Software release 6.4.2 is available for Enterprise Wi-Fi. 6.4.2 software release contains features, enhancements and bug fixes. Following are the downloads available for software release 6.4.2:
With the Auto-RF feature, AP collects a number of RF-statistics and uses that information to give a better Radio Frequency (RF) environment to wireless clients, by selecting the right channel and Tx power for each radio. This results in a better end-user experience in terms of application performance and call quality.
Auto-RF consists of two functionalities:
- Dynamic channel: Helps radios to always select a better channel at boot time and post boot if channel conditions change later.
- Auto power: Helps radios to come up with the right Tx power to handle coverage holes and minimize RF interference.
This feature applies wireless policies to the client-based device class (notebook, phone, tablet, and laptop) and its type (Windows, Mac, and Android).
The WIDS feature is used to detect different types of flood attacks. A flood attack occurs when a rogue client sends a huge number of packets of a specific type to the AP to disrupt the normal working of the AP. This feature can detect the following types of flood attacks:
- Extensible Authentication Protocol over LAN (EAPoL)
OWE is a Wi-Fi standard, which ensures that the communication between each pair of endpoints is protected from other endpoints. The OWE transition mode allows OWE-capable STAs to access the network in OWE authentication mode.
From System Release 6.4.2 onwards, Enterprise Wi-Fi 6 XV series Access Points support 2K ePSK entries per WLAN. Other Access Points (e410, e430, e510, e600, and e700) continue to support 1024 ePSK entries per WLAN.
|FLCN-12500||All||Sanitize ping host argument was found in device-agent.|
|FLCN-12424||e410, e510, e430, e600, and e700||Clients disconnection triggered due to related process restarts.|
|FLCN-12364||XE3-4||Fixed memory leak.|
|FLCN-12362||All||cnMaestro Captive Portal: cnMaestro dynamic IP address was not learned when the TTL value is 0.|
|FLCN-12327||XV2-2, XV2-2T0, and XV2-2T1||DFS channels are missing from the KR country code.|
|FLCN-12254||All||Issue with the captive portal white list entries which caused the client not to get a login page from the external captive portal server.|
|FLCN-12252||All||Number of VLANs supported on device was increased.|
|FLCN-12184||All||Unable to save SSH key in APs UI- Error: specified parameter greater than the maximum length.|
|FLCN-12130||All||Real clients in the field are failing to connect to WPA3-Enterprise security because of SuiteB AKM.|
|FLCN-12129||All||AP generated PPPoE Tunnel Critical alarm with a 6.4.1-r15 image even if the PPPoE feature was not configured.|
|FLCN-12120||XV3-8, and XE5-8||Removed 160 MHz configuration from unsupported radio channel- width list.|
|FLCN-12119||All||WPA2-Enterprise clients get reauthenticated every 1 hour.|
|FLCN-12113||All||AP running with 6.4.1 image reported frequent WMD restarts which caused clients to disconnect.|
|FLCN-12080||XV2-2||AP crashed due to a watchdog reset.|
|FLCN-12038||e410, e510, e430, e600, and e700||Link Aggregation Control Protocol (LACP) was not working.|
|FLCN-11997||All||GRE tunnel down event was generated without checking the reachability to peer after the Rx counter did not increment for two consecutive intervals.|
|FLCN-11986||All||Secondary-remote-host tunnel IP was not getting applied if pushed from user-defined overrides.|
|FLCN-11975||All||False event EOGRE tunnel up was triggered even if the tunnel was down.|
|FLCN-11820||e410, e510, e430, e600, and e700||Multicast-to-unicast conversion was not working.|
|FLCN-11761||All||Fixed issues related to band-steering.|
|FLCN-11653||All||Pixel 6 was not able to connect to a WPA3-SAE WLAN on the 6 GHz radio.|
|FLCN-11578||e410,e510, e430,e600, and e700||Off-Channel Scan (both active and passive scan) was finding Clients and Neighbor APs only in home channel APs.|
|FLCN-11299||All||Azure prompted for re-authentication when roaming from an AOS to CaOS AP.|
|FLCN-11173||All||AP dropped DNS AAAA inquiry.|
|FLCN-8612||All||ePSK VLAN was not honored after 11r roaming.|