Cisco Aironet 1040 Series User Manual Page 9

  • Download
  • Add to my manuals
  • Print
  • Page
    / 16
  • Table of contents
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 8
9
Release Notes for Cisco Aironet Access Points and Bridges for Cisco IOS Release 15.2(2)JA
OL-23990-01
Important Notes
Low Throughput Seen on 1260 Series Access Points with 16 BSSIDs Configured
If your network uses 16 BSSIDs with 1- and 2-Mbps data rates, 1260 series access points might
experience very low throughput due to high management traffic.
802.11n HT Rates Apply Only to No Encryption or WPA2/AES Encryption
The 802.11n HT rates apply only to no encryption or WPA2/AES encryption. They do not apply to WEP
or WPA encryption. If WEP or TKIP encryption is used, the 1250 series access points and any 802.11n
Draft 2.0 clients will not transmit at the HT rates. Legacy rates (802.11a/b/g) will be used for any clients
using WEP or TKIP encryption.
Layer 3 Not Supported with NAC for MBSSID
Layer 3 is not supported with NAC for MBSSID in this release.
Change to Default IP Address Behavior
Cisco IOS Releases 12.3(2)JA and later change the default behavior of access points requesting an IP
address from a DHCP server:
When you connect a 1040, 1130, 1140, 1240, 1250, or 1260 series access point or a 1300 series outdoor
access point/bridge with a default configuration to a LAN, the access point requests an IP address from
a DHCP server and, if it does not receive an address, continues to send requests indefinitely.
Changes to the Default Configuration—Radios Disabled and No Default SSID
In this release, the radio or radios are disabled by default, and there is no default SSID. You must create
an SSID and enable the radio or radios before the access point allows wireless associations from other
devices. These changes to the default configuration improve the security of newly installed access
points.
Clients Using WPA/WPA2 and Power Save May Fail to Authenticate
Certain clients using WPA/WPA2 key management and power save can take many attempts to
authenticate or, in some cases, fail to authenticate. Any SSID defined to use authentication
key-management WPA, coupled with clients using power save mode and authenticating using
WPA/WPA2 can experience this problem.
A hidden configure level command, dot11 wpa handshake timeout, can be used to increase the timeout
between sending the WPA key packets from the default value (100 ms) to a value between 101 and 2000
ms. The command stores its value in the configuration across device reloads.
Page view 8
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16

Comments to this Manuals

No comments