Примечания к выпуску для Cisco Cisco 2000 Series Wireless LAN Controller

Скачать
Страница из 32
R E V I E W   D R A F T — C I S C O   C O N F I D E N T I A L
19
Release Notes for Cisco Wireless LAN Controllers and Lightweight Access Points for Release 3.2.193.5
OL-xxxxx-xx
  Caveats
<body topmargin="50" marginheight="50" onload="loadAction();"> <form method="post"> 
<input TYPE="hidden" NAME="buttonClicked" SIZE="16" MAXLENGTH="15" value="0"> <input 
TYPE="hidden" NAME="redirect_url" SIZE="255" MAXLENGTH="255" VALUE=""> <input 
TYPE="hidden" NAME="err_flag" SIZE="16" MAXLENGTH="15" value="0">
 
<div align="center">
<table border="0" cellspacing="0" cellpadding="0"> <tr> <td>&nbsp;</td></tr>
 
<tr align="center"> <td colspan="2"><font size="10" color="#336699">Web 
Authentication</font></td></tr>
 
<tr align="center">
 
<td colspan="2"> User Name &nbsp;&nbsp;&nbsp;<input type="TEXT" name="username" 
SIZE="25" MAXLENGTH="63" VALUE=""> </td> </tr> <tr align="center" > <td colspan="2"> 
Password &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<input type="Password" name="password" 
SIZE="25" MAXLENGTH="24"> </td> </tr>
 
<tr align="center">
<td colspan="2"><input type="button" name="Submit" value="Submit" class="button" 
onclick="submitAction();"> </td> </tr> </table> </div>
</form>
</body>
</html>
Caveats
This section lists resolved and open caveats for Cisco controllers and lightweight access points.
Resolved Caveats
These caveats are resolved in software release 3.2.193.5.
CSCsc12222—The certificate presented for an HTTPS session should be unique with respect to the 
issuer and serial number.
CSCsc14045—VPN passthrough should not be able to combine with web policy.
CSCsc37945—Daylight savings checkbox removed.
CSCsc92240—When you use WCS to create a VLAN, you must use lower-case letters to delete the 
interface.
CSCsc98897—SecureCRT ends the SSHv2 session after accepting server certificate.
CSCsd52292—NEC controller does not accept an upper-case MAC address from the WCS template.
CSCsd65251—Session-timeout value for 802.1x corrected on GUI.
CSCsd82363—WCS channel utilization incorrectly reported in radio utilization reports.
CSCsd85126—Access point reboots at taskId = 0x80fb3a30.
CSCse11202—WCS logs incorrect WEP key error when wireless clients run TKIP.
CSCse14889—No Ad-Hoc rogue traps generated by controller.
CSCse18855—RADIUS accounting cannot be disable on individual WLAN.
CSCse30696—Controller sometimes shows both old and new IP addresses for an access point.