Примечания к выпуску для Cisco Cisco 4404 Wireless LAN Controller
14
Release Notes for Cisco Wireless LAN Controllers and Lightweight Access Points for Release 4.0.179.8
OL-11101-01
Important Notes
•
auth_password is the authentication password, and
•
privacy_password is the privacy password.
Do not enter “default” for the username and password parameters.
Step 4
To save your changes, enter save config.
Web Authentication Limits on Hybrid-REAP Access Points
Access points in hybrid-REAP mode support web authentication with open authentication only if local
switching is enabled on the WLAN.
switching is enabled on the WLAN.
Features Not Supported on 2000 Series Controllers
These hardware features are not supported on 2000 series controllers:
•
Power over Ethernet (PoE)
•
Service port (separate out-of-band management 10/100-Mbps Ethernet interface)
These software features are not supported on 2000 series controllers:
•
VPN termination (such as IPSec and L2TP)
•
Termination of guest controller tunnels (origination of guest controller tunnels is supported)
•
External web authentication web server list
•
Layer 2 LWAPP
•
Spanning tree
•
Port mirroring
•
Cranite
•
Fortress
•
AppleTalk
•
QoS per-user bandwidth contracts
•
IPv6 pass-through
Some Clients See Only 64 Access Point MAC Addresses (BSSIDs) at a Time
In a crowded RF environment, clients may not be able to detect the desired SSID because of internal
table limitations. Sometimes disabling and then enabling the client interface forces a rescan. Your RF
environment needs to be controlled. Cisco UWN rogue access point detection and containment can help
you to enforce RF policies in your buildings and campuses.
table limitations. Sometimes disabling and then enabling the client interface forces a rescan. Your RF
environment needs to be controlled. Cisco UWN rogue access point detection and containment can help
you to enforce RF policies in your buildings and campuses.