Cisco Cisco 2000 Series Wireless LAN Controller
![Cisco](https://files.manualsbrain.com/attachments/7380d0050044647c30f5c24bbbf5d0c0b6d9bb84/common/fit/150/50/faa183d287233c52228cfea3dbc2a127fe780f60564fcb0955d9c3d1cd23/brand_logo.png)
R E V I E W D R A F T — C I S C O C O N F I D E N T I A L
20
Release Notes for Cisco Wireless LAN Controllers and Lightweight Access Points for Release 3.2.193.5
OL-xxxxx-xx
Caveats
•
CSCse43755—Controller accepts client associations to access points even when the AP-manager
interface is not configured on the controller.
interface is not configured on the controller.
•
CSCse49339—A 1030 access point in bridge mode, set to regulatory domain KR, fails to join a 2000
series controller.
series controller.
•
CSCse50111—An active controller port sometimes fails when traffic is pumped from a wireless
client to a wired client.
client to a wired client.
•
CSCse52733—Controller reboots during code downloading.
•
CSCse53024—Command maxUserLogin restricts all types of authenticated users.
•
CSCse55173—Valid clients show up in rogue client list.
•
CSCse56114—Controller forwards BPDU packets out the gigabit interface when it should not.
•
CSCse68631—Unexpected channel is shown on Monitor with J2 domain.
•
CSCse73897—Layer 3 Support for fortress required.
•
CSCse74680—VLAN statistics are not always updated on the Monitor > Controller Statistics page.
•
CSCse84310—Warning message misspelled when regenerating webauth.
•
CSCse84334—Preview button for external webauth page shows internal page.
•
CSCse87066—Access points on other controllers in same mobility group appear as rogues.
•
CSCse87074—When you enter the show run-config command on the controller CLI, the output for
the command is truncated.
the command is truncated.
•
CSCse89257—Access point logs are generated but no logs there in some situation
•
CSCse90361—During upgrade from version 2.2 to 3.2 the network user setting is not checked.
•
CSCse90894—Internet Explorer redirects to login page with webauth due to cache.
•
CSCse91470—Config option to pad ARP requests.
•
CSCse96745—Bogus alert pops up when configuring macfilter with an address in AP policy.
•
CSCse97036—User can log into one controller and get access to another controller’s management
GUI.
GUI.
•
CSCse98609—A 1030 REAP access point can corrupt client certificate.
•
CSCsf00511—All access points show 0 down even when an access point is set to disabled.
•
CSCsf08091—You cannot create more than 64 interfaces through the controller GUI.
•
CSCsf08102—WCS might not report WLAN Override correctly.
•
CSCsf11493—WiSM reboots unexpectedly.
•
CSCsf15084—Containment of rogue adhocs yields generation of more adhoc rogues track.
•
CSCsf16082—The session timeout setting does not take effect when you apply a WCS template to
a controller.
a controller.
•
CSCsf16100—Access points are unable to join the WiSM controller.
•
CSCsf16129—Controllers sometimes fail to reply to ARP requests.
•
CSCsf21919—Controllers sometimes discover client devices through either the backup or the
primary port.
primary port.
•
CSCsf26567—Memory leaks no longer caused by EAPOL packets.
•
CSCsf26863—Web Authentication sometimes inconsistent with proxy server.
•
CSCsf27479—WiSM locks up and does not generate crash file after reboot.