Cisco Cisco 2106 Wireless LAN Controller
64
Release Notes for Cisco Wireless LAN Controllers and Lightweight Access Points for Release 5.2.193.0
OL-31336-01
Caveats
•
CSCsy84311—A controller running software release 5.2.178.0 no longer reboots because of a
software failure of the emWeb task.
software failure of the emWeb task.
•
CSCsy88329—An 1140, 1240, or 1310 series access point now successfully downloads code from
a CAPWAP controller.
a CAPWAP controller.
•
CSCsy96551—A 1250 series access point with a channel width setting of 40 MHz no longer shows
an error message when you set the Tx power level.
an error message when you set the Tx power level.
•
CSCsy97077—The show run-config controller CLI command is no loonger truncated, incomplete,
or partial.
or partial.
•
CSCsy98716—The following CLI command is now available in controller software release 5.2 or
later: config ap ethernet duplex {auto | half | full} speed {auto | 10 | 100 | 1000} {all | Cisco_AP}.
later: config ap ethernet duplex {auto | half | full} speed {auto | 10 | 100 | 1000} {all | Cisco_AP}.
•
CSCsz15249—When packets arrive out of sequence at the controller, a CAPWAP access point now
successfully joins the controller.
successfully joins the controller.
•
CSCsz17157—When voice traffic runs continuously on 1130 or 1240 series access points for a
prolonged period of time, the access points reboot on the CPU voice metrics task.
prolonged period of time, the access points reboot on the CPU voice metrics task.
•
CSCsz19675—Controllers no longer reboot unexpectedly when LDAP authentication is enabled.
•
CSCsz20036—CPU access control list (ACL) configurations are no longer modified during
configuration backups.
configuration backups.
•
CSCsz22520—You can now disable the DHCP Required option on a WLAN without removing the
DHCP override configuration.
DHCP override configuration.
•
CSCsz22901—The access point does not forward the DHCP offer to the client, so the client fails to
get an IP address.
get an IP address.
•
CSCsz30842—526 controllers now support local EAP authentication.
•
CSCsz48460—An access point might reboot with the following traceback:
-Traceback= 0x4F6768 0x4F674C 0x4F5DAC 0x4F674C 0x4F4FC8 0x4F5DAC 0x4F65C0 0x4FE6CC
0x507188 0x4E4498 0x2D46EC
•
CSCsz50130—The command to change the scan time for MIC errors, config wlan security tkip
hold-down {0-60 seconds} wlan_id, no longer reverts to the default setting after reboot.
hold-down {0-60 seconds} wlan_id, no longer reverts to the default setting after reboot.
•
CSCsz51403—The %APF-1-USER_DEL_FAILED: apf_ms.c:5055 message no longer floods the
controller system message log.
controller system message log.
•
CSCsz55922—Lock assert no longer occurs when you upgrade from controller release 4.2.205 to
5.2.x.
5.2.x.
•
CSCsz56454—Controller logs are no longer flooded with messages about access points
impersonating legitimate access points.
impersonating legitimate access points.
•
CSCsz57758—1140 series access points no longer reboot too quickly after downloading the
configuration from the controller.
configuration from the controller.
•
CSCsz57828—Some counters for 1140 series access points, such as multiple retry count, fail to
increment in the output of the show ap stats command.
increment in the output of the show ap stats command.
•
CSCsz79080—When a WLAN template with Layer 3 web authentication policies is applied to the
controller, the following message no longer appears: “SNMP operation to Device failed: attempt to
set conflicting attribute value.”
controller, the following message no longer appears: “SNMP operation to Device failed: attempt to
set conflicting attribute value.”
•
CSCsz79385—The SNMP agent on the controller now successfully updates the dynamic interface
on WLANs.
on WLANs.