![]() |
Table Of Contents
Cisco ASDM Release Notes Version 6.1(5)
ASDM Client Operating System and Browser Requirements
Upgrading the Security Appliance
Ignored and View-Only Commands
Effects of Unsupported Commands
Discontinuous Subnet Masks Not Supported
Interactive User Commands Not Supported by the ASDM CLI Tool
Resolved Caveats—Version 6.1(5)
Obtaining Documentation and Submitting a Service Request
Cisco ASDM Release Notes Version 6.1(5)
October 2008
This document contains release information for Cisco ASDM Version 6.1(5) on Cisco ASA 5500 series and Cisco PIX 500 series security appliances. It includes the following sections:
•
ASDM Client Operating System and Browser Requirements
•
Upgrading the Security Appliance
•
Obtaining Documentation and Submitting a Service Request
ASDM Client Operating System and Browser Requirements
Table 1 lists the supported and recommended client operating systems and Java for ASDM.
Table 1 Operating System and Browser Requirements
Operating System Version Browser Other RequirementsMicrosoft Windows
Windows Vista
Windows 2003 Server
Windows XP
Windows 2000 (Service Pack 4)
Internet Explorer 6.0 or 7.0 with Sun Java SE1 Plug-in 1.4.2, 5.0 (1.5.0), or 6.0
Firefox 1.5 or 2.0 with Java SE Plug-in 1.4.2, 5.0 (1.5.0), or 6.0
SSL Encryption Settings—All available encryption options are enabled for SSL in the browser preferences.
Note
ASDM supports both the English and Japanese versions of Windows.
Note
HTTP 1.1—Settings for Internet Options > Advanced > HTTP 1.1 should use HTTP 1.1 for both proxy and non-proxy connections.
Apple Macintosh
Apple Macintosh OS X
Firefox 1.5 or 2.0 or Safari 2.0 with Java SE Plug-in 1.4.2, 5.0 (1.5.0), or 6.02
Linux
Red Hat Desktop, Red Hat Enterprise Linux WS version 4 running GNOME or KDE
Firefox 1.5 or 2.0 with Java SE Plug-in 1.4.2, 5.0 (1.5.0), or 6.0
1 Obtain Sun Java from java.sun.com.
2 With Apple Macintosh, only 32-bit Java SE will be supported. Currently, this also excludes Java 6. The 32-bit Java can run on a 64-bit Mac OS.
Note
After upgrading ASDM, in order to restore normal memory usage on a Mac, existing ASDM desktop applications must be deleted and a new ASDM desktop application installed in its place. The following instructions avoid CSCsu31299.
On the Mac, go to Applications > Utilities > Java > Java Preferences. From the Java Preferences dialog select View. The Java Cache Viewer dialog appears. Select Applications from the Show pull-down menu. Select the ASDM on ip_addr row in the table that you want to delete, and select the `X' to remove the selected item, and click OK.
Next, from the Java Preferences dialog select Settings. Then select Delete Files. Choose all options from this pop-up dialog and click on Delete. On the Temporary Files Setting dialog, click OK.
Go to the Java Preferences menu and select Quit Java Preferences. If the deleted desktop IP address application still appears on the desktop, drag and drop the application into the trash. Launch ASDM from a web browser, either Safari or Firefox, and, if desired, install a new ASDM desktop application when prompted.
CautionIf you launch ASDM version 5.0 or later using Java 6 Update 10 or later, the message "ASDM cannot be loaded. Click OK to exit ASDM. Unconnected sockets not implemented" appears.
To get ASDM to load correctly with Java 6 Update 10, update ASDM to ASDM 6.1(5)51. For more information about this issue (CSCsv12681) and obtaining the software, see the Release Notes at: http://download-sj.cisco.com/cisco/crypto/3DES/ciscosecure/asa/interim/asdm-61551-release_notes.html.
Two other issues (CSCsu00498 and CSCsu79785) are also resolved by this build.
Table 2 lists the supported and recommended client operating systems and Java for ASDM.
Table 2 Operating System and Browser Requirements
Operating System Browser Sun Java SE Plug-in1 Internet Explorer Firefox2 SafariMicrosoft Windows (English and Japanese):
•
7
•
Vista
•
2008 Server
•
XP
6.0 or later
1.5 or later
No support
6.0
Apple Macintosh OS X:
•
10.6
•
10.5
•
10.4
No support
1.5 or later
2.0 or later
6.0
Red Hat Enterprise Linux 5 (GNOME or KDE):
•
Desktop
•
Desktop with Workstation
N/A
1.5 or later
N/A
6.0
1 Support for Java 5.0 was removed in ASDM 6.4. Obtain Sun Java updates from java.sun.com.
2 ASDM requires an SSL connection from the browser to the security appliance. By default, Firefox does not support base encryption (DES) for SSL and therefore requires the security appliance to have a strong encryption (3DES/AES) license. As a workaround, you can enable the security.ssl3.dhe_dss_des_sha setting in Firefox. See http://kb.mozillazine.org/About:config to learn how to change hidden configuration preferences.
ASDM Compatibility
Table 3 lists information about ASDM, module, and VPN compatibility with the ASA 5500 series.
Table 3 ASDM, SSM, SSC, and VPN Compatibility
Application DescriptionASDM
ASA 5580 Version 8.1(2) requires ASDM Version 6.1(5) or later.
For information about ASDM requirements for other releases, see Cisco ASA Compatibility:
http://www.cisco.com/en/US/docs/security/asa/compatibility/asamatrx.html
VPN
For the latest OS and browser test results, see the Supported VPN Platforms, Cisco ASA 5500 Series:
http://www.cisco.com/en/US/docs/security/asa/compatibility/asa-vpn-compatibility.html
Module applications
For information about module application requirements, see Cisco ASA Compatibility:
http://www.cisco.com/en/US/docs/security/asa/compatibility/asamatrx.html
New Features
Released: October 10, 2008Table 4 lists the new features for ASA Version 8.1(2)/ASDM Version 6.1(5). This ASA software version is only supported on the ASA 5580.
Upgrading the Security Appliance
This section describes how to upgrade the security appliance to a new ASDM release. If you have a Cisco.com login, you can obtain ASDM from the following website:
http://www.cisco.com/cisco/software/navigator.html
Note
If you are upgrading from PIX Version 6.3, first upgrade to Version 7.0 according to the Guide for Cisco PIX 6.2 and 6.3 Users Upgrading to Cisco PIX Software Version 7.0. Then upgrade PDM to ASDM according to the ASDM 5.0 release notes.
If you have a previous release of ASDM on your security appliance and want to upgrade to the latest release, you can do so from within ASDM. We recommend that you upgrade the ASDM image before the platform image. ASDM is backward compatible, so you can upgrade the platform image using the new ASDM; you cannot use an old ASDM with a new platform image.
To upgrade ASDM, perform the following steps:
Step 1
Download the new ASDM image to your PC.
Optionally, you can download a new platform image to your PC if the installed image is earlier than 8.0.
Step 2
Launch ASDM.
Step 3
From the Tools menu:
a.
In ASDM 5.0 and 5.1, choose Tools > Upload Image from Local PC.
b.
In ASDM 5.2, choose Tools > Upgrade Software.
c.
In ASDM 6.0, choose Tools > Upload Software from Local Computer.
Step 4
With ASDM selected, click Browse Local to select the new ASDM image.
Step 5
To specify the location in Flash memory where you want to install the new image, enter the directory path in the field or click Browse Flash.
If your security appliance does not have enough memory to hold two ASDM images, overwrite the old image with the new one by specifying the same destination filename. You can rename the image after it was uploaded using the Tools > File Management tool.
If you have enough memory for both versions, you can specify a different name for the new version. If you need to revert to the old version, it is still in your Flash memory.
Step 6
Click Upload Image.
When ASDM is finished uploading, the following message appears:
"ASDM Image is Uploaded to Flash Successfully."
Step 7
For Version 5.x only: If the new ASDM image has a different name than the old image, then you must configure the security appliance to load the new image. Use the Configuration > Properties > Device Administration > Boot System/Configuration pane.
Step 8
If installing a new platform image, download the new platform image using the Tools > Upgrade Software tool with ASA or PIX selected.
If your security appliance does not have enough memory to hold two ASDM images, overwrite the old image with the new one by specifying the same destination filename. You can rename the image after it was uploaded using the Tools > File Management tool.
Step 9
If installing a new image, select ASA as the new image, and reload the security appliance using the
Tools > System Reload tool.Make sure to choose "Save the running configuration at time of reload".
Step 10
To run the new ASDM image, exit ASDM and reconnect.
Unsupported Commands
ASDM supports almost all commands available for the adaptive security appliance, but ASDM ignores some commands in an existing configuration. Most of these commands can remain in your configuration; see Tools > Show Commands Ignored by ASDM on Device for more information.
This section includes the following topics:
•
Ignored and View-Only Commands
•
Effects of Unsupported Commands
•
Discontinuous Subnet Masks Not Supported
•
Interactive User Commands Not Supported by the ASDM CLI Tool
Ignored and View-Only Commands
Table 5 lists commands that ASDM supports in the configuration when added through the CLI, but that cannot be added or edited in ASDM. If ASDM ignores the command, it does not appear in the ASDM GUI at all. If the command is view-only, then it appears in the GUI, but you cannot edit it.
Effects of Unsupported Commands
•
If ASDM loads an existing running configuration and finds IPv6-related commands, ASDM displays a dialog box informing you that it does not support IPv6. You cannot configure any IPv6 commands in ASDM, but all other configuration is available.
•
If ASDM loads an existing running configuration and finds other unsupported commands, ASDM operation is unaffected. To view the unsupported commands, choose Tools > Show Commands Ignored by ASDM on Device.
•
If ASDM loads an existing running configuration and finds the alias command, it enters Monitor-only mode.
Monitor-only mode allows access to the following functions:
–
The Monitoring area
–
The CLI tool (Tools > Command Line Interface), which lets you use the CLI commands
To exit Monitor-only mode, use the CLI tool or access the security appliance console, and remove the alias command. You can use outside NAT instead of the alias command. See the Cisco Security Appliance Command Reference for more information.
Note
You might also be in Monitor-only mode because your user account privilege level, indicated in the status bar at the bottom of the main ASDM window, was set up as less than or equal to three by your system administrator, which allows Monitor-only mode. For more information, choose Configuration > Device Management > Users/AAA > User Accounts and
Configuration > Device Management > Users/AAA > AAA Access.
Discontinuous Subnet Masks Not Supported
ASDM does not support discontinuous subnet masks such as 255.255.0.255. For example, you cannot use the following:
ip address inside 192.168.2.1 255.255.0.255Interactive User Commands Not Supported by the ASDM CLI Tool
The ASDM CLI tool does not support interactive user commands. If you enter a CLI command that requires interactive confirmation, ASDM prompts you to enter "[yes/no]" but does not recognize your input. ASDM then times out waiting for your response.
For example:
1.
From the ASDM Tools menu, click Command Line Interface.
2.
Enter the crypto key generate rsa command.
ASDM generates the default 1024-bit RSA key.
3.
Enter the crypto key generate rsa command again.
Instead of regenerating the RSA keys by overwriting the previous one, ASDM displays the following error:
Do you really want to replace them? [yes/no]:WARNING: You already have RSA ke0000000000000$A keyInput line must be less than 16 characters in length.%Please answer 'yes' or 'no'.Do you really want to replace them [yes/no]:%ERROR: Timed out waiting for a response.ERROR: Failed to create new RSA keys names <Default-RSA-key>Workaround:
•
You can configure most commands that require user interaction by means of the ASDM panes.
•
For CLI commands that have a noconfirm option, use this option when entering the CLI command. For example:
crypto key generate rsa noconfirmCaveats
The following sections describe the open and resolved caveats for Version 6.1(5).
•
Resolved Caveats—Version 6.1(5)
Note
If you are a registered cisco.com user, view Bug Toolkit on cisco.com at the following website:
http://tools.cisco.com/Support/BugToolKit/
To become a registered cisco.com user, go to the following website:
http://tools.cisco.com/RPF/register/register.do
Open Caveats—Version 6.1(5)
Table 6 lists the open caveats for Version 6.1(5).
Resolved Caveats—Version 6.1(5)
Table 7 lists the resolved caveats for Version 6.1(5).
End-User License Agreement
For information on the end-user license agreement, go to:
http://www.cisco.com/en/US/docs/general/warranty/English/EU1KEN_.html
Related Documentation
For additional information on ASDM or its platforms, see Navigating the Cisco ASA 5500 Series Documentation:
http://www.cisco.com/en/US/docs/security/asa/roadmap/asaroadmap.html
Obtaining Documentation and Submitting a Service Request
For information on obtaining documentation, submitting a service request, and gathering additional information, see the monthly What's New in Cisco Product Documentation, which also lists all new and revised Cisco technical documentation, at:
http://www.cisco.com/en/US/docs/general/whatsnew/whatsnew.html
Subscribe to the What's New in Cisco Product Documentation as a Really Simple Syndication (RSS) feed and set content to be delivered directly to your desktop using a reader application. The RSS feeds are a free service and Cisco currently supports RSS Version 2.0.
Cisco and the Cisco Logo are trademarks of Cisco Systems, Inc. and/or its affiliates in the U.S. and other countries. A listing of Cisco's trademarks can be found at www.cisco.com/go/trademarks. Third party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (1005R)