![]() |
Table Of Contents
Release Notes for Cisco Trust Agent, Release 2.1, With Bundled Supplicant
Qualified Deployments of CTA 2.1
CTA 802.1x Wired Client Service Fails to Start Following Upgrade from CTA 2.0 to CTA 2.1
New Authentication Profiles Required with Upgrade from CTA 2.0 to CTA 2.1
Configuring Machine Authentication
CTA is No Longer Bundled with CSA
New Features Introduced in CTA 2.1
New Product Versioning Methodology
Single RPM Installation File for Linux Installations
Support for CTA on Mac OS X Operating Systems
Microsoft Windows Installer (MSI) Installation Files
New Configuration Options in CTA
Standardized Naming Convention for ctad.ini Template Files
New Naming Convention for ctalogd.ini Template File
Configuring User Notifications
Configuring CTA and Posture Plugin Interaction
Configuring Posture Plugin Message Size
Configuring CTA for Use with the Windows XP Firewall
Configuring Logging for Large Deployments
Host Posture Plugin Now Returns MAC Address
Package Information Returned by Host Posture Plugin For Mac OS X
New Features Introduced in CTA 802.1x Wired Client
Differentiating Connected States
Realtime Information on Connection Process
Connection Status Dialog Enhancements
Authentication Retries Enhancement
New "User Identity Protection" Area on Station Policy Window
New "Allow Unprotected Client Cert" Area on Station Policy Window
Global Enable Client Control Enhancements
New Features Introduced in CTA 2.0.1
CTA 802.1x Wired Client System Report Tool
CTA 802.1x Wired Client Technical Log
Machine Authentication Methods
Authentication Using Machine Password
Configurable Outer Tunnel Identity for EAP-FAST
System Requirements for Installations on Linux
System Requirements for Installations on Mac OS X
System Requirements for Installation on Windows
Obtaining the Latest Release of CTA
Upgrading CTA without the CTA 802.1x Wired Client
Upgrading CTA with the CTA 802.1x Wired Client
Upgrading from Selective Availability and Beta Releases to CTA 2.1
Upgrading CTA without the CTA 802.1x Wired Client
Upgrading CTA with the CTA 802.1x Wired Client
Known Defects in CTA 2.1 Posture Agent
Known Defects in CTA 802.1x Wired Client
Closed and Resolved Defects in CTA
Defects Closed or Resolved in CTA 2.1 Posture Agent
Defects Closed or Resolved in CTA 802.1x Wired Client
All Defects Closed or Resolved by CTA Release 2.0.1
Closed or Resolved Cisco Product Defects that Affected CTA Performance
Closed or Resolved NAC-Partner Defects that Affected CTA Performance
Obtaining Documentation, Obtaining Support, and Security Guidelines
Release Notes for Cisco Trust Agent, Release 2.1, With Bundled Supplicant
Released for Use with Network Admission Control Framework 2.1
Revised: May 23, 2008
Contents
These release notes are for use with Cisco Trust Agent (CTA), Release 2.1, With Bundled Supplicant. The following information is provided:
•
Cisco Trust Agent 2.1 Release
–
Qualified Deployments of CTA 2.1
–
Obtaining the CTA 2.1 Release
–
CTA 802.1x Wired Client Service Fails to Start Following Upgrade from CTA 2.0 to CTA 2.1
–
New Authentication Profiles Required with Upgrade from CTA 2.0 to CTA 2.1
–
Configuring Machine Authentication
–
CTA is No Longer Bundled with CSA
•
New Features Introduced in CTA 2.1
–
New Product Versioning Methodology
–
Single RPM Installation File for Linux Installations
–
Support for CTA on Mac OS X Operating Systems
–
Microsoft Windows Installer (MSI) Installation Files
–
New Configuration Options in CTA
–
New Features Introduced in CTA 802.1x Wired Client
•
New Features Introduced in CTA 2.0.1
–
CTA 802.1x Wired Client System Report Tool
–
CTA 802.1x Wired Client Technical Log
–
Machine Authentication Methods
–
Configurable Outer Tunnel Identity for EAP-FAST
–
System Requirements for Installations on Linux
–
System Requirements for Installations on Mac OS X
–
System Requirements for Installation on Windows
•
Obtaining the Latest Release of CTA
–
Upgrading from Selective Availability and Beta Releases to CTA 2.1
•
Known Defects in CTA 2.1 Posture Agent
•
Known Defects in CTA 802.1x Wired Client
•
Closed and Resolved Defects in CTA
–
Defects Closed or Resolved in CTA 2.1 Posture Agent
–
Defects Closed or Resolved in CTA 802.1x Wired Client
–
All Defects Closed or Resolved by CTA Release 2.0.1
•
Obtaining Documentation, Obtaining Support, and Security Guidelines
Cisco Trust Agent 2.1 Release
The goals of Cisco Trust Agent, Release 2.1.103.0 (CTA 2.1) are to improve on the CTA 2.1.18.0 selective availability release by resolving outstanding product defects and to provide new functionality from that offered in the CTA 2.0.0.30 release. Cisco Trust Agent release 2.1 is an integral component of the Network Admission Control Framework 2.1 solution.
The CTA 802.1x Wired Client supplicant is bundled with this offering of CTA 2.1.103.0. The CTA 802.1x Wired Client is available for use on Windows operating systems.
Qualified Deployments of CTA 2.1
Cisco Trust Agent 2.1.103.0 will be distributed to existing customers of CTA and those customers evaluating the NAC Framework 2.1 programs.
CTA 2.1 is not intended for distribution to new customers of CTA nor new customers of the NAC 2.1 Framework solution. New customers to CTA and NAC should work with their Cisco Account Team representative to evaluate their NAC Framework-qualified infrastructure and use-case scenarios.
We are making an extra effort to qualify our customers' infrastructure and goals to ensure that the components in their network are compatible with the NAC Framework, that their goals will be met by the NAC Framework, and that the deployment of the NAC Framework will be successful.
Obtaining the CTA 2.1 Release
CTA 2.1.103.0 is available for download in this location:
http://www.cisco.com/pcgi-bin/tablebuild.pl/cta
You must agree to the following terms before downloading Cisco Trust Agent Software Update (the "Software"):
In as much as this release of Cisco Trust Agent is intended for existing deployments, by clicking "Accept" below, in addition to any other license terms provided by Cisco with this Software, you on behalf of yourself and the organization you represent (collectively "You") agree to each of the following:
–
That You on behalf of yourself and the entity You represent already have Cisco Trust Agent installed and You will use this Cisco Trust Agent download (the "Software") only for the purpose of upgrading Your previously installed version of Cisco Trust Agent (which You are using in accordance with the Cisco license terms governing the previously installed version of Cisco Trust Agent).
–
You will keep this Software image confidential and will not provide it to any third party.
–
If you are unable to agree to the above terms of use do not download the Software. Please contact your Cisco account team for further assistance.
Product Versioning
The full version number of this release is CTA 2.1.103.0. The full release number is used in installation files names and in the text of the Administrator Guide for Cisco Trust Agent, Release 2.1 and the Release Notes for Cisco Trust Agent, Release 2.1 when it is important to distinguish the version of CTA being discussed. Any references in the documentation to CTA 2.1 are referring to CTA 2.1.103.0 unless otherwise noted.
CTA 2.1 Product Limitations
Review these limitations of CTA 2.1 before installing or upgrading to the new release.
CTA 802.1x Wired Client Service Fails to Start Following Upgrade from CTA 2.0 to CTA 2.1
The CTA 802.1x Wired Client fails to start after an upgrade attempt from CTA 2.0.0.30 (CTA 2.0) to CTA 2.1.103.0 (CTA 2.1). In order to upgrade from CTA 2.0 with the CTA 802.1x Wired Client to CTA 2.1 with the CTA 802.1x Wired Client, you will need to uninstall CTA 2.0, delete leftover directories, and then install CTA 2.1 from scratch. See the "Upgrading CTA 2.0 to CTA 2.1" section for this upgrade procedure.
New Authentication Profiles Required with Upgrade from CTA 2.0 to CTA 2.1
The user and machine authentication profiles that were created for use with CTA 2.0 are not compatible with CTA 2.1. During an upgrade from CTA 2.0 to CTA 2.1, the authentication profile files are deleted. New authentication profile files will need to be created after upgrading to CTA 2.1 to perform 802.1x authentication with CTA 2.1.
Configuring Machine Authentication
Cisco Trust Agent 2.1 supports machine authentication. However, you should be aware of these caveats when planning the deployment of machine authentication in your NAC environment:
•
Some applications may not be appropriate choices to provide posture credentials during machine authentication. Such applications may be slow to start, for example, and they will not be ready to provide posture credentials immediately for machine authentication.
In this case, machine authentication could fail, not because of a security problem but because the application was not available to provide its posture credentials in time.
•
In order to perform machine authentication, the EAP-FAST Configuration in ACS must allow machine authentication.
•
Machine authentication can be performed on networks where Windows Active Directory is in use.
Windows NT is Not Supported
CTA 2.1 does not support Windows NT 4.0 Server or Windows NT 4.0 Workstation.
CTA is No Longer Bundled with CSA
In the past, CTA installation files have been distributed along with Cisco Security Agent (CSA). This allowed CTA to be distributed in Agent Kits produced and managed by the Cisco Security Agent Management Center. Though CTA may still be incorporated in an Agent Kit and distributed through CSA MC, the CTA installation files are no longer included in CSA distributions.
The CSA 5.1.0.88 and 5.0.0.205 hotfixes have removed all CTA installation files.
Customers who want to distribute CTA through an Agent Kit may do so by downloading the CTA software separately and following the instructions in Appendix B of the Administrator's Guide for Cisco Trust Agent, Release 2.1.
New Features Introduced in CTA 2.1
The following sections describe the new features available in Cisco Trust Agent, Release 2.1.
New Product Versioning Methodology
In previous releases of CTA, including the beta delivery of CTA 2.1, CTA product versions were expressed using a four field number; for example, CTA 2.1.0.10 was the product version of a beta release of CTA 2.1. The fields in the version number represent this information:
[Major Version].[Minor Version].[Maintenance Version].[Build Version].
Microsoft Installer (.msi) files are now used to install CTA on Windows operating systems. The Microsoft Installer expects a three field product version number and ignores the fourth field. This would prevent an upgrade of CTA from a release numbered CTA 2.1.0.10 to CTA 2.1.0.103. Microsoft Installer would see these two product builds as identical.
To accommodate the Microsoft Installer files, the product's version number is now represented by a four field number where the first three fields are significant and the last is populated with a zero.
[Major Version].[Minor Version].[Build Version].[0]
Using this new system, CTA can be upgraded from releases CTA 2.1.0.10, CTA 2.1.18.0, or CTA 2.1.100.0, to CTA 2.1.103.0 without uninstalling the previous release.
This number is used in the file naming conventions for the installation files of CTA on all operating systems.
Documentation Title Changes
This release note document, with part number, OL-11311-01, were previously entitled, Release Notes for Cisco Trust Agent, Release 2.1. It is now entitled Release Notes for Cisco Trust Agent, Release 2.1, With Bundled Supplicant.
The administrator guide, with part number, OL-11310-01, was previous entitled Administrator Guide for Cisco Trust Agent, Release 2.1. It is now entitled Administrator Guide for Cisco Trust Agent, Release 2.1, With Bundled Supplicant.
These changes are made to distinguish this CTA 2.1.103.0 product offering which includes the CTA 802.1x Wired Supplicant, from the latest CTA 2.1.103.0 product offering which does not include the CTA 802.1x Wired Client. The latest offering of CTA 2.1.103.0 removes the bundled supplicant and recommends the use of Cisco Secure Services Client as the supplicant to be used in a NAC environment.
Single RPM Installation File for Linux Installations
The installation files for CTA for Linux are contained in the ctaadminex-linux-2.1.103-0.tar.gz file which can be downloaded from Cisco.com. After downloading the ctaadminex-linux-2.1.103-0.tar.gz file, the administrator uncompress the file and runs the ctaadminex-linux-2.1.103-0.sh file to accept the license agreement and extract the cta-linux-2.1.103-0.i386.rpm. The cta-linux-2.1.103-0.i386.rpm file is then used to install CTA for Linux using standard RPM commands.
The CTA Scripting Interface feature is now installed by default on Linux platforms. There is no CTA 802.1x Wired Client for use with Linux platforms.
Support for CTA on Mac OS X Operating Systems
Cisco Trust Agent, with its standard features and the optional Scripting Interface feature, is now available for installation on Mac OS X operating systems. There is no CTA 802.1x Wired Client for use with Mac OS X platforms.
Microsoft Windows Installer (MSI) Installation Files
There are now two files which you can download and use to install CTA on Windows operating systems:
•
CtaAdminEx-win-2.1.103.0.exe
•
CtaAdminEx-supplicant-win-2.1.103.0.exe
CtaAdminEx-win-2.1.103.0.exe contains the CTA end-user license agreement (EULA) and the ctasetup-win-2.1.103.0.msi installation file.
After running the CtaAdminEx-win-2.1.103.0.exe file, the administrator accepts the EULA for all users and the ctasetup-win-2.1.103.0.msi is extracted to the same directory as the CtaAdminEx-win-2.1.103.0.exe file. You use the ctasetup-win-2.1.103.0.msi file to install CTA using standard MSI commands.
You can use the ctasetup-win-2.1.103.0.msi file to install the CTA Scripting Interface feature, however, you can not use the file to install the 802.1x Wired Client feature.
CtaAdminex-supplicant-win-2.1.103.0.exe contains the EULA and the ctasetup-supplicant-win-2.1.103.0.msi installation file. By running the CtaAdminEx-supplicant-win-2.1.103.0.exe file, you accept the EULA for all users and extract the ctasetup-supplicant-win-2.1.103.0.msi installation file. By default, the ctasetup-supplicant-win-2.1.103.0.msi file installs Cisco Trust Agent with the CTA 802.1x Wired Client and provides an option to install Scripting Interface feature. If you do not intend to install the CTA 802.1x Wired Client on some end-points, that feature may also be suppressed using standard MSI commands.
Note
Previously the CTA features could be enabled using the "/si" argument to install the scripting interface, and the "/ls" argument for CTA 802.1x Wired Client. Now that the installation files uses standard MSI commands, the /si and /ls arguments are no longer used. See, the Administrator Guide for Cisco Trust Agent, Release 2.1, Chapter 4, "Installing Optional Features During CTA Installation" for the new commands used to install these features.
New Configuration Options in CTA
Standardized Naming Convention for ctad.ini Template Files
The names of the template files used to create ctad.ini files have been standardized across all platforms. The new name for the file is ctad-temp.ini on all operating systems.
New Naming Convention for ctalogd.ini Template File
The names of the template file one could use to create the ctalogd.ini file has been changed to reflect a new file-naming convention in configuration files. The new name of the template file used to create the ctalogd.ini is ctalogd-temp.ini.
Configuring User Notifications
The user notification parameters are configured in the ctad.ini file. See the Administrator Guide for Cisco Trust Agent, Release 2.1, Chapter 5, "Configuring User Notifications" for more information about these and other notification parameters.
UserActionDelayTimeout
The UserActionDelayTimeout parameter allows you to delay the launch of the browser window so that the host has more time to obtain an IP address. This parameter was added to the ctad.ini file because if the browser that displays the posture message is launched before the host obtains an IP address, the browser will fail to open the URL contained in the posture message This feature is available on Linux, Mac OS X, and Windows operating systems.
EnableLogonNotifies
The behavior of the EnableLogonNotifies parameter is now the same on all operating systems. The parameter enables or disables user notification received before the user is logged on. User notifications received before the user is logged on can be saved or discarded.
LogonMsgTimeout
The behavior of the LogonMsgTimeout parameter is now the same on all operating systems. The default value of the parameter on all operating systems is 86,400 seconds. The parameter specifies how long, in seconds, a message is saved when no user is logged on and when EnableLogonNotifies enabled.
Configuring CTA and Posture Plugin Interaction
CTA and the posture plugins interact for the transfer of posture data, posture notifications, and status updates. Two new parameters, PPInterfaceType and PPWaitTimeout, are used together to determine how CTA interacts with the plugins and how long the interaction with all plugins lasts.
See the Administrator Guide for Cisco Trust Agent, Release 2.1, Chapter 5, "Configuring CTA and Posture Plugin Interaction." for a complete explanation of these parameters and how to configure them.
This feature is available for Linux, Mac OS X, and Windows operating systems.
Configuring Posture Plugin Message Size
By default, plugins are permitted to provide 1024 bytes (1KB) of information to CTA. This number can be increased to allow all plug-ins to provide up to 6KB of information. PPMsgSize is the parameter in the ctad.ini file which you use to configure the plugin message size.
You can also create an application-specific posture plugin message size by adding the PluginName_PPMsgSize parameter to the ctad.ini file. This parameter allows you to define a posture message size for a specific plugin.
Note
If there is a Symantec posture plugin installed on the client, the ctad.ini file must be configured in one of two ways:
•
PPMsgSize must be set to 1024 bytes.
•
The Symantec posture plugin must use an application-specific posture plugin set to 1024 bytes.
See, the Administrator Guide for Cisco Trust Agent, Release 2.1, Chapter 5, "Configuring the Posture Plugin Message Size" for a complete explanation of this parameter and how to configure it.
This feature is available for Linux, Mac OS X, and Windows operating systems.
Configuring CTA for Use with the Windows XP Firewall
The BootTimeUDPExemptions parameter alters the Windows XP Firewall policy and enables CTA to receive packets when the Windows XP SP2 or SP3-based computer is booting.
By enabling BootTimeUDPExemptions you alter the Windows XP Firewall setting by adding CTA's local EAPoUDP port to the Windows XP Firewall boot time UDP exemptions policy. This enables CTA to communicate with ACS over the network.
Note
Use of the BootTimeUDPexemptions parameter is relevant only when used in conjunction with Microsoft's hot fix for Windows XP (KB17730)
See Administrator Guide for Cisco Trust Agent, Release 2.1, Chapter 5, "ctad.ini Configuration Parameters" for more information about this parameter and how to configure it.
Configuring Logging for Large Deployments
A procedure has been added to the Administrator Guide for Cisco Trust Agent, Release 2.1 that describes how to configure CTA logging for a large deployment. A sample ctalogd-temp.ini file has also been provided.
See the Administrator Guide for Cisco Trust Agent, Release 2.1, Chapter 6, "Configuring CTA Logging for Large Deployments for the procedure.
New Posture Plugin Features
The features in this section are described in the Administrator Guide for Cisco Trust Agent, Release 2.1, Chapter 7, "Posture Plugins."
Host Posture Plugin Now Returns MAC Address
The Host Posture Plugin reports basic information about the client running CTA to the ACS. With the release of CTA 2.1, the Host Posture Plugin can now return the MAC address of the client running CTA, provided that the MacAddress attribute has been added to the Posture-Validation Attribute Definition File employed by the ACS CSUtil database utility. (For more information about the ACS CSUtil database utility and the Posture-Validation Attribute Definition File, see the User Guide for Cisco Secure ACS for Windows Server.)
The attribute information for MacAddress is below.
[attr#n]
vendor-id=9vendor-name=Ciscoapplication-id=2application-name=Hostattribute-id=00009attribute-name=MacAdressattribute-profile=inattribute-type=stringThe plugin will return all the MAC addresses available on the client running CTA and combine them into one string; the MAC addresses will be separated by pipes ( | ). For example, a wireless network card and a wired network card will each return a MAC address.
If you are defining a posture validation rule in ACS based on only one of these MAC addresses, the posture attribute should "contain" the MAC address you are verifying rather than "equal" or "start with" the MAC address you are verifying.
This feature is available for Linux, Mac OS X, and Windows operating systems.
Package Information Returned by Host Posture Plugin For Mac OS X
For Mac OS X, there are two types of applications that are of concern to CTA: system applications which have receipts in /Library/Receipts/ and user applications which are installed in /Applications directory.
System applications are identified by the first level folder name under /Library/Receipts, like "Danish.pkg", "X11SDK.pkg". User applications are identified by the application name under /Applications directory as displayed in Finder. For example, "Firefox", "DVD\ Player".
The applications located in the subfolders of /Applications directory can also be queried, in these cases the package name looks like the relative path to /Applications. For example, "Utilities/Disk\ Utility", "Zinio/Zinio\ Reader".
Note
White spaces in package names must be escaped with backslash ("\").
The version information of system applications is parsed out of the Contents/version.plist file under the package's directory under the /Library/Receipts directory. Version information is in the form of "a.b.c.d". The first three fields of version are from the CFBundleShortVersionString key, and the fourth field is from SourceVersion key. For user application packages, the version information is retrieved from the Info.plist file under the Contents/ directory in the application's directory. We first look for the value of CFBundleShortVersionString key. If this key is not present we will return the value of CFBundleVersion key. If both keys are missing no information will be returned for the package.
New Features Introduced in CTA 802.1x Wired Client
The user interface for the Cisco Trust Agent 802.1x Wired Client was changed significantly in between CTA 2.0 and CTA 2.0.1, and then revised further for the CTA 2.1 release. The procedures for configuring user and machine authentication have also changed to reflect the new user interface the Administrator Guide for Cisco Trust Agent, Release 2.1, Chapter 9, "Cisco Trust Agent 802.1x Wired Client."
Differentiating Connected States
In previous versions of the CTA 802.1x Wired Client, the connection state of "Connected" included both authenticated connections and unauthenticated connections. Unauthenticated connections were those where authentication was not required.
The client now differentiates between "connected and authenticated" and "connected and unauthenticated", both in the displayed status text and the coloring pattern of the network/access icons in the CTA 802.1x Wired Client main window and the system tray icon.
A green icon indicates that the network adapter is connected and authenticated. The new blue colored icon indicates that the network adapter is connected but unauthenticated or does not require authentication.
Realtime Information on Connection Process
The main window of the CTA 802.1x Wired Client main window now contains a hotspot labeled "Details." Clicking Details displays the Information window which provides real-time feedback of the individual steps of any (manual or automatic) connection or disconnection process. See, the Administrator Guide for Cisco Trust Agent, Release 2.1, Chapter 9, "802.1x Wired Client Window" for an illustration and explanation of the Details hot spot.
Connection Status Dialog Enhancements
Several new aspects to the Connection Status informational dialog were added.
•
Client (network adapter) MAC address is now displayed.
•
Dynamic parameters are now updated in real time.
See the Administrator Guide for Cisco Trust Agent, Release 2.1, Chapter 9, "Viewing Access Device Status" for more information about the status window.
Authentication Retries Enhancement
This feature prevents the CTA 802.1x Wired Client from failing users' authentication attempts before they can be re-routed to a special vlan. This is also referred to as the "Auth-fail VLAN feature" in the NAC environment.
Some more intelligent access devices support special features that have, for example, the ability on a failed connection attempt to open the port but switch the user into a special vlan. In order to support these access devices, the client provides the administrator with the capability on a deployed end-user client of adjusting the number of connection retries before disconnecting, allowing the access device to make intelligent decisions based on multiple authentication failures.
This functionality is available to the user in the Station Policy window in the Authentication Retries Wired /Ethernet Settings area. See the Administrator Guide for Cisco Trust Agent, Release 2.1, Chapter 9, "Authentication Retries Wired / Ethernet Settings" for an explanation of this new functionality and a description of the related GUI area.
New "User Identity Protection" Area on Station Policy Window
The Authentication Method area and associated radio buttons have been renamed to better describe the functions represented in the interface. The area is now named the User Identity Protection area. The area has these radio buttons:
•
Send `anonymous' in clear
•
Send Username in clear.
Note
The Send Username in Clear radio button choice is compatible with ACS 4.1 and later versions.
See the Administrator Guide for Cisco Trust Agent, Release 2.1, Chapter 9, "User Credentials Area" for an explanation of the function of these radio buttons.
New "Allow Unprotected Client Cert" Area on Station Policy Window
The Use Client Certificate area and associated check boxes on the Station Policy window have been renamed to better describe the functions represented in the interface. The area is now named the Allow Unprotected Client Cert area and has these checkboxes:
•
Machine Auth (Boot-time)
•
User Auth (Logon-time)
See the Administrator Guide for Cisco Trust Agent, Release 2.1, Chapter 9, "Allow Unprotected Client Cert Area" for an explanation of the function of these check boxes.
Global Enable Client Control Enhancements
In previous versions of the client, the global control for managing all the adapters was available on the popup menu off of the system tray icon and was labeled "Active" control.
This control has been relabeled as "Enable Client", which is the equivalent to the previous checked Active control, or unchecked "Enable Client", which is the equivalent to the previous unchecked Active control. The new control is also available from an associated drop-down menu. Additionally, this control has been added to the main screen menu bar as part of the 802.1x Wired Client drop-down choices. Otherwise there are no functional changes.
See the Administrator Guide for Cisco Trust Agent, Release 2.1, Chapter 9 "802.1x Wired Client System Tray Shortcut Menu" for more information about this control.
Popup Notifications
The system tray icon autonomous popup "bubble" notification messages have been removed to reduce impact on the user. All useful information is still available via the icon status color and the icon mouse rollover statuses.
New Features Introduced in CTA 2.0.1
The following sections describe the new features that were introduced in Cisco Trust Agent, Release 2.0.1.
CTA 2.0.1 was released only for Windows XP operating systems. The changes and features delivered in CTA 2.0.1 are available in Cisco Trust Agent 2.1.
CTA 802.1x Wired Client System Report Tool
The System Report utility provides end users a simple way to automatically gather data needed by support personnel to troubleshoot any problems. It captures the following information:
•
Current end-user technical log contents.
•
Current internal application activity log.
•
Information on the machine's hardware and software environment.
The System Report utility is packaged with the CTA 802.1x Wired Client and automatically installed with the CTA 802.1x Wired Client, however, it is a separate utility and it operates whether the CTA 802.1x Wired Client is active or not.
The System Report utility creates a single compressed file, the System Report, that contains information about the end station's hardware and software environment, the CTA 802.1x Wired Client, as well as the gathered technical and developer logs.
You can launch the System Report Tool by navigating Start > Programs > Cisco Systems, Inc. > Cisco Trust Agent 802.1x Wired Client > Cisco Trust Agent 802.1x Wired Client System Report.
CTA 802.1x Wired Client Technical Log
The technical log file is a time-stamped, Unicode text file that is the destination for log messages capable of being viewed with Microsoft Notepad (or equivalent) on Windows 2000 and Windows XP. See the Administrator Guide for Cisco Trust Agent, Release 2.1, Chapter 10, "Cisco Trust Agent Wired Client Logging" for more information.
Machine Authentication Methods
Authentication Using Machine Password
Starting in Cisco Trust Agent Release 2.0.1, machine authentication can occur during the boot up process. This is controlled by whether the "use machine credentials" button in the Station Policy dialog box is checked or unchecked. If the "use machine credentials" button is checked, then machine authentication is performed in place of user context authentication and one of the three machine credential types is passed.
There are different types of machine credentials:
•
Machine certificate (This is an existing feature.)
•
Machine PAC (This is an existing feature.)
•
Machine Password (This is a new feature.)
CTA 2.1 supports using the machine password whenever machine context authentication is done. A benefit of this method is that a certificate infrastructure is not needed.
See "Deploying End User 802.1x Wired Clients" in Chapter 11 of the Administrator Guide for Cisco Trust Agent, Release 2.1 for more information.
Machine Authentication Only
Either of these machine credentials can be used for machine authentication only:
•
Machine certificate
•
Machine password
See "Deploying End User 802.1x Wired Clients" in Chapter 11 of the Administrator Guide for Cisco Trust Agent, Release 2.1 for more information.
Configurable Outer Tunnel Identity for EAP-FAST
The construction of the encrypted tunnel through which the 802.1x Wired Client passes authentication credentials to the Cisco Secure Access Control Server (ACS) is initiated in the case of machine or user authentication.
During user authentication, UserName@FullyQualifiedDomainName, anonymous@FullyQualifiedDomainName, or UserName are the credentials passed to ACS.
During machine authentication, HostName/FullyQualifiedDomainName is the credential passed to ACS.
System Requirements
CTA may be installed on Linux, Mac OS X, and Windows operating systems. The following sections describe the system requirements for each type of operating system.
System Requirements for Installations on Linux
Before installing Cisco Trust Agent on a Linux operating system, verify that the target system meets the requirements in the following table.
System Requirements for Installations on Mac OS X
Before installing Cisco Trust Agent on a Mac OS X operating system, verify that the target system meets the requirements in the following table.
System Requirements for Installation on Windows
Before installing Cisco Trust Agent on a Windows operating system, verify that the target system meets the requirements in the following table.
Note
CTA 2.1 does not support Windows NT 4.0 Server or Windows NT 4.0 Workstation. CTA 2.0 was the last release to support Windows NT 4.0.
Installation Notes
Chapter 2, Chapter 3, and Chapter 4 of the Administrator Guide for Cisco Trust Agent, Release Version 2.1 discuss installing Cisco Trust Agent on Linux, Mac OS X, and Windows platforms. These chapters refer to installation files such as cta-linux-2.1.x-0.i386.rpm, cta-darwin-2.1.x.0.dmg, and ctasetup-supplicant-win-2.1.x.0.msi. Any installation file in this format is referring to CTA release 2.1.103.0 installation files.
Obtaining the Latest Release of CTA
The latest release of Cisco Trust Agent 2.1 is version 2.1.103.0.
Table 6 lists the files used to install CTA 2.1 on the supported operating systems. See the Administrator Guide for Cisco Trust Agent, Release 2.1 for a complete description of content of the files and how they can be used in a CTA installation.
Upgrade Support
Cisco Trust Agent supports upgrade installations from versions 1.0, 2.0, 2.0.1, selective availability, and beta 2.1 releases to CTA 2.1.103.0.
The behavior of an upgrade reflects the kind of installation being used. If the upgrade is performed using an installation wizard, CTA 2.1.103.0 recognizes the previous installation of CTA and prompts users to upgrade. In the case of a silent installation, it is assumed that the user intends to perform an upgrade and the installation proceeds without prompting the user.
Note
When upgrading a version of CTA along with the CTA 802.1x Wired Client, to CTA 2.1 with the CTA 802.1x Wired Client, the computer is disconnected from the network at the end of the software upgrade process. The final step of the upgrade procedure is to reboot the computer; rebooting restores the network connection and it is a required step in the upgrade process.
In the case of a silent upgrade, administrators should use MSI commands which limit interruptions to users but still prompt users to reboot their computers at the end of the software upgrade.
There are different methods of upgrading CTA from version 1.0, 2.0, 2.0.1, and selective availability and beta versions to CTA 2.1.103.0. See Chapter 2 and Chapter 4 of the Administrator Guide for Cisco Trust Agent, Release 2.1, for information about upgrading previous versions of CTA for Linux and Windows to CTA 2.1.
Upgrading CTA 2.0 to CTA 2.1
This section describes upgrading CTA 2.0.0.30 to CTA 2.1.103.0.
Upgrading CTA without the CTA 802.1x Wired Client
Both Linux and Windows versions of CTA 2.0 without the CTA 802.1x Wired Client can be upgraded to CTA 2.1.
Upgrading CTA with the CTA 802.1x Wired Client
In order to upgrade from CTA 2.0 with the CTA 802.1x Wired Client to CTA 2.1 with the CTA 802.1x Wired Client, you need to uninstall CTA 2.0, delete the CTA 802.1x Wired Client directory, and then install CTA 2.1 from scratch.
If you attempt to directly upgrade CTA 2.0 with the CTA 802.1x Wired Client to CTA 2.1 with the CTA 802.1x Wired Client the CTA 802.1x Wired Client service fails to start and you will not be able to start the service manually.
To upgrade from CTA 2.0 with the CTA 802.1x Wired Client to CTA 2.1 with the CTA 802.1x Wired Client, follow this procedure:
Step 1
Uninstall CTA 2.0 using the procedure in "Uninstalling Cisco Trust Agent on Windows" in Chapter 4 of the Administrator Guide for Cisco Trust Agent, Release 2.1.
Step 2
Reboot the PC when prompted.
Step 3
Delete this directory and its contents:
\Program Files\Cisco Systems\Cisco Trust Agent 802_1x Wired Client
Step 4
Install CTA 2.1 from scratch using the methodology described in Chapter 4, "Installing the Cisco Trust Agent on Windows" in the Administrator Guide for Cisco Trust Agent, Release 2.1.
Step 5
Reboot the computer when prompted.
Note
The computer remains disconnected from the network until the computer is rebooted.
Upgrading from Selective Availability and Beta Releases to CTA 2.1
Some customers of Cisco's Network Admission Control program participated in testing "selective availability" releases and beta releases of CTA 2.1 to test its functionality in their NAC environments.
CTA builds, numbered 2.1.18.0, 2.1.100.0, 2.1.101.0, and 2.1.102.0 may be upgraded to CTA 2.1.103.0 without being uninstalled first. The certificates, third-party posture plugins, ctad.ini, ctalogd.ini, log files, and the deployment profile files remain in the directories in which they were installed and they are used by CTA 2.1.103.0.
Upgrading CTA without the CTA 802.1x Wired Client
You can upgrade from any of the CTA 2.1 selective availability or beta releases without the CTA 802.1x Wired Client to CTA 2.1.103.0 without the 802.1x Wired Client without having to uninstall CTA 2.1.x. Use the upgrade procedures in Chapter 2 or Chapter 4 of the Administrator Guide for Cisco Trust Agent, Release 2.1, to upgrade a Linux or Windows installation.
Upgrading CTA with the CTA 802.1x Wired Client
You can upgrade from any of the CTA 2.1 selective availability or beta releases with the CTA 802.1x Wired Client to CTA 2.1.103.0 with the 802.1x Wired Client, you can run the installation for the new version of CTA while the old version is still installed. At the end of the upgrade process, you must reboot the computer.
If you are upgrading from CTA 2.1.x with the CTA 802.1x Wired Client to CTA 2.1.103.0 with the CTA 802.1x Wired Client, the authentication profiles installed on the client used in CTA 2.1.x are compatible with CTA 2.1.103.0 and will remain in their directories through the upgrade process.
Note
At the end of the upgrade process the computer is disconnected from the network until the computer is rebooted.
Use any of the installation procedures in Chapter 4 of the Administrator Guide for Cisco Trust Agent, Release 2.1, to upgrade a Windows installation.
Known Defects in CTA 2.1 Posture Agent
This section describes problems known to exist in the posture agent of Cisco Trust Agent, Release 2.1. This section excludes defects of the 802.1x Wired Client component of CTA 2.1.
Note
A "—" in the Explanation column indicates that no information was available at the time of publication. You should check the Cisco Software Bug Toolkit for current information. To access the Cisco Software Bug Toolkit, go to http://www.cisco.com/pcgi-bin/Support/Bugtool/home.pl. (You will be prompted to log in to Cisco.com.)
Known Defects in CTA 802.1x Wired Client
These are the defects in the CTA 802.1x Wired Client that was released with CTA 2.1.103.0. The CTA 802.1x Wired Client may also be referred to as the "light supplicant" or "supplicant."
Closed and Resolved Defects in CTA
These are the groups of closed and resolved defects reported in these release notes:
•
Defects Closed or Resolved in CTA 2.1 Posture Agent
•
Defects Closed or Resolved in CTA 802.1x Wired Client
•
All Defects Closed or Resolved by CTA Release 2.0.1
Following the release of CTA 2.0 was CTA 2.0.1, which was a product release sent to a small group of customers.
Defects Closed or Resolved in CTA 2.1 Posture Agent
This section describes defects that were resolved by the selective availability, beta, and CTA 2.1.103.0 releases.
Defects Closed or Resolved in CTA 802.1x Wired Client
This section describes defects that were resolved in CTA 802.1x Wired Client released with the beta releases of CTA 2.1. This is new information for customers upgrading from CTA 2.0, CTA 2.0.1.14, and C.1.18.0 to CTA 2.1.103.0.
All Defects Closed or Resolved by CTA Release 2.0.1
This section describes defects that were resolved in CTA Release 2.0.1.14. For customers upgrading from CTA 2.0 to CTA 2.1, the information about these resolved bugs is new. Customers that installed CTA 2.0.1.14 have already been notified of these defect resolutions.
Table 11 Defects Closed or Resolved by CTA Release 2.0.1.14
Defect ID Headline DescriptionCSCef09817
Install does not complete if port conflict arises.
Symptom If there is a port conflict with CTA on Windows NT 4.0, during the CTA installation, the Cisco Trust Agent EOU Daemon service does not start, and the user is forced to cancel the installation. However, on Windows XP and Windows 2000 you will be able to finish the installation and see the port conflict error in the CTA log.
Conditions
Occurs on Windows NT.
Workaround
The port which CTA listened can be changed in the ctad.ini file. If the port is changed to a nonconflicting port then the install continues. To change the port number look up LocalPort in the CTA Administrators Guide.
Closure Comment This is a rare case where a port conflict will arise.
CSCsb67286
CTA does not respond to EOU hello from switch. Put in hold state.
Symptom CTA does not respond to an EAP over UDP hello from the switch. The switch port is put into the held state. This problem occurs even if the Windows XP firewall has been configured to allow traffic to CTA or has been configured to allow traffic over EAP over UDP.
At bootup, the Windows XP firewall loads a boot policy that blocks the EAPoverUDP traffic to CTA. The boot policy is loaded even if the firewall is disabled but the firewall service is still running.
This behavior occurs primarily at system boot up. You can read more about the Windows firewall at this article in the Microsoft Security Developer Center:
http://msdn.microsoft.com/security/productinfo/XPSP2/networkprotection/firewall.aspx.Conditions
Windows XP Service Pack 2 - Firewall service running.
Resolution Microsoft has supplied a hotfix to resolve this problem. See the Microsoft Knowledge Base article 917730 at http://support.microsoft.com/?kbid=917730 for complete instructions on how to download the hotfix and edit the registry to resolve this problem.
CSCsc43747
Fatal error displayed when uninstalling CTA.
Symptom The error dialog, Fatal[c0029]: Timed semaphore failed appears when uninstalling CTA.
Workaround
Ignore the error. It is a nonfatal dialog. It does not affect the uninstall.
Resolution Resolved in CTA Release 2.0.1.14.
CSCsc65502
Incorrect notification display for non-admin privilege user
Symptom The same notification message appears for a non-administrator user that earlier appeared for an administrator.
Conditions
An administrator logged onto a machine and was postured; later, a non-administrator user logs onto the same machine and (for whatever posture-related reason) should receive a different notification message.
Resolution The temporary HTML file for notification display is now stored in a new directory, \CiscoTrustAgent\ctamsg, and removed when done processing. This directory is set to read/write for all users.
CSCsd18654
Long login and eventual supplicant crash
Symptom User with CTA supplicant installed on Windows XP used to encounter the following:
1.
User entered their Windows domain credentials incorrectly at the Microsoft GINA window.
2.
After re-entering their domain credentials properly the second time, the machine took several minutes to logon to the machine and there was a supplicant crash/runtime error displayed.
3.
The 802.1x Wired client services did not start.
Resolution This defect has been resolved. The CTA 802.1x Wired Client no longer crashes after a long login period.
CSCsd33592
Scripts do not run and computer and user policies are not applied.
Symptom Startup scripts do not run and Group Policy Object (GPO) polices do not download.
The client machine would attempted to download the startup script and download GPOs before IEEE 802.1x authentication would complete. Because IEEE 802.1x was not complete, there would be no network connection, thus scripts and GPO policy downloads would fail.
Conditions
Client machine is connected to an Active Directory (AD) domain.
Resolution This defect has been resolved. IEEE 802.1x connection is properly achieved and startup scripts and GPO policies download correctly.
CSCsd47790
Supplicant loses association with the NIC
Symptom Supplicant loses association with the NIC.
Conditions
After re-authenticating many times the NIC may disappear from the supplicant list. This as been seen with short re-authentication timers, such as 5 minutes.
Resolution CTA 802.1x Wired Client no longer loses association with the NIC.
CSCsd47821
Supplicant crashes upon service shutdown
Symptom CTA 802.1x Wired Client crashed upon service shutdown
Conditions
System icon disappears from the tray.
1.
Login as local Admin
2.
Click on cancel when prompted for user credential (by default the supplicant is set for user authentication)
3.
Create a deployment profile
4.
Reboot
5.
Connection Client crashes on shutdown
Resolution CTA 802.1x Wired Client no longer crashes upon service shutdown.
CSCsd50977
Roaming profiles do not work unless supplicant is disabled
Symptom Roaming profile can not be saved or downloaded from windows active directory server when logging in or out of the domain.
If the AD username has been configured to use a roaming profile then CTA changes the local cached profile on the PC to a local profile. So this PC will not use the roaming profile anymore for this user.
Resolution Resolved in CTA release 2.0.1.14
CSCsd96348
CTA 802.1x Wired Client crashes with Novell's ZenWorks agent installed on PC
Symptom CTA 802.1x Wired Client in release 2.0.0.30 will crash with Novell's ZENWorks desktop agent installed on a Windows XP machine.
Resolution Resolved in CTA release 2.0.1.14
CSCse17576
CTA fatal error in PACTrust.cpp
Symptom When installing CTA agent for the first time, certain IBM laptops have problems with the posture-agent. There is a fatal error in the internal CTA code.
Conditions
New install of CTA. Trying to setup machine authentication for the first time, there is difficulty setting up the PAC the first time, CTA PAC process gets fatal error.
Resolution Now setting up machine authentication works correctly without fatal error.
Closed or Resolved Cisco Product Defects that Affected CTA Performance
This section contains defects in other Cisco NAC components that affect the performance of CTA.
Closed or Resolved NAC-Partner Defects that Affected CTA Performance
This section contains defects in third party NAC-partner products components that affect the performance of CTA.
Obtaining Documentation, Obtaining Support, and Security Guidelines
For information on obtaining documentation, obtaining support, providing documentation feedback, security guidelines, and also recommended aliases and general Cisco documents, see the monthly What's New in Cisco Product Documentation, which also lists all new and revised Cisco technical documentation, at:
http://www.cisco.com/en/US/docs/general/whatsnew/whatsnew.html
This document is to be used in conjunction with the documents listed in the Obtaining Documentation section.
CCDE, CCENT, Cisco Eos, Cisco Lumin, Cisco Nexus, Cisco StadiumVision, the Cisco logo, DCE, and Welcome to the Human Network are trademarks; Changing the Way We Work, Live, Play, and Learn is a service mark; and Access Registrar, Aironet, AsyncOS, Bringing the Meeting To You, Catalyst, CCDA, CCDP, CCIE, CCIP, CCNA, CCNP, CCSP, CCVP, Cisco, the Cisco Certified Internetwork Expert logo, Cisco IOS, Cisco Press, Cisco Systems, Cisco Systems Capital, the Cisco Systems logo, Cisco Unity, Collaboration Without Limitation, EtherFast, EtherSwitch, Event Center, Fast Step, Follow Me Browsing, FormShare, GigaDrive, HomeLink, Internet Quotient, IOS, iPhone, iQ Expertise, the iQ logo, iQ Net Readiness Scorecard, iQuick Study, IronPort, the IronPort logo, LightStream, Linksys, MediaTone, MeetingPlace, MGX, Networkers, Networking Academy, Network Registrar, PCNow, PIX, PowerPanels, ProConnect, ScriptShare, SenderBase, SMARTnet, Spectrum Expert, StackWise, The Fastest Way to Increase Your Internet Quotient, TransPath, WebEx, and the WebEx logo are registered trademarks of Cisco Systems, Inc. and/or its affiliates in the United States and certain other countries.
All other trademarks mentioned in this document or Website are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (0805R)