Cisco Cisco 2106 Wireless LAN Controller
45
Release Notes for Cisco Wireless LAN Controllers and Lightweight Access Points for Release 4.2.205.0
OL-31336-01
Caveats
Workaround: None.
•
CSCsy87329—When you enable WPA1 on the controller GUI, WPA2 is also sometimes enabled.
Workaround: None.
•
CSCsy92080—External Webauth pages sometimes do not appear if the URL for the external page
contains more than 64 characters.
contains more than 64 characters.
Workaround: Use the controller CLI to configure Webauth and verify the configuration.
•
CSCsy94826—The controller GUI limits your ability to change channel width on 1250 series access
points. You must put Channel and Transmit Power into Custom mode, and the GUI allows you to
change the channel width setting only to 40 MHz.
points. You must put Channel and Transmit Power into Custom mode, and the GUI allows you to
change the channel width setting only to 40 MHz.
Workaround: None.
•
CSCsy94911—When you try to delete a guest WLAN, the controller sometimes displays this
message: “Anchors configured on WLAN - unable to delete WLAN entry,” even when no anchors
are configured.
message: “Anchors configured on WLAN - unable to delete WLAN entry,” even when no anchors
are configured.
Workaround: Add an anchor to the guest WLAN and then delete the anchor; you can then delete the
WLAN.
WLAN.
•
CSCsy96551—When a PC tries to renew an IP address it had before (for example from home
network), the controller’s internal DHCP server does not send an NAK frame. Instead the controller
sends a DHCP ignore message and does not assign an IP address to the machine.
network), the controller’s internal DHCP server does not send an NAK frame. Instead the controller
sends a DHCP ignore message and does not assign an IP address to the machine.
Workaround: Manually release and renew the IP address on the PC.
•
CSCsy99807—RLDP sometimes fails to detect that Linksys 802.11n access points are wired to the
infrastructure.
infrastructure.
Workaround: None.
•
CSCsy99905—RLDP consistently finds wired threats only when you use it manually.
Workaround: None.
•
CSCsz03162—When a controller is configured to allow only 802.11g traffic, 802.11b client devices
are able to successfully associate to an access point but cannot pass traffic.
are able to successfully associate to an access point but cannot pass traffic.
Workaround: When you configure the controller for 802.11g traffic only, disable any channels (such
as channel 14 in Japan) that allow associations from 802.11b client devices.
as channel 14 in Japan) that allow associations from 802.11b client devices.
•
CSCsz09498—When client devices trigger the auto-immune code on a controller, it can be difficult
to determine how exactly the client device violated the auto-immune rules.
to determine how exactly the client device violated the auto-immune rules.
Workaround: None.
Resolved Caveats
These caveats are resolved in controller software release 4.2.205.0.
•
CSCsg00102—In Cisco IOS Release 12.4(9)T, the TCP no longer stops accepting new connections
after a few days of SSLVPN running in the router.
after a few days of SSLVPN running in the router.
•
CSCsi51966—The ACL now appears in client details and in debug output.
•
CSCsj25953—When 200 or more wireless clients try to associate to a controller at the same time,
the clients no longer become stuck in the DHCP_REQD state when you use the config advanced
assoc-limit command to limit association requests from access points.
the clients no longer become stuck in the DHCP_REQD state when you use the config advanced
assoc-limit command to limit association requests from access points.
Use this CLI command to limit the rate at which access point radios send association and
authentication requests to the controller:
authentication requests to the controller: