Cisco Cisco 4404 Wireless LAN Controller
22
Release Notes for Cisco Wireless LAN Controllers and Lightweight Access Points for Release 4.0.217.0
OL-31336-01
Caveats
•
CSCsh99970—The Coun try page on the controller GUI appears to limit the country code that you
can enter to two characters.
can enter to two characters.
Workaround: Backspace to delete the characters in the code entry field and enter the three-character
country code.
country code.
•
CSCsi05119—Changing the Serial Port Login Timeout from the controller GUI makes the 2106
controller unreacheable. However, you can still access the controller using the CLI.
controller unreacheable. However, you can still access the controller using the CLI.
Workaround: Cold start the controller.
•
CSCsi06504—When a Mesh access point is configured with the wrong static IP address, it never
falls back to DHCP and fails to join the controller.
falls back to DHCP and fails to join the controller.
Workaround: Log into the access point console and remove the static IP address in the boot prompt.
•
CSCsi09652—Configuring a 1000 series access point to an unsupported channel through the
controller CLI causes the controller to show this invalid channel as the access point’s current
channel. However, the access point continues to use a valid channel.
controller CLI causes the controller to show this invalid channel as the access point’s current
channel. However, the access point continues to use a valid channel.
Workaround: Use the controller GUI to configure access point channels settings.
•
CSCsi15249—Access points in HREAP mode sometimes repeat DFS scans at various times.
Workaround: None.
•
CSCsi18296—The controller does not display an error message when you attempt to downgrade a
lightweight access point by entering an invalid filename.
lightweight access point by entering an invalid filename.
Workaround: None.
•
CSCsi22591—Changing the 802.11a channel on the RAP access point turns off RRM channel
assignment on the 802.11b radios for all the access points on the sector.
assignment on the 802.11b radios for all the access points on the sector.
Workaround: None.
•
CSCsi23248—Neighboring access points sometimes fail to join the same RM group when they
detect neighboring access points.
detect neighboring access points.
Workaround: None.
•
CSCsi32464—The controller sometimes drops data traffic when the controller moves to the backup
port on the same NPU.
port on the same NPU.
Workaround: Configure the backup port as port 3.
Resolved Caveats
These caveats are resolved in controller software release 4.2.99.0.
•
CSCse28941—AP1510 mesh access points (MAPs) using dynamic frequency selection (DFS) and
deployed in the European Telecommunications Standards Institute (ETSI) domain may detect what
they perceive to be radar signals, even if no radar is present.
deployed in the European Telecommunications Standards Institute (ETSI) domain may detect what
they perceive to be radar signals, even if no radar is present.
•
CSCse55173—Valid client devices sometimes appear in the list of rogue clients.
•
CSCse70601—The controller GUI and CLI do not display all RFID tags.
•
CSCsf09647, CSCse04713—The AP1000 firmware may drop broadcast frames sent from rogue
access points.
access points.
•
CSCsg81953—Controllers sometimes report IDS Disassoc Flood attacks against valid clients in
which the attacker’s MAC address is that of an access point joined to that controller.
which the attacker’s MAC address is that of an access point joined to that controller.