Cisco Cisco Aironet 1310 Access Point Bridge Release Notes

Page of 26
 
12
Release Notes for Cisco Aironet Access Points for Cisco IOS Release 12.3(11)JA
OL-10753-01
  Important Notes
Mask Field on IP Filters Page Behaves the Same As in CLI
In Cisco IOS Release 12.2(8)JA and later, the mask that you enter in the Mask field on the IP Filters page 
in the access point GUI behaves the same way as a mask that you enter in the CLI. If you enter 
255.255.255.255 as the mask, the access point accepts any IP address. If you enter 0.0.0.0, the access 
point looks for an exact match with the IP address that you entered in the IP Address field.
Repeater Access Points Cannot Be Configured as WDS Access Points
Repeater access points can participate in WDS but they cannot provide WDS. You cannot configure a 
repeater access point as a main WDS access point, and if a root access point becomes a repeater in 
fallback mode, it cannot provide WDS.
Cannot Perform Link Tests on Non-Cisco Aironet Client Devices and on Cisco 
Aironet 802.11g Client Devices
The link test feature on the web-browser interface does not support non-Cisco Aironet client devices nor 
Cisco Aironet 802.11g client devices.
System Software Upgrade Sometimes Fails Using Microsoft Internet Explorer 
5.01 SP2
A system software upgrade sometimes fails when you use Microsoft Internet Explorer 5.01 SP2 to 
upgrade system software using the TFTP Upgrade page in the web-browser interface. Use a later version 
of Microsoft Internet Explorer to perform HTTP system software upgrades, or use TFTP to upgrade 
system software. Click this URL to browse to the Cisco IOS Software Configuration Guide for Cisco 
Aironet Access Points
 for complete instructions on performing software upgrades:
Corrupt EAP Packet Sometimes Causes Error Message
During client authentication, the access point sometimes receives a corrupt EAP packet and displays this 
error message:
Oct  1 09:00:51.642 R: %SYS-2-GETBUF: Bad getbuffer, bytes= 28165
-Process= "Dot11 Dot1x process", ipl= 0, pid= 32
-Traceback= A2F98 3C441C 3C7184 3C604C 3C5E14 3C5430 124DDC
You can ignore these messages.
When Cipher Is TKIP Only, Key Management Must Be Enabled
When you configure TKIP-only cipher encryption (not TKIP + WEP 128 or TKIP + WEP 40) on any 
radio interface or VLAN, every SSID on that radio or VLAN must be set to use WPA or CCKM key 
management. If you configure TKIP on a radio or VLAN but you do not configure key management on 
the SSIDs, client authentication fails on the SSIDs.