Wireless Edge Services zl Module Release Notes WT.01.28

37
Known Software Issues and Limitations
Release WT.01.10
Wireless (40983) — Rate limiting is not applied to wireless stations that have roamed or
have reconnected to the network if cached PMK is configured.
Workaround: Disable PMK caching when vendor specific attributes are required for rate limiting
a wireless client (e.g. when using IDM). PMK caching is a default WPA2 value, and may be disabled
in the web management interface using Network Setup -> WLAN Setup -> Edit -> WPA/WPA2 ->
Fast Roaming -> and uncheck PMK Caching.
Wireless (41726) — Setting the country code after Rogue AP detection is enabled may
cause the module to reset continuously. This is an unlikely scenario since the country code
must be set prior to the module's ability to adopt radio ports and is unlikely to require a
second configuration. Best Practice: Set the country code prior to configuring the module.
Workaround: Disable Rouge AP detection prior to re-configuring the country code.
Release WT.01.10
ESPD — When PMK caching is enabled, and a client using WPA/WPA2 disconnects and ages
out of the table, log messages like the following may be seen (date, time, severity, and IP
address stamps removed for clarity).
espd: ESPd_emi_req() - Invalid OpCode
(Note: This issue has been resolved. See “Release WT.01.16” on page 24 under “Software Fixes”.
Release WT.01.13
Release WT.01.13 is a special release for WESM zl modules purchased prior to April 1, 2008, in the
European Union and selected countries/regions. For more information, see “Release WT.01.13” on
page 17.
Infrastructure (14207) — The wireless interface counter statistics displayed are
incorrect; the tx_retries counter may increment interfaces where a radio port is not attached.
Infrastructure (45508) — The network time protocol (NTP) clock stratum displays a value
of 5 irrespective of the configured value.
Infrastructure (45760) — When logging level 7 is enabled with output to monitor, and
debug all is given as a parameter, the module management will become unresponsive after
exiting the CLI. This may also be associated with a kernel panic and creation of probetabled
core files.
Security (45714) — MAC authentication with the local RADIUS server will fail if the MAC
address is provided in a paired-colon format.
Security (45715) — Web authentication with the local RADIUS server will fail if the
username contains a colon.