Caveats

CSCse26437—After a communication breakdown occurs between a controller and an access point, the access point does not send a subsequent request to join the controller.

CSCse27890—Access points in REAP mode send deauthentication frames to wireless clients without waiting for a PS poll.

CSCse29193—The controller marks a RADIUS server as dead if a single request is not responded to after five retries and switches to a backup server.

CSCse29686—After you upgrade from software release 3.2.78 to 3.2.116.21 or later, clients experience packet loss and a significant number of packet retransmissions on the AP1000. This condition is related to the antenna setting of the access point.

CSCse30397—If you enter 24 characters for the username and password during the initial controller configuration, the “Routine system resource notification” error message may appear repeatedly.

CSCse32639—Client exclusion may not operate properly when web authentication is enabled on the controller. If a wireless client becomes “excluded,” it never disassociates from the access point and may be unable to log in again.

CSCse33667—A controller running software release 3.2.116 with ssh disabled may crash without a crash dump.

CSCse36426—Controllers with AP-group VLANs configured sometimes cause WCS to hang when the controllers are added to WCS.

CSCse40350—During WPA2 client association, the access point sometimes sends a Reason 1 Deauthentication frame to the client, causing the client to disconnect and reassociate.

CSCse43767—The show client username command shows only one client even when several clients are associated with the same username.

CSCse46717—Access points sometimes reboot.

CSCse47024—Clients sometimes lose their connection to the access point.

CSCse47645—Controllers sometimes use an invalid IP address when sending pings.

CSCse48743—When the idle timeout expires for a client, the controller sometimes displays this error message: “Got an idle-timeout message from an unknown client.”

CSCse49083—Access points in REAP mode sometimes send a deauthentication packet at the end of phone calls on some handsets.

CSCse50111—The controller’s active port sometimes becomes disabled when traffic is pumped from a wireless client to a wired client.

CSCse51940—WCS sometimes displays this error message when you change the WLAN encryption type from WPA-PSK to WEP: “SNMP operation to device failed.”

CSCse53252—Controllers sometimes reboot due to an issue with the time server.

CSCse55473—The 5-GHz radios on access points sometimes remain enabled even when disabled on the controller.

CSCse58258—Access points sometimes reboot during an Assert software task.

CSCse59150—SVP packets through controllers have inconsistent timing, resulting in poor voice quality.

CSCse64508—A controller running software release 3.2.116.21 does not allow a Nortel VPN client using Contivity to connect until the date on the controller is changed from 2006 to 2005.

CSCse66940—When the primary port on a controller fails and the controller switches traffic to a backup port, all configured WLANs are deactivated.

Release Notes for Cisco Wireless LAN Controllers and Lightweight Access Points for Release 3.2.171.6

18

OL-11567-02

 

 

Page 18
Image 18
Cisco Systems OL-11567-02 manual Caveats