Cisco Cisco Aironet 350 Access Points 릴리즈 노트

다운로드
페이지 16
7
Release Notes for Cisco Aironet 340 and 350 Series Access Points and 350 Series Bridges Running Firmware Version 12.02T1
OL-3868-01
Important Notes
Adding or Deleting Proxy Mobile IP AAPs
If you need to add or delete proxy Mobile IP authoritative access points, you must disable proxy Mobile 
IP before changing the configuration. Follow these steps.
Step 1
Browse to the Setup page.
Step 2
In the Services section, click Proxy Mobile IP. The Proxy Mobile IP Setup page appears.
Step 3
Click General. The Proxy Mobile IP General page appears.
Step 4
Change the Enable Proxy Mobile IP setting to no.
Step 5
Add or delete AAPs as necessary. 
Step 6
Change the Enable Proxy Mobile IP setting to yes.
Unexpected Results on Lost Ethernet
When backbone connectivity is lost on an access point running version 12.02T1, the device switches to 
repeater mode. Switch to Repeater mode is the default setting for this condition. Therefore, if the access 
point’s role in your network is not a repeater access point, make sure you connect it to your wired 
network before booting it up. If you do not connect the access point to your network, it switches to the 
repeater mode when it fails to detect the presence of an Ethernet connection. When this occurs, wireless 
client devices are unable to connect and you cannot correct the problem using a wireless client. The only 
way you can change the configuration is through a serial connection using the access point’s command 
line interface.
Centralized Authentication Administration System Flow Notes
The following information briefly explains the flow between the access point and its authentication 
server. This information was inadvertently omitted from the Cisco Aironet 340 and 350 Series Access 
Point Software Configuration Guide
.
The authentication server is initialized to listen for socket requests on the predetermined UDP or 
TCP ports specified on the Authenticator Configuration page (UDP 1812 for RADIUS servers or 
TCP 49 for TACAS+ servers).
The authentication server must be preconfigured with valid usernames and passwords and the shared 
secret key the server uses for secure authentication between it and the access point.
No remote server authentication is possible with a new access point unless it has been configured 
by the user.
The access point requires the following parameters to access the remote authentication servers, 
which were described in the procedure above:
Remote server authentication—accomplished by configuring or not configuring the 
authentication server to send requests
IP address of the authentication server(s)
Secret key to be shared with the authentication server(s)
Selection of RADIUS or TACACS+ server indication