Enterprise WiFi-6 Software Release 6.5.3-r8

System Release 6.5.3 is a maintenance release on System Release 6.5.2 with enhancements, bug fixes, and the following new feature:

  • From System Release 6.5.3 and later versions, the admin user password is encrypted.

Firmware: https://support.cambiumnetworks.com/files/wifi6_xv2_2/

Fixed issues

This section lists the fixed issues in System Release 6.5.3:

Tracking Platforms Description
FLCN-14420 All LLDP caused memory leak when APs were deployed with non-Cambium vendor switches.
FLCN-14339 All In a WLAN profile, when RADIUS and ePSK are enabled, invalid events were generated.
FLCN-14294 All SNMP community parameters were not persistent across reboots.
FLCN-14237 XV3-8 Deauthentication of client due to session timeout will be triggered only if it is learned from the RADIUS server.
FLCN-14225 All The SNMP OID 1.3.6.1.4.1.17713.22.1.1.1.14.0 (cambiumAPTotalClients.0) always returned a value of zero even when clients were connected to the AP.
FLCN-13911 XE3-4, XE5-8 OCS scan was not triggering for radio 3 if both radio 2 and radio 3 were configured as 5 GHz.
FLCN-13882 XE3-4 APs continuously rebooted because of failure in unexpected boot parameter.
FLCN-13672 All Erroneous time stamp was displayed for last-reboot-reason.
FLCN-13631 All AirTime stats were not available for Tx, Rx, busy, and interferences parameters.
FLCN-13292 All The static VLAN pool was not working when WPA2-Enterprise security was enabled.

Regulatory updates

This section lists the regulatory fixed issues in System Release 6.5.3:

Tracking Platforms Description
FLCN-14337 XE3-4TN XE3-4TN APs support 5.2 (5250-5350 MHz, U-NII-2A), 5.4 (5470-5725 MHz, U-NII-2C), and 5.8 (5725-5850 MHz, U-NII-3) DFS channels as per CE standards.
FLCN-14336 XV2‐23T XV2‐23T APs support 5.2 (5250-5350 MHz, U-NII-2A), 5.4 (5470-5725 MHz, U-NII-2C), and 5.8 (5725-5850 MHz, U-NII-3) DFS channels as per CE standards.
FLCN-14283 All Updated Indonesia regulatory information.
3 Likes

Wait, I don’t understand what this means. I think the password was already encrypted?

@MW_WISP Nope. It’s not encrypted. You can see the password by inspecting the post/get in the browser console for example. I thought so too when I first started using the AP.

However I’m going to upgrade when I can, and see what changes have been made.