Cisco Cisco Aironet 1200 Access Point 릴리즈 노트

다운로드
페이지 18
11
Release Notes for Cisco Aironet 1200 Series Access Points Running Firmware Version 12.02T1
OL-3867-01
Caveats
Caveats
This section lists resolved and open software issues in firmware version 12.02T1.
Getting Bug Information on Cisco.com
If you are a registered Cisco user, you can use the Cisco TAC Software Bug Toolkit, which consists of 
three tools (Bug Navigator, Bug Watcher, and Search by Bug ID Number) that help you identify existing 
bugs (or caveats) in Cisco software products. 
Access the TAC Software Bug Toolkit at 
.
Open Caveats
The following caveats have not been resolved for firmware version 12.02T1:
CSCdy03381—One access point radio on dual-mode access points sometimes fails to restart after a 
warm reset. 
Workaround: Perform a cold reboot of the access point if one of the radios does not restart.
CSCdz04380—Incorrect values are advertised for CWMin and CWMax on Voice VLAN. 
When a voice VLAN using Cisco IP phones is configured with default settings (CSMin=31, 
CWMax=31), the values advertised by the access point in the beacons and probes are CWMin=7 and 
CWMax=255.
There is no workaround for this caveat.
CSCdy10787—The access point aborts any configuration containing an unknown MIB variable. 
When an access point receives a configuration from another access point that is running a newer 
firmware version than the receiving access point, the receiving access point aborts the configuration 
if it encounters a MIB variable that it does not recognize. 
Workaround: Upgrade access points to the same firmware version before distributing 
configurations.
CSCdy11906—When WEP is enabled and you set all WEP keys to not set, WEP is still enabled but 
the web-browser page indicates that WEP is disabled. 
Workaround: To disable WEP, select no encryption from the Use of Data Encryption by Stations is 
drop-down menu on the Radio Data Encryption page.
CSCin18914—IP release or renew not occurring with EAP-TLS+MIC+KH+BWR.
When a client associates with EAP-TLS + 40/128 bit broadcast key + MIC +Keyhash + Broadcast 
WEP key rotation (10sec), and IP DHCP release or renew commands are issued, the client releases 
the IP address, never receives it again, and remains EAP authenticated. A ping from the access point 
to the client appears to be successful, but does not reveal an IP address. The access point association 
table shows the IP address for the client as 0.0.0.0.