The ProCurve Secure Access 700wl Series Version 4.5 Release Notes Contents New Features in this Release ..........................................................................................................2 System Requirements......................................................................................................................3 Upgrade Notes................................................................................................................................
Release Notes, Version 4.5.0.37 Go to the support web site located at http://www.procurve.com for the latest information on the ProCurve Secure Access 700wl Series products. The current release notes, manuals, FAQs, and problem reports are always available at this site. Important information required for updating system software is available on a secure page at the ProCurve Networking web site: http://www.procurve.com. Click on Software updates (in the sidebar). Under Latest software, choose 700wl series.
System Requirements server, the built-in RADIUS server can manage multiple realms, each with multiple remote RADIUS servers working in a failover capacity within each realm. • SSL v.3 Protocol. The 700wl Series system now supports SSL v.3 protocol for the 700wl Series system login, logout, and stop pages. SSL v.3 is enabled by default. To revert to SSL v.2, select “Disable SSL V3 on Login/Logout/Stop page“ in the Local Networks page on the SSL tab. (2479) • MAC Location.
Release Notes, Version 4.5.0.37 Other browsers, such as earlier versions of Internet Explorer, earlier versions of Netscape, or Safari (Macintosh) may not display all pages or data correctly. UPGRADE NOTES Important: Please read the ProCurve Secure Access 700wl Series Software Version 4.5.0.37 Update Guide for instructions on updating your systems that currently run software version 4.1.3.93. The Update Guide applies equally to this patch release.
Clarifications and Usage Notes If a global subnet group used by a local subnet on an Access Controller is deleted, the configuration information is lost. The subnet group may be automatically created as a placeholder, but the DNS, WINS and other settings must either be manually set or regenerated via a DHCP lease renewal.
Release Notes, Version 4.5.0.37 • There are a number of functions that will result in termination of an active SSH session. These include any CLI commands (or the equivalent function done through the Administrative Interface) that cause a global restart, such as changing the NAT DHCP settings, enabling or disabling remote access, enabling or disabling SSH under Wireless Data Privacy setup, or changing the Access Control Server IP address.
Clarifications and Usage Notes • If an administrator's or client's browser fails to successfully negotiate an SSL connection with the 700wl Series system's web server, the OpenSSL subsystem will place error messages in the logs. These errors are identified by their references to OpenSSL or to RSA key errors. These errors are harmless as the browser and server generally do eventually succeed in establishing an SSL connection. • The SafeNet 7.0.
Release Notes, Version 4.5.0.37 SOFTWARE FIXES The following problems that were identified in previous releases of the ProCurve Secure Access 700wl Series system software have been fixed in software release 4.5.0.37: • Upgraded the Apache web server to version 2.0.52_4 to address a web server restart vulnerability, which was only possible from an uplink client. The vulnerability was never open to downlink/untrusted clients. (23394) • Access Controller intermittent disconnects from Access Control Server.
Known Issues And Behaviors KNOWN ISSUES AND BEHAVIORS The following are issues that are known to exist with this software version. The number in parentheses following the description is an internal tracking number. • Cisco Access Point using the Aironet series of protocols when connect downstream of an Access Controller could originate traffic with the same source MAC address on multiple VLANs or VLANs and untagged networks.
Release Notes, Version 4.5.0.37 802.1X/WPA authentication service is configured correctly within the 700wl Series system and for each component (access point, remote RADIUS server, and client).
Known Issues And Behaviors Access Controller connected to the same Cisco Catalyst 2950, they will not be able to gain network access because the Cisco Catalyst 2950 associates the client’s IP address with the first Access Controller. Clearing the ARP cache on the Cisco Catalyst 2950 removes the previous association of the client's IP address with the first Access Controller and allows the client to connect through the other Access Controller that is connected to the same switch.
Release Notes, Version 4.5.0.37 HOW TO GET HELP Visit the ProCurve Networking web site at http://www.procurve.com. Click on product services for information on available support resources and options for contacting HP. © Copyright 2004, 2005, 2006 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.