Cisco Aironet 340 Series Release Notes - Page 10

Browse online or download pdf Release Notes for Network Hardware Cisco Aironet 340 Series. Cisco Aironet 340 Series 14 pages. Usb client adapter
Also for Cisco Aironet 340 Series: Quick Start Manual (12 pages), Quick Start Manual (13 pages), Quick Start Manual (16 pages), Quick Start Manual (12 pages), Quick Start Manual (12 pages)

Cisco Aironet 340 Series Release Notes

Troubleshooting

Resolved Caveat
The following caveat is resolved in version 12.01T1:
Troubleshooting
For the most up-to-date, detailed troubleshooting information, refer to the Cisco TAC website at
http://www.cisco.com/tac. In the Tools and Utilities section, Select Wireless Troubleshooting Center.
The Wireless Troubleshooting Center page appears. Choose the link that best suits your troubleshooting
needs.
Release Notes for Cisco Aironet 340 and 350 Series Access Points and 350 Series Bridges Running Firmware Version 12.01T1
10
CSCdy27831—When you set the default Unicast Address Filter to disallowed, you must reboot the
access point for the setting to take effect.
CSCdy73695—When a repeater access point receives packets from a root access point while the
repeater is attempting to associate, the repeater sometimes displays this error:
00:00:10 (Warning): Station <Root MAC address> Associated with Encryption, then
attempted to send an Unencrypted packet to <Repeater MAC address> (length 74)
The error occurs when WEP is not enabled on either the root or the repeater. When an association
response is received by the repeater, it no longer displays the error message and is able to
successfully pass data. However, if a significant amount of traffic, such as multicast traffic, is being
transmitted by the root access point while the repeater is attempting to associate, the repeater may
miss the association response from the root access point and never fully associate. In this case, the
root access point reports that the repeater is associated and the repeater reports that it is only
authenticated. The repeater continues to display warning messages about receiving unencrypted
packets and does not recover until it is rebooted.
CSCdx81372—Access point does not accept version 11.56-generated .ini file
If you download the full configuration .ini from an access point running 11.56, upgrade to version
12.01T1, and then attempt to download the .ini file from an FTP server, the following error message
appears:
*** No Such MIB Variable as Specified on Initialization File Line xxx! for the
following variables:
awcAaaServerAccountingEnabled.x,
awcVoIPVlanId, awcVoIPVlanEnabled,
awcPublicVlanId.
*** Bad Value for MIB Variable awcVlanEncapMode Specified on Initialization File Line
xxx (error 13)!
Workaround—When producing .ini files, dump a non-default configuration for version 11.56
instead of a full configuration.
CSCdz58192—Root bridges with LEAP enabled on the native VLAN must have the security setting
matching that set on the Advanced Radio Setup page. If the settings do not match, the bridge link
will go down temporarily whenever an infrastructure device authenticates.
CSCdz66748 (CSCdz60229)—Access points are no longer vulnerable to a denial of service (DoS)
when support for the Secure Shell (SSH) server is enabled. Malformed SSH packets directed at the
access point no longer cause a reload of the device.
OL-3740-01