Примечания к выпуску для Cisco Cisco 2106 Wireless LAN Controller

Скачать
Страница из 78
 
76
Release Notes for Cisco Wireless LAN Controllers and Lightweight Access Points for Release 5.2.157.0
OL-31336-01
  Caveats
CSCsr75121—The following decrypt errors might appear in the controller trap logs:
Decrypt errors occurred for client <client mac address> using WPA key on 802.11a 
interface of AP <ap mac address>
Decrypt errors occurred for client <client mac address> using WPA2 key on 802.11b/g 
interface of AP <ap mac address>
CSCsr83671—The controller’s dynamic channel assignment (DCA) feature sets access points to channel 
36 for the 5-GHz band (802.11a).
CSCsr89403—Diversity is disabled on 2.4-GHz access point radios.
CSCsr95295—The controller CLI allows you to disable all legacy data rates with the network enabled. 
However, this invalid configuration disables the network.
CSCsr97110—After you download an XML configuration file, a 4400 series controller running 
software release 5.1.151.0 might reboot continuously.
CSCsu05190—The AP-manager does not reply with the correct destination MAC address with 
GARP. As a result, access points cannot join the controller after a failover from the primary firewall 
to the secondary firewall.
CSCsu22727—After WCS pushes an access point template to the controller, the controller might 
reboot.
CSCsu26961—Using WCS or the controller CLI, you can configure the controller for WPA+WPA2 
with 802.1x/CCKM and PSK. To see whether 802.1x/CCKM is configured at the same time with 
PSK, run the show wlan 1 or show run-config command and look at the output.
CSCsu27939—Controllers running software release 4.2.130.0 might reboot because of a software 
failure of usmWebRRMRadSlotNoiseChannelGetNext+64.
CSCsu50080—When you configure web authentication passthrough with email input on the 
controller, the controller allows any text to be entered. This feature implies that a client should have 
to enter an email address before proceeding. Although there is no way to verify that the email is 
valid, the controller should at least check that it follows this format: name@company.com.
CSCsu52812—When the controller is in multicast-unicast mode, it sends unicast traffic to an access 
point before that access point fully joins the controller. This problem is serious when the access 
point is running a recovery image that does not drop LWAPP data packets, such as 12.3(11)JX1. If 
the number of data packets sent to the access point before it gets the full image is large enough, the 
access point locks up and cannot join the controller.
CSCsv01484—The controller prepends UID usernames with “CN=,” which can cause problems for 
LDAP authenticated binds. The controller should check for usernames with “UID” but not prepend 
them with “CN=.”
CSCsv65475—Noise measurements for some access points might vary greatly over small intervals. 
This variation occurs with no noise source present around the access point.
If You Need More Information
If you need information about a specific caveat that does not appear in these release notes, you can use 
the Cisco Bug Toolkit to find caveats of any severity. Click this URL to browse to the Bug Toolkit:
(If you request a defect that cannot be displayed, the defect number might not exist, the defect might not 
yet have a customer-visible description, or the defect might be marked Cisco Confidential.)