About the Release Notes

This release notes document describes what is new or changed in this release. The document is updated as needed to provide information about new features, caveats, potential software deferrals, and related documents for the Cisco Aironet 1800S Active Sensor for this release.

We recommend that you view the field notices for this release to check whether your software or hardware platforms are affected. If you have an account on Cisco.com, you can find the field notices at http://www.cisco.com/en/US/customer/support/tsd_products_field_notice_summary.html.

However, if you do not have a Cisco.com account, you can find the field notices at http://www.cisco.com/en/US/support/tsd_products_field_notice_summary.html.

Overview of Cisco Aironet 1800S Active Sensor

The Cisco Aironet 1800S Active Sensor is a part of the Cisco DNA Center Assurance solution. The DNA Center Assurance platform has three components—Wireless Performance Analytics, Real-time Client Troubleshooting, and Proactive Health Assessment.

In this document, the term Network Sensor or sensor refers to the Cisco Aironet 1800S Active Sensor.

The Cisco Aironet 1800S Active Sensor is an 802.11a/b/g/n/ac (Wave 2) sensor with internal antennas. The sensor can be mounted, in a vertical orientation, on a wall or a desk, and supports 2x2:2 SS. The sensor is capable of joining an infrastructure access point as a client. The sensor can be used to monitor, measure, and troubleshoot a wireless network's overall performance.

For more information about the sensor, including mounting instructions and limited troubleshooting procedures, setup, and configuration, see the Cisco Aironet 1800S Active Sensor Getting Started Guide.

What's New in Release 2.3.2.0

There are no new features that are introduced in this release.

For more information about updates in this release, see the Caveats section in this document.

Servicability Enhancements

  • To view the sensor's backhaul profile configuration, a new command is introduced in this release.

    apsensor#show dot11 sensor backhaul-profile

  • In this release, the sensor creates a service bundle automatically when it senses the connection with the DNAC server is lost. After the connection is re-established, it uploads the service bundle to the DNAC server.

    A common use case is when the sensor uses the wireless backhaul, has a weak Wi-Fi signal, and frequently disconnects from the DNAC server.

Limitations and Caveats

This section provides information about known limitations and caveats relating to this release.

Known Limitations

  • The sensor fails to detect broadcasted beacons by other APs while scanning its RF environment. However, this behavior occurs intermittently with low probability. It does not associate with the target SSID when it cannot see the beacons and skips the test. The DNAC logs show the detection success rates. For more information, see CSCwa25257.

  • Problem If you configure the Hexadecimal password option on the controller for pre-shared key (PSK) authentication on the WLAN, the sensor might fail to onboard. As a result, the sensor performs a synthetic test on the WLAN.

    Solution To avoid this issue in the WLAN, configure the ASCII password (passphrase) corresponding to the Hex password (PSK).

  • Problem If you enable P2P blocking on the controller, or set it to forward upstream, you might observe IP Service-Level Agreement (SLA) test failures on the Cisco DNA Center sensor dashboard.

    Solution To avoid this issue, disable P2P on the controller.

  • Problem If the sensor runs on Cisco wireless software, such as Cisco Wireless Release 8.5 that supports Cisco IOS-based (Wave 1) APs, you might experience IP SLA test failure.

    Solution To avoid this issue, disable the IP SLA test for Cisco Wave 1 APs.

Caveats

Caveats describe unexpected behavior in the Cisco Wireless Network Sensor software. Severity 1 caveats are the most serious, while Severity 2 caveats are less severe.

The Open Caveats and Resolved Caveats sections list the caveats for this release.

Each caveat contains the following information:

  • Identifier: Each caveat is assigned a unique identifier (ID) with a pattern of CSCxxNNNNN, where x is any letter (a-z), and N is any number (0-9). Cisco documentation such as Security Advisories, Field Notices and other Cisco support documents frequently refer to these caveat IDs. Technical Assistance Center (TAC) engineers or other Cisco staff can also provide you with the ID for a specific caveat.

  • Description: A description is a brief of the issue observed when the caveat occurs.

Cisco Bug Search Tool

The Cisco Bug Search Tool (BST), the online successor to the Bug Toolkit, is designed to improve network risk management and device troubleshooting effectiveness. The BST allows partners and customers to search for software bugs based on product, release, and keyword and aggregates vital data, such as bug details, product, and version. The tool has a provision to filter bugs based on credentials to provide external and internal bug views for the search input.

For more information about using the Cisco Bug Search Tool effectively,including setting email alerts for bugs, filtering bugs, and saving bugs and searches, see the Bug Search Tool Help & FAQ page.

You can access the listed bugs through the BST. This web-based tool provides you access to the Cisco bug tracking system, which maintains information about bugs and vulnerabilities in the Cisco Wireless Network Sensor software and other Cisco hardware and software products.

Click the Caveat Identifier number in the table. The corresponding BST page gets displayed with the details of the bug.


Note

If you are not logged in, you will be redirected to a Log In page where you need to enter your registered Cisco.com username and password to log In. If you do not have a Cisco.com account, you can register for one.


If the defect that you have selected cannot be displayed, this may be due to one or more of the following reasons:

  • The defect number does not exist

  • The defect does not have a customer-visible description yet

  • The defect is marked Cisco Confidential

Open Caveats

There are no open caveats in Release 2.3.2.0.

Resolved Caveats

Table 1. Resolved Caveats for Release 2.3.2.0

Caveat ID Number

Description

CSCvz25195

1800S-Sensor- CRITICAL - Heartbeat thread is Dead, will restart - error- CZ

CSCvz44382

Functional Sensor PNP Onboarding fails when backhaul profile have password with quote characters