Примечания к выпуску для Cisco Cisco 2106 Wireless LAN Controller
58
Release Notes for Cisco Wireless LAN Controllers and Lightweight Access Points for Release 5.2.193.0
OL-31336-01
Caveats
•
CSCsm19182—When an 802.11n radio is operating on channels 52 through 140, the channel width
is configured for 40 MHz, and a radar event is detected, it is possible for the radio interface to
become disabled instead of moving to another channel. This problem occurs when the access point
is operating in the vicinity of radar operations or under extreme traffic conditions (when a false radar
detection might occur).
is configured for 40 MHz, and a radar event is detected, it is possible for the radio interface to
become disabled instead of moving to another channel. This problem occurs when the access point
is operating in the vicinity of radar operations or under extreme traffic conditions (when a false radar
detection might occur).
•
CSCsm32845—The Guest LAN parameter on the Interfaces > Edit page of the controller GUI has
been modified to avoid confusion for users.
been modified to avoid confusion for users.
•
CSCso05337—Devices that are running Cisco IOS software and configured for the mobile IP
network address translation (NAT) traversal feature or mobile IPv6 are vulnerable to a
denial-of-service (DoS) attack that could result in a blocked interface. Cisco has released free
software updates that address these vulnerabilities. This advisory is posted at the following link:
network address translation (NAT) traversal feature or mobile IPv6 are vulnerable to a
denial-of-service (DoS) attack that could result in a blocked interface. Cisco has released free
software updates that address these vulnerabilities. This advisory is posted at the following link:
•
CSCsq23806—Guest tunneling now works when the WLAN on the foreign controller is created by
the controller GUI and the WLAN on the anchor controller is created by WCS.
the controller GUI and the WLAN on the anchor controller is created by WCS.
•
CSCsq41190—The controller GUI now lists WEP settings in industry standard increments.
•
CSCsr58034—Rogue rules and friendly access points are now uploaded and downloaded properly.
•
CSCsr60506—The controller no longer unexpectedly reboots at spamReceiveTask with a signal 11
error (segmentation fault).
error (segmentation fault).
•
CSCsr70862—A Cisco WiSM controller running software release 4.2.130.0 no longer reboots
because of a software failure of the instruction located at 0x1038a140(ewsInternalAbort+348).
because of a software failure of the instruction located at 0x1038a140(ewsInternalAbort+348).
•
CSCsr72301—Three separate Cisco IOS Hypertext Transfer Protocol (HTTP) cross-site scripting
(XSS) vulnerabilities and a cross-site request forgery (CSRF) vulnerability have been reported to
Cisco by three independent researchers. The Cisco Security Response is posted at the following link:
(XSS) vulnerabilities and a cross-site request forgery (CSRF) vulnerability have been reported to
Cisco by three independent researchers. The Cisco Security Response is posted at the following link:
•
CSCsr89694—Cisco WiSM controllers running software release 4.2.130.0 no longer randomly
generate trap logs indicating that the control path between two random mobility members is down.
generate trap logs indicating that the control path between two random mobility members is down.
•
CSCsu57111—The following tracebacks no longer appear in the controller message logs:
“apf_foreignap.c:1292 APF-1-CHANGE_ORPHAN_PKT_IP: Changing orphan packet IP address
for station00:11:22:33:44:55 from x.x.x.x --->y.y.y.y- Traceback: 100cd4c0 100cddd0 100e40a8
10409864 10c064cc 10d748d8.”
“apf_foreignap.c:1292 APF-1-CHANGE_ORPHAN_PKT_IP: Changing orphan packet IP address
for station00:11:22:33:44:55 from x.x.x.x --->y.y.y.y- Traceback: 100cd4c0 100cddd0 100e40a8
10409864 10c064cc 10d748d8.”
•
CSCsu62060—The 4400 series controller no longer reboots because of a software failure of the
tplusTransportThread task.
tplusTransportThread task.
•
CSCsu71747—On a Catalyst 3750G Wireless LAN Controller Switch running software release
5.1.151.0, the integer value returned by the SNMP object now returns three indexes.
5.1.151.0, the integer value returned by the SNMP object now returns three indexes.
•
CSCsu96916—When you issue the show run-config CLI command using SSH on a 4400 series
controller running software release 4.2.130.0 with paging disabled, the output no longer locks up.
controller running software release 4.2.130.0 with paging disabled, the output no longer locks up.
•
CSCsv00108—The controller might report an invalid message integrity check (MIC) on beacon
frames.
frames.
•
CSCsv01844—When you filter clients using the controller GUI, the controller no longer repeats the
last two characters of the filter text, and the filter now works.
last two characters of the filter text, and the filter now works.
•
CSCsv12308—When the controller has to use its default gateway to talk to an access point, the
access point now sees the join reply from the controller.
access point now sees the join reply from the controller.
•
CSCsv34354—When you use SNMP to change the session timeout for a WLAN, the ACL name is
no longer set to None.
no longer set to None.