![]() |
Table Of Contents
Release Notes for Cisco ASDM, Version 6.5(x) for ASASM
ASDM Client Operating System and Browser Requirements
New Features in Version 6.5(1.101)/ASA 8.5(1.7)
New Features in Version 6.5(1)/ASA 8.5(1.6)
New Features in Version 6.5(1)/8.5(1)
Upgrading the Operating System and ASDM Images
Deteriming if an FPD Upgrade is Required
Upgrading the Cisco IOS and FPD Image
Upgrading the ASASM from the Supervisor 720 to the Supervisor 2T
Ignored and View-Only Commands
Effects of Unsupported Commands
Discontinuous Subnet Masks Not Supported
Interactive User Commands Not Supported by the ASDM CLI Tool
Open Caveats in Version 6.5(1.101)
Open Caveats in Version 6.5(1)
Resolved Caveats in Version 6.5(1.110)
Resolved Caveats in Version 6.5(1.101)
Obtaining Documentation and Submitting a Service Request
Release Notes for Cisco ASDM, Version 6.5(x) for ASASM
Released: July 7, 2011
Updated: June 28, 2013
This document contains release information for Cisco ASDM Version 6.5(x) for the ASA Services Module (ASASM).
This document includes the following sections:
•
ASDM Client Operating System and Browser Requirements
•
Resolved Caveats in Version 6.5(1.110)
•
Resolved Caveats in Version 6.5(1.101)
•
Obtaining Documentation and Submitting a Service Request
Important Notes
Maximum Configuration Size
ASDM supports a maximum configuration size of 512 KB. If you exceed this amount you may experience performance issues. For example, when you load the configuration, the status dialog shows the percentage of the configuration that is complete, yet with large configurations it stops incrementing and appears to suspend operation, even though ASDM might still be processing the configuration. If this situation occurs, we recommend that you consider increasing the ASDM system heap memory.
To increase the ASDM heap memory size, modify the launcher shortcut by performing the following procedure:
Step 1
Right-click the shortcut for the ASDM-IDM Launcher, and choose Properties.
Step 2
Choose the Shortcut tab.
Step 3
In the Target field, change the argument prefixed with "-Xmx" to specify your desired heap size. For example, change it to -Xmx768m for 768 MB or -Xmx1g for 1 GB. For more information about this parameter, see the Oracle document in the following location: http://docs.oracle.com/javase/1.5.0/docs/tooldocs/windows/java.html
ASDM Client Operating System and Browser Requirements
Table 1 lists the supported and recommended client operating systems and Java for ASDM.
Table 1 Operating System and Browser Requirements
Operating System Browser Sun Java SE Plug-in1 Internet Explorer Firefox2 SafariMicrosoft Windows (English and Japanese):
•
7
•
Vista
•
2008 Server
•
XP
6.0 or later2
1.5 or later
No support
6.0
Apple Macintosh OS X:
•
10.73
•
10.6
•
10.5
•
10.4
No support
1.5 or later
2.0 or later
6.0
Red Hat Enterprise Linux 5 (GNOME or KDE):
•
Desktop
•
Desktop with Workstation
N/A
1.5 or later
N/A
6.0
1 Support for Java 5.0 was removed in ASDM 6.4. Obtain Sun Java updates from java.sun.com.
2 ASDM requires an SSL connection from the browser to the ASASM. By default, Internet Explorer on Windows Vista and later and Firefox on all operating systems do not support base encryption (DES) for SSL, and therefore require the ASASM to have a strong encryption (3DES/AES) license. For Windows Internet Explorer, you can enable DES as a workaround. See http://support.microsoft.com/kb/929708 for details. For Firefox on any operating system, you can enable the security.ssl3.dhe_dss_des_sha setting as a workaround. See http://kb.mozillazine.org/About:config to learn how to change hidden configuration preferences.
3 6.4(7) and later. You may be prompted to install Java the first time you run ASDM; follow the prompts as necessary. ASDM will launch after the installation completes.
New Features
•
New Features in Version 6.5(1.101)/ASA 8.5(1.7)
•
New Features in Version 6.5(1)/ASA 8.5(1.6)
•
New Features in Version 6.5(1)/8.5(1)
New Features in Version 6.5(1.101)/ASA 8.5(1.7)
Released: March 5, 2012Table 2 lists the new features for ASA interim Version 8.5(1.7)/ASDM Version 6.5(1.101).
Note
We recommend that you upgrade to a Cisco.com-posted ASA interim release only if you have a specific problem that it resolves. If you decide to run an interim release in a production environment, keep in mind that only targeted testing is performed on interim releases. Interim releases are fully supported by Cisco TAC and will usually remain on the download site only until the next maintenance release is available. If you choose to run an interim release, we strongly encourage you to upgrade to a fully-tested maintenance or feature release when it becomes available.
We will document interim release features at the time of the next maintenance or feature release. For a list of resolved caveats for each ASA interim release, see the interim release notes available on the Cisco.com software download site.
Table 2 New Features for ASA Interim Version 8.5(1.7)/ASDM Version 6.5(1.101)
Feature Description Hardware FeaturesSupport for the Catalyst 6500 Supervisor 2T
The ASASM now interoperates with the Catalyst 6500 Supervisor 2T. For hardware and software compatibility, see: http://www.cisco.com/en/US/docs/security/asa/compatibility/asamatrx.html.
Note
You may have to upgrade the FPD image on the ASASM. See the Upgrading procedure the in the release notes.
Multiple Context FeaturesASDM support for Automatic generation of a MAC address prefix
ASDM now shows that an autogenerated prefix will be used if you do not specify one.
We modified the following screen: Configuration > Context Management > Security Contexts
Failover FeaturesConfigure the connection replication rate during a bulk sync
You can now configure the rate at which the ASASM replicates connections to the standby unit when using stateful failover. By default, connections are replicated to the standby unit during a 15 second period. However, when a bulk sync occurs (for example, when you first enable failover), 15 seconds may not be long enough to sync large numbers of connections due to a limit on the maximum connections per second. For example, the maximum connections on the ASASM is 8 million; replicating 8 million connections in 15 seconds means creating 533K connections per second. However, the maximum connections allowed per second is 300K. You can now specify the rate of replication to be less than or equal to the maximum connections per second, and the sync period will be adjusted until all the connections are synced.
We modified the following screen: Configuration > Device Management > High Availability > Failover.
New Features in Version 6.5(1)/ASA 8.5(1.6)
Released: January 27, 2012Table 2 lists the new features for ASA interim Version 8.5(1.6)/ASDM Version 6.5(1).
Note
We recommend that you upgrade to a Cisco.com-posted ASA interim release only if you have a specific problem that it resolves. If you decide to run an interim release in a production environment, keep in mind that only targeted testing is performed on interim releases. Interim releases are fully supported by Cisco TAC and will usually remain on the download site only until the next maintenance release is available. If you choose to run an interim release, we strongly encourage you to upgrade to a fully-tested maintenance or feature release when it becomes available.
We will document interim release features at the time of the next maintenance or feature release. For a list of resolved caveats for each ASA interim release, see the interim release notes available on the Cisco.com software download site.
New Features in Version 6.5(1)/8.5(1)
Released: July 8, 2011Table 4 lists the new features for ASA Version 8.5(1)/ASDM Version 6.5(1). This ASA and ASDM software version is only supported on the ASASM.
Note
Version 8.5(1) includes all features in 8.4(1), plus the features listed in this table. The following features, however, are not supported in No Payload Encryption software, and this release is only available as a No Payload Encryption release:
•
VPN
•
Unified Communications
Features added in 8.4(2) are not included in 8.5(1) unless they are explicitly listed in this table.
Upgrading the Software
Note
For users migrating from the FWSM, see Migrating to the Cisco ASA Services Module from the FWSM.
This section describes how to upgrade to the latest version of the ASA image or the Field-Programmable Device (FPD) image and includes the following topics:
•
Upgrading the ASASM from the Supervisor 720 to the Supervisor 2T
Note
For CLI procedures, see the ASA release notes.
Upgrading the ASA Image
•
Upgrading the Operating System and ASDM Images
Viewing Your Current Version
The software version appears on the ASDM home page; view the home page to verify the software version of your ASASM.
Upgrading the Operating System and ASDM Images
This section describes how to install the ASDM and operating system (OS) images.
We recommend that you upgrade the ASDM image before the OS image. ASDM is backward compatible, so you can upgrade the OS using the new ASDM; however you cannot use an old ASDM image with a new OS.
Detailed Steps
Step 1
Back up your existing configuration. For example, choose File > Show Running Configuration in New Window to open the configuration as an HTML page. You can also use one of the File > Save Running Configuration options.
Step 2
Choose Tools > Check for ASA/ASDM Updates.
In multiple context mode, access this menu from the System.
The Cisco.com Authentication dialog box appears.
Step 3
Enter your assigned Cisco.com username and the Cisco.com password, and then click Login.
The Cisco.com Upgrade Wizard appears.
Step 4
Complete the upgrade wizard.
Step 5
For the upgrade versions to take effect, check the Save configuration and reload device now check box to restart the ASASM and restart ASDM.
Step 6
Click Finish to exit the wizard and save the configuration changes that you made.
Upgrading the FPD Image
The ASASM includes a separate FPD image that you can upgrade using Cisco IOS software on the switch.
•
Deteriming if an FPD Upgrade is Required
•
Upgrading the Cisco IOS and FPD Image
Deteriming if an FPD Upgrade is Required
Determine if an FPD upgrade is required using the show hw-module all fpd IOS command on the switch.
If the ASASM has the minimum required version, no further action is necessary. If an FPD image package needs an upgrade, proceed to the next step.
The following sample output indicates that the ASASM does not meet the minimum version requirements.
Router# show hw-module all fpd==== ====================== ====== =============================================H/W Field Programmable Current Min. RequiredSlot Card Type Ver. Device: "ID-Name" Version Version==== ====================== ====== ================== =========== ==============1 WS-SVC-ASA-SM1 1.0 1-TRISUL FPGA 1.8 1.10==== ====================== ====== =============================================Upgrading the Cisco IOS and FPD Image
If you need to upgrade the Cisco IOS image, you can also load a new FPD image on local flash memory (disk0: or bootdisk:) to automatically install the FPD on the ASASM when you reload the switch.
Detailed Steps
Step 1
Verify that the FPD automatic upgrade feature is enabled by examining the output of the show running-config IOS command on the switch.
Look for the "upgrade fpd auto" line in the output. If there are no upgrade commands in the output, upgrade fpd auto is enabled because it is the default setting. If automatic upgrades are disabled, use the upgrade fpd auto command to enable automatic FPD upgrades.
Step 2
If you have a Cisco.com login, you can obtain the FPD image from the following website:
Step 3
Download the FPD image package to local flash memory on the switch.
See the switch documentation for more information about downloading files to flash memory.
Note
Do not change any FPD-related settings on your system. If the default settings for the upgrade fpd path command have been changed, change the settings back to their default settings using the no form of this command.
Step 4
Obtain the Cisco IOS image from the following website:
See the switch documentation for information about loading the new IOS image.
Step 5
Reload the switch using the new IOS image.
When Cisco IOS boots, it searches for the FPD image package in flash. The switch updates the FPD images automatically as part of the Cisco IOS boot process.
Upgrading the FPD Image Only
If you do not need to upgrade the Cisco IOS image, you can upgrade the FPD image separately.
Restrictions
The FPD image must be in local flash memory. Remote upgrading from FTP or TFTP is not supported.
Detailed Steps
Step 1
If you have a Cisco.com login, you can obtain the FPD image from the following website:
Step 2
Download the FPD image package to the switch flash memory. We recommend the local flash disk (disk0: or bootdisk:).
See the switch documentation for more information about downloading files to flash memory.
Step 3
Verify the contents of the FPD image package using the following command:
Router# show upgrade fpd file file-urlThe file-url argument is the location and name of the FPD image package file. For example, the following command successfully verifies the image (see the TRIFECTA card type for the ASASM):
Router# show upgrade fpd file disk0:c6500-fpd-pkg.1.10.pkgCisco Field Programmable Device Image Package for IOSC6500 Family FPD Image Package (c6500-fpd-pkg.1.10.pkg), Version 15.0(0)SY99.41Copyright (c) 2004-2012 by cisco Systems, Inc.Built Thu 12-Jan-2012 14:46 by integ=============================== ================================================Bundled FPD Image Version Matrix================================================Min. Req.Supported Card Types ID Image Name Version H/W Ver.=============================== == ========================= ========= =========2-port T3/E3 Serial SPA 1 T3E3 SPA ROMMON 2.12 0.02 T3E3 SPA I/O FPGA 0.24 0.03 T3E3 SPA E3 FPGA 1.4 0.04 T3E3 SPA T3 FPGA 1.4 0.0------------------------------- -- ------------------------- --------- ---------4-port T3/E3 Serial SPA 1 T3E3 SPA ROMMON 2.12 0.02 T3E3 SPA I/O FPGA 0.24 0.03 T3E3 SPA E3 FPGA 1.4 0.04 T3E3 SPA T3 FPGA 1.4 0.0...------------------------------- -- ------------------------- --------- ---------TRIFECTA 1 Trifecta DPFPGA 1.10 0.0=============================== ================================================Step 4
Upgrade the FPD using the following command:
Router# upgrade hw-module slot slot-number fpd file file-url
The slot-number argument indicates the chassis slot location of the ASASM. The file-url argument is the location and name of the FPD image package file. For example, to upgrade the ASASM in slot 2, enter the following command:
Router# upgrade hw-module slot 2 fpd file disk0:c6500-fpd-pkg.1.10.pkg% The following FPD will be upgraded for WS-SVC-ASA-SM1 (H/W ver = 1.0) in slot 2:================== =========== =========== ============Field Programmable Current Upgrade EstimatedDevice: "ID-Name" Version Version Upgrade Time================== =========== =========== ============1-TRISUL FPGA 1.8 1.10 00:06:30================== =========== =========== ============% NOTES:- Use 'show upgrade fpd progress' command to view the progress of the FPDupgrade.- Since the target card is currently in disabled state, it will beautomatically reloaded after the upgrade operation for the changes totake effect.WARNING: The target card will be reloaded in order to start FPD imageupgrade. This action will interrupt normal operation of the card.If necessary, ensure that appropriate actions have been taken toredirect card traffic before starting the upgrade operation.% Are you sure that you want to perform this operation? [no]: yes% Reloading the target card for FPD image upgrade ... Done!% Upgrade operation will start in the background once the target card getsinitialized after the reload operation. Please wait ...(Use "show upgrade fpd progress" command to see upgrade progress)Step 5
Verify that the FPD upgrade is complete using the following command:
Router# show upgrade fpd progress
The following example shows that the FPD upgrade is updating:
Router# show upgrade fpd progressFPD Image Upgrade Progress Table:==== =================== ====================================================Approx.Field Programmable Time ElapsedSlot Card Type Device : "ID-Name" Needed Time State==== =================== ================== ========== ========== ===========2 WS-SVC-ASA-SM1 1-TRISUL FPGA 00:06:30 00:00:24 Updating...==== =================== ====================================================The following example shows that the FPD upgrade is complete, because the upgrade is no longer in progress:
Router# show upgrade fpd progress% There is no FPD image upgrade in progress.Step 6
Verify that the FPD upgrade was successful using the following command:
Router# show hw-module all fpd
Upgrading the ASASM from the Supervisor 720 to the Supervisor 2T
To upgrade the ASASM from the Supervisor 720 to the Supervisor 2T, perform the following steps:
Step 1
Upgrade the ASASM with the Supervisor 2T image while the Supervisor 720 image is still loaded on the Catalyst 65000 Series E Switch.
Note
If you replace the supervisor card on the Catalyst 65000 Series E Switch before you upgrade the ASASM, then the interfaces on the ASASM will not be recognized, and you will not be able to load a new image.
Step 2
Change the supervisor card from the Supervisor 720 to the Supervisor 2T on the Catalyst 65000 Series E Switch.
Step 3
Upgrade the Catalyst 65000 Series E Switch with the Supervisor 2T image.
Unsupported Commands
ASDM supports almost all commands available for the adaptive ASASM, but ASDM ignores some commands in an existing configuration. Most of these commands can remain in your configuration; see Tools > Show Commands Ignored by ASDM on Device for more information.
This section includes the following topics:
•
Ignored and View-Only Commands
•
Effects of Unsupported Commands
•
Discontinuous Subnet Masks Not Supported
•
Interactive User Commands Not Supported by the ASDM CLI Tool
Ignored and View-Only Commands
Table 5 lists commands that ASDM supports in the configuration when added through the CLI, but that cannot be added or edited in ASDM. If ASDM ignores the command, it does not appear in the ASDM GUI at all. If the command is view-only, then it appears in the GUI, but you cannot edit it.
Effects of Unsupported Commands
If ASDM loads an existing running configuration and finds other unsupported commands, ASDM operation is unaffected. To view the unsupported commands, choose Tools > Show Commands Ignored by ASDM on Device.
Discontinuous Subnet Masks Not Supported
ASDM does not support discontinuous subnet masks such as 255.255.0.255. For example, you cannot use the following:
ip address inside 192.168.2.1 255.255.0.255Interactive User Commands Not Supported by the ASDM CLI Tool
The ASDM CLI tool does not support interactive user commands. If you enter a CLI command that requires interactive confirmation, ASDM prompts you to enter "[yes/no]" but does not recognize your input. ASDM then times out waiting for your response.
For example:
1.
Choose Tools > Command Line Interface.
2.
Enter the crypto key generate rsa command.
ASDM generates the default 1024-bit RSA key.
3.
Enter the crypto key generate rsa command again.
Instead of regenerating the RSA keys by overwriting the previous one, ASDM displays the following error:
Do you really want to replace them? [yes/no]:WARNING: You already have RSA ke0000000000000$A keyInput line must be less than 16 characters in length.%Please answer 'yes' or 'no'.Do you really want to replace them [yes/no]:%ERROR: Timed out waiting for a response.ERROR: Failed to create new RSA keys names <Default-RSA-key>Workaround:
•
You can configure most commands that require user interaction by means of the ASDM panes.
•
For CLI commands that have a noconfirm option, use this option when entering the CLI command. For example:
crypto key generate rsa noconfirmOpen Caveats
•
Open Caveats in Version 6.5(1.101)
•
Open Caveats in Version 6.5(1)
Open Caveats in Version 6.5(1.101)
Table 6 contains open caveats in ASDM software Version 6.5(1.101).
Registered Cisco.com users can view more information about each caveat by using the Bug Toolkit at the following website:
http://tools.cisco.com/Support/BugToolkit/
Open Caveats in Version 6.5(1)
Table 7 contains open caveats in ASDM software Version 6.5(1).
Registered Cisco.com users can view more information about each caveat by using the Bug Toolkit at the following website:
http://tools.cisco.com/Support/BugToolkit/
Table 7 Open Caveats in ASDM Version 6.5(1)
Caveat DescriptionCSCto34624
Refreshing ASDM connection table causes Monitoring tab to freeze
CSCto69856
IPv6: Changes to the IPv6 inspect map
Resolved Caveats in Version 6.5(1.110)
Table 8 contains the resolved caveats in ASDM software Version 6.5(1.110).
Registered Cisco.com users can view more information about each caveat by using the Bug Toolkit at the following website:
http://tools.cisco.com/Support/BugToolkit/
Resolved Caveats in Version 6.5(1.101)
Table 9 contains the resolved caveats in ASDM software Version 6.5(1.101).
Registered Cisco.com users can view more information about each caveat by using the Bug Toolkit at the following website:
http://tools.cisco.com/Support/BugToolkit/
End-User License Agreement
For information on the end-user license agreement, go to:
http://www.cisco.com/en/US/docs/general/warranty/English/EU1KEN_.html
Related Documentation
For additional information about ASDM or its platforms, see Navigating the Cisco ASA Documentation:
http://www.cisco.com/en/US/docs/security/asa/roadmap/asaroadmap.html
Obtaining Documentation and Submitting a Service Request
For information on obtaining documentation, submitting a service request, and gathering additional information, see What's New in Cisco Product Documentation at: http://www.cisco.com/en/US/docs/general/whatsnew/whatsnew.html.
Subscribe to What's New in Cisco Product Documentation, which lists all new and revised Cisco technical documentation, as an RSS feed and deliver content directly to your desktop using a reader application. The RSS feeds are a free service.
This document is to be used in conjunction with the documents listed in the "Related Documentation" section.
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL: www.cisco.com/go/trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (1110R)
Any Internet Protocol (IP) addresses used in this document are not intended to be actual addresses. Any examples, command display output, and figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses in illustrative content is unintentional and coincidental.
©2011-2013 Cisco Systems, Inc. All rights reserved