18
Release Notes for Cisco Wireless LAN Controllers and Lightweight Access Points for Release 3.2.171.6
OL-11567-02
Caveats
• CSCse26437—After a communication breakdown occurs between a controller and an access point,
the access point does not send a subsequent request to join the controller.
• CSCse27890—Access points in REAP mode send deauthentication frames to wireless clients
without waiting for a PS poll.
• CSCse29193—The controller marks a RADIUS server as dead if a single request is not responded
to after five retries and switches to a backup server.
• CSCse29686—After you upgrade from software release 3.2.78 to 3.2.116.21 or later, clients
experience packet loss and a significant number of packet retransmissions on the AP1000. This
condition is related to the antenna setting of the access point.
• CSCse30397—If you enter 24 characters for the username and password during the initial controller
configuration, the “Routine system resource notification” error message may appear repeatedly.
• CSCse32639—Client exclusion may not operate properly when web authentication is enabled on the
controller. If a wireless client becomes “excluded,” it never disassociates from the access point and
may be unable to log in again.
• CSCse33667—A controller running software release 3.2.116 with ssh disabled may crash without a
crash dump.
• CSCse36426—Controllers with AP-group VLANs configured sometimes cause WCS to hang when
the controllers are added to WCS.
• CSCse40350—During WPA2 client association, the access point sometimes sends a Reason 1
Deauthentication frame to the client, causing the client to disconnect and reassociate.
• CSCse43767—The show client username command shows only one client even when several
clients are associated with the same username.
• CSCse46717—Access points sometimes reboot.
• CSCse47024—Clients sometimes lose their connection to the access point.
• CSCse47645—Controllers sometimes use an invalid IP address when sending pings.
• CSCse48743—When the idle timeout expires for a client, the controller sometimes displays this
error message: “Got an idle-timeout message from an unknown client.”
• CSCse49083—Access points in REAP mode sometimes send a deauthentication packet at the end
of phone calls on some handsets.
• CSCse50111—The controller’s active port sometimes becomes disabled when traffic is pumped
from a wireless client to a wired client.
• CSCse51940—WCS sometimes displays this error message when you change the WLAN
encryption type from WPA-PSK to WEP: “SNMP operation to device failed.”
• CSCse53252—Controllers sometimes reboot due to an issue with the time server.
• CSCse55473—The 5-GHz radios on access points sometimes remain enabled even when disabled
on the controller.
• CSCse58258—Access points sometimes reboot during an Assert software task.
• CSCse59150—SVP packets through controllers have inconsistent timing, resulting in poor voice
quality.
• CSCse64508—A controller running software release 3.2.116.21 does not allow a Nortel VPN client
using Contivity to connect until the date on the controller is changed from 2006 to 2005.
• CSCse66940—When the primary port on a controller fails and the controller switches traffic to a
backup port, all configured WLANs are deactivated.