Cisco Cisco 2000 Series Wireless LAN Controller

Página de 32
R E V I E W   D R A F T — C I S C O   C O N F I D E N T I A L
20
Release Notes for Cisco Wireless LAN Controllers and Lightweight Access Points for Release 3.2.193.5
OL-xxxxx-xx
  Caveats
CSCse43755—Controller accepts client associations to access points even when the AP-manager 
interface is not configured on the controller.
CSCse49339—A 1030 access point in bridge mode, set to regulatory domain KR, fails to join a 2000 
series controller.
CSCse50111—An active controller port sometimes fails when traffic is pumped from a wireless 
client to a wired client.
CSCse52733—Controller reboots during code downloading.
CSCse53024—Command maxUserLogin restricts all types of authenticated users.
CSCse55173—Valid clients show up in rogue client list.
CSCse56114—Controller forwards BPDU packets out the gigabit interface when it should not.
CSCse68631—Unexpected channel is shown on Monitor with J2 domain.
CSCse73897—Layer 3 Support for fortress required.
CSCse74680—VLAN statistics are not always updated on the Monitor > Controller Statistics page.
CSCse84310—Warning message misspelled when regenerating webauth.
CSCse84334—Preview button for external webauth page shows internal page.
CSCse87066—Access points on other controllers in same mobility group appear as rogues.
CSCse87074—When you enter the show run-config command on the controller CLI, the output for 
the command is truncated.
CSCse89257—Access point logs are generated but no logs there in some situation
CSCse90361—During upgrade from version 2.2 to 3.2 the network user setting is not checked.
CSCse90894—Internet Explorer redirects to login page with webauth due to cache.
CSCse91470—Config option to pad ARP requests.
CSCse96745—Bogus alert pops up when configuring macfilter with an address in AP policy.
CSCse97036—User can log into one controller and get access to another controller’s management 
GUI.
CSCse98609—A 1030 REAP access point can corrupt client certificate.
CSCsf00511—All access points show 0 down even when an access point is set to disabled.
CSCsf08091—You cannot create more than 64 interfaces through the controller GUI.
CSCsf08102—WCS might not report WLAN Override correctly.
CSCsf11493—WiSM reboots unexpectedly.
CSCsf15084—Containment of rogue adhocs yields generation of more adhoc rogues track.
CSCsf16082—The session timeout setting does not take effect when you apply a WCS template to 
a controller.
CSCsf16100—Access points are unable to join the WiSM controller.
CSCsf16129—Controllers sometimes fail to reply to ARP requests.
CSCsf21919—Controllers sometimes discover client devices through either the backup or the 
primary port.
CSCsf26567—Memory leaks no longer caused by EAPOL packets.
CSCsf26863—Web Authentication sometimes inconsistent with proxy server.
CSCsf27479—WiSM locks up and does not generate crash file after reboot.