Release Notes for Cisco Wireless Controllers and Lightweight Access Points, Cisco Wireless Release 8.10.130.0 |
您所在的位置:网站首页 › android10121 › Release Notes for Cisco Wireless Controllers and Lightweight Access Points, Cisco Wireless Release 8.10.130.0 |
The AIR-CT5520-K9 and AIR-CT8540-K9 controller models are based on Cisco UCS server C series, C220 and C240 M4 respectively. These controller models have CIMC utility that can edit or monitor low-level physical parts such as power, memory, disks, fan, temperature, and provide remote console access to the controllers. We recommend that you upgrade the CIMC utility to a version that has been certified to be used with these controllers. Controllers that have older versions of CIMC installed are susceptible to rebooting without being able to access FlexFlash, with the result that the manufacturing certificates are unavailable, and thus SSH and HTTPS connections will fail, and access points will be unable to join. See: CSCvo33873. The recommended versions addresses the vulnerability tracked in CSCvo01180 caveat. The certified CIMC images are available at the following locations: Table 3. CIMC Utility Software Image Information Controller Current CIMC Version Recommended CIMC Version Link to Download the CIMC Utility Software ImageCisco 5520 Wireless Controller Cisco 8540 Wireless Controller 2.x 3.0(4r) https://software.cisco.com/download/home/286281345/type/283850974/release/3.0(4r) Note We recommend you to upgrade the firmware from 2.0(13i) to 3.0(4r) using TFTP, SCP protocols only.Cisco 5520 Wireless Controller Cisco 8540 Wireless Controller 3.0(4d) 3.0(4r) https://software.cisco.com/download/home/286281345/type/283850974/release/3.0(4r) Cisco 5520 Wireless Controller Cisco 8540 Wireless Controller 4.0(1a) 4.0(2n) https://software.cisco.com/download/home/286281345/type/283850974/release/4.0(2n) Table 4. Firmware Upgrade Path to 4.x version Current Firmware Version Upgrade Path to 4.x version2.x You must upgrade to a 3.x version and then upgrade to the recommended 4.x version. 3.x You can upgrade directly to the recommended 4.x version. For information about upgrading the CIMS utility version 2.x , see the Introduction to Cisco IMC Secure Boot section in the Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 3.0: https://www.cisco.com/c/en/us/td/docs/unified_computing/ucs/c/sw/cli/config/guide/3_0/b_Cisco_UCS_C-Series_CLI_Configuration_Guide_301/b_Cisco_UCS_C-Series_CLI_Configuration_Guide_201_chapter_01101.html#d92865e458a1635 For information about upgrading the CIMS utility version 2.x using webUI , see the Updating the Firmware section https://www.cisco.com/c/en/us/td/docs/unified_computing/ucs/c/sw/gui/config/guide/3_0/b_Cisco_UCS_C-Series_GUI_Configuration_Guide_for_HTML5_Based_Servers_301/b_Cisco_UCS_C-Series_GUI_Configuration_Guide_207_chapter_01101.html#task_C137961E9E8A4927A1F08740184594CA. ![]() Note When upgrading the firmware using the webUI method, you must select Install Firmware through Remote Server option when prompted in the webUI.For information about upgrading the CIMC utility, see the Updating the Firmware on Cisco UCS C-Series Servers chapter in the Cisco Host Upgrade Utility 3.0 User Guide: https://www.cisco.com/c/en/us/td/docs/unified_computing/ucs/c/sw/lomug/2-0-x/3_0/b_huu_3_0_1/b_huu_2_0_13_chapter_011.html Updating Firmware Using the Update All Option This section mentions specific details when using CIMC utility with Cisco 5520 or 8540 controllers. For general information about the software and UCS chassis, see Release Notes for Cisco UCS C-Series Software, Release 3.0(4) at: https://www.cisco.com/c/en/us/td/docs/unified_computing/ucs/release/notes/b_UCS_C-Series_Release_Notes_3_0_4.html Release Notes for Cisco UCS C-Series Software, Release 4.0(2) at: https://www.cisco.com/c/en/us/td/docs/unified_computing/ucs/release/notes/b_UCS_C-Series_RN_4_0_2.html Table 5. Resolved Caveats for Release 4.0(2f) Caveat ID DescriptionCSCvn80088 NI-HUU fails to handle the special characters in the password of CIFS remote share Table 6. Resolved Caveats for Release 3.0(4l) Caveat ID DescriptionCSCvp41543 SSH weak KeyExchange algorithm [diffie-hellman-group14-sha1] has to be removed |
CopyRight 2018-2019 办公设备维修网 版权所有 豫ICP备15022753号-3 |