Cisco Cisco Aironet 1310 Access Point Bridge 릴리즈 노트

다운로드
페이지 21
 
16
Release Notes for Cisco Aironet Access Points and Bridges for Cisco IOS Release 12.4(3g)JA1
OL-11736-01
  Caveats
Caveats
This section lists open and resolved caveats for access points.
Open Caveats
These caveats are open in Cisco IOS Release 12.4(3g)JA1:
CSCse41589—Workgroup bridge fails to get a DHCP IP address after a successful EAP-FAST 
authentication to the root access point. The workgroup bridge can ping the root access point and 
wired host if BVI1 is assigned with a static IP address. Occasionally, the workgroup bridge is 
assigned a DHCP IP address after a long period of time (about 15 to 20 minutes).
The failure to obtain a DHCP IP address is not observed when the workgroup bridge uses LEAP 
authentication.
CSCse42464—Access point fails to retrieve certificate from certificate authority server when using 
GUI.
Certificate is obtained correctly when using the CLI.
CSCse48137—Nested repeater does not work.
A nested 1130 access point configured for open authentication and root mode station role fails to 
associate with a repeater and displays this console message:
*Mar 1 00:01:34.822:%DOT11-4-CANT_ASSOC: Interface Dot11Radio1, cannot associate: No 
Response 
*Mar 1 00:02:17.603:%DOT11-6-DFS_SCAN_COMPLETE: DFS scan complete on frequency 5560 
MHz
*Mar 1 00:02:31.821:%DOT11-4-CANT_ASSOC: Interface Dot11Radio1, cannot associate: Rcvd 
response from 0014.6956.5cda channel 149 801
CSCse49342—DHCP_SERVER_FAILURE observed in 1300 series in WGB mode.
CSCsg74791—Time-based ACLs do not work properly on Cisco Aironet IOS access points. 
The access point does not recognize the specified time-range. Either the ACL becomes active as 
specified, and the access point does not recognize when the ACL becomes inactive, thus continuing 
to apply the ACL; or the ACL is applied immediately when it is enabled on an interface (radio or 
fa0).
CSCsg90606—When an SSID is configured with WPA version 2+CCKM and encryption is set to 
TKIP, wireless clients fail to authenticate to the access point.
Workaround: None.
CSCsh17037—In rare circumstances, a memory leak may develop in the SSH process.
Workaround—Reboot the access point.
CSCsh84949—Wireless client fails to receive multicast data stream.
Workaround—Configure no ip igmp snooping on the access point.
CSCsh86675—1310 Bridge continuously authenticates and deauthenticates with LEAP enabled.
Occurs when 1310 configured as an access point and associating with an Intel 2915 802.11g radio. 
Client running LEAP associates and disassociates with the client disauthenticating.