Примечания к выпуску для Cisco Cisco 2106 Wireless LAN Controller
76
Release Notes for Cisco Wireless LAN Controllers and Lightweight Access Points for Release 5.2.157.0
OL-31336-01
Caveats
•
CSCsr75121—The following decrypt errors might appear in the controller trap logs:
Decrypt errors occurred for client <client mac address> using WPA key on 802.11a
interface of AP <ap mac address>
Decrypt errors occurred for client <client mac address> using WPA2 key on 802.11b/g
interface of AP <ap mac address>
•
CSCsr83671—The controller’s dynamic channel assignment (DCA) feature sets access points to channel
36 for the 5-GHz band (802.11a).
36 for the 5-GHz band (802.11a).
•
CSCsr89403—Diversity is disabled on 2.4-GHz access point radios.
•
CSCsr95295—The controller CLI allows you to disable all legacy data rates with the network enabled.
However, this invalid configuration disables the network.
However, this invalid configuration disables the network.
•
CSCsr97110—After you download an XML configuration file, a 4400 series controller running
software release 5.1.151.0 might reboot continuously.
software release 5.1.151.0 might reboot continuously.
•
CSCsu05190—The AP-manager does not reply with the correct destination MAC address with
GARP. As a result, access points cannot join the controller after a failover from the primary firewall
to the secondary firewall.
GARP. As a result, access points cannot join the controller after a failover from the primary firewall
to the secondary firewall.
•
CSCsu22727—After WCS pushes an access point template to the controller, the controller might
reboot.
reboot.
•
CSCsu26961—Using WCS or the controller CLI, you can configure the controller for WPA+WPA2
with 802.1x/CCKM and PSK. To see whether 802.1x/CCKM is configured at the same time with
PSK, run the show wlan 1 or show run-config command and look at the output.
with 802.1x/CCKM and PSK. To see whether 802.1x/CCKM is configured at the same time with
PSK, run the show wlan 1 or show run-config command and look at the output.
•
CSCsu27939—Controllers running software release 4.2.130.0 might reboot because of a software
failure of usmWebRRMRadSlotNoiseChannelGetNext+64.
failure of usmWebRRMRadSlotNoiseChannelGetNext+64.
•
CSCsu50080—When you configure web authentication passthrough with email input on the
controller, the controller allows any text to be entered. This feature implies that a client should have
to enter an email address before proceeding. Although there is no way to verify that the email is
valid, the controller should at least check that it follows this format: name@company.com.
controller, the controller allows any text to be entered. This feature implies that a client should have
to enter an email address before proceeding. Although there is no way to verify that the email is
valid, the controller should at least check that it follows this format: name@company.com.
•
CSCsu52812—When the controller is in multicast-unicast mode, it sends unicast traffic to an access
point before that access point fully joins the controller. This problem is serious when the access
point is running a recovery image that does not drop LWAPP data packets, such as 12.3(11)JX1. If
the number of data packets sent to the access point before it gets the full image is large enough, the
access point locks up and cannot join the controller.
point before that access point fully joins the controller. This problem is serious when the access
point is running a recovery image that does not drop LWAPP data packets, such as 12.3(11)JX1. If
the number of data packets sent to the access point before it gets the full image is large enough, the
access point locks up and cannot join the controller.
•
CSCsv01484—The controller prepends UID usernames with “CN=,” which can cause problems for
LDAP authenticated binds. The controller should check for usernames with “UID” but not prepend
them with “CN=.”
LDAP authenticated binds. The controller should check for usernames with “UID” but not prepend
them with “CN=.”
•
CSCsv65475—Noise measurements for some access points might vary greatly over small intervals.
This variation occurs with no noise source present around the access point.
This variation occurs with no noise source present around the access point.
If You Need More Information
If you need information about a specific caveat that does not appear in these release notes, you can use
the Cisco Bug Toolkit to find caveats of any severity. Click this URL to browse to the Bug Toolkit:
the Cisco Bug Toolkit to find caveats of any severity. Click this URL to browse to the Bug Toolkit:
(If you request a defect that cannot be displayed, the defect number might not exist, the defect might not
yet have a customer-visible description, or the defect might be marked Cisco Confidential.)
yet have a customer-visible description, or the defect might be marked Cisco Confidential.)