Early Access EAP223 V2, EAP225 V3&V3.2 EAP225 V4 EAP225-Outdoor V1&V3 Pre-release (Released on Mar 3rd, 2024)
This Article Applies to: EAP223 V2, EAP225 V3&V3.2, EAP225 V4, EAP225-Outdoor V1&V3 | Adapted to Omada SDN Controller v5.9
Update as of Apr 24, 2024:
Thank you all for your valuable feedback on the Beta firmware!
The official firmware of mentioned EAPs have been released, check the following link for details.
EAP223(EU)_V2_5.1.6 Build 20240313
EAP225(US)_V3_5.1.6 Build 20240313
EAP225(EU)_V3_5.1.6 Build 20240313
EAP225(EU)_V4_5.1.6 Build 20240313
EAP225-Outdoor(EU)_V3_5.1.6 Build 20240313
EAP225-Outdoor(US)_V1_5.1.6 Build 20240313
Release Notes
New Feature/Enhancement
1. Add support for IPv6.
2. Add support for Bonjour Service in Controller mode.
3. Add support for multiple Radius Servers.
4. Add support for diagnose tools function, including Ping, Traceroute, Packet Capture, Terminal, and Device Info.
Add support for LLDP (Link Layer Discovery Protocol).
5. Add support for ‘Lock to AP’.
6. Add support for reporting RADIUS username.
7. Add support for PMF in Controller mode.
8. Add support for SSID Rate Limit.
9. Add support for Multicast Management in Controller mode.
10. Add support for switch button on disable access to management page through HTTP in Standalone mode.
11. Add support for Mesh in standalone mode.
12. Optimize stability.
Bug Fixed
1. Fixed the bug of Band steering Feature working abnormally.
2. Fix the bug of supporting HTTP by default.
3. Fixed the bug that the HTTP process works abnormally when a post request does not carry any fields.
4. Fixed the bug that the UI cannot be automatically refreshed when delete MAC Groups in MAC Filter.
5. Fixed the issue where Terminal showed that, the target address was unreachable but was actually reachable when try ping before Traceroute ends.
6. Fixed the bug that 802.11r works abnormally when PPSK with RADIUS is enabled.
7. Fixed the bug that the client can still connect to the SSID when WPA-Persona and MAC-based authentication were set and the Radius server was offline.
8. Fixed the bug that the AP would reboot when the SSID enable ARP-to-Unicast Conversion and the clients associated with the SSID send ARP packets to each other in controller mode.
9. Fixed the bug that the destination IP address cannot be pinged normally when the ping packet size at Network Check is an odd number.
10. Fixed the bug that the Group Key Update Period value becomes default value when update the SSID in APP.
11. Fixed the bug of auto rebooting when using IPv6 URL Filtering.
12. Fixed the bug of duplicate Rogue AP entries.
13. Fixed the bug that mDNS packets with VLAN tags would cause the AP to reboot when only custom rules were configured for mDNS Bonjour rules.
14. Fixed the bug that the VLAN works abnormally when using PPSK with RADIUS.
15. Fixed the bug of stuck inter-process communication when number of clients performing the MAC Authentication at the same time.
16. Fixed the bug of device crash when switching WLAN Group.
17. Fixed some security issues.
Firmware Download
Attention:
1. Please be sure you have read the Beta Test Agreement before upgrading the Pre-release firmware!
2. Please ensure that you know which version (EU/US/CA/JP/EG) you shall use on your Omada EAP devices before you download the following EAP firmware.
EAP223(EU)_v2.0_5.1.3_Build20240222(Pre-release Version)
EAP225(EU)_v3.20_5.1.3_Build20240222(Pre-release Version)
EAP225(EU)_v4.0_5.1.3_Build20240222(Pre-release Version)
EAP225(US)_v3.0_5.1.3_Build20240222(Pre-release Version)
EAP225-Outdoor(EU)_v3.0_5.1.3_Build20240222(Pre-release Version)
EAP225-Outdoor(US)_v1.0_5.1.3_Build20240222(Pre-release Version)
Notes:
(1) The above firmware is applied to EAP223(EU) V2, EAP225(US) V3.0, EAP225(EU) V3.20, EAP225(EU) V4.0, EAP225-Outdoor(US) V1.0 and EAP225-Outdoor(EU) V3.0
(2) Your device’s configuration won’t be lost after upgrading.
(3) The above firmware is fully adapted to Omada SDN Controller v5.9.
Feedback
Any further feedback on the new firmware, please feel free to comment below or start a new thread from HERE.
To get better assistance, you may check Tips For Efficiently Reporting an Issue In The Community.
When reporting an issue, especially it's about firmware upgrade, it's suggested to include the following info:
- Management mode (Controller or Standalone)
- Device Model(s) and Hardware
- Device Firmware (previous and current)
Thank you in advance for your great cooperation and support.
Recommended Threads
Experience the Latest Omada EAP Firmware - Trial Available Here, Subscribe for Updates!
Current Available Solutions to Omada EAP Related Issues [Constantly Updated]
Get the Latest Omada SDN Controller Releases Here - Subscribe for Updates
- Copy Link
- Subscribe
- Bookmark
- Report Inappropriate Content
@Hank21 Yes, on the latest firmware it works after disabling WPA3 and PMF. I don't know if PMF was enabled on the 5.1.0 firmware, but WPA3 support definitly was enabled.
Of course I think WPA3 should be able to be supported without causing issues with the WiFi adapter on Windows 11. This specific adapter is (as far as I can tell) still available in stores. I've bougt it less than 2 years ago.
Kind regards,
Jorg
- Copy Link
- Report Inappropriate Content
Jorgh wrote
@Hank21 Yes, on the latest firmware it works after disabling WPA3 and PMF. I don't know if PMF was enabled on the 5.1.0 firmware, but WPA3 support definitly was enabled.
Of course I think WPA3 should be able to be supported without causing issues with the WiFi adapter on Windows 11. This specific adapter is (as far as I can tell) still available in stores. I've bougt it less than 2 years ago.
Kind regards,
Jorg
Hi @Jorgh
Thanks for sharing. The PMF cannot be disabled when the WPA Mode contains WPA3. And some wireless devices such as non-PMF-capable devices might fail to connect to the SSID when Mandatory is selected. That's why we may suggest you to change the PMF mode or exclude the WPA3 so that you can disable the PMF.
- Copy Link
- Report Inappropriate Content
Information
Helpful: 0
Views: 4158
Replies: 22
Voters 0
No one has voted for it yet.