Learn About the New Cisco Aironet Series 1600 Access Point

Designed with rapidly evolving mobility needs in mind, the 802.11n-based Aironet 1600 Series offers small and midsized enterprises an entry-level wireless access point with advanced features. With the Aironet 1600 Series, customers can modernize their network to handle today’s explosion of more clients, applications, and bandwidth demands.

The 1600 Series offers the advantage of 802.11n enterprise-class performance with 3×3 multiple-input, multiple-output (MIMO) technology with two spatial streams-ideal for small and midsized enterprises.

It provides efficient wireless coverage through Cisco ClientLink 2.0, CleanAir Express*, and Cisco Wireless VideoStream technologies. Cisco ClientLink 2.0 on the Aironet 1600 Series works to improve downlink performance and range for most mobile devices, while improving battery life on devices such as smartphones and tablets.

Cisco Aironet 1600 Series Access Points are designed to help ensure an interference-free, high-speed, wireless experience.

Features and Capabilities

  • Entry-level access point for small to midsized organizations, including retail, manufacturing, education, and branch offices
  • Attractive price and performance for migrating to 802.11n
  • Up to six times more capacity to support applications and clients than legacy 802.11a/b/g networks
  • Cisco ClientLink 2.0 for better downlink performance and range and longer battery life on mobile devices
  • Cisco CleanAir Express* for proactive spectrum intelligence to address RF interference problems
  • Limited Lifetime Hardware Warranty, including 10-day advance hardware replacement

Wireless innovations include:

  • Cisco ClientLink 2.0 technology
  • Cisco VideoStream technology
  • Cisco Bandselect
  • CleanAir Express*

*Available through future software updates.

Related:

SIP User Directory Information Disclosure

This is the Cisco PSIRT response to the statements made by Dave Endler and Mark Collier in their presentation, ‘Hacking Voice over IP (VoIP) Exposed’ at BlackHat USA 2006.

We would like to thank Dave Endler for reporting this issue to us.

We greatly appreciate the opportunity to work with researchers on security vulnerabilities, and welcome the opportunity to review and assist in product reports.

This issue is currently being tracked by Cisco bug ID CSCse92417 (registered customers only) for IOS CallManager Express (CME).

Cisco CallManager has been tested and is not vulnerable to this attack.

Additional Information

The attacks described in the report attempt to manipulate the Session
Initiation Protocol (SIP) stack in various voice products to gain information
from the SIP user directory. By sending various SIP messages to the VoIP
infrastructure, an attacker can discover the names of the users stored in the
SIP user database.

It is important to note that the attacks described do not disrupt VoIP
call processing or voice mail access.

Cisco’s recommended best practice of implementing the VoIP
infrastructure and data devices on separate VLANs would prevent malicious users
from launching such attacks against the VoIP network.

Please consult the following links for other recommendations and
guidelines for securing IP telephony networks:

Cisco was made aware of this issue on July 20, 2006. We are continuing
to investigate this issue and will update this document as additional
information becomes available.

Cisco Security Procedures

Complete information on reporting security vulnerabilities in Cisco
products, obtaining assistance with security incidents, and registering to
receive security information from Cisco, is available on Cisco’s worldwide
website at
http://www.cisco.com/web/about/security/psirt/security_vulnerability_policy.html.
This includes instructions for press inquiries regarding Cisco security
notices. All Cisco security advisories are available at
http://www.cisco.com/go/psirt.

Security Impact Rating: Informational

Related: