Cisco Cisco Aironet 1200 Access Point Notas de publicación

Descargar
Página de 18
 
12
Release Notes for Cisco Aironet 1100 and 1200 Series Access Points for Cisco IOS Release 12.2(13)JA3
OL-5428-02
Important Notes
Cannot Perform Link Tests on Non-Cisco Aironet Client Devices and on Cisco 
Aironet 802.11g Client Devices
The link test feature on the web-browser interface does not support non-Cisco Aironet client devices nor 
Cisco Aironet 802.11g client devices.
System Software Upgrade Sometimes Fails Using Microsoft Internet Explorer 
5.01 SP2
A system software upgrade sometimes fails when you use Microsoft Internet Explorer version 5.01 SP2 
to upgrade system software using the HTTP Upgrade page in the web-browser interface. Use a later 
version of Microsoft Internet Explorer to perform HTTP system software upgrades, or use TFTP to 
upgrade system software. Click this URL to browse to the Cisco IOS Software Configuration Guide for 
Cisco Aironet Access Points
 for complete instructions on performing software upgrades:
1100 Series Access Points with Boot Loader Version 12.2(4)JA Boot into 
Monitor Mode
When the Ethernet port is disabled on an 1100 series access point running boot loader version 12.2(4)JA, 
the access point boots into monitor mode when it reboots. To avoid this problem, connect the access 
point Ethernet port to one of the following:
a wired LAN
the Ethernet port on a PC
Remove power from the access point and reapply power to reboot the unit. When the access point senses 
an Ethernet connection, it boots normally.
Corrupt EAP Packet Sometimes Causes Error Message
During client authentication, the access point sometimes receives a corrupt EAP packet and displays this 
error message:
Oct  1 09:00:51.642 R: %SYS-2-GETBUF: Bad getbuffer, bytes= 28165
-Process= "Dot11 Dot1x process", ipl= 0, pid= 32
-Traceback= A2F98 3C441C 3C7184 3C604C 3C5E14 3C5430 124DDC
You can ignore these messages.
When Cipher is TKIP Only, Key Management Must Be Enabled
When you configure TKIP-only cipher encryption (not TKIP + WEP 128 or TKIP + WEP 40) on any 
radio interface or VLAN, every SSID on that radio or VLAN must be set to use WPA or CCKM key 
management. If you configure TKIP on a radio or VLAN but you do not configure key management on 
the SSIDs, client authentication fails on the SSIDs.