Release Notes
28
Release Notes for Cisco Wireless LAN Controllers and Lightweight Access Points for Release 4.2.176.0
OL-31336-01
Caveats
• CSCsk17001—When a guest LAN with a blank ingress interface name is added to the controller,
the application fails with an SNMP exception message.
Workaround: Use the controller CLI to configure a guest LAN. You might need to delete a previous
guest LAN if it has a blank ingress interface configured on it and then recreate it. By default, the
ingress interface is blank.
• CSCsk22861—An MGID entry is not cleared from the access point when IGMP snooping is disabled.
Workaround: None.
• CSCsk49157—When you change the session timeout of a WLAN that is using a backend RADIUS
authentication server, any existing client that is using that WLAN shows its reauthentication timeout
as infinite, even though there is a finite time after which reauthentication occurs.
Workaround: None.
• CSCsk49200—The hybrid-REAP local switching option should be removed for wired guest LANs.
Workaround: None.
• CSCsk49282—The guest LAN and WLAN are not clearly differentiated.
Workaround: None.
• CSCsk50477—The BCAST_Q_ADD_FAILED message contains typographical errors.
Workaround: None.
• CSCsk60655—The default frequency value in the intrusion detection system (IDS) file should be
equal to or greater than the maximum deauthentication packets sent by an access point.
Workaround: None.
• CSCsk63047—Dynamic transmit power control (DTPC) does not work on Cisco1240 series access
points in WGB mode.
Workaround: None.
• CSCsk68117—U-APSD state changes on a client device are not updated on the controller.
Workaround: Reboot the access point, or disassociate the client from the controller and then
reassociate it.
• CSCsk74050— If you configure an ACL name with 32 characters, the ACL override fails during
roaming.
Workaround: Use ACL names with up to 31 characters.
• CSCsk78264—A change in the RF domain name takes effect only after a reboot.
Workaround: Reboot the controller after changing the RF domain name.
• CSCsk79382—CCXv4 and CCXv5 clients receive an Adjacent Access Point Report from the
controller even though this report should be sent only to CCXv2 and CCXv3 clients.
Workaround: None.
• CSCsk83426—A hybrid-REAP access point does not reauthenticate after entering standalone mode.
Workaround: None.
• CSCsk85091—If Rogue Location Detection Protocol (RLDP) is enabled on the controller, you may
see radio reset messages on the access point console. There may also be a brief interruption in client
traffic flow.
Workaround: Disable RLDP.