Cisco Cisco Aironet 1200 Access Point Notas de publicación

Descargar
Página de 18
11
Release Notes for Cisco Aironet 1200 Series Access Points Running VxWorks Firmware Version 12.03T
OL-4157-01
  Caveats
Access the TAC Software Bug Toolkit at:
Open Caveats
The following caveats have not been resolved for VxWorks firmware version 12.03T:
CSCdz30285—The Configuring the Cisco Wireless Security Suite application note is incorrect.
The screen capture in section 3.1 of this document shows Add AAA Server, which is incorrect as 
the Aironet device is a client of the ACS, not a server.
Workaround: Call the TAC for setup instructions.
CSCdy49857—VxWorks event descriptions in documentation are incomplete.
Events displayed on the Event Log page are not described in the software configuration guides for 
350 and 1200 series devices.
CSCea47390—Access point crashes on task 0x97d2d8 “tThttpd.”
Cisco has been unable to reproduce this caveat and is investigating.
CSCea66593—Access point reboots sporadically because of a protection violation in tRcv_awc0.
Reboots can occur within a 2 to 3 hour period or remain on line for several days and occur based on 
a protection violation of data accessed associated with task tRcv_awc0.
There is no workaround for this caveat.
CSCin46049—Client is always forced to EAP-associate with multiple VLANs.
When multiple VLANs with different encryption schemes are configured on an access point, the 
client is forced to authenticate using EAP-TLS. The access point’s association table shows that the 
client is associated to the correct VLAN but shows it as EAP associated.
CSCin46604—The Solicitations Sent counter on the authoritative access point is always 
incremented by 2 instead of 1.
CSCin46620—Resetting All System Factory Defaults does not delete existing VLAN numbers.
When the access point is reset to factory defaults, any VLANs created remain in the Existing VLAN 
box and with the VLAN name No Name.
CSCin46639—Access point does not switch to repeater mode when Ethernet link is down.
When the Ethernet interface is shut down through a console command, the access point does not 
switch to repeater mode. However, when the Ethernet cable is unplugged, the access point switches 
to repeater mode after the default timeout of 2 seconds.
CSCin45850—A valid access point is not reporting a rogue access point in its logs when an invalid 
RADIUS server IP address is used in the rogue AP.
CSCin46851—After roaming from its home network to the foreign network, the mobile node fails 
to reach the home or foreign agent but associates to the authoritative access point on the foreign 
network. The mobile node must fully reathenticate to reach the entire network.