![]() |
Table Of Contents
Cisco Content Security and Control Version 6.1.1569.0 Patch Release Notes
About the CSC 6.1.1569.0 Patch
Installing the CSC SSM 6.1.1569.0 Patch
Verifying the Installed Version of the CSC SSM Software
Obtaining Documentation and Submitting a Service Request
Cisco Content Security and Control Version 6.1.1569.0 Patch Release Notes
November 2006
Contents
This document contains release information for the Cisco Content Security and Control (CSC) Version 6.1.1569.0 patch release. It includes the following sections:
•
About the CSC 6.1.1569.0 Patch
•
Installing the CSC SSM 6.1.1569.0 Patch
•
Verifying the Installed Version of the CSC SSM Software
•
Obtaining Documentation and Submitting a Service Request
About the CSC 6.1.1569.0 Patch
The CSC Version 6.1.1569.0 patch contains the following new features:
•
Password reset, which allows you to reset the default CSC SSM password to "cisco."
•
A single password is required to access the CSC SSM GUI and CLI. For more information, see the Cisco Content Security and Control SSM Administrator Guide.
•
Version numbering has been changed to reflect the software version number, build number, and patch release number. The format is as follows:
major software version.minor software version.build number.patch release number
•
License renewal is available through the Cisco website.
•
The TCP window size has been adjusted.
•
The URL Reclassification Request has been changed to a web-based submission.
•
Workaround to CSCsd17818: Use the adaptive security appliance Modular Policy Framework to bypass CSC SSM scanning of website IP addresses.
See the "Resolved Caveats" section for information about the caveats that have been resolved by this patch.
Installing the CSC SSM 6.1.1569.0 Patch
Install this patch only if you are running CSC SSM version 6.1-b1519 and version 6.1, patch 1. To verify the version of the CSC SSM installed on the device, see the "Verifying the Installed Version of the CSC SSM Software" section.
To upgrade the CSC SSM, perform the following steps:
Step 1
Download the csc-p-6.1.1569.0.pkg file from the Software Center on Cisco.com. You need to log into Cisco.com to download the software. If you do not have a Cisco.com account, visit the following website to become a registered user:
http://tools.cisco.com/RPF/register/register.do
Step 2
Access the Trend Micro CSC SSM console by doing the following:
a.
Launch ASDM.
b.
Choose Configuration > Trend Micro Content Security.
Step 3
Choose Administrator > Product Upgrade from the menu.
Step 4
Click Browse and select the .pkg file you downloaded.
Step 5
Click Install.
Step 6
Click Summary to confirm the installed software version.
Step 7
Optional) Use an Eicar test file to confirm that the upgrade was successful and that the scanning services have been configured correctly.
For more information, see Appendix A, "Reimaging and Configuring the CSC SSM Using the CLI," in the Cisco Content Security and Control SSM Administrator Guide.
Verifying the Installed Version of the CSC SSM Software
You can confirm the version of the CSC SSM software, and software components and patches from the ASA 5500 series adaptive security appliance CLI.
Note
The software version also appears on the main page of the Trend Micro InterScan for Cisco CSC SSM interface.
To view the version of software installed on the CSC SSM using the CLI, perform the following steps:
Step 1
Use the session command to access the CSC SSM. Use cisco as the login name.
hostname(config)# session 1Opening command session with slot 1.Connected to slot 1. Escape character sequence is 'CTRL-^X'.login: ciscoPassword:Trend Micro InterScan for Cisco CSC SSM Setup Main Menu---------------------------------------------------------------------1. Network Settings2. Date/Time Settings3. Product Information4. Service Status5. Change Password for Command Line Interface6. Restore Factory Default Settings7. Troubleshooting Tools8. Reset Management Port Access Control List9. Ping10. Exit ...Step 2
Type 3 and press Enter to access the Product Information screen.
The Product Information screen displays the version and build number of each component of the CSC SSM. Installed patches appear below the component list.
Enter a number from [1-10]: 3Product Information---------------------------------------------------------------------Main version 6.1 build 1519Mail component version 5.5 build 1118Web component version 2.1 build 1154Patches:p-6.1-b1519-1 07/10/2006 22:31:14 CSC SSM 6.1 Patch 1Press Enter to continue ...Step 3
Press Enter.
The Trend Micro InterScan for Cisco CSC SSM Setup Main Menu appears.
Caveats
This section describes the open and resolved caveats for the CSC SSM 6.1.1569.0 release. To view more information about an open or resolved caveat, use the Bug Toolkit on Cisco.com. If you are a registered Cisco.com user, access the Bug Toolkit on cisco.com at the following website:
http://tools.cisco.com/Support/BugToolKit/
To become a registered Cisco.com user, go to the following website:
http://tools.cisco.com/RPF/register/register.do
For your convenience in locating caveats in the Cisco Bug Toolkit, the caveat titles listed in this section are taken directly from the Bug Toolkit database. These caveat titles are not intended to be read as complete sentences, because the title field length is limited. In the caveat titles, some truncation of wording or punctuation may be necessary to provide the most complete and concise description. The only modifications made to these titles are as follows:
•
Commands are in boldface type.
•
Product names and acronyms may be standardized.
•
Spelling and typographical errors may be corrected.
This section includes the following topics:
Open Caveats
Table 1 lists the caveats that are open in Version CSC 6.1.1569.0.
Table 1 Open Caveats
ID Number Caveat TitleCSCsd05974
TCP flow dropped due to CSC card failed during SSM stress.
CSCsd17818
Yahoo! Finance MarketTracker does not work. For a workaround, see About the CSC 6.1.1569.0 Patch.
CSCsd17889
Nothing seems to happen when downloading infected file from/to webmail.
CSCsd17954
The HTTP proxy connection cannot tunnel through the CSC SSM.
CSCsd18011
FTP file blocking will not work when file unscanned due to cfg.
CSCsd18030
Connections may be interrupted during SSM service failure.
CSCsd18044
Connections may be interrupted during the SSM restarting period.
CSCsd18052
E-mail notification from the CSC SSM is not received.
CSCsd18060
With CSC enabled, large file transfer using HTTP/FTP or Windows Update fail.
CSCsd59143
Modify e-mails sent by Trend CSC-SSM module to include device name, IP.
CSCse12729
The spyware pattern number may appear to be rolled back.
CSCse12745
NRS feature is not working on the CSC SSM after registration.
CSCse12755
Some spyware may be detected even if Spyware category is not enabled.
CSCse12767
Fails to convert non-UTF8 Japanese characters to UTF-8.
CSCse12772
Filename may not be properly displayed in the e-mail inline insertion.
CSCse12781
Japanese strings may not be displayed correctly in system log messages.
CSCse12784
Multi-byte strings are not allowed on the GUI.
CSCse12786
Original e-mail may break if not encoded in UTF-8.
CSCse12791
Multi-byte filename may not be displayed correctly.
CSCse89728
Number of licensed seats shows a different value for Base and Plus licenses.
CSCsf05298
Citrix not supported with CSC module.
CSCsf12514
CSC module needs to support TFTP blocksize option - RFC 2347, RFC 2348.
CSCsf26197
CSC software blocks Ameritrade streamer.
CSCsf27606
CSC software stops processing POP3 traffic.
CSCsf28591
CSC module generates compact Flash almost-full messages.
CSCsf98493
VPN users using proxy have problem browsing via HTTP: 1264.
CSCsf98538
White IP List on NRS will disappear from Trend UI: 1253.
CSCsg25501
Bypass filter for CSC module.
CSCsg28389
HTTP scanner causes system to hit 100% busy.
CSCsg52819
CSC module - Import function for user-defined domain lists
CSCsg72210
Trend URL filtering service does not currently support SOCKS-based proxy service.
CSCsg76794
Last 30-day counter is not updating correctly.
CSCsg82181
Flash image on www.cisco.com home page sometimes cannot be loaded.
Resolved Caveats
Table 2 lists the caveats that have been resolved in Version CSC 6.1.1569.0.
Related Documentation
For additional information, see the ASDM online Help or the following documentation found on Cisco.com:
•
Cisco Content Security and Control SSM Administrator Guide
•
Cisco ASDM Release Notes
•
Cisco ASA 5500 Series Hardware Installation Guide
•
Cisco ASA 5500 Series Adaptive Security Appliance Getting Started Guide
•
Cisco ASA 5500 Series Release Notes
•
Cisco Security Appliance Command Line Configuration Guide
•
Cisco Security Appliance Command Reference
Obtaining Documentation and Submitting a Service Request
For information on obtaining documentation, submitting a service request, and gathering additional information, see the monthly What's New in Cisco Product Documentation, which also lists all new and revised Cisco technical documentation, at:
http://www.cisco.com/en/US/docs/general/whatsnew/whatsnew.html
Subscribe to the What's New in Cisco Product Documentation as a Really Simple Syndication (RSS) feed and set content to be delivered directly to your desktop using a reader application. The RSS feeds are a free service and Cisco currently supports RSS version 2.0.