Cisco Cisco 2000 Series Wireless LAN Controller

Page de 26
 
22
Release Notes for Cisco Wireless LAN Controllers and Lightweight Access Points for Release 4.0.179.11
OL-11734-01
  Caveats
CSCsf06321—WPA2 with AES becomes disabled on hybrid-REAP access points after broadcast 
key rotation.
Workaround: Use only TKIP with WPA or WPA2.
CSCsf11493—The WiSM controller sometimes stops functioning and resets when the Gig ports are 
disabled.
Workaround: Do not enter the show qos command on the WiSM controller CLI.
CSCsf12843—Access points in HREAP mode sometimes reboot but do not allow clients to 
associate. This condition occurs when multiple WLANs are defined on the controller (for example, 
WLANs 1, 2, 3, 4, and 5) but only a few are enabled on the access point (for example, WLANs 1, 
3, and 5).
Workaround: Make sure the WLAN number configuration on the access point is continuous starting 
with WLAN 1 (for example, WLANs 1, 2, and 3).
CSCsf15084—Containing rogue devices in ad-hoc mode sometimes generates more entries for 
rogue ad-hoc devices. 
Workaround: Do not contain rogue ad-hoc devices.
CSCsf23000—When you use the controller GUI to change the antenna type from internal to external 
on the 802.11a radio in a 1000 series access point or in a 1500 series access point, the operation 
sometimes fails, and the GUI displays an error message.
Workaround: Enter the config 802.11 antenna command on the controller CLI to set the antenna 
type to external. This workaround does not work if the access point is configured as a MAP. If the 
access point is in MAP mode, configure it for RAP mode (enter configure ap role rootAP on the 
CLI), disable the 802.11a radio (configure 802.11a disable), change the antenna setting to external 
(configure 802.11a antenna selection external), and set the access point back to MAP mode.
CSCsf23095—The controller GUI does not indicate that the AES Key Wrap setting is designed for 
FIPS customers and requires a key-wrap compliant RADIUS server.
CSCsg00178—When peer-to-peer blocking is enabled, traffic from a client to another client is 
forwarded on the controller DS port. However, the controller still performs proxy ARP for the client, 
and packets from the first client to the second client are addressed to the second client’s MAC 
address, which prevents client-to-client communication from working at all.
Workaround: None at this time.
CSCsg01470—Access point impersonation traps don't include the source MAC address.
Workaround: Use the trap log message on the controller to find out the source address.
CSCsg10391—When you use the remote-debug enable command on the controller CLI to enable 
remote debugging on an access point, debugging stops when your CLI session times out.
Workaround: Open a new CLI session, disable remote debugging (enter remote-debug disable), and 
re-enable remote debugging.
CSCsg11758—Canadian 1510 mesh access points with domain setting -N do not enable the 
802.11b/g radio with the country code set to CA in release 4.0.179.8.
Workaround: Downgrade controller software to release 4.0.155.5.
CSCsg36361—Controllers sometimes lock up when a Spectralink phone associates to an access 
point.
Workaround: None at this time.