Cisco Cisco Aironet 350 Access Points

ページ / 16
9
Release Notes for Cisco Aironet 340 and 350 Series Access Points and 350 Series Bridges Running VxWorks Firmware Version 12.03T
OL-4150-01
  Caveats
Open Caveats
The following caveats have not been resolved for VxWorks firmware version 12.03T:
CSCea04960—Packet loss, LEAP failure, and possible memory leak issue.
This caveat is being investigated.
CSCdx35804—RADIUS attributes in documentation is incomplete or inaccurate.
This caveat is being investigated.
CSCdy49857—VxWorks event descriptions in documentation are incomplete.
Events displayed on the Event Log page are not described in the software configuration guides for 
350 and 1200 series devices. The information is in final review and, when approved, will be released 
as an appendix to the appropriate software configuration guides.
CSCdz30285—The Configuring the Cisco Wireless Security Suite application note is incorrect.
The screen capture in section 3.1 of this document shows Add AAA Server, which is incorrect as 
the Aironet device is a client of the ACS, not a server.
Workaround: Call the TAC for setup instructions.
CSCin46049—Client is always forced to EAP-associate with multiple VLANs.
When multiple VLANs with different encryption schemes are configured on an access point, the 
client is forced to authenticate using EAP-TLS. The access point’s association table shows that the 
client is associated to the correct VLAN but shows it as EAP associated.
CSCin46604—The Solicitations Sent counter on the authoritative access point is always 
incremented by 2 instead of 1.
CSCin46620—Resetting All System Factory Defaults does not delete existing VLAN numbers.
When the access point is reset to factory defaults, any VLANs created remain in the Existing VLAN 
box and with the VLAN name No Name.
CSCin46639—Access point does not switch to repeater mode when Ethernet link is down.
When the Ethernet interface is shut down through a console command, the access point does not 
switch to repeater mode. However, when the Ethernet cable is unplugged, the access point switches 
to repeater mode after the default timeout of 2 seconds.
CSCin45850—A valid access point is not reporting a rogue access point in its logs when an invalid 
RADIUS server IP address is used in the rogue access point.
CSCin46851—After roaming from its home network to the foreign network, the mobile node fails 
to reach the home or foreign agent but associates to the authoritative access point on the foreign 
network. The mobile node must fully reathenticate to reach the entire network.
Resolved Caveats
The following caveats are resolved in version 12.03T:
CSCdy10787—The access point no longer aborts configurations containing an unknown MIB 
variable.
CSCdv17999—The antenna alignment utility now displays correct signal strength.
CSCdy57203—Contrary to user settings, the Always Block Eth setting reverts to disabled.
CSCdy62052—Hot standby with LEAP no longer disables the radio on the primary access point.