Table Of Contents
Cisco Content Security and Control (CSC) SSM Release Notes Version 6.2.1599.1
Contents
About the CSC SSM Version 6.2.1599.1 Release
Installing the CSC SSM Version 6.2.1599.1 Release
Verifying the Installed Version of the CSC SSM Software
Caveats
Open Caveats
Resolved Caveats
Related Documentation
Obtaining Documentation, Obtaining Support, and Security Guidelines
Cisco Content Security and Control (CSC) SSM Release Notes Version 6.2.1599.1
October 2007
Contents
This document contains release information for the Cisco Content Security and Control (CSC) SSM Version 6.2.1599.1 maintenance release. It includes the following sections:
•
About the CSC SSM Version 6.2.1599.1 Release
•
Installing the CSC SSM Version 6.2.1599.1 Release
•
Verifying the Installed Version of the CSC SSM Software
•
Caveats
•
Related Documentation
•
Obtaining Documentation, Obtaining Support, and Security Guidelines
About the CSC SSM Version 6.2.1599.1 Release
The CSC SSM Version 6.2.1599.1 maintenance release applies only to CSC-SSM-10 and CSC-SSM-20 Version 6.2.1599.0.
See the "Resolved Caveats" section for information about the caveats that have been resolved by this release.
Installing the CSC SSM Version 6.2.1599.1 Release
You can install this release if you are running CSC SSM version 6.2.1599.0. To verify the version of the CSC SSM software installed on the device, see the "Verifying the Installed Version of the CSC SSM Software" section.
To upgrade the CSC SSM, perform the following steps:
Step 1
Download the csc6.2.1599.1.pkg upgrade file from the Software Center on Cisco.com. You need to log into Cisco.com to download the software. If you do not have a Cisco.com account, visit the following website to become a registered user:
http://tools.cisco.com/RPF/register/register.do
Step 2
Access the Trend Micro CSC SSM console by doing the following:
a.
Launch ASDM.
b.
Choose Configuration > Trend Micro Content Security.
Step 3
Choose Administrator > Product Upgrade from the menu.
Step 4
Click Browse and select the .pkg file you downloaded.
Step 5
Click Install.
Step 6
Click Summary to confirm the installed software version.
Step 7
(Optional) Use an Eicar test file to confirm that the upgrade was successful and that the scanning services have been configured correctly.
For more information, see Appendix A, "Reimaging and Configuring the CSC SSM Using the CLI," in the Cisco Content Security and Control SSM Administrator Guide.
Verifying the Installed Version of the CSC SSM Software
You can confirm the version of the CSC SSM software, and software components and patches from the ASA 5500 series adaptive security appliance CLI.
Note
The software version also appears on the summary page of the Trend Micro InterScan for Cisco CSC SSM interface.
To view the version of software installed on the CSC SSM using the CLI, perform the following steps:
Step 1
To access the CSC SSM, open ASDM and click the Content Security tab.
Step 2
Choose Tools > Command Line Interface to display the Command Line Interface dialog box.
Step 3
In the command line field, enter the show module 1 details command, and then click Send.
The CSC SSM software version information appears.
hostname(config)# show module 1 details
Getting details from the Service Module, please wait...
ASA 5500 Series Security Services Module-20
Firmware version: 1.0(10)0
Software version: CSC SSM 6.2.1599.1
MAC Address Range: 000b.fcf8.012c to 000b.fcf8.012c
App. Status Desc: CSC SSM scan services are available
Mgmt IP addr: 10.89.130.241
Peer IP addr: <not enabled>
Caveats
This section describes the open and resolved caveats for the CSC SSM Version 6.2.1599.1 maintenance release. To view more information about an open or resolved caveat, use the Bug Toolkit on Cisco.com. If you are a registered Cisco.com user, access the Bug Toolkit on cisco.com at the following website:
http://tools.cisco.com/Support/BugToolKit/
To become a registered Cisco.com user, go to the following website:
http://tools.cisco.com/RPF/register/register.do
For your convenience in locating caveats in the Cisco Bug Toolkit, the caveat titles listed in this section are taken directly from the Bug Toolkit database. These caveat titles are not intended to be read as complete sentences, because the title field length is limited. In the caveat titles, some truncation of wording or punctuation may be necessary to provide the most complete and concise description. The only modifications made to these titles are as follows:
•
Commands are in boldface type.
•
Product names and acronyms may be standardized.
•
Spelling and typographical errors may be corrected.
This section includes the following topics:
•
Open Caveats
•
Resolved Caveats
Open Caveats
Table 1 lists the open caveats in the CSC SSM Version 6.2.1599.1 maintenance release.
Table 1 Open Caveats
ID Number
|
Caveat Title
|
CSCsd17818
|
Yahoo! Finance MarketTracker does not work.
|
CSCsd17889
|
Nothing seems to happen when downloading infected file from/to web mail.
|
CSCsd17954
|
The HTTP proxy connection cannot tunnel through the CSC SSM.
|
CSCsd18011
|
FTP file blocking will not work when file unscanned due to cfg.
|
CSCsd18052
|
Email notification from the CSC SSM is not received.
|
CSCse12729
|
The spyware pattern number may appear to be rolled back.
|
CSCse12745
|
NRS feature is not be working on the CSC SSM after registration.
|
CSCse12755
|
Some spyware may be detected even if Spyware category is not enabled.
|
CSCsf98493
|
[HTTP] VPN users using proxy have problem browsing via HTTP.
|
CSCsf98538
|
[UI] WhiteIPList on NRS will disappear from UI.
|
CSCsh27011
|
[FTP] HP UX tcp_lift_anchor, "can't wait" error received when doing FTP.
|
CSCsh27102
|
[Admin UI] SSL vulnerability.
|
CSCsh58934
|
SSM card becomes unresponsive after configuring from ASDM.
|
CSCsh70101
|
No error message for invalid URL blocking import file.
|
CSCsh97282
|
Ability to change the CSC SSM default web GUI port 8443.
|
CSCsi27604
|
Intermittent email corruption when going through CSC.
|
CSCsi40117
|
100% CPU issue.
|
CSCsi43395
|
Do not send disconnect-syslog when HTTP receives RST.
|
CSCsi65720
|
Secondary DNS server setup is wiped out by session 1 do setup dns command.
|
CSCsj10645
|
CSC still filters large size messages even if disabling POP3 scanning.
|
CSCsj71797
|
Feature request: Bypass large emails for POP3/SMTP.
|
CSCsj91181
|
FTP service may stop under stress condition.
|
CSCsj91182
|
CSC cannot download pattern/engine from TMCM.
|
CSCsj91183
|
ConnectWise application does not load when scanned by CSC via HTTP.
|
CSCsj91185
|
Web mail scanning displays incorrect color when adding new entries.
|
CSCsk07553
|
CSC: Phishing websites only categorized without -www-.
|
CSCsk07581
|
CSC: Incorrect URL for submitting potential phishing URL to TrendLabs.
|
CSCsk08014
|
CSC locks-up and stays in Reload state after upgrading to 6.2.1599.0.
|
CSCsk09801
|
CSC-SSM Enhancement: Block SMTP email with blank subject field.
|
CSCsk10777
|
CSC module may report that it cannot update grayware patterns.
|
CSCsk21604
|
CSC memory utilization may reach 100% when running 6.2.1599.
|
CSCsk39837
|
CSC-SSM upgrade from 6.1.1519 to 6.2.1599 via .pkg file might fail.
|
CSCsk83984
|
CSC: Free memory is not correctly calculated or reported.
|
CSCsk83985
|
CSC: Memory leak in scan server leads to Unresponsive module state.
|
CSCsk83986
|
Add additional skip content for new MIME type for www.unitedstreaming.com.
|
CSCsk86737
|
Changing browser user agent may allow users to bypass CSC virus scanning.
|
CSCsk90093
|
Enhance online help for unscanned corrupted files'.
|
CSCsk92123
|
Poor card performance - accessing www.profuturognp.com.mx takes 2-3 minutes.
|
CSCsk92124
|
Enhancement request: Add feature to exclude certain email addresses from scanning.
|
CSCsb71814
|
ASDM CSC cannot accept SSM password from IE in certain conditions.
|
CSCse53604
|
ASDM is not detecting FTP inspection not enabled scenario.
|
CSCse74111
|
ASDM hangs if CSC domain email entry is not found.
|
CSCsh16092
|
ASDM 5.2(2) not generating correct error for wrong CSC password.
|
Resolved Caveats
Table 2 lists the resolved caveats in the CSC SSM Version 6.2.1599.1 maintenance release.
Table 2 Closed Caveats
ID Number
|
Caveat Title
|
CSCsk83891
|
Problem accessing www.pizzahut.com due to broken server-side implementation.
|
CSCsi01092
|
Problem accessing some web sites due to CSC attempting to reestablish a closed HTTP connection.
|
CSCsj91184
|
Problem accessing www.sicklogoshoppe.com due to broken server-side implementation.
|
CSCsk24637
|
Large mail messages encounter SMTP timeouts when processed by CSC.
|
CSCsk21604, CSCsk83983
|
Protocol scanner fails to remove unused temporary files.
|
CSCsk51561
|
Scheduled update notification may be corrupted if delivered to Microsoft ISS MTA.
|
CSCsk83985
|
Scan server may have a memory leak.
|
CSCsc83996
|
FTP get failure: CSC sends RETR before data channel is established.
|
CSCsc87177
|
Stargate stress will cause control channel failure and CSC failed.
|
CSCsd17646
|
The CSC SSM cannot block non-standard file extensions such as .xxx.
|
CSCsd17656
|
The CSC SSM blocks the page with gzip displayed.
|
CSCsd17794
|
If FTP-inspection is disabled in the ASA CLI, the FTP-data is not scanned.
|
CSCsd18030
|
Connections may be interrupted during SSM service failure.
|
CSCsd24556
|
The connection timeout syslog is sent on every SMTP connection.
|
CSCsd24611
|
A HTTP or 1.0 client may not work properly.
|
CSCsd59143
|
Modify e-mails sent by Trend CSC-SSM module to include device name, IP address.
|
CSCse61973
|
CSC SSM does not store NULL HTTP header correctly.
|
CSCse67660
|
CSC software blocks Windows Automatic updates.
|
CSCse68897
|
Scheduled update every 15 minutes doesn't start sometimes.
|
CSCse74860
|
Unable to import a configuration backup from one SSM to the other.
|
CSCse74868
|
ESMTP AUTH response cannot pass through CSC.
|
CSCse74885
|
CSC runtime memory usage keeps increasing.
|
CSCse74907
|
High-frequency of SMTP disconnection syslogs is generated.
|
CSCse74913
|
Some values reset to default on config import.
|
CSCse74915
|
Schedule update may not be executed every 15 minutes on some systems.
|
CSCse74918
|
Packet capture from CSC CLI Menu does not capture complete packet.
|
CSCse78267
|
URL filtering with proxy delays HTTP connections by 60 seconds.
|
CSCse84425
|
Anti-spam User-Approved-Email-List is not exported as part of the cfg.
|
CSCse89728
|
Number of licensed seats shows a different value for Base and Plus licenses.
|
CSCse90102
|
CSC SSM incorrectly sends failure email for virus engine update.
|
CSCsf24483
|
Activation Code is invalid. [CONTENT_ERR_AC_ILLEGAL] error:1231
|
CSCsf27606
|
CSC software stops processing POP3 traffic.
|
CSCsf28591
|
CSC module generates compact Flash almost-full messages.
|
CSCsf32708
|
Button Check Status Online on UI Enter a new code doesn't work: 1231.
|
CSCsf98450
|
Unable to update Symantec product using FTP via CSC.
|
CSCsf98459
|
[CLI] Allow user to set the short or long password.
|
CSCsf98496
|
[HTTP URL Blocking] URLs with more than 50 chars not accepted: 1265.
|
CSCsf98519
|
The networking setting is not updated on Config Import: 1270.
|
CSCsf98547
|
[Troubleshooting Tools] Gather logs does not work sometimes: 1272.
|
CSCsf98551
|
[UI] URL Filtering reclassification page to be changed: 1275.
|
CSCsf98558
|
Check Status Online updated Last Status Check even on failure: 1276.
|
CSCsg11957
|
CSC cutting link speed by 60%, and download speeds are very slow.
|
CSCsg25501
|
Bypass filter for CSC module.
|
CSCsg26887
|
CSC TMCM server IP can't be removed.
|
CSCsg28389
|
Hits 100% CPU utilization for 108 nodes.
|
CSCsg31261
|
CSC losing configuration when the ASA is reloaded.
|
CSCsg32958
|
TLS SMTP does not work through CSC module.
|
CSCsg52819
|
CSC module - Import function for user-defined domain lists.
|
CSCsg71856
|
Unable to browse some websites, e.g, wisbar.org:1336.
|
CSCsg72173
|
Duplicate syslog is generated when multiple spyware apps are found in a comp.
|
CSCsg72185
|
URL filtering cache does not expire.
|
CSCsg73233
|
CSC failover: Automatic synchronization is currently message shown.
|
CSCsg73302
|
Enter <>, as URL Blocking rules on CSC GUI breaks GUI.
|
CSCsg73427
|
The View license detail online link does not work.
|
CSCsg79130
|
FTP EPSV EPRT options not working through CSC.
|
CSCsg82129
|
HTTP 1.1 pipelining compliance issues.
|
CSCsg82152
|
CSC jumps to 100% CPU, but new connections can be established & scanned.
|
CSCsg82181
|
The flash image on www.cisco.com home page sometimes cannot be loaded.
|
CSCsh14819
|
Patch history is not displayed properly when upgrading from 6.1p1.
|
CSCsh15518
|
Upgrading CSC module may result in no ability to activate module.
|
CSCsh19934
|
CSC-SSM not passing traffic for several minutes after config update.
|
CSCsh21113
|
Scheduled update email notification subj reports incorrect update status.
|
CSCsh21159
|
Unable to see streaming video or audio from some sites.
|
CSCsh23475
|
CSC module - URL blocking not functional for keywords.
|
CSCsh27010
|
POP3 never worked.
|
CSCsh27014
|
[HTTP] Asymmetric connection close issue in HTTP proxy.
|
CSCsh27090
|
[HTTP] Firefox 2.0 with fasterfox plugin has issue opening Cisco.com.
|
CSCsh27092
|
[HTTP] Codenomicon tool causes CSC CPU to hit 100%.
|
CSCsh27093
|
[HTTP] URL filtering requests sent with incorrect format.
|
CSCsh27095
|
[UI] Patch installation does not clean patch history page.
|
CSCsh27099
|
[Update] Improve the update feature around notification mail.
|
CSCsh27103
|
[HTTP] Streaming media does not work.
|
CSCsh30699
|
.gif SPAM emails not being filtered by CSC module.
|
CSCsh31484
|
CSC module on ASA does not show email disclaimer.
|
CSCsh31982
|
[HTTP]CSC-SSM: Disconnects HTTP sessions from proxy in DMZ.
|
CSCsh35086
|
CSC module with URL filtering delays or blocks all web traffic.
|
CSCsh37104
|
CSC-SSM Enhancement: Increase number of live SMTP and POP3 connections.
|
CSCsh39788
|
After upgrade with *.pkg, URL filtering does not function.
|
CSCsh46886
|
CSC-SSM - SWF files are being treated as executables.
|
CSCsh50078
|
CSC URL filtering, HTTP browsing fails: page cannot be displayed error.
|
CSCsh58065
|
TFTP transfers to and from CSC module's command line failing.
|
CSCsh58836
|
TMCM Agent sends wrong version information.
|
CSCsh58901
|
ASDM Plus license expiration does not disable URL blocking in ASDM.
|
CSCsh58911
|
HTTP CSC-SSM module CPU pegged at 100%.
|
CSCsh73881
|
CSC-SSM module CPU pegs at 100% when running 6.1(1569).2 image.
|
CSCsh74915
|
Trend GUI does not return to login screen after timeout.
|
CSCsh80376
|
Incorrect error message when URL rating lookup times out.
|
CSCsh90870
|
Adding deferred scanning to POP3 scanning.
|
CSCsh96228
|
POP3 and SMTP corrupt email if CR LF arrives in separate lines.
|
CSCsh96229
|
IWSS cannot parse CCM_POST.
|
CSCsh96231
|
URL filtering cannot handle chunked RS response.
|
CSCsh96235
|
Incorrect syslog is sent when CSC is unable to connect to URL rating.
|
CSCsh96237
|
Email delays due to IMSS lacking timeout (current behavior is 120 sec).
|
CSCsh96238
|
HTTP does not send syslog on socket timeout.
|
CSCsi06520
|
Add support for TLS over FTP.
|
CSCsi07133
|
TFTP uploads via CSC module - Troubleshooting menu fail.
|
CSCsi18226
|
Unable to establish failover relationship.
|
CSCsi32093
|
Issue sending email when recipient list is too large.
|
CSCsi40116
|
OCLC parsing error.
|
CSCsi43390
|
Improve online help description for Log Query.
|
CSCsi43391
|
Service module does not respond under high loads.
|
CSCsi43393
|
When SSM log partition is full, IWSS leaks ~isvw/tttt.txt.
|
CSCsi43397
|
Include TM agent log into CSC Log Collection.
|
CSCsi43399
|
Not able to stream AOL online radio.
|
CSCsi43791
|
-dst cache overflow- causing CSC unable to accept new connections.
|
CSCsi52793
|
Allow customer to enable or disable SMTP TLS.
|
CSCsi52795
|
Allow un-registering TMCM when TMCM server is unreachable.
|
CSCsi52796
|
SSM License GUI cannot accept new activation codes.
|
CSCsi52797
|
NRS is not grayed out after Plus license expired.
|
CSCsi52798
|
Upgrade requires base CSC version 6.1.1569.x.
|
CSCsi52799
|
Make core dump enable easier in the header of IS functions.
|
CSCsi66735
|
CSC-SSM does not properly handle partial emails.
|
CSCsi82300
|
CSC causes large email attachments to time out when downloading via POP3.
|
CSCsi83497
|
Management IP address is truncated.
|
CSCsj16273
|
URL categories, Social networking not seen.
|
CSCsj19322
|
CSC: Active Trend GUI session requires reauth every 10 minutes.
|
CSCsj20246
|
CSC-SSM not detecting spyware threats.
|
CSCsj33289
|
CSC memory may be filled up under heavy FTP traffic.
|
CSCsj46486
|
Anti-Spam - The Japanese subject is broken after adding spam tag.
|
CSCsj64650
|
SMTP content filtering requires .WILD. for wildcards to be enabled.
|
CSCsj89273
|
URL filtering does not support SOCKS-based proxy service.
|
CSCsj89274
|
POP3 CSC-SSM is not handling AUTH commands properly.
|
CSCsj89275
|
MAIL: Some email clients do not work with gzip transfer-coding.
|
CSCsj89276
|
Content filtering wildcard online help change.
|
CSCsj89277
|
UI Trial Plus license key is not accepted after installation.
|
CSCsj91184
|
www.sicklogoshoppe.com may not load when scanned by CSC via HTTP.
|
CSCsj91186
|
Japanese patch record p-6.1-ja-1 is lost after upgrade.
|
CSCsk06846
|
Scan services reloading - pattern file or configuration update.
|
CSCsk24637
|
SMTP deferred scanning for emails with large attachments.
|
CSCsk83981
|
HTTP issue when accessing quikorder.pizzahut.com session.
|
CSCsk83983
|
POP3 message left in temp and quarantine folders with customer.
|
CSCsl01090
|
NOOP command sequence does not handle MTA errors.
|
CSCsl01092
|
HTTP user can't access www.gruposantander.es when using IE6 or IE7.
|
Related Documentation
For additional information, see the ASDM online Help or the following documentation found on Cisco.com:
•
Cisco Content Security and Control SSM Administrator Guide
•
Cisco ASDM Release Notes
•
Cisco ASA 5500 Series Hardware Maintenance Guide
•
Cisco ASA 5500 Series Adaptive Security Appliance Getting Started Guide
•
Cisco ASA 5500 Series Release Notes
•
Cisco Security Appliance Command Line Configuration Guide
•
Cisco Security Appliance Command Reference
•
Cisco Security Appliance System Log Messages Guide
Obtaining Documentation, Obtaining Support, and Security Guidelines
For information on obtaining documentation, obtaining support, providing documentation feedback, security guidelines, and also recommended aliases and general Cisco documents, see the monthly What's New in Cisco Product Documentation, which also lists all new and revised Cisco technical documentation, at:
http://www.cisco.com/en/US/docs/general/whatsnew/whatsnew.html