Cisco Cisco Aironet 1310 Access Point Bridge Notas de publicación

Descargar
Página de 21
 
14
Release Notes for Cisco Aironet Access Points and Bridges for Cisco IOS Release 12.4(3g)JA1
OL-11736-01
  Important Notes
Radio MAC Address Appears in ACU
When a Cisco Aironet client device associates to an access point running IOS software, the access point 
MAC address that appears on the Status page in the Aironet Client Utility (ACU) is the MAC address 
for the access point radio. The MAC address for the access point Ethernet port is printed on the label on 
the back of the access point.
Radio MAC Address Appears in Access Point Event Log
When a client device roams from an access point (such as access point alpha) to another access point 
(access point bravo), a message appears in the event log on access point alpha stating that the client 
roamed to access point bravo. The MAC address that appears in the event message is the MAC address 
for the radio in access point bravo. The MAC address for the access point Ethernet port is on the label 
on the back of the access point.
Mask Field on IP Filters Page Behaves the Same As in CLI
In Cisco IOS Release 12.2(8)JA and later, the mask that you enter in the Mask field on the IP Filters page 
in the access point GUI behaves the same way as a mask that you enter in the CLI. If you enter 
255.255.255.255 as the mask, the access point accepts any IP address. If you enter 0.0.0.0, the access 
point looks for an exact match with the IP address that you entered in the IP Address field.
Repeater Access Points Cannot Be Configured as WDS Access Points
Repeater access points can participate in WDS, but they cannot provide WDS. You cannot configure a 
repeater access point as a main WDS access point, and if a root access point becomes a repeater in 
fallback mode, it cannot provide WDS.
Cannot Perform Link Tests on Non-Cisco Aironet Client Devices and on Cisco 
Aironet 802.11g Client Devices
The link test feature on the web-browser interface does not support non-Cisco Aironet client devices nor 
Cisco Aironet 802.11g client devices.
Corrupt EAP Packet Sometimes Causes Error Message
During client authentication, the access point sometimes receives a corrupt EAP packet and displays this 
error message:
Oct  1 09:00:51.642 R: %SYS-2-GETBUF: Bad getbuffer, bytes= 28165
-Process= "Dot11 Dot1x process", ipl= 0, pid= 32
-Traceback= A2F98 3C441C 3C7184 3C604C 3C5E14 3C5430 124DDC
You can ignore this message.