Примечания к выпуску для Cisco Cisco 4404 Wireless LAN Controller
26
Release Notes for Cisco Wireless LAN Controllers and Lightweight Access Points for Release 3.2.195.13
OL-14249-01
Caveats
•
CSCsh24239—Some class-of-service (CoS) values may be randomly assigned to Internet Control
Message Protocol (ICMP) traffic from wireless clients.
Message Protocol (ICMP) traffic from wireless clients.
Workaround: None at this time.
•
CSCsh35098—Web authentication sends authentication requests to external authentication servers,
even when there is no authentication server configured for the WLAN. If an external authentication
server is configured on the controller and a client fails web authentication, web authentication sends
the credentials to that external authentication server for validation.
even when there is no authentication server configured for the WLAN. If an external authentication
server is configured on the controller and a client fails web authentication, web authentication sends
the credentials to that external authentication server for validation.
Workaround: Change the Web Radius Authentication type from PAP to CHAP on the Controller >
General page.
General page.
•
CSCsh41347—The following warning appears when you enter dynamic interface details and click
Apply:
Apply:
Changing the Interface parameters causes the WLANs to be temporarily disabled and thus
may result in loss of connectivity for some clients.
After accepting the warning message, the GUI does not apply the interface configuration. This
warning occurs only on a ct4000 and ct2006.
warning occurs only on a ct4000 and ct2006.
Workaround: None at this time.
•
CSCsh44942—When an ipsec client roams from a 4400 to a 4000 controller, a crash occurs in
apfReceiveTask, and a “crypto card not responding” message occurs.
apfReceiveTask, and a “crypto card not responding” message occurs.
Workaround: None at this time.
•
CSCsh45097—When associating a client to an ipsec WLAN on a 4000 locally, a “crypto card not
responding” error message appears.
responding” error message appears.
Workaround: None at this time.
•
CSCsh47792—With a Ct3500 and AP1200 in local mode, the AP1200 crashes within 10 to 15
minutes after RLDP is enabled on the controller.
minutes after RLDP is enabled on the controller.
Workaround: None at this time.
•
CSCsh47973—When the client idle timeout is expired and the client disassociates, the same
disassociation packet sent by the access point to the client is repeated numerous times.
disassociation packet sent by the access point to the client is repeated numerous times.
Workaround: None at this time.
•
CSCsh53198—When sending upstream traffic from the wireless client to the wired client, DSCP
mapping is not working on an AP1130.
mapping is not working on an AP1130.
Workaround: None at this time.
•
CSCsh54555—When a FOMA phone in extension mode roams to another access point because of
an access point failure during a conversation, another access point sends an EAPOL-KEY message
instead of an EAP-Request to the client.
an access point failure during a conversation, another access point sends an EAPOL-KEY message
instead of an EAP-Request to the client.
Workaround: None at this time.
•
CSCsh54674—The wrong default WLAN.1p value on platinum QoS profile displays
.
Workaround: None at this time.
•
CSCsh55290—A foreign WLC sends an XID for STAs on the foreign controller when an STA in the
foreign state does a DHCP release.
foreign state does a DHCP release.
Workaround: None at this time.