Cisco Cisco Aironet 1310 Access Point Bridge

ページ / 17
 
10
Release Notes for Cisco Aironet 1300 Series Outdoor Access Point/Bridge for Cisco IOS Release 12.3(4)JA2
OL-8216-01
  Important Notes
Radio MAC Address Appears in Access Point/Bridge Event Log
When a client device roams from an access point (such as access point alpha) to another access point 
(access point bravo), a message appears in the event log on access point alpha stating that the client 
roamed to access point bravo. The MAC address that appears in the event message is the MAC address 
for the access point/bridge.
Mask Field on IP Filters Page Behaves the Same As in CLI
In Cisco IOS Release 12.2(8)JA and later, the mask that you enter in the Mask field on the IP Filters page 
in the access point/bridge GUI behaves the same way as a mask that you enter in the CLI. If you enter 
255.255.255.255 as the mask, the access point/bridge accepts any IP address. If you enter 0.0.0.0, the 
access point/bridge looks for an exact match with the IP address that you entered in the IP Address field.
System Software Upgrade Sometimes Fails Using Microsoft Internet Explorer 
5.01 SP2
A system software upgrade sometimes fails when you use Microsoft Internet Explorer version 5.01 SP2 
to upgrade system software using the HTTP Upgrade page in the web-browser interface. Use a later 
version of Microsoft Internet Explorer to perform HTTP system software upgrades, or use TFTP to 
upgrade system software. Click this URL to browse to the Cisco 1300 Series Wireless Bridge Software 
Configuration Guide
 for complete instructions on performing software upgrades:
Corrupt EAP Packet Sometimes Causes Error Message
During client authentication, the access point/bridge sometimes receives a corrupt EAP packet and 
displays this error message:
Oct  1 09:00:51.642 R: %SYS-2-GETBUF: Bad getbuffer, bytes= 28165
-Process= "Dot11 Dot1x process", ipl= 0, pid= 32
-Traceback= A2F98 3C441C 3C7184 3C604C 3C5E14 3C5430 124DDC
You can ignore these messages.
When Cipher is TKIP Only, Key Management Must Be Enabled
When “Cipher TKIP” is configured on a VLAN, the SSID(s) for that VLAN must use WPA or CCKM 
key management. If you do not configure the SSID(s) for that VLAN with WPA or CCKM, client 
authentication fails on the SSIDs.