Wireless Edge Services zl Module Release Notes WT.01.39
34
Known Software Issues and Limitations
Release WT.01.10
■ SNMP (41053) — The dynamic DHCP bindings viewed in the Web management interface display the expiration time
in GMT rather than accurately reflecting the configured time zone offset.
Workaround: The expiration time is properly displayed in the output for the CLI command, show ip dhcp binding.
■ SNMP (37189) — The module does not support “noAuthnoPriv” and “AuthnoPriv” security levels for SNMPv3 users,
but the CLI supports the commands for setting those levels.
Workaround: Configure SNMPv3 through the Web management interface, which appropriately allows only the “AuthPriv”
security level.
■ SNMP (40001) — The SNMP port number for configuration of the trap destination is a optional parameter in the
CLI, while it is a mandatory parameter in Web management interface. The module administrator should use the
configuration interface that best meets their needs.
■ Wireless (40983) — Rate limiting is not applied to wireless stations that have roamed or have reconnected to the
network if cached PMK is configured.
Workaround: Disable PMK caching when vendor specific attributes are required for rate limiting a wireless client (e.g.
when using IDM). PMK caching is a default WPA2 value, and may be disabled in the Web management interface using
Network Setup -> WLAN Setup -> Edit -> WPA/WPA2 -> Fast Roaming -> and uncheck PMK Caching.
■ Wireless (41726) — Setting the country code after Rogue AP detection is enabled may cause the module to reset
continuously. This is an unlikely scenario since the country code must be set prior to the module's ability to adopt
radio ports and is unlikely to require a second configuration. Best Practice: Set the country code prior to configuring
the module.
Workaround: Disable Rouge AP detection prior to re-configuring the country code.
Release WT.01.10
■ ESPD — When PMK caching is enabled, and a client using WPA/WPA2 disconnects and ages out of the table, log
messages like the following may be seen (date, time, severity, and IP address stamps removed for clarity).
espd: ESPd_emi_req() - Invalid OpCode
(Note: This issue has been resolved. See “Release WT.01.16” on page 19 under “Software Fixes”.
Release WT.01.13
Release WT.01.13 is a special release for WESM zl modules purchased prior to April 1, 2008, in the European Union and selected
countries/regions. For more information, see “Release WT.01.13” on page 14.
■ Infrastructure (14207) — The wireless interface counter statistics displayed are incorrect; the tx_retries counter
may increment interfaces where a radio port is not attached.
■ Infrastructure (45508) — The network time protocol (NTP) clock stratum displays a value of 5 irrespective of the
configured value.
■ Infrastructure (45760) — When logging level 7 is enabled with output to monitor, and debug all is given as a
parameter, the module management will become unresponsive after exiting the CLI. This may also be associated with
a kernel panic and creation of probetabled core files.
■ Security (45714) — MAC authentication with the local RADIUS server will fail if the MAC address is provided in a
paired-colon format.
■ Security (45715) — Web authentication with the local RADIUS server will fail if the username contains a colon.