Cisco Cisco 2106 Wireless LAN Controller

Página de 54
 
45
Release Notes for Cisco Wireless LAN Controllers and Lightweight Access Points for Release 4.2.205.0
OL-31336-01
  Caveats
Workaround: None.
CSCsy87329—When you enable WPA1 on the controller GUI, WPA2 is also sometimes enabled.
Workaround: None.
CSCsy92080—External Webauth pages sometimes do not appear if the URL for the external page 
contains more than 64 characters. 
Workaround: Use the controller CLI to configure Webauth and verify the configuration.
CSCsy94826—The controller GUI limits your ability to change channel width on 1250 series access 
points. You must put Channel and Transmit Power into Custom mode, and the GUI allows you to 
change the channel width setting only to 40 MHz. 
Workaround: None.
CSCsy94911—When you try to delete a guest WLAN, the controller sometimes displays this 
message: “Anchors configured on WLAN - unable to delete WLAN entry,” even when no anchors 
are configured.
Workaround: Add an anchor to the guest WLAN and then delete the anchor; you can then delete the 
WLAN.
CSCsy96551—When a PC tries to renew an IP address it had before (for example from home 
network), the controller’s internal DHCP server does not send an NAK frame. Instead the controller 
sends a DHCP ignore message and does not assign an IP address to the machine.
Workaround: Manually release and renew the IP address on the PC.
CSCsy99807—RLDP sometimes fails to detect that Linksys 802.11n access points are wired to the 
infrastructure.
Workaround: None.
CSCsy99905—RLDP consistently finds wired threats only when you use it manually.
Workaround: None.
CSCsz03162—When a controller is configured to allow only 802.11g traffic, 802.11b client devices 
are able to successfully associate to an access point but cannot pass traffic.
Workaround: When you configure the controller for 802.11g traffic only, disable any channels (such 
as channel 14 in Japan) that allow associations from 802.11b client devices.
CSCsz09498—When client devices trigger the auto-immune code on a controller, it can be difficult 
to determine how exactly the client device violated the auto-immune rules.
Workaround: None.
Resolved Caveats
These caveats are resolved in controller software release 4.2.205.0.
CSCsg00102—In Cisco IOS Release 12.4(9)T, the TCP no longer stops accepting new connections 
after a few days of SSLVPN running in the router.
CSCsi51966—The ACL now appears in client details and in debug output.
CSCsj25953—When 200 or more wireless clients try to associate to a controller at the same time, 
the clients no longer become stuck in the DHCP_REQD state when you use the config advanced 
assoc-limit
 command to limit association requests from access points.
Use this CLI command to limit the rate at which access point radios send association and 
authentication requests to the controller: