Примечания к выпуску для Cisco Cisco 2000 Series Wireless LAN Controller

Скачать
Страница из 18
 
8
Release Notes for Cisco Wireless LAN Controller and Cisco Lightweight Access Point for Release 3.1.105.0
OL-7431-03
  Important Notes
IPSec Clients Supported in this Release
This operating system release has been tested with the following IPSec clients:
NetScreen v8.0.0
Cisco Unity v3.6.2
SSH Sentinel v1.3.2(1)
Movian v3.0
The Netscreen client does not handle fragmented ICMP packets, does not respond to large ping packets, 
and does not work with certificates. Other IP fragmented traffic should work correctly.
Maximum MAC Filter Entries
The Wireless LAN Controller database can contain up to 2048 MAC filter entries for local netusers 
(CSCar12371). 
Client Channel Changes
Cisco lightweight access points are know to go off channel for up to 30 seconds while identifying 
rogue AP threats. This can cause occasional dropped client connections (CSCar10047). 
Cisco Aironet 1030 Remote Edge Lightweight Access Point WPA2-PSK in 
Standalone Mode
Cisco Aironet 1030 remote edge lightweight access points do not support WPA2-PSK in REAP 
standalone mode.
XAuth Configuration with NetScreen
Do not enable XAuth on the NetScreen client. Configure XAuth on the Wireless LAN Controller. The 
Wireless LAN Controller initiates the XAuth session and the NetScreen client responds and begins 
interoperating. Configure the NetScreen client with pre-shared keys only. You also need to set up a 
separate connection in the clear to your DHCP server.
Rekeys Not Supported with Cisco VPN Client 
If a rekey occurs clients must reauthenticate. To mitigate this problem, log into the Web user interface, 
navigate to the WLANs page, select Edit to display the WLANs > Edit page, choose Advanced 
Configuration, and change Lifetime (seconds) to a large value, such as 28800 seconds (this is the 
default), depending upon your security requirements.