×
Siemens Industry Online Support
Siemens AG
Tipo de post: Notificação de produto ID do post: 109760581, Data do post: 11.09.2018
(2)
Avaliar

 SCALANCE W1750D New Firmware Version 8.3.0.1 for SCALANCE W1750D is available.

  • Post
  • Está relacionado com produto(s)
 New Firmware Version 8.3.0.1 for SCALANCE W1750D is available. This version contains security-relevant product improvements that increase the robustness. Upgrading to this version is recommended.


Please use the Configuration Manual, Chapter: 8 “Upgrading an AP” for further information regarding the update process: 109744800 
 

Entry belongs to following products:

SCALANCE W1750D-2IA RJ45       6GK5750-2HX01-1AA0 (Type: RoW)

SCALANCE W1750D-2IA RJ45       6GK5750-2HX01-1AB0 (Type: US)

SCALANCE W1750D-2IA RJ45       6GK5750-2HX01-1AD0 (Type: JP)
 

SCALANCE W1750D-2IA RJ45 supports virtual clusters in different sizes. For highest performance in high density applications we recommend a maximum of 64 APs in one cluster. Due to the fact, that there is no limitation you can use 128 APs in one virtual cluster with high performance, too. If you want to extend your network extensively (200 APs or more) or you have very high densities and requirements, we recommend using a compatible Aruba mobility controller.

 

Resolved Issues:

This release includes fixes for vulnerability documented in:

TLS ROBOT vulnerability - CVE-2017-13099

 

Links to SIEMENS Advisories:

Correction of SSA-464260: TLS ROBOT vulnerability in SCALANCE W1750D Products: 

https://www.siemens.com/global/de/home/produkte/services/cert.html#SecurityVeroffentlichungen

  

Platform

Symptom: A Direct AP crashed and rebooted unexpectedly.
The issue is resolved by deleting all virtual APs before the AP is rebooted.

Scenario: This issue occurred due to a kernel panic. This issue was observed in Direct APs running Aruba Instant 6.5.1.0-4.3.1.2 or later versions.

 

IDS

Symptom: A Direct AP classified a neighboring Direct AP, which was not part of the network, as a rogue Direct AP.
The fix ensures that the Direct AP does not raise false rogue Direct AP alarms.

Scenario: This issue occurred when there were multiple roaming clients from other networks.
This issue was not limited to any specific Direct AP model or Aruba Instant release version.

 

Configuration

Symptom: Direct APs incorrectly processed XML API requests from port 80.
The fix ensures that the Direct APs process XML-API requests correctly.

Scenario: This issue was observed in Direct APs running Aruba Instant 6.4.4.6-4.2.4.0 or later versions.

 

Datapath/Firewall

Symptom: A Direct AP crashed and rebooted unexpectedly. The log file listed the reason for the event as Reboot caused by kernel panic: softlockup: hung tasks.
The fix ensures that the Direct AP works as expected.

Scenario: This issue was not limited to any specific Direct AP model or Aruba Instant release version.

 

Wi-Fi Driver

Symptom: A Direct AP rebooted unexpectedly. The log file listed the reason for the event as Reboot caused by kernel panic: Take care of the HOST ASSERT first. Enhancements to the wireless driver resolved this issue.

Scenario: This issue occurred due to a firmware assert. This issue was observed in 300 Series and 320 Series access points running Aruba Instant 6.5.1.0-4.3.1.2 or later versions.

 

ARM

Symptom: A Direct AP failed to restore statically configured channels after a continuous radar detection.
Enhancements to the ARM radar process resolved this issue.

Scenario: This issue was not limited to any specific Direct AP model or Aruba Instant release version.

 

Known Issues:

L2 and L3 Mobility

Symptom: Data packets are dropped when the client roams to a new Direct AP.

Scenario: The issue occurs due to an inconsistency in the formation of an L3 tunnel between the Direct APs.
This issue is observed in Direct APs running Instant 6.5.1.0-4.3.1.0 or later versions.

Workaround: None.

 

 

Notes:

 

Third-party software - license conditions and copyright notes

You can find the copyright information for third-party software contained in this product, particularly open source software as well as applicable license conditions of such third-party software in OSS-SCALANCE_W1750D_86.html file below.

 

Special note for resellers

The information and the license conditions in the OSS-SCALANCE_W1750D_86.html file must be passed on to the purchasing party to avoid license infringements by the reseller or purchasing party.

 Registrierung notwendig  Readme_OSS.zip (508,7 MB) 

 


Firmware:

 Download unterliegt Exportcontrolle  Siemens_Hercules_8.3.0.1.zip (14,5 MB) 

 

 

Security information

In order to protect plants, systems, machines and networks against cyber threats, it is necessary to implement – and continuously maintain – a holistic, state-of-the-art industrial security concept. Siemens’ products and solutions constitute one element of such a concept. For more information about industrial security, please visit

http://www.siemens.com/industrialsecurity.

 

Techn. Contact:

Customer Support, DF CS SD CCC TS, Kontaktformular


Avisos de Security
Para proteger a infra-estrutura técnica, sistemas, máquinas e redes contra ciberameaças é preciso implementar uma concepção holística de IT Security (e mantê-la continuamente) que corresponda ao padrão atual da tecnologia. Os produtos e soluções da Siemens formam somente um componente de uma tal concepção. Mais informações sobre Cyber Security você encontra em
https://www.siemens.com/cybersecurity#Ouraspiration.
Suporte para a estatística
Através desta função os IDs obtidos no resultado da busca serão exibidos conforme o número desejado (formato .txt)

Gerar lista
Copiar URL
Exibir esta página em novo design
Cockpit mySupport