Installation guide
CUSTOMER RELEASE NOTES
10/17/07 P/N: 9038177-17 Subject to Change Without Notice Page: 9 of 21
F0615-O
Firmware Release 5.0.12.2:
Added support for the TRPZ-MP-422 Access Point.
Added support for the following DFS2 compliant North American model Access Points:
RBT-1002 Rev 6A (AP ID: AP1002C), RBT-4102 Rev 6A (AP ID: AP4102C), RBT-1602 Rev 6A (AP ID:
AP1602C). Please see the DFS2 Tech Tip on page 16 for further information.
Resolved an issue where the RBT switch can lock-up when a Nessus scan is deployed against the switch.
Resolved an issue where the RBT switch sends the NAS port attribute four (4) times in a RADIUS request.
Resolved an issue where the MX tunnel functionality would fail to report the status of other RB switch members
in the network domain.
Resolved an issue where the VLAN member information was not added to the RBT switch configuration when
using the WebView Quickstart for initial configuration.
Resolved a WebView issue where a second VLAN‘s interface IP information would display an error if the bit
mask were set for less than 8 bits.
Firmware Release 5.0.11.4:
Resolved a DAP crash issue where a buffer in the Access Point is being written past the end with too much data
and corrupting the header of the following buffer.
Resolved an issue where the RBT-8400 CPU utilization increases due to a DHCP request packet looping issue
with the port- trunk functionality.
Resolved an ASSERT and exception DAP crash due to a corrupted link header when the DAP is rebooting.
This issue occurred when a packet entered the AP through the Ethernet MAC, and the Access Point stored this
packet in memory spot in which the operational code needed zeroed out.
Resolved an issue where the RBT-1002 Ethernet port would transition to half-duplex under heavy traffic load
(approximately 25 Mbps throughput).
Resolved an issue where the WebAAA login page would not resolve due to a certificate failure on a client using
the Vista OS and Microsoft Internet Explorer version 7. The workaround is for the client to open the Internet
Explorer browser as ―Administrator‖ and accept the WebAAA certificate.
Resolved an issue where a client using the Vista OS and Microsoft IE 7 failed to get the WebAAA login page
when the Common Name in the RBT switch Web certificate equals ‗*.<domain>.com‘.
Resolved an issue where the radio information was not displayed after issuing the ―show sessions‖ command.
Resolved an issue where the RBT-8400 locked-up due to a processor losing entries in the FDB, and over time,
the processor would lose the CPU entry, causing the lock-up.
Resolved an issue where DAP‘s were crashing due to Filter Database issues and causing ASSERT errors on
the RBT switch.
Resolved an issue where the message ―radar is no longer detected‖ would continuously scroll across a console
screen when the DAPs auto-tuned the channel from a DFS channel to a non-DFS channel.
Resolved an issue when the RBT-8400 would show ‗Username: IP=127.0.0.1‘ after a switch reboot.
Resolved an issue where the auto-configuration setting changes for the B/G radio via WebView were not shown
in the active RBT switch configuration.
Resolved an issue when the DAP reboots with an ASSERT error when WMM-powersave is enabled.
Functionality description for an open issue where the DAP system uptime is changing, but the DAP has not
rebooted. DAP‘s that change from a low bias switch to a high bias switch are expected to reset without showing
a system log error.
Resolved an issue where the DAP would crash when countermeasures attempted to use an 11a radio to attack
a rogue on an 11b channel.
Resolved an issue where AP_Handshakes errors continuously scrolled across the console connection.
Resolved an issue with a DAP Exception when the DAP tried to tune 11a radio to an 11bg channel.
When configuring the Web portal and saving the default login page, remove everything between the quotes
in the Action value of the form tag in the HTML code.
Resolved an issue where the Access Point buffers were filling up with Rogue Detection messages.
Resolved an issue when a wireless client was previously connected to an SSID (WebAAA, last-resort), then
switched to a new bonded auth SSID, the machine auth phase was skipped.