Cisco Cisco Aironet 350 Access Points Notas de publicación

Descargar
Página de 27
   
25
Release Notes for Cisco Aironet 350, 1100, 1130AG, 1200, and 1230AG Series Access Points for Cisco IOS Release 12.3(2)JA
OL-6252-01
Caveats
CSCef18797—The WDS device now sends the class attribute to participating access points so that 
the access points can include the attribute in RADIUS accounting messages.
CSCef23452—The access point data packet counter now increments correctly.
CSCef24269—The Time Server entry field now allows more than 15 characters on the Services: 
NTP page on the access point GUI.
CSCef41592—After booting from factory defaults, an access point now automatically sets its 
hostname to the name returned in the DNS PTR record corresponding to any of the access point’s 
IP addresses.
CSCef45558—When configured as root access points through the GUI, 1310 series access points 
now contain essential access point configuration elements.
CSCef46191—A specifically crafted TCP connection to a telnet or reverse telnet port of an access 
point running Cisco IOS software no longer blocks further telnet, reverse telnet, Remote Shell 
(RSH), Secure Shell (SSH), and HTTP access to the access point.
CSCef47638—The configuration on 350 series access points no longer contain random characters.
CSCef49603—The Cisco IOS Software Configuration Guide for Cisco Aironet Access Points now 
contains a description for the RADSRV-4-NAS_UNKNOWN error message.
CSCef53367—Access points no longer display runtime errors when you browse to the Express 
Setup page on the GUI.
CSCef53401—Client devices associated to an access point no longer fail to receive IP addresses 
from the DHCP server.
CSCef55725—Transmit power no longer drops on channel 14 on access points configured for use 
in Japan. 
CSCef59317—When a failed authentication holdoff time is configured on the access point, the 
access point now allows three authentication failures before it invokes the holdoff time for the failed 
user.
CSCef62562—Access points no longer reboot after displaying this traceback: 
“SNMP ENGINE”, ipl= 6, pid= 69
-Traceback= B5E18 2E9C94 2E9EF0 13C6BC 140910
CSCef62817—User passwords configured on a local authenticator access point now appear as either 
clear text or nthash.
CSCef66214—Uninitialized message structures no longer cause the access point to reboot.
CSCef83419—Non-root bridges and repeater access points now report associations to parent access 
points and bridges in response to these SNMP queries: cDot11ClientStatisticTable, 
cDot11ClientConfigInfoTable, and cDot11ActiveDevicesTable.
CSCin74956—Client devices that associate to the access point using an SSID with CKIP+CMIC 
encryption now receive IP addresses from the DHCP server.
CSCsa32966—Access points no longer send randomly corrupted beacons that cause them to appear 
as rogue devices on the WLSE.