SCALANCE W1750D New Firmware Version 8.3.0.1 for SCALANCE W1750D is available.
-
Post
-
Está relacionado com produto(s)
Please use the Configuration Manual, Chapter: 8 “Upgrading an AP” for further information regarding the update process: 109744800
Entry belongs to following products:
SCALANCE W1750D-2IA RJ45 6GK5750-2HX01-1AA0 (Type: RoW)
SCALANCE W1750D-2IA RJ45 6GK5750-2HX01-1AB0 (Type: US)
SCALANCE W1750D-2IA RJ45 6GK5750-2HX01-1AD0 (Type: JP)
SCALANCE W1750D-2IA RJ45 supports virtual clusters in different sizes. For highest performance in high density applications we recommend a maximum of 64 APs in one cluster. Due to the fact, that there is no limitation you can use 128 APs in one virtual cluster with high performance, too. If you want to extend your network extensively (200 APs or more) or you have very high densities and requirements, we recommend using a compatible Aruba mobility controller.
Resolved Issues:
This release includes fixes for vulnerability documented in:
TLS ROBOT vulnerability - CVE-2017-13099
Links to SIEMENS Advisories:
Correction of SSA-464260: TLS ROBOT vulnerability in SCALANCE W1750D Products:
https://www.siemens.com/global/de/home/produkte/services/cert.html#SecurityVeroffentlichungen
Platform
Symptom: A Direct AP crashed and rebooted unexpectedly.
The issue is resolved by deleting all virtual APs before the AP is rebooted.
Scenario: This issue occurred due to a kernel panic. This issue was observed in Direct APs running Aruba Instant 6.5.1.0-4.3.1.2 or later versions.
IDS
Symptom: A Direct AP classified a neighboring Direct AP, which was not part of the network, as a rogue Direct AP.
The fix ensures that the Direct AP does not raise false rogue Direct AP alarms.
Scenario: This issue occurred when there were multiple roaming clients from other networks.
This issue was not limited to any specific Direct AP model or Aruba Instant release version.
Configuration
Symptom: Direct APs incorrectly processed XML API requests from port 80.
The fix ensures that the Direct APs process XML-API requests correctly.
Scenario: This issue was observed in Direct APs running Aruba Instant 6.4.4.6-4.2.4.0 or later versions.
Datapath/Firewall
Symptom: A Direct AP crashed and rebooted unexpectedly. The log file listed the reason for the event as Reboot caused by kernel panic: softlockup: hung tasks.
The fix ensures that the Direct AP works as expected.
Scenario: This issue was not limited to any specific Direct AP model or Aruba Instant release version.
Wi-Fi Driver
Symptom: A Direct AP rebooted unexpectedly. The log file listed the reason for the event as Reboot caused by kernel panic: Take care of the HOST ASSERT first. Enhancements to the wireless driver resolved this issue.
Scenario: This issue occurred due to a firmware assert. This issue was observed in 300 Series and 320 Series access points running Aruba Instant 6.5.1.0-4.3.1.2 or later versions.
ARM
Symptom: A Direct AP failed to restore statically configured channels after a continuous radar detection.
Enhancements to the ARM radar process resolved this issue.
Scenario: This issue was not limited to any specific Direct AP model or Aruba Instant release version.
Known Issues:
L2 and L3 Mobility
Symptom: Data packets are dropped when the client roams to a new Direct AP.
Scenario: The issue occurs due to an inconsistency in the formation of an L3 tunnel between the Direct APs.
This issue is observed in Direct APs running Instant 6.5.1.0-4.3.1.0 or later versions.
Workaround: None.
Notes:
Software is subject to export restrictions, download for registered users only.
The current wireless approvals list can be found at www.siemens.com/wireless-approvals
Third-party software - license conditions and copyright notes
You can find the copyright information for third-party software contained in this product, particularly open source software as well as applicable license conditions of such third-party software in OSS-SCALANCE_W1750D_86.html file below.
Special note for resellers
The information and the license conditions in the OSS-SCALANCE_W1750D_86.html file must be passed on to the purchasing party to avoid license infringements by the reseller or purchasing party.
Firmware:
Siemens_Hercules_8.3.0.1.zip (14,5 MB)
Security information
In order to protect plants, systems, machines and networks against cyber threats, it is necessary to implement – and continuously maintain – a holistic, state-of-the-art industrial security concept. Siemens’ products and solutions constitute one element of such a concept. For more information about industrial security, please visit
http://www.siemens.com/industrialsecurity.
Techn. Contact:
Customer Support, DF CS SD CCC TS, Kontaktformular
- Alemão
- Espanhol