Hi. If I already have RC16 on a sector, is this release version later than that, or is it just RC16 renumbered as a release version? I’m wondering if there is a benefit of upgrading if sectors are already RC16? Thanks.
it is already stable enough as I see from our customers’ deployments. The badge beta-quality is very subjective. It means that we still may see some environment specific cases and there is a space for improvements.
Thank you!
Yes, it makes sense to get it enabled. We expect that we finally have cleaned up all the issues related to hardware acceleration when it could affect some traffic types.
Thank you.
MU-MIMO is not yet fully optimized for Flexible mode, which is why it’s still labeled as Beta Quality.
For better utilization of MU-MIMO capabilities, I recommend using Fixed Ratio mode.
We had multiple links that were having issues with hardware acceleration enabled. After updating to 5.10.1, we’re now able to have it enabled on every radio without issues.
Hardware acceleration allows for network traffic to be directly processed by the wifi chipset vs. being processed in software, which can be slower and use more resources. This feature is enabled by default on the ePMP 4000 platform. There’s no reason to disable it unless you’re having issues, and with the fixes in 5.10.1, there’s most likely no reason to disable it going forward.
Awesome to hear! I’m curious, have you run into any scenarios where your links actually saw an improvement after re-enabling it? None of ours have been pushed hard enough to really see a difference
I haven’t noticed any performance improvements with it enabled vs. disabled, but then again, like you, I don’t believe I’ve pushed them hard enough or are running enough secondary services (like MIR shaping, QoE, DPI, etc) to make a difference.
Beginning with Version 5.4.2 No Corre firmware for EPTP Force 400C had all subsequent firmware in the bridge mode gave a periodic spontaneous fall of the channel not to understand the most, the bridge is used the simplest PTP
We have a similar issue. Ruffly every 25 days the AP / Master appears to loss it’s Sec key and will cause the other end to fail its WPA negotiation. Rebooting the Master is the only solution.
Not much to ad. It is a 400c PTP operating in DFS channels. Little to no traffic as it is a backup for a Siklu. The error is a failed WPA secret. I don’t not recall seeing any correlation with a DFS event and the described issue. The master just appears to “change” it WPA secret and it remembers it after a reboot.
@anthonyw could you PM me a techsupport right after it happened?
Does it put some random password? Or default, or the one you had before?
Is it onboarded to cnMaestro?
The radio does not store old passwords. Default ones can pop up after reset to default only.
There is no method rewriting passwords which can be triggered under the hood by mistake.
If it really gets changed it must be some external configuring.