Cisco Cisco 4404 Wireless LAN Controller

Página de 26
 
22
Release Notes for Cisco Wireless LAN Controllers and Lightweight Access Points for Release 4.0.217.0
OL-31336-01
  Caveats
CSCsh99970—The Coun try page on the controller GUI appears to limit the country code that you 
can enter to two characters.
Workaround: Backspace to delete the characters in the code entry field and enter the three-character 
country code.
CSCsi05119—Changing the Serial Port Login Timeout from the controller GUI makes the 2106 
controller unreacheable. However, you can still access the controller using the CLI.
Workaround: Cold start the controller.
CSCsi06504—When a Mesh access point is configured with the wrong static IP address, it never 
falls back to DHCP and fails to join the controller.
Workaround: Log into the access point console and remove the static IP address in the boot prompt.
CSCsi09652—Configuring a 1000 series access point to an unsupported channel through the 
controller CLI causes the controller to show this invalid channel as the access point’s current 
channel. However, the access point continues to use a valid channel.
Workaround: Use the controller GUI to configure access point channels settings.
CSCsi15249—Access points in HREAP mode sometimes repeat DFS scans at various times.
Workaround: None.
CSCsi18296—The controller does not display an error message when you attempt to downgrade a 
lightweight access point by entering an invalid filename.
Workaround: None.
CSCsi22591—Changing the 802.11a channel on the RAP access point turns off RRM channel 
assignment on the 802.11b radios for all the access points on the sector.
Workaround: None.
CSCsi23248—Neighboring access points sometimes fail to join the same RM group when they 
detect neighboring access points.
Workaround: None.
CSCsi32464—The controller sometimes drops data traffic when the controller moves to the backup 
port on the same NPU.
Workaround: Configure the backup port as port 3.
Resolved Caveats
These caveats are resolved in controller software release 4.2.99.0.
CSCse28941—AP1510 mesh access points (MAPs) using dynamic frequency selection (DFS) and 
deployed in the European Telecommunications Standards Institute (ETSI) domain may detect what 
they perceive to be radar signals, even if no radar is present.
CSCse55173—Valid client devices sometimes appear in the list of rogue clients.
CSCse70601—The controller GUI and CLI do not display all RFID tags.
CSCsf09647, CSCse04713—The AP1000 firmware may drop broadcast frames sent from rogue 
access points.
CSCsg81953—Controllers sometimes report IDS Disassoc Flood attacks against valid clients in 
which the attacker’s MAC address is that of an access point joined to that controller.