Примечания к выпуску для Cisco Cisco 2000 Series Wireless LAN Controller

Скачать
Страница из 28
 
18
Release Notes for Cisco Wireless LAN Controllers and Lightweight Access Points for Release 3.2.171.6
OL-11567-02
  Caveats
CSCse26437—After a communication breakdown occurs between a controller and an access point, 
the access point does not send a subsequent request to join the controller.
CSCse27890—Access points in REAP mode send deauthentication frames to wireless clients 
without waiting for a PS poll.
CSCse29193—The controller marks a RADIUS server as dead if a single request is not responded 
to after five retries and switches to a backup server.
CSCse29686—After you upgrade from software release 3.2.78 to 3.2.116.21 or later, clients 
experience packet loss and a significant number of packet retransmissions on the AP1000. This 
condition is related to the antenna setting of the access point.
CSCse30397—If you enter 24 characters for the username and password during the initial controller 
configuration, the “Routine system resource notification” error message may appear repeatedly.
CSCse32639—Client exclusion may not operate properly when web authentication is enabled on the 
controller. If a wireless client becomes “excluded,” it never disassociates from the access point and 
may be unable to log in again.
CSCse33667—A controller running software release 3.2.116 with ssh disabled may crash without a 
crash dump.
CSCse36426—Controllers with AP-group VLANs configured sometimes cause WCS to hang when 
the controllers are added to WCS.
CSCse40350—During WPA2 client association, the access point sometimes sends a Reason 1 
Deauthentication frame to the client, causing the client to disconnect and reassociate.
CSCse43767—The show client username command shows only one client even when several 
clients are associated with the same username.
CSCse46717—Access points sometimes reboot.
CSCse47024—Clients sometimes lose their connection to the access point.
CSCse47645—Controllers sometimes use an invalid IP address when sending pings.
CSCse48743—When the idle timeout expires for a client, the controller sometimes displays this 
error message: “Got an idle-timeout message from an unknown client.”
CSCse49083—Access points in REAP mode sometimes send a deauthentication packet at the end 
of phone calls on some handsets. 
CSCse50111—The controller’s active port sometimes becomes disabled when traffic is pumped 
from a wireless client to a wired client.
CSCse51940—WCS sometimes displays this error message when you change the WLAN 
encryption type from WPA-PSK to WEP: “SNMP operation to device failed.”
CSCse53252—Controllers sometimes reboot due to an issue with the time server.
CSCse55473—The 5-GHz radios on access points sometimes remain enabled even when disabled 
on the controller.
CSCse58258—Access points sometimes reboot during an Assert software task.
CSCse59150—SVP packets through controllers have inconsistent timing, resulting in poor voice 
quality.
CSCse64508—A controller running software release 3.2.116.21 does not allow a Nortel VPN client 
using Contivity to connect until the date on the controller is changed from 2006 to 2005.
CSCse66940—When the primary port on a controller fails and the controller switches traffic to a 
backup port, all configured WLANs are deactivated.