Cisco Cisco WAP200E Wireless-G Exterior Access Point - PoE 릴리즈 노트
Release Notes for the Cisco WAP200E Exterior Wireless-G Access Point with PoE
3
Release Notes
Resolved Caveats in Release 2.0.5.0
•
The Cisco WAP200E no longer restores to the factory default settings if it is
power-cycled over three times.
power-cycled over three times.
Open Caveats in Release 2.0.3.0
In WEP security, the user interface will not allow 128-bit Encryption to be selected
if the Key 1-4 fields are populated before selecting 128-bit Encryption.
if the Key 1-4 fields are populated before selecting 128-bit Encryption.
Workaround: Clear all Keys, then select 128-bit Encryption, and add the keys.
Resolved Caveats in Release 2.0.3.0
•
Support Spanning Tree Protocol (STP) option.
•
Miscellaneous user interface enhancements.
Open Caveats in Release 2.0.2.1
In rare instances, you might lose access to your WAP200E web GUI when making
numerous back-to-back configuration changes across multiple tabs. Access to the
Internet is not affected. The workaround to resume connection to the WAP200E
GUI is to reboot your WAP.
numerous back-to-back configuration changes across multiple tabs. Access to the
Internet is not affected. The workaround to resume connection to the WAP200E
GUI is to reboot your WAP.
Resolved Caveats in Release 2.0.2.1
•
The WDS (Wireless Distribution System) can transition from WPA PSK to
WPA2 PSK and vice versa if the WAP is mounted as instructed in the
administration guide.
WPA2 PSK and vice versa if the WAP is mounted as instructed in the
administration guide.
•
Import and export of certificates from the GUI is now supported.
Open Caveats in Release 2.0.0.27
•
SNMP is displaying an incorrect sysDescr.0 value: “HW_REV:111; VENDOR:
LINKSYS.”
LINKSYS.”
•
SNMP is displaying incorrect OID value: “.961.6.31.200.2.10” The new Cisco
rebranding OID value should be “.9.6.1.31.200.2”
rebranding OID value should be “.9.6.1.31.200.2”