Cisco Cisco Aironet 350 Access Points Notas de publicación

Descargar
Página de 15
   
10
Resolved Caveats
OL-2434-01
Caveats
CSCdw16742—Broadcast key rotation does not work with repeater access points and non-root 
bridges. When broadcast key rotation is enabled on a repeater access point or on a non-root bridge 
that is authenticated to the network using LEAP, data cannot be passed between the repeater or 
non-root bridge and the root bridge or access point. Workaround: Do not use broadcast key rotation 
on a non-root bridge or a repeater access point.
CSCdx19068—Unlimited LEAP logins configuration on ACS server can lock out roamed clients.
When the ACS server’s session policy is configured for other than unlimited simultaneous LEAP 
logins and a LEAP-enabled client device roams away from the access point or bridge long enough 
for a STOP record to appear in the Radius Accounting log, the client cannot reauthenticate until it 
is purged from the list of logged-in users on the ACS server. Workaround: Set the server’s IETF 
(028) idle timeout attribute to a low value so the server ends the roamed client’s session and the 
client can start a new session when it returns.
CSCdx19118—The access point or bridge reboots when more than 23 workgroup bridges are 
associated to it and you change one of these settings:
SSID on the Express Setup or AP/Root Radio Hardware pages
Classify Workgroup Bridges as Network Infrastructure on the AP/Root Radio Advanced page
Requested Status on the AP/Root Radio Advanced page from Up to Down and back to Up
CSCdx19270—When the Classify Workgroup Bridges as Network Infrastructure setting is set to yes 
on an access point or bridge with more than 23 workgroup bridges associated, the access point or 
bridge reboots when the workgroup bridges send small amounts of data. Workaround: Reduce the 
number of workgroup bridges associated to the access point or bridge, or change the Classify 
Workgroup Bridges as Network Infrastructure
 setting to no.
CSCdy58522--Access point or bridge loses portions of configuration when upgrading firmware 
from 11.21 to 11.23T. If an access point or bridge configuration contains host names (ftp.cisco.com
for example) instead of IP addresses in one or more configuration fields, the access point or bridge 
might lose some or all of its configuration when you upgrade the firmware from 11.21 to 11.23T. 
Workaround: Use IP addresses instead of host names in all configuration fields when upgrading 
from 11.21 to 11.23T.
CSCdw89705—When a non-root bridge roams from one root bridge to another, messages might 
appear in the logs of the root bridges stating that Ethernet devices connected to the non-root bridge 
and wireless client devices associated to the non-root bridge have roamed. You can ignore these 
messages.
Resolved Caveats
The following caveats have been resolved in firmware version 11.21:
Resolved: CSCdw00747—SNMP command no longer locks administrators out of access point or 
bridge. It is no longer possible to use an SNMP command to remove privileges from all users defined 
in the access point or bridge User Manager without disabling User Manager. 
Resolved: CSCdu02040—Protocol filter settings no longer revert to defaults during filter setup.
Resolved: CSCdx07623—When a client requiring MAC address authentication tries to authenticate, 
the access point now sends one and only one MAC address authentication request to the AAA server.
Resolved: CSCdv10959—The Search for less-congested radio channel feature now works when 
World Mode is enabled.
Resolved: CSCdv16451—Antenna alignment test between a root and a non-root bridge no longer 
requires reboot of the root bridge.