Примечания к выпуску для Cisco Cisco 2106 Wireless LAN Controller
11
Release Notes for Cisco Wireless LAN Controllers and Lightweight Access Points for Release 6.0.182.0
OL-31336-01
Software Release Information
Note
To load the SDM IPv6 template in the Cisco Catalyst 3750 switch, enter this command
and then reset the switch: sdm prefer dual-ipv4-and-v6 default. For more information,
refer to the Cisco Catalyst 3750 switch configuration guide for Cisco IOS Release
12.2(46)SE.
and then reset the switch: sdm prefer dual-ipv4-and-v6 default. For more information,
refer to the Cisco Catalyst 3750 switch configuration guide for Cisco IOS Release
12.2(46)SE.
•
Local Database Entries—You can now use the controller GUI or CLI to view the number of entries
that are currently in the local database.
that are currently in the local database.
•
Network Mobility Services Protocol (NMSP)—The CLI commands to set the NMSP notification
interval value for clients, RFID tags, and rogue clients and access points have been modified, and
some new commands have been added to view NMSP information and debug NMSP issues.
interval value for clients, RFID tags, and rogue clients and access points have been modified, and
some new commands have been added to view NMSP information and debug NMSP issues.
•
RADIUS Configuration—The config radius {auth | acct} mac-delimiter {colon | hyphen |
single-hyphen | none} CLI command has been added to enable you to specify the delimiter to be
used in the MAC addresses that are sent to the RADIUS authentication or accounting server in
Access-Request messages.
single-hyphen | none} CLI command has been added to enable you to specify the delimiter to be
used in the MAC addresses that are sent to the RADIUS authentication or accounting server in
Access-Request messages.
•
Rogue Detection—Rogue detection is enabled by default for all access points joined to the
controller (except for OfficeExtend access points). However, in controller software release 6.0, you
can enable or disable it for individual access points.
controller (except for OfficeExtend access points). However, in controller software release 6.0, you
can enable or disable it for individual access points.
•
Telnet-SSH Configuration—You can now use the controller GUI to configure Telnet and Secure
Shell (SSH) sessions or to troubleshoot lightweight access points. Previously, these operations could
be configured only from the controller CLI. In addition, the CLI commands for configuring Telnet
and SSH sessions have changed.
Shell (SSH) sessions or to troubleshoot lightweight access points. Previously, these operations could
be configured only from the controller CLI. In addition, the CLI commands for configuring Telnet
and SSH sessions have changed.
Note
By default, controllers block Telnet sessions. You must use a local connection to the serial
port and then enable Telnet sessions.
port and then enable Telnet sessions.
•
Pico Cell Configuration—You can no longer configure Pico cells using the controller GUI and CLI.
Software Release Information
Software is factory installed on your controller and automatically downloaded to the access points after
a release upgrade and whenever an access point joins a controller. As new releases become available for
the controllers and their access points, consider upgrading.
a release upgrade and whenever an access point joins a controller. As new releases become available for
the controllers and their access points, consider upgrading.
Note
The Cisco WiSM requires software release SWISMK9-32 or later. The Supervisor 720 12.2(18)SXF2
supports the Cisco WiSM software release 3.2.78.4 or later, and the Supervisor 720 12.2(18)SXF5
(Cisco IOS Software Modularity) supports the Cisco WiSM software release 4.0.155.5 (with Cisco IOS
Software Modularity).
supports the Cisco WiSM software release 3.2.78.4 or later, and the Supervisor 720 12.2(18)SXF5
(Cisco IOS Software Modularity) supports the Cisco WiSM software release 4.0.155.5 (with Cisco IOS
Software Modularity).
Note
To use the Cisco WiSM in the Cisco 7609 and 7613 Series Routers, the routers must be running Cisco
IOS Release 12.2(18)SXF5 or later.
IOS Release 12.2(18)SXF5 or later.