Guest

Cisco ASA 5500-X Series Next-Generation Firewalls

Cisco ASA 5500 Series Release Notes, Version 7.2(1)

 Feedback

Table Of Contents

Cisco ASA 5500 Series Release Notes Version 7.2(1)

Contents

Introduction

System Requirements

Memory Requirements

Determining the Software Version

Upgrading to a New Software Version

New Features

Important Notes

policy-map type inspect http

SVC Tunnel Connections Failover

HTTP(S) Authentication Challenge Improvement

SSL VPN Licenses

ActiveX and WebVPN

CIFS Files

Failover and WebVPN and SVC connections

FIPS 140-2

WebVPN ACLS and DNS Hostname

Proxy Server and ASA

Mismatch PFS

Readme Document for the Conduits and Outbound List Conversion Tool 1.2

VPN Load Balancing Requirements

Features not Supported in Version 7.2(1)

Downgrading to a Previous Version

MIBs Support

Using Priority-Queue on ASA Model 5505

Caveats

Open Caveats - Version 7.2(1)

Resolved Caveats - Version 7.2(1)

Related Documentation

Obtaining Documentation and Submitting a Service Request


Cisco ASA 5500 Series Release Notes Version 7.2(1)


May 2006

Contents

This document includes the following sections:

Introduction

System Requirements

New Features

Important Notes

Caveats

Related Documentation

Obtaining Documentation and Submitting a Service Request

Introduction

The Cisco ASA 5500 series security appliances are purpose-built solutions that combine the most effective security and VPN services with the innovative Cisco Adaptive Identification and Mitigation (AIM) architecture. Designed as a key component of the Cisco Self-Defending Network, the security appliance provides proactive threat defense that stops attacks before they spread through the network, controls network activity and application traffic, and delivers flexible VPN connectivity. The result is a powerful multifunction network security appliance family that provides the security breadth and depth for protecting small and medium-sized business and enterprise networks while reducing the overall deployment and operations costs and complexities associated with providing this new level of security. This version introduces significant enhancements to major functional areas including: new Anti-X Services, VPN services, and management/monitoring.

For more information on all the new features, see New Features.

Additionally, the adaptive security appliance software supports Adaptive Security Device Manager. ASDM delivers world-class security management and monitoring through an intuitive, easy-to-use web-based management interface. Bundled with the security appliance, ASDM accelerates security appliance deployment with intelligent wizards, robust administration tools, and versatile monitoring services that complement the advanced integrated security and networking features offered by the market-leading suite of the security appliance. Its secure, web-based design enables anytime, anywhere access to security appliances.

System Requirements

The sections that follow list the system requirements for operating an adaptive security appliance. This section includes the following topics:

Memory Requirements

Determining the Software Version

Upgrading to a New Software Version

Memory Requirements

Table 1 lists the DRAM memory requirements for the adaptive security appliance.

Table 1 DRAM Memory Requirements 

ASA Model
DRAM Memory

ASA 5505

128 MB

ASA 5510

256 MB

ASA 5520

512 MB

ASA 5540

1024 MB

ASA 5550

4096 MB


All adaptive security appliances require a minimum of 64 MB of internal CompactFlash.

Determining the Software Version

Use the show version command to verify the software version of your adaptive security appliance.

Upgrading to a New Software Version

If you have a Cisco.com (CDC) login, you can obtain software from the following website:

http://www.cisco.com/cisco/software/navigator.html

You must upgrade or downgrade from Version 7.1.(x) to 7.2(1) and vice versa because older versions of the ASA images do not recognize new ASDM images, new ASA images do not recognize old ASDM images.

For information on how to load an image, see the "Downloading Files" section in the Cisco Security Appliance Command Line Configuration Guide.

To upgrade from Version 7.1.(x) to 7.2(1), you must perform the following steps:


Step 1 Load the new 7.2(1) image from the following website:

http://www.cisco.com/cisco/software/navigator.html

Step 2 Reload the device so that it uses the 7.2(1) image.

Step 3 Load the new ASDM 5.2.(x) image from the following website:

http://www.cisco.com/cisco/software/navigator.html


To downgrade from Version 7.2(1) to 7.1.(x), you must perform the following steps:


Step 1 Load the 7.1.(x) image from the following website:

http://www.cisco.com/cisco/software/navigator.html

Step 2 Reload the device so that it uses the 7.1(x) image.

Step 3 Load the ASDM 5.1(x) image from the following website:

http://www.cisco.com/cisco/software/navigator.html


New Features

Released: May 31, 2006

Table 2 lists the new features forASA and PIX Version 7.2(1).

Table 2 New Features for ASA and PIX Version 7.2(1) 

Feature
Description
Platform Features

ASA 5505 support

The ASA 5505 was introduced in this release. The ASA 5505 is a new model for small office/home office, enterprise teleworker environments, includes a built-in 8-port Fast Ethernet switch, and supports Easy VPN, Dual ISP, and has many more features

The ASA 5505 has Power over Ethernet (PoE) switch ports that can be used for PoE devices, such as IP phones. However, these ports are not restricted to that use. They can also be used as Ethernet switch ports. If a PoE device is not attached, power is not supplied to the port.

ASA 5550 support

The ASA 5550 delivers gigabit-class security services and enables Active/Active high availability for large enterprise and service-provider networks in a reliable, 1RU form-factor. Providing gigabit connectivity in the form of both Ethernet- and Fiber-based interfaces with high-density VLAN integration, the ASA 5550 enables businesses to segment their networks into numerous high-performance zones for improved security.

Easy VPN Features (ASA 5505 Only)

Client Mode (also called Port Address Translation) and Network Extension Mode

Client Mode—Hides the IP addresses of devices on the ASA 5505 private network, so that all traffic from the ASA 5505 private network arrives on the private network of the central-site security appliance with a single-source, assigned IP address. You cannot ping or access a device on the ASA 5505 private network from the central site, but you can access the assigned IP address.

Network Extension Mode—Permits devices behind the security appliance to have direct access to devices on the ASA 5505 private network only through the tunnel. You can ping or access a device on the ASA 5505 network from the central site.

The ASA 5505 does not have a default mode; you must specify the one that you want to use.

Automatic Tunnel Initiation

Supports NEM, but not Client Mode. It uses a group name, username, and password stored in the configuration to initiate the tunnel.

IKE and IPsec Support

The ASA 5505 supports preshared keys and certificates (RSA-SIG). The security appliance uses IKE Aggressive Mode for preshared keys and IKE Main Mode for RSA-SIG based key exchange. Cisco ASA 5505 can initiate IPsec, IPsec over NAT-T, and IPsec over cTCP sessions.

Secure Unit Authentication (SUA)

Supports the ASA 5505 authentication with dynamically generated authentication credentials or with static credentials to be entered at tunnel initiation. With SUA enabled, the user must manually trigger the IKE tunnel using a browser or an interactive CLI.

Individual User Authentication (IUA)

Enables static and one-time password authentication of individual clients on the inside network. IUA and SUA are independent of each other; they work in combination or isolation from each other.

Token-Based Authentication

Supports Security Dynamics (SDI) SecurID one-time passwords.

Authentication by HTTP Redirection

Redirects unauthenticated HTTP traffic to a login page if SUA or a username and password are not configured or if IUA is disabled.

Load Balancing

An ASA 5505 configured with dual ISP backup supports cluster-based VPN load balancing over the two Ethernet ports available in the Internet zone. The load-balancing scheme involves a "virtual director" IP address that is the destination of incoming client connections. The server that share a virtual director IP address form a cluster, where one cluster member acts as the cluster master. The master receives a request sent to the virtual director and redirects the client, using a proprietary IKE notify message, to the optimal server in the cluster. The current ISAKMP session terminates, and a new session is attempted to the optimal server.

If the connection to the optimal server fails, the client reconnects to the primary server (at the virtual director IP address of the cluster) and repeats the load-balancing procedure. If the connection to the primary server fails, the client rolls over to the next configured backup server, which may be the master of another cluster.

Failover (using Backup Server List)

You can configure a list of 10 backup servers in addition to the primary server. The ASA 5505 attempts to establish a tunnel with the primary server. If that attempt fails, the ASA 5505 attempts to establish a tunnel with other specified servers in the backup server list in sequence.

Device Pass-Through

Encompasses both IP Phone Pass Through and LEAP Pass Through features.

Certain devices, such as printers and Cisco IP phones, are incapable of performing authentication, so they cannot participate in IUA. With device pass-through enabled, the ASA 5505 exempts these devices from authentication if IAU is enabled.

The Easy VPN Remote feature identifies the devices to exempt, based on a configured list of MAC addresses. A related issue exists with wireless devices such as wireless access points and wireless nodes. These devices require LEAP/PEAP authentication to let wireless nodes participate in the network. It is only after the LEAP/PEAP authentication stage that the wireless nodes can perform IUA. The ASA 5505 also bypasses LEAP/PEAP packets when you enable Device Pass Through, so that the wireless nodes can participate in IUA.

IKE Mode Configuration

You can set the attribute values that the ASA 5505 requests after IKE Phase I and XAUTH. The device at the central site downloads the VPN policy and the ASA 5505 dynamically configures the features based on the security values. Except for SUA, the Clear Save password, and the backup concentrator list, the dynamic feature configuration lasts only while the tunnel is up.

Remote Management

Supports management of the ASA 5505 over the tunnel to the outside interface with NEM configured, and in the clear to the outside interface.

DNS Resolution of Easy VPN Peer Names

The ASA 5505 resolves the Easy VPN peer names with the DNS server. You can specify the DNS name of the server/client in the CLI.

Split tunneling

Allows the client decide which traffic to send over the tunnel, based on a configured list of networks accessible by tunneling to the central site. Traffic destined to a network other than those listed in the split tunnel network list is sent out in the clear. A zero-length list indicates no split tunneling, and all traffic travels over the tunnel.

Push Banner

Allows you to configure a 491-byte banner message to display in HTTP form to individual users who try to authenticate using IUA.

Application Inspection Features

Enhanced ESMTP Inspection

This feature allows you to detect attacks, including spam, phising, malformed message attacks, and buffer overflow and underflow attacks. It also provides support for application security and protocol conformance, which enforce the sanity of the ESMTP messages as well as detects several attacks, blocks senders and receivers, and blocks mail relay.

DCERPC Inspection

This feature allows you to change the default configuration values used for DCERPC application inspection using a DCERPC inspect map.

DCERPC is a protocol used by Microsoft distributed client and server applications that allows software clients to execute programs on a server remotely.

Typically, a client queries a server called the Endpoint Mapper (EPM) that listens on a well-known port number for the dynamically allocated network information of a required service. The client then sets up a secondary connection to the server instance that provides the service. The security appliance allows the appropriate port number and network address and also applies NAT or PAT, if needed, for the secondary connection.

Enhanced NetBIOS Inspection

This feature allows you to change the default configuration values used for NetBIOS application inspection.

NetBIOS application inspection performs NAT for the embedded IP address in the NetBIOS name service packets and NetBIOS datagram services packets. It also enforces protocol conformance by checking the various count and length fields for consistency.

Enhanced H.323 Inspection

This feature allows you to change the default configuration values used for H.323 application inspection.

H.323 inspection supports RAS, H.225, and H.245, and its functionality translates all embedded IP addresses and ports. It performs state tracking and filtering and can do a cascade of inspect function activation. H.323 inspection supports phone number filtering, dynamic T.120 control, H.245 tunneling control, protocol state tracking, H.323 call duration enforcement, and audio and video control.

Enhanced DNS Inspection

This feature allows you to specify actions when a message violates a parameter that uses a DNS inspection policy map. DNS application inspection supports DNS message controls that provide protection against DNS spoofing and cache poisoning. User configurable rules allow filtering based on the DNS header, domain name, and resource record TYPE and CLASS.

Enhanced FTP Inspection

This feature allows you to change the default configuration values used for FTP application inspection.

FTP command filtering and security checks are provided using strict FTP inspection for improved security and control. Protocol conformance includes packet length checks, delimiters and packet format checks, command terminator checks, and command validation.

Blocking FTP based on user values is also supported so that it is possible for FTP sites to post files for download but restrict access to certain users. You can block FTP connections based on file type, server name, and other attributes. System message logs are generated if an FTP connection is denied after inspection.

Enhanced HTTP Inspection

This feature allows you to change the default configuration values used for HTTP application inspection.

HTTP application inspection scans HTTP headers and body and performs various checks on the data. These checks prevent various HTTP constructs, content types, and tunneling and messaging protocols from traversing the security appliance.

HTTP application inspection can block tunneled applications and non-ASCII characters in HTTP requests and responses, preventing malicious content from reaching the web server. Size limiting of various elements in HTTP request and response headers, URL blocking, and HTTP server header type spoofing are also supported.

Enhanced Skinny (SCCP) Inspection

This feature allows you to change the default configuration values used for SCCP (Skinny) application inspection.

Skinny application inspection performs translation of embedded IP address and port numbers within the packet data and dynamic opening of pinholes. It also performs additional protocol conformance checks and basic state tracking.

Enhanced SIP Inspection

This feature allows you to change the default configuration values used for SIP application inspection.

SIP is a widely used protocol for Internet conferencing, telephony, events notification, and instant messaging. Partially because of its text-based nature and partially because of its flexibility, SIP networks are subject to a large number of security threats.

SIP application inspection provides address translation in the message header and body, dynamic opening of ports, and basic sanity checks. It also supports application security and protocol conformance, which enforces the sanity of the SIP messages, as well as detects SIP-based attacks.

Instant Messaging (IM) Inspection

This feature allows you to change the default configuration values used for Instant Messaging (IM) application inspection.

Instant Messaging (IM) application inspection provides detailed access control to control network usage. It also helps stop leakage of confidential data and propagations of network threats. A regular expression database search that represents various patterns for Instant Messaging (IM) protocols to be filtered is applied. A syslog is generated if the flow is not recognized.

The scope can be limited by using an access list to specify any traffic streams to be inspected. For UDP messages, a corresponding UDP port number is also configurable. Inspection of Yahoo! Messenger and MSN Messenger instant messages are supported.

MPF-Based Regular Expression Classification Map

This feature allows you to define regular expressions in Modular Policy Framework class maps and match a group of regular expressions that has the match-any attribute. You can use a regular expression class map to match the content of certain traffic; for example, you can match URL strings inside HTTP packets.

Radius Accounting Inspection

This feature allows you to protect against an over-billing attack in the Mobile Billing Infrastructure. The policy-map type inspect radius-accounting command was introduced in this version.

GKRCS Support for H.323

Two control signaling methods are described in the ITU-T H.323 recommendation: Gatekeeper Routed Control Signaling (GKRCS) and Direct Call Signalling (DCS). DCS is supported by the Cisco IOS gatekeeper. This feature adds Gatekeeper Routed Control Signaling (GKRCS) control signaling method support.

Skinny Video Support

This feature adds SCCP version 4.1.2 message support to print the message name processed by the inspect feature when debug skinny is enabled. CCM 4.0.1 messages are supported.

SIP IP Address Privacy

This feature allows you to retain the outside IP addresses embedded in inbound SIP packets for all transactions, except REGISTER (because it is exchanged between the proxy and the phone), to hide the real IP address of the phone. The REGISTER message and the response to REGISTER message will be exempt from this operation because this message is exchanged between the phone and the proxy.

When this feature is enabled, the outside IP addresses in the SIP header and SDP data of inbound SIP packets will be retained. Use the ip-address-privacy command to turn on this feature.

RTP/RTCP Inspection

This feature NATs embedded IP addresses and opens pinholes for RTP and RTCP traffic. This feature ensures that only RTP packets flow on the pinholes opened by Inspects SIP, Skinny, and H.323.
To prevent a malicious application from sending UDP traffic to make use of the pinholes created on the security appliance, this feature allows you to monitor RTP and RTCP traffic and to enforce the validity of RTP and RTCP packets.

Remote Access and Site-to-Site VPN Features

Network Admission Control

Network Admission Control (NAC) allows you to validate a peer based on its state. This method is referred to as posture validation (PV). PV can include verifying that the peer is running applications with the latest patches, and ensuring that the antivirus files, personal firewall rules, or intrusion protection software that runs on the remote host are up to date.

An Access Control Server (ACS) must be configured for Network Admission Control before you configure NAC on the security appliance.

As a NAC authenticator, the security appliance does the following:

Initiates the initial exchange of credentials based on IPsec session establishment and periodic exchanges thereafter.

Relays credential requests and responses between the peer and the ACS.

Enforces the network access policy for an IPsec session based on results from the ACS server.

Supports a local exception list based on the peer operating system, and optionally, an ACL.

(Optional) Requests access policies from the ACS server for a clientless host.

As an ACS client, the security appliance supports the following:

EAP/RADIUS

RADIUS attributes required for NAC

NAC on the security appliance differs from NAC on Cisco IOS Layer 3 devices (such as routers) where routers trigger PV based on routed traffic. The security appliance enabled with NAC uses an IPsec VPN session as the trigger for PV. Cisco IOS routers configured with NAC use an Intercept ACL to trigger PV based on traffic destined for certain networks. Because external devices cannot access the network behind the security appliance without starting a VPN session, the security appliance does not need an intercept ACL as a PV trigger. During PV, all IPsec traffic from the peer is subject to the default ACL configured for the peer's group.

Unlike the Cisco VPN 3000 Concentrator Series, NAC on the security appliance supports stateless failover, initialization of all NAC sessions in a tunnel group, revalidation of all NAC sessions in a tunnel group, and posture validation exemption lists configured for each tunnel group. NAC on the security appliance does not support non-VPN traffic, IPv6, security contexts, and WebVPN.

By default, NAC is disabled. You can enable it on a group policy basis.

L2TP Over IPsec

L2TP/IPsec provides the capability to deploy and administer an L2TP VPN solution alongside the IPsec VPN and firewall services in a single platform.

The primary benefit of configuring L2TP with IPsec in a remote access scenario is that remote users can access a VPN over a public IP network without a gateway or a dedicated line, enabling remote access from virtually anyplace with POTS. An additional benefit is that the only client requirement for VPN access is the use of Windows 2000 with Microsoft Dial-Up Networking (DUN). No additional client software, such as Cisco VPN client software, is required.

OCSP Support

The Online Certificate Status Protocol (OCSP) provides an alternative to CRL for obtaining the revocation status of X.509 digital certificates. Rather than requiring a client to download a complete and often large certificate revocation list, OCSP localizes the certificate status on a Validation Authority, which it queries for the status of a specific certificate.

Multiple L2TP Over IPsec Clients Behind NAT

The security appliance can successfully establish remote-access L2TP-over-IPsec connections to more than one client behind one or more NAT devices. This enhances the reliability of L2TP over IPsec connections in typical SOHO/branch office environment environments, where multiple L2TP over IPsec clients must communicate securely with a central office.

Nokia Mobile Authentication Support

You can establish a VPN using a handheld Nokia 92xx Communicator series cellular device for remote access. The authentication protocol that these devices use is the IKE Challenge/Response for Authenticated Cryptographic Keys (CRACK) protocol.

Zonelabs Integrity Server

You can configure the security appliance in a network that deploys the Zone Labs Integrity System to enforce security policies on remote VPN clients. In this case, the security appliance is an edge gateway between the Zone Labs Integrity server and the remote clients. The Zone Labs Integrity server and the Zone Labs Personal Firewall on the remote client ensure that a remote client complies with a centrally managed security policy before the client can access private network resources. You configure the security appliance to pass security policy information between the server and clients to maintain or close client connections to prevent a server connection failure, and to optionally, require SSL certificate authentication of both the Integrity server and the security appliance.

Hybrid XAUTH

You can configure hybrid authentication to enhance the IKE security between the security appliance and remote users. With this feature, IKE Phase I requires two steps. The security appliance first authenticates to the remote VPN user with standard public key techniques and establishes an IKE security association that is unidirectionally authenticated. An XAUTH exchange then authenticates the remote VPN user. This extended authentication can use any one of the supported authentication methods. Hybrid XAUTH allows you to use digital certificates for security appliance authentication and a different method for remote VPN user authentication, such as RADIUS, TACACS+ or SecurID.

IPsec Fragmentation and Reassembly Statistics

You can monitor additional IPsec fragmentation and reassembly statistics that help to debug IPsec-related fragmentation and reassembly issues. The new statistics provide information about fragmentation and reassembly both before and after IPsec processing.

Inspection IPS, CSC and URL Filtering for WebVPN

This feature adds support for inspection, IPS, and Trend Micro for WebVPN traffic in clientless mode and port forwarding mode. Support for SVC mode is preexisting. In all of the modes, the Trend Micro and the IPS engines will be triggered (if configured).

URL/FTP/HTTPS/Java/Activex filtering using WebSense and N2H2 support has also been added. DNS inspect will be triggered for the DNS requests.

In port forwarding mode, HTTP, SMTP, FTP, and DNS inspections with the filtering mechanisms using WebSense and N2H2 support has been added.

Routing Features

Active RIP Support

The security appliance supports RIP Version 1 and RIP Version 2. You can only enable one RIP routing process on the security appliance. When you enable the RIP routing process, RIP is enabled on all interfaces. By default, the security appliance sends RIP Version 1 updates and accepts RIP Version 1 and Version 2 updates.

To specify the version of RIP accepted on an interface, use the rip receive version command in interface configuration mode.

Standby ISP Support

This feature allows you to configure a link standby ISP if the link to your primary ISP fails. It uses static routing and object tracking to determine the availability of the primary route and to activate the secondary route when the primary route fails.

PPPoE Client

Point-to-Point Protocol over Ethernet (PPPoE) combines two widely accepted standards, Ethernet and PPP, to provide an authenticated method of assigning IP addresses to client systems. PPPoE clients are typically personal computers connected to an ISP over a remote broadband connection, such as DSL or cable service. ISPs deploy PPPoE because it supports high-speed broadband access using their existing remote access infrastructure and because it is easier for customers to use.

Dynamic DNS Support

You can create dynamic DNS (DDNS) update methods and configure them to update the Resource Records (RRs) on the DNS server at whatever frequency you need.

DDNS complements DHCP, which enables users to dynamically and transparently assign reusable IP addresses to clients. DDNS then provides dynamic updating and synchronizing of the name to the address and the address to the name mappings on the DNS server. With this version, the security appliance supports the IETF standard for DNS record updates.

Multicast Routing Enhancements

Multicast routing enhancements allows you to define multicast boundaries so that domains with RPs that have the same IP address do not leak into each other, to filter PIM neighbors to better control the PIM process, and to filter PIM bidir neighbors to support mixed bidirectional and sparse-mode networks.

Expanded DNS Domain Name Usage

You can use DNS domain names, such as www.example.com, when configuring AAA servers and also with the ping, traceroute, and copy commands.

Intra-Interface Communication for Clear Traffic

You can now allow any traffic to enter and exit the same interface, and not just VPN traffic.

IPv6 Security Enforcement of IPv6 Addresses

This feature allows you to configure the security appliance to require that IPv6 addresses for directly connected hosts use the Modified EUI-64 format for the interface identifier portion of the address.

Multiple Context Mode Features

Private and Automatic MAC Address Assignments and Generation for Multiple Context Mode

You can assign a private MAC address (both active and standby for failover) for each interface. For multiple context mode, you can automatically generate unique MAC addresses for shared context interfaces, which makes classifying packets into contexts more reliable.

The new mac-address auto command allows you to automatically assign private MAC addresses to each shared context interface.

Resource Management for Security Contexts

If you find that one or more contexts use too many resources, and they cause other contexts to be denied connections, for example, then you can configure resource management to limit the use of resources per context.

Save All Context Configurations from the System

You can now save all context configurations at once from the system execution space using the write memory all command.

High Availability Features

Sub-second Failover

This feature allows you to configure failover to detect and respond to failures in under a second.

Configurable Prompt

With this feature, the user can see the failover status of the security appliance without having to enter the show failover command and parse the output. This feature allows users to see the chassis slot number of the failover unit. Previously, the prompt reflected just the hostname, security context, and configuration mode. The prompt command provides support for this feature.

Firewall Features

Generic Input Rate Limiting

This feature prevents denial of service (DoS) attacks on a security appliance or on certain inspection engines on a firewall. The 7.0 release supports egress rate-limiting (police) functionality and in this release, input rate-limiting functionality extends the current egress policing functionality.

The police command is extended for this functionality.

Authentication for Through Traffic and Management Access Supports All Servers Previously Supported for VPN Clients

All server types can be used for firewall authentication with the following exceptions: HTTP Form protocol supports single sign-on authentication for WebVPN users only and SDI is not supported for HTTP administrative access.

Dead Connection Detection (DCD)

This feature allows the adaptive security appliance to automatically detect and expire dead connections. In previous versions, dead connections never timed out; they were given an infinite timeout. Manual intervention was required to ensure that the number of dead connections did not overwhelm the security appliance. With this feature, dead connections are detected and expired automatically, without interfering with connections that can still handle traffic. The set connection timeout and show service-policy commands provide DCD support.

WCCP

The Web Cache Communication Protocol (WCCP) feature allows you to specify WCCP service groups and redirect web cache traffic. The feature transparently redirects selected types of traffic to a group of web cache engines to optimize resource usage and lower response times.

Filtering Features

URL Filtering Enhancements for Secure Computing (N2H2)

This feature allows you to enable long URL, HTTPS, and FTP filtering by using both Websense (the current vendor) and N2H2 (a vendor that has been purchased by Secure Computing). Previously, the code only enabled the vendor Websense to provide this type of filtering. The url-block, url-server, and filter commands provide support for this feature.

Management and Troubleshooting Features

Auto Update

The security appliance can now be configured as an Auto Update server in addition to being configured as an Auto Update client. The existing client-update command (which is also used to update VPN clients) is enhanced to support the new Auto Update server functionality, and includes new keywords and arguments that the security appliance needs to update security appliances configured as clients. For the security appliance configured as an Auto Update client, the auto-update command continues to be the command used to configure the parameters that the security appliance needs to communicate with the Auto Update server.

Modular Policy Framework Support for Management Traffic

You can now define a Layer 3/4 class map for to-the-security-appliance traffic, so you can perform special actions on management traffic. For this version, you can inspect RADIUS accounting traffic.

Traceroute

The traceroute command allows you to trace the route of a packet to its destination.

Packet Tracer

The packet tracer tool allows you to trace the life span of a packet through the security appliance to see if it is behaving as expected.

The packet-tracer command provides detailed information about the packets and how they are processed by the security appliance. If a command from the configuration did not cause the packet to drop, the packet-tracer command will provide information about the cause.

 


Important Notes

This section lists important notes related to Version 7.2(1).

policy-map type inspect http

The http-map and ftp-map commands are no longer supported in Version 7.2. Use the policy-map type inspect http command instead.

SVC Tunnel Connections Failover

In the security appliance stateful failover pairs that run software releases prior to 7.1.2.4, client connections over SVC tunnels were not set up correctly on the standby machines. When failover occurs you must re-establish TCP connections.

This problem has been fixed for the security appliance versions 7.1.2.4 and 7.2.x and later releases. However, a new SVC client version later than 1.1.0.154 (to be released soon) is also required to avoid this problem.

HTTP(S) Authentication Challenge Improvement

In versions prior to 7.2(1), the security appliance authenticated HTTP network connections using basic HTTP authentication and authenticated HTTPS connections by generating similar custom login windows. In 7.2(1), HTTP and HTTPS connections are redirected to a set of authentication pages that are served directly by the security appliance. After successful authentication, the browser is again redirected to the originally-intended URL. When AAA is configured, these pages are available at:

http://interface_ip:1080/netaccess/connstatus.html

https://interface_ip:1443/netaccess/connstatus.html

SSL VPN Licenses

Beginning with Version 7.2(1), the ASA 5550 supports a license level of 5000 users. The complete SSL VPN feature functionality offered by the security appliance is included in this single SSL VPN license. No per-feature licenses are required. This SSL VPN license has a one-time fee and lasts for the lifetime of the security appliance. Upon installation of Version 7.2(1), two simultaneous SSL VPN user sessions are included for evaluation.

ActiveX and WebVPN

Many ActiveX controls are custom and require special treatment by WebVPN. Please contact Cisco TAC if your application uses ActiveX controls and you have problems with its functionality over a WebVPN connection (CSCsb85180).

CIFS Files

If a remote user accesses CIFS files using Internet Explorer, the filename in the File Download window might not display some Japanese Shift_JIS characters correctly. However, the Open and Save functions do work properly. This issue does not occur with Netscape.

Failover and WebVPN and SVC connections

To ensure that WebVPN and SVC connections reconnect quickly in the event of a failover, enable the security appliance to respond to incoming client TCP packets with the service resetoutside command from global configuration mode:

[no] service resetoutside

This command causes the security appliance that takes over the existing WebVPN and SVC connections to send TCP RST packets in response to incoming client TCP packets, causing client connections to reestablish quicker. If you do not enable the service resetoutside command, the security appliance drops TCP packets from failed-over connections and waits for each client to reestablish the TCP connection. This may take longer or result in the session being lost due to timeout.

The following example enables the security appliance to send TCP RST packets:

F1-asa1(config)# service resetoutside

FIPS 140-2

The security appliance Version 7.0(4) is FIPS certified. Version 7.1 is on the FIPS 140-2 Pre-Validation List.

WebVPN ACLS and DNS Hostname

When a deny webtype URL ACL (DNS-based) is defined, but the DNS-based URL is not reachable, the browser displays "DNS Error" popup. The ACL hit counter does not increment.

If an IP address rather than a DNS name defines a deny webtype URL, then the hit counter does record the traffic flow hitting the ACL, and the browser displays a "Connection Error.".

Proxy Server and ASA

If WebVPN is configured to use an HTTP(S)-proxy server to service all requests for browsing HTTP and/or HTTPS sites, the client/browser may expect the following behavior:

1. If the ASA cannot communicate with the HTTPS or HTTPS proxy server, a "connection error" is displayed on the client browser.

2. If the HTTP(S) proxy cannot resolve or reach the requested URL, it should send an appropriate error to the ASA, which in turn displays it on the client browser.

Only when the HTTP(S) proxy server notifies the ASA of the inaccessible URL, can the ASA notify the client browser about the error.

Mismatch PFS

The PFS setting on the VPN client and the security appliance must match.

Readme Document for the Conduits and Outbound List Conversion Tool 1.2

The adaptive security appliance Outbound/Conduit Conversion tool assists in converting configurations with outbound or conduit commands to similar configurations using ACLs. ACL-based configurations provide uniformity and leverage the powerful ACL feature set. ACL based configurations provide the following benefit:

ACE Insertion capability - System configuration and management is greatly simplified by the ACE insertion capability that allows users to add, delete or modify individual ACEs.

VPN Load Balancing Requirements

VPN load balancing for the security appliance requires an ASA 5520 or higher. It also requires a 3DES-AES encryption license.

Features not Supported in Version 7.2(1)

The PPTP feature is not supported in Version 7.2(1).

Downgrading to a Previous Version

To downgrade to a previous version of the operating system software (software image), use the downgrade command in privileged EXEC mode. For more information and a complete description of the command syntax, see the Cisco Security Appliance Command Reference.

MIBs Support

The Cisco Unified Firewall MIB offers a unified SNMP standards-based monitoring interface for functionality on the security appliances. The Unified Firewall MIB offers statistics collection and monitoring for Stateful Packet Inspection, URL Filtering, and Application Inspection.

For more information on MIB Support, go to:

http://www.cisco.com/public/sw-center/netmgmt/cmtk/mibs.shtml

Using Priority-Queue on ASA Model 5505

On ASA Model 5505 (only), configuring priority-queue on one interface overwrites the same configuration on all other interfaces. That is, only the last applied configuration is present on all interfaces. Further, if the priority-queue configuration is removed from one interface, it is removed from all interfaces. This problem is present only on ASA5505 platforms.

To work around this issue, configure the priority-queue command on only one interface. If different interfaces need different settings for the queue-limit and/or tx-ring-limit commands, use the largest of all queue-limits and smallest of all tx-ring-limits on any one interface (CSCsi13132).

Caveats

The following sections describe the caveats for the Version 7.2(1).

For your convenience in locating caveats in Cisco's Bug Toolkit, the caveat titles listed in this section are drawn directly from the Bug Toolkit database. These caveat titles are not intended to be read as complete sentences because the title field length is limited. In the caveat titles, some truncation of wording or punctuation may be necessary to provide the most complete and concise description. The only modifications made to these titles are as follows:

Commands are in boldface type.

Product names and acronyms may be standardized.

Spelling errors and typos may be corrected.


Note If you are a registered cisco.com user, view Bug Toolkit on cisco.com at the following website:

http://tools.cisco.com/Support/BugToolKit/

To become a registered cisco.com user, go to the following website:

http://tools.cisco.com/RPF/register/register.do


Open Caveats - Version 7.2(1)

Table 3 Open Caveats

DDTS Number
Software Version 7.2(1)
 
 
Corrected
Caveat

CSCse37315

No

AIC DNS - Traceback after removing certain MPF actions with DNS traffic

CSCse38087

No

RFW:multi-mode kerberos authentication fails after few hours stress test

CSCse28871

No

NAC: Session entries are not cleaned up after initial posture validation

CSCse28930

No

NAC: Posture validation failure due to inconsistent source IP address

CSCse24058

No

L2TP: Traffic denied through tunnel after 2 days -> domain=aaa-user

CSCse22760

No

LDAP/Sun, Pass expires in X days is not functioning properly

CSCse34477

No

ESMTP: mail-relay param w/o any action accepted, junk chars in sho run

CSCse34515

No

ESMTP: mail-relay action drop-connection log taken as drop-connection

CSCse29150

No

ESMTP: match not conditions related to count not working

CSCse20854

No

ESMTP: multiple match cond. with regex - only most generic regex matched

CSCse38371

No

IM: MSN drop-connection not enforced is specific scenarios

CSCse32684

No

IM: match not version does not block for Yhoo IM

CSCse27787

No

AIC SIP: SIP messages might fail state-check knob when record-route on

CSCse20834

No

SIP: BYE embryonic connection timestamp not updated for re-Invite

CSCse37065

No

Proxy erroneously drops ACK bit in RST causing Kerberos rsh to fail

CSCse27774

No

PPPoE Object-tracking: Traceback in IP Thread when disabling pppoe

CSCsd84011

No

REGEX: ^ (match from beginning of text) does not work in some cases

CSCsd82575

No

unexpected IGMP joins sent when configuring multicast routing

CSCsd59295

No

WCCP static bypass not working with vlan interfaces

CSCsd51407

No

Dual ISP fails after failover, routing table have stale routes

CSCse32481

No

errmsg:xfer_encode regex missing for 1st xfer_encode count command

CSCse32774

No

Cisco MacOS VPN client disconnects after rekey.

CSCse29692

No

L2TP: File transfers with any client in my setup results in tunnel drop

CSCse29635

No

L2TP/IPSec: sporadic tunnel drops occur after numerous rekeys

CSCse21175

No

IPSec RAS performance on ASA-5540 is down approx 11% versus 7.1.2

CSCse21150

No

L2TP: Mac client dropping sessions during overnight system test

CSCse09534

No

L2TP: windows file transfer of large files sometimes fails

CSCsd78808

No

L2TP: Fragmentation reassembly issues with PIX VAC and L2TP conns

CSCsd45605

No

2 routes to same n/w w same metric different ifx should not be allowed

CSCse24537

No

RIP: [no] access-list defined in distribute-list should display err msg

CSCse31519

No

OCSP: CRL checking of externally signed responder cert fails

CSCse33851

No

H.225 releasecomplete message was dropped by the firewall

CSCse39315

No

t120 fax cannot get through multiple routed mode

CSCse39263

No

h.323 packet drop when connecting in multiple mode


Resolved Caveats - Version 7.2(1)

Table 4 Resolved Caveats 

DDTS Number
Software Version 7.2(1)
 
 
Corrected
Caveat

CSCdy45820

Yes

show traffic broken, add 5 mins traffic info to show interface

CSCee29967

Yes

MFW: system context cannot log to external syslog server

CSCeh01744

Yes

Undo CSCdy82442 and support 10 dhcprelay statements on FWSM

CSCeh59278

Yes

DHCPACK gets dropped when it is sent in response to DHCPINFORM

CSCeh60845

Yes

Logginig queue incorrectly registers 8192 256-byte blocks

CSCeh70043

Yes

DOC: sh asp drop needs further clarification in doc

CSCeh90617

Yes

Recompiling ACLs can cause packet drops on low-end platforms

CSCei43588

Yes

traceback when trying to match a packet to acl with deny

CSCei47678

Yes

SNMP packet size standards in RFC3417 not fully supported.

CSCek21835

Yes

Higher metric OSPF external route is selected

CSCek21836

Yes

SIP: BYE embryonic connection timestamp not updated.

CSCek21837

Yes

PDM with Command Authorization requires the write command for Read-Only

CSCek21838

Yes

SIP: fail to open a conn for Record route in NOTIFY

CSCek21843

Yes

SIP: Not translate c= address if first m= has port 0 in SDP body.

CSCek21846

Yes

SIP: xlate timeout not updated by Expire value in Register message

CSCek21849

Yes

Backspace sent in cut-through proxy authentication

CSCek26572

Yes

tftp fixup does not allow error message from client

CSCek40279

Yes

Increase in CPU utilization when OSPF is enabled

CSCsb80170

Yes

VPN3K PARITY: Address-pools needed in group-policy

CSCsb94408

Yes

FWSM Thread dhcp_daemon crashing randomly

CSCsc12094

Yes

AAA fallback authentication does not work with reactivation-mode timed

CSCsc15434

Yes

Assertion violation w/icmp traffic and icmp inspection

CSCsc16041

Yes

'clear local host' results in memory leak

CSCsc16507

Yes

Cannot remove url-server despite having removed url-block cmd

CSCsc18324

Yes

Traceback in Dispatch Unit (Old pc 0x001dbdc6 ebp 0x01212404)

CSCsc18911

Yes

PIX / ASA does not remove OSPF route for global PAT entry after deleting

CSCsc29201

Yes

ASA Management 0/0 interface cannot be used in Transparent mode for OOB

CSCsc33385

Yes

GTP - pdp context creation failed - GSN tunnel limit exceeded

CSCsc39334

Yes

Traceback due to check-retransmission from the tcp-map

CSCsc44591

Yes

Traceback in Thread Name: ARP Thread in multicontext mode

CSCsc46976

Yes

SIP: traceback when failed to pre-allocate early rtp

CSCsc47618

Yes

Authenticate all messages between Active and Standby Firewalls

CSCsc51737

Yes

AIC SIP: Add support for m=text

CSCsc51939

Yes

Performance throughput problems when http inspect enabled

CSCsc68575

Yes

CPU usage is higher for given traffic throughput in recent releases.

CSCsc73942

Yes

TCP RST is dropped when there is outstanding data that is not acked

CSCsc78900

Yes

Reload with Thread Name: Dispatch Unit at tcp_check_packet

CSCsc79110

Yes

syslogs show user <unknown> when packets denied by vpn-filter

CSCsc81565

Yes

Idle conn timeout reset when packet dropped by TCP normalizer

CSCsc81668

Yes

https://<ip>/config does not have the same privilege level as 'write'

CSCsc83471

Yes

incorrect IPSec SA's may be deleted upon receiving DELETE notify

CSCsc86217

Yes

Voice Proxy Function does not preserve DSCP bits.

CSCsc90826

Yes

PIX 7.0 getting the error %PIX-1-106021 when ip verify command enable

CSCsc90944

Yes

Malformed https proxy authentication page w/ linebreak

CSCsc91450

Yes

FTP control channel timing out although data channel is active.

CSCsc92575

Yes

Upgrade Activation Key reduces permitted interfaces

CSCsc93061

Yes

Traceback after activation of vpn-filter

CSCsc94945

Yes

Startup-config error with priority-queue and service-policy

CSCsc97846

Yes

Significant CPU utilization increase when adding more logging hosts.

CSCsc97999

Yes

Syslog Message ID 313003 is used incorrectly

CSCsc98339

Yes

Standby unit may reload if active unit powered off

CSCsc99263

Yes

GTPv1: Subsequent Create Req to modify PDP context IEs are not processed

CSCsc99364

Yes

SSL Certs from Verisign Managed PKI do not install

CSCsd00051

Yes

SNMP polling of ASA management interface stats may cause packet loss

CSCsd00175

Yes

ASA w/ IPS may drop FIN/ACK packets resulting in half open FTP sessions

CSCsd01722

Yes

PIX/ASA 7.0 logging message 419001 always sent in message lists

CSCsd02938

Yes

ASA/PIX doesn't reconnect if websense server goes down

CSCsd03391

Yes

TCP Intercept doesn't negate CPU impact when SYN flood from adjacent net

CSCsd03664

Yes

Reload w/ Thread Name:Session Manager w/ high volume of L2L VPN traffic

CSCsd04327

Yes

ASA out of order packets to ssm or inspect are dropped

CSCsd04700

Yes

match port option for setting connection time-outs does not work

CSCsd07703

Yes

Oracle Forms(Java) Applet not loading via WebVPN

CSCsd07783

Yes

Transient NAT-T packets silently dropped if NAT-T is enabled

CSCsd08170

Yes

UDP 500 not removed from pat port pool when crypto map is applied

CSCsd10138

Yes

Traceback in Checkheaps thread when enabling LAN2LAN vpn

CSCsd11179

Yes

SNMP polling of resource MIBS may cause packet loss

CSCsd11511

Yes

Traceback due to memory corruption in sanity check of Checkheaps thread

CSCsd12670

Yes

ASA, WebVPN errors when triggering a simple javascript

CSCsd13334

Yes

Memory Leaking tunnel-group authorization-dn-attributes

CSCsd13636

Yes

Reload with thread name dispatch unit

CSCsd15475

Yes

Secondary unit doesn't get full config file after SSH reload on Primary

CSCsd16751

Yes

GTP: wrong service-policy used when connection is re-used

CSCsd16780

Yes

Assertion in indirect->timestamp & pool->timestamp_mask) == timestamp

CSCsd17182

Yes

no nat-control does not appear in the output of show run all

CSCsd17431

Yes

Managment rule addition / tracking needs to be cleaned up

CSCsd17598

Yes

svc image <imagename> fails to set svc image after clear conf all

CSCsd17718

Yes

IGMP forward interface command fails to sync to the standby unit

CSCsd17763

Yes

Firewall should not respond to TCP segment w/ RST+ACK and bad ACK number

CSCsd17879

Yes

Deny rules in crypto acl blocks inbound tcp/udp after tunnel formed

CSCsd21887

Yes

WebVPN mangles the url's in emails when accessing OWA

CSCsd22910

Yes

users with passwords longer than 11 chars can no longer authenticate

CSCsd25537

Yes

Failover unit traceback in Thread Name: fover_FSM_thread

CSCsd25553

Yes

Traceback when VPN client tries to make connection to inside interface

CSCsd25975

Yes

Add file URL support to WebVPN clientless mode

CSCsd28581

Yes

Failover: Standby device may traceback in Thread Name: IKE Daemon

CSCsd30371

Yes

Show vpnsession-db remote displays incorrect group-policy

CSCsd31334

Yes

Need a way to clear a subset of arps

CSCsd33677

Yes

ssl handshake failure occurs for SVC clients when re-keing using SSL

CSCsd34070

Yes

H.245 inspect skipped if GKRCS and wrong H.225 callSignalAddress for GK

CSCsd36030

Yes

in multiple policy-maps, packets should match the first map,not the last

CSCsd37075

Yes

PIX/ASA reload in Thread Name PIM IPv4 when multicast routing enabled

CSCsd38929

Yes

SSL: Verisign imported certificate fails when establishing SSL session

CSCsd39029

Yes

Traceback with Thread Name: Dispatch Unit

CSCsd40729

Yes

WebVPN page doesn't complete load and will hang browser

CSCsd40812

Yes

Internal WebVPN Page will not display after logon

CSCsd42895

Yes

LDAP Base(Search) DN scope not working correctly

CSCsd43093

Yes

Memory leak due to SNMP monitoring on L2L IPSec tunnel

CSCsd43105

Yes

Traceback in SNMP thread under low memory condition

CSCsd43770

Yes

LDAP server-type configuration is not processed correctly.

CSCsd43909

Yes

LDAP Authen against AD does not work with Userid

CSCsd43976

Yes

ASA should not send names in split-tunnel list to SVC

CSCsd45099

Yes

logging debug-trace should not prevent debugs from printing to console

CSCsd45297

Yes

Syslog 722020 needs to include Tunnel-group name or be re-worded

CSCsd46111

Yes

Traceback when using sh xlate via telnet over VPN tunnel

CSCsd46373

Yes

ASA: WebVPN NTLM login fails if domain is not specified

CSCsd46685

Yes

Traceback eip::_snp_sp_action_construct_ip_key+1013 after ipsec rule cfg

CSCsd46922

Yes

High CPU usage when configuring/compiling ACL's

CSCsd47171

Yes

GTP: IMSI prefix filtering on 3 digit MNC's do not work

CSCsd47976

Yes

Traceback on nameif command on unused intf with 8000 static commands

CSCsd48368

Yes

WebVPN - Domino Web Access Help Function hangs browser

CSCsd48512

Yes

Duplicate ASP crypto table entry causes firewall to not encrypt traffic

CSCsd48634

Yes

LDAP password management fails when connected to a MS Active Directory

CSCsd51884

Yes

Restore debug icmp trace functionallity - showing nat translation

CSCsd52578

Yes

Traceback in thread: snp_timer_thread

CSCsd53213

Yes

PIX shows xlates from global xx.xx.xx.xx to local 0.0.0.0

CSCsd53232

Yes

Entire CIFS share not displayed when it contains more than 400 folders

CSCsd53321

Yes

sysopt connection timewait causes SSH sessions to timeout prematurely

CSCsd54293

Yes

ARP fails when PC moved from outside to inside of transparent FW

CSCsd55138

Yes

WebVPN: Traceback when accessing URL with Viewstate > 20K

CSCsd55527

Yes

traceback after executing sh cry ipsec sa sum with vpn sys test run

CSCsd58400

Yes

PIX fails to send Embryonic Limit Exceeded message

CSCsd58677

Yes

LDAP authentication succeeds if password is left blank

CSCsd58848

Yes

Memory allocated for connections not freed

CSCsd59936

Yes

Registering to the RP for PIM fails if fragmented in more then 12 packs

CSCsd63673

Yes

ASA with dhcprelay doesnt reply with unicast DHCP offer

CSCsd63828

Yes

PIX Failover does not Sync with certain multicast commands

CSCsd63863

Yes

CIFS Shares on Root Directory not displayed in alphabetical order

CSCsd64268

Yes

Secondary smtp-server fails to send event messages after period of time

CSCsd64584

Yes

http traffic fails with firewall in tfw and IPS monitoring in inline mod

CSCsd64912

Yes

url-server: tcp connections fail when tcp stack users are exhausted

CSCsd64920

Yes

url-server: url lookup requests are not retried when using tcp

CSCsd65192

Yes

WebVPN: Debug webvpn svc will not show up in show debug command

CSCsd65209

Yes

url-block block: http response buffering feature does not work

CSCsd65215

Yes

Capture access-list shows only 1 hit count for outbound traffic

CSCsd67028

Yes

WebVPN/SVC should disconnect if ASA encounters SSL CRYPTO Errors

CSCsd67905

Yes

HA Errors referencing WebVPN/VPN appearing even in Transparent mode

CSCsd68051

Yes

WebVPN: ActiveX component does not install when accessing MS TS URL

CSCsd69786

Yes

WebVPN: Duplicate/Malformed HTML Headers not transformed by ASA

CSCsd70242

Yes

Some syslogs are incorrectly logged to an event list, when not specified

CSCsd70812

Yes

HA: Traffic Stall after config syncing running Act/Act fover

CSCsd71386

Yes

RTSP traffic led the PIX to reload

CSCsd72617

Yes

Dispatch Unit Crash when HTTP inspect enabled...PIX/ASA 7.1.2, 7.0.4-11

CSCsd73035

Yes

URL's with + get re-written with space %20

CSCsd73060

Yes

Traceback in Dispatch Unit - on SVC connect (svc dpd-interval gateway)

CSCsd73376

Yes

Case-sensitive processing of javascript attribute

CSCsd73852

Yes

H.323 Inspect not opening media stream.

CSCsd74328

Yes

crash when changing security level on an ifc and failover cfg with NAT

CSCsd74964

Yes

SNP Inspect Http drops messages other than GET

CSCsd76384

Yes

dhcpc fails when management-access is configured

CSCsd77018

Yes

Traceback: Thread Name: Dispatch Unit (Old pc 0x00220087 ebp 0x01796d30)

CSCsd77155

Yes

All out of order packets dropped when queue-limit specified

CSCsd78595

Yes

Global buffer drop output under show service-policy

CSCsd79775

Yes

ASA VPN: all packets for a l2l peer get dropped instead of encrypted

CSCsd81288

Yes

UCTE functions not defined inside frames

CSCsd81668

Yes

Redirect for proxy-bypass links with high ports

CSCsd81969

Yes

LB configuration will be deleted when name is used in cluster ip add cmd

CSCsd82047

Yes

PIX 7.0(4) FO : bad LU from Act causes LU allocate xlate failed on Std

CSCsd82114

Yes

Change of log options on the ACE doesn't take immediate effect

CSCsd82355

Yes

Malformed syslog packets may be generated.

CSCsd83000

Yes

Invalid IPSec tunnel count is reported in ASDM handler output

CSCsd83007

Yes

Need ability to disable dns guard in 7.0

CSCsd83299

Yes

ASDM handler returns invalid value for ISAKMP SA's

CSCsd83863

Yes

Reload with Thread Name: Dispatch Unit

CSCsd84826

Yes

PIX/ASA MSS miscalculation for webvpn conn. terminating to the box

CSCsd85007

Yes

Dispatch unit traceback at snp_fp_fragment with SSM card enabled

CSCsd85345

Yes

Traceback may occur in fover_parse on 7.0.4

CSCsd86550

Yes

Traceback in snp_ids:ids_put when SSM is down

CSCsd89983

Yes

Access-list entered at line 1 is ineffective until access-group is rede

CSCsd91587

Yes

functioning email proxy session generates syslog message error

CSCsd92296

Yes

DHCP relay failed after failover

CSCsd93207

Yes

Show failover indicates different uptimes on devices in failover pair

CSCsd94089

Yes

Feature Req: Srcing auth pkts from inside(NEM)/assigned(CM) for IUA

CSCsd94386

Yes

Beta Customer Crash in inspect http

CSCsd94835

Yes

Proxy may queue too many packets when url filtering client is down

CSCsd94875

Yes

Traceback in VPN/IPSec CLI code when clear crypto ipsec sa counter

CSCsd95170

Yes

PIX 7.0(4)10 : reporting incorrect context CPU usage

CSCsd95480

Yes

Treatment of domain in JavaScript

CSCsd97077

Yes

ASA/PIX - crash from SiVus SIP tester inside to outside w/ inspect/fixup

CSCsd97134

Yes

PIX/ASA ignores OSPF DBDs during adajency building

CSCsd98071

Yes

conns fail after two successful authentications to virtual telnet IP

CSCsd98435

Yes

DHCPD pool does not allow to set ip add on interface once it is removed

CSCsd99200

Yes

Traceback in 7.1.2 caused by strict http inspection

CSCsd99326

Yes

Show service-policy crashes after global_policy change and interface add

CSCsd99709

Yes

PIX gets high cpu when type q to interrupt output of show conf

CSCse00303

Yes

Traceback during active/active config replication with 4 syslog servers

CSCse00756

Yes

URL filtering using Websense locks up downloads.

CSCse02703

Yes

Passwords in startup config may be changed without user intervention

CSCse02722

Yes

SSL Handshake failure with self signed cert

CSCse03299

Yes

VPN clients behind same PAT device using IPSEC/TCP & NAT-T fails IKE neg

CSCse05089

Yes

ASA 7.1(2) - Crash at listen/https w/ eip strdup:int3+4

CSCse05955

Yes

Java Applet with Cache_Archive PARAM Fail if No ARCHIVE Attribute

CSCse06536

Yes

ASA 7.1 : ASR not forwarding fragmented IP packets between contexts

CSCse08746

Yes

ASA send Radius attribute 31 source IP address as 0.0.0.0

CSCse10714

Yes

Shun behavior change in 7.x

CSCse11384

Yes

ASA crash in dhcp_daemon

CSCse14251

Yes

PIX with 7.1.2.4 crashes inside ntdomain_process_ntinfo (ntdomain.c)

CSCse19020

Yes

PPTP Pass-through not working due to inspection

CSCse20501

Yes

Passive FTP to Multinet server fails

CSCse22853

Yes

Active unit crash in accept/http when disabling DHCP relay

CSCse23164

Yes

PIX crash

CSCse23554

Yes

Memory leak within event_smtpmgr:es_SmtpSndMSG function

CSCse30479

Yes

tcp tx may not complete under certain conditions with proxy


Related Documentation

For additional information on the adaptive security appliance, refer to the following documentation found on Cisco.com:

Cisco ASA 5500 Hardware Installation Guide

Cisco ASA 5500 Series Adaptive Security Appliance Getting Started Guide

Cisco ASDM Release Notes

Cisco Security Appliance Command Line Configuration Guide

Cisco Security Appliance Command Reference

Migrating to ASA for VPN 3000 Series Concentrator Administrators

Release Notes for Cisco SSL VPN Client

Cisco Secure Desktop Configuration Guide

Release Notes for Cisco Secure Desktop

Regulatory Compliance and Safety Information for the Cisco ASA 5500 Series

Selected ASDM VPN Configuration Procedures for the Cisco ASA 5500 Series

Cisco Security Appliance Logging Configuration and System Log Messages

Obtaining Documentation and Submitting a Service Request

For information on obtaining documentation, submitting a service request, and gathering additional information, see the monthly What's New in Cisco Product Documentation, which also lists all new and revised Cisco technical documentation, at:

http://www.cisco.com/en/US/docs/general/whatsnew/whatsnew.html

Subscribe to the What's New in Cisco Product Documentation as a Really Simple Syndication (RSS) feed and set content to be delivered directly to your desktop using a reader application. The RSS feeds are a free service and Cisco currently supports RSS Version 2.0.