![]() |
Table Of Contents
Cisco ASA 5500 Series Release Notes Version 7.2(3)
Determining the Software Version
Upgrading to a New Software Version
Supported Platforms and Feature Licenses
ASA 5510 Security Plus License Allows Gigabit Ethernet for Port 0 and 1
sysopt uauth allow-http-cache Command
Resolved Caveats - Version 7.2(3)
Obtaining Documentation and Submitting a Service Request
Cisco ASA 5500 Series Release Notes Version 7.2(3)
August 2007Contents
This document includes the following sections:
•
Supported Platforms and Feature Licenses
•
Obtaining Documentation and Submitting a Service Request
Introduction
The Cisco ASA 5500 series adaptive security appliances are purpose-built solutions that combine the most effective security and VPN services with the innovative Cisco Adaptive Identification and Mitigation (AIM) architecture. Designed as a key component of the Cisco Self-Defending Network, the adaptive security appliance provides proactive threat defense that stops attacks before they spread through the network, controls network activity and application traffic, and delivers flexible VPN connectivity. The result is a powerful multifunction network adaptive security appliance family that provides the security breadth and depth for protecting small and medium-sized business and enterprise networks while reducing the overall deployment and operations costs and complexities associated with providing this new level of security.
For more information on all of the new features, see New Features.
Additionally, the adaptive security appliance software supports Cisco Adaptive Security Device Manager (ASDM). ASDM delivers world-class security management and monitoring through an intuitive, easy-to-use web-based management interface. Bundled with the adaptive security appliance, ASDM accelerates adaptive security appliance deployment with intelligent wizards, robust administration tools, and versatile monitoring services that complement the advanced integrated security and networking features offered by the market-leading suite of the adaptive security appliance. Its secure, web-based design enables anytime, anywhere access to adaptive security appliances.
System Requirements
The sections that follow list the system requirements for operating an adaptive security appliance. This section includes the following topics:
•
Determining the Software Version
•
Upgrading to a New Software Version
Memory Requirements
Table 1 lists the DRAM memory requirements for the adaptive security appliance.
Table 1 DRAM Memory Requirements
ASA Model DRAM MemoryASA 5505
256 MB
ASA 5510
256 MB
ASA 5520
512 MB
ASA 5540
1024 MB
ASA 5550
4096 MB
All adaptive security appliances require a minimum of 64 MB of internal CompactFlash.
In a failover configuration, the two units must have the same hardware configuration. They must be the same model, have the same number and types of interfaces, and the same amount of RAM. For more information, see the "Configuring Failover" chapter in the Cisco Security Appliance Command Line Configuration Guide.
Note
If using two units with different flash memory sizes, make sure that the unit with the smaller flash memory has enough space for the software images and configuration files.
Determining the Software Version
Use the show version command to verify the software version of your adaptive security appliance. Alternatively, you can see the software version, on the Cisco ASDM home page.
Upgrading to a New Software Version
If you have a Cisco.com (CDC) login, you can obtain software from the following website:
http://www.cisco.com/cisco/software/navigator.html
Note
ASA and ASDM images must be compatible, for example ASA Version 7.2(3) is compatible to ASDM Version 5.2(3). ASDM will not work with an incompatible platform version. You will get an error message and ASDM will close.
You can also use the command-line interface to download the image, see the "Downloading Software or Configuration Files to Flash Memory" section in the Cisco Security Appliance Command Line Configuration Guide.
To upgrade from Version 7.1.(x) to 7.2(3), you must perform the following steps:
Step 1
Load the new 7.2(3) image from the following website:
http://www.cisco.com/cisco/software/navigator.html
Step 2
Reload the device so that it uses the 7.2(3) image.
Step 3
Load the new ASDM 5.2.(x) image from the following website:
http://www.cisco.com/cisco/software/navigator.html
Step 4
Enter the following command; this will tell the adaptive security appliance where to find the ASDM image:
hostname(config)# asdm image disk0:/ asdm file
To downgrade from Version 7.2(3) to 7.1.(x), you must perform the following steps:
Step 1
Load the 7.1(x) image from the following website:
http://www.cisco.com/cisco/software/navigator.html
Step 2
Reload the device so that it uses the 7.1(x) image.
Step 3
Load the ASDM 5.1(x) image from the following website:
http://www.cisco.com/cisco/software/navigator.html
Step 4
Enter the following command; this will tell the adaptive security appliance where to find the ASDM image:
hostname(config)# asdm image disk0:/ asdm file
Supported Platforms and Feature Licenses
This software version supports the following platforms; see the associated tables for the feature support for each model:
•
ASA 5505, Table 2
•
ASA 5510, Table 3
•
ASA 5520, Table 4
•
ASA 5540, Table 5
•
ASA 5550, Table 6
Note
Items that are in italics are separate, optional licenses that you can replace the base license. You can mix and match licenses, for example, the 10 security context license plus the Strong Encryption license; or the 500 WebVPN license plus the GTP/GPRS license; or all four licenses together.
Table 2 ASA 5505 Adaptive Security Appliance License Features
ASA 5505 Base License Security PlusUsers, concurrent1
10
Optional Licenses:
10
Optional Licenses:
50
Unlimited
50
Unlimited
Security Contexts
No support
No support
VPN Sessions2
10 combined IPSec and WebVPN
25 combined IPSec and WebVPN
Max. IPSec Sessions
10
25
Max. WebVPN Sessions
2
Optional License: 10
2
Optional License: 10
VPN Load Balancing
No support
No support
Failover
None
Active/Standby (no stateful failover)
GTP/GPRS
No support
No support
Maximum VLANs/Zones
3 (2 regular zones and 1 restricted zone that can only communicate with 1 other zone)
20
Maximum VLAN Trunks
No support
Unlimited
Concurrent Firewall Conns3
10 K
25 K
Max. Physical Interfaces
Unlimited, assigned to VLANs/zones
Unlimited, assigned to VLANs/zones
Encryption
Base (DES)
Optional license:
Strong (3DES/AES)Base (DES)
Optional license:
Strong (3DES/AES)Minimum RAM
256 MB
256 MB
1 In routed mode, hosts on the inside (Business and Home VLANs) count towards the limit only when they communicate with the outside (Internet VLAN). Internet hosts are not counted towards the limit. Hosts that initiate traffic between Business and Home are also not counted towards the limit. The interface associated with the default route is considered to be the Internet interface. If there is no default route, hosts on all interfaces are counted toward the limit. In transparent mode, the interface with the lowest number of hosts is counted towards the host limit. See the show local-host command to view the host limits.
2 Although the maximum IPSec and WebVPN sessions add up to more than the maximum VPN sessions, the combined sessions should not exceed the VPN session limit. If you exceed the maximum VPN sessions, you can overload the adaptive security appliance, so be sure to size your network appropriately.
3 The concurrent firewall connections are based on a traffic mix of 80% TCP and 20% UDP, with one host and one dynamic translation for every four connections.
Table 3 ASA 5510 Adaptive Security Appliance License Features
ASA 5510 Base License Security PlusUsers, concurrent
Unlimited
Unlimited
Security Contexts
No support
2
Optional Licenses:
5
VPN Sessions1
250 combined IPSec and WebVPN
250 combined IPSec and WebVPN
Max. IPSec Sessions
250
250
Max. WebVPN Sessions
2
Optional Licenses:
2
Optional Licenses:
10
25
50
100
250
10
25
50
100
250
VPN Load Balancing
No support
No support
Failover
None
Active/Standby or Active/Active
GTP/GPRS
No support
No support
Max. VLANs
50
100
Concurrent Firewall Conns2
50 K
130 K
Max. Physical Interfaces
Unlimited
Unlimited
Encryption
Base (DES)
Optional license:
Strong (3DES/AES)Base (DES)
Optional license:
Strong (3DES/AES)Min. RAM
256 MB
256 MB
1 Although the maximum IPSec and WebVPN sessions add up to more than the maximum VPN sessions, the combined sessions should not exceed the VPN session limit. If you exceed the maximum VPN sessions, you can overload the adaptive security appliance, so be sure to size your network appropriately.
2 The concurrent firewall connections are based on a traffic mix of 80% TCP and 20% UDP, with 1 host and 1 dynamic translation for every 4 connections.
Table 4 ASA 5520 Adaptive Security Appliance License Features
ASA 5520 Base LicenseUsers, concurrent
Unlimited
Unlimited
Security Contexts
2
Optional Licenses:
5
10
20
VPN Sessions1
750 combined IPSec and WebVPN
Max. IPSec Sessions
750
Max. WebVPN Sessions
2
Optional Licenses:
10
25
50
100
250
500
750
VPN Load Balancing
Supported
Failover
Active/Standby or Active/Active
GTP/GPRS
None
Optional license: Enabled
Max. VLANs
150
Concurrent Firewall Conns2
280 K
Max. Physical Interfaces
Unlimited
Encryption
Base (DES)
Optional license: Strong (3DES/AES)
Min. RAM
512 MB
1 Although the maximum IPSec and WebVPN sessions add up to more than the maximum VPN sessions, the combined sessions should not exceed the VPN session limit. If you exceed the maximum VPN sessions, you can overload the adaptive security appliance, so be sure to size your network appropriately.
2 The concurrent firewall connections are based on a traffic mix of 80% TCP and 20% UDP, with 1 host and 1 dynamic translation for every 4 connections.
Table 5 ASA 5540 Adaptive Security Appliance License Features
ASA 5540 Base LicenseUsers, concurrent
Unlimited
Unlimited
Security Contexts
2
Optional licenses:
5
10
20
50
VPN Sessions1
5000 combined IPSec and WebVPN
Max. IPSec Sessions
5000
Max. WebVPN Sessions
2
Optional Licenses:
10
25
50
100
250
500
750
1000
2500
VPN Load Balancing
Supported
Failover
Active/Standby or Active/Active
GTP/GPRS
None
Optional license: Enabled
Max. VLANs
200
Concurrent Firewall Conns2
400 K
Max. Physical Interfaces
Unlimited
Encryption
Base (DES)
Optional license: Strong (3DES/AES)
Min. RAM
1 GB
1 Although the maximum IPSec and WebVPN sessions add up to more than the maximum VPN sessions, the combined sessions should not exceed the VPN session limit. If you exceed the maximum VPN sessions, you can overload the adaptive security appliance, so be sure to size your network appropriately.
2 The concurrent firewall connections are based on a traffic mix of 80% TCP and 20% UDP, with 1 host and 1 dynamic translation for every 4 connections.
Table 6 ASA 5550 Adaptive Security Appliance License Features
ASA 5550 Base LicenseUsers, concurrent
Unlimited
Security Contexts
2
Optional licenses:
5
10
20
50
VPN Sessions1
5000 combined IPSec and WebVPN
Max. IPSec Sessions
5000
Max. WebVPN Sessions
2
Optional Licenses:
10
25
50
100
250
500
750
1000
2500
5000
VPN Load Balancing
Supported
Failover
Active/Standby or Active/Active
GTP/GPRS
None
Optional license: Enabled
Max. VLANs
250
Concurrent Firewall Conns2
650 K
Max. Physical Interfaces
Unlimited
Encryption
Base (DES)
Optional license: Strong (3DES/AES)
Min. RAM
4 GB
1 Although the maximum IPSec and WebVPN sessions add up to more than the maximum VPN sessions, the combined sessions should not exceed the VPN session limit. If you exceed the maximum VPN sessions, you can overload the adaptive security appliance, so be sure to size your network appropriately.
2 The concurrent firewall connections are based on a traffic mix of 80% TCP and 20% UDP, with 1 host and 1 dynamic translation for every 4 connections.
New Features
This section lists the new features for Version 7.2(3). All new features are supported in ASDM 5.2(3).
ASA 5510 Security Plus License Allows Gigabit Ethernet for Port 0 and 1
The ASA 5510 adaptive security appliance now has the security plus license to enable GE (Gigabit Ethernet) for port 0 and 1. If you upgrade the license from base to security plus, the capacity of the external port Ethernet0/0 and Ethernet0/1 increases from the original FE (Fast Ethernet) (100 Mbps) to GE (1000 Mbps). The interface names will remain Ethernet 0/0 and Ethernet 0/1. Use the speed command to change the speed on the interface and use the show interface command to see what speed is currently configured for each interface
ASA 5505 Increased VLAN range
The ASA 5505 adaptive security appliance now supports VLAN IDs between 1 and 4090. Originally, only VLAN IDs between 1 and 1001 were supported.
Smart Card Removal Disconnect
This feature allows the central site administrator to configure remote client policy for deleting active tunnels when a Smart Card is removed. The Cisco VPN Remote Access Software clients (both IPSec and SSL) will, by default, tear down existing VPN tunnels when the user removes the Smart Card used for authentication. The following cli command disconnects existing VPN tunnels when a smart card is removed. This option is enabled by default.
smartcard-removal-disconnect {enable|disable}capture Command Enhancement
The enhancement to the capture command allows the user to capture traffic and display it in real time. It also allows the user to specify command line options to filter traffic without having to configure a separate access list. This enhancement adds the [real-time] and a five-tupple [match] options.
capture <cap_name> [[real-time] [dump] [detail [trace]] [match <prot> {host <ip> | <ip> <mask> | any} [eq | lt | gt <port>] {host <ip> | <ip> <mask> | any} [eq | lt | gt <port>]]Support for ESMTP over TLS
This enhancement adds the configuration parameter allow-tls [action log] in the esmtp policymap. By default, this parameter is not enabled. When it is enabled, ESMTP inspection would not mask the 250-STARTTLS echo reply from the server nor the STARTTLS command from the client. After the server replies with the 220 reply code, the ESMTP inspection turns off by itself— the ESMTP traffic on that session is no longer inspected. If the allow-tls action log parameter is configured, the system log message ASA-6-108007 is generated when TLS is started on an ESMTP session.
policy-map type inspect esmtp esmtp_map parameters allow-tls [action log]A new line for displaying counters associated with the allow-tls parameter is added to the show
service-policy inspect esmtp command. It is only present if allow-tls is configured in policy map. By default, this parameter is not enabled.
show service-policy inspect esmtpallow-tls, count 0, log 0This enhancement adds a new system log message for the allow-tls parameter. It indicates on an esmtp session the server has responded with a 220 reply code to the client STARTTLS command. The ESMTP inspection engine will no longer inspect the traffic on this connection.
System log Number and Format:
%ASA-6-108007: TLS started on ESMTP session between client <client-side interface-name>:<client IP address>/<client port> and server <server-side interface-name>:<server IP address>/<server port>
DHCP Client
The dhcp-client client-id interface <interface name> command forces a MAC address to be stored inside a DHCP request packet instead of the default internally generated unique string. This CLI allows the adaptive security appliance to obtain a DHCP address from the ISP with this special requirement.
WAAS and ASA Interoperability
The [no] inspect waas command is added to enable WAAS inspection in the policy-map class configuration mode. This CLI is integrated into Modular Policy Framework for maximum flexibility in configuring the feature. The [no] inspect waas command can be configured under a default inspection class and under a custom class-map. This inspection service is not enabled by default.
The keyword option waas is added to the show service-policy inspect command to display WAAS statistics.
show service-policy inspect waasA new system log message is generated when WAAS optimization is detected on a connection. All L7 inspection services including IPS are bypassed on WAAS optimized connections.
System Log Number and Format:
%ASA-6-428001: WAAS confirmed from in_interface:src_ip_addr/src_port to out_interface:dest_ip_addr/dest_port, inspection services bypassed on this connection.
A new connection flag "W" is added in the WAAS connection. The show conn detail command is updated to reflect the new flag.
ASDM Banner Enhancement
The adaptive security appliance Version 7.2(3) software supports an ASDM banner. If configured, when you start ASDM, this banner text will appear in a dialog box with the option to continue or disconnect. The Continue option dismisses the banner and completes login as usual whereas, the Disconnect option dismisses the banner and terminates the connection. This enhancement requires the customer to accept the terms of a written policy before connecting. Following is the new CLI associated with this enhancement:
banner {exec | login | motd | asdm} <text>no banner {exec | login | motd | asdm} [<text>]show banner [{exec | login | motd | asdm}]clear bannerWebVPN load Balancing
The adaptive security appliance now supports the use of FQDNs for load balancing. To perform WebVPN load balancing using FQDNs, you must enable the use of FQDNs for load balancing, enter the redirect-fqdn enable command. Then add an entry for each of your adaptive security appliance outside interfaces into your DNS server if not already present. Each adaptive security appliance outside IP address should have a DNS entry associated with it for lookups. These DNS entries must also be enabled for reverse lookup. Enable DNS lookups on your adaptive security appliance with the dns domain-lookup inside command (or whichever interface has a route to your DNS server). Finally, you must define the ip address, of your DNS server on the adaptive security appliance. Following is the new CLI associated with this enhancement:
[no] redirect-fqdn {enable | disable}default: disablecache Command Changes
There are two changes to the clientless SSL VPN caching commands:
The cache-compressed command is deprecated.
The new cache-static-content command configures the security appliance to cache all static content, which means all cacheable Web objects that are not subject to SSL VPN rewriting. This includes content such as images and PDF files.
The syntax of the command is (no) cache-static-content enable | disable. By default, static content caching is disabled.
Example:
hostname (config) # webvpnhostname (config-webvpn) # cachehostname (config-webvpn-cache) # cache-static-content enablehostname (config-webvpn-cache) #Important Notes
This section lists important notes.
sysopt uauth allow-http-cache Command
The sysopt uauth allow-http-cache command is deprecated as this command isn't needed for campatibility with current browsers.
Features not Supported
The PPTP feature is not supported.
Caveats
The following sections describe the caveats for the Version 7.2(3).
For your convenience in locating caveats in Cisco's Bug Toolkit, the caveat titles listed in this section are drawn directly from the Bug Toolkit database. These caveat titles are not intended to be read as complete sentences because the title field length is limited. In the caveat titles, some truncation of wording or punctuation may be necessary to provide the most complete and concise description. The only modifications made to these titles are as follows:
•
Commands are in boldface type.
•
Product names and acronyms may be standardized.
•
Spelling errors and typos may be corrected.
Note
If you are a registered cisco.com user, view Bug Toolkit on cisco.com at the following website:
http://tools.cisco.com/Support/BugToolKit/
To become a registered cisco.com user, go to the following website:
http://tools.cisco.com/RPF/register/register.do
Open Caveats - Version 7.2(3)
Table 7 lists open caveats for Version 7.2(3).
Resolved Caveats - Version 7.2(3)
Table 8 lists resolved caveats for Version 7.2(3).
Related Documentation
For additional information on the Cisco ASA 5500 series adaptive security appliances, see the following URL on Cisco.com:
http://www.cisco.com/en/US/docs/security/asa/roadmap/asaroadmap.html
Obtaining Documentation and Submitting a Service Request
For information on obtaining documentation, submitting a service request, and gathering additional information, see the monthly What's New in Cisco Product Documentation, which also lists all new and revised Cisco technical documentation, at:
http://www.cisco.com/en/US/docs/general/whatsnew/whatsnew.html
Subscribe to the What's New in Cisco Product Documentation as a Really Simple Syndication (RSS) feed and set content to be delivered directly to your desktop using a reader application. The RSS feeds are a free service and Cisco currently supports RSS Version 2.0.
This document is to be used in conjunction with the documents listed in the "Related Documentation" section.
Cisco and the Cisco Logo are trademarks of Cisco Systems, Inc. and/or its affiliates in the U.S. and other countries. A listing of Cisco's trademarks can be found at www.cisco.com/go/trademarks. Third party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (1005R)
Any Internet Protocol (IP) addresses used in this document are not intended to be actual addresses. Any examples, command display output, and figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses in illustrative content is unintentional and coincidental.
©2009 Cisco Systems, Inc. All rights reserved.