at this URL:

http://www.cisco.com/tac/caseopen

For P1 or P2 cases (P1 and P2 cases are those in which your production network is down or severely degraded) or if you do not have Internet access, contact Cisco TAC by telephone. Cisco TAC engineers are assigned immediately to P1 and P2 cases to help keep your business operations running smoothly.

To open a case by telephone, use one of the following numbers:

Asia-Pacific: +61 2 8446 7411 (Australia: 1 800 805 227)

EMEA: +32 2 704 55 55

USA: 1 800 553-2447

For a complete listing of Cisco TAC contacts, go to this URL:

http://www.cisco.com/warp/public/687/Directory/DirTAC.shtml

TAC Case Priority Definitions

To ensure that all cases are reported in a standard format, Cisco has established case priority definitions.

Priority 1 (P1)—Your network is "down" or there is a critical impact to your business operations. You and Cisco will commit all necessary resources around the clock to resolve the situation.

Priority 2 (P2)—Operation of an existing network is severely degraded, or significant aspects of your business operation are negatively affected by inadequate performance of Cisco products. You and Cisco will commit full-time resources during normal business hours to resolve the situation.

Priority 3 (P3)—Operational performance of your network is impaired, but most business operations remain functional. You and Cisco will commit resources during normal business hours to restore service to satisfactory levels.

Priority 4 (P4)—You require information or assistance with Cisco product capabilities, installation, or configuration. There is little or no effect on your business operations.

Obtaining Additional Publications and Information

Information about Cisco products, technologies, and network solutions is available from various online and printed sources.

The Cisco Product Catalog describes the networking products offered by Cisco Systems, as well as ordering and customer support services. Access the Cisco Product Catalog at this URL:

http://www.cisco.com/en/US/products/products_catalog_links_launch.html

Cisco Press publishes a wide range of general networking, training and certification titles. Both new and experienced users will benefit from these publications. For current Cisco Press titles and other information, go to Cisco Press online at this URL:

http://www.ciscopress.com

Packet magazine is the Cisco quarterly publication that provides the latest networking trends, technology breakthroughs, and Cisco products and solutions to help industry professionals get the most from their networking investment. Included are networking deployment and troubleshooting tips, configuration examples, customer case studies, tutorials and training, certification information, and links to numerous in-depth online resources. You can access Packet magazine at this URL:

http://www.cisco.com/packet

iQ Magazine is the Cisco bimonthly publication that delivers the latest information about Internet business strategies for executives. You can access iQ Magazine at this URL:

http://www.cisco.com/go/iqmagazine

Internet Protocol Journal is a quarterly journal published by Cisco Systems for engineering professionals involved in designing, developing, and operating public and private Internets and Intranets. You can access the Internet Protocol Journal at this URL:

http://www.cisco.com/en/US/about/ac123/ac147/about_cisco_the_internet_protocol_journal.html

Training—Cisco offers world-class networking training. Current offerings in network training are listed at this URL:

http://www.cisco.com/en/US/learning/index.html


hometocprevnextglossaryfeedbacksearchhelp

Posted: Wed Nov 2 09:00:17 PST 2005
All contents are Copyright © 1992--2005 Cisco Systems, Inc. All rights reserved.
Important Notices and Privacy Statement.