Примечания к выпуску для Cisco Cisco 2106 Wireless LAN Controller

Скачать
Страница из 66
 
64
Release Notes for Cisco Wireless LAN Controllers and Lightweight Access Points for Release 5.2.193.0
OL-31336-01
  Caveats
CSCsy84311—A controller running software release 5.2.178.0 no longer reboots because of a 
software failure of the emWeb task.
CSCsy88329—An 1140, 1240, or 1310 series access point now successfully downloads code from 
a CAPWAP controller. 
CSCsy96551—A 1250 series access point with a channel width setting of 40 MHz no longer shows 
an error message when you set the Tx power level.
CSCsy97077—The show run-config controller CLI command is no loonger truncated, incomplete, 
or partial.
CSCsy98716—The following CLI command is now available in controller software release 5.2 or 
later: config ap ethernet duplex {auto | half | fullspeed {auto | 10 | 100 | 1000} {all | Cisco_AP}.
CSCsz15249—When packets arrive out of sequence at the controller, a CAPWAP access point now 
successfully joins the controller.
CSCsz17157—When voice traffic runs continuously on 1130 or 1240 series access points for a 
prolonged period of time, the access points reboot on the CPU voice metrics task.
CSCsz19675—Controllers no longer reboot unexpectedly when LDAP authentication is enabled.
CSCsz20036—CPU access control list (ACL) configurations are no longer modified during 
configuration backups.
CSCsz22520—You can now disable the DHCP Required option on a WLAN without removing the 
DHCP override configuration.
CSCsz22901—The access point does not forward the DHCP offer to the client, so the client fails to 
get an IP address.
CSCsz30842—526 controllers now support local EAP authentication.
CSCsz48460—An access point might reboot with the following traceback:
-Traceback= 0x4F6768 0x4F674C 0x4F5DAC 0x4F674C 0x4F4FC8 0x4F5DAC 0x4F65C0 0x4FE6CC 
0x507188 0x4E4498 0x2D46EC
CSCsz50130—The command to change the scan time for MIC errors, config wlan security tkip 
hold-down
 {0-60 secondswlan_id, no longer reverts to the default setting after reboot.
CSCsz51403—The %APF-1-USER_DEL_FAILED: apf_ms.c:5055 message no longer floods the 
controller system message log.
CSCsz55922—Lock assert no longer occurs when you upgrade from controller release 4.2.205 to 
5.2.x.
CSCsz56454—Controller logs are no longer flooded with messages about access points 
impersonating legitimate access points.
CSCsz57758—1140 series access points no longer reboot too quickly after downloading the 
configuration from the controller.
CSCsz57828—Some counters for 1140 series access points, such as multiple retry count, fail to 
increment in the output of the show ap stats command.
CSCsz79080—When a WLAN template with Layer 3 web authentication policies is applied to the 
controller, the following message no longer appears: “SNMP operation to Device failed: attempt to 
set conflicting attribute value.”
CSCsz79385—The SNMP agent on the controller now successfully updates the dynamic interface 
on WLANs.