Cisco Cisco Aironet 1200 Access Point 릴리즈 노트
11
Release Notes for Cisco Aironet 1200 Series Access Points Running Firmware Version 12.01T1
OL-3739-01
Troubleshooting
There is no workaround for this caveat
.
•
CSCdy73695—When a repeater access point receives packets from a root access point while the
repeater is attempting to associate, the repeater sometimes displays this error:
repeater is attempting to associate, the repeater sometimes displays this error:
00:00:10 (Warning): Station <Root MAC address> Associated with Encryption, then
attempted to send an Unencrypted packet to <Repeater MAC address> (length 74)
The error occurs when WEP is not enabled on either the root or the repeater. When an association
response is received by the repeater, it no longer displays the error message and is able to
successfully pass data. However, if a significant amount of traffic, such as multicast traffic, is being
transmitted by the root access point while the repeater is attempting to associate, the repeater may
miss the association response from the root access point and never fully associate. In this case, the
root access point reports that the repeater is associated and the repeater reports that it is only
authenticated. The repeater continues to display warning messages about receiving unencrypted
packets and does not recover until it is rebooted.
response is received by the repeater, it no longer displays the error message and is able to
successfully pass data. However, if a significant amount of traffic, such as multicast traffic, is being
transmitted by the root access point while the repeater is attempting to associate, the repeater may
miss the association response from the root access point and never fully associate. In this case, the
root access point reports that the repeater is associated and the repeater reports that it is only
authenticated. The repeater continues to display warning messages about receiving unencrypted
packets and does not recover until it is rebooted.
•
CSCdx81372—Access point does not accept version 11.56-generated .ini file.
If you download the full configuration .ini from an access point running 11.56, upgrade to version
12.01T1, and then attempt to download the .ini file from an FTP server, the following error message
appears:
12.01T1, and then attempt to download the .ini file from an FTP server, the following error message
appears:
*** No Such MIB Variable as Specified on Initialization File Line xxx! for the
following variables:
awcAaaServerAccountingEnabled.x,
awcVoIPVlanId, awcVoIPVlanEnabled,
awcPublicVlanId.
*** Bad Value for MIB Variable awcVlanEncapMode Specified on Initialization File Line
xxx (error 13)!
Workaround—When producing .ini files, dump a non-default configuration for version 11.56
instead of a full configuration.
instead of a full configuration.
•
CSCdz58192—Root bridges with LEAP enabled on the native VLAN must have the security setting
matching that set on the Advanced Radio Setup page. If the settings do not match, the bridge link
will go down temporarily whenever an infrastructure device authenticates.
matching that set on the Advanced Radio Setup page. If the settings do not match, the bridge link
will go down temporarily whenever an infrastructure device authenticates.
Resolved Caveat
The following caveat is resolved in version 12.01T1:
•
CSCdz66748 (CSCdz60229)—Access points are no longer vulnerable to a denial of service (DoS)
when support for the Secure Shell (SSH) server is enabled. Malformed SSH packets directed at the
access point no longer cause a reload of the device.
when support for the Secure Shell (SSH) server is enabled. Malformed SSH packets directed at the
access point no longer cause a reload of the device.
Troubleshooting
For the most up-to-date, detailed troubleshooting information, refer to the Cisco TAC website at
. Select Wireless Technologies under Top Issues.