Guest

Cisco ASA 5500-X Series Next-Generation Firewalls

Cisco ASA 5500 Series Release Notes, Version 7.0(5)

 Feedback

Table Of Contents

Cisco ASA 5500 Series Release Notes Version 7.0(5)

Contents

Introduction

System Requirements

Memory Requirements

Determining the Software Version

Upgrading to a New Software Release

New Features

Important Notes

Important Notes in Release 7.0

FIPS 140-2

Hostname and Domain Name Limitation

WebVPN ACLS and DNS Hostname

Proxy Server and ASA

Mismatch PFS

ACS Radius Authorization Server

Readme Document for the Conduits and Outbound List Conversion Tool 1.2

User Upgrade Guide

Features not Supported in Version 7.0

MIB Supported

Downgrade to Previous Version

Caveats

Open Caveats - Release 7.0(5)

Resolved Caveats - Release 7.0(5)

Related Documentation

Software Configuration Tips on the Cisco TAC Home Page

Obtaining Documentation and Submitting a Service Request


Cisco ASA 5500 Series Release Notes Version 7.0(5)


April 2006

Contents

This document includes the following sections:

Introduction

System Requirements

New Features

Important Notes

Caveats

Related Documentation

Obtaining Documentation and Submitting a Service Request

Introduction

The Cisco ASA 5500 series security appliance delivers unprecedented levels of defense against threats to the network with deeper web inspection and flow specific analysis, improved secure connectivity through end-point security posture validation and voice and video over VPN support. It also provides enhanced support for intelligent information networks through improved network integration, resiliency, and scalability. This release introduces significant enhancements to all major functional areas, including: firewalling and inspection services, VPN services, network integration, high-availability services, and management/monitoring.

For more information on all the new features, see New Features.

Additionally, the Cisco ASA 5500 series security appliance software supports Adaptive Security Device Manager. ASDM is a browser-based, Java applet used to configure and monitor the software on the security appliances. ASDM is loaded from the security appliance, then used to configure, monitor, and manage the device.

System Requirements

The sections that follow list the system requirements for operating a Cisco ASA 5500 series security appliance. This section includes the following topics:

Memory Requirements

Determining the Software Version

Upgrading to a New Software Release

Memory Requirements

Table 1 lists the DRAM memory requirements for the Cisco ASA 5500 series security appliance.

Table 1 DRAM Memory Requirements 

ASA Model
DRAM Memory

ASA 5510

256 MB

ASA 5520

512 MB

ASA 5540

1 GB


All Cisco ASA 5500 series security appliances require a minimum of 64 MB of internal CompactFlash.

Determining the Software Version

Use the show version command to verify the software version of your Cisco ASA 5500 series security appliance.

Upgrading to a New Software Release

If you have a Cisco.com (CDC) login, you can obtain software from the following website:

http://www.cisco.com/cisco/software/navigator.html

New Features

Released: April 14, 2006

Table 2 lists the new features for ASA and PIX Version 7.0(5)/ASDM Version 5.0(5).

Table 2 New Features for ASA and PIX Version 7.0(5)/ASDM Version 5.0(5) 

Feature
Description
Application Inspection Features

Command to Control DNS Guard

You can now control the DNS guard function. In releases prior to 7.0(5), the DNS guard functions are always enabled regardless of the configuration of DNS inspection:

Stateful tracking of the DNS response with DNS request to match the ID

Tearing down the DNS connection when all pending requests are responded

This command is effective only on interfaces with DNS inspection disabled (no inspect dns). When DNS inspection is enabled, the DNS guard function is always performed.

We introduced the following command: dns guard.

Enhanced IPSEC Inspection

The ability to open specific pinholes for ESP flows based on existence of an IKE flow is provided by the enhanced IPSec inspect feature. This feature can be configured within the MPF infrastructure along with other inspects. The idle-timeout on the resulting ESP flows is statically set at 10 minutes. There is no maximum limit on number of ESP flows that can be allowed.

We introduced the following command: inspect ipsec-pass-thru.

Firewall Features

Command to Disable RST for Denied TCP Packets

When a TCP packet is denied, the adaptive security appliance always sends a reset when the packet is going from a high security to a low security interface. The service resetinbound command is used to enable or disable sending resets when a TCP packet is denied when going from a low security to a high security interface. The service resetinbound command is introduced to control sending RESETs when a packet is denied when going from a high security to a low security interface. The existing service resetinbound command is enhanced to take an additional interface option.

We introduced the following commands: service resetoutbound, service resetinbound.

Platform Features

Increased Connections and VLANs

The maximum connections and VLANs is increased to the following numbers.

ASA5510 base license conns 32000->50000 vlans 0->10

ASA5510 plus license conns 64000->130000 vlans 10->25

ASA5520 conns 130000->280000 vlans 25->100

ASA5540 conns 280000->400000 vlans 100->200

Management Features

Password Increased in Local Database

Username and enable password length limits increased from 16 to 32 in the LOCAL database.

Enhanced show interface and show traffic Commands

The traffic statistics displayed in both the show interface and show traffic commands now support 1 minute rate and 5 minute rate for input, output and drop. The rate is calculated as the delta between the last two sampling points. For a 1 minute rate and a 5 minute rate, a 1 minute timer and a 5 minute timer are run constantly for the rates respectively. An example of the new display follows:

      1 minute input rate 128 pkts/sec,  15600 bytes/sec
      1 minute output rate 118 pkts/sec,  13646 bytes/sec
      1 minute drop rate 12 pkts/sec
      5 minute input rate 112 pkts/sec,  13504 bytes/sec
      5 minute output rate 101 pkts/sec,  12104 bytes/sec
      5 minute drop rate 4 pkts/sec

Important Notes

Important Notes in Release 7.0

This section lists important notes related to release 7.0(5).

FIPS 140-2

The Cisco ASA 5500 series security appliance is on the FIPS 140-2 Pre-Validation List.

Hostname and Domain Name Limitation

When using ASDM, the hostname and domain names combined should not be more than 63 characters long. If the hostname and domain names combined is more than 63 characters, you will get an error message.

WebVPN ACLS and DNS Hostname

When a deny webtype URL ACL (DNS-based) is defined, but the DNS-based URL is not reachable, a "DNS Error" popup is displayed on the browser. The ACL hitcounter is also not incremented.

If the URL ACL is defined by an IP instead of DNS name, then the traffic flow hitting the ACL will be recorded in the hitcounter and a "Connection Error" is displayed on the browser.

Proxy Server and ASA

If WebVPN is configured to use an HTTP(S)-proxy server to service all requests for browsing HTTP and/or HTTPS sites, the client/browser may expect the following behavior:

1. If the ASA cannot communicate with the HTTPS or HTTPS proxy server, a "connection error" is displayed on the client browser.

2. If the HTTP(S) proxy cannot resolve or reach the requested URL, it should send an appropriate error to the ASA, which in turn will display it to the client browser.

Only when the HTTP(S) proxy server notifies the ASA of the inaccessible URL, can the ASA notify the error to the client browser.

Mismatch PFS

The PFS setting on the VPN client and the security appliance must match.

ACS Radius Authorization Server

When certificate authentication is used in conjuction with Radius authorization, the ACS server sends a bogus Group=CISCOACS:0003b9c6/5a940131/username and is displayed in the vpn-session database.

Readme Document for the Conduits and Outbound List Conversion Tool 1.2

The Cisco ASA 5500 series security appliance Outbound/Conduit Conversion tool assists in converting configurations with outbound or conduit commands to similar configurations using ACLs. ACL-based configurations provide uniformity and leverage the powerful ACL feature set. ACL based configurations provide the following benefit:

ACE Insertion capability - System configuration and management is greatly simplified by the ACE insertion capability that allows users to add, delete or modify individual ACEs.

User Upgrade Guide

For a list of deprecated features, and user upgrade information, go to the following URL:

http://www.cisco.com/en/US/docs/security/asa/asa70/vpn3000_upgrade/upgrade/guide/migr_vpn.html

Features not Supported in Version 7.0

The following features are not supported in Version 7.0(5):

PPPoE

L2TP over IPSec

PPTP

MIB Supported

For information on MIB Support, go to:

http://www.cisco.com/public/sw-center/netmgmt/cmtk/mibs.shtml

Downgrade to Previous Version

To downgrade to a previous version of the operating system software (software image), use the downgrade command in privileged EXEC mode. For more information and a complete description of the command syntax, see the Cisco Security Appliance Command Reference.

Caveats

The following sections describe the caveats for the 7.0(5) release.

For your convenience in locating caveats in Cisco's Bug Toolkit, the caveat titles listed in this section are drawn directly from the Bug Toolkit database. These caveat titles are not intended to be read as complete sentences because the title field length is limited. In the caveat titles, some truncation of wording or punctuation may be necessary to provide the most complete and concise description. The only modifications made to these titles are as follows:

Commands are in boldface type.

Product names and acronyms may be standardized.

Spelling errors and typos may be corrected.


Note If you are a registered cisco.com user, view Bug Toolkit on cisco.com at the following website:

http://tools.cisco.com/Support/BugToolKit/

To become a registered cisco.com user, go to the following website:

http://tools.cisco.com/RPF/register/register.do


Open Caveats - Release 7.0(5)

Table 3 Open Caveats 

ID Number
Software Release 7.0(5)
Corrected
Caveat Title

CSCei47678

No

SNMP packet size standards in RFC3417 not fully supported.

CSCek21836

No

SIP: BYE embryonic connection timestamp not updated.

CSCsc36891

No

Higher CPU utilization for url filtering in recent releases.

CSCsc37965

No

IP-directed broadcasts no longer allowed through device.

CSCsc68575

No

CPU usage is higher for given traffic throughput in recent releases.

CSCsc97602

No

Traceback is sometimes observed in tmatch compile thread.

CSCsd00086

No

ASDM connection may cause packet loss

CSCsd08170

No

UDP 500 not removed from pat port pool when crypto map is applied

CSCsd59936

No

Registering to the RP for PIM fails if fragmented in more then 12 packs

CSCsd69625

No

EZVPN:IOS C876 Client can't connect to ASA using digi certs and noXauth

CSCsd75865

No

VPN address pool overlap may cause packet drop.

CSCsd78428

No

Traceback may occur in Checkheaps on standby unit

CSCsd79596

No

H245 connection going idle although traffic on RTP stream and H225.

CSCsd82355

No

Malformed syslog packets may be generated.

CSCsd82714

No

RTSP fails with Windows media player

CSCsd84394

No

IPSec: Invalid block submitted to outbound packet processing

CSCsd85345

No

Traceback may occur in fover_parse on 7.0.4

CSCsd89503

No

Traceback during failover in routing module

CSCsd93207

No

Show failover indicates different uptimes on devices in failover pair

CSCsd93380

No

Packets for VPN-l2l peer get dropped instead of encrypted


Resolved Caveats - Release 7.0(5)

Table 4 Resolved Caveats 

ID Number
Software Release 7.0(5)
Corrected
Caveat Title

CSCeh46345

Yes

Dynamic L2L could pass clear text traffic when tunnel terminates

CSCeh60845

Yes

Logginig queue incorrectly registers 8192 256-byte blocks

CSCeh70043

Yes

DOC: sh asp drop needs further clarification in doc

CSCeh90617

Yes

Recompiling ACLs can cause packet drops on low-end platforms

CSCei43588

Yes

traceback when trying to match a packet to acl with deny

CSCek21835

Yes

Higher metric OSPF external route is selected

CSCek21837

Yes

PDM with Command Authorization requires the write command for Read-Only

CSCek21838

Yes

SIP: fail to open a conn for Record route in NOTIFY

CSCek21843

Yes

SIP: Not translate c= address if first m= has port 0 in SDP body.

CSCek21849

Yes

Backspace sent in cut-through proxy authentication

CSCek26572

Yes

tftp fixup does not allow error message from client

CSCsc02485

Yes

Session Cmd: sendind 036xr to exit session to ssm causes Traceback

CSCsc03061

Yes

CLI should generate Warning if kerberos-relm is not in all uppercase

CSCsc07614

Yes

Minimum unit poll time causes trouble for failover with 4GE card

CSCsc08188

Yes

5540 crash during 1000+ tunnel, multi-encapsulation system testing

CSCsc12094

Yes

AAA fallback authentication does not work with reactivation-mode timed

CSCsc15434

Yes

Assertion violation w/icmp traffic and icmp inspection

CSCsc16041

Yes

'clear local host' results in memory leak

CSCsc16507

Yes

url-server: cannot remove despite having removed url-block cmd

CSCsc18444

Yes

Tunnel-group for specific peer not created upgrading to 7.0 w/ certs

CSCsc18911

Yes

ASA does not remove OSPF route for global PAT entry after deleting

CSCsc20102

Yes

webfo: traceback during bulk sync in vpnfol_thread_sync

CSCsc26331

Yes

PKI: CR should not be used to terminate certificate console input

CSCsc27972

Yes

Traceback when changing crypto maps when Answer-Only in lower sequence

CSCsc31762

Yes

Fixup RTSP does not re-write the SET Parameter to the NATed IP address

CSCsc31788

Yes

Failover Primary access-list delete problem crashes secondary

CSCsc33385

Yes

GTP - pdp context creation failed - GSN tunnel limit exceeded

CSCsc34022

Yes

ASA requires improved failover testing method

CSCsc36332

Yes

Crash with show running-config all when priority class configured

CSCsc36898

Yes

FIPS: POST Bypass test failure

CSCsc37492

Yes

ASA: snmp-server host is not working in some circumstances

CSCsc39334

Yes

Crash due to check-retransmission from the tcp-map

CSCsc39559

Yes

APPFW:Obfuscated characters causing alert with firefox browser

CSCsc42204

Yes

Syslog ID 111005 no longer being logged when user exits config mode

CSCsc44566

Yes

Traceback in Dispatch Unit - pm_rcv_cb_ids

CSCsc44591

Yes

Traceback in ARP Thread - arp_sendbp in mulicontext mode

CSCsc46976

Yes

SIP: crash when failed to pre-allocate early rtp

CSCsc48330

Yes

OpenSSL Security Advisory: Potential SSL 2.0 Rollback

CSCsc48463

Yes

Traceback on ASA 5510 in Thread Name: vpnfo_thread_msg

CSCsc49830

Yes

IKE daemon crashes after upgrading

CSCsc49873

Yes

VPN-filter not applied without for remote VPN clients without xauth

CSCsc56552

Yes

Adding user context causes traceback on Standby unit

CSCsc57901

Yes

Memory leak when the standby unit fails to parse IKE messages

CSCsc57935

Yes

ASA FO should give warning when there is OS version difference

CSCsc58416

Yes

ASA crash in Dispatch Unit thread

CSCsc59298

Yes

VPN: IPSec errors are reported when trying to fragment compressed pkts

CSCsc60506

Yes

Large banner from RADIUS is causing traceback

CSCsc67347

Yes

VPN locks up under throughput stress

CSCsc73580

Yes

traceback in logger_save after clear config logging

CSCsc73942

Yes

TCP RST is dropped when there is outstanding data that is not acked

CSCsc77884

Yes

GTP: should check spare bits in header

CSCsc78817

Yes

ASA crashes in FWTask() during clear config all

CSCsc78900

Yes

Reload with Thread Name: Dispatch Unit at tcp_check_packet

CSCsc81668

Yes

https://<ip>/config does not have the same privilege level as 'write'

CSCsc83854

Yes

ASA endlessly sends Radius Access-Requests when requesting a BIG dACL

CSCsc84291

Yes

When using SSL the warning message is not returned back

CSCsc86217

Yes

Voice Proxy Function does not preserve DSCP bits.

CSCsc90944

Yes

ASA sends malformed https proxy authentication page.

CSCsc92575

Yes

Upgrade Activation Key reduces permitted interfaces

CSCsc97846

Yes

CPU utilization increase when adding more logging hosts.

CSCsc97905

Yes

traceback when running codenomicon snmp suite. eip 0x00ebf294

CSCsc98336

Yes

Large group-policy names cause crash if used with IPSec

CSCsc99263

Yes

GTPv1: Subsequent Create Req to modify PDP context IEs are not processed

CSCsc99339

Yes

traceback when running ospf codenomicon suite.eip 0x00ef5f7c

CSCsc99364

Yes

SSL Certs from Verisign Managed PKI do not install

CSCsd00051

Yes

SNMP polling may cause packet loss

CSCsd00175

Yes

ASA5510 drops FIN/ACK packets resulting in half open FTP sessions

CSCsd01096

Yes

Primary active crash and both primary and secondary are non-active

CSCsd01722

Yes

ASA 7.0 logging message 419001 always sent in message lists

CSCsd02938

Yes

ASA doesn't reconnect if websense server goes down

CSCsd03391

Yes

TCP Intercept doesn't negate CPU impact when SYN flood from adjacent net

CSCsd04700

Yes

match port option for setting connection time-outs does not work

CSCsd08060

Yes

Memory corruption caused by session DB when events are out of sync..

CSCsd10138

Yes

Crash in Checkheaps thread when enabling LAN2LAN vpn

CSCsd11179

Yes

SNMP polling of resource MIBS may cause packet loss

CSCsd11511

Yes

Crash due to memory corruption in sanity check of the Checkheaps thread

CSCsd11908

Yes

Traceback in logger_save thread

CSCsd13334

Yes

ASA, Memory Leaking tunnel-group authorization-dn-attributes

CSCsd13938

Yes

Traceback and Assertion in "fover_dev.c", line 513

CSCsd16751

Yes

GTP: wrong service-policy used when connection is re-used

CSCsd22910

Yes

users with passwords longer than 11 chars can no longer authenticate

CSCsd25553

Yes

ASA crashes when VPN client tries to make connection to inside interface

CSCsd28581

Yes

ASA failover : Secondary crashes with Thread Name: IKE Daemon

CSCsd31068

Yes

platform image read as ascii if uploaded by asdm to flash:

CSCsd34070

Yes

H.245 inspection skipped when malformed GKRCS packet

CSCsd36030

Yes

in multiple policy-maps, packets should match the first map,not the last

CSCsd37075

Yes

DSH API should check for 0 handle

CSCsd38929

Yes

SSL Verisign imported certificate fails when establishing SSL session

CSCsd39029

Yes

Traceback with Thread Name: Dispatch Unit

CSCsd44349

Yes

PIM codenomicon suite crashes box - eip 0x010811f3

CSCsd45099

Yes

logging debug-trace should not prevent debugs from printing to console

CSCsd46111

Yes

Traceback when using sh xlate via telnet over VPN tunnel

CSCsd46922

Yes

High CPU usage when configuring/compiling ACL's

CSCsd48512

Yes

Duplicate ASP crypto table entry causes firewall to not encrypt traffic

CSCsd51884

Yes

Restore debug icmp trace functionallity - showing nat translation

CSCsd58620

Yes

H.323: Memory Leak Under Load

CSCsd58848

Yes

Memory allocated for connections not freed

CSCsd63673

Yes

ASA with dhcprelay doesnt reply with unicast DHCP offer

CSCsd64394

Yes

Deny syslog not generated for denied URLs trafic

CSCsd64912

Yes

url-server: tcp connections fail when tcp stack users are exhausted

CSCsd64920

Yes

url-server: url lookup requests are not retried when using tcp

CSCsd65209

Yes

url-block block: http response buffering feature does not work

CSCsd65215

Yes

Capture access-list shows only 1 hit count for outbound traffic

CSCsd67647

Yes

Traceback in obj-f1/tcp:_q_copydata+26 on copying image to ftp server

CSCsd70242

Yes

Some syslogs are incorrectly logged to an event list, when not specified

CSCsd70812

Yes

HA: Traffic Stall after config syncing running Act/Act fover

CSCsd72617

Yes

Dispatch Unit Crash when HTTP inspect enabled...ASA 7.1.2, 7.0.4-11

CSCsd72951

Yes

Traceback: Thread Name: IKE Daemon (Old pc 0x00507433 ebp 0x03bdc498)

CSCsd74964

Yes

SNP Inspect Http drops messages other than GET

CSCsd75794

Yes

MFW:R applfw crash on codenomicon http suite, test 39614 or 39615

CSCsd76384

Yes

dhcpc fails when management-access is configured

CSCsd77018

Yes

Traceback in obj-f1/snp_fp_main:_snp_fp_fragment+260

CSCsd77155

Yes

All out of order packets dropped by tcp normalizer

CSCsd78595

Yes

Global buffer drop output under show service-policy

CSCsd79775

Yes

ASA VPN: all packets for a l2l peer get dropped instead of encrypted

CSCsd81496

Yes

crash when websense service is restarted while requests are pending

CSCsd82114

Yes

Change of log options on the ACE doesn't take immediate effect

CSCsd83007

Yes

Need ability to disable dns guard in 7.0

CSCsd83863

Yes

Reload with Thread Name: Dispatch Unit

CSCsd85007

Yes

Dispatch unit crash at snp_fp_fragment with SSM card enabled

CSCsd85451

Yes

SAs not created when crypto map group and isakmp policy group are differ

CSCsd86841

Yes

F1 crash immediately after sending ping traffic thru GTP tunnel

CSCsd87779

Yes

fips self test power on never completes


Related Documentation

For additional information on the Cisco ASA 5500 series security appliance, refer to the following URL on Cisco.com:

http://www.cisco.com/en/US/products/ps6120/tsd_products_support_series_home.html

Software Configuration Tips on the Cisco TAC Home Page

The Cisco Technical Assistance Center has many helpful pages. If you have a CDC account you can visit the following websites for assistance:

TAC Troubleshooting, Sample Configurations, Hardware Info, Software Installations and more:

http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/

Obtaining Documentation and Submitting a Service Request

For information on obtaining documentation, submitting a service request, and gathering additional information, see the monthly What's New in Cisco Product Documentation, which also lists all new and revised Cisco technical documentation, at:

http://www.cisco.com/en/US/docs/general/whatsnew/whatsnew.html

Subscribe to the What's New in Cisco Product Documentation as a Really Simple Syndication (RSS) feed and set content to be delivered directly to your desktop using a reader application. The RSS feeds are a free service and Cisco currently supports RSS version 2.0.