Cisco Cisco WAP4410N Wireless-N Access Point - PoE Advanced Security Release Notes
2
Release Notes for WAP4410N Access Point Firmware Version 2.0.6.1
Release Notes
•
•
•
•
•
•
Changes Since WAP4410N Firmware Version 2.0.
5.3
The firmware was updated and the following issue was fixed in firmware version
2.0.6.1:
2.0.6.1:
•
CSCtx62203—In certain environments and traffic model, the WAP4410N
may lockup after some undetermined time. (A protection mechanism was
added to guard against sporadic problems with client association that
could occur after six to 24 hours.)
may lockup after some undetermined time. (A protection mechanism was
added to guard against sporadic problems with client association that
could occur after six to 24 hours.)
Known Issues
The following known issues exist for firmware version 2.0.6.1:
•
CSCtz79103—When selecting a 128-bit WEP key and providing a
passphrase, one 128-bit key is generated. However, the default transmit
key radio buttons allow you to pick from keys 1 through 4. The radio buttons
for keys 2, 3, and 4 should be disabled.
passphrase, one 128-bit key is generated. However, the default transmit
key radio buttons allow you to pick from keys 1 through 4. The radio buttons
for keys 2, 3, and 4 should be disabled.
•
CSCtz05386—When enabling IPv6, the link local is not displayed on the
status page. Workaround: SSH into the device and execute an ifconfig to
determine the link local.
status page. Workaround: SSH into the device and execute an ifconfig to
determine the link local.
•
CSCtz79116—The MAC Connection Control List allows empty entries to
be saved. Enabling MAC Control and not specifying MAC addresses may
disconnect your clients.
be saved. Enabling MAC Control and not specifying MAC addresses may
disconnect your clients.
•
CSCtz79129—The AP mode appears incorrectly as G when the AP is
selected to work in N-only mode.
selected to work in N-only mode.