Cisco Cisco Aironet 1240 AG Access Point Notas de publicación

Descargar
Página de 20
 
13
Release Notes for Cisco Aironet Access Points and Bridges for Cisco IOS Release 12.4(10b)JA1
OL-15533-01
  Important Notes
Radio MAC Address Appears in Access Point Event Log
When a client device roams from an access point (such as access point alpha) to another access point 
(access point bravo), a message appears in the event log on access point alpha stating that the client 
roamed to access point bravo. The MAC address that appears in the event message is the MAC address 
for the radio in access point bravo. The MAC address for the access point Ethernet port is on the label 
on the back of the access point.
Mask Field on IP Filters Page Behaves the Same As in CLI
In Cisco IOS Release 12.2(8)JA and later, the mask that you enter in the Mask field on the IP Filters page 
in the access point GUI behaves the same way as a mask that you enter in the CLI. If you enter 
255.255.255.255 as the mask, the access point accepts any IP address. If you enter 0.0.0.0, the access 
point looks for an exact match with the IP address that you entered in the IP Address field.
Repeater Access Points Cannot Be Configured as WDS Access Points
Repeater access points can participate in WDS, but they cannot provide WDS. You cannot configure a 
repeater access point as a main WDS access point, and if a root access point becomes a repeater in 
fallback mode, it cannot provide WDS.
Cannot Perform Link Tests on Non-Cisco Aironet Client Devices and on Cisco 
Aironet 802.11g Client Devices
The link test feature on the web-browser interface does not support non-Cisco Aironet client devices nor 
Cisco Aironet 802.11g client devices.
Corrupt EAP Packet Sometimes Causes Error Message
During client authentication, the access point sometimes receives a corrupt EAP packet and displays this 
error message:
Oct  1 09:00:51.642 R: %SYS-2-GETBUF: Bad getbuffer, bytes= 28165
-Process= "Dot11 Dot1x process", ipl= 0, pid= 32
-Traceback= A2F98 3C441C 3C7184 3C604C 3C5E14 3C5430 124DDC
You can ignore this message.
When Cipher Is TKIP Only, Key Management Must Be Enabled
When you configure TKIP-only cipher encryption (not TKIP + WEP 128 or TKIP + WEP 40) on any 
radio interface or VLAN, every SSID on that radio or VLAN must be set to use WPA or CCKM key 
management. If you configure TKIP on a radio or VLAN but you do not configure key management on 
the SSIDs, client authentication fails on the SSIDs.