Cisco Cisco Aironet 1530i Outdoor Access Point 릴리즈 노트

다운로드
페이지 16
 
8
Release Notes for Cisco Aironet Access Points and Bridges for Cisco IOS Release 15.2(4)JB5
OL-30935-01
  Important Notes
Outdoor MIMO bridging using external antennas has not been fully tested and is not fully supported 
with this release.
Low Throughput Seen on Access Points with 16 BSSIDs Configured
If your network uses 16 BSSIDs with 1 and 2-Mbps data rates, access points might experience very low 
throughput due to high management traffic.
802.11n HT Rates Apply Only to No Encryption or WPA2/AES Encryption
As per the 802.11n amendment, the 802.11n HT rates apply only to no encryption or WPA2/AES 
encryption. They do not apply to WEP or WPA encryption. If WEP or TKIP encryption is used, the 
access point and any 802.11n clients will not transmit at HT rates. Legacy rates (802.11a/b/g) will be 
used for any clients using WEP or TKIP encryption.
Layer 3 Not Supported with NAC for MBSSID
Layer 3 is not supported with NAC for MBSSID in this release.
Change to Default IP Address Behavior
Cisco IOS Release 12.3(2)JA and later releases change the default behavior of access points that request 
an IP address from a DHCP server
When you connect a 1040, 1130, 1140, 1250, or 1260 series access point or a 1300 series outdoor access 
point/bridge with a default configuration to a LAN, the access point requests an IP address from a DHCP 
server and, if it does not receive an address, continues to send requests indefinitely. 
Changes to the Default Configuration—Radios Disabled and No Default SSID 
The radio or radios are disabled by default, and there is no default SSID. You must create an SSID and 
enable the radio or radios before the access point allows wireless associations from other devices. These 
changes to the default configuration improve the security of newly installed access points.
Clients Using WPA/WPA2 and Power Save May Fail to Authenticate
Certain clients using WPA/WPA2 key management and power save can take many attempts to 
authenticate or, in some cases, fail to authenticate. Any SSID that is defined to use authentication 
key-management WPA, together with clients using power save mode and authenticating using 
WPA/WPA2, can experience this problem.
A hidden configure level command, dot11 wpa handshake timeout, can be used to increase the timeout 
between sending the WPA key packets from the default value (100 ms) to a value between 101 and 2000 
ms. The command stores its value in the configuration across device reloads.