![]() |
Table Of Contents
Cisco Unified Wireless Network Solution Components
Upgrading to a New Software Release
VPN Termination Module for the 4400 Series Controllers
New LWAPP Power Injector Commands
Support for WPA1 and WPA2 Hex Keys
FCC Safety Compliance Statement
Controllers Must Run Release 3.2.116.21 to Support -P Regulatory Domain
Access Points Fail to Join Controllers If MTU Setting Is Less Than 1500
Operating Mesh Networks Through Switches and Routers
RADIUS Servers and the Management VLAN
Cisco 7920 Wireless IP Phone Support
Exclusion List (Blacklist) Client Feature
IPSec Clients Supported in This Release
Cisco Aironet 1030 Remote Edge Lightweight Access Points and WPA2-PSK
XAuth Configuration with NetScreen
Rekeys Not Supported with Cisco VPN Client
Management Usernames and Local Netuser Names
802.1x and Microsoft Wireless Configuration Manager
Cisco Aironet 1030 Remote Edge Lightweight Access Point Default Operation
Home Page Retains Web Auth Login with IE 5.x
Features Not Supported on 2000 Series Controllers
Some Clients See Only 64 Access Point MAC Addresses (BSSIDs) at a Time
Pinging from Any Network Device to a Dynamic Interface IP Address Is Not Supported
2006 Image Not Supported for 3504 Controllers
Running a 3504 Image on a 2000 Series Controller
Cisco Lightweight Access Points Fail to Join Cisco Controllers
Upgrading External Web Authentication
Obtaining Documentation and Submitting a Service Request
Release Notes for Cisco Wireless LAN Controllers and Lightweight Access Points for Release 3.2.116.21
March 3, 2006These release notes describe new and changed information as well as open and resolved caveats for operating system release 3.2.116.21 for Cisco 2000, 4100, and 4400 Series Wireless LAN Controllers; Cisco Wireless Services Modules (WiSM); Cisco Wireless LAN Controller Network Modules; and Cisco Aironet 1000, 1130, 1200, 1240, and 1500 Series Lightweight Access Points, which comprise part of the Cisco Unified Wireless Network (Cisco UWN) Solution.
Note
Unless otherwise noted, all of the Cisco wireless LAN controllers are hereafter referred to as controllers, and all of the Cisco lightweight access points are hereafter referred to as access points.
Contents
These release notes contain the following sections:
•
Cisco Unified Wireless Network Solution Components
•
Obtaining Documentation and Submitting a Service Request
Cisco Unified Wireless Network Solution Components
The following components are part of the Cisco UWN Solution and are compatible in this release:
•
Operating system software release 3.2.116.21 for all Cisco controllers and lightweight access points
•
Cisco Wireless Control System (WCS) software release 3.2.51.0
•
Location appliance software release 2.0.42.0
•
Cisco 2700 Series Location Appliances
•
Cisco 2000, 4100, and 4400 Series Wireless LAN Controllers
•
Cisco Wireless Service Module (WiSM) for Cisco Catalyst 6500 Series Switches
•
Cisco Wireless LAN Controller Network Module for Cisco Integrated Services Routers
•
Cisco Aironet 1000, 1130, 1200, 1240, and 1500 Lightweight Access Points
Controller Requirements
The controller graphical user interface (GUI) requires the following operating system and web browser:
•
Windows XP SP1 or higher or Windows 2000 SP4 or higher
•
Internet Explorer 6.0 SP1 or higher
Note
Internet Explorer 6.0 SP1 or higher is the only browser supported for accessing the controller GUI and for using WebAuth.
Software Release Information
Operating system software is factory installed on your controller and automatically downloaded to the access points after a release upgrade and whenever an access point associates to a controller. As new releases become available for the controllers and their associated access points, consider upgrading.
Note
The Cisco WiSM requires software release SWISMK9-32 or later.
Finding the Software Release
To find the software release running on your controller, look on the Monitor > Summary page of the controller GUI or enter show sysinfo on the controller command line interface (CLI).
Upgrading to a New Software Release
When a controller is upgraded, the code on its associated access points is also automatically upgraded. When an access point is loading code, each of its lights blinks in succession.
CautionDo not power down the controller or any access point during this process; otherwise, you might corrupt the software image! Upgrading a controller with a large number of access points can take as long as 30 minutes. The access points must remain powered, and the controller must not be reset during this time.
Cisco recommends the following sequence when performing an upgrade:
1.
Upload your controller configuration files to a server to back them up.
2.
Turn off the controller 802.11a and 802.11b networks.
3.
Upgrade your controller to software release 3.2.116.21, following the instructions in the Cisco Wireless LAN Controller Configuration Guide, Release 3.2. Click this link to browse to that document:
http://www.cisco.com/en/US/products/ps6366/products_installation_and_configuration_guides_list.html
4.
Re-enable your 802.11a and 802.11b networks.
Note
Controllers can be upgraded from one release to another. However, should you require a downgrade from one release to another, you may be unable to use the higher release configuration. The workaround is to reload the previous controller configuration files saved on the backup server or to reconfigure the controller.
New and Changed Information
VPN Termination Module for the 4400 Series Controllers
A virtual private network (VPN) termination hardware module is being released for the 4400 series controllers. As with the VPN termination module available today for the 4100 series controllers, this module enables the 4400 series controllers to terminate VPN client sessions directly on the controller. The module features these capabilities:
•
Support for one VPN termination module on the 4402 controller and one or two VPN termination modules on the 4404 controller
•
On the 4404 controller, one ESM that is shared across both NPUs
•
Automatic load balancing across modules if two modules are installed for the 4404 controller
•
Retention of the client crypto state on the original crypto card when the client moves between access points on different NPUs
•
Support for up to 1000 client VPN sessions per module
•
Up to 1 Gbps of encryption/decryption per module
•
Support for these IPsec clients: Cisco VPN Client, NetScreen Remote, SSH Sentinel, and Openswan
802.3 Bridging
Cisco 2000 series controllers support 802.3 bridging in software release 3.2.116.21. This feature is disabled by default. However, you can enable or disable it through the controller CLI by entering this command:
config network 802.3-bridging {enable | disable}
When 802.3 bridging is enabled, all of the 802.3 frames are forwarded to or from the client. The original LLC/SNAP and length of the frame is preserved during encapsulation or de-capsulation of the LWAPP data frame. For short frames, the trailer is stripped before adding the LWAPP header. Tunneling of 802.3 frames is not supported.
Note
802.3 bridging is supported only on 2000 series controllers and can be enabled or disabled only through the CLI.
Configurable DHCP Proxy
DHCP proxy is configurable in software release 3.2.116.21 using the following command:
config dhcp proxy {enable | disable}
Note
When you choose the disable option, modification of the dhcp proxy packets is reduced to the level of a relay.
New LWAPP Power Injector Commands
Two new LWAPP power injector commands are available in software release 3.2.116.21. These commands are used when the access point is powered by a power injector that is connected to a Cisco pre-Intelligent Power Management (pre-IPM) switch.
•
config ap power injector enable ap installed
This command is recommended when the customer's network contains any older Cisco 6-Watt switches that could be accidentally overloaded if connected directly to the 12-Watt access point. The access point remembers that a power injector is connected to this particular switch port. If the access point is relocated, this command must be re-issued after the presence of a new power injector is verified.
•
config ap power injector enable ap override
This command is acceptable to use when the customer's network does not contain any older Cisco 6-Watt switches that could be overloaded if connected directly to the 12-Watt access point. The access point assumes that a power injector is always connected. If the access point is relocated, it continues to assume that a power injector is present.
Support for WPA1 and WPA2 Hex Keys
Cisco controllers support WPA1 and WPA2 hex keys in software release 3.2.116.21. You can specify these keys through the controller CLI by entering these commands:
config wlan security wpa1 pre-shared-key {enable | disable} wlan_id {ascii | hex} key
config wlan security wpa2 pre-shared-key {enable | disable} wlan_id {ascii | hex} key
Installation Notes
This section contains important information to keep in mind when installing your controllers and access points.
Warnings
WarningOnly trained and qualified personnel should be allowed to install, replace, or service this equipment.
WarningRead the installation instructions before you connect the system to its power source.
WarningDo not work on the system or disconnect cables during periods of lightning activity.
WarningDo not operate your wireless network near unshielded blasting caps or in an explosive environment unless the device has been modified to be especially qualified for such use.
WarningIn order to comply with radio frequency (RF) exposure limits, the antennas for this product should be positioned no less than 6.56 ft (2 m) from your body or nearby persons.
WarningThis unit is intended for installation in restricted access areas. A restricted access area can be accessed only through the use of a special tool, lock and key, or other means of security.
Safety Information
Follow the guidelines in this section to ensure proper operation and safe use of the controllers and access points.
FCC Safety Compliance Statement
FCC Compliance with its action in ET Docket 96-8, has adopted a safety standard for human exposure to RF electromagnetic energy emitted by FCC certified equipment. When used with approved Cisco Aironet antennas, Cisco Aironet products meet the uncontrolled environmental limits found in OET-65 and ANSI C95.1, 1991. Proper operation of this radio device according to the instructions in this publication results in user exposure substantially below the FCC recommended limits.
Safety Precautions
Each year hundreds of people are killed or injured when attempting to install an antenna. In many of these cases, the victim was aware of the danger of electrocution but did not take adequate steps to avoid the hazard.
For your safety, and to help you achieve a good installation, read and follow these safety precautions. They may save your life!
1.
If you are installing an antenna for the first time, for your own safety as well as others, seek professional assistance. Your Cisco sales representative can explain which mounting method to use for the size and type of antenna you are about to install.
2.
Select your installation site with safety as well as performance in mind. Electric power lines and phone lines look alike. For your safety, assume that any overhead line can kill you.
3.
Call your electric power company. Tell them your plans and ask them to come look at your proposed installation. This is a small inconvenience considering your life is at stake.
4.
Plan your installation carefully and completely before you begin. Successfully raising a mast or tower is largely a matter of coordination. Each person should be assigned to a specific task and should know what to do and when to do it. One person should be in charge of the operation to issue instructions and watch for signs of trouble.
5.
When installing an antenna, remember:
a.
Do not use a metal ladder.
b.
Do not work on a wet or windy day.
c.
Do dress properly—shoes with rubber soles and heels, rubber gloves, and a long-sleeved shirt or jacket.
6.
If the assembly starts to drop, get away from it and let it fall. Remember that the antenna, mast, cable, and metal guy wires are all excellent conductors of electrical current. Even the slightest touch of any of these parts to a power line completes an electrical path through the antenna and the installer: you!
7.
If any part of an antenna system should come in contact with a power line, do not touch it or try to remove it yourself. Call your local power company. They will remove it safely.
8.
If an accident should occur with the power lines, call for qualified emergency help immediately.
Installation Instructions
Refer to the appropriate Quick Start Guide or Hardware Installation Guide for instructions on installing your controllers and access points.
Note
To meet regulatory restrictions, all external antenna configurations must be professionally installed.
Personnel installing the controllers and access points must understand wireless techniques and grounding methods. Access points with internal antennas can be installed by an experienced IT professional.
The controller must be installed by a network administrator or qualified IT professional, and the proper country code must be selected. Following installation, access to the controller should be password protected by the installer to maintain compliance with regulatory requirements and ensure proper unit functionality.
Important Notes
This section describes important information about the controllers and access points.
FIPS 140-2
The Cisco 4400 Series Controllers are on the NIST FIPS 140-2 Pre-Validation List.
Controllers Must Run Release 3.2.116.21 to Support -P Regulatory Domain
To support access points configured for use in Japan, you must upgrade the controller software to release 3.2.116.21. Earlier releases do not support access points configured for use in Japan (regulatory domain -P).
Access Points Fail to Join Controllers If MTU Setting Is Less Than 1500
When the network path between access points and the controller is configured for an MTU size less than 1500, the controller does not receive join requests from access points in local mode. (MTU settings less than 1500 are common when you use tunneling protocols such as IPsec VPN, GRE, and MPLS.) The access point join request is larger than 1500 bytes, so the request is fragmented. The size of the first fragment is 1500 bytes (including IP and UDP header) and the second fragment is 54 bytes (including IP and UDP header).
Access points in REAP mode are not affected by this limitation, and the problem is resolved in the 4.0 release train because the LWAPP tunnel can reassemble up to 4 fragments. The problem occurs when all four of these conditions exist on your network:
•
Your controller runs release 3.2 or earlier
•
Your controller is configured for Layer 3 LWAPP
•
The network path MTU between the access point and the controller is less than 1500 bytes
•
The access point is in local access point (LAP) mode (not REAP mode)
Workarounds
Use one of these workarounds to resolve the problem on your network:
•
Upgrade to controller software release 4.0 if the controller platform supports it.
•
Use 1030 series access points in REAP mode for locations reachable through low-MTU paths.
•
Increase the network path MTU to 1500 bytes.
Voice WLAN Configuration
Cisco recommends that load balancing always be turned off in any wireless LAN that is supporting voice, regardless of vendor. When load balancing is turned on, voice clients can hear an audible artifact when roaming, and the handset is refused at its first reassociation attempt.
Inter-Subnet Roaming
Currently, multicast traffic cannot be passed during inter-subnet roaming.
Operating Mesh Networks Through Switches and Routers
In mesh networks that operate through low-speed switches and routers, access points can disconnect from the controller, causing the controller to generate alerts.
Heavily Loaded Controller CPU
When the controller CPU is heavily loaded (for example, when doing file copies or other tasks), it does not have time to process all of the ACKs that the NPU sends in response to configuration messages. When this happens, the CPU generates error messages. However, the error messages do not impact service or functionality.
RADIUS Servers and the Management VLAN
The RADIUS server can be on any subnet as long as it can be reached by the management VLAN subnet.
The controllers can be managed via the management VLAN subnet from any other subnet that can reach the management VLAN subnet.
Cisco 7920 Wireless IP Phone Support
When using Cisco 7920 Wireless IP Phones with controllers, make sure that the phones and controllers are configured as follows:
•
Aggressive load balancing must be disabled on a per-controller basis. Otherwise, the initial roam attempt by the phone may fail, causing a disruption in the audio path.
•
The QoS Basis Service Set (QBSS) information element (IE) must be enabled. The QBSS IE enables the access points to communicate their channel usage to wireless devices. Because access points with high channel usage might not be able to handle real-time traffic effectively, the 7920 phone uses the QBSS value to determine if it should associate with another access point. Use the following commands to enable the QBSS IE:
–
sh wlan summary
Note
Use this command to determine the WLAN ID number of the WLAN to which you want to add QBSS support.
–
config wlan disable wlan_id_number
–
config wlan 7920-support ap-cac-limit enable wlan_id_number
–
config wlan enable wlan_id_number
–
sh wlan wlan_id_number
Note
Use this command to verify that the WLAN is enabled and the Dot11-Phone Mode (7920) field is configured for compat mode.
–
save config
•
The Dynamic Transmit Power Control (DTPC) information element (IE) must be enabled using the config 802.11a dtpc enable command. The DTPC IE is a beacon and probe information element that allows the access point to broadcast information on its transmit power. The Cisco 7920 Wireless IP Phone uses this information to automatically adjust its transmit power to the same level as the access point to which it is associated. In this manner, both devices are transmitting at the same level.
•
The 7920 phones and the controllers do not currently use compatible fast roaming mechanisms. The phone uses CCKM while the controllers use proactive key caching (PKC). To minimize roaming latency, static WEP is the recommended security mechanism.
•
When configuring WEP, there is a difference in nomenclature for the controller and the 7920 phone. Configure the controller for 104 bits when using 128-bit WEP for the 7920.
Exclusion List (Blacklist) Client Feature
If a client is not able to connect to an access point and the security policy for the WLAN and/or client is correct, the client has probably been disabled. In the controller GUI, you can view the client's status on the Monitor > Summary page under Client Summary. If the client is disabled, click Remove to clear the disabled state for that client. The client automatically comes back and, if necessary, reattempts authentication.
Automatic disabling happens as a result of too many failed authentications. Clients disabled due to failed authorization do not appear on the permanent disable display. This display is only for those MACs that are set as permanently disabled by the administrator.
IPSec Clients Supported in This Release
This operating system release has been tested with the following IPSec clients:
•
NetScreen v10.1.1 (build 10)
•
Cisco VPN Client v4.6.04
•
SSH Sentinel v1.4.1
•
Openswan v2.4.0
Note
The Netscreen client does not handle fragmented ICMP packets, does not respond to large ping packets, and does not work with certificates. Other IP fragmented traffic should work correctly.
Maximum MAC Filter Entries
The controller database can contain up to 2048 MAC filter entries for local netusers.
Client Channel Changes
Cisco access points are known to go off channel for up to 30 seconds while identifying rogue access point threats. This activity can cause occasional dropped client connections.
Cisco Aironet 1030 Remote Edge Lightweight Access Points and WPA2-PSK
Cisco Aironet 1030 Remote Edge Lightweight Access Points do not support WPA2-PSK in REAP standalone mode.
XAuth Configuration with NetScreen
To initiate an XAuth session, configure XAuth on the controller and enable extended authentication on the NetScreen client.
Rekeys Not Supported with Cisco VPN Client
If a rekey occurs, clients must reauthenticate. To mitigate this problem, navigate to the WLANs > Edit page in the controller GUI, choose IPsec from the Layer 3 Security drop-down box, and change the Lifetime setting at the bottom of the page to a large value, such as 28800 seconds (this is the default value), depending upon your security requirements.
RADIUS Servers
This product has been tested with the following RADIUS servers:
•
CiscoSecure ACS v3.2
•
Funk Odyssey Client v1.1 and 2.0
•
Funk Steel-Belted RADIUS release 4.71.739 and 5.03 Enterprise Edition
•
Microsoft Internet Authentication Service (IAS) release 5.2.3790.1830 on Windows 2003 server
Management Usernames and Local Netuser Names
Management usernames and local netuser names must be unique because they are stored in the same database. That is, you cannot assign the same name to a management user and a local netuser.
802.1x and Microsoft Wireless Configuration Manager
Clients using the Microsoft Wireless Configuration Manager and 802.1x must use WLANs configured for 40- or 104-bit key length. Configuring for 128-bit key length results in clients that can associate but not authenticate.
Cisco Aironet 1030 Remote Edge Lightweight Access Point Default Operation
When a controller reboots, dropped Cisco Aironet 1030 Remote Edge Lightweight Access Points attempt to associate to any available controller. If the access points cannot contact a controller, they continue to offer 802.11a/b/g service on WLAN 1 only.
WEP Keys
This release supports four separate WEP index keys. These keys cannot be duplicated between WLANs. At most, four WEP WLANs can be configured on a controller. Each of these WLANs must use a different key index.
Using the Backup Image
The controller bootloader (ppcboot) stores a copy of the active primary image and the backup image. If the primary image becomes corrupted, you can use the bootloader to boot with the backup image.
With the backup image stored before rebooting, be sure to choose Option 4: Change Active Boot Image from the boot menu to set the backup image as the active boot image. Otherwise, when the controller resets, it again boots off the corrupted primary image.
After the controller boots, the active boot image can be changed to the backup image using the config boot backup command.
Home Page Retains Web Auth Login with IE 5.x
Due to a caching issue in the Internet Explorer 5.x browser, the home page retains the web authentication login. To correct this issue, clear the history or upgrade your workstation to Internet Explorer 6.x.
RLDP Enable/Disable
The RLDP protocol detects rogues on your wired network. When RLDP is enabled, the controller reports a threat alarm for each rogue detected on the wired network. When RLDP is disabled, rogues detected on the wired network are shown in the Alert state.
Disabling RLDP stops the controller from detecting rogues on the wired network. Rogues can be manually contained by changing the status of the detected rogues. When rogues are being contained, you must manually disable containment for each rogue individually.
Ad-Hoc Rogue Containment
Client card implementations may mitigate the effectiveness of ad hoc containment.
Apple iBook
Some Apple operating systems require shared key authentication for WEP. Other releases of the operating system do not work with shared key WEP unless the client saves the key in its key ring. How you should configure your controller is based on the client mix you expect to use. Cisco recommends testing these configurations before deployment.
Features Not Supported on 2000 Series Controllers
These hardware features are not supported on 2000 series controllers:
•
Power over Ethernet
•
Service port (separate out-of-band management 10/100-Mbps Ethernet interface)
These software features are not supported on 2000 series controllers:
•
VPN termination (such as IPSec and L2TP)
•
Termination of guest controller tunnels (Origination of guest controller tunnels is supported)
•
External web authentication web server list
•
Layer 2 LWAPP
•
Spanning tree
•
Port mirroring
•
Cranite
•
Fortress
•
AppleTalk
•
QoS per-user bandwidth contracts
•
IPv6 pass-through
Some Clients See Only 64 Access Point MAC Addresses (BSSIDs) at a Time
In a crowded RF environment, clients may not be able to detect the desired SSID because of internal table limitations. Sometimes disabling and then enabling the client interface forces a rescan. Your RF environment needs to be controlled. Cisco UWN rogue access point detection and containment can help you to enforce RF policies in your buildings and campuses.
Pinging from Any Network Device to a Dynamic Interface IP Address Is Not Supported
Clients on the WLAN associated with the interface pass traffic normally.
2006 Image Not Supported for 3504 Controllers
The 2006 controller image is supported for use with only 2000 series controllers. Do not install the 2006 image on a 3504 controller. Otherwise, errors may occur. Install only the 3504 image on a 3504 controller.
Running a 3504 Image on a 2000 Series Controller
It is possible to run a 3504 controller image on a 2000 series controller, but Cisco Aironet 1130, 1200, and 1240 series access points will not be able to connect to the controller.
Cisco Lightweight Access Points Fail to Join Cisco Controllers
When a Cisco lightweight access point is connected to a terminal server port and reboots because of a join failure or timeout, this sequence repeats until the access point returns to the boot prompt and remains there. This condition occurs when there is no telnet session to the access point's console port and when the controller is not responding to the access point's join response.
Workaround: Disconnect the access point's console port from the terminal server. Reprogram the controller to have it respond to the access point's join request. Power cycle the access point to force a restart.
Upgrading External Web Authentication
When upgrading a controller from operating system release 2.0 or 2.2.127.4 to release 3.2.116.21, update the external web authentication configuration as follows:
1.
Instead of using a preauthentication ACL, the network manager must configure the external web server IP address using this command:
config custom-web ext-webserver add IP-address
Note
IP-address is the address of any web server that performs external web authentication.
2.
The network manager must use the new login_template shown here:
<html><head><meta http-equiv="Pragma" content="no-cache"> <meta HTTP-EQUIV="Content-Type" CONTENT="text/html; charset=iso-8859-1"> <title>Web Authentication</title> <script>function submitAction(){var link = document.location.href;var searchString = "redirect=";var equalIndex = link.indexOf(searchString);var redirectUrl = "";var urlStr = "";if(equalIndex > 0) {equalIndex += searchString.length;urlStr = link.substring(equalIndex);if(urlStr.length > 0){redirectUrl += urlStr;if(redirectUrl.length > 255)redirectUrl = redirectUrl.substring(0,255);document.forms[0].redirect_url.value = redirectUrl;}}document.forms[0].buttonClicked.value = 4;document.forms[0].submit();}function loadAction(){var url = window.location.href;var args = new Object();var query = location.search.substring(1);var pairs = query.split("&");for(var i=0;i<pairs.length;i++){var pos = pairs[i].indexOf('=');if(pos == -1) continue;var argname = pairs[i].substring(0,pos);var value = pairs[i].substring(pos+1);args[argname] = unescape(value);}//alert( "AP MAC Address is " + args.ap_mac);//alert( "The Switch URL is " + args.switch_url);document.forms[0].action = args.switch_url;// This is the status code returned from webauth login action// Any value of status code from 1 to 5 is error condition and user// should be shown error as below or modify the message as it suits// the customerif(args.statusCode == 1){alert("You are already logged in. No further action is required on your part.");}else if(args.statusCode == 2){alert("You are not configured to authenticate against web portal. No further action is required on your part.");}else if(args.statusCode == 3){alert("The username specified cannot be used at this time. Perhaps the username is already logged into the system?");}else if(args.statusCode == 4){alert("Wrong username and password. Please try again.");}else if(args.statusCode == 5){alert("The User Name and Password combination you have entered is invalid. Please try again.");}}</script></head><body topmargin="50" marginheight="50" onload="loadAction();"> <form method="post"> <input TYPE="hidden" NAME="buttonClicked" SIZE="16" MAXLENGTH="15" value="0"> <input TYPE="hidden" NAME="redirect_url" SIZE="255" MAXLENGTH="255" VALUE=""> <input TYPE="hidden" NAME="err_flag" SIZE="16" MAXLENGTH="15" value="0"><div align="center"><table border="0" cellspacing="0" cellpadding="0"> <tr> <td> </td></tr><tr align="center"> <td colspan="2"><font size="10" color="#336699">Web Authentication</font></td></tr><tr align="center"><td colspan="2"> User Name <input type="TEXT" name="username" SIZE="25" MAXLENGTH="63" VALUE=""> </td> </tr> <tr align="center" > <td colspan="2"> Password <input type="Password" name="password" SIZE="25" MAXLENGTH="24"> </td> </tr><tr align="center"><td colspan="2"><input type="button" name="Submit" value="Submit" class="button" onclick="submitAction();"> </td> </tr> </table> </div></form></body></html>Caveats
This section lists resolved and open caveats in operating system release 3.2.116.21 for Cisco controllers and lightweight access points.
Resolved Caveats
These caveats are resolved in operating system release 3.2.116.21.
•
CSCeh68636—If a power injector is inserted between an AP1131 or AP1242 and a Cisco Catalyst switch and an AC power adapter is connected directly to the access point, the access point does not use the power from the switch. After the access point boots up, it waits for CDP packets from the switch. If the output power of the switch does not support the access point, the access point changes both 802.11 radio interfaces to a reset state.
•
CSCsb13548—Cisco lightweight access points frequently reset.
•
CSCsb63749—A client on an anchor controller cannot ping another client that has roamed to a foreign 2006 controller.
•
CSCsb76419—The client state appears on two switches in a Layer 2 roaming environment.
•
CSCsb78835—The controllers are not sending all rogue trap information to Cisco WCS.
•
CSCsb88424—Cisco Aironet 1030 Remote Edge Lightweight Access Points in REAP mode reboot continuously.
•
CSCsb97559—The candidate list returned by the controller in association/reassociation responses may have an access point that the client cannot reach as the top-most entry.
•
CSCsc06090—For some systems with a large number of access points and controllers, the rogue access point scheduled task can take up to 35 or 45 minutes to complete.
•
CSCsc33769—The controller's radio resource management (RRM) algorithms set the transmit power to 6 on Cisco Aironet 1000 Series Lightweight Access Points.
•
CSCsc37217—Over the temperature extremes of the product specification (and primarily at the hot temperature extreme of 55 degrees Celsius), the Cisco Aironet 1500 Series Lightweight Outdoor Access Point may not meet the IEEE 802.11a/b/g transmitter linearity parameter of error vector magnitude (EVM) of the 54Mb and 48Mb product specification.
•
CSCsc42773—LWAPP-enabled 1130 and 1200 series access points may shut down their radio interfaces because of insufficient power from power over Ethernet (PoE).
•
CSCsc42923—A 32-character SSID does not allow access points to join the controller.
•
CSCsc43587—The controller crashes in the apfReceiveTask software.
•
CSCsc47951—The mmListen task may miss the software watchdog, causing the controller to reboot.
•
CSCsc49148—The 2006 controller may crash because of a stack corruption of the apfRogueTask. When an SSID of 32 characters is advertised by the rogue access point, such a crash is likely.
•
CSCsc51291—An EAP ID request is always sent to the client when the PMK/WEP+ cache expires, even if the client is not associated to a WLAN that is configured for WEP+ or WPA2 security.
•
CSCsc59377—Access points fail to join a controller with sustained high CPU utilization (~97%). During a user-initiated reboot, the access points fail to join the controller until the access point count is reduced from 32 to 25. After the initial 25 join, the remaining access points can be added and will join the controller.
•
CSCsc63217—Some AP1000 units are shipping from the factory with their LEDs disabled by default. Therefore, it appears as though the access points are not operating correctly.
•
CSCsc70407—The controller may stop accepting new IPSec client authentications.
•
CSCsc72027—Due to insufficient power over Ethernet (PoE), some access point radios may remain in reset even if a power injector is being used. When the access point is connected to a Cisco switch running older code that does not support intelligent power management (IPM), you must configure the access point for the inline power source. Two new LWAPP power injector commands are available for this purpose. See the "New LWAPP Power Injector Commands" section for information on these commands.
•
CSCsc72479—If an access point has a space in its name, the access point's configuration cannot be cleared and a static IP address cannot be assigned. This problem occurs only in the controller CLI, not in the GUI.
•
CSCsc72899—A deadlock between tNetTask and spam task (when packets are being processed by one task while discovery is occurring) causes a REAP access point to crash.
•
CSCsc75655—The IKE test suite causes the controller to reboot. For more details, see the Cisco Security Advisory for this issue:
http://www.cisco.com/en/US/products/csa/cisco-sa-20051114-ipsec.html
•
CSCsc76782—When the controller terminates a client session, the access points need to see a deauthentication message.
•
CSCsc82863—Hewlett-Packard (HP) laptops with Intel 2200 b/g or 2915 a/b/g clients may bluescreen and reboot after associating to a Cisco 1130 or 1230 access point that is running LWAPP with PEAP encryption. This problem occurs most often during logon, but it may also occur during logoff.
•
CSCsc85671—When you modify any of the settings on the MAC Filtering page in the controller GUI and click Apply, the change is not reflected on other GUI pages.
•
CSCsc86705—The controller becomes unstable and may crash when the system is configured for Cranite Layer 2 security and the system is being used by more than two users.
•
CSCsc87698—If you create a TKIP WLAN with a key cache size that is not in the 0 to 31 range, the access point crashes.
•
CSCsc91461—The controller cannot bring up the 802.11g radio interface if the access point's 802.11g radio is disabled.
•
CSCsc93617—The lack of a MAC address during a secure shell (SSH) delete leads to an eventual crash of the controller.
•
CSCsc94879—Cisco 1200 series access points continue to stream RTP packets to the Cisco 7920 Wireless IP Phone after the 7920 sends a deauthentication packet to the access point.
•
CSCsc96640—Web authentication does not operate properly when clustered Checkpoint firewalls are set as the client's default gateway.
•
CSCsc97687—Client devices experience slow roam times due to WPA-PSK failures.
•
CSCsc98586—The controller's backup port is not operating correctly when configured for the management and dynamic interfaces. If the primary ports fails, the active port is not changed to the secondary port, and connectivity to the controller is lost.
•
CSCsd00921—The controller does not accept broadcast discovery requests on the AP-manager interface if link aggregation (LAG) is enabled.
•
CSCsd02525—If a Cisco 1200 series access point is reset while the 802.11a network is disabled, the access point sends a change state event to the controller when it comes back up indicating that its 802.11a radio is operational, but the power-over-Ethernet (PoE) power detection takes some time to complete.
•
CSCsd03939—Enabling or disabling the 802.11g network causes the access points joined to the controller to reboot. This is normal operating behavior. However, no messages appear to explain why the access points suddenly reboot when WCS templates are applied and change the 802.11g state.
•
CSCsd04657—The primary controller sends an LWAPP discovery response even when the maximum number of access points are joined, which causes any new access points to attempt to join the primary controller without trying the secondary or tertiary controller.
•
CSCsd09768—The AP1000 loses its Ethernet buffers due to an invalid ARP packet generated by the neighbor switch. As a result, it is unable to receive any packets, including the DHCP offer, and becomes stuck in the DHCP Discover state.
•
CSCsd09898—If a client has crypto handles that are set to 0, which is an invalid value, the traffic stops flowing for that particular client. Other clients with valid crypto handles are unaffected.
•
CSCsd11774—LWAPP-enabled 1130 and 1230 access points may fragment large packets into two files after the LWAPP header is added and then do not send the second fragment to the controller.
•
CSCsd14113—When the controller receives a delayed Access Request (with an ID out of order) from an MS-PEAP client, it adjusts the order of the packet and sends the request to the RADIUS server. However, the client fails to authenticate.
•
CSCsd21147—When a client device roams from one controller to another, the ARP filters for the client are not deleted properly.
•
CSCsd21248—A memory leak in buffer pool 0 in the NPU driver causes CPU/NPU communications to fail.
•
CSCsd22087—Intel 2200 b/g clients cannot pass traffic with an AP1000 in 802.11g mode. This condition remains for 5 to 60 seconds and then recovers, but it can occur quite frequently.
•
CSCsd32642, CSCsd23190, and CSCsc95614—The max retry count from the controller is being used as the total number of retries allowed per packet rather than the number of retries per rate. Therefore, the controller cannot rate shift down if a client needs lower rates.
•
CSCsd44941—The 2.4-GHz radio in some AP1130 and AP1240 units produced after 1/23/2006 can enter a state in which all clients disassociate and the access points can no longer communicate with the clients.
Open Caveats
These caveats are open in operating system release 3.2.116.21.
•
CSCar14535—When configuring a mobility group anchor that is not part of the mobility member list, the controller displays an "Invalid Parameter Provided" error message.
Workaround: Make sure that the anchor controller is a mobility group member.
•
CSCek16101—The Controller Network Module does not have the correct time when it is first booted up because it does not have a real-time clock. Therefore, it contacts the NTP server during the initial bootup to obtain the correct time. If the controller cannot reach the NTP server, it eventually gives up and boots without the correct time. When this happens, access points cannot register with the controller. The controller must wait for at least one hour before trying to poll the NTP server again for the correct time.
Workaround: Manually configure the correct time on the controller (config time manual date time) or reconfigure the NTP server entry on the controller (config time ntp server inxex IP-address). The second option triggers the controller to connect to the NTP server and synchronize its time.
•
CSCsa89818—PDAs are unable to associate with Cisco Aironet 1030 Remote Edge Lightweight Access Points in REAP mode although local mode works correctly.
Workaround: None at this time.
•
CSCsa95763—The controller GUI cannot display more than 80 local net users on the Security > AAA > Local Net Users page.
Workaround: Use the controller CLI to view all the Local Net User entries.
•
CSCsb01980—When the operator enters incorrect data for the management interface in the controller web configuration wizard, error messages are shown only at the end of the wizard, and the user must return to the Management Interface page for correction. The data entered on the Management Interface page, such as the port number, are not validated immediately but at the end of the wizard. As a result, any error messages are shown only at the end.
Workaround: This problem can cause some inconvenience, and the user may prefer to use the CLI configuration wizard instead to avoid it.
•
CSCsb01983—The controller web configuration wizard is not reachable after making repeated invalid entries for the management interface port. If an operator connects to the wizard on address 192.168.1.1 and enters an invalid port number on the Management Interface page, the operator is redirected at the end of the wizard to the Management Interface page to correct the port. If the operator enters an incorrect port and submits, the wizard becomes inaccessible.
Workaround: Reboot the controller through the CLI to access the wizard again.
•
CSCsb20269—On the WiSM, when the service VLAN is configured as one of the VLANs on a data port, it does not operate correctly.
Workaround: Do not configure the service VLAN as one of the VLANs on a data port.
•
CSCsb34149—Disabling or deleting a wireless LAN on which a large number of clients exists may not result in all clients being deleted. This generally occurs when several thousand clients are using the wireless LAN.
Workaround: Make sure that wireless LANs with a large number of clients associated are not deleted or disabled.
•
CSCsb38486—The Cisco Aironet 1500 Series Lightweight Outdoor Access Point Bridge CLI does not accept 10-character bridge group names.
Workaround: Use 9-character bridge group names.
•
CSCsb39522—When a user changes the setting from a static IP address to DHCP and the DHCP IP address is not available, the supervisor loses keepalive, and the WiSM sends a WCP going down trap. Similarly, when a user changes a static IP address and enters an incorrect subnet on the service port, the supervisor detects a loss of WCP keepalive, and the WiSM sends a WCP going down trap.
Workaround: None at this time.
Note
WCP is the protocol running between the Cisco Catalyst 6500 Series Switch Supervisor and the WiSM. The supervisor uses WCP to monitor the health of the WiSM. If you enter the show wism status command or see a WiSM down trap on WCS, make sure that the WiSM service port and the supervisor are configured correctly. WCP can fail because of an incorrect configuration.
•
CSCsb48197—Multiple authentication requests to the WCS server.
Workaround: None in this release.
•
CSCsb52557—Cisco access points do not connect to the 4400 series controller if the time is not set first.
Workaround: Set the time on the controller before allowing the access points to connect to the controller.
•
CSCsb53746—A 350 or CB20A client running ACU 6.5 or 6.4 and configured for LEAP authentication with WPA1 encryption can authenticate to a lightweight access point but does not receive an IP address. This problem does not affect clients running ACU 6.3, which does not use WMM data frames. To check for this problem, enter the following command on the controller:
debug dot1x events enable
In the body of the trace that follows authentication by an affected client, the following messages appear:
Fri Jun 3 07:29:59 2005: Received EAPOL-Key from mobile xx:xx:xx:xx:xx:xx
Fri Jun 3 07:29:59 2005: Received EAPOL-key message with invalid version number from mobile xx:xx:xx:xx:xx:xx
Workaround: Configure WMM policy to be allowed for the wireless LAN on the controller. To do this on the GUI, browse to the WLANs > Edit page for the appropriate WPA1 wireless LAN, and choose Allowed or Required in the WMM Policy drop-down box. The Allowed option means that both WMM and non-WMM clients can authenticate and receive an IP address (for example, both Aironet ACU 6.5/6.4 and 6.3 clients could authenticate and receive an IP address). The Required option means that only WMM clients can authenticate (that is, only ACU 6.5/6.4 clients).
•
CSCsb55937—VLAN-tagged large ICMP packets that need to be fragmented are not sent by Cisco Aironet 1000 series access points in direct-connection mode. Ping replies never come back when the access point sends requests to a gateway from a wireless client using large 1500-byte packets and with RADIUS override configured with any 1p tag. This condition exists for 4400 series controllers using direct-connect mode, with RADIUS override enabled, the override parameter set to 1p with any VLAN number, and Cisco Aironet 1000 series access points.
Workaround: None at this time.
•
CSCsb59898—Cisco Aironet 1030 Remote Edge Lightweight Access Points in REAP mode do not support roaming when configured with a WLAN that is set up for WPA security.
Workaround: None for this release.
•
CSCsb71060—Internal LAG errors occur when the management interface is changed from tagged to untagged.
Workaround: Leave the WiSM management interface as tagged or untagged.
•
CSCsb76389—Cannot failover to second instance IP address or port on a RADIUS server.
Workaround: None for this release.
•
CSCsb77595—When logging out from Telnet/SSH sessions, the session always prompts the user to save changes, even when no changes have been made.
Workaround: Ignore the prompt and exit as usual.
•
CSCsb85113—When users download the code image to WiSM using the CLI, associated access points are sometimes disconnected.
Workaround: Download new code images to the WiSM at times when there are no clients to be affected.
•
CSCsb85582—Cisco 4100 series controllers crash at PES_rqst_exec_again.
Workaround: None for this release.
•
CSCsb88588—Incorrect power levels are reported for access points when the controller is set to country code SG.
Workaround: None for this release.
•
CSCsb90622—AP impersonation alarms sometimes flood WCS.
Workaround: None for this release.
•
CSCsc01221—When downstream test data is sent from the wired endpoint to four wireless clients at different priority levels (voice, video, background, and best effort), the Cisco Aironet 1000 series access points crash.
Workaround: None for this release.
•
CSCsc02741—In the bootloader mode, users are unable to exit or return to the main prompt. If users make mistakes while entering values, they cannot quit the step and are unable to go back and change existing values.
Workaround: Reset the system through IOS or power the device off and on if necessary.
•
CSCsc02860—When users download the code image to a WiSM for the first time, the WiSM fails to download the new image to flash memory.
Workaround: Download new code images to the WiSM a second time.
•
CSCsc03072—Cisco lightweight access points do not always produce complete logs.
Workaround: None for this release.
•
CSCsc03644—Cisco lightweight access points do not retain location parameters after a reboot.
Workaround: None for this release.
•
CSCsc05495—Controllers running 3.0.107 code intermittently send a state attribute 24 in an access-request packet.
Workaround: Apply the Microsoft KB 883659 patch to IAS. The Microsoft patch may or may not work. There is no workaround on the controller.
•
CSCsc11660—The current country screen is not 100% accurate for all deployment scenarios, which may cause confusion in some instances.
Workaround: None for this release.
•
CSCsc14045—VPN passthrough should not be able to combine with web policy.
Workaround: Do not assign VPN passthrough along with web policy.
•
CSCsc15699—In Cisco Aironet 1000 series access points, the WMM IE (11) is correct, but the QBSS client cac limit (11) is still in its old place.
Workaround: None for this release.
•
CSCsc17827—For Cisco Aironet 1500 Series Lightweight Outdoor Access Points and Cisco Aironet 1030 Remote Edge Lightweight Access Points, channel 165 for the 802.11a radio is only available for the -A SKU when the country code is set to USX. Channel 165 is not available for the -N SKU for any of the countries that use this SKU.
Workaround: In order to set the 802.11a radio to channel 165 when using the -A SKU, set the country code of the controller to USX. For the -N SKU, please select one of the available channels.
•
CSCsc20416—ACU site survey disassociates other clients in the LWAPP environment.
Workaround: Under investigation.
•
CSCsc21196—Asymmetrical data rate with 802.11a radio on 4012 and 4024 controllers.
Workaround: None for this release.
•
CSCsc22084—Error messages and traps are not triggered when a PoE controller with CDP causes Cisco Aironet 1200 series access points to disable their radios.
Workaround: Disabling CDP resolves this issue.
•
CSCsc22663—Deleting a mobility member mapped to a controller as an anchor removes the anchor's entry as well, but the Auto Anchor knob remains enabled even though only the mobility anchor mapping is deleted.
Workaround: Before deleting a mobility member, first delete the controller to which it is mapped from the WLAN.
•
CSCsc26796—The WiSM web interface does not show the correct access point SNMP operator status (Registered versus Down).
Workaround: Use WCS to view the correct values.
•
CSCsc28571—Task 181 (do_linktest) is taking 4265111% of the CPU.
Workaround: None for this release.
•
CSCsc34060—IPSec clients enter the run state but do not communicate.
Workaround: Under investigation.
•
CSCsc35784—The transmit power control adjustment levels 3, 4, and 5 are not supported on Cisco Aironet 1500 Series Lightweight Outdoor Access Points in the 5745-to-5825-MHz band. The transmit power control adjustment levels 4 and 5 are not supported on Cisco Aironet 1500 series access points that operate in the 5500-to-5700-MHz band and at 2.4 GHz.
These levels correspond to -6, -9, and (in the case of 5500 to 5700 MHz) -12 dB from the maximum power, respectively. Power levels 1, 2, and (in the case of 5500 to 5700 MHz) 3 are supported, which correspond to maximum power for the particular data rate and channel, and -3 dB relative to this maximum, at which these adjustment levels provide little or no further reduction in transmit power output.
Workaround: Set the transmit power level to either 1 or 2 for 5745 to 5825 MHz. Set the transmit power level to either 1, 2, or 3 for all other bands.
•
CSCsc38093—Wireless clients experience poor performance when associated to a 4400 series controller.
Workaround: Under investigation.
•
CSCsc40648—Rooftop access points are displayed in the web interface as poletop access points for more than four minutes, which prevents them from being configured.
Workaround: Configure the access point as a rooftop access point using the controller CLI.
•
CSCsc41313—The Cisco Aironet 1500 Series Lightweight Outdoor Access Points are configured by default to allow old bridges. When this configuration is enabled, the shared secret key set on the controller is not passed to the access points, so a few access points might be running on the old key. If these access points reset or new access points are waiting to join the running network, they may take a very long time to connect to the network or might not join at all. The default value has been changed to not allow old bridges to authenticate.
Workaround: Configure the controller using this command: config network allow-old-bridge-aps disable.
•
CSCsc61004—Poletop access points (PAPs) may not be able to move from one rooftop access point (RAP) to another if the first RAP goes down. This problem usually occurs if the RAPs are configured statically at "rooftop" and the PAPs are configured at "poletop."
Workaround: Configure Auto mode on all RAPs and PAPs.
•
CSCsd34555—The PC350 client adapter is unable to pass traffic when the access point is not in protection mode.
Workaround: None at this time.
•
CSCsd35492—The client exclusion feature does not operate correctly when aek keywrap is configured.
Workaround: Use the non-keywrap method.
•
CSCsd36689—Access points in monitor mode do not detect probing clients. These access points do not track the clients' RSSI values and do not contribute location information to the Location Appliance.
Workaround: Configure the access points for local mode.
•
CSCsd48466—Unless WMM policy is set to Allowed or Required on the WLAN, the 1200 series access point does not set the DSCP value in the outer LWAPP header for packets that it forwards to the controller. As a result, the controller cannot set the 1p tag on upstream packets.
Workaround: Set the WMM Policy parameter to either Allowed or Required.
•
CSCse58195—When you upgrade from controller software release 3.0.x.x to 3.2.x.x, any access control lists (ACLs) that were previously configured or applied to interfaces are removed or disabled.
Workaround: Before upgrading the controller software, enter the show acl detailed acl_name command on the controller CLI to see the details of the configured ACL. Then manually apply the ACL after the upgrade.
Troubleshooting
For the most up-to-date, detailed troubleshooting information, refer to the Cisco TAC website at
http://www.cisco.com/en/US/support/index.html
Click Product Support > Wireless. Then choose your product and Troubleshooting to find information on the problem you are experiencing.
Related Documentation
For additional information on the Cisco controllers and lightweight access points, refer to these documents:
•
The Quick Start Guide for your particular controller or access point
•
Cisco Wireless LAN Controller Configuration Guide
•
Cisco Wireless LAN Controller Command Reference
•
Cisco Wireless LAN Controller Online Help
•
Cisco Wireless Control System Configuration Guide
•
Cisco Wireless Control System Online Help
Click this link to browse to the Cisco Support and Documentation page:
http://www.cisco.com/cisco/web/support/index.html
Obtaining Documentation and Submitting a Service Request
For information on obtaining documentation, submitting a service request, and gathering additional information, see the monthly What's New in Cisco Product Documentation, which also lists all new and revised Cisco technical documentation:
http://www.cisco.com/en/US/docs/general/whatsnew/whatsnew.html
Subscribe to the What's New in Cisco Product Documentation as an RSS feed and set content to be delivered directly to your desktop using a reader application. The RSS feeds are a free service. Cisco currently supports RSS Version 2.0.
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL: www.cisco.com/go/trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (1110R)
© 2006 Cisco Systems, Inc. All rights reserved.