![]() |
Table Of Contents
Release Notes for Cisco Trust Agent, Release 2.1 Without Bundled Supplicant
Qualified Deployments of CTA 2.1
Obtaining Cisco Secure Services Client
System Requirements for Installations on Linux
System Requirements for Installations on Mac OS X
System Requirements for Installation on Windows
Operating System Requirements for Installation of SSC
Obtaining the Latest Release of CTA
CTA 2.1.1.03.0 Installation Files for Windows
Upgrading CTA for Mac OS X from 2.1.103.0 to 2.1.1.04.0
Migrating to CTA with Cisco Secure Services Client Requires Uninstallation and Reinstallation
Configuring Machine Authentication
CTA is No Longer Bundled with CSA
New Features Introduced in CTA 2.1
New Product Versioning Methodology
Single RPM Installation File for Linux Installations
Support for CTA on Mac OS X Operating Systems
Microsoft Windows Installer (MSI) Installation Files
New Configuration Options in CTA
Standardized Naming Convention for ctad.ini Template Files
New Naming Convention for ctalogd.ini Template File
Configuring User Notifications
Configuring CTA and Posture Plugin Interaction
Configuring Posture Plugin Message Size
Configuring CTA for Use with the Windows XP Firewall
Configuring Logging for Large Deployments
Host Posture Plugin Now Returns MAC Address
Package Information Returned by Host Posture Plugin For Mac OS X
New Features Introduced in CTA 2.0.1
Machine Authentication Methods
Authentication Using Machine Password
Known Defects in CTA 2.1 Posture Agent
Known Defects in CTA 802.1x Wired Client Which Remain In SSC
Closed and Resolved Defects in CTA
Defects Closed or Resolved in CTA 2.1 Posture Agent
Defects in CTA 802.1x Wired Client Resolved by Migrating to SSC
All Defects Closed or Resolved by CTA Release 2.0.1
Closed or Resolved Cisco Product Defects that Affected CTA Performance
Closed or Resolved NAC-Partner Defects that Affected CTA Performance
Obtaining Documentation, Obtaining Support, and Security Guidelines
Release Notes for Cisco Trust Agent, Release 2.1 Without Bundled Supplicant
Released for Use with Network Admission Control Framework 2.1
Revised: May 23, 2008
Contents
These release notes are for use with Cisco Trust Agent (CTA), Release 2.1. The following information is provided:
•
Cisco Trust Agent 2.1 Release
–
Qualified Deployments of CTA 2.1
–
Obtaining the CTA 2.1 Release
–
Obtaining Cisco Secure Services Client
–
System Requirements for Installations on Linux
–
System Requirements for Installations on Mac OS X
–
System Requirements for Installation on Windows
–
Operating System Requirements for Installation of SSC
•
Obtaining the Latest Release of CTA
–
CTA 2.1.1.03.0 Installation Files for Windows
–
Upgrading CTA for Mac OS X from 2.1.103.0 to 2.1.1.04.0
–
Migrating to CTA with Cisco Secure Services Client Requires Uninstallation and Reinstallation
–
Configuring Machine Authentication
–
CTA is No Longer Bundled with CSA
•
New Features Introduced in CTA 2.1
–
New Product Versioning Methodology
–
Single RPM Installation File for Linux Installations
–
Support for CTA on Mac OS X Operating Systems
–
Microsoft Windows Installer (MSI) Installation Files
–
New Configuration Options in CTA
•
New Features Introduced in CTA 2.0.1
–
Machine Authentication Methods
•
Known Defects in CTA 2.1 Posture Agent
•
Known Defects in CTA 802.1x Wired Client Which Remain In SSC
•
Closed and Resolved Defects in CTA
–
Defects Closed or Resolved in CTA 2.1 Posture Agent
–
Defects in CTA 802.1x Wired Client Resolved by Migrating to SSC
–
All Defects Closed or Resolved by CTA Release 2.0.1
•
Closed or Resolved Cisco Product Defects that Affected CTA Performance
•
Closed or Resolved NAC-Partner Defects that Affected CTA Performance
•
Obtaining Documentation, Obtaining Support, and Security Guidelines
Cisco Trust Agent 2.1 Release
The goals of Cisco Trust Agent, Release 2.1.103.0 for Linux and Windows operating systems and CTA 2.1.104.0 for Mac OS X, (referred to collectively as CTA 2.1) are to improve on the CTA 2.1.18.0 selective availability release by resolving outstanding product defects and to provide new functionality from that offered in the CTA 2.0.0.30 release. Cisco Trust Agent release 2.1 is an integral component of the Network Admission Control Framework 2.1 solution.
This offering of CTA 2.1.103.0 does not include a bundled supplicant, for Windows installations, as the previous offering of CTA 2.1.103.0 did. We recommend that customers who want to perform 802.1x authentication install the Cisco Secure Services Client, version 4.1.2 or later in addition to CTA 2.1.103.0.
Note
Cisco Secure Services Client (SSC) replaces the CTA 802.1x Wired Client as the preferred supplicant in a deployment of the NAC security solution. NAC is supported for use in a wired network environment.
Qualified Deployments of CTA 2.1
Cisco Trust Agent 2.1.103.0 for Linux and Windows operating systems and CTA 2.1.104.0 for Mac OS X, will be distributed to existing customers of CTA and those customers evaluating the NAC Framework 2.1 programs.
CTA 2.1 is not intended for distribution to new customers of CTA nor new customers of the NAC 2.1 Framework solution. New customers to CTA and NAC should work with their Cisco Account Team representative to evaluate their NAC Framework-qualified infrastructure and use-case scenarios.
We are making an extra effort to qualify our customers' infrastructure and goals to ensure that the components in their network are compatible with the NAC Framework, that their goals will be met by the NAC Framework, and that the deployment of the NAC Framework will be successful.
Obtaining the CTA 2.1 Release
CTA 2.1 is available for download in this location:
http://www.cisco.com/pcgi-bin/tablebuild.pl/cta
You must agree to the following terms before downloading Cisco Trust Agent Software Update (the "Software"):
In as much as this release of Cisco Trust Agent is intended for existing deployments, by clicking "Accept" below, in addition to any other license terms provided by Cisco with this Software, you on behalf of yourself and the organization you represent (collectively "You") agree to each of the following:
–
That You on behalf of yourself and the entity You represent already have Cisco Trust Agent installed and You will use this Cisco Trust Agent download (the "Software") only for the purpose of upgrading Your previously installed version of Cisco Trust Agent (which You are using in accordance with the Cisco license terms governing the previously installed version of Cisco Trust Agent).
–
You will keep this Software image confidential and will not provide it to any third party.
–
If you are unable to agree to the above terms of use do not download the Software. Please contact your Cisco account team for further assistance.
Obtaining Cisco Secure Services Client
SSC is available for download for registered users of Cisco.com. Follow this procedure to download Cisco Secure Services Client:
Step 1
Navigate to http://www.cisco.com and log on.
Step 2
Navigate to the SSC download area here: http://tools.cisco.com/support/downloads/go/Redirect.x?mdfid=280753707
Step 3
Click the link to Cisco Secure Client Services v4.0.
Step 4
Click the link for the Windows 2000 or Windows XP operating system.
Step 5
Click the link to version 4.1.2.
Step 6
Download these three objects for that release:
•
Release Notes for release 4.1.2
•
Cisco_SSC-XP2K-4_1_2_5929.msi
•
SSCAdminUtils_4.1.2.5928.zip
Product Versioning
The latest version of CTA for Windows and Linux platforms is CTA 2.1.103.0. The full release number is used in installation files names and in the text of the Administrator Guide for Cisco Trust Agent, Release 2.1, Without Bundled Supplicant and the Release Notes for Cisco Trust Agent, Release 2.1, Without Bundled Supplicant when it is important to distinguish the version of CTA being discussed. Any references in the documentation to CTA 2.1 are referring to CTA 2.1.103.0 unless otherwise noted.
The latest version of CTA for Mac OS X is CTA 2.1.104.0. The Administrator Guide for Cisco Trust Agent, Release 2.1, Without Bundled Supplicant has not been updated to reflect the latest version number of CTA for Mac OS X. Any references in the documentation to CTA 2.1 or CTA 2.1.103.0 for Mac OS X are referring to CTA 2.1.104.0 unless otherwise noted.
Related Documentation
Note
Although every effort has been made to validate the accuracy of the information in the printed and electronic documentation, you should also review Cisco Trust Agent documentation on Cisco.com for any updates.
You can find the documentation for Cisco Trust Agent, Release 2.1.103.0 by navigating Cisco.com starting at this link: http://www.cisco.com/en/US/products/ps5923/tsd_products_support_series_home.html. These are the documents that describe this offering of Cisco Trust Agent 2.1.103.0:
•
Migrating from CTA 802.1x Wired Client to Cisco Secure Services Client
•
Administrator Guide for Cisco Trust Agent, Release 2.1, Without Bundled Supplicant
•
Release Notes for Cisco Trust Agent, Release 2.1, Without Bundled Supplicant
You can find the documentation for Cisco Secure Services Client, Release 4.1.2 by navigating Cisco.com starting at this link: http://www.cisco.com/en/US/products/ps7034/tsd_products_support_series_home.html. These are the documents that describe Cisco Secure Services Client:
•
Cisco Secure Services Client Administrator Guide, for release 4.1.2.
•
Cisco Secure Services Client User Guide, for release 4.1.2.
•
Release Notes for Cisco Secure Services Client, for release 4.1.2.
For documentation of other Cisco Network Admission Control (NAC) Framework components follow this link http://www.cisco.com/en/US/netsol/ns617/networking_solutions_sub_solution_home.html.
System Requirements
CTA may be installed on Linux, Mac OS X, and Windows operating systems. The following sections describe the system requirements for each type of operating system.
System Requirements for Installations on Linux
Before installing Cisco Trust Agent on a Linux operating system, verify that the target system meets the requirements in the following table.
System Requirements for Installations on Mac OS X
Before installing Cisco Trust Agent on a Mac OS X operating system, verify that the target system meets the requirements in the following table.
System Requirements for Installation on Windows
Before installing Cisco Trust Agent on a Windows operating system, verify that the target system meets the requirements in the following table.
Note
CTA 2.1 does not support Windows NT 4.0 Server or Windows NT 4.0 Workstation. CTA 2.0 was the last release to support Windows NT 4.0.
Operating System Requirements for Installation of SSC
Table 4 summarizes the Windows operating systems on which SSC runs as well as the operating systems they have in common.
Note
See the Cisco Secure Services Client Administrator Guide for a complete list of operating systems that support SSC.
Table 4 SSC Operating System Requirements
Obtaining the Latest Release of CTA
The latest release of Cisco Trust Agent 2.1 for Linux and Windows operating systems is version 2.1.103.0. The latest release of Cisco Trust Agent 2.1 for Mac OS X operating systems is version 2.1.104.0.
Table 5 lists the files used to install CTA 2.1 on the supported operating systems. See the Administrator Guide for Cisco Trust Agent, Release 2.1, Without Bundled Supplicant for a complete description of content of the files and how they can be used in a CTA installation.
Installation Notes
Chapter 2, Chapter 3, and Chapter 4 of the Administrator Guide for Cisco Trust Agent, Release Version 2.1 discuss installing Cisco Trust Agent on Linux, Mac OS X, and Windows platforms. These chapters refer to installation files such as cta-linux-2.1.x-0.i386.rpm, cta-darwin-2.1.x.0.dmg, and ctasetup-win-2.1.x.0.msi. Installation files in this format are referring to CTA release 2.1.103.0 for Linux and Windows and release 2.1.104.0 for Mac OS X.
CTA 2.1.1.03.0 Installation Files for Windows
In this offering of CTA 2.1.103.0, there is one installation file: CtaAdminEx-win-2.1.103.0.exe. This contains the ctasetup-win-2.1.103.0.msi file which allows administrators to accept the end user license agreement and install CTA 2.1.103.0. CtaAdminEx-win-2.1.103.0.exe does not contain CTA 802.1x Wired Client or Cisco Secure Services Client.
In the previous offering of CTA 2.1.103.0, there was an additional installation file: CtaAdminEx-supplicant-win-2.1.103.0.exe. This file allowed an administrator to install the CTA 802.1x Wired Client as well as CTA. CtaAdminEx-supplicant-win-2.1.103.0.exe is not being available in this offering of CTA 2.1.103.0.
When migrating from the CTA 802.1x Wired Client to Cisco Secure Services Client, you must uninstall CTA 2.1.103.0 and the CTA 802.1x Wired Client first and then re-install CTA 2.1.103.0 alone using the CtaAdminEx-win-2.1.103.0.exe file.
Upgrade Support
Cisco Trust Agent supports upgrade installations from versions 1.0, 2.0, 2.0.1, selective availability, and beta 2.1.x releases to CTA 2.1.103.0.
The behavior of an upgrade reflects the kind of installation being used. If the upgrade is performed using an installation wizard, CTA 2.1.103.0 recognizes the previous installation of CTA and prompts users to upgrade. In the case of a silent installation, it is assumed that the user intends to perform an upgrade and the installation proceeds without prompting the user.
Note
When upgrading a version of CTA along with the CTA 802.1x Wired Client, to CTA 2.1.103.0 with the Cisco Secure Services Client, the computer is disconnected from the network at the end of the uninstallation of CTA and CTA 802.1x Wired Client. Rebooting restores the network connection and it is a required step in the uninstallation process. Likewise, at the end of the installation of Cisco Secure Services Client a reboot is required to restore the network connection and complete the installation process.
In the case of a silent upgrade, administrators should use MSI commands which limit interruptions to users but still prompt users to reboot their computers at the end of the software upgrade.
There are different methods of upgrading CTA from version 1.0, 2.0, 2.0.1, and 2.1.x versions of CTA to CTA 2.1.103.0. See Chapter 2 and Chapter 4 of the Administrator Guide for Cisco Trust Agent, Release 2.1, Without Bundled Supplicant, for information about upgrading previous versions of CTA for Linux and Windows to CTA 2.1.
Upgrading CTA for Mac OS X from 2.1.103.0 to 2.1.1.04.0
Cisco Trust Agent supports upgrade installations from version CTA 2.1.103.0 to CTA 2.1.104.0. During the upgrade, the certificates, third-party posture plugins, ctad.ini, the ctalogd.ini, and log files remain in the directories in which they were installed by CTA 2.1.103.0. If CTA 2.1.104.0 is installed in a custom package which includes new certificates, third-party posture plugins, ctad.ini, or ctalogd.ini files, the new objects will overwrite the old objects if they have the same name.
To upgrade CTA 2.1.103.0 to CTA 2.1.104.0, use the instructions for installing CTA in Chapter 3 of the Administrator Guide for Cisco Trust Agent, Release 2.1 and simply install CTA 2.1.104.0 over CTA 2.1.103.0 while it is running.
CTA 2.1 Product Limitations
Review these limitations of CTA 2.1 before installing or upgrading to the release of CTA 2.1.103.0.
Migrating to CTA with Cisco Secure Services Client Requires Uninstallation and Reinstallation
Migrating from CTA with the CTA 802.1x Wired Client to CTA 2.1.103.0 with Cisco Secure Services Client requires you to uninstall CTA and the CTA 802.1x Wired Client then reinstall CTA 2.1.103.0 and install Cisco Secure Services Client.
Configuring Machine Authentication
Cisco Trust Agent 2.1 supports machine authentication. However, you should be aware of these caveats when planning the deployment of machine authentication in your NAC environment:
•
Some applications may not be appropriate choices to provide posture credentials during machine authentication. Such applications may be slow to start, for example, and they will not be ready to provide posture credentials immediately for machine authentication.
In this case, machine authentication could fail, not because of a security problem but because the application was not available to provide its posture credentials in time.
•
In order to perform machine authentication, the EAP-FAST Configuration in ACS must allow machine authentication.
•
Machine authentication can be performed on networks where Windows Active Directory is in use.
Windows NT is Not Supported
CTA 2.1 does not support Windows NT 4.0 Server or Windows NT 4.0 Workstation.
CTA is No Longer Bundled with CSA
In the past, CTA installation files have been distributed along with Cisco Security Agent (CSA). This allowed CTA to be distributed in Agent Kits produced and managed by the Cisco Security Agent Management Center. Though CTA may still be incorporated in an Agent Kit and distributed through CSA MC, the CTA installation files are no longer included in CSA distributions.
The CSA 5.1.0.88 and 5.0.0.205 hotfixes have removed all CTA installation files.
Customers who want to distribute CTA through an Agent Kit may do so by downloading the CTA software separately and following the instructions in Appendix B of the Administrator Guide for Cisco Trust Agent, Release 2.1, Without Bundled Supplicant.
New Features Introduced in CTA 2.1
The following sections describe the new features available in Cisco Trust Agent, Release 2.1.
New Product Versioning Methodology
In previous releases of CTA, including the beta delivery of CTA 2.1, CTA product versions were expressed using a four field number; for example, CTA 2.1.0.10 was the product version of a beta release of CTA 2.1. The fields in the version number represent this information:
[Major Version].[Minor Version].[Maintenance Version].[Build Version].
Microsoft Installer (.msi) files are now used to install CTA on Windows operating systems. The Microsoft Installer expects a three field product version number and ignores the fourth field. This would prevent an upgrade of CTA from a release numbered CTA 2.1.0.10 to CTA 2.1.0.103. Microsoft Installer would see these two product builds as identical.
To accommodate the Microsoft Installer files, the product's version number is now represented by a four field number where the first three fields are significant and the last is populated with a zero.
[Major Version].[Minor Version].[Build Version].[0]
Using this new system, CTA can be upgraded from releases CTA 2.1.0.10, CTA 2.1.18.0, or CTA 2.1.100.0, to CTA 2.1.103.0 without uninstalling the previous release.
This numbering system is used in the file naming conventions for the installation files of CTA on all operating systems.
Single RPM Installation File for Linux Installations
The installation files for CTA for Linux are contained in the ctaadminex-linux-2.1.103-0.tar.gz file which can be downloaded from Cisco.com. After downloading the ctaadminex-linux-2.1.103-0.tar.gz file, the administrator uncompress the file and runs the ctaadminex-linux-2.1.103-0.sh file to accept the license agreement and extract the cta-linux-2.1.103-0.i386.rpm. The cta-linux-2.1.103-0.i386.rpm file is then used to install CTA for Linux using standard RPM commands.
The CTA Scripting Interface feature is now installed by default on Linux platforms. There is no CTA 802.1x Wired Client for use with Linux platforms.
Support for CTA on Mac OS X Operating Systems
Cisco Trust Agent, with its standard features and the optional Scripting Interface feature, is now available for installation on Mac OS X operating systems. Cisco Secure Services Client is not available for the Mac OS X operating system.
Microsoft Windows Installer (MSI) Installation Files
You can download CtaAdminEx-win-2.1.103.0.exe to install CTA on Windows operating systems. CtaAdminEx-win-2.1.103.0.exe contains the CTA end-user license agreement (EULA) and the ctasetup-win-2.1.103.0.msi installation file.
After running the CtaAdminEx-win-2.1.103.0.exe file, the administrator accepts the EULA for all users and the ctasetup-win-2.1.103.0.msi is extracted to the same directory as the CtaAdminEx-win-2.1.103.0.exe file. You use the ctasetup-win-2.1.103.0.msi file to install CTA using standard MSI commands.
You can use the ctasetup-win-2.1.103.0.msi file to install the CTA Scripting Interface feature, however, you can not use the file to install the 802.1x Wired Client feature.
Note
Previously the scripting interface feature could be enabled using the "/si" argument. Now that the installation files uses standard MSI commands, the /si argument is no longer used. See, the Administrator Guide for Cisco Trust Agent, Release 2.1, Chapter 4, "Installing Optional Features During CTA Installation" for the new commands used to install these features.
Note
CtaAdminex-supplicant-win-2.1.103.0.exe contained CTA 2.1.103.0 and the CTA 802.1x Wired Client. This installation file is no longer provided beginning with this offering of CTA 2.1.103.0.
New Configuration Options in CTA
Standardized Naming Convention for ctad.ini Template Files
The names of the template files used to create ctad.ini files have been standardized across all platforms. The new name for the file is ctad-temp.ini on all operating systems.
New Naming Convention for ctalogd.ini Template File
The names of the template file one could use to create the ctalogd.ini file has been changed to reflect a new file-naming convention in configuration files. The new name of the template file used to create the ctalogd.ini is ctalogd-temp.ini.
Configuring User Notifications
The user notification parameters are configured in the ctad.ini file. See the Administrator Guide for Cisco Trust Agent, Release 2.1, Without Bundled Supplicant, Chapter 5, "Configuring User Notifications" for more information about these and other notification parameters.
UserActionDelayTimeout
The UserActionDelayTimeout parameter allows you to delay the launch of the browser window so that the host has more time to obtain an IP address. This parameter was added to the ctad.ini file because if the browser that displays the posture message is launched before the host obtains an IP address, the browser will fail to open the URL contained in the posture message This feature is available on Linux, Mac OS X, and Windows operating systems.
EnableLogonNotifies
The behavior of the EnableLogonNotifies parameter is now the same on all operating systems. The parameter enables or disables user notification received before the user is logged on. User notifications received before the user is logged on can be saved or discarded.
LogonMsgTimeout
The behavior of the LogonMsgTimeout parameter is now the same on all operating systems. The default value of the parameter on all operating systems is 86,400 seconds. The parameter specifies how long, in seconds, a message is saved when no user is logged on and when EnableLogonNotifies enabled.
Configuring CTA and Posture Plugin Interaction
CTA and the posture plugins interact for the transfer of posture data, posture notifications, and status updates. Two new parameters, PPInterfaceType and PPWaitTimeout, are used together to determine how CTA interacts with the plugins and how long the interaction with all plugins lasts.
See the Administrator Guide for Cisco Trust Agent, Release 2.1, Without Bundled Supplicant, Chapter 5, "Configuring CTA and Posture Plugin Interaction." for a complete explanation of these parameters and how to configure them.
This feature is available for Linux, Mac OS X, and Windows operating systems.
Configuring Posture Plugin Message Size
By default, plugins are permitted to provide 1024 bytes (1KB) of information to CTA. This number can be increased to allow all plug-ins to provide up to 6KB of information. PPMsgSize is the parameter in the ctad.ini file which you use to configure the plugin message size.
You can also create an application-specific posture plugin message size by adding the PluginName_PPMsgSize parameter to the ctad.ini file. This parameter allows you to define a posture message size for a specific plugin.
Note
If there is a Symantec posture plugin installed on the client, the ctad.ini file must be configured in one of two ways:
•
PPMsgSize must be set to 1024 bytes.
•
The Symantec posture plugin must use an application-specific posture plugin set to 1024 bytes.
See, the Administrator Guide for Cisco Trust Agent, Release 2.1, Without Bundled Supplicant, Chapter 5, "Configuring the Posture Plugin Message Size" for a complete explanation of this parameter and how to configure it.
This feature is available for Linux, Mac OS X, and Windows operating systems.
Configuring CTA for Use with the Windows XP Firewall
The BootTimeUDPExemptions parameter alters the Windows XP Firewall policy and enables CTA to receive packets when the Windows XP SP2 or SP3-based computer is booting.
By enabling BootTimeUDPExemptions you alter the Windows XP Firewall setting by adding CTA's local EAPoUDP port to the Windows XP Firewall boot time UDP exemptions policy. This enables CTA to communicate with ACS over the network.
Note
Use of the BootTimeUDPexemptions parameter is relevant only when used in conjunction with Microsoft's hot fix for Windows XP (KB17730)
See Administrator Guide for Cisco Trust Agent, Release 2.1, Without Bundled Supplicant, Chapter 5, "ctad.ini Configuration Parameters" for more information about this parameter and how to configure it.
Configuring Logging for Large Deployments
A procedure has been added to the Administrator Guide for Cisco Trust Agent, Release 2.1, Without Bundled Supplicant that describes how to configure CTA logging for a large deployment. A sample ctalogd-temp.ini file has also been provided.
See the Administrator Guide for Cisco Trust Agent, Release 2.1, Without Bundled Supplicant, Chapter 6, "Configuring CTA Logging for Large Deployments for the procedure.
New Posture Plugin Features
The features in this section are described in the Administrator Guide for Cisco Trust Agent, Release 2.1, Without Bundled Supplicant, Chapter 7, "Posture Plugins."
Host Posture Plugin Now Returns MAC Address
The Host Posture Plugin reports basic information about the client running CTA to the ACS. With the release of CTA 2.1, the Host Posture Plugin can now return the MAC address of the client running CTA, provided that the MacAddress attribute has been added to the Posture-Validation Attribute Definition File employed by the ACS CSUtil database utility. (For more information about the ACS CSUtil database utility and the Posture-Validation Attribute Definition File, see the User Guide for Cisco Secure ACS for Windows Server.)
The attribute information for MacAddress is below.
[attr#n]
vendor-id=9vendor-name=Ciscoapplication-id=2application-name=Hostattribute-id=00009attribute-name=MacAdressattribute-profile=inattribute-type=stringThe plugin will return all the MAC addresses available on the client running CTA and combine them into one string; the MAC addresses will be separated by pipes ( | ). For example, a wireless network card and a wired network card will each return a MAC address.
If you are defining a posture validation rule in ACS based on only one of these MAC addresses, the posture attribute should "contain" the MAC address you are verifying rather than "equal" or "start with" the MAC address you are verifying.
This feature is available for Linux, Mac OS X, and Windows operating systems.
Package Information Returned by Host Posture Plugin For Mac OS X
For Mac OS X, there are two types of applications that are of concern to CTA: system applications which have receipts in /Library/Receipts/ and user applications which are installed in /Applications directory.
System applications are identified by the first level folder name under /Library/Receipts, like "Danish.pkg", "X11SDK.pkg". User applications are identified by the application name under /Applications directory as displayed in Finder. For example, "Firefox", "DVD\ Player".
The applications located in the subfolders of /Applications directory can also be queried, in these cases the package name looks like the relative path to /Applications. For example, "Utilities/Disk\ Utility", "Zinio/Zinio\ Reader".
Note
White spaces in package names must be escaped with backslash ("\").
The version information of system applications is parsed out of the Contents/version.plist file under the package's directory under the /Library/Receipts directory. Version information is in the form of "a.b.c.d". The first three fields of version are from the CFBundleShortVersionString key, and the fourth field is from SourceVersion key. For user application packages, the version information is retrieved from the Info.plist file under the Contents/ directory in the application's directory. We first look for the value of CFBundleShortVersionString key. If this key is not present we will return the value of CFBundleVersion key. If both keys are missing no information will be returned for the package.
New Features Introduced in CTA 2.0.1
The following sections describe the new features that were introduced in Cisco Trust Agent, Release 2.0.1.
CTA 2.0.1 was released only for Windows XP operating systems. The changes and features delivered in CTA 2.0.1 are available in Cisco Trust Agent 2.1.
Machine Authentication Methods
Authentication Using Machine Password
Starting in Cisco Trust Agent Release 2.0.1, machine authentication can occur during the boot up process. This is controlled by whether the "use machine credentials" button in the Station Policy dialog box is checked or unchecked. If the "use machine credentials" button is checked, then machine authentication is performed in place of user context authentication and one of the three machine credential types is passed.
There are different types of machine credentials:
•
Machine certificate (This is an existing feature.)
•
Machine PAC (This is an existing feature.)
•
Machine Password (This is a new feature.)
CTA 2.1 supports using the machine password whenever machine context authentication is done. A benefit of this method is that a certificate infrastructure is not needed.
See "Deploying End User 802.1x Wired Clients" in Chapter 11 of the Administrator Guide for Cisco Trust Agent, Release 2.1, Without Bundled Supplicant for more information.
Machine Authentication Only
Either of these machine credentials can be used for machine authentication only:
•
Machine certificate
•
Machine password
See "Deploying End User 802.1x Wired Clients" in Chapter 11 of the Administrator Guide for Cisco Trust Agent, Release 2.1, Without Bundled Supplicant for more information.
Known Defects in CTA 2.1 Posture Agent
This section describes problems known to exist in the posture agent of Cisco Trust Agent, Release 2.1.
Note
A "—" in the Explanation column indicates that no information was available at the time of publication. You should check the Cisco Software Bug Toolkit for current information. To access the Cisco Software Bug Toolkit, go to http://www.cisco.com/pcgi-bin/Support/Bugtool/home.pl. (You will be prompted to log in to Cisco.com.)
Known Defects in CTA 802.1x Wired Client Which Remain In SSC
This section describes the defects reported in CTA 802.1x Wired Client which are also in Cisco Secure Client Services 4.1.2.5929. These defects will be addressed in a future release of SSC.
Closed and Resolved Defects in CTA
These are the groups of closed and resolved defects reported in these release notes:
•
Defects Closed or Resolved in CTA 2.1 Posture Agent
•
Defects in CTA 802.1x Wired Client Resolved by Migrating to SSC
•
All Defects Closed or Resolved by CTA Release 2.0.1
Following the release of CTA 2.0 was CTA 2.0.1, which was a product release sent to a small group of customers.
Defects Closed or Resolved in CTA 2.1 Posture Agent
This section describes defects that were resolved by the selective availability, beta, and CTA 2.1.103.0 releases.
Table 10 Defects Closed or Resolved in the CTA Posture Agent
Defect ID Headline DescriptionCSCsb09542
With EnableLogonNotifies=1, strange results during logon and logoff
Symptom During login on Windows XP machines, there are conditions where the network authentication will occur while the system is still initializing its screens. It will cause a failure to correctly "paint" the notification box. It will not affect the connectivity of the network. However, it will require the user to press Enter if this happens.
Conditions
EnableLogonNotifies must be enabled in the ctad.ini file. (ex: EnableLogonNotifies=1). You must have a notification message configured in the ACS. This error will occur at random (based on timing conditions).
Resolution Resolved in CTA Release 2.1.100.0
CSCsd43949
Posture notification not displaying after 802.1x authentication/posture
Symptom After entering the Windows domain and the supplicant user credentials, the user is authenticated. The "healthy" posture notification is never displayed on the user's desktop.
Conditions
The host machine has 802.1x Wired Client installed. While the machine is being rebooted, machine authentication occurs before the user logon processing completes. The "EnableLogonNotifies" setting is disabled.
Resolution EnableLogonNotifies is now enabled by default. The notification received before logon will be displayed after the logon processing is complete. Resolved in CTA Release 2.1.100.0
CSCse02440
Ctacert /add command needs better error codes
Symptom This is a feature request and not a direct report of a defect. CTACert /add needs more robust error handling / error reporting. Specifically, if the certificate being imported already exists in the user's Trusted Root Certificate Authority, it will state a generic error message that the certificate failed to import - and it will fail to import the certificate into any of the other stores. We need to be able to either: - Report that the certificate already exists in the store and (ideally) which store it is already present in or - In the case of the certificate already existing in the store bypass that store and move on to the next Trusted Root Certificate Authority store.
Conditions
Any error condition encountered produces the same error message. Note that using ctacert without any options at all produces the same error message.
Resolution Resolved in CTA Release 2.1.100.0
•
Enhanced the CTA Certificate utility to being more user-friendly by adding a new usage/help popup.
•
Added more robust error reporting into application. When the utility is complete we now display a detailed break down of files imported and import status with any potential error message/return codes.
•
In addition to the modification to display import status, a trace log is now created to log detailed information in regards to certificates and error returns. This log is stored in the %TEMP% and is called "CtaCertTrace.Log"
CSCse23586
ctaeou stops responding to NAD
Symptom CTA EOU Daemon stops responding to a layer 3 network access device.
Conditions
Layer 3 posture is used and the collection of posture data takes unusually long which causes Cisco Trust Agent EOU Daemon server to timeout on the posture response. After many such failures, CTA EOU Daemon stops responding to the network access device.
Resolution Resolved in CTA Release 2.1.100.0
CSCse27560
CTA should not remove 802.1x Wired Clients files during install/upgrade
Symptom When installing or upgrading to a new version of the Cisco 802.1x Wired Client feature, the CTA package took care to remove the contents of the following Cisco Trust Agent Wired 802.1x Clients directories \Program Files\Cisco Systems \Cisco Trust Agent 802_1x Wired Client\. This was done because the 802.1x Wired Client profiles for CTA 2.0 were not compatible with CTA 2.1.
Conditions
All.
Resolution This issue has since been fixed in the 4.0.5 builds of the CTA 802.1x Wired Client. To resolve this bug the CTA package will no longer remove the wired CTA 802.1x Wired Client directories during an install. Resolved in CTA Release 2.1.100.0
CSCse50876
Scripting interface not registering posture data file
Symptom Customer posture information is not being sent via the scripting interface to ACS.
Conditions
The "VendorIDName= Cisco Systems" field is missing in the scripting interface .inf file, and/or the .inf or posture data file is not a plaintext file.
Resolution Added the "VendorIDName=Cisco Systems" field to the description of the Information file in Administrator Guide for Cisco Trust Agent, Release 2.1, Without Bundled Supplicant and made clear that the information file must be a plain text file. Resolved in CTA Release 2.1.100.0
CSCse76333
EapHandlePacket Error
Symptom Although very rare, CTA Posture Server Daemon intermittently fails to return the posture data.
Conditions
No posture data is returned from CTA and an "EapHandlePacket Error" entry is logged in the CTA log.
Resolution Resolved in CTA Release 2.1.100.0
CSCse90646
ctacert.exe fails on some installations
Symptom Ctacert.exe fails to import a known good certificate on some CTA installs.
Conditions
This has been noticed most on Windows 2000 installations of CTA.
Workaround
Install the certificate directly into the the local certificate store using Internet Explorer, Microsoft Management Console, or the ctaCert utility. See the Administrator Guide for Cisco Trust Agent, Release 2.1, Without Bundled Supplicant for more information about the ctaCert utility.
Closure comment This defect was closed because it was unreproducable. Closed in CTA Release 2.1.100.0
CSCsf16515
hostpp on XP spk1 installed causes ctad.exe to take 100% CPU
Symptom ctad.exe for CTA 1.0.55 spikes to 100%
Conditions
One must have XP spk1, cta 1.0.55 with the hostpp, and the CSA (since the CSA actually installs the hostpp). The spike only occurs when one connects via VPN (thus causing a posture request.
Resolution ctad.exe for CTA 1.0.55 and CTA 2.1 no longer spike CPU to 100%. Resolved in CTA Release 2.1.100.0
CSCsg08595
Browser auto-launch does not work with default timer with 802.1x authentication.
Symptom Browser auto-launch feature may not work with the default timers set.
Conditions
After a 802.1x authentication, a DHCP address may be delayed getting to a client and the network may not be available to launch the browser and connect to a particular web site designated by an administrator.
Resolution The default value of this parameter was increased to 25 seconds. This was resolved in CTA build 2.1.102.0
CSCsg23794
802.1x wired client Clear Credentials button not documented in Administrator Guide for Cisco Trust Agent, Release 2.1.
Symptom The Administrator Guide for Cisco Trust Agent, Release 2.1 does not explain the functionality of the Clear Credentials button in the Network Configuration Summary window of the 802.1x Wired Client user interface.
Conditions
All.
Resolution Resolved in CTA Release 2.1.100.0. See Chapter 9 of the Administrator Guide for Cisco Trust Agent, Release 2.1, Without Bundled Supplicant, for more information on this feature.
CSCsg94979
Remote Desktop issue with machine state
Symptom When RDP session is started the machine state reported to ACS changes to booting.
Conditions
Upon starting a RDP session. Reported in CTA 2.1.100.0
Resolution Resolved in CTA Release 2.1.101.0
CSCsh30297
Security vulnerability while launching a process
This defect reports a product security vulnerability and has been evaluated by Cisco's Product Security Incidence Response Team (PSIRT). This defect has been resolved. Registered users of Cisco.com can read an explanation of the defect and of the security vulnerability at this location:
http://www.cisco.com/warp/public/707/cisco-sa-20070221-supplicant.shtml
CSCsi58799
Mac OS X CTA displays notification in administrator context before user logs in
Symptom This defect reports a product security vulnerability and has been evaluated by Cisco's Product Security Incidence Response Team (PSIRT). This defect has been resolved. Registered users of Cisco.com can read an explanation of the defect and of the security vulnerability at this location:
http://www.cisco.com/warp/public/707/cisco-sr-20070611-cta.shtml
Defects in CTA 802.1x Wired Client Resolved by Migrating to SSC
These are the defects in the CTA 802.1x Wired Client that was bundled and released with the previous offering of CTA 2.1.103.0.
These defects are not present in Cisco Secure Services Client, 4.1.2.5929. By migrating to SSC, you can avoid working around these known problems of CTA 802.1x Wired Client.
All Defects Closed or Resolved by CTA Release 2.0.1
This section describes defects that were resolved in CTA Release 2.0.1.14. For customers upgrading from CTA 2.0 to CTA 2.1, the information about these resolved bugs is new. Customers that installed CTA 2.0.1.14 have already been notified of these defect resolutions.
Table 12 Defects Closed or Resolved by CTA Release 2.0.1.14
Defect ID Headline DescriptionCSCef09817
Install does not complete if port conflict arises.
Symptom If there is a port conflict with CTA on Windows NT 4.0, during the CTA installation, the Cisco Trust Agent EOU Daemon service does not start, and the user is forced to cancel the installation. However, on Windows XP and Windows 2000 you will be able to finish the installation and see the port conflict error in the CTA log.
Conditions
Occurs on Windows NT.
Workaround
The port which CTA listened can be changed in the ctad.ini file. If the port is changed to a nonconflicting port then the install continues. To change the port number look up LocalPort in the CTA Administrators Guide.
Closure Comment This is a rare case where a port conflict will arise.
CSCsb67286
CTA does not respond to EOU hello from switch. Put in hold state.
Symptom CTA does not respond to an EAP over UDP hello from the switch. The switch port is put into the held state. This problem occurs even if the Windows XP firewall has been configured to allow traffic to CTA or has been configured to allow traffic over EAP over UDP.
At bootup, the Windows XP firewall loads a boot policy that blocks the EAPoverUDP traffic to CTA. The boot policy is loaded even if the firewall is disabled but the firewall service is still running.
This behavior occurs primarily at system boot up. You can read more about the Windows firewall at this article in the Microsoft Security Developer Center:
http://msdn.microsoft.com/security/productinfo/XPSP2/networkprotection/firewall.aspx.Conditions
Windows XP Service Pack 2 - Firewall service running.
Resolution Microsoft has supplied a hotfix to resolve this problem. See the Microsoft Knowledge Base article 917730 at http://support.microsoft.com/?kbid=917730 for complete instructions on how to download the hotfix and edit the registry to resolve this problem.
CSCsc43747
Fatal error displayed when uninstalling CTA.
Symptom The error dialog, Fatal[c0029]: Timed semaphore failed appears when uninstalling CTA.
Workaround
Ignore the error. It is a nonfatal dialog. It does not affect the uninstall.
Resolution Resolved in CTA Release 2.0.1.14.
CSCsc65502
Incorrect notification display for non-admin privilege user
Symptom The same notification message appears for a non-administrator user that earlier appeared for an administrator.
Conditions
An administrator logged onto a machine and was postured; later, a non-administrator user logs onto the same machine and (for whatever posture-related reason) should receive a different notification message.
Resolution The temporary HTML file for notification display is now stored in a new directory, \CiscoTrustAgent\ctamsg, and removed when done processing. This directory is set to read/write for all users.
CSCsd18654
Long login and eventual supplicant crash
Symptom User with CTA supplicant installed on Windows XP used to encounter the following:
1.
User entered their Windows domain credentials incorrectly at the Microsoft GINA window.
2.
After re-entering their domain credentials properly the second time, the machine took several minutes to logon to the machine and there was a supplicant crash/runtime error displayed.
3.
The 802.1x Wired client services did not start.
Resolution This defect has been resolved. The CTA 802.1x Wired Client no longer crashes after a long login period.
CSCsd33592
Scripts do not run and computer and user policies are not applied.
Symptom Startup scripts do not run and Group Policy Object (GPO) polices do not download.
The client machine would attempted to download the startup script and download GPOs before IEEE 802.1x authentication would complete. Because IEEE 802.1x was not complete, there would be no network connection, thus scripts and GPO policy downloads would fail.
Conditions
Client machine is connected to an Active Directory (AD) domain.
Resolution This defect has been resolved. IEEE 802.1x connection is properly achieved and startup scripts and GPO policies download correctly.
CSCsd47790
Supplicant loses association with the NIC
Symptom Supplicant loses association with the NIC.
Conditions
After re-authenticating many times the NIC may disappear from the supplicant list. This as been seen with short re-authentication timers, such as 5 minutes.
Resolution CTA 802.1x Wired Client no longer loses association with the NIC.
CSCsd47821
Supplicant crashes upon service shutdown
Symptom CTA 802.1x Wired Client crashed upon service shutdown
Conditions
System icon disappears from the tray.
1.
Login as local Admin
2.
Click on cancel when prompted for user credential (by default the supplicant is set for user authentication)
3.
Create a deployment profile
4.
Reboot
5.
Connection Client crashes on shutdown
Resolution CTA 802.1x Wired Client no longer crashes upon service shutdown.
CSCsd50977
Roaming profiles do not work unless supplicant is disabled
Symptom Roaming profile can not be saved or downloaded from windows active directory server when logging in or out of the domain.
If the AD username has been configured to use a roaming profile then CTA changes the local cached profile on the PC to a local profile. So this PC will not use the roaming profile anymore for this user.
Resolution Resolved in CTA release 2.0.1.14
CSCsd96348
CTA 802.1x Wired Client crashes with Novell's ZenWorks agent installed on PC
Symptom CTA 802.1x Wired Client in release 2.0.0.30 will crash with Novell's ZENWorks desktop agent installed on a Windows XP machine.
Resolution Resolved in CTA release 2.0.1.14
CSCse17576
CTA fatal error in PACTrust.cpp
Symptom When installing CTA agent for the first time, certain IBM laptops have problems with the posture-agent. There is a fatal error in the internal CTA code.
Conditions
New install of CTA. Trying to setup machine authentication for the first time, there is difficulty setting up the PAC the first time, CTA PAC process gets fatal error.
Resolution Now setting up machine authentication works correctly without fatal error.
Closed or Resolved Cisco Product Defects that Affected CTA Performance
This section contains defects in other Cisco NAC components that affect the performance of CTA.
Closed or Resolved NAC-Partner Defects that Affected CTA Performance
This section contains defects in third party NAC-partner products components that affect the performance of CTA.
Obtaining Documentation, Obtaining Support, and Security Guidelines
For information on obtaining documentation, obtaining support, providing documentation feedback, security guidelines, and also recommended aliases and general Cisco documents, see the monthly What's New in Cisco Product Documentation, which also lists all new and revised Cisco technical documentation, at:
http://www.cisco.com/en/US/docs/general/whatsnew/whatsnew.html
CCDE, CCENT, Cisco Eos, Cisco Lumin, Cisco Nexus, Cisco StadiumVision, the Cisco logo, DCE, and Welcome to the Human Network are trademarks; Changing the Way We Work, Live, Play, and Learn is a service mark; and Access Registrar, Aironet, AsyncOS, Bringing the Meeting To You, Catalyst, CCDA, CCDP, CCIE, CCIP, CCNA, CCNP, CCSP, CCVP, Cisco, the Cisco Certified Internetwork Expert logo, Cisco IOS, Cisco Press, Cisco Systems, Cisco Systems Capital, the Cisco Systems logo, Cisco Unity, Collaboration Without Limitation, EtherFast, EtherSwitch, Event Center, Fast Step, Follow Me Browsing, FormShare, GigaDrive, HomeLink, Internet Quotient, IOS, iPhone, iQ Expertise, the iQ logo, iQ Net Readiness Scorecard, iQuick Study, IronPort, the IronPort logo, LightStream, Linksys, MediaTone, MeetingPlace, MGX, Networkers, Networking Academy, Network Registrar, PCNow, PIX, PowerPanels, ProConnect, ScriptShare, SenderBase, SMARTnet, Spectrum Expert, StackWise, The Fastest Way to Increase Your Internet Quotient, TransPath, WebEx, and the WebEx logo are registered trademarks of Cisco Systems, Inc. and/or its affiliates in the United States and certain other countries.
All other trademarks mentioned in this document or Website are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (0805R)