ProCurve Secure Access 700wl Series Version 4.5 Release Notes Contents New Features in this Release .............................................................................................................................. 2 System Requirements .............................................................................................................................................. 3 Upgrade Notes.........................................................................................................
Release Notes, Version 4.5.0.39 Go to the support web site located at http://www.procurve.com for the latest information on the ProCurve Secure Access 700wl Series products. The current release notes, manuals, FAQs, and problem reports are always available at this site. Important information required for updating system software is available on a secure page at the ProCurve Networking web site: http://www.procurve.com. Click on Software updates (in the sidebar). Under Latest software, choose 700wl series.
System Requirements (LEAP) and Protected Extensible Authentication Protocol (PEAP). As the RADIUS proxy server, the built-in RADIUS server can manage multiple realms, each with multiple remote RADIUS servers working in a failover capacity within each realm. • SSL v.3 Protocol. The 700wl Series system now supports SSL v.3 protocol for the 700wl Series system login, logout, and stop pages. SSL v.3 is enabled by default. To revert to SSL v.
Release Notes, Version 4.5.0.39 Other browsers, such as earlier versions of Internet Explorer, earlier versions of Netscape, or Safari (Macintosh) may not display all pages or data correctly. UPGRADE NOTES Important: Please read the ProCurve Secure Access 700wl Series Software Version 4.5.0.xx Update Guide for instructions on updating your systems that currently run software version 4.1.3.93. The Update Guide applies equally to this patch release.
Clarifications and Usage Notes regenerated via a DHCP lease renewal. If the information can be obtained through DHCP, then the information may be renewed by deleting a related local subnet, waiting about 10-15 seconds and then re-entering the local subnet configuration for the subnet. The lease should be renewed and the information in the lease renewal will be used to recreate the global subnet group.
Release Notes, Version 4.5.0.39 settings, enabling or disabling remote access, enabling or disabling SSH under Wireless Data Privacy setup, or changing the Access Control Server IP address. Any of these actions cause the system to restart internally, which shuts down any open SSH sessions. • A user that logs on as “Guest” matches the Guest Identity Profile, but is not considered to be an authenticated user.
Software Fixes the logs. These errors are identified by their references to OpenSSL or to RSA key errors. These errors are harmless as the browser and server generally do eventually succeed in establishing an SSL connection. • The SafeNet 7.0.x client in combination with Windows XP does not allow roaming. A roam away from the initial Access Point causes the interface to go down, and the SafeNet 7.0.x client cannot recover. A client reboot is required before you can connect again.
Release Notes, Version 4.5.0.39 • Updated sysObjectID and sysDescr for 745 ACS hardware. The following problems that were identified in previous releases of the ProCurve Secure Access 700wl Series system software have been fixed in software release 4.5.0.37: • When attempting to shut down the 745 via the LCD panel, the system does not shutdown. (23393) • Upgraded Apache software to version 2.0.52_4 to address a vulnerability on the ACS 745.
Known Issues And Behaviors KNOWN ISSUES AND BEHAVIORS The following are issues that are known to exist with this software version. The number in parentheses following the description is an internal tracking number. • Cisco Access Point using the Aironet series of protocols when connect downstream of an Access Controller could originate traffic with the same source MAC address on multiple VLANs or VLANs and untagged networks.
Release Notes, Version 4.5.0.39 802.1X/WPA authentication service is configured correctly within the 700wl Series system and for each component (access point, remote RADIUS server, and client).
How To Get Help Access Controller connected to the same Cisco Catalyst 2950, they cannot gain network access because the Cisco Catalyst 2950 associates the client’s IP address with the first Access Controller. Clearing the ARP cache on the Cisco Catalyst 2950 removes the previous association of the client's IP address with the first Access Controller and allows the client to connect through the other Access Controller that is connected to the same switch.