Table Of Contents
Cisco ASA 5500 Series Release Notes Version 7.2(1)
Contents
Introduction
System Requirements
Memory Requirements
Determining the Software Version
Upgrading to a New Software Version
New Features
Important Notes
policy-map type inspect http
SVC Tunnel Connections Failover
HTTP(S) Authentication Challenge Improvement
SSL VPN Licenses
ActiveX and WebVPN
CIFS Files
Failover and WebVPN and SVC connections
FIPS 140-2
WebVPN ACLS and DNS Hostname
Proxy Server and ASA
Mismatch PFS
Readme Document for the Conduits and Outbound List Conversion Tool 1.2
VPN Load Balancing Requirements
Features not Supported in Version 7.2(1)
Downgrading to a Previous Version
MIBs Support
Using Priority-Queue on ASA Model 5505
Caveats
Open Caveats - Version 7.2(1)
Resolved Caveats - Version 7.2(1)
Related Documentation
Obtaining Documentation and Submitting a Service Request
Cisco ASA 5500 Series Release Notes Version 7.2(1)
May 2006
Contents
This document includes the following sections:
•
Introduction
•
System Requirements
•
New Features
•
Important Notes
•
Caveats
•
Related Documentation
•
Obtaining Documentation and Submitting a Service Request
Introduction
The Cisco ASA 5500 series security appliances are purpose-built solutions that combine the most effective security and VPN services with the innovative Cisco Adaptive Identification and Mitigation (AIM) architecture. Designed as a key component of the Cisco Self-Defending Network, the security appliance provides proactive threat defense that stops attacks before they spread through the network, controls network activity and application traffic, and delivers flexible VPN connectivity. The result is a powerful multifunction network security appliance family that provides the security breadth and depth for protecting small and medium-sized business and enterprise networks while reducing the overall deployment and operations costs and complexities associated with providing this new level of security. This version introduces significant enhancements to major functional areas including: new Anti-X Services, VPN services, and management/monitoring.
For more information on all the new features, see New Features.
Additionally, the adaptive security appliance software supports Adaptive Security Device Manager. ASDM delivers world-class security management and monitoring through an intuitive, easy-to-use web-based management interface. Bundled with the security appliance, ASDM accelerates security appliance deployment with intelligent wizards, robust administration tools, and versatile monitoring services that complement the advanced integrated security and networking features offered by the market-leading suite of the security appliance. Its secure, web-based design enables anytime, anywhere access to security appliances.
System Requirements
The sections that follow list the system requirements for operating an adaptive security appliance. This section includes the following topics:
•
Memory Requirements
•
Determining the Software Version
•
Upgrading to a New Software Version
Memory Requirements
Table 1 lists the DRAM memory requirements for the adaptive security appliance.
Table 1 DRAM Memory Requirements
ASA Model
|
DRAM Memory
|
ASA 5505
|
128 MB
|
ASA 5510
|
256 MB
|
ASA 5520
|
512 MB
|
ASA 5540
|
1024 MB
|
ASA 5550
|
4096 MB
|
All adaptive security appliances require a minimum of 64 MB of internal CompactFlash.
Determining the Software Version
Use the show version command to verify the software version of your adaptive security appliance.
Upgrading to a New Software Version
If you have a Cisco.com (CDC) login, you can obtain software from the following website:
http://www.cisco.com/cisco/software/navigator.html
You must upgrade or downgrade from Version 7.1.(x) to 7.2(1) and vice versa because older versions of the ASA images do not recognize new ASDM images, new ASA images do not recognize old ASDM images.
For information on how to load an image, see the "Downloading Files" section in the Cisco Security Appliance Command Line Configuration Guide.
To upgrade from Version 7.1.(x) to 7.2(1), you must perform the following steps:
Step 1
Load the new 7.2(1) image from the following website:
http://www.cisco.com/cisco/software/navigator.html
Step 2
Reload the device so that it uses the 7.2(1) image.
Step 3
Load the new ASDM 5.2.(x) image from the following website:
http://www.cisco.com/cisco/software/navigator.html
To downgrade from Version 7.2(1) to 7.1.(x), you must perform the following steps:
Step 1
Load the 7.1.(x) image from the following website:
http://www.cisco.com/cisco/software/navigator.html
Step 2
Reload the device so that it uses the 7.1(x) image.
Step 3
Load the ASDM 5.1(x) image from the following website:
http://www.cisco.com/cisco/software/navigator.html
New Features
Released: May 31, 2006
Table 2 lists the new features forASA and PIX Version 7.2(1).
Table 2 New Features for ASA and PIX Version 7.2(1)
Feature
|
Description
|
Platform Features
|
ASA 5505 support
|
The ASA 5505 was introduced in this release. The ASA 5505 is a new model for small office/home office, enterprise teleworker environments, includes a built-in 8-port Fast Ethernet switch, and supports Easy VPN, Dual ISP, and has many more features
The ASA 5505 has Power over Ethernet (PoE) switch ports that can be used for PoE devices, such as IP phones. However, these ports are not restricted to that use. They can also be used as Ethernet switch ports. If a PoE device is not attached, power is not supplied to the port.
|
ASA 5550 support
|
The ASA 5550 delivers gigabit-class security services and enables Active/Active high availability for large enterprise and service-provider networks in a reliable, 1RU form-factor. Providing gigabit connectivity in the form of both Ethernet- and Fiber-based interfaces with high-density VLAN integration, the ASA 5550 enables businesses to segment their networks into numerous high-performance zones for improved security.
|
Easy VPN Features (ASA 5505 Only)
|
Client Mode (also called Port Address Translation) and Network Extension Mode
|
• Client Mode—Hides the IP addresses of devices on the ASA 5505 private network, so that all traffic from the ASA 5505 private network arrives on the private network of the central-site security appliance with a single-source, assigned IP address. You cannot ping or access a device on the ASA 5505 private network from the central site, but you can access the assigned IP address.
• Network Extension Mode—Permits devices behind the security appliance to have direct access to devices on the ASA 5505 private network only through the tunnel. You can ping or access a device on the ASA 5505 network from the central site.
The ASA 5505 does not have a default mode; you must specify the one that you want to use.
|
Automatic Tunnel Initiation
|
Supports NEM, but not Client Mode. It uses a group name, username, and password stored in the configuration to initiate the tunnel.
|
IKE and IPsec Support
|
The ASA 5505 supports preshared keys and certificates (RSA-SIG). The security appliance uses IKE Aggressive Mode for preshared keys and IKE Main Mode for RSA-SIG based key exchange. Cisco ASA 5505 can initiate IPsec, IPsec over NAT-T, and IPsec over cTCP sessions.
|
Secure Unit Authentication (SUA)
|
Supports the ASA 5505 authentication with dynamically generated authentication credentials or with static credentials to be entered at tunnel initiation. With SUA enabled, the user must manually trigger the IKE tunnel using a browser or an interactive CLI.
|
Individual User Authentication (IUA)
|
Enables static and one-time password authentication of individual clients on the inside network. IUA and SUA are independent of each other; they work in combination or isolation from each other.
|
Token-Based Authentication
|
Supports Security Dynamics (SDI) SecurID one-time passwords.
|
Authentication by HTTP Redirection
|
Redirects unauthenticated HTTP traffic to a login page if SUA or a username and password are not configured or if IUA is disabled.
|
Load Balancing
|
An ASA 5505 configured with dual ISP backup supports cluster-based VPN load balancing over the two Ethernet ports available in the Internet zone. The load-balancing scheme involves a "virtual director" IP address that is the destination of incoming client connections. The server that share a virtual director IP address form a cluster, where one cluster member acts as the cluster master. The master receives a request sent to the virtual director and redirects the client, using a proprietary IKE notify message, to the optimal server in the cluster. The current ISAKMP session terminates, and a new session is attempted to the optimal server.
If the connection to the optimal server fails, the client reconnects to the primary server (at the virtual director IP address of the cluster) and repeats the load-balancing procedure. If the connection to the primary server fails, the client rolls over to the next configured backup server, which may be the master of another cluster.
|
Failover (using Backup Server List)
|
You can configure a list of 10 backup servers in addition to the primary server. The ASA 5505 attempts to establish a tunnel with the primary server. If that attempt fails, the ASA 5505 attempts to establish a tunnel with other specified servers in the backup server list in sequence.
|
Device Pass-Through
|
Encompasses both IP Phone Pass Through and LEAP Pass Through features.
Certain devices, such as printers and Cisco IP phones, are incapable of performing authentication, so they cannot participate in IUA. With device pass-through enabled, the ASA 5505 exempts these devices from authentication if IAU is enabled.
The Easy VPN Remote feature identifies the devices to exempt, based on a configured list of MAC addresses. A related issue exists with wireless devices such as wireless access points and wireless nodes. These devices require LEAP/PEAP authentication to let wireless nodes participate in the network. It is only after the LEAP/PEAP authentication stage that the wireless nodes can perform IUA. The ASA 5505 also bypasses LEAP/PEAP packets when you enable Device Pass Through, so that the wireless nodes can participate in IUA.
|
IKE Mode Configuration
|
You can set the attribute values that the ASA 5505 requests after IKE Phase I and XAUTH. The device at the central site downloads the VPN policy and the ASA 5505 dynamically configures the features based on the security values. Except for SUA, the Clear Save password, and the backup concentrator list, the dynamic feature configuration lasts only while the tunnel is up.
|
Remote Management
|
Supports management of the ASA 5505 over the tunnel to the outside interface with NEM configured, and in the clear to the outside interface.
|
DNS Resolution of Easy VPN Peer Names
|
The ASA 5505 resolves the Easy VPN peer names with the DNS server. You can specify the DNS name of the server/client in the CLI.
|
Split tunneling
|
Allows the client decide which traffic to send over the tunnel, based on a configured list of networks accessible by tunneling to the central site. Traffic destined to a network other than those listed in the split tunnel network list is sent out in the clear. A zero-length list indicates no split tunneling, and all traffic travels over the tunnel.
|
Push Banner
|
Allows you to configure a 491-byte banner message to display in HTTP form to individual users who try to authenticate using IUA.
|
Application Inspection Features
|
Enhanced ESMTP Inspection
|
This feature allows you to detect attacks, including spam, phising, malformed message attacks, and buffer overflow and underflow attacks. It also provides support for application security and protocol conformance, which enforce the sanity of the ESMTP messages as well as detects several attacks, blocks senders and receivers, and blocks mail relay.
|
DCERPC Inspection
|
This feature allows you to change the default configuration values used for DCERPC application inspection using a DCERPC inspect map.
DCERPC is a protocol used by Microsoft distributed client and server applications that allows software clients to execute programs on a server remotely.
Typically, a client queries a server called the Endpoint Mapper (EPM) that listens on a well-known port number for the dynamically allocated network information of a required service. The client then sets up a secondary connection to the server instance that provides the service. The security appliance allows the appropriate port number and network address and also applies NAT or PAT, if needed, for the secondary connection.
|
Enhanced NetBIOS Inspection
|
This feature allows you to change the default configuration values used for NetBIOS application inspection.
NetBIOS application inspection performs NAT for the embedded IP address in the NetBIOS name service packets and NetBIOS datagram services packets. It also enforces protocol conformance by checking the various count and length fields for consistency.
|
Enhanced H.323 Inspection
|
This feature allows you to change the default configuration values used for H.323 application inspection.
H.323 inspection supports RAS, H.225, and H.245, and its functionality translates all embedded IP addresses and ports. It performs state tracking and filtering and can do a cascade of inspect function activation. H.323 inspection supports phone number filtering, dynamic T.120 control, H.245 tunneling control, protocol state tracking, H.323 call duration enforcement, and audio and video control.
|
Enhanced DNS Inspection
|
This feature allows you to specify actions when a message violates a parameter that uses a DNS inspection policy map. DNS application inspection supports DNS message controls that provide protection against DNS spoofing and cache poisoning. User configurable rules allow filtering based on the DNS header, domain name, and resource record TYPE and CLASS.
|
Enhanced FTP Inspection
|
This feature allows you to change the default configuration values used for FTP application inspection.
FTP command filtering and security checks are provided using strict FTP inspection for improved security and control. Protocol conformance includes packet length checks, delimiters and packet format checks, command terminator checks, and command validation.
Blocking FTP based on user values is also supported so that it is possible for FTP sites to post files for download but restrict access to certain users. You can block FTP connections based on file type, server name, and other attributes. System message logs are generated if an FTP connection is denied after inspection.
|
Enhanced HTTP Inspection
|
This feature allows you to change the default configuration values used for HTTP application inspection.
HTTP application inspection scans HTTP headers and body and performs various checks on the data. These checks prevent various HTTP constructs, content types, and tunneling and messaging protocols from traversing the security appliance.
HTTP application inspection can block tunneled applications and non-ASCII characters in HTTP requests and responses, preventing malicious content from reaching the web server. Size limiting of various elements in HTTP request and response headers, URL blocking, and HTTP server header type spoofing are also supported.
|
Enhanced Skinny (SCCP) Inspection
|
This feature allows you to change the default configuration values used for SCCP (Skinny) application inspection.
Skinny application inspection performs translation of embedded IP address and port numbers within the packet data and dynamic opening of pinholes. It also performs additional protocol conformance checks and basic state tracking.
|
Enhanced SIP Inspection
|
This feature allows you to change the default configuration values used for SIP application inspection.
SIP is a widely used protocol for Internet conferencing, telephony, events notification, and instant messaging. Partially because of its text-based nature and partially because of its flexibility, SIP networks are subject to a large number of security threats.
SIP application inspection provides address translation in the message header and body, dynamic opening of ports, and basic sanity checks. It also supports application security and protocol conformance, which enforces the sanity of the SIP messages, as well as detects SIP-based attacks.
|
Instant Messaging (IM) Inspection
|
This feature allows you to change the default configuration values used for Instant Messaging (IM) application inspection.
Instant Messaging (IM) application inspection provides detailed access control to control network usage. It also helps stop leakage of confidential data and propagations of network threats. A regular expression database search that represents various patterns for Instant Messaging (IM) protocols to be filtered is applied. A syslog is generated if the flow is not recognized.
The scope can be limited by using an access list to specify any traffic streams to be inspected. For UDP messages, a corresponding UDP port number is also configurable. Inspection of Yahoo! Messenger and MSN Messenger instant messages are supported.
|
MPF-Based Regular Expression Classification Map
|
This feature allows you to define regular expressions in Modular Policy Framework class maps and match a group of regular expressions that has the match-any attribute. You can use a regular expression class map to match the content of certain traffic; for example, you can match URL strings inside HTTP packets.
|
Radius Accounting Inspection
|
This feature allows you to protect against an over-billing attack in the Mobile Billing Infrastructure. The policy-map type inspect radius-accounting command was introduced in this version.
|
GKRCS Support for H.323
|
Two control signaling methods are described in the ITU-T H.323 recommendation: Gatekeeper Routed Control Signaling (GKRCS) and Direct Call Signalling (DCS). DCS is supported by the Cisco IOS gatekeeper. This feature adds Gatekeeper Routed Control Signaling (GKRCS) control signaling method support.
|
Skinny Video Support
|
This feature adds SCCP version 4.1.2 message support to print the message name processed by the inspect feature when debug skinny is enabled. CCM 4.0.1 messages are supported.
|
SIP IP Address Privacy
|
This feature allows you to retain the outside IP addresses embedded in inbound SIP packets for all transactions, except REGISTER (because it is exchanged between the proxy and the phone), to hide the real IP address of the phone. The REGISTER message and the response to REGISTER message will be exempt from this operation because this message is exchanged between the phone and the proxy.
When this feature is enabled, the outside IP addresses in the SIP header and SDP data of inbound SIP packets will be retained. Use the ip-address-privacy command to turn on this feature.
|
RTP/RTCP Inspection
|
This feature NATs embedded IP addresses and opens pinholes for RTP and RTCP traffic. This feature ensures that only RTP packets flow on the pinholes opened by Inspects SIP, Skinny, and H.323. To prevent a malicious application from sending UDP traffic to make use of the pinholes created on the security appliance, this feature allows you to monitor RTP and RTCP traffic and to enforce the validity of RTP and RTCP packets.
|
Remote Access and Site-to-Site VPN Features
|
Network Admission Control
|
Network Admission Control (NAC) allows you to validate a peer based on its state. This method is referred to as posture validation (PV). PV can include verifying that the peer is running applications with the latest patches, and ensuring that the antivirus files, personal firewall rules, or intrusion protection software that runs on the remote host are up to date.
An Access Control Server (ACS) must be configured for Network Admission Control before you configure NAC on the security appliance.
As a NAC authenticator, the security appliance does the following:
• Initiates the initial exchange of credentials based on IPsec session establishment and periodic exchanges thereafter.
• Relays credential requests and responses between the peer and the ACS.
• Enforces the network access policy for an IPsec session based on results from the ACS server.
• Supports a local exception list based on the peer operating system, and optionally, an ACL.
• (Optional) Requests access policies from the ACS server for a clientless host.
As an ACS client, the security appliance supports the following:
• EAP/RADIUS
• RADIUS attributes required for NAC
NAC on the security appliance differs from NAC on Cisco IOS Layer 3 devices (such as routers) where routers trigger PV based on routed traffic. The security appliance enabled with NAC uses an IPsec VPN session as the trigger for PV. Cisco IOS routers configured with NAC use an Intercept ACL to trigger PV based on traffic destined for certain networks. Because external devices cannot access the network behind the security appliance without starting a VPN session, the security appliance does not need an intercept ACL as a PV trigger. During PV, all IPsec traffic from the peer is subject to the default ACL configured for the peer's group.
Unlike the Cisco VPN 3000 Concentrator Series, NAC on the security appliance supports stateless failover, initialization of all NAC sessions in a tunnel group, revalidation of all NAC sessions in a tunnel group, and posture validation exemption lists configured for each tunnel group. NAC on the security appliance does not support non-VPN traffic, IPv6, security contexts, and WebVPN.
By default, NAC is disabled. You can enable it on a group policy basis.
|
L2TP Over IPsec
|
L2TP/IPsec provides the capability to deploy and administer an L2TP VPN solution alongside the IPsec VPN and firewall services in a single platform.
The primary benefit of configuring L2TP with IPsec in a remote access scenario is that remote users can access a VPN over a public IP network without a gateway or a dedicated line, enabling remote access from virtually anyplace with POTS. An additional benefit is that the only client requirement for VPN access is the use of Windows 2000 with Microsoft Dial-Up Networking (DUN). No additional client software, such as Cisco VPN client software, is required.
|
OCSP Support
|
The Online Certificate Status Protocol (OCSP) provides an alternative to CRL for obtaining the revocation status of X.509 digital certificates. Rather than requiring a client to download a complete and often large certificate revocation list, OCSP localizes the certificate status on a Validation Authority, which it queries for the status of a specific certificate.
|
Multiple L2TP Over IPsec Clients Behind NAT
|
The security appliance can successfully establish remote-access L2TP-over-IPsec connections to more than one client behind one or more NAT devices. This enhances the reliability of L2TP over IPsec connections in typical SOHO/branch office environment environments, where multiple L2TP over IPsec clients must communicate securely with a central office.
|
Nokia Mobile Authentication Support
|
You can establish a VPN using a handheld Nokia 92xx Communicator series cellular device for remote access. The authentication protocol that these devices use is the IKE Challenge/Response for Authenticated Cryptographic Keys (CRACK) protocol.
|
Zonelabs Integrity Server
|
You can configure the security appliance in a network that deploys the Zone Labs Integrity System to enforce security policies on remote VPN clients. In this case, the security appliance is an edge gateway between the Zone Labs Integrity server and the remote clients. The Zone Labs Integrity server and the Zone Labs Personal Firewall on the remote client ensure that a remote client complies with a centrally managed security policy before the client can access private network resources. You configure the security appliance to pass security policy information between the server and clients to maintain or close client connections to prevent a server connection failure, and to optionally, require SSL certificate authentication of both the Integrity server and the security appliance.
|
Hybrid XAUTH
|
You can configure hybrid authentication to enhance the IKE security between the security appliance and remote users. With this feature, IKE Phase I requires two steps. The security appliance first authenticates to the remote VPN user with standard public key techniques and establishes an IKE security association that is unidirectionally authenticated. An XAUTH exchange then authenticates the remote VPN user. This extended authentication can use any one of the supported authentication methods. Hybrid XAUTH allows you to use digital certificates for security appliance authentication and a different method for remote VPN user authentication, such as RADIUS, TACACS+ or SecurID.
|
IPsec Fragmentation and Reassembly Statistics
|
You can monitor additional IPsec fragmentation and reassembly statistics that help to debug IPsec-related fragmentation and reassembly issues. The new statistics provide information about fragmentation and reassembly both before and after IPsec processing.
|
Inspection IPS, CSC and URL Filtering for WebVPN
|
This feature adds support for inspection, IPS, and Trend Micro for WebVPN traffic in clientless mode and port forwarding mode. Support for SVC mode is preexisting. In all of the modes, the Trend Micro and the IPS engines will be triggered (if configured).
URL/FTP/HTTPS/Java/Activex filtering using WebSense and N2H2 support has also been added. DNS inspect will be triggered for the DNS requests.
In port forwarding mode, HTTP, SMTP, FTP, and DNS inspections with the filtering mechanisms using WebSense and N2H2 support has been added.
|
Routing Features
|
Active RIP Support
|
The security appliance supports RIP Version 1 and RIP Version 2. You can only enable one RIP routing process on the security appliance. When you enable the RIP routing process, RIP is enabled on all interfaces. By default, the security appliance sends RIP Version 1 updates and accepts RIP Version 1 and Version 2 updates.
To specify the version of RIP accepted on an interface, use the rip receive version command in interface configuration mode.
|
Standby ISP Support
|
This feature allows you to configure a link standby ISP if the link to your primary ISP fails. It uses static routing and object tracking to determine the availability of the primary route and to activate the secondary route when the primary route fails.
|
PPPoE Client
|
Point-to-Point Protocol over Ethernet (PPPoE) combines two widely accepted standards, Ethernet and PPP, to provide an authenticated method of assigning IP addresses to client systems. PPPoE clients are typically personal computers connected to an ISP over a remote broadband connection, such as DSL or cable service. ISPs deploy PPPoE because it supports high-speed broadband access using their existing remote access infrastructure and because it is easier for customers to use.
|
Dynamic DNS Support
|
You can create dynamic DNS (DDNS) update methods and configure them to update the Resource Records (RRs) on the DNS server at whatever frequency you need.
DDNS complements DHCP, which enables users to dynamically and transparently assign reusable IP addresses to clients. DDNS then provides dynamic updating and synchronizing of the name to the address and the address to the name mappings on the DNS server. With this version, the security appliance supports the IETF standard for DNS record updates.
|
Multicast Routing Enhancements
|
Multicast routing enhancements allows you to define multicast boundaries so that domains with RPs that have the same IP address do not leak into each other, to filter PIM neighbors to better control the PIM process, and to filter PIM bidir neighbors to support mixed bidirectional and sparse-mode networks.
|
Expanded DNS Domain Name Usage
|
You can use DNS domain names, such as www.example.com, when configuring AAA servers and also with the ping, traceroute, and copy commands.
|
Intra-Interface Communication for Clear Traffic
|
You can now allow any traffic to enter and exit the same interface, and not just VPN traffic.
|
IPv6 Security Enforcement of IPv6 Addresses
|
This feature allows you to configure the security appliance to require that IPv6 addresses for directly connected hosts use the Modified EUI-64 format for the interface identifier portion of the address.
|
Multiple Context Mode Features
|
Private and Automatic MAC Address Assignments and Generation for Multiple Context Mode
|
You can assign a private MAC address (both active and standby for failover) for each interface. For multiple context mode, you can automatically generate unique MAC addresses for shared context interfaces, which makes classifying packets into contexts more reliable.
The new mac-address auto command allows you to automatically assign private MAC addresses to each shared context interface.
|
Resource Management for Security Contexts
|
If you find that one or more contexts use too many resources, and they cause other contexts to be denied connections, for example, then you can configure resource management to limit the use of resources per context.
|
Save All Context Configurations from the System
|
You can now save all context configurations at once from the system execution space using the write memory all command.
|
High Availability Features
|
Sub-second Failover
|
This feature allows you to configure failover to detect and respond to failures in under a second.
|
Configurable Prompt
|
With this feature, the user can see the failover status of the security appliance without having to enter the show failover command and parse the output. This feature allows users to see the chassis slot number of the failover unit. Previously, the prompt reflected just the hostname, security context, and configuration mode. The prompt command provides support for this feature.
|
Firewall Features
|
Generic Input Rate Limiting
|
This feature prevents denial of service (DoS) attacks on a security appliance or on certain inspection engines on a firewall. The 7.0 release supports egress rate-limiting (police) functionality and in this release, input rate-limiting functionality extends the current egress policing functionality.
The police command is extended for this functionality.
|
Authentication for Through Traffic and Management Access Supports All Servers Previously Supported for VPN Clients
|
All server types can be used for firewall authentication with the following exceptions: HTTP Form protocol supports single sign-on authentication for WebVPN users only and SDI is not supported for HTTP administrative access.
|
Dead Connection Detection (DCD)
|
This feature allows the adaptive security appliance to automatically detect and expire dead connections. In previous versions, dead connections never timed out; they were given an infinite timeout. Manual intervention was required to ensure that the number of dead connections did not overwhelm the security appliance. With this feature, dead connections are detected and expired automatically, without interfering with connections that can still handle traffic. The set connection timeout and show service-policy commands provide DCD support.
|
WCCP
|
The Web Cache Communication Protocol (WCCP) feature allows you to specify WCCP service groups and redirect web cache traffic. The feature transparently redirects selected types of traffic to a group of web cache engines to optimize resource usage and lower response times.
|
Filtering Features
|
URL Filtering Enhancements for Secure Computing (N2H2)
|
This feature allows you to enable long URL, HTTPS, and FTP filtering by using both Websense (the current vendor) and N2H2 (a vendor that has been purchased by Secure Computing). Previously, the code only enabled the vendor Websense to provide this type of filtering. The url-block, url-server, and filter commands provide support for this feature.
|
Management and Troubleshooting Features
|
Auto Update
|
The security appliance can now be configured as an Auto Update server in addition to being configured as an Auto Update client. The existing client-update command (which is also used to update VPN clients) is enhanced to support the new Auto Update server functionality, and includes new keywords and arguments that the security appliance needs to update security appliances configured as clients. For the security appliance configured as an Auto Update client, the auto-update command continues to be the command used to configure the parameters that the security appliance needs to communicate with the Auto Update server.
|
Modular Policy Framework Support for Management Traffic
|
You can now define a Layer 3/4 class map for to-the-security-appliance traffic, so you can perform special actions on management traffic. For this version, you can inspect RADIUS accounting traffic.
|
Traceroute
|
The traceroute command allows you to trace the route of a packet to its destination.
|
Packet Tracer
|
The packet tracer tool allows you to trace the life span of a packet through the security appliance to see if it is behaving as expected.
The packet-tracer command provides detailed information about the packets and how they are processed by the security appliance. If a command from the configuration did not cause the packet to drop, the packet-tracer command will provide information about the cause.
|
Important Notes
This section lists important notes related to Version 7.2(1).
policy-map type inspect http
The http-map and ftp-map commands are no longer supported in Version 7.2. Use the policy-map type inspect http command instead.
SVC Tunnel Connections Failover
In the security appliance stateful failover pairs that run software releases prior to 7.1.2.4, client connections over SVC tunnels were not set up correctly on the standby machines. When failover occurs you must re-establish TCP connections.
This problem has been fixed for the security appliance versions 7.1.2.4 and 7.2.x and later releases. However, a new SVC client version later than 1.1.0.154 (to be released soon) is also required to avoid this problem.
HTTP(S) Authentication Challenge Improvement
In versions prior to 7.2(1), the security appliance authenticated HTTP network connections using basic HTTP authentication and authenticated HTTPS connections by generating similar custom login windows. In 7.2(1), HTTP and HTTPS connections are redirected to a set of authentication pages that are served directly by the security appliance. After successful authentication, the browser is again redirected to the originally-intended URL. When AAA is configured, these pages are available at:
http://interface_ip:1080/netaccess/connstatus.html
https://interface_ip:1443/netaccess/connstatus.html
SSL VPN Licenses
Beginning with Version 7.2(1), the ASA 5550 supports a license level of 5000 users. The complete SSL VPN feature functionality offered by the security appliance is included in this single SSL VPN license. No per-feature licenses are required. This SSL VPN license has a one-time fee and lasts for the lifetime of the security appliance. Upon installation of Version 7.2(1), two simultaneous SSL VPN user sessions are included for evaluation.
ActiveX and WebVPN
Many ActiveX controls are custom and require special treatment by WebVPN. Please contact Cisco TAC if your application uses ActiveX controls and you have problems with its functionality over a WebVPN connection (CSCsb85180).
CIFS Files
If a remote user accesses CIFS files using Internet Explorer, the filename in the File Download window might not display some Japanese Shift_JIS characters correctly. However, the Open and Save functions do work properly. This issue does not occur with Netscape.
Failover and WebVPN and SVC connections
To ensure that WebVPN and SVC connections reconnect quickly in the event of a failover, enable the security appliance to respond to incoming client TCP packets with the service resetoutside command from global configuration mode:
[no] service resetoutside
This command causes the security appliance that takes over the existing WebVPN and SVC connections to send TCP RST packets in response to incoming client TCP packets, causing client connections to reestablish quicker. If you do not enable the service resetoutside command, the security appliance drops TCP packets from failed-over connections and waits for each client to reestablish the TCP connection. This may take longer or result in the session being lost due to timeout.
The following example enables the security appliance to send TCP RST packets:
F1-asa1(config)# service resetoutside
FIPS 140-2
The security appliance Version 7.0(4) is FIPS certified. Version 7.1 is on the FIPS 140-2 Pre-Validation List.
WebVPN ACLS and DNS Hostname
When a deny webtype URL ACL (DNS-based) is defined, but the DNS-based URL is not reachable, the browser displays "DNS Error" popup. The ACL hit counter does not increment.
If an IP address rather than a DNS name defines a deny webtype URL, then the hit counter does record the traffic flow hitting the ACL, and the browser displays a "Connection Error.".
Proxy Server and ASA
If WebVPN is configured to use an HTTP(S)-proxy server to service all requests for browsing HTTP and/or HTTPS sites, the client/browser may expect the following behavior:
1.
If the ASA cannot communicate with the HTTPS or HTTPS proxy server, a "connection error" is displayed on the client browser.
2.
If the HTTP(S) proxy cannot resolve or reach the requested URL, it should send an appropriate error to the ASA, which in turn displays it on the client browser.
Only when the HTTP(S) proxy server notifies the ASA of the inaccessible URL, can the ASA notify the client browser about the error.
Mismatch PFS
The PFS setting on the VPN client and the security appliance must match.
Readme Document for the Conduits and Outbound List Conversion Tool 1.2
The adaptive security appliance Outbound/Conduit Conversion tool assists in converting configurations with outbound or conduit commands to similar configurations using ACLs. ACL-based configurations provide uniformity and leverage the powerful ACL feature set. ACL based configurations provide the following benefit:
•
ACE Insertion capability - System configuration and management is greatly simplified by the ACE insertion capability that allows users to add, delete or modify individual ACEs.
VPN Load Balancing Requirements
VPN load balancing for the security appliance requires an ASA 5520 or higher. It also requires a 3DES-AES encryption license.
Features not Supported in Version 7.2(1)
The PPTP feature is not supported in Version 7.2(1).
Downgrading to a Previous Version
To downgrade to a previous version of the operating system software (software image), use the downgrade command in privileged EXEC mode. For more information and a complete description of the command syntax, see the Cisco Security Appliance Command Reference.
MIBs Support
The Cisco Unified Firewall MIB offers a unified SNMP standards-based monitoring interface for functionality on the security appliances. The Unified Firewall MIB offers statistics collection and monitoring for Stateful Packet Inspection, URL Filtering, and Application Inspection.
For more information on MIB Support, go to:
http://www.cisco.com/public/sw-center/netmgmt/cmtk/mibs.shtml
Using Priority-Queue on ASA Model 5505
On ASA Model 5505 (only), configuring priority-queue on one interface overwrites the same configuration on all other interfaces. That is, only the last applied configuration is present on all interfaces. Further, if the priority-queue configuration is removed from one interface, it is removed from all interfaces. This problem is present only on ASA5505 platforms.
To work around this issue, configure the priority-queue command on only one interface. If different interfaces need different settings for the queue-limit and/or tx-ring-limit commands, use the largest of all queue-limits and smallest of all tx-ring-limits on any one interface (CSCsi13132).
Caveats
The following sections describe the caveats for the Version 7.2(1).
For your convenience in locating caveats in Cisco's Bug Toolkit, the caveat titles listed in this section are drawn directly from the Bug Toolkit database. These caveat titles are not intended to be read as complete sentences because the title field length is limited. In the caveat titles, some truncation of wording or punctuation may be necessary to provide the most complete and concise description. The only modifications made to these titles are as follows:
•
Commands are in boldface type.
•
Product names and acronyms may be standardized.
•
Spelling errors and typos may be corrected.
Note
If you are a registered cisco.com user, view Bug Toolkit on cisco.com at the following website:
http://tools.cisco.com/Support/BugToolKit/
To become a registered cisco.com user, go to the following website:
http://tools.cisco.com/RPF/register/register.do
Open Caveats - Version 7.2(1)
Table 3 Open Caveats
DDTS Number
|
Software Version 7.2(1)
|
|
|
Corrected
|
Caveat
|
CSCse37315
|
No
|
AIC DNS - Traceback after removing certain MPF actions with DNS traffic
|
CSCse38087
|
No
|
RFW:multi-mode kerberos authentication fails after few hours stress test
|
CSCse28871
|
No
|
NAC: Session entries are not cleaned up after initial posture validation
|
CSCse28930
|
No
|
NAC: Posture validation failure due to inconsistent source IP address
|
CSCse24058
|
No
|
L2TP: Traffic denied through tunnel after 2 days -> domain=aaa-user
|
CSCse22760
|
No
|
LDAP/Sun, Pass expires in X days is not functioning properly
|
CSCse34477
|
No
|
ESMTP: mail-relay param w/o any action accepted, junk chars in sho run
|
CSCse34515
|
No
|
ESMTP: mail-relay action drop-connection log taken as drop-connection
|
CSCse29150
|
No
|
ESMTP: match not conditions related to count not working
|
CSCse20854
|
No
|
ESMTP: multiple match cond. with regex - only most generic regex matched
|
CSCse38371
|
No
|
IM: MSN drop-connection not enforced is specific scenarios
|
CSCse32684
|
No
|
IM: match not version does not block for Yhoo IM
|
CSCse27787
|
No
|
AIC SIP: SIP messages might fail state-check knob when record-route on
|
CSCse20834
|
No
|
SIP: BYE embryonic connection timestamp not updated for re-Invite
|
CSCse37065
|
No
|
Proxy erroneously drops ACK bit in RST causing Kerberos rsh to fail
|
CSCse27774
|
No
|
PPPoE Object-tracking: Traceback in IP Thread when disabling pppoe
|
CSCsd84011
|
No
|
REGEX: ^ (match from beginning of text) does not work in some cases
|
CSCsd82575
|
No
|
unexpected IGMP joins sent when configuring multicast routing
|
CSCsd59295
|
No
|
WCCP static bypass not working with vlan interfaces
|
CSCsd51407
|
No
|
Dual ISP fails after failover, routing table have stale routes
|
CSCse32481
|
No
|
errmsg:xfer_encode regex missing for 1st xfer_encode count command
|
CSCse32774
|
No
|
Cisco MacOS VPN client disconnects after rekey.
|
CSCse29692
|
No
|
L2TP: File transfers with any client in my setup results in tunnel drop
|
CSCse29635
|
No
|
L2TP/IPSec: sporadic tunnel drops occur after numerous rekeys
|
CSCse21175
|
No
|
IPSec RAS performance on ASA-5540 is down approx 11% versus 7.1.2
|
CSCse21150
|
No
|
L2TP: Mac client dropping sessions during overnight system test
|
CSCse09534
|
No
|
L2TP: windows file transfer of large files sometimes fails
|
CSCsd78808
|
No
|
L2TP: Fragmentation reassembly issues with PIX VAC and L2TP conns
|
CSCsd45605
|
No
|
2 routes to same n/w w same metric different ifx should not be allowed
|
CSCse24537
|
No
|
RIP: [no] access-list defined in distribute-list should display err msg
|
CSCse31519
|
No
|
OCSP: CRL checking of externally signed responder cert fails
|
CSCse33851
|
No
|
H.225 releasecomplete message was dropped by the firewall
|
CSCse39315
|
No
|
t120 fax cannot get through multiple routed mode
|
CSCse39263
|
No
|
h.323 packet drop when connecting in multiple mode
|
Resolved Caveats - Version 7.2(1)
Table 4 Resolved Caveats
DDTS Number
|
Software Version 7.2(1)
|
|
|
Corrected
|
Caveat
|
CSCdy45820
|
Yes
|
show traffic broken, add 5 mins traffic info to show interface
|
CSCee29967
|
Yes
|
MFW: system context cannot log to external syslog server
|
CSCeh01744
|
Yes
|
Undo CSCdy82442 and support 10 dhcprelay statements on FWSM
|
CSCeh59278
|
Yes
|
DHCPACK gets dropped when it is sent in response to DHCPINFORM
|
CSCeh60845
|
Yes
|
Logginig queue incorrectly registers 8192 256-byte blocks
|
CSCeh70043
|
Yes
|
DOC: sh asp drop needs further clarification in doc
|
CSCeh90617
|
Yes
|
Recompiling ACLs can cause packet drops on low-end platforms
|
CSCei43588
|
Yes
|
traceback when trying to match a packet to acl with deny
|
CSCei47678
|
Yes
|
SNMP packet size standards in RFC3417 not fully supported.
|
CSCek21835
|
Yes
|
Higher metric OSPF external route is selected
|
CSCek21836
|
Yes
|
SIP: BYE embryonic connection timestamp not updated.
|
CSCek21837
|
Yes
|
PDM with Command Authorization requires the write command for Read-Only
|
CSCek21838
|
Yes
|
SIP: fail to open a conn for Record route in NOTIFY
|
CSCek21843
|
Yes
|
SIP: Not translate c= address if first m= has port 0 in SDP body.
|
CSCek21846
|
Yes
|
SIP: xlate timeout not updated by Expire value in Register message
|
CSCek21849
|
Yes
|
Backspace sent in cut-through proxy authentication
|
CSCek26572
|
Yes
|
tftp fixup does not allow error message from client
|
CSCek40279
|
Yes
|
Increase in CPU utilization when OSPF is enabled
|
CSCsb80170
|
Yes
|
VPN3K PARITY: Address-pools needed in group-policy
|
CSCsb94408
|
Yes
|
FWSM Thread dhcp_daemon crashing randomly
|
CSCsc12094
|
Yes
|
AAA fallback authentication does not work with reactivation-mode timed
|
CSCsc15434
|
Yes
|
Assertion violation w/icmp traffic and icmp inspection
|
CSCsc16041
|
Yes
|
'clear local host' results in memory leak
|
CSCsc16507
|
Yes
|
Cannot remove url-server despite having removed url-block cmd
|
CSCsc18324
|
Yes
|
Traceback in Dispatch Unit (Old pc 0x001dbdc6 ebp 0x01212404)
|
CSCsc18911
|
Yes
|
PIX / ASA does not remove OSPF route for global PAT entry after deleting
|
CSCsc29201
|
Yes
|
ASA Management 0/0 interface cannot be used in Transparent mode for OOB
|
CSCsc33385
|
Yes
|
GTP - pdp context creation failed - GSN tunnel limit exceeded
|
CSCsc39334
|
Yes
|
Traceback due to check-retransmission from the tcp-map
|
CSCsc44591
|
Yes
|
Traceback in Thread Name: ARP Thread in multicontext mode
|
CSCsc46976
|
Yes
|
SIP: traceback when failed to pre-allocate early rtp
|
CSCsc47618
|
Yes
|
Authenticate all messages between Active and Standby Firewalls
|
CSCsc51737
|
Yes
|
AIC SIP: Add support for m=text
|
CSCsc51939
|
Yes
|
Performance throughput problems when http inspect enabled
|
CSCsc68575
|
Yes
|
CPU usage is higher for given traffic throughput in recent releases.
|
CSCsc73942
|
Yes
|
TCP RST is dropped when there is outstanding data that is not acked
|
CSCsc78900
|
Yes
|
Reload with Thread Name: Dispatch Unit at tcp_check_packet
|
CSCsc79110
|
Yes
|
syslogs show user <unknown> when packets denied by vpn-filter
|
CSCsc81565
|
Yes
|
Idle conn timeout reset when packet dropped by TCP normalizer
|
CSCsc81668
|
Yes
|
https://<ip>/config does not have the same privilege level as 'write'
|
CSCsc83471
|
Yes
|
incorrect IPSec SA's may be deleted upon receiving DELETE notify
|
CSCsc86217
|
Yes
|
Voice Proxy Function does not preserve DSCP bits.
|
CSCsc90826
|
Yes
|
PIX 7.0 getting the error %PIX-1-106021 when ip verify command enable
|
CSCsc90944
|
Yes
|
Malformed https proxy authentication page w/ linebreak
|
CSCsc91450
|
Yes
|
FTP control channel timing out although data channel is active.
|
CSCsc92575
|
Yes
|
Upgrade Activation Key reduces permitted interfaces
|
CSCsc93061
|
Yes
|
Traceback after activation of vpn-filter
|
CSCsc94945
|
Yes
|
Startup-config error with priority-queue and service-policy
|
CSCsc97846
|
Yes
|
Significant CPU utilization increase when adding more logging hosts.
|
CSCsc97999
|
Yes
|
Syslog Message ID 313003 is used incorrectly
|
CSCsc98339
|
Yes
|
Standby unit may reload if active unit powered off
|
CSCsc99263
|
Yes
|
GTPv1: Subsequent Create Req to modify PDP context IEs are not processed
|
CSCsc99364
|
Yes
|
SSL Certs from Verisign Managed PKI do not install
|
CSCsd00051
|
Yes
|
SNMP polling of ASA management interface stats may cause packet loss
|
CSCsd00175
|
Yes
|
ASA w/ IPS may drop FIN/ACK packets resulting in half open FTP sessions
|
CSCsd01722
|
Yes
|
PIX/ASA 7.0 logging message 419001 always sent in message lists
|
CSCsd02938
|
Yes
|
ASA/PIX doesn't reconnect if websense server goes down
|
CSCsd03391
|
Yes
|
TCP Intercept doesn't negate CPU impact when SYN flood from adjacent net
|
CSCsd03664
|
Yes
|
Reload w/ Thread Name:Session Manager w/ high volume of L2L VPN traffic
|
CSCsd04327
|
Yes
|
ASA out of order packets to ssm or inspect are dropped
|
CSCsd04700
|
Yes
|
match port option for setting connection time-outs does not work
|
CSCsd07703
|
Yes
|
Oracle Forms(Java) Applet not loading via WebVPN
|
CSCsd07783
|
Yes
|
Transient NAT-T packets silently dropped if NAT-T is enabled
|
CSCsd08170
|
Yes
|
UDP 500 not removed from pat port pool when crypto map is applied
|
CSCsd10138
|
Yes
|
Traceback in Checkheaps thread when enabling LAN2LAN vpn
|
CSCsd11179
|
Yes
|
SNMP polling of resource MIBS may cause packet loss
|
CSCsd11511
|
Yes
|
Traceback due to memory corruption in sanity check of Checkheaps thread
|
CSCsd12670
|
Yes
|
ASA, WebVPN errors when triggering a simple javascript
|
CSCsd13334
|
Yes
|
Memory Leaking tunnel-group authorization-dn-attributes
|
CSCsd13636
|
Yes
|
Reload with thread name dispatch unit
|
CSCsd15475
|
Yes
|
Secondary unit doesn't get full config file after SSH reload on Primary
|
CSCsd16751
|
Yes
|
GTP: wrong service-policy used when connection is re-used
|
CSCsd16780
|
Yes
|
Assertion in indirect->timestamp & pool->timestamp_mask) == timestamp
|
CSCsd17182
|
Yes
|
no nat-control does not appear in the output of show run all
|
CSCsd17431
|
Yes
|
Managment rule addition / tracking needs to be cleaned up
|
CSCsd17598
|
Yes
|
svc image <imagename> fails to set svc image after clear conf all
|
CSCsd17718
|
Yes
|
IGMP forward interface command fails to sync to the standby unit
|
CSCsd17763
|
Yes
|
Firewall should not respond to TCP segment w/ RST+ACK and bad ACK number
|
CSCsd17879
|
Yes
|
Deny rules in crypto acl blocks inbound tcp/udp after tunnel formed
|
CSCsd21887
|
Yes
|
WebVPN mangles the url's in emails when accessing OWA
|
CSCsd22910
|
Yes
|
users with passwords longer than 11 chars can no longer authenticate
|
CSCsd25537
|
Yes
|
Failover unit traceback in Thread Name: fover_FSM_thread
|
CSCsd25553
|
Yes
|
Traceback when VPN client tries to make connection to inside interface
|
CSCsd25975
|
Yes
|
Add file URL support to WebVPN clientless mode
|
CSCsd28581
|
Yes
|
Failover: Standby device may traceback in Thread Name: IKE Daemon
|
CSCsd30371
|
Yes
|
Show vpnsession-db remote displays incorrect group-policy
|
CSCsd31334
|
Yes
|
Need a way to clear a subset of arps
|
CSCsd33677
|
Yes
|
ssl handshake failure occurs for SVC clients when re-keing using SSL
|
CSCsd34070
|
Yes
|
H.245 inspect skipped if GKRCS and wrong H.225 callSignalAddress for GK
|
CSCsd36030
|
Yes
|
in multiple policy-maps, packets should match the first map,not the last
|
CSCsd37075
|
Yes
|
PIX/ASA reload in Thread Name PIM IPv4 when multicast routing enabled
|
CSCsd38929
|
Yes
|
SSL: Verisign imported certificate fails when establishing SSL session
|
CSCsd39029
|
Yes
|
Traceback with Thread Name: Dispatch Unit
|
CSCsd40729
|
Yes
|
WebVPN page doesn't complete load and will hang browser
|
CSCsd40812
|
Yes
|
Internal WebVPN Page will not display after logon
|
CSCsd42895
|
Yes
|
LDAP Base(Search) DN scope not working correctly
|
CSCsd43093
|
Yes
|
Memory leak due to SNMP monitoring on L2L IPSec tunnel
|
CSCsd43105
|
Yes
|
Traceback in SNMP thread under low memory condition
|
CSCsd43770
|
Yes
|
LDAP server-type configuration is not processed correctly.
|
CSCsd43909
|
Yes
|
LDAP Authen against AD does not work with Userid
|
CSCsd43976
|
Yes
|
ASA should not send names in split-tunnel list to SVC
|
CSCsd45099
|
Yes
|
logging debug-trace should not prevent debugs from printing to console
|
CSCsd45297
|
Yes
|
Syslog 722020 needs to include Tunnel-group name or be re-worded
|
CSCsd46111
|
Yes
|
Traceback when using sh xlate via telnet over VPN tunnel
|
CSCsd46373
|
Yes
|
ASA: WebVPN NTLM login fails if domain is not specified
|
CSCsd46685
|
Yes
|
Traceback eip::_snp_sp_action_construct_ip_key+1013 after ipsec rule cfg
|
CSCsd46922
|
Yes
|
High CPU usage when configuring/compiling ACL's
|
CSCsd47171
|
Yes
|
GTP: IMSI prefix filtering on 3 digit MNC's do not work
|
CSCsd47976
|
Yes
|
Traceback on nameif command on unused intf with 8000 static commands
|
CSCsd48368
|
Yes
|
WebVPN - Domino Web Access Help Function hangs browser
|
CSCsd48512
|
Yes
|
Duplicate ASP crypto table entry causes firewall to not encrypt traffic
|
CSCsd48634
|
Yes
|
LDAP password management fails when connected to a MS Active Directory
|
CSCsd51884
|
Yes
|
Restore debug icmp trace functionallity - showing nat translation
|
CSCsd52578
|
Yes
|
Traceback in thread: snp_timer_thread
|
CSCsd53213
|
Yes
|
PIX shows xlates from global xx.xx.xx.xx to local 0.0.0.0
|
CSCsd53232
|
Yes
|
Entire CIFS share not displayed when it contains more than 400 folders
|
CSCsd53321
|
Yes
|
sysopt connection timewait causes SSH sessions to timeout prematurely
|
CSCsd54293
|
Yes
|
ARP fails when PC moved from outside to inside of transparent FW
|
CSCsd55138
|
Yes
|
WebVPN: Traceback when accessing URL with Viewstate > 20K
|
CSCsd55527
|
Yes
|
traceback after executing sh cry ipsec sa sum with vpn sys test run
|
CSCsd58400
|
Yes
|
PIX fails to send Embryonic Limit Exceeded message
|
CSCsd58677
|
Yes
|
LDAP authentication succeeds if password is left blank
|
CSCsd58848
|
Yes
|
Memory allocated for connections not freed
|
CSCsd59936
|
Yes
|
Registering to the RP for PIM fails if fragmented in more then 12 packs
|
CSCsd63673
|
Yes
|
ASA with dhcprelay doesnt reply with unicast DHCP offer
|
CSCsd63828
|
Yes
|
PIX Failover does not Sync with certain multicast commands
|
CSCsd63863
|
Yes
|
CIFS Shares on Root Directory not displayed in alphabetical order
|
CSCsd64268
|
Yes
|
Secondary smtp-server fails to send event messages after period of time
|
CSCsd64584
|
Yes
|
http traffic fails with firewall in tfw and IPS monitoring in inline mod
|
CSCsd64912
|
Yes
|
url-server: tcp connections fail when tcp stack users are exhausted
|
CSCsd64920
|
Yes
|
url-server: url lookup requests are not retried when using tcp
|
CSCsd65192
|
Yes
|
WebVPN: Debug webvpn svc will not show up in show debug command
|
CSCsd65209
|
Yes
|
url-block block: http response buffering feature does not work
|
CSCsd65215
|
Yes
|
Capture access-list shows only 1 hit count for outbound traffic
|
CSCsd67028
|
Yes
|
WebVPN/SVC should disconnect if ASA encounters SSL CRYPTO Errors
|
CSCsd67905
|
Yes
|
HA Errors referencing WebVPN/VPN appearing even in Transparent mode
|
CSCsd68051
|
Yes
|
WebVPN: ActiveX component does not install when accessing MS TS URL
|
CSCsd69786
|
Yes
|
WebVPN: Duplicate/Malformed HTML Headers not transformed by ASA
|
CSCsd70242
|
Yes
|
Some syslogs are incorrectly logged to an event list, when not specified
|
CSCsd70812
|
Yes
|
HA: Traffic Stall after config syncing running Act/Act fover
|
CSCsd71386
|
Yes
|
RTSP traffic led the PIX to reload
|
CSCsd72617
|
Yes
|
Dispatch Unit Crash when HTTP inspect enabled...PIX/ASA 7.1.2, 7.0.4-11
|
CSCsd73035
|
Yes
|
URL's with + get re-written with space %20
|
CSCsd73060
|
Yes
|
Traceback in Dispatch Unit - on SVC connect (svc dpd-interval gateway)
|
CSCsd73376
|
Yes
|
Case-sensitive processing of javascript attribute
|
CSCsd73852
|
Yes
|
H.323 Inspect not opening media stream.
|
CSCsd74328
|
Yes
|
crash when changing security level on an ifc and failover cfg with NAT
|
CSCsd74964
|
Yes
|
SNP Inspect Http drops messages other than GET
|
CSCsd76384
|
Yes
|
dhcpc fails when management-access is configured
|
CSCsd77018
|
Yes
|
Traceback: Thread Name: Dispatch Unit (Old pc 0x00220087 ebp 0x01796d30)
|
CSCsd77155
|
Yes
|
All out of order packets dropped when queue-limit specified
|
CSCsd78595
|
Yes
|
Global buffer drop output under show service-policy
|
CSCsd79775
|
Yes
|
ASA VPN: all packets for a l2l peer get dropped instead of encrypted
|
CSCsd81288
|
Yes
|
UCTE functions not defined inside frames
|
CSCsd81668
|
Yes
|
Redirect for proxy-bypass links with high ports
|
CSCsd81969
|
Yes
|
LB configuration will be deleted when name is used in cluster ip add cmd
|
CSCsd82047
|
Yes
|
PIX 7.0(4) FO : bad LU from Act causes LU allocate xlate failed on Std
|
CSCsd82114
|
Yes
|
Change of log options on the ACE doesn't take immediate effect
|
CSCsd82355
|
Yes
|
Malformed syslog packets may be generated.
|
CSCsd83000
|
Yes
|
Invalid IPSec tunnel count is reported in ASDM handler output
|
CSCsd83007
|
Yes
|
Need ability to disable dns guard in 7.0
|
CSCsd83299
|
Yes
|
ASDM handler returns invalid value for ISAKMP SA's
|
CSCsd83863
|
Yes
|
Reload with Thread Name: Dispatch Unit
|
CSCsd84826
|
Yes
|
PIX/ASA MSS miscalculation for webvpn conn. terminating to the box
|
CSCsd85007
|
Yes
|
Dispatch unit traceback at snp_fp_fragment with SSM card enabled
|
CSCsd85345
|
Yes
|
Traceback may occur in fover_parse on 7.0.4
|
CSCsd86550
|
Yes
|
Traceback in snp_ids:ids_put when SSM is down
|
CSCsd89983
|
Yes
|
Access-list entered at line 1 is ineffective until access-group is rede
|
CSCsd91587
|
Yes
|
functioning email proxy session generates syslog message error
|
CSCsd92296
|
Yes
|
DHCP relay failed after failover
|
CSCsd93207
|
Yes
|
Show failover indicates different uptimes on devices in failover pair
|
CSCsd94089
|
Yes
|
Feature Req: Srcing auth pkts from inside(NEM)/assigned(CM) for IUA
|
CSCsd94386
|
Yes
|
Beta Customer Crash in inspect http
|
CSCsd94835
|
Yes
|
Proxy may queue too many packets when url filtering client is down
|
CSCsd94875
|
Yes
|
Traceback in VPN/IPSec CLI code when clear crypto ipsec sa counter
|
CSCsd95170
|
Yes
|
PIX 7.0(4)10 : reporting incorrect context CPU usage
|
CSCsd95480
|
Yes
|
Treatment of domain in JavaScript
|
CSCsd97077
|
Yes
|
ASA/PIX - crash from SiVus SIP tester inside to outside w/ inspect/fixup
|
CSCsd97134
|
Yes
|
PIX/ASA ignores OSPF DBDs during adajency building
|
CSCsd98071
|
Yes
|
conns fail after two successful authentications to virtual telnet IP
|
CSCsd98435
|
Yes
|
DHCPD pool does not allow to set ip add on interface once it is removed
|
CSCsd99200
|
Yes
|
Traceback in 7.1.2 caused by strict http inspection
|
CSCsd99326
|
Yes
|
Show service-policy crashes after global_policy change and interface add
|
CSCsd99709
|
Yes
|
PIX gets high cpu when type q to interrupt output of show conf
|
CSCse00303
|
Yes
|
Traceback during active/active config replication with 4 syslog servers
|
CSCse00756
|
Yes
|
URL filtering using Websense locks up downloads.
|
CSCse02703
|
Yes
|
Passwords in startup config may be changed without user intervention
|
CSCse02722
|
Yes
|
SSL Handshake failure with self signed cert
|
CSCse03299
|
Yes
|
VPN clients behind same PAT device using IPSEC/TCP & NAT-T fails IKE neg
|
CSCse05089
|
Yes
|
ASA 7.1(2) - Crash at listen/https w/ eip strdup:int3+4
|
CSCse05955
|
Yes
|
Java Applet with Cache_Archive PARAM Fail if No ARCHIVE Attribute
|
CSCse06536
|
Yes
|
ASA 7.1 : ASR not forwarding fragmented IP packets between contexts
|
CSCse08746
|
Yes
|
ASA send Radius attribute 31 source IP address as 0.0.0.0
|
CSCse10714
|
Yes
|
Shun behavior change in 7.x
|
CSCse11384
|
Yes
|
ASA crash in dhcp_daemon
|
CSCse14251
|
Yes
|
PIX with 7.1.2.4 crashes inside ntdomain_process_ntinfo (ntdomain.c)
|
CSCse19020
|
Yes
|
PPTP Pass-through not working due to inspection
|
CSCse20501
|
Yes
|
Passive FTP to Multinet server fails
|
CSCse22853
|
Yes
|
Active unit crash in accept/http when disabling DHCP relay
|
CSCse23164
|
Yes
|
PIX crash
|
CSCse23554
|
Yes
|
Memory leak within event_smtpmgr:es_SmtpSndMSG function
|
CSCse30479
|
Yes
|
tcp tx may not complete under certain conditions with proxy
|
Related Documentation
For additional information on the adaptive security appliance, refer to the following documentation found on Cisco.com:
•
Cisco ASA 5500 Hardware Installation Guide
•
Cisco ASA 5500 Series Adaptive Security Appliance Getting Started Guide
•
Cisco ASDM Release Notes
•
Cisco Security Appliance Command Line Configuration Guide
•
Cisco Security Appliance Command Reference
•
Migrating to ASA for VPN 3000 Series Concentrator Administrators
•
Release Notes for Cisco SSL VPN Client
•
Cisco Secure Desktop Configuration Guide
•
Release Notes for Cisco Secure Desktop
•
Regulatory Compliance and Safety Information for the Cisco ASA 5500 Series
•
Selected ASDM VPN Configuration Procedures for the Cisco ASA 5500 Series
•
Cisco Security Appliance Logging Configuration and System Log Messages
Obtaining Documentation and Submitting a Service Request
For information on obtaining documentation, submitting a service request, and gathering additional information, see the monthly What's New in Cisco Product Documentation, which also lists all new and revised Cisco technical documentation, at:
http://www.cisco.com/en/US/docs/general/whatsnew/whatsnew.html
Subscribe to the What's New in Cisco Product Documentation as a Really Simple Syndication (RSS) feed and set content to be delivered directly to your desktop using a reader application. The RSS feeds are a free service and Cisco currently supports RSS Version 2.0.
This document is to be used in conjunction with the documents listed in the "Related Documentation" section.
Cisco and the Cisco Logo are trademarks of Cisco Systems, Inc. and/or its affiliates in the U.S. and other countries. A listing of Cisco's trademarks can be found at www.cisco.com/go/trademarks. Third party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (1005R)
Any Internet Protocol (IP) addresses used in this document are not intended to be actual addresses. Any examples, command display output, and figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses in illustrative content is unintentional and coincidental.
©2006 Cisco Systems, Inc. All rights reserved.