Примечания к выпуску для Cisco Cisco 2106 Wireless LAN Controller

Скачать
Страница из 66
 
24
Release Notes for Cisco Wireless LAN Controllers and Lightweight Access Points for Release 5.2.193.0
OL-31336-01
  Important Notes for Controllers and Non-Mesh Access Points
Changing the Default Values of SNMP Community Strings
The controller has commonly known default values of “public” and “private” for the read-only and 
read-write SNMP community strings. Using these standard values presents a security risk. Therefore, 
Cisco strongly advises that you change these values. Refer to the Cisco Wireless LAN Controller 
Configuration Guide, Release 5.2
 for configuration instructions.
Changing the Default Values for SNMP v3 Users
The controller uses a default value of “default” for the username, authentication password, and privacy 
password for SNMP v3 users. Using these standard values presents a security risk. Therefore, Cisco 
strongly advises that you change these values. Refer to the Cisco Wireless LAN Controller Configuration 
Guide, Release 5.2
 for configuration instructions.
Note
SNMP v3 is time sensitive. Make sure that you have configured the correct time and time zone on your 
controller.
Features Not Supported on 2100 Series Controllers
This hardware feature is not supported on 2100 series controllers:
Service port (separate out-of-band management 10/100-Mbps Ethernet interface)
These software features are not supported on 2100 series controllers:
VPN termination (such as IPSec and L2TP)
Termination of guest controller tunnels (origination of guest controller tunnels is supported)
External web authentication web server list
Spanning tree
Port mirroring
AppleTalk
QoS per-user bandwidth contracts
IPv6 pass-through
Link aggregation (LAG)
Multicast-unicast mode
Some Clients See Only 64 Access Point MAC Addresses (BSSIDs) at a Time
In a crowded RF environment, clients may not be able to detect the desired SSID because of internal 
table limitations. Sometimes disabling and then enabling the client interface forces a rescan. Your RF 
environment needs to be controlled. Cisco UWN rogue access point detection and containment can help 
you to enforce RF policies in your buildings and campuses.