Table Of Contents
Release Notes for Network Admission Control, Release 2.0
Contents
Introduction
Cisco Component Versions That Support NAC
Supported Cisco Switches
Supported Cisco Routers
Supported Cisco Wireless Access Points
Supported Cisco Wireless LAN Controllers
Supported Cisco Trust Agent Release
Supported Cisco Secure Access Control Server Release
Supported Cisco Security Agent Releases
Supported Cisco VPN Concentrator Release
Known Component Problems
Known Cisco Switch Problems
Known Catalyst 2000 and 3000 Switch Problems
Known Catalyst 6500 Series Switch Problems
Known Cisco Secure Access Control Server
Known Cisco Trust Agent Problems
Known Cisco Security Agent Problems
Resolved Component Problems
Resolved Catalyst 6500 Series Switch Problems
Resolved Cisco Secure Access Control Server Problems Resolved Cisco Security Agent Problems
Obtaining Documentation
Cisco.com
Ordering Documentation
Documentation Feedback
Cisco Product Security Overview
Reporting Security Problems in Cisco Products
Obtaining Technical Assistance
Cisco Technical Support & Documentation Website
Submitting a Service Request
Definitions of Service Request Severity
Obtaining Additional Publications and Information
Release Notes for Network Admission Control, Release 2.0
Revision 2: February 12. 2008
Contents
These release notes pertain to Cisco's Network Admission Control, Release 2.0 network solution. This document contains the following sections:
•
Introduction
•
Cisco Component Versions That Support NAC
–
Supported Cisco Switches
–
Supported Cisco Routers
–
Supported Cisco Wireless Access Points
–
Supported Cisco Wireless LAN Controllers
–
Supported Cisco Trust Agent Release
–
Supported Cisco Secure Access Control Server Release
–
Supported Cisco Security Agent Releases
–
Supported Cisco VPN Concentrator Release
•
Known Component Problems
–
Known Cisco Switch Problems
–
Known Cisco Secure Access Control Server
–
Known Cisco Trust Agent Problems
–
Known Cisco Security Agent Problems
•
Resolved Component Problems
–
Resolved Catalyst 6500 Series Switch Problems
–
Resolved Cisco Secure Access Control Server Problems Resolved Cisco Security Agent Problems
•
Obtaining Documentation
–
Cisco.com
–
Ordering Documentation
•
Documentation Feedback
•
Cisco Product Security Overview
–
Reporting Security Problems in Cisco Products
•
Obtaining Technical Assistance
–
Cisco Technical Support & Documentation Website
–
Submitting a Service Request
–
Definitions of Service Request Severity
•
Obtaining Additional Publications and Information
Introduction
Network Admission Control, Release 2.0 (NAC 2.0) is a set of technologies and solutions. It uses the network infrastructure to enforce security policy compliance on devices that try to access network computing resources, thereby limiting damage from security threats.
Customers implementing NAC can allow network access only to compliant and trusted endpoint devices (PCs, servers, and PDAs, for example) and can restrict the access of noncompliant devices.
This document lists which Cisco components are NAC 2.0 compatible and what limitations these components have.
For information about installation methods, system requirements, and changes from release to release of an individual component, see that component's release notes and documentation in the Technical Support & Documentation area of Cisco Systems's web site.
Cisco Component Versions That Support NAC
Supported Cisco Switches
These devices support either the NAC L2 IP method which uses Extensible Authentication Protocol over User Data Protocol (EAP over UDP), or the NAC L2 802.1X (EAP over IEEE 802.1X) method. These are NAC Release 2.0 devices.
Table 1 Supported Cisco Switches
Supported Switch Models
|
Supported Methods
|
Supervisor, if applicable
|
Operating System Image
|
Cisco Catalyst 2940
|
NAC L2 802.1X
|
not applicable
|
Cisco IOS Release 12.1(22)EA6 or later
|
Cisco Catalyst 2950
Cisco Catalyst 2955
|
NAC L2 802.1X
|
not applicable
|
Cisco IOS Release 12.1(22)EA6 or later
|
Cisco Catalyst 2960
|
NAC L2 802.1X
|
not applicable
|
Cisco IOS Release 12.2(25)SED or later
|
Cisco Catalyst 2970
|
NAC L2 802.1X
|
not applicable
|
Cisco IOS Release 12.2(25)SED or later
|
Cisco Catalyst 3550
|
NAC L2 IP
NAC L2 802.1X
|
not applicable
|
Cisco IOS Release 12.2(25)SED or later
|
Cisco Catalyst 3550
|
NAC L2 802.1X
|
not applicable
|
Cisco IOS Release 12.1(22)EA6 or later
|
Cisco Catalyst 3560
|
NAC L2 IP
NAC L2 802.1X
|
not applicable
|
Cisco IOS Release 12.2(25)SED or later
|
Cisco Catalyst 3750
|
NAC L2 IP
NAC L2 802.1X
|
not applicable
|
Cisco IOS Release 12.2(25)SED or later
|
Cisco Catalyst 4500
|
NAC L2 IP
NAC L2 802.1X
|
Sup2+, 2-Plus-TS, Sup2+10GE, IV, V, V-10GE
|
Cisco IOS 12.2(25)SG or later
|
Cisco Catalyst 4900
|
NAC L2 IP
NAC L2 802.1X
|
not applicable
|
Cisco IOS 12.2(25)SG or later
|
Cisco 6500 Series
Models:
6503, 6503-E, 6506, 6506-E, 6509, 6509-E, 6509-NEB, 6509-NEB-A, 651
|
NAC L2 IP
|
Supervisor 32, 720
|
Cisco IOS 12.2(18)SXF2
|
Cisco 6500 Series
Models:
6503, 6503-E, 6506, 6506-E, 6509, 6509-E, 6509-NEB, 6509-NEB-A, 651
|
NAC L2 IP
NAC L2 802.1X
|
Supervisor 2, 32, 720
|
Catalyst OS 8.5 or later
|
Supported Cisco Routers
These routers support the NAC L3 IP method (EAP over UDP). These are considered NAC Release 1.0 devices.
Table 2 Cisco Supported Routers
Supported Cisco Router Series
|
Supported Models
|
Operating System Image
|
Cisco 800 Series Routers
|
831, 836, 837, and 870 Series
|
Cisco IOS 12.3(8)T or later
|
Cisco 1700 Series Routers
|
1701, 1711, 1712, 1721, 1751, 1751-V, 1760
|
Cisco IOS 12.3(8)T or later
|
Cisco 1800 Series Routers
|
1841
|
Cisco IOS 12.3(8)T or later
|
Cisco 2600 Series Routers
|
2600XM, 2691
|
Cisco IOS 12.3(8)T or later
|
Cisco 2800 Series Routers
|
2801, 2811, 2821, 2851
|
Cisco IOS 12.3(8)T or later
|
Cisco 3600 Series Routers
|
3640/3640A, 3660-ENT Series
|
Cisco IOS 12.3(8)T or later
|
Cisco 3700 Series
|
3725, 3745
|
Cisco IOS 12.3(8)T or later
|
Cisco 3800 Series
|
3845, 3825
|
Cisco IOS 12.3(8)T or later
|
Cisco 7200 Series
|
All
|
Cisco IOS 12.3(8)T or later
|
Cisco 7500 Series
|
All
|
Cisco IOS 12.3(8)T or later
|
Cisco 7600 Series
|
All
|
Cisco IOS 12.3(8)T or later
|
Supported Cisco Wireless Access Points
The Cisco Wireless Access Points support the NAC L2 802.1X method.
Table 3 Supported Cisco Wireless Access Points
Cisco Wireless Access Points
|
Supported Models
|
Operating System Image
|
350 series
|
All
|
12.3(7)JA1 or later
|
1100 series
|
All
|
12.3(7)JA1 or later
|
1130 AG series
|
All
|
12.3(7)JA1 or later
|
1200 series
|
All
|
12.3(7)JA1 or later
|
1230 AG series
|
All
|
12.3(7)JA1 or later
|
1240 AG series
|
All
|
12.3(7)JA1 or later
|
Supported Cisco Wireless LAN Controllers
The Cisco Wireless LAN Controllers support the NAC L2 802.1X method.
Table 4 Supported Airespace Appliances Devices
Wireless LAN Controllers Models
|
Cisco Unified Wireless Network Software
|
Cisco 2000
|
Release 3.1 or later
|
Cisco 4100
|
Release 3.1 or later
|
Cisco 4400
|
Release 3.1 or later
|
Wireless Services Module (WiSM)
|
Release 3.1 or later
|
Wireless LAN Services Module (WLSM)
|
Release 3.1 or later
|
Wireless LAN Controller Module for Integrated Services Routers
|
Release 3.1 or later
|
Supported Cisco Trust Agent Release
Cisco Trust Agent (CTA) 2.0.0.30.
Supported Cisco Secure Access Control Server Release
•
Cisco Secure Access Control Server (ACS) 4.0.1.27 for Windows
•
Cisco Secure Access Control Server (ACS) Solution Engine
–
Build 4.0.1.42 for Quanta (1112)
–
Build 4.0.1.43 for HP (1111)
Supported Cisco Security Agent Releases
•
Cisco Security Agent (CSA) 4.5.1.639
•
Cisco Security Agent (CSA) 5.0.0.176 or later.
Supported Cisco VPN Concentrator Release
Table 5 Supported Cisco VPN Concentrator Release
Cisco VPN Concentrator
|
Supported Models
|
Operating System version
|
3000 series
|
3005 to 3080
|
Version 4.7 or later
|
Known Component Problems
This section describes problems known to exist in release Network Admission Control, Release 2.0.
Note
A "—" in the Explanation column means that no information was available at the time of publication. You should check the Cisco Software Bug Toolkit for current information. To access the Cisco Software Bug Toolkit, go to http://www.cisco.com/pcgi-bin/Support/Bugtool/home.pl. (You will be prompted to log in to Cisco.com.)
Known Cisco Switch Problems
Known Catalyst 2000 and 3000 Switch Problems
Unless otherwise stated, these open caveats apply to Catalyst 3750, 3560, 3550, 2970, and 2960 switches running Cisco IOS Release 12.2(25)SED or later, and Catalyst 3550, 2955, 2950, and 2940 switches running Cisco IOS Release 12.1(22)EA6 or later.
These caveats address specific behaviors of the switch that affect a NAC implementation. For a complete list of the features and caveats for a particular switch, see that device's product release notes available at http;//www.cisco.com.
References to a "supplicant" in these caveats refers to any IEEE 802.1X supplicant.
Table 6 Known Problems in Cisco 2000 and 3000 Series Switches
Bug ID
|
Headline
|
Explanation
|
CSCei03545
|
NAC L2 IP 0.0.0.0 shows up in eou table as a client for 1538M HUB.
|
Note This caveat applies to Catalyst 3750, 3560, and 3550 switches running Cisco IOS Release 12.2(25)SED or later.
Symptom If NAC L2 IP validation is configured on a port
that is attached to a Cisco 1538M Micro Hub, the
Extensible Authentication Protocol over User Data
Protocol (EAPoUDP) table in the show eou all privileged
EXEC command output might have an invalid entry with
the IP address 0.0.0.0.
Workaround There is no workaround. This does not affect the switch functionality.
|
CSCei05652
|
HRPC dot1x request handler traceback from unqueue failure.
|
Symptom On Catalyst 3750 switches, NAC L2 802.1X
validation repeatedly occurs on many IEEE
802.1X-enabled ports. During validation a message such as
this might appear:
-Process= "HRPC dot1x request handler", ipl= 0,
pid= 89 (l3a3-9)
-Traceback= 9D0118 E97FA4 92024C 438C84 439360
45F150 4E451C 4E46FC79D6A8 7978EC (l3a3-9)
May 26 17:57:03.204: %SYS-2-NOTQ: unqueue didn't
find 3DECB98 in queue 1F266A4 (l3a3-3)
Workaround There is no workaround. This problem does not affect the switch functionality.
|
CSCei08901
|
NAC L2 IP:stack master reloaded under stress.
|
Note This caveat applies to Catalyst 3750, 3560, and 3550 switches running Cisco IOS Release 12.2(25)SED or later.
Symptom If the Extensible Authentication Protocol over
User Datagram Protocol (EoU) table has many host entries
and you enter the clear eou all privileged EXEC command,
messages such as this might appear:
4d01h: %SM-4-BADEVENT: Event 'eouHold' is invalid
for the current state 'eou_abort': eou_auth
8.0.7.170
-Traceback= 6DB0E4 158F74 419B4 41D58 448B4 44AF0
3F27C0 3ECA14 This may be followed by a
software-forced reload of the switch.
After the message appears, the switch might unconditionally force a system reload.
Workaround The workaround is to use the clear eou ip privileged EXEC command to remove specific IP hosts from the EoU table.
|
CSCei31359
|
SU05:DAI w/IP address validation discards NAC:NAC L2 IP ARP probes.
|
Note This caveat applies to Catalyst 3750, 3560, and 3550 switches running Cisco IOS Release 12.2(25)SED or later.
Symptom If dynamic Address Resolution Protocol (ARP)
inspection is enabled on the access VLAN for the NAC host
and the IP address validation option is configured, the
Extensible Authentication Protocol over User Data
Protocol (EoU) session for NAC ends 2 minutes after
validation occurs.
Workaround Use one of these workarounds:
• Disable the IP address validation option.
• Use an ARP access control list (ACL) to allow the IP address 0.0.0.0 but to block the IP address 255.255.255.255.
The ARP ACL must include this access control entry:
permit response ip any host 0.0.0.0 mac any any
|
CSCei49149
|
Trace/TCAM msg after cl eou all(48x8 hosts from EST).
|
Note This caveat applies to Catalyst 3750, 3560, and 3550 switches running Cisco IOS Release 12.2(25)SED or later.
Symptom After the posture of a large number of hosts have
been validated, if you clear the EAPoUDP table by using
the clear eou all privileged EXEC command, this message
about the system running low on TCAM resources might
appear:
%QATM-4-TCAM_LOW: TCAM resource running low for
table Input ACL, resource type TCAM masks, on TCAM
number 1.
Workaround There is no workaround.
|
CSCei77557
|
NAC L2 IP:EoU Process trace/bogus ACS msg after cl eou all as 75 NRH.
|
Symptom If 75 nonresponsive clients are connected to
Catalyst 3750 or 3560 switch and you enter the clear eou
all privileged EXEC command, a traceback appears.
Workaround There is no workaround. You can ignore the traceback.
|
CSCsb76707
|
Port still part of VLAN even after unconfiguring auth-fail VLAN.
|
Note This caveat applies to Catalyst 3750, 3560, 3550, 2970, and 2960 switches running Cisco IOS Release 12.2(25)SED or later.
Symptom If an IEEE 802.1X-enabled port is authorized in
the restricted VLAN, the port might remain in that VLAN
even after you enter the no dot1x auth-fail vlan interface
configuration command to disable the restricted VLAN on
the port.
Workaround The workaround is to shut down the IEEE 802.1X-enabled port by entering the shutdown interface configuration command before you remove the restricted VLAN configuration.
|
CSCsb79198
|
dot1x:port fail to authenticate if download acl >= 20
|
Symptom An IEEE 802.1X supplicant might fail to
complete authentication if the per-user ACL is too large.
During IEEE 802.1X authentication, the RADIUS server
might download a per-user IP or MAC ACL to be applied
to an interface as part of the Access-Accept message. If the
ACL is too large, the switch might not be able to apply it,
and the authentication fails and restarts. Depending upon
the specific access control entries (ACEs) in the ACL, the
maximum ACL size is about 20 ACEs in a Catalyst 3750
switch.
Workaround The workaround is to reduce the size of the per-user ACLs that are downloaded as part of IEEE 802.1X authentication.
|
CSCsb99249
|
IEEE 802.1X configured port failed to ping after host mode change.
|
Symptom On an IEEE 802.1X-enabled port that has the
IEEE 802.1X control direction set to in (unidirectional port
control), if you use the dot1x port-control interface
configuration command to change the port mode
configuration or the dot1x host-mode interface
configuration command to change the host configuration,
the host attached to the port might get authenticated but
might not be able to access the network.
Workaround The workaround is that on an IEEE 802.1X-enabled port, before you change the port mode or the host mode configuration, you should shut down the port (by using the shutdown interface configuration command), use the no dot1x control-direction in, or the dot1x control-direction both interface configuration commands to change the port control to bidirectional.
|
CSCsc16152
|
Client with dot1x cannot get DHCP address.
|
Symptom When a client is connected to a Catalyst 3750
member switch through an interface that is configured for
IEEE 802.1X and DHCP snooping, if the client uses one
MAC address for IEEE 802.1X authentication and a
different MAC address for the DHCP request, the client
does not receive an IP address from the DHCP server. This
problem does not occur when the client is connected to a
Catalyst 3750 master switch or when the client uses the
same MAC address for IEEE 802.1X and DHCP requests.
Workaround The workaround is to connect the client to the master switch in the Catalyst 3750 switches switch stack, or to disable DHCP snooping.
|
CSCsc26248
|
SYS-2-BADSHARE: Bad refcount in mem_lock during disabling ports.
|
Symptom If a Catalyst 3750 switch configured as the
master switch in a stack has a large number of
IEEE 802.1X-enabled ports, a series of rapid link changes
on the switch (for example, when you remove cables from
these ports) might cause this message to appear and the
switch to reload:
Oct 21 12:31:07.446: -Traceback= F8E218 2F376C
2EA71C 2EB674 18C48C 2EAD94 2E9D88 86B7E8 865A2C
Oct 21 12:31:07.446: %SYS-2-BADSHARE: Bad refcount
in mem_lock, ptr=38AAC10, count=0
Workaround There is no workaround available.
|
Known Catalyst 6500 Series Switch Problems
These limitations are found on Catalyst 6500 series switches running the CatOS 8.5 JAC operating system.
These caveats address specific behaviors of the switch that affect a NAC implementation. For a complete list of the features and caveats for a particular switch, see that device's product release notes at http://www.cisco.com.
Table 7 Known Problems in Catalyst 6500 Series Switches
Bug ID
|
Headline
|
Explanation
|
CSCei90699
|
ACL mgr stuck in 99% while posture validating 110 hosts.
|
Symptom With NAC L2 IP, when a host's posture is being
validated, you will see high CPU utilization by the ACL
manager process. This is a transient condition and is
expected.
Workaround There is no workaround.
|
CSCei15212
|
Posture validation not happening on PCs having multiple NIC
|
Symptom With NAC L2 IP, if a PC connected to the switch
has more than one NIC, only one of the NICs is posture
validated.
Workaround There is no workaround.
|
Known Cisco Secure Access Control Server
There are NAC 2.0 features in both the Cisco Secure Access Control Server for Windows and the Cisco Secure Access Control Server Solution Engine.
Table 8 contains problems known to exist only in Cisco Secure Access Control Server Solution Engine. Table 9 contains problems known to exist in both the Cisco Secure Access Control Server Solution Engine and the Cisco Secure Access Control Server for Windows. Both versions of Cisco Secure Access Control Server are referred to as ACS.
These caveats address specific behaviors of ACS that affect a NAC implementation. For a complete list of the features as well as caveats for ACS, refer to ACS's product release notes available at http://www.cisco.com.
Table 8 Known Problems in ACS Solution Engine (ACS SE) 4.0.1
Bug ID
|
Summary
|
Explanation
|
CSCsd20149
|
After initial config from Recovery CD, no GUI access.
|
Symptom This problem occurs on ACS SE 1111 (HP),
when performing a full upgrade including appliance base
image. After installing from the ACS SE 1111 (HP)
Recovery CD, and initial configuration completes, you
cannot access the web interface.
When you log in to CLI, the appliance status indicates
that pfipmon not running.
Conditions On ACS SE 1111 (HP), after installing from the Recovery CD, when performing a full upgrade, including the appliance base image.
Note If you are not upgrading the appliance base image, you do not need to install from the Recovery CD.
Workaround Use the CLI command, reboot, to restart the appliance.
|
CSCsc90467
|
After Install from Recovery CD, no CLI access.
|
Symptom This problem occurs on ACS SE 1111 (HP),
when performing a full upgrade including appliance base
image. When installing from the ACS SE 1111 (HP)
Recovery CD, after installation completes, the ACS SE
reboots, performs some configurations, and reboots
again. The configurations that occur after the first reboot
take a significant amount of time, during which there is
no feedback, which is normal system behavior. After this
time, the CLI Initial Configuration screen should appear,
but does not.
Conditions On ACS SE 1111 (HP), when installing from the Recovery CD, when performing a full upgrade, including the appliance base image.
Note If you are not upgrading the appliance base image, you do not need to install from the Recovery CD.
Workaround Switch off the appliance, and switch it on again.
|
CSCsc81981
|
CSAdmin crashed when edit the RA field after replication
|
Symptom After replication, if you edit the Remote Agent
field in the Network Configuration page in the slave
machine, the ACS displays the error message "Action
canceled."
Workaround None.
|
CSCsc80481
|
Proxy distribution table prevents SNMP from working.
|
Symptom If you configure ACS SE for SNMP and enable
"Accept SNMP packets from selected hosts", and then
add an entry to Proxy Distribution Table like:
@cisco.com -> local ACS -> strip -> local (Default) ->
local ACS -> no strip -> local, SNMP stops working and
there are no more responses from ACS.
Workaround Uncheck "Accept SNMP packets from selected hosts."
|
CSCsc77508
|
Stress with EAP-TLS crashes CSAuth
|
Symptom During overnight EAP-TLS stress against
CSDB with NAP and RAC, and CRL (30% of all
certificates are revoked), CSAuth crashed a number of
times.
Workaround None.
|
CSCsc77228
|
RSA Token is displayed in the external User DB after Upgrade from 3.2.3
|
Symptom If, in a previous version of ACS, you added
RSA SecurID Token Server to the External User
Database, mapped it to a group, and selected this
Database in the "Unknown User Policy", then, after
upgrading to ACS 4.0, the RSA SecurID Token Server is
still displayed, even though it should be deleted from
everywhere inside the External User Database and not
just from the Database Configuration.
Moreover, the Configuration in the RSA SecurID Token Server should be placed in the RADIUS Token Server after the upgrade to 4.0.
Workaround None.
|
CSCsc69997
|
Machine authentication failed on 2003 DC with binary comparison on
|
Symptom EAP-TLS machine authentication failed if only
binary comparison selected, and 2003 DC is used as the
external database. There are no problems with user
authentication.
Workaround None.
|
CSCsc63854
|
ODBC Mapping exists after restoring image created on software
|
Symptom After restoring the appliance image from the
software version of ACS 4.0.1, there is still ODBC
configuration in Unknown User Policy and in
NAP/Authentication.
Workaround None.
|
CSCsc52381
|
ACS SE: console access may not work if NTP synchronization is enabled
|
Symptom The login prompt might not appear on the CLI
console after rebooting through the CLI or through the
GUI; even if NTP synchronization is enabled and the
NTP server address is set correctly.
Workaround Disable NTP synchronization.
|
CSCsc03778
|
ACS SE replicated changes under Admin Control not enforced unless reboot
|
Symptom If you make a change in the Access Policy
under Administration Control and then replicate the
change to another appliance, the changes are not
enforced on the receiving appliance.
Workaround On the receiving (secondary) appliance, do one of the following:
• Click Submit on the Access Policy page.
• Reboot the secondary appliance.
|
CSCsc02553
|
GUI logging change does not affect csadmin until server restarted
|
Symptom When you change the logging level for an ACS
Appliance via the GUI, you click the button to restart;
however, the csadmin service is not restarted, thus the
csadmin logging level will not change until the csadmin
service is manually restarted.
Workaround Restart the csadmin service manually.
|
CSCsb83399
|
ACS SE should save the FTP settings during software upgrade
|
Symptom ACS appliance does not save the defined FTP
settings during software upgrade, but the defined backup
scheduling is saved. This behavior will cause the backup
problem after software upgrade.
Workaround Reenter the FTP information manually after an upgrade.
|
CSCsb27597
|
Limitation on the custom attributes (of 31k as CSAdmin indicates)
|
Symptom In the T+ Settings per User/group
Configuration page, which is accessed from the Interface
Configuration page, if you add 1201st entry in the
custom attribute field, the browser crashes.
The custom attribute field is currently limited to 31KB (which is around 1200 attributes).
Workaround None.
|
CSCsb19051
|
TCP checksum error from Cisco Secure ACS Solution Engine 1111
|
Symptom A Cisco Secure Access Control Server
Solution Engine (ACS SE) 1111
(CSACSE-1111-UP-K9) may generate transient TCP
Checksum errors which may cause error logging on other
devices in the network. In particular, Cisco switches
would generate the following error message:
%IP-3-TCP_BADCKSUM:TCP bad checksum.
The cause of the error is the NIC Software Driver. Not every packet being transmitted will be affected. Given that TCP will retransmit any unacknowledged packet, the system will recover. Excessive logging of the error message within the network might occur. The problem only affects TCP packets; therefore, TACACS may be affected, while RADIUS will not.
This problem might also occur on an ACS SE 1112 (Quanta).
Workaround A temporary workaround is to reload the server; but, because the problem is transient, it will likely return within days or weeks.
A patch is available from TAC, which will help to reduce the amount of errors; however, since this is a network configuration problem, it cannot resolve the problem completely. Contact your TAC representative for the appropriate TCP_checksum patch for your platform.
|
CSCsb13998
|
ACS dialin authorization fails against Win2K active directory
|
Symptom When ACS is configured to obtain dialin
authorization from a Microsoft Active Directory user
database, the user sometimes fails with the error: "User
does not have dialin permission (needed)."
This defect was found in an environment where Active Directory was being replicated from an NT domain. The same errors occurred when the remote agent was installed on a Member Server or a Domain Controller.
Workaround The problem is caused because replication does not set synchronize the userParameters and msNPAllowDialin. See MS KB article 252398 for possible workaround (run a script to synchronize the attributes).
|
CSCeh17104
|
ACS Appliance: Certain Hostname/Admin name cause losing access
|
Symptom If the administrator name is same as the
hostname, there is no GUI access or CLI access.
Workaround Ensure that the administrator name is different from the hostname.
|
CSCeh04327
|
SNMP get and get-next requests for host.hrSystemNumUsers return error
|
Symptom SNMP 'get' and 'get-next' requests for
host.hrSystemNumUsers return 'Generic error'.
Workaround None.
|
CSCee89510
|
Dates are logged in local time instead of GMT
|
Symptom NAC attributes that are in date format are in
GMT time zone. When ACS logs these attributes, it
converts them to ACS local time zone (the time zone of
the ACS server).
Workaround Configure ACS to use the GMT time zone.
|
Table 9 Known Problems in both ACS 4.0.1 for Windows and ACS SE 4.01
Bug ID
|
Headline
|
Explanation
|
CSCea91690
|
Event Viewer errors on startup/shutdown in .NET.
|
Symptom On Windows .Net Server 2003 or Windows
2003 Enterprise Edition shutdown and startup, you might
see errors that falsely indicate that ACS service have
failed. At startup, you might see a dialog box that
indicates that a service, such as CSLog, encountered a
problem and will close. The same error is logged to
Event Viewer, as in this example:
Reporting queued error: faulting application
CSLog.exe, version 0.0.0.0, faulting module
unknown, version 0.0.0.0, fault address
0x00000000.
In Windows Server 2003, the Service Manager queries the ACS services status during startup and shutdown, but ACS services might not have started yet or might have already stopped. Even though this is normal behavior for ACS services, Windows perceives this as an error and logs it to the Event Viewer.
On startup, the user sees all errors from the event viewer. Therefore, when users log into Windows right after startup, they see errors from the previous login session.
Conditions This behavior is observed on Windows Server 2003 only.
Workaround Verify that ACS services are running by using the Control Panel.
|
CSCeb78551
|
When doing LEAP RADIUS proxy between a front-end ACS server and a back end ACS server, problems arise if the configuration is not correct.
|
Symptom The LEAP Server (back end ACS Server) must
contain an AAA Client entry of the LEAP Proxy Server
(front end ACS Server), and it must be set to use
RADIUS (Cisco IOS/PIX).
The LEAP Server (the back end ACS Server) also must be set to use RADIUS (Microsoft) [026/311/012] MS-CHAP-MPPE-Keys attribute in Interface Configuration and in Group or User Settings (depending on the profile used).
This setting is required to communicate MS MPPE keys, which LEAP usess, between the Proxy LEAP Server (front end ACS Server) and the Proxy Server (back end ACS Server).
This sort of communication is encapsulated in Cisco VSA and this is the reason why the AAA Client must be RADIUS (Cisco IOS/PIX).
Workaround There is no workaround.
|
CSCec72911
|
Windows 2003 password aging page display issue.
|
Symptom ACS is installed on Windows 2003 Server, and
the password aging feature is enabled. Only the option
generate greetings for successful logins option in
Password Aging settings is checked. After pressing
Submit or Submit + Restart, for the first time ACS
displays this valid error message:
Error: Generation of greetings on successful logins requires at least one password aging rule to be configured.
However on the second pressing of one of these buttons, one of these errors appears:
Active canceled
The page cannot be displayed
Conditions Occurs after installation and as long as no changes are made. Occurs only when managing ACS only on the local machine by using IE 6.0.
Workaround Restart ACS.
|
CSCee64596
|
During stress tests, ACS does not reduce the size of the CsAdmin file based on the Service Control settings.
|
Symptom Intensive use of the Logged-In Users report
might lead to significant memory utilization by the
CSAdmin service.
Workaround Restart the CSAdmin service.
|
CSCef12461
|
Restoring many administrators on Windows 2000 does not restore them.
|
Symptom On Windows 2000, if you attempt to restore a
database of over 500 administrators, the ACS
administrators are not restored.
Workaround Manually recreate administrators after the restoration.
|
CSCef12605
|
Replication with many administrators does not replicate them.
|
Symptom When ACS attempts to replicate with 500 or
more administrators, administrators are not replicated
even though ACS reports a successful replication.
Workaround There is no workaround.
|
CSCef55730
|
ACS authorization passes even for a disabled user.
|
Symptom The default administrative user account
defined within the CiscoWorks local (user) database (and
replicated within the Cisco Secure ACS TACACS+ user
database) is granted access to all installed Management
Center applications, even if the user account is disabled
within ACS.
Workaround There is no workaround.
|
CSCef85310
|
Group dACL is downloaded if Users dACL content is empty.
|
It is possible to define an ACL with empty content. Following this defect, if a user with an empty ACL belongs to a group on which a non empty ACL is defined, then authenticates, the ACL of the group is downloaded to the device, instead of the user's. (Although the user's dACL content is not empty, it is downloaded to the device, as it should be.)
Workaround Do not define an empty downloadable ACL.
|
CSCef85314
|
Group dACL is downloaded if Users content NAF is not suitable.
|
Symptom If a user attempts authentication to the device,
which is not part of the NAF specified on the user's
dACL content, the ACL of the group to which the user
belongs is downloaded to the device, instead of being
rejected.
Workaround There is no workaround.
|
CSCef96208
|
ACS reports incorrect privilege level
|
Symptom ACS might report users with the incorrect
authorized privilege level. In particular, when using
TACACS+, users who are correctly authenticated with a
privilege level of 15 are reported with a level of 1.
Workaround None; the error is cosmetic.
|
CSCeg40355
|
Authentication failures when remote logging fails.
|
Symptom If an ACS server configured for remote logging
does not successfully transmit an accounting log to the
remote server, authentication attempts to this ACS server
during this time might fail. The authentication failure
might not be reported at all, or it might be reported
incorrectly (as being successful).
The auth.log file might have output similar to this during an authentication failure:
AUTH 10/13/2005 10:29:55 E 0552 19568 Timeout
waiting for ack from CSlog [logger name] AUTH
10/13/2005 10:29:55 E 0559 19568 Closing CSlog
connection to [logger name] AUTH 10/13/2005
10:29:55 E 0574 19568 Re-sending packet to CSLog
[logger name] AUTH 10/13/2005 10:29:55 E 0546
19568 -ve ack from CSLog [logger name] AUTH
10/13/2005 10:29:55 E 0499 19568 Failed to log
accounting packet to logger [logger name]
Workaround Disable the remote logging functionality, or correct the cause of the logging failure.
|
CSCeg47441
|
CRL not preserved when upgrading from 3.3.2 or below to 3.3.3 or later.
|
Symptom When upgrading from ACS version 3.3.1.16 to
3.3.2.2, the CRL entries are not transferred.
Workaround Create CRL entries manually.
|
CSCeg50237
|
Overinstall causes the added AVP Attributes to disappear.
|
Symptom Adding AVP attributes and then performing
Overinstall causes those attributes to disappear from the
Log Attribute field.
Workaround Add AVP attribute manually after overinstall.
|
CSCeh00074
|
GUI/ LDAP group mapping submission failure.
|
Symptom When adding LDAP groups to be mapped to
ACS groups, the Submit operation sometimes fails and
an empty list error message appears.
This might occur when working on the ACS UI from a remote machine (for example, with Terminal Services), and it might appear in other group mapping pages as well.
Workaround In the Group Mapping page, before you click Submit, move to another window, or click another frame in the ACS HTML interface.
|
CSCeh10491
|
Authentication errors on timeout waiting for local logging.
|
Symptom Authentication takes a lot of time when ACS is
configured to log on remote ACS or to ODBC and the
remote server or ODBC data source is unreachable.
When all worker threads are used, ACS provides no more
authentications.
Conditions The remote ACS or ODBC data source is unreachable.
Workaround Make the remote server or ODBC data source available for logging, or disable logging to it in ACS configuration
|
CSCeh24979
|
Users fail to authenticate when upgrading and attempting to access an obsolete database.
|
Symptom When upgrading from version ACS 3.1 or later
to version 4.0 (these are 2 step upgrades) if a user is
trying to authenticate to a database which was in use
before the upgrade but not in use after the upgrade, the
user will fail to authenticate. This information will be
reported in the Failed Attempts log.
Workaround Select User Setup and then select Remove Dynamic Users after upgrading.
|
CSCeh35121
|
Local logging stopped working after ODBC logging removed.
|
Symptom ODBC logging is enabled for passed and failed
attempts. The ODBC data source is incorrect. After
removing ODBC logging, only local logging remains,
but no local logging is written.
Conditions ODBC data source must be incorrect.
Workaround Specify the correct ODBC data source for logging, and restart ACS.
|
CSCeh37907
|
Duplicate IP assignment due to accounting packets reordering.
|
Symptom Address assignment from IP pools is based on
AccountingStart/Stop records. A duplicate IP address
might be assigned to a user if an Accounting Stop packet
is received out of order following a new access request by
the same user.
If ACS receives a late Stop packet, it might erroneously mark an IP address as free even though it has just been assigned. That might lead to a duplicate address assignment during the next connection.
Such situations can happen in DSL environments where a router starts new PPP connections in less than 1 second after a previous disconnection.
Workaround There is no workaround.
|
CSCeh52700
|
AD expired-user passed EAP-TLS authentication; should be rejected.
|
Symptom EAP-TLS authentication still passes for users
in the Active Directory even if their accounts have
expired. No error is given from ACS.
Conditions EAP-TLS authentication of users in Active Directory running in Windows 2000 environment.
Workaround There is no workaround. Windows 2003 has introduced some new attributes that should help resolve this issue in future.
|
CSCeh60564
|
AD locked-out User passed EAP-TLS authentication, should be rejected.
|
Symptom EAP-TLS authentication will still pass for
users in Active Directory even if their account is locked
out. There is no error indication from ACS.
Conditions EAP-TLS authentication of users in Active Directory running in Windows 2000 environment.
Workaround There is no workaround. Windows 2003 has introduced some new attributes that should help resolve this issue in future.
|
CSCeh64162
|
Supplicant attempts to authenticate using UPN format and failure.
|
Symptom If a supplicant attempts to authenticate by
using EAP-FAST and supplies the username in UPN
format (user@domain.com) and the username before
the at sign (@) is different from the pre-Windows 2000
name, ACS might not be able to locate the user in Active
Directory.
Conditions ACS installed in Windows 2000/2003 Active Directory environment. Authentication with EAP-FAST and UPN usernames.
Workaround Rename the user to have the same username as the pre-Windows 2000 one.
|
CSCeh68821
|
LDAP authentication pass after modify subtree node due to DN caching.
|
Symptom If you change the User Directory Subtree in the
Common LDAP Configuration, users that are already
authenticated using this Generic LDAP instance
(External User Database) are not affected and continue to
pass authentication, even if the users are no longer under
the new User Directory Subtree. ACS does not perform a
new search for the users because of the user-cached
Distinguished Name.
Workaround If you want to enforce a new search on the User Directory Subtree, delete the users from the Cisco Secure internal database.
|
CSCeh79954
|
EAP-TLS time of day restriction in AD does not fail user - authentication succeeds.
|
Symptom EAP-TLS authentication of users in Windows
Active Directory still passes when a user's time-of-day
setting (located in AD) is outside the hours they are
allowed. No error is given from ACS.
Conditions EAP-TLS authentication of users in Active Directory running in Windows 2000 or 2003 environment.
Workaround There is no workaround.
|
CSCsa79327
|
Authentications fail for users with the euro symbol in their passwords.
|
Symptom Authentication fails for users with the euro
symbol in their password.
Workaround Change user password, and remove euro symbol.
|
CSCsb13998
|
ACS dial-in authorization fails against Windows 2000 active directory.
|
Symptom When ACS is configured to obtain dial-in
authorization from a Microsoft Active Directory user
database, the user sometimes fails. The message appears:
User does not have dial-in permission
(needed).
Conditions This defect was found in an environment where Active Directory was being replicated from an NT domain. The same errors occurred when the remote agent was installed on either a Member Server or a Domain Controller.
Workaround The problem is caused because replication does not set synchronize the userParameters and msNPAllowDialin attributes in Active Directory. See MS KB article 252398 for possible workaround. Run a script to synchronize the attributes.
|
CSCsb15116
|
Apply and Restart button in NAP page does not release the NAF policy.
|
Symptom When deleting a Network Access Filter that is
used in a Network Access Profile setup page, an
unexpected behavior occurs, and authentications fail.
Workaround Perform one of the following:
1. Before deleting a Network Access Filter, remove it from the relevant Network Access Profiles.
or
2. After deleting a Network Access Filter for each relevant Network Access Profile, click Submit (without performing changes) in the profile setup page.
|
CSCsb25151
|
When AAA client has multiple IP addresses, NAF for DACLs fails.
|
Symptom When a single AAA client is configured with a
range or list of IP addresses in ACS solution engine, the
Network Access Filter (NAF) under "Shared Profile
Components" cannot correctly determine the IP address
of either the Network Device Group (NDG) or the correct
IP address of the AAA client.
Conditions Must have Network Access Filtering defined and must have multiple IP addresses listed under the AAA client configuration section (under Network Setup) for the AAA client that is supposed to receive the downloadable ACL.
Workaround Perform one of the following:
• Remove all but the correct IP address from the AAA client configuration component for the NAS/NAD.
or
• Configure the ip radius source interface to point to the correct IP address.
|
CSCsb48683
|
Log and accounting file locking causes problems with backup software.
|
Symptom ACS diagnostic and accounting log file locking
results in service problems, when the directories are
backed up by certain software applications (in a reported
case, Veritas software was used).
Workaround Upgrade your backup software.
|
CSCsb72286
|
ACS RADIUS proxy uses RADIUS 1645, not current 1812.
|
Symptom Cisco Secure ACS for Windows uses port 1645
for RADIUS authentication and authorization proxy to
another RADIUS server. Some AAA servers might only
accept connections to port 1812.
Workaround There is no workaround.
|
CSCsb93223
|
An internal posture validation policy is created even though a template profile cannot be configured.
|
Symptom If for any reason you cannot create a profile
(for example, Global Authentication Setup is not
configured properly) using the NAC 802.1X template, an
internal posture validation policy is created in any case.
Workaround There is no workaround.
|
CSCsb95897
|
ACS cannot display long list of Disabled accounts correctly.
|
Symptom ACS 3.3 HTML interface has problems in
displaying Disabled accounts list if it contains several
pages. Next is working as needed, but Previous is
available only once.
Workaround There is no workaround.
|
CSCsc00788
|
Password change is not supported in GTC against Windows DB.
|
Symptom Password change is not supported in EAP-GTC
against the Windows database.
Conditions EAP-GTC authentication of a user in the Windows database whose account has expired or needs to be changed.
Workaround There is no workaround.
|
CSCsc06942
|
Failure when EAP-FAST/PEAP credentials or posture data size is greater than 1Kb.
|
Symptom Failure when EAP-FAST/PEAP credentials or
posture data size is greater than 1Kb.
Conditions This applies only to tunneled protocols that use fragmentation (MS-PEAP, CISCO-PEAP, and EAP-FAST). It happens only when the supplicant uses the tunneled protocol fragmentation option and only if a fragment of an EAP tunnel is larger than 1002 bytes. usually fragmentation threshold is driven from the detected MTU size (Ethernet is 1.5K).
Workaround Set the supplicant size of the fragmentation threshold to be lower than 1002 bytes. If it cannot be configured, another option is to set the MTU size that affects this value.
|
CSCsc27158
|
Memory leak during LDAP stress-PAP authentication with legacy LDAP SSL connections.
|
Symptom A memory leak was found during stress tests of
PAP authentications with LDAP server (OpenLDAP) and
legacy SSL enabled (cert7.db file). For example, memory
usage reached 100MB after about 1.5 million
authentications.
Memory is freed after ACS services are restarted.
No memory leak is found when the configuration is changed to use the new SSL mechanism (select Trusted Root CA).
Workaround In the Generic LDAP configuration in ACS, use the new SSL option (Trusted Root CA) instead of the old option (cert7.db file).
|
CSCsc27168
|
User authentication succeeds even though the database was not selected.
|
Symptom If the external database list in the Network
Access Profile (NAP) authentication settings is empty,
access requests that match the NAP authenticated in the
ACS internal database.
Workaround Before deleting external database configuration be sure that it is not used in any NAP.
|
CSCsc32154
|
Upgrade from 3.3 removed APT,SPT, and Reason from Logged Attributes.
|
Symptom If one or more of the APT, SPT and Reason
attributes were selected to be logged in the Failed or
Passed reports in ACS 3.3, after upgrading to 4.0, they do
not appear in the Logged Attributes column.
Workaround Add those APT, SPT, and Reason attributes manually to the 'Logged Attributes' column after upgrade to ACS 4.0.
|
CSCsc37464
|
Updates to external database causes dynamic users to be removed.
|
Symptom Any updates to the external database cause the
dynamic users linked to that database to be removed from
the user's list.
Workaround There is no workaround. This is a usability bug.
|
CSCsc39979
|
An update to NAP deletes the external user in "Logged all users" report.
|
Symptom When a NAP is being updated, all dynamic
users related to this NAP are deleted from the logged-in
user list. The internally defined users are not deleted.
Workaround There is no workaround.
|
CSCsc40001
|
Session resume in EAP-FAST-TLS does not work.
|
Symptom EAP-TLS inside EAP-FAST always assumes
that the user is trying to authenticate for the first time,
resulting in going to the external DB (if valid) to get the
user credentials instead of permitting the user to resume
a previously used TLS session.
Conditions EAP-TLS as the inner method in EAP-FAST.
Workaround There is no workaround.
|
CSCsc41129
|
CSAuth exceptions during EAP-TLS stress vs LDAP external db with SSL connections.
|
Symptom After a heavy load for a few hours of EAP-TLS
authentications with an LDAP external database and
LDAP connections over SSL (Trusted Root CA option),
CSAuth might experience exceptions and fail.
Workaround Restart ACS services.
|
CSCsc41623
|
Configuring Logs - Reset Columns erroneously populates selection lists.
|
Symptom For several report types, Reset Columns on the ACS
HTML interface Logging configuration page sets the selected
attributes to log (columns) to a different set of Logged
Attributes than the actual default attributes initially set on a
fresh ACS installation.
Conditions In ACS, when you configure the logged information through the ACS HTML interface by clicking System Configuration > Logging and choosing one of the listed reports, the Reset Columns sets the selected attributes in the Selected Attributes list box to an incorrect set of attributes.
This occurs on the following reports:
• CSV Failed Attempts
• CSV Passed Authentications
• CSV VoIP Accounting
Workaround Manually select and deselect attributes in the Logged Attributes list from the provided Attributes list.
• CSV Failed Attempts-Remove the Filter Information
• CSV Passed Authentications-Add the cisco-av-pair attribute.
• CSV VoIP Accounting:
– Add the Call Leg Setup Time attribute.
– Add the Gateway Identifier attribute.
– Add the Connection Id attribute.
– Add the Call Leg Direction attribute.
– Add the Call Leg Type attribute.
– Add the Call Leg Connect Time attribute.
– Add the Call Leg Disconnected Time attribute.
– Add the Call Leg Disconnected Cause attribute.
– Add the Remote Gateway IP Address attribute.
|
CSCsc41638
|
ACS does not check if the CA certificate that was issued to a user exists in CTL.
|
Symptom A user that presents a certificate in EAP-TLS
or EAP-FAST/EAP-TLS might be authenticated even
though the certificate issuer is no longer trusted by the
ACS machine.
Workaround Uncheck the CA certificate in question from the ACS HTML interface before removing the CA certificate from the machine storage.
|
CSCsc41673
|
CSAuth fails after importing Airespace NAS.
|
Symptom The CSAuth service occasionally fails after
being restarted if CSUtil was running immediately
beforehand, for example when running csutil -i.
Conditions Starting CSAuth immediately after CSUtil has run an import causes an exception in CSAuth due to a race condition in CSAuth's internal initialization sequence. This is particularly noticeable if you are using CSUtil to stop CSAuth, perform some action, and then automatically restart CSAuth.
Workaround Restart CSAuth manually from the Control Panel or wait for CSMon to detect the scenario and automatically restart CSAuth.
|
CSCsc41860
|
CSAuth failed when CSUtil deletes 35K NASs.
|
Symptom After a large number of AAA clients were
imported to an ACS server, CSUtil import was used to
delete 35,000 of them. After deleting the AAA clients,
CSAuth failed.
Conditions This defect can occur on a clean installation.
Workaround When deleting a large number of AAA clients using CSUtil it is recommended to delete them in batches of up to 10,000 AAA clients concurrently.
|
CSCsc43287
|
Replication: Admin Control > Access Policy > port allocation not replicated.
|
Symptom After replication of Interface security settings,
the HTTP port allocation settings in Admin Control >
Access Policy are not replicated (remained default-allow
any).
Workaround Ensure that the http access policy is set correctly on the slave GUI.
|
CSCsc43577
|
CSAdmin stalls and has a memory leak.
|
Symptom CSAdmin consumes memory when updating
EAP-FAST inner method GTC to MSCHAPv2, using the
Network Access Profile page.
Workaround Restart the CSAdmin Service.
|
CSCsc49673
|
UPGRADE:Add Filter aaa:service=ip_admission to Upgrade-Profile NAP.
|
Symptom After an upgrade from ACS 3.3 that includes
the NAC database, a profile is created with an
authorization method: PEAP-posture only. This profile
does not have a filter, which causes failure of all
incoming authentications except from PEAP-POSTURE.
Workaround Add a filter of Cisco av pair aaa:service = ip-admission to the Upgrade-Profile. The non-posture requests are authenticated against the global settings configuration (if you ensure the Grant access using global configuration, when no profile matches option is selected in the created profile).
|
CSCsc57975
|
The database order inside a Network Access Profile may cause authentication to fail and provide an erroneous error.
|
Symptom When a user account in theWindows AD has
expired, the user may be authenticated in another
external database, which is configured sequentially after
theWindows database in the authentication settings in the
matched NAP. If the user exists in another database,
authentication is successful. If the user does not exist in
another database, an erroneous failure code "CS user
unknown" (instead of "Database account expired) is
displayed.
|
CSCsc69976
|
Local logging file size and days are not displayed correctly after performing an additional action in the graphic user interface.
|
Symptom While changes are applied and in use correctly,
default values are displayed after selecting Submit
instead of new values.
Workaround There is no workaround.
|
Known Cisco Trust Agent Problems
Table 10 contains problems known to exist in CTA 2.0.0.30. These caveats address specifid behaviors of CTA that affect a NAC implementation. For a complete list of the features as well as caveats for CTA, refer to CTA's product release notes available at http://www.cisco.com.
Table 10 Known Problems of Cisco Trust Agent V.2.0
Bug ID
|
Headline
|
Explanation
|
CSCef09817
|
Install does not complete if port conflict arises.
|
Symptom If there is a port conflict with CTA on
Windows NT 4.0, during the CTA installation, the Cisco
Trust Agent EOU Daemon service does not start, and the
user is forced to cancel the installation. However, on
Windows XP and Windows 2000 you will be able to
finish the installation and see the port conflict error in the
CTA log.
Conditions Occurs on Windows NT.
Workaround The port which CTA listened can be changed in the ctad.ini file. If the port is changed to a nonconflicting port then the install continues. To change the port number look up LocalPort in the CTA Administrators Guide.
|
CSCsb47789
|
TLS alert bad_certificate(42) should be unknown_ca(48)
|
Symptom The CTA 802.1X Wired Client sends an
incorrect error code to the ACS. The 802.1X Wired
Client sends bad_certificate(42) when it should send
unknown_ca(48). This error gets logged on the ACS and
might mislead ACS administrators.
The result is an incorrect log on the ACS, but it does not effect the functionality of the 802.1X Wired Client nor ACS.
Conditions A valid certificate chain or a partial chain was received, but the certificate was not accepted because the CA certificate could not be located or could not be matched with a known, trusted CA
Workaround There is no workaround.
|
CSCsb67286
|
CTA does not respond to EOU hello from switch. Put in hold state.
|
Symptom CTA does not respond to an EAP over UDP
hello from the switch. The switch port is put into the held
state. This problem occurs even if the Windows XP
firewall has been configured to allow traffic to CTA or
has been configured to allow traffic over EAP over UDP.
At bootup, the Windows XP firewall loads a boot policy that blocks the EAP over UDP traffic to CTA. The boot policy is loaded even if the firewall is disabled but the firewall service is still running.
This behavior occurs primarily at system boot up. You can read more about the Windows firewall at this article in the Microsoft Security Developer Center: http://msdn.microsoft.com/security/productinfo/XPSP2/networkprotection/firewall.aspx.
Conditions Windows XP Service Pack 2 - Firewall service running.
Workaround Change the state of the Windows XP firewall service to manual or disabled.
|
CSCsb88110
|
The 802.1X Wired Client pop up box is hidden during bootup with multiple interfaces.
|
Symptom When booting up a PC with multiple interfaces
(four), with the 802.1X Wired Client installed, a user
enters his username on first popup box and then his
password. However, the second popup box does not
appear. The 802.1X Wired Client is waiting for the
password to be entered for the second popup box. Then
the third popup box appears. The forth popup box does
not appear but the 802.1X Wired Client waits for the
password to be entered.
Conditions This occurs with multiple interfaces that are all getting authenticated.
Workaround Set the EnableLogonNotifies attribute to 0 in the ctad.ini for CTA.
|
CSCsc18885
|
Erroneous log entry, claiming "Failed to read Registry Key" in CTA log.
|
Symptom When a user performs a fresh installation,
upgrade, or reinstallation of Cisco Trust Agent with
logging enabled, an erroneous log message is generated.
This message is similar to this message:
2 12:00:00.000 11/11/2005 Sev=Critical/1
PSDaemon/0xE3C0001A Failed to Read Registry Key,
error code 2
Conditions This erroneous log message was observed on the following platforms: Windows NT 4.0, Window 2000 and Windows XP
Workaround No workarounds are available. Note that this log message is erroneous and does not effect the running of Cisco Trust Agent.
|
CSCsc21188
|
When the CTA 802.1X Wired Client is idle, it does not respond to EAP requests from the switch.
|
Symptom When the CTA 802.1X Wired Client is idle, it
does not respond to EAP requests from the switch.
Conditions This condition occurs when a CTA machine is already connected to a port and after the port is enabled for IEEE 802.1X.
Workaround
• Reboot the client machine. When the machine starts, the IEEE 802.1X session initiates.
• Click the Connect button on the 802.1X Wired Client connection dialog.
|
CSCsc25865
|
New notification will not overwrite old user notification on Win NT 4.0.
|
Symptom Normally, CTA deletes old notifications before
displaying new notifications. However, in the case of an
upgrade, the original notification might not be removed.
If there is a CTA notification dialog open when CTA is
upgraded, the dialog is not removed when the CTA
receives the next notification.
Conditions This occurs with a upgrade while a CTA notification is being displayed.
Workaround Close notify dialog before upgrading.
|
CSCsc31219
|
User credentials dialog does not close upon failure to connect.
|
Symptom If the network client fails to provide a posture
at Layer 2, and ACS fails to set a policy for the network
client, and if the user enters incorrect credentials, the
popup windows box is not automatically removed from
the screen.
Workaround Users need to manually close the dialog box.
|
CSCsc39434
|
CTA modules are missing from CTA log file in Windows NT 4.0 with Service Pack 6a.
|
Symptom CTA modules (CTAMSG, CTASI, CTASC) are
missing from the CTA log file. This is a result of different
privileges existing among CTAMsg, CTASI, CTASC,
and the CTA log service.
Conditions Windows NT with Service Pack 6a.
Workaround There is no workaround.
|
CSCsc40724
|
A full posture is not triggered after scripting has a status change <CmdBold> ctasi <noCmdBold> <CmdArg> posture_data_file 1<noCmdArg> .
|
Symptom On Windows NT 4.0 with SP6a, using script
interface with option of n=1, the script does not trigger a
full posture validation at the end of the Status Query
timeout. The command to result in that a status change
has been detected is: ctasi posture_data_file 1.
Conditions Windows NT
Workaround There is no workaround on CTA. However, you can reduce the validation timeout on the NAD.
|
CSCsc43747
|
Fatal error displayed when uninstalling CTA.
|
Symptom The error dialog, Fatal[c0029]: Timed
semaphore failed appears when uninstalling CTA.
Workaround Ignore the error. It is a nonfatal dialog. It does not effect the uninstall.
|
CSCsc59547
|
WINNT gives ctamsg error if the EnableNotifies parameter is enabled when the notification is sent
|
Symptom When installing CTA client on Windows NT
with Service Pack 6a, the default setting for notifies is
enabled. On Windows NT this setting does not display
the posture status pop-up, but does cause an error with
ctamsg.exe and causes a Dr. Watson window to pop up.
If left unattended, these Dr. Watson Pop-ups will cause
the machine to run out of virtual memory. (Closing the
pop-up windows solves this problem).
Conditions Windows NT with Service Pack 6a
Workaround The workaround is to edit the c:\program files\cisco systems\ciscotrustagent\ctad.ini.windows file and set enablenotifies =0, then save the file as ctad.ini. This will disable the notify messages and cause the error pop-ups to stop displaying. In order to check the posture status of the machine, the user would have to use the clogcli utility to enable logging and verify the log file, or simply test network connectivity. c:\program files\cisco systems\ciscotrustagent\clogcli enable will enable logging, and the log file can be found in c:\program files\cisco systems\ciscotrustagent \logging\logs.
|
Known Cisco Security Agent Problems
This caveat addresses a specific behavior of Cisco Security Agent ( CSA) that affects a NAC implementation. For a complete list of the features as well as other caveats for CSA, refer to CSA's product release notes available at http://www.cisco.com.
Table 11 Known Limitations of Cisco Security Agent
Bug ID
|
Headline
|
Explanation
|
CSCsc15657
|
CSA NAC posture plugin exception removes CSA posture plugin from correct directory.
|
Symptom CSA posture plugin reports an exception
causing the plugin to be automatically copied to a
non active directory by CTA. The exception is
logged in the CTA logfile.
Conditions CSA version 4.5.0.565. CTA 1.0.55, Windows XP.
Workaround Copy CSA plugin (CiscoSecurityAgentPlugin.dll) back to correct directory: \Program Files\Common Files\PostureAgent\
|
Resolved Component Problems
This section describes problems that have been fixed since the first version of the Release Notes for Network Admission Control, Release 2.0 were distributed on November 28, 2005.
Resolved Catalyst 6500 Series Switch Problems
These problems with Catalyst 6500 series switches running the CatOS 8.5 JAC operating systems were resolved in CatOS software release 8.5(2).
Table 12 Problems Resolved by CatOS 8.5(2) Operating system
Bug ID
|
Headline
|
Explanation
|
CSCsc31164
|
No syslog generated when SQ fails due to Posture change
|
A status query failure used to occur when a host replied with an EAP NAK message, the NAD was unable to match the status query packet sent by the host, or there was no response for the status query request from the host. This problem is resolved in software release 8.5(2).
|
CSCsb99920
|
No syslog message is generated when an EOU session is manually cleared.
|
This problem is resolved in software release 8.5(2).
|
CSCei69405
|
SET EOU AUTH mac-addr/ip-addr not displayed as configured
|
When you configured an exception list with a MAC address and mask, the subsequent show display output displayed the address with the mask applied. However, the display looks altered from the way it was configured. The display was also inconsistent with the way information is displayed by the show security acl info command. This problem is resolved in software release 8.5(2).
|
CSCsc14943
|
copy cfg all incl set eou timeout idle + set port eou cmd; produce usage
|
When you enter the copy config all command, the set eou timeout idle command which is not supported, appears in the configuration file.
Workaround: Do not copy the default configuration to a file in text configuration mode. Copy non-default configurations using the copy config command when using text configuration mode or saving the configuration (or use binary mode). This problem is resolved in software release 8.5(2)
|
CSCsc32787
|
New command to enable sending Host IP in Calling-Station-ID attrib
|
The current switch implementation sends the MAC address of the host in the Calling-Station-ID attribute in the RADIUS requests to the ACS. Due to requirements from the reporting and monitoring devices, a new command, set eou allow ip-station-id, was created to enable sending the host IP address in the Calling-Station-ID attribute in the RADIUS requests to the ACS. This problem is resolved in software release 8.5(2).
|
CSCsc35238
|
Dot1x Auth: Invalid RADIUS Accounting messages
|
The switch is sending invalid RADIUS accounting messages to the ACS and the ACS is ignoring these messages due to the following issues:
1) Per RFC 2869 section 5.13, the EAP message (79) attribute should not be included in the accounting request (code=4) RADIUS messages. The switch is incorrectly including them in start and stop records (not in interim/update records).
2) Inserting the EAP message (79) attribute payload in the attributes and not populating the message authenticator (80) attribute is a violation of the RFC. The message authenticator attribute is missing from the messages when the EAP message (79) attribute is present.
This problem is resolved in software release 8.5(2)
|
CSCsc53253
|
LPIP goes to abort state with CTA 2.0.0.26 when configured with lp1x
|
The cookie TLV received from the Hello Response packet should be included only in the first EoU validate packet and should not be included in subsequent validate retransmits. The switch is including the cookie TLV in retransmitted validate packets and the CTA is discarding the packets which is causing the switch to go to abort state. This problem is resolved in software release 8.5(2).
|
Resolved Cisco Secure Access Control Server Problems
Table 13 Resolved Problems in ACS
Bug ID
|
Headline
|
Explanation
|
CSCea91947
|
ACS does not authenticate Windows 2000 users when NTLMv2 is enabled on the network
|
Symptom The data from the NTLMv2's hashing
function was applied to the MS-CHAP response
and the Domain Controller receives a hash of the
data it really needs. ACS can authenticate a
MS-CHAP challenge/response only, and not a
hash of it. A field notice addressed this issue:
http://www-tac.cisco.com/Support_Library/field_alerts/fn62167.html
Resolution ACS now supports NTLMv2.
|
CSCeb51393
|
Multi-admin needs to be able to add, edit, and delete downloadable ACLs.
|
No conflicts exist when multiple administrators try to add, edit, and delete downloadable ACLs under the shared profile components.
|
CSCee77099
|
The navigation bar (buttons) disappears after exiting from the Global Authentication Setup page
|
The navigation bar (button bar on the left) in the ACS web interface appears successfully after exiting from the Global Authentication page.
|
CSCee83677
|
NAC attribute type change can cause NAC GUI error
|
NAC errors no longer occur after an administrator changes the type of an existing NAC attribute by using the CSUtil (or because of backup and restore).
|
CSCee88908
|
CSLog fails if a logged attribute is deleted due to replication
|
The CSLog works as expected after replication.
|
CSCeh09266
|
Errors occurs while installing ACS on directory with special characters.
|
The percent sign (%) that caused the problem with ACS installing correctly is fixed in ACS 4.0.
|
CSCeh93481
|
Network Access Filter names and settings must be unique.
|
Symptom Network Access Profile configuration
problems occured when you created a NAF with
a previously used name.
Resolution Resolved in latest release.
|
Resolved Cisco Security Agent Problems
These problems with Cisco Security Agent (CSA) 4.5.1.639 were resolved in release 5.0.0.176.
Table 14 Resolved Problems in Cisco Security Agent
Bug ID
|
Headline
|
Explanation
|
CSCeg90229
|
If CTA install by way of CSA fails, CSA refers to a non existent CTA log file
|
Cisco Trust Agent is an optional component that can be installed by Cisco Security Agent on any Windows platform. On Windows NT, the CTA installer fails because it is not a supported platform.
The error message is presented in a message box and is not written to a log file.
|
CSCsb20867
|
CSA misinterprets some desired CTA behavior as malicious and prevents the behavior.
|
CSA attempts to prevent NAC URL redirects though this is the desired behavior.
This issue has been fixed in CSA 5.0 with a default policy update. The issue is very similar to CSCsc03048 however some different files are accessed based on the system configuration.
|
CSCsb46561
|
There is no option to install CTA with a scheduled update from CSA 4.0.x to 4.5.
|
This defect has been fixed in 5.0 release. A check box has been added to upgrade the Cisco Trust Agent along with the CSA agent upgrade. Since this defect is fixed in V5.0, the software updates from 5.0 onwards only will have this feature. CSA 4.0.x and 4.5 Management Centers do not have this feature.
|
CSCsb74842
|
CSA's CTA install utility needs to be able to specify multiple certificates.
|
Up to 10 certificates can now be specified when installing CTA through CSA.
|
CSCsc03048
|
CSA security policies for Internet Explorer block NAC URL redirection
|
Created a new rule in the Cisco Trust Agent module to CTA to modify browser related temporary files.
|
CSCsc34302
|
CSA does not know if CTA has been uninstalled
|
The issue was fixed by having the agent user interface appropriately not show the NAC posture result when it detects that CTA is not installed, and by resetting the CSA internal system state whenever CTA is not detected on the system.
|
CSCsc37684
|
CSA security policy prevents installation of CSA plugin to CTA directory.
|
The Cisco Trust Agent rule module now considers the documented posture agent plugin directory to be a part of the CTA executables. CTA can now manage/move installed plugins.
|
CSCsc58244
|
CTA false positive on IE history folder creation
|
Added an allow rule in the Cisco Trust Agent - Windows policy to allow CTA to write to this directory: **\History\*\MSHist*\*
|
Obtaining Documentation
Cisco documentation and additional literature are available on Cisco.com. Cisco also provides several ways to obtain technical assistance and other technical resources. These sections explain how to obtain technical information from Cisco Systems.
Cisco.com
You can access a central point for NAC information at this URL:
http://www.cisco.com/go/nac
You can access the most current Cisco documentation at this URL:
http://www.cisco.com/techsupport
You can access the Cisco website at this URL:
http://www.cisco.com
You can access international Cisco websites at this URL:
http://www.cisco.com/public/countries_languages.shtml
Ordering Documentation
Beginning June 30, 2005, registered Cisco.com users can order Cisco documentation at the Product Documentation Store in the Cisco Marketplace at this URL:
http://www.cisco.com/go/marketplace/
Nonregistered Cisco.com users can order technical documentation from 8:00 a.m. to 5:00 p.m. (0800 to 1700) PDT by calling 1 866 463-3487 in the United States and Canada, or elsewhere by calling 011 408 519-5055. You can also order documentation by e-mail at tech-doc-store-mkpl@external.cisco.com or by fax at 1 408 519-5001 in the United States and Canada, or elsewhere at 011 408 519-5001.
Documentation Feedback
You can rate and provide feedback about Cisco technical documents by completing the online feedback form that appears with the technical documents on Cisco.com.
You can send comments about Cisco documentation to bug-doc@cisco.com.
You can submit comments by using the response card (if present) behind the front cover of your document or by writing to the following address:
Cisco Systems
Attn: Customer Document Ordering
170 West Tasman Drive
San Jose, CA 95134-9883
We appreciate your comments.
Cisco Product Security Overview
Cisco provides a free online Security Vulnerability Policy portal at this URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html
From this site, you can perform these tasks:
•
Report security vulnerabilities in Cisco products.
•
Obtain assistance with security incidents that involve Cisco products.
•
Register to receive security information from Cisco.
A current list of security advisories and notices for Cisco products is available at this URL:
http://www.cisco.com/go/psirt
If you prefer to see advisories and notices as they are updated in real time, you can access a Product Security Incident Response Team Really Simple Syndication (PSIRT RSS) feed from this URL:
http://www.cisco.com/en/US/products/products_psirt_rss_feed.html
Reporting Security Problems in Cisco Products
Cisco is committed to delivering secure products. We test our products internally before we release them, and we strive to correct all vulnerabilities quickly. If you think that you might have identified a vulnerability in a Cisco product, contact PSIRT:
•
Emergencies — security-alert@cisco.com
An emergency is either a condition in which a system is under active attack or a condition for which a severe and urgent security vulnerability should be reported. All other conditions are considered non-emergencies.
•
Non-emergencies — psirt@cisco.com
In an emergency, you can also reach PSIRT by telephone:
•
1 877 228-7302
•
1 408 525-6532
Tip
We encourage you to use Pretty Good Privacy (PGP) or a compatible product to encrypt any sensitive information that you send to Cisco. PSIRT can work from encrypted information that is compatible with PGP versions 2.x through 8.x.
Never use a revoked or an expired encryption key. The correct public key to use in your correspondence with PSIRT is the one linked in the Contact Summary section of the Security Vulnerability Policy page at this URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html
The link on this page has the current PGP key ID in use.
Obtaining Technical Assistance
Cisco Technical Support provides 24-hour-a-day award-winning technical assistance. The Cisco Technical Support & Documentation website on Cisco.com features extensive online support resources. In addition, if you have a valid Cisco service contract, Cisco Technical Assistance Center (TAC) engineers provide telephone support. If you do not have a valid Cisco service contract, contact your reseller.
Cisco Technical Support & Documentation Website
The Cisco Technical Support & Documentation website provides online documents and tools for troubleshooting and resolving technical issues with Cisco products and technologies. The website is available 24 hours a day, at this URL:
http://www.cisco.com/techsupport
Access to all tools on the Cisco Technical Support & Documentation website requires a Cisco.com user ID and password. If you have a valid service contract but do not have a user ID or password, you can register at this URL:
http://tools.cisco.com/RPF/register/register.do
Note
Use the Cisco Product Identification (CPI) tool to locate your product serial number before submitting a web or phone request for service. You can access the CPI tool from the Cisco Technical Support & Documentation website by clicking the Tools & Resources link under Documentation & Tools. Choose Cisco Product Identification Tool from the Alphabetical Index drop-down list, or click the Cisco Product Identification Tool link under Alerts & RMAs. The CPI tool offers three search options: by product ID or model name; by tree view; or for certain products, by copying and pasting show command output. Search results show an illustration of your product with the serial number label location highlighted. Locate the serial number label on your product and record the information before placing a service call.
Submitting a Service Request
Using the online TAC Service Request Tool is the fastest way to open S3 and S4 service requests. (S3 and S4 service requests are those in which your network is minimally impaired or for which you require product information.) After you describe your situation, the TAC Service Request Tool provides recommended solutions. If your issue is not resolved using the recommended resources, your service request is assigned to a Cisco engineer. The TAC Service Request Tool is located at this URL:
http://www.cisco.com/techsupport/servicerequest
For S1 or S2 service requests or if you do not have Internet access, contact the Cisco TAC by telephone. (S1 or S2 service requests are those in which your production network is down or severely degraded.) Cisco engineers are assigned immediately to S1 and S2 service requests to help keep your business operations running smoothly.
To open a service request by telephone, use one of the following numbers:
Asia-Pacific: +61 2 8446 7411 (Australia: 1 800 805 227)
EMEA: +32 2 704 55 55
USA: 1 800 553-2447
For a complete list of Cisco TAC contacts, go to this URL:
http://www.cisco.com/techsupport/contacts
Definitions of Service Request Severity
To ensure that all service requests are reported in a standard format, Cisco has established severity definitions.
Severity 1 (S1)—Your network is "down," or there is a critical impact to your business operations. You and Cisco will commit all necessary resources around the clock to resolve the situation.
Severity 2 (S2)—Operation of an existing network is severely degraded, or significant aspects of your business operation are negatively affected by inadequate performance of Cisco products. You and Cisco will commit full-time resources during normal business hours to resolve the situation.
Severity 3 (S3)—Operational performance of your network is impaired, but most business operations remain functional. You and Cisco will commit resources during normal business hours to restore service to satisfactory levels.
Severity 4 (S4)—You require information or assistance with Cisco product capabilities, installation, or configuration. There is little or no effect on your business operations.
Obtaining Additional Publications and Information
Information about Cisco products, technologies, and network solutions is available from various online and printed sources.
•
Cisco Marketplace provides a variety of Cisco books, reference guides, documentation, and logo merchandise. Visit Cisco Marketplace, the company store, at this URL:
http://www.cisco.com/go/marketplace/
•
Cisco Press publishes a wide range of general networking, training and certification titles. Both new and experienced users will benefit from these publications. For current Cisco Press titles and other information, go to Cisco Press at this URL:
http://www.ciscopress.com
•
Packet magazine is the Cisco Systems technical user magazine for maximizing Internet and networking investments. Each quarter, Packet delivers coverage of the latest industry trends, technology breakthroughs, and Cisco products and solutions, as well as network deployment and troubleshooting tips, configuration examples, customer case studies, certification and training information, and links to scores of in-depth online resources. You can access Packet magazine at this URL:
http://www.cisco.com/packet
•
iQ Magazine is the quarterly publication from Cisco Systems designed to help growing companies learn how they can use technology to increase revenue, streamline their business, and expand services. The publication identifies the challenges facing these companies and the technologies to help solve them, using real-world case studies and business strategies to help readers make sound technology investment decisions. You can access iQ Magazine at this URL:
http://www.cisco.com/go/iqmagazine
or view the digital edition at this URL:
http://ciscoiq.texterity.com/ciscoiq/sample/
•
Internet Protocol Journal is a quarterly journal published by Cisco Systems for engineering professionals involved in designing, developing, and operating public and private internets and intranets. You can access the Internet Protocol Journal at this URL:
http://www.cisco.com/ipj
•
Networking products offered by Cisco Systems, as well as customer support services, can be obtained at this URL:
http://www.cisco.com/en/US/products/index.html
•
Networking Professionals Connection is an interactive website for networking professionals to share questions, suggestions, and information about networking products and technologies with Cisco experts and other networking professionals. Join a discussion at this URL:
http://www.cisco.com/discuss/networking
•
World-class networking training is available from Cisco. You can view current offerings at this URL:
http://www.cisco.com/en/US/learning/index.html
CCDE, CCVP, Cisco Eos, Cisco StadiumVision, the Cisco logo, DCE, and Welcome to the Human Network are trademarks; Changing the Way We Work, Live, Play, and Learn is a service mark; and Access Registrar, Aironet, AsyncOS, Bringing the Meeting To You, Catalyst, CCDA, CCDP, CCIE, CCIP, CCNA, CCNP, CCSP, Cisco, the Cisco Certified Internetwork Expert logo, Cisco IOS, Cisco Press, Cisco Systems, Cisco Systems Capital, the Cisco Systems logo, Cisco Unity, Collaboration Without Limitation, Enterprise/Solver, EtherChannel, EtherFast, EtherSwitch, Event Center, Fast Step, Follow Me Browsing, FormShare, GigaDrive, HomeLink, Internet Quotient, IOS, iPhone, IP/TV, iQ Expertise, the iQ logo, iQ Net Readiness Scorecard, iQuick Study, IronPort, the IronPort logo, LightStream, Linksys, MediaTone, MeetingPlace, MGX, Networkers, Networking Academy, Network Registrar, PCNow, PIX, PowerPanels, ProConnect, ScriptShare, SenderBase, SMARTnet, Spectrum Expert, StackWise, The Fastest Way to Increase Your Internet Quotient, TransPath, WebEx, and the WebEx logo are registered trademarks of Cisco Systems, Inc. and/or its affiliates in the United States and certain other countries.
All other trademarks mentioned in this document or Website are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (0801R)