Compare Products
Hide
VS
New Feature |
Feature |
Source of Demand |
Description |
Hotspot2.0 |
Market |
Hotspot 2.0 R2 protocol |
SSID isolation |
Market |
SSID isolation (VLAN isolation) New commands: data-plane user-isolation vlan vid data-plane user-isolation trusted-mac H.H.H vlan vid data-plane user-isolation trusted-ip ipv4-address vlan vid show data-plane user-isolation show data-plane user-isolation state |
Metrics collection |
Internal |
Metrics collection clear metrics all clear metrics group group-name [ metric-name ] show metrics define summary show metrics define summary group group-name show metrics detail show metrics summary show metrics summary group group-name |
Flash optimization |
Internal |
Metrics collection consumes a portion of flash storage. Flash optimization can be performed. |
Import of international product features |
Internal |
L-Series product features are imported (for international use), including the small-bin function, customization of default country codes (setmac), device positioning LED (fat and cloud modes), international sharing containment, and import/export of AP configuration lists. |
Zero touch provisioning |
Market |
Deployment through the registration center is supported. The registration center can determine the Cloud to which the AP is connected and deliver the Cloud URL to the AP accordingly. |
Feature |
Source of Demand |
Description |
AC flooding optimization |
External |
The egress node obtaining function is moved from the virtual thread to the broadcast virtual thread. |
Bonjour quality enhancement |
Internal |
This feature is used to address the issue of excessive VSP message volume between the AP and the AC, and the problem of issuing too many ACE entries in anti-preemption mode. |
Metrics collection |
Internal |
The key metrics and parameters of devices are collected periodically. |
RPCAP |
Internal |
All APs support Remote Packet Capture (RPCAP). APs instead of packet capture NICs are used for packet obtaining. |
Packet tracking |
Internal |
Online/offline packets of VIP clients can be tracked, including auth, assoc, and DHCP packets. |
Internal |
The country code compliance table is updated and the description of the power control function required by country code regulations is added. |
Bug ID |
Description |
First Release |
938839 |
Network delay occurs occasionally when the clients of the RG-MAP852 V1.xx access the Internet. |
AP_RGOS11.9(6)W1B1, Release(09192519) |
913329 |
After the port description is configured, run the show lldp nei detail command. The displayed port name is changed to the port description and the original port information is overwritten. |
AP_RGOS 11.9(6)W2B1, Release(09192519) |
910433 |
Some clients connected to the RG-MAP852 V4.xx AP fail to obtain IP addresses. |
AP_RGOS 11.9(6)W2B7, Release(10150120) |
951683 |
After successful login to the web system, users fail to access the homepage and receive a server busy error message. |
AP_RGOS 11.9(6)W2B7, Release(10150120) |
927531 |
The RG-AP850-I(V2) V1.xx AP crashes due to single-bit rewriting. |
AP_RGOS 11.9(6)W2B1, Release(10150120) |
927529 |
The RG-AP850-I(V2) V1.xx AP triggers an AMSDU processing error, leading to a crash during print debugging. |
AP_RGOS 11.9(6)W2B1, Release(10150120) |
957923 |
In hierarchical scenarios, the AP is disconnected from the AC abnormally. After the connection is restored, the AP is disconnected again with upper notify displayed in double tunnels. |
11.9(6)B1P6S4, Release(09212412) |
936799 |
Multiple RG-AM5528 V1.xx APs go offline periodically. |
AP_RGOS 11.9(6)W2B1, Release(10150120) |
B927544 |
The interval for time_before/time_after comparison does not exceed half of the overflow time. |
AP_RGOS 11.9(6)W2B1, Release(10150120) |
998124 |
The MAP is connected to the switch in normal mode. Since the mode detection mechanism is invalid, it fails to automatically switch to normal mode and cannot go online on the AC. |
AP_RGOS 11.9(6)W3B1, Release(10172606) |
984773 |
Wireless users occasionally obtain IPv6 addresses across VLANs. |
AM_RGOS 11.9(6)B1P3, Release(08130810) AP_RGOS 11.1(9)B1P23, Release(07151618) |
976190 |
After the AP version is upgraded, continuous packet loss occurs on clients connected to the AP, causing communication or network access failures (AP models involved: RG-AP840-I(V2) V1.xx, RG-AP840-L V1.xx, RG-AP880-AR V1.xx, RG-AP850-AR(V3) V1.xx, and RG-AP880-A V1.XX). |
AP_RGOS 11.9(6)W2B7, Release(10172320) |
1031048 |
When an MAB authentication error occurs on a wireless client in a VAC, the PoE switch learns the MAC address of the client from the uplink port of the AP, causing a failure for the PoE switch to learn the correct client MAC address. |
AP_RGOS 11.9(6)W3B7, Release(10182700) |
1051963 |
In scenarios where 802.1X or PSK authentication is enabled, clients may fail to access the Internet for a short period of time when repeatedly associating with the AP. |
AP_RGOS 11.9(6)W2B1, Release(09230205) |
1066857 |
Some clients connected to the RG-AP820-L(V3) AP may fail to be authenticated when they roam out and roam back to the same AP. |
AP_RGOS 11.9(6)B9, Release(09152904) |
984602 |
The memory usage during the DNS SNP process is high, causing AP crash and restart due to memory exhaustion. |
AP_RGOS 11.9(6)B1T6, Release(08152421) |
1064906 |
The new version of PPSK allows multiple WLANs to be enabled with PPSK, which must be bound to WLAN IDs. However, Ruijie Cloud does not support WLAN ID binding. When a client goes online, the binding cannot be found in the user entries. The client is considered to be using an old key and is disconnected, resulting in a PPSK authentication failure when the cloud AP connects to Ruijie Cloud. |
AP_RGOS 11.9(0)B0, Release(10212418) |
1064563 |
The AP enters the quiet mode on the DFS channel. Before the radio automatically goes up, the driver executes the clearing of the DATA_BLOCK_QUIET flag bit. As a result, the AP does not respond to authentication, association, re-association packets, causing a failure for clients to associate with the AP. |
AP_RGOS 11.9(6)W3B1, Release(10220907) |
1068218 |
The WLAN BS module error causes low 5 GHz signal strength on the AP. |
AP_RGOS 11.9(6)W3B1, Release(10172605) |
1074977 |
The data plane module allows mDNS and SSDP packets to pass through by default, and there is no command to disable this function. Now, the AP is configured to block mDNS and SSDP packets by default, and the CLOSE command is used to block mDNS and SSDP packets. |
AP_RGOS 11.9(6)W3B1, Release(10172605) |
1082716 |
Before the RG-AP4820 goes online, the AP name is configured in offline state. When the AP goes online, it fails to obtain the AP index through the AP name during the process of updating the feeder cable detection enabling status. As a result, the feeder cable detection enabling status is not updated and delivered to the AP. Therefore, the AP does not receive the notification of enabling the feeder cable detection and does not report the feeder cable status. Then the two sides display inconsistent information. |
AP_RGOS 11.9(6)W2B1, Release(10142114) |
1080861 |
When the server sends ping response packets that carry the content-length field in batches, the device receives the packets in batches. However, after the packets are received, the device does not clear the remaining content length, resulting in file descriptor overload. Redirection fails when the number of file descriptors exceeds 1,024. |
11.1(9)B1P30, Release(08190210) |
1082478 |
The RG-AM55xx i-Share master AP system has a command execution vulnerability. When the httpd service is disabled, the Eweb function on the AM master AP will be disabled. |
AM_RGOS 11.9(6)W3B1, Release(10191306) |
986892 |
When 802.1X and PSK authentication are enabled on the AP, EAP key negotiation is performed when clients go online. By default, EAP packets are sent with a higher priority. Before sending EAP packets, the AP initiates ADDBA negotiation, which also utilizes high-priority transmission, occupying the packet sending queue. This may lead to a packet sending queue scheduling exception in the driver, and then the entire queue is suspended for 60 seconds without packet transmission. In this case, clients may repeatedly associate with the AP, causing clients to be disconnected due to traffic interruption. |
AP_RGOS 11.9(6)W2B7, Release(10172320) |
1111631 |
When a client roams between APs, it may not initiate an HTTP request proactively, causing a failure to trigger MAB authentication. As a result, the client fails to access the Internet. |
AP_RGOS 11.9(6)W1B4, Release(10221821) |
1139657 |
Interference from the optical port affects the Wi-Fi signal of the device, resulting in high latency or packet loss. |
AP_RGOS 11.9(6)W3B1T14, Release(10242821) |
948174 |
The blocklist and allowlist configured in Fat mode on the AP do not take effect. As a result, clients can access the AP freely. |
AP_ RGOS 11.9(6)W3S1, Release(10160419) |
1140590 |
The AP840-L AP is reset by the hardware dog during operation, causing a device restart. |
AP_RGOS 11.9(2)B2P2, Release(07150918) |
Ruijie Networks websites use cookies to deliver and improve the website experience.
See our cookie policy for further details on how we use cookies and how to change your cookie settings.
Cookie Manager
When you visit any website, the website will store or retrieve the information on your browser. This process is mostly in the form of cookies. Such information may involve your personal information, preferences or equipment, and is mainly used to enable the website to provide services in accordance with your expectations. Such information usually does not directly identify your personal information, but it can provide you with a more personalized network experience. We fully respect your privacy, so you can choose not to allow certain types of cookies. You only need to click on the names of different cookie categories to learn more and change the default settings. However, blocking certain types of cookies may affect your website experience and the services we can provide you.
Through this type of cookie, we can count website visits and traffic sources in order to evaluate and improve the performance of our website. This type of cookie can also help us understand the popularity of the page and the activity of visitors on the site. All information collected by such cookies will be aggregated to ensure the anonymity of the information. If you do not allow such cookies, we will have no way of knowing when you visited our website, and we will not be able to monitor website performance.
This type of cookie is necessary for the normal operation of the website and cannot be turned off in our system. Usually, they are only set for the actions you do, which are equivalent to service requests, such as setting your privacy preferences, logging in, or filling out forms. You can set your browser to block or remind you of such cookies, but certain functions of the website will not be available. Such cookies do not store any personally identifiable information.
Contact Us
How can we help you?
Your opinions and feelings are crucial for our improvement.
Fill in the survey