Cisco Cisco Aironet 1200 Access Point 릴리즈 노트

다운로드
페이지 16
11
Release Notes for Cisco Aironet 1200 Series Access Points Running Firmware Version 12.01T1
OL-3739-01
Troubleshooting
There is no workaround for this caveat
.
CSCdy73695—When a repeater access point receives packets from a root access point while the 
repeater is attempting to associate, the repeater sometimes displays this error:
00:00:10 (Warning): Station <Root MAC address> Associated with Encryption, then 
attempted to send an Unencrypted packet to <Repeater MAC address> (length 74)
The error occurs when WEP is not enabled on either the root or the repeater. When an association 
response is received by the repeater, it no longer displays the error message and is able to 
successfully pass data. However, if a significant amount of traffic, such as multicast traffic, is being 
transmitted by the root access point while the repeater is attempting to associate, the repeater may 
miss the association response from the root access point and never fully associate. In this case, the 
root access point reports that the repeater is associated and the repeater reports that it is only 
authenticated.  The repeater continues to display warning messages about receiving unencrypted 
packets and does not recover until it is rebooted. 
CSCdx81372—Access point does not accept version 11.56-generated .ini file.
If you download the full configuration .ini from an access point running 11.56, upgrade to version 
12.01T1, and then attempt to download the .ini file from an FTP server, the following error message 
appears:
*** No Such MIB Variable as Specified on Initialization File Line xxx! for the 
following variables: 
awcAaaServerAccountingEnabled.x, 
awcVoIPVlanId, awcVoIPVlanEnabled,
awcPublicVlanId.
*** Bad Value for MIB Variable awcVlanEncapMode Specified on Initialization File Line 
xxx (error 13)!
Workaround—When producing .ini files, dump a non-default configuration for version 11.56 
instead of a full configuration.
CSCdz58192—Root bridges with LEAP enabled on the native VLAN must have the security setting 
matching that set on the Advanced Radio Setup page. If the settings do not match, the bridge link 
will go down temporarily whenever an infrastructure device authenticates.
Resolved Caveat
The following caveat is resolved in version 12.01T1:
CSCdz66748 (CSCdz60229)—Access points are no longer vulnerable to a denial of service (DoS) 
when support for the Secure Shell (SSH) server is enabled. Malformed SSH packets directed at the 
access point no longer cause a reload of the device.
Troubleshooting
For the most up-to-date, detailed troubleshooting information, refer to the Cisco TAC website at 
. Select Wireless Technologies under Top Issues.