Wireless Edge Services xl Module Release Notes WS.01.11
■ Infrastructure (28463)—The running-config file includes a time stamp, which makes it
appear that the file has changed between fetches. The time stamp has been removed.
■ Security (27441)—Fixed support for full-size RADIUS packets, and ones that may contain
100 attributes.
■ SNMP (27403)—SNMP get fails for an instance of
hpicfWsmWsInfraFileMgmtImageVersion after reboot until a walk or getNext is done
on table entries. Now operates properly.
■ Wireless (27165)—Password encryption secret configuration issue. Unable to configure
802.11i key with password-encryption secret or specified UNENCRYPTED password. Now
operates properly.
■ Wireless (27199)—Added support for CHAP as an optional authentication type for Web-
auth. This is configurable via the CLI only.
■ Wireless (27438)—Thirteenth RP needs to be seen in unadopted list. Now operates
properly.
■ Wireless (27439)—Attribute (Calling-Station-Id) was missing for Web-auth, causing
interoperability problems with IDM server. This has been fixed.
■ Wireless (27443)—Framed-MTU and Connect-Info in RADIUS request packet for Web-auth
and 802.1X were missing. They have been added.
■ Wireless (27214)—Web-Auth/IDM did not work if there were more than four ACLs or if
the RADIUS packet length was more than 250. This has been fixed.
■ Wireless (27437)—Web-auth redirection did not always work. This has been fixed.
Release WS.01.11
Problems Resolved in Release WS.01.11
■ Security (33010)—Module can be managed through non-management interfaces. This
software change allows the management VLAN access to be restricted.
■ Security (35037)—Unable to block access to the management applet login screen from
web-authentication clients.
■ Wireless (35851)—Broadcast-Multicast (BCMC) traffic was dropped when DTIM period
is set to 1 resulting in SVP "push to talk" feature failure.
■ Wireless (36024)—BCMC Traffic was sent out at the wrong DTIM, resulting in SVP "push
to talk" feature failure.
■ Wireless (37485)—Malformed Ethernet packets cause a kernel panic from crypto.c