PDF

Release Notes for Cisco ASDM, 7.5(x)
First Published: 2015-08-31
Last Modified: --
Release Notes for Cisco ASDM, 7.5(x)
This document contains release information for Cisco ASDM Version 7.5(x) for the Cisco ASA series.
Important Notes
• E-mail proxy commands deprecated—In ASA Version 9.5(2), the e-mail proxy commands (imap4s,
pop3s, smtps) and subcommands are no longer supported.
• CSD commands deprecated or migrated—In ASA Version 9.5(2), the CSD commands (csd image,
show webvpn csd image, show webvpn csd, show webvpn csd hostscan, show webvpn csd hostscan
image) are no longer supported.
The following CSD commands will migrate: csd enable migrates to hostscan enable; csd hostscan
image migrates to hostscan image.
• Select AAA commands deprecated—In ASA Version 9.5(2), these AAA commands and subcommands
(override-account-disable, authentication crack) are no longer supported.
• The RSA toolkit version used in ASA 9.x is different from what was used in ASA 8.4, which causes
differences in PKI behavior between these two versions.
For example, ASAs running 9.x software allow you to import certificates with an Organizational Name
Value (OU) field length of 73 characters. ASAs running 8.4 software allow you to import certificates
with an OU field name of 60 characters. Because of this difference, certificates that can be imported in
ASA 9.x will fail to be imported to ASA 8.4. If you try to import an ASA 9.x certificate to an ASA
running version 8.4, you will likely receive the error, "ERROR: Import PKCS12 operation failed.
System Requirements
This section lists the system requirements to run this release.
ASDM Client Operating System and Browser Requirements
The following table lists the supported and recommended client operating systems and Java for ASDM.
Release Notes for Cisco ASDM, 7.5(x)
1
Release Notes for Cisco ASDM, 7.5(x)
Java and Browser Compatibility
Table 1: Operating System and Browser Requirements
Operating System
Browser
Java SE Plug-in
Internet Firefox Safari Chrome
Explorer
Microsoft Windows (English and Japanese):
Yes
Yes
8
No
Yes
support
7.0 or later
7
Server 2008
Server 2012
Apple OS X 10.4 and later
No
Yes
support
Yes
Yes
(64-bit
version
only)
7.0 or later
Red Hat Enterprise Linux 5 (GNOME or KDE):
N/A
N/A
Yes
7.0 or later
Yes
Desktop
Desktop with Workstation
Java and Browser Compatibility
The following table lists compatibility caveats for Java, ASDM, and browser compatibility.
Release Notes for Cisco ASDM, 7.5(x)
2
Release Notes for Cisco ASDM, 7.5(x)
Java and Browser Compatibility
Java
Version
Conditions
7 update 51 ASDM Launcher requires trusted
certificate
Notes
To continue using the Launcher, do one of the following:
• Upgrade to Java 8 or downgrade Java to 7 update
45 or earlier.
• Install a trusted certificate on the ASA from a
known CA.
• Install a self-signed certificate and register it with
Java. See Install an Identity Certificate for ASDM.
• Alternatively use Java Web Start.
Note
ASDM 7.1(5) and earlier are not supported with
Java 7 update 51. If you already upgraded Java,
and can no longer launch ASDM in order to
upgrade it to Version 7.2 or later, then you can
either use the CLI to upgrade ASDM, or you
can add a security exception in the Java Control
Panel for each ASA you want to manage with
ASDM. See the “Workaround” section at:
http://java.com/en/download/help/java_
blocked.xml
After adding the security exception, launch the
older ASDM and then upgrade to 7.2 or later.
In rare cases, online help does not
load when using Java Web Start
In rare cases, when launching online help, the browser
window loads, but the content fails to appear. The
browser reports an error: “Unable to connect”.
Workaround:
• Use the ASDM Launcher
Or:
• Clear the -Djava.net.preferIPv6Addresses=true
parameter in Java Runtime Parameters:
1 Launch the Java Control Panel.
2 Click the Java tab.
3 Click View.
4 Clear this parameter:
-Djava.net.preferIPv6Addresses=true
5 Click OK, then Apply, then OK again.
Release Notes for Cisco ASDM, 7.5(x)
3
Release Notes for Cisco ASDM, 7.5(x)
Java and Browser Compatibility
Java
Version
Conditions
7 update 45 ASDM shows a yellow warning
about the missing Permissions
attribute when using an untrusted
certificate
7
Notes
Due to a bug in Java, if you do not have a trusted
certificate installed on the ASA, you see a yellow warning
about a missing Permissions attribute in the JAR
manifest. It is safe to ignore this warning; ASDM 7.2
and later includes the Permissions attribute. To prevent
the warning from appearing, install a trusted certificate
(from a known CA); or generate a self-signed certificate
on the ASA by choosing Configuration > Device
Management > Certificates > Identity Certificates.
Launch ASDM, and when the certificate warning is
shown, check the Always trust connections to websites
check box.
Requires strong encryption license ASDM requires an SSL connection to the ASA. You can
(3DES/AES) on ASA
request a 3DES license from Cisco:
1 Go to www.cisco.com/go/license.
2 Click Continue to Product License Registration.
3 In the Licensing Portal, click Get Other Licenses
next to the text field.
4 Choose IPS, Crypto, Other... from the drop-down
list.
5 Type ASA in to the Search by Keyword field.
6 Select Cisco ASA 3DES/AES License in the Product
list, and click Next.
7 Enter the serial number of the ASA, and follow the
prompts to request a 3DES/AES license for the ASA.
Release Notes for Cisco ASDM, 7.5(x)
4
Release Notes for Cisco ASDM, 7.5(x)
Java and Browser Compatibility
Java
Version
All
Conditions
• Self-signed certificate or an
untrusted certificate
• IPv6
• Firefox and Safari
Notes
When the ASA uses a self-signed certificate or an
untrusted certificate, Firefox and Safari are unable to add
security exceptions when browsing using HTTPS over
IPv6. See https://bugzilla.mozilla.org/show_
bug.cgi?id=633001. This caveat affects all SSL
connections originating from Firefox or Safari to the
ASA (including ASDM connections). To avoid this
caveat, configure a proper certificate for the ASA that is
issued by a trusted certificate authority.
If you change the SSL encryption on the ASA to exclude
• SSL encryption on the ASA both RC4-MD5 and RC4-SHA1 algorithms (these
must include both RC4-MD5 algorithms are enabled by default), then Chrome cannot
and RC4-SHA1 or disable
launch ASDM due to the Chrome “SSL false start”
SSL false start in Chrome.
feature. We suggest re-enabling one of these algorithms
(see the Configuration > Device Management >
• Chrome
Advanced > SSL Settings pane); or you can disable SSL
false start in Chrome using the --disable-ssl-false-start
flag according to Run Chromium with flags.
IE9 for servers
For Internet Explorer 9.0 for servers, the “Do not save
encrypted pages to disk” option is enabled by default
(See Tools > Internet Options > Advanced). This option
causes the initial ASDM download to fail. Be sure to
disable this option to allow ASDM to download.
OS X
On OS X, you may be prompted to install Java the first
time you run ASDM; follow the prompts as necessary.
ASDM will launch after the installation completes.
Release Notes for Cisco ASDM, 7.5(x)
5
Release Notes for Cisco ASDM, 7.5(x)
Java and Browser Compatibility
Java
Version
Conditions
All
OS X 10.8 and later
Release Notes for Cisco ASDM, 7.5(x)
6
Notes
Release Notes for Cisco ASDM, 7.5(x)
Java and Browser Compatibility
Java
Version
Conditions
Notes
You need to allow ASDM to run because it is not signed
with an Apple Developer ID. If you do not change your
security preferences, you see an error screen.
1 To allow ASDM to run, right-click (or Ctrl-Click)
the Cisco ASDM-IDM Launcher icon, and choose
Open.
2 You see a similar error screen; however, you can open
ASDM from this screen. Click Open. The
ASDM-IDM Launcher opens.
Release Notes for Cisco ASDM, 7.5(x)
7
Release Notes for Cisco ASDM, 7.5(x)
Install an Identity Certificate for ASDM
Java
Version
Conditions
Notes
Install an Identity Certificate for ASDM
When using Java 7 update 51 and later, the ASDM Launcher requires a trusted certificate. An easy approach
to fulfill the certificate requirements is to install a self-signed identity certificate. You can use Java Web Start
to launch ASDM until you install a certificate.
See Install an Identity Certificate for ASDM to install a self-signed identity certificate on the ASA for use
with ASDM, and to register the certificate with Java.
Increase the ASDM Configuration Memory
ASDM supports a maximum configuration size of 512 KB. If you exceed this amount you may experience
performance issues. For example, when you load the configuration, the status dialog box shows the percentage
of the configuration that is complete, yet with large configurations it stops incrementing and appears to suspend
operation, even though ASDM might still be processing the configuration. If this situation occurs, we
recommend that you consider increasing the ASDM system heap memory.
Increase the ASDM Configuration Memory in Windows
To increase the ASDM heap memory size, edit the run.bat file by performing the following procedure.
Step 1
Step 2
Step 3
Step 4
Go to the ASDM installation directory, for example C:\Program Files (x86)\Cisco Systems\ASDM.
Edit the run.bat file with any text editor.
In the line that starts with “start javaw.exe”, change the argument prefixed with “-Xmx” to specify your desired heap size.
For example, change it to -Xmx768M for 768 MB or -Xmx1G for 1 GB.
Save the run.bat file.
Release Notes for Cisco ASDM, 7.5(x)
8
Release Notes for Cisco ASDM, 7.5(x)
ASA and ASDM Compatibility
Increase the ASDM Configuration Memory in Mac OS
To increase the ASDM heap memory size, edit the Info.plist file by performing the following procedure.
Step 1
Step 2
Right-click the Cisco ASDM-IDM icon, and choose Show Package Contents.
In the Contents folder, double-click the Info.plist file. If you have Developer tools installed, it opens in the Property
List Editor. Otherwise, it opens in TextEdit.
Step 3
Under Java > VMOptions, change the string prefixed with “-Xmx” to specify your desired heap size. For example,
change it to -Xmx768M for 768 MB or -Xmx1G for 1 GB.
Step 4
If this file is locked, you see an error such as the following:
Step 5
Click Unlock and save the file.
If you do not see the Unlock dialog box, exit the editor, right-click the Cisco ASDM-IDM icon, choose Copy Cisco
ASDM-IDM, and paste it to a location where you have write permissions, such as the Desktop. Then change the heap
size from this copy.
ASA and ASDM Compatibility
For information about ASA/ASDM software and hardware requirements and compatibility, including module
compatibility, see Cisco ASA Compatibility.
Release Notes for Cisco ASDM, 7.5(x)
9
Release Notes for Cisco ASDM, 7.5(x)
VPN Compatibility
VPN Compatibility
For VPN compatibility, see Supported VPN Platforms, Cisco ASA 5500 Series.
New Features
This section lists new features for each release.
Note
New, changed, and deprecated syslog messages are listed in the syslog message guide.
New Features in ASA 9.5(2.1)/ASDM 7.5(2)
Released: December 14, 2015
Note
This release supports only the ASA on the Firepower 9300.
Feature
Description
Platform Features
VPN support for the ASA on the
Firepower 9300
With FXOS 1.1.3, you can now configure VPN features.
Firewall Features
Flow off-load for the ASA on the
Firepower 9300
You can identify flows that should be off-loaded from the ASA and switched directly in the
NIC (on the Firepower 9300). This provides improved performance for large data flows in
data centers.
Also requires FXOS 1.1.3.
We added or modified the following screens: Configuration > Firewall > Advanced >
Offload Engine, the Rule Actions > Connection Settings tab when adding or editing rules
under Configuration > Firewall > Service Policy Rules.
High Availability Features
Inter-chassis clustering for 6
With FXOS 1.1.3, you can now enable inter-chassis, and by extension inter-site clustering.
modules, and inter-site clustering for You can include up to 6 modules in up to 6 chassis.
the ASA on the Firepower 9300
We did not modify any screens.
Licensing Features
Release Notes for Cisco ASDM, 7.5(x)
10
Release Notes for Cisco ASDM, 7.5(x)
New Features in ASA 9.5(2)/ASDM 7.5(2)
Feature
Description
Strong Encryption (3DES) license
automatically applied for the ASA
on the Firepower 9300
For regular Cisco Smart Software Manager users, the Strong Encryption license is automatically
enabled for qualified customers when you apply the registration token on the Firepower 9300.
If you are using the Smart Software Manager satellite deployment, to use ASDM
and other strong encryption features, after you deploy the ASA you must enable the
Strong Encryption (3DES) license using the ASA CLI.
This feature requires FXOS 1.1.3.
Note
We modified the following screen: Configuration > Device Management > Licensing >
Smart License
New Features in ASA 9.5(2)/ASDM 7.5(2)
Released: November 30, 2015
Feature
Description
Platform Features
Cisco ISA 3000 Support
The Cisco ISA 3000 is a DIN Rail mounted, ruggedized, industrial security appliance. It is
low-power, fan-less, with Gigabit Ethernet and a dedicated management port. This model
comes with the ASA Firepower module pre-installed. Special features for this model include
a customized transparent mode default configuration, as well as a hardware bypass function
to allow traffic to continue flowing through the appliance when there is a loss of power.
We modified the following screen: Configuration > Device Management > Hardware
Bypass
Also in Version 9.4(1.225).
Firewall Features
DCERPC inspection improvements DCERPC inspection now supports NAT for OxidResolver ServerAlive2 opnum5 messages.
and UUID filtering
You can also now filter on DCERPC message universally unique identifiers (UUIDs) to reset
or log particular message types. There is a new DCERPC inspection class map for UUID
filtering.
We added the following screen: Configuration > Firewall > Objects > Class Maps >
DCERPC.
We modified the following screen: Configuration > Firewall > Objects > Inspect Maps
> DCERPC.
Diameter inspection
You can now inspect Diameter traffic. Diameter inspection requires the Carrier license.
We added or modified the following screens:
Configuration > Firewall > Objects > Inspect Maps > Diameter and Diameter AVP
Configuration > Firewall > Service Policy add/edit wizard's Rule Actions > Protocol
Inspection tab
Release Notes for Cisco ASDM, 7.5(x)
11
Release Notes for Cisco ASDM, 7.5(x)
New Features in ASA 9.5(2)/ASDM 7.5(2)
Feature
Description
SCTP inspection and access control You can now use the SCTP protocol and port specifications in service objects, access control
lists (ACLs) and access rules, and inspect SCTP traffic. SCTP inspection and access control
requires the Carrier license.
We added or modified the following screens:
Configuration > Firewall > Access Rules add/edit dialogs
Configuration > Firewall > Advanced > ACL Manager add/edit dialogs
Configuration > Firewall > Advanced > Global Timeouts
Configuration > Firewall > NAT add/edit static network object NAT rule, Advanced NAT
Settings dialog box
Configuration > Firewall > Objects > Service Objects/Groups add/edit dialogs
Configuration > Firewall > Objects > Inspect Maps > SCTP
Configuration > Firewall > Service Policy add/edit wizard' s Rule Actions > Protocol
Inspection and Connection Settings tabs
Carrier Grade NAT enhancements For carrier-grade or large-scale PAT, you can allocate a block of ports for each host, rather
now supported in failover and ASA than have NAT allocate one port translation at a time (see RFC 6888). This feature is now
clustering
supported in failover and ASA cluster deployments.
We did not modify any screens.
Captive portal for active
The captive portal feature is required to enable active authentication using identity policies
authentication on ASA FirePOWER starting with ASA FirePOWER 6.0.
6.0.
We introduced or modified the following commands: captive-portal, clear configure
captive-portal, show running-config captive-portal.
High Availability Features
LISP Inspection for Inter-Site Flow Cisco Locator/ID Separation Protocol (LISP) architecture separates the device identity from
Mobility
its location into two different numbering spaces, making server migration transparent to clients.
The ASA can inspect LISP traffic for location changes and then use this information for
seamless clustering operation; the ASA cluster members inspect LISP traffic passing between
the first hop router and the egress tunnel router (ETR) or ingress tunnel router (ITR), and then
change the flow owner to be at the new site.
We introduced or modified the following screens:
Configuration > Device Management > High Availability and Scalability > ASA Cluster
> Cluster Configuration
Configuration > Firewall > Objects > Inspect Maps > LISP
Configuration > Firewall > Service Policy Rules > Protocol Inspection
Configuration > Firewall > Service Policy Rules > Cluster
Monitoring > Routing > LISP-EID Table
Release Notes for Cisco ASDM, 7.5(x)
12
Release Notes for Cisco ASDM, 7.5(x)
New Features in ASA 9.5(2)/ASDM 7.5(2)
Feature
Description
ASA 5516-X support for clustering The ASA 5516-X now supports 2-unit clusters. Clustering for 2 units is enabled by default
in the base license.
We did not modify any screens.
Configurable level for clustering
trace entries
By default, all levels of clustering events are included in the trace buffer, including many low
level events. To limit the trace to higher level events, you can set the minimum trace level for
the cluster.
We did not modify any screens.
Interface Features
Support to map Secondary VLANs You can now configure one or more secondary VLANs for a subinterface. When the ASA
to a Primary VLAN
receives traffic on the secondary VLANs, it maps the traffic to the primary VLAN.
We modified the following screens: Configuration > Device Setup > Interface Settings >
Interfaces
Configuration > Device Setup > Interface Settings > Interfaces > Add Interface > General
Routing Features
PIM Bootstrap Router (BSR) support The ASA currently supports configuring static RPs to route multicast traffic for different
for multicast routing
groups. For large complex networks where multiple RPs could exist, the ASA now supports
dynamic RP selection using PIM BSR to support mobility of RPs.
We introduced the following screen: Configuration > Device Setup > Routing > Multicast
> PIM > Bootstrap Router
Remote Access Features
Support for Remote Access VPN in You can now use the following remote access features in multiple context mode:
multiple context mode
• AnyConnect 3.x and later (SSL VPN only; no IKEv2 support)
• Centralized AnyConnect image configuration
• AnyConnect image upgrade
• Context Resource Management for AnyConnect connections
The AnyConnect Apex license is required for multiple context mode; you cannot use
the default or legacy license.
We modified the following screen: Configuration > Context Management > Resource
Class > Add Resource Class
Note
Clientless SSL VPN offers SAML
2.0-based Single Sign-On (SSO)
functionality
The ASA acts as a SAML Service Provider.
Clientless SSL VPN conditional
debugging
You can debug logs by filtering, based on the filter condition sets, and can then better analyze
them.
Release Notes for Cisco ASDM, 7.5(x)
13
Release Notes for Cisco ASDM, 7.5(x)
New Features in ASA 9.5(2)/ASDM 7.5(2)
Feature
Description
Clientless SSL VPN cache disabled The clientless SSL VPN cache is now disabled by default. Disabling the clientless SSL VPN
by default
cache provides better stability. If you want to enable the cache, you must manually enable it.
We modified the following screen: Configuration > Remote Access VPN > Clientless SSL
VPN Access > Advanced > Content Cache
Licensing Features
Validation of the Smart Call
Home/Smart Licensing certificate if
the issuing hierarchy of the server
certificate changes
Smart licensing uses the Smart Call Home infrastructure. When the ASA first configures
Smart Call Home anonymous reporting in the background, it automatically creates a trustpoint
containing the certificate of the CA that issued the Smart Call Home server certificate. The
ASA now supports validation of the certificate if the issuing hierarchy of the server certificate
changes; you can enable the automatic update of the trustpool bundle at periodic intervals.
We modified the following screen: Configuration > Remote Access VPN > Certificate
Management > Trusted Certificate Pool > Edit Policy
New Carrier license
The new Carrier license replaces the existing GTP/GPRS license, and also includes support
for SCTP and Diameter inspection. For the ASA on the Firepower 9300, the feature mobile-sp
command will automatically migrate to the feature carrier command.
We modified the following screen: Configuration > Device Management > Licensing >
Smart License
Monitoring Features
SNMP engineID sync
In an HA pair, the SNMP engineIDs of the paired ASAs are synced on both units. Three sets
of engineIDs are maintained per ASA—synced engineID, native engineID and remote
engineID.
An SNMPv3 user can also specify the engineID of the ASA when creating a profile to preserve
localized snmp-server user authentication and privacy options. If a user does not specify the
native engineID, the show running config output will show two engineIDs per user.
We did not add or modify any screens.
Also available in 9.4(3).
show tech support enhancements
The show tech support command now:
• Includes dir all-filesystems output—This output can be helpful in the following cases:
◦SSL VPN configuration: check if the required resources are on the ASA
◦Crash: check for the date timestamp and presence of a crash file
• Removes the show kernel cgroup-controller detail output—This command output
will remain in the output of show tech-support detail.
We did not add or modify any screens.
Also available in 9.1(7) and 9.4(3).
Release Notes for Cisco ASDM, 7.5(x)
14
Release Notes for Cisco ASDM, 7.5(x)
New Features in ASA 9.5(1.5)/ASDM 7.5(1.112)
Feature
Description
logging debug-trace persistence
Formerly, when you enabled logging debug-trace to redirect debugs to a syslog server, if the
SSH connection were disconnected (due to network connectivity or timeout), then the debugs
were removed. Now, debugs persist for as long as the logging command is in effect.
We did not modify any screens.
New Features in ASA 9.5(1.5)/ASDM 7.5(1.112)
Released: November 11, 2015
Feature
Description
Platform Features
Support for ASA FirePOWER 6.0
The 6.0 software version for the ASA FirePOWER module is supported on all previously
supported device models.
Support for managing the ASA
You can manage the ASA FirePOWER module using ASDM instead of using Firepower
FirePOWER module through ASDM Management Center (formerly FireSIGHT Management Center) when running version 6.0
for the 5512-X through 5585-X.
on the module. You can still use ASDM to manage the module on the 5506-X, 5506H-X,
5506W-X, 5508-X, and 5516-X when running 6.0.
No new screens or commands were added.
New Features in ASDM 7.5(1.90)
Released: October 14, 2015
Feature
Description
Remote Access Features
AnyConnect Version 4.2 support
ASDM supports AnyConnect 4.2 and the Network Visibility Module (NVM). NVM enhances
the enterprise administrator’s ability to do capacity and service planning, auditing, compliance,
and security analytics. The NVM collects the endpoint telemetry and logs both the flow data
and the file reputation in the syslog and also exports the flow records to a collector (a third-party
vendor), which performs the file analysis and provides a UI interface.
We modified the following screen: Configuration > Remote Access VPN > Network (Client)
Access > AnyConnect Client Profile (a new profile called Network Visibility Service
Profile)
Release Notes for Cisco ASDM, 7.5(x)
15
Release Notes for Cisco ASDM, 7.5(x)
New Features in ASAv 9.5(1.200)/ASDM 7.5(1)
New Features in ASAv 9.5(1.200)/ASDM 7.5(1)
Released: August 31, 2015
Note
This release supports only the ASAv.
Feature
Description
Platform Features
Microsoft Hyper-V supervisor
support
Extends the hypervisor portfolio for the ASAv.
ASAv5 low memory support
The ASAv5 now only requires 1 GB RAM to operate. Formerly, it required 2 GB. For
already-deployed ASAv5s, you should reduce the allocated memory to 1 GB or you will see
an error that you are using more memory than is licensed.
New Features in ASA 9.5(1)/ASDM 7.5(1)
Released: August 12, 2015
Note
Feature
This version does not support the Firepower 9300 ASA security module or the ISA 3000.
Description
Firewall Features
GTPv2 inspection and improvements GTP inspection can now handle GTPv2. In addition, GTP inspection for all versions now
to GTPv0/1 inspection
supports IPv6 addresses.
We modified the following screen: Configuration > Firewall > Objects > Inspect Maps >
GTP
IP Options inspection improvements IP Options inspection now supports all possible IP options. You can tune the inspection to
allow, clear, or drop any standard or experimental options, including those not yet defined.
You can also set a default behavior for options not explicitly defined in an IP options inspection
map.
We modified the following screen: Configuration > Firewall > Objects > Inspect Maps >
IP Options
Release Notes for Cisco ASDM, 7.5(x)
16
Release Notes for Cisco ASDM, 7.5(x)
New Features in ASA 9.5(1)/ASDM 7.5(1)
Feature
Description
Carrier Grade NAT enhancements
For carrier-grade or large-scale PAT, you can allocate a block of ports for each host, rather
than have NAT allocate one port translation at a time (see RFC 6888).
We introduced the following screen: Configuration > Firewall > Advanced > PAT Port
Block Allocation. We added Enable Block Allocation the object NAT and twice NAT dialog
boxes.
High Availability Features
Inter-site clustering support for
Spanned EtherChannel in Routed
firewall mode
You can now use inter-site clustering for Spanned EtherChannels in routed mode. To avoid
MAC address flapping, configure a site ID for each cluster member so that a site-specific
MAC address for each interface can be shared among a site’s units.
We modified the following screen: Configuration > Device Management > High Availability
and Scalability > ASA Cluster > Cluster Configuration
ASA cluster customization of the
auto-rejoin behavior when an
interface or the cluster control link
fails
You can now customize the auto-rejoin behavior when an interface or the cluster control link
fails.
The ASA cluster supports GTPv1
and GTPv2
The ASA cluster now supports GTPv1 and GTPv2 inspection.
Cluster replication delay for TCP
connections
This feature helps eliminate the “unnecessary work” related to short-lived flows by delaying
the director/backup flow creation.
We introduced the following screen: Configuration > Device Management > High
Availability and Scalability > ASA Cluster > Auto Rejoin
We did not modify any screens.
We introduced the following screen: Configuration > Device Management > High
Availability and Scalability > ASA Cluster Replication
Also available for the Firepower 9300 ASA security module in Version 9.4(1.152).
Disable health monitoring of a
By default when using clustering, the ASA monitors the health of an installed hardware module
hardware module in ASA clustering such as the ASA FirePOWER module. If you do not want a hardware module failure to trigger
failover, you can disable module monitoring.
We modified the following screen: Configuration > Device Management > High Availability
and Scalability > ASA Cluster > Cluster Interface Health Monitoring
Enable use of the Management 1/1
interface as the failover link on the
ASA 5506H
On the ASA 5506H only, you can now configure the Management 1/1 interface as the failover
link. This feature lets you use all other interfaces on the device as data interfaces. Note that
if you use this feature, you cannot use the ASA Firepower module, which requires the
Management 1/1 interface to remain as a regular management interface.
We modified the following screen: Configuration > Device Management > High Availability
and Scalability > Failover > Setup
Routing Features
Release Notes for Cisco ASDM, 7.5(x)
17
Release Notes for Cisco ASDM, 7.5(x)
New Features in ASA 9.5(1)/ASDM 7.5(1)
Feature
Description
Support for IPv6 in Policy Based
Routing
IPv6 addresses are now supported for Policy Based Routing.
We modified the following screens:
Configuration > Device Setup > Routing > Route Maps > Add Route Map > Policy Based
Routing Configuration > Device Setup > Routing > Route Maps > Add Route Maps >
Match Clause
VXLAN support for Policy Based
Routing
You can now enable Policy Based Routing on a VNI interface.
We modified the following screen: Configuration > Device Setup > Interface Settings >
Interfaces > Add/Edit Interface > General
Policy Based Routing support for
You can configure Identity Firewall and Cisco TrustSec and then use Identity Firewall and
Identity Firewall and Cisco Trustsec Cisco TrustSec ACLs in Policy Based Routing route maps.
We modified the following screen: Configuration > Device Setup > Routing > Route Maps
> Add Route Maps > Match Clause
Separate routing table for
management-only interfaces
To segregate and isolate management traffic from data traffic, the ASA now supports a separate
routing table for management-only interfaces.
We did not modify any screens.
Protocol Independent Multicast
Source-Specific Multicast
(PIM-SSM) pass-through support
The ASA now allows PIM-SSM packets to pass through when you enable multicast routing,
unless the ASA is the Last-Hop Router. This feature allows greater flexibility in choosing a
multicast group while also protecting against different attacks; hosts only receive traffic from
explicitly-requested sources.
We did not modify any screens.
Remote Access Features
IPv6 VLAN Mapping
ASA VPN code has been enhanced to support full IPv6 capabilities. No configuration change
is necessary for the administrator.
Clientless SSL VPN SharePoint
2013 Support
Added support and a predefined application template for this new SharePoint version.
We modified the following screen: Configuration > Remote Access VPN > Clientless SSL
VPN Access > Portal > Bookmarks > Add Bookmark List > Select Bookmark Type >
Predefined application templates
Dynamic Bookmarks for Clientless Added CSCO_WEBVPN_DYNAMIC_URL and CSCO_WEBVPN_MACROLIST to the
VPN
list of macros when using bookmarks. These macros allow the administrator to configure a
single bookmark that can generate multiple bookmark links on the clientless user’s portal and
to statically configure bookmarks to take advantage of arbitrarily sized lists provided by LDAP
attribute maps.
We modified the following screen: Configuration > Remote Access VPN > Clientless SSL
VPN Access > Portal > Bookmarks
Release Notes for Cisco ASDM, 7.5(x)
18
Release Notes for Cisco ASDM, 7.5(x)
Upgrade the Software
Feature
Description
VPN Banner Length Increase
The overall banner length, which is displayed during post-login on the VPN remote client
portal, has increased from 500 to 4000.
We modified the following screen: Configuration > Remote Access VPN > .... Add/Edit
Internal Group Policy > General Parameters > Banner
Cisco Easy VPN client on the ASA This release supports Cisco Easy VPN on the ASA 5506-X series and for the ASA 5508-X.
5506-X, 5506W-X, 5506H-X, and The ASA acts as a VPN hardware client when connecting to the VPN headend. Any devices
5508-X
(computers, printers, and so on) behind the ASA on the Easy VPN port can communicate
over the VPN; they do not have to run VPN clients individually. Note that only one ASA
interface can act as the Easy VPN port; to connect multiple devices to that port, you need to
place a Layer 2 switch on the port, and then connect your devices to the switch.
We introduced the following screen: Configuration > VPN > Easy VPN Remote
Monitoring Features
Show invalid usernames in syslog
messages
You can now show invalid usernames in syslog messages for unsuccessful login attempts.
The default setting is to hide usernames when the username is invalid or if the validity is
unknown. If a user accidentally types a password instead of a username, for example, then it
is more secure to hide the “username” in the resultant syslog message. You might want to
show invalid usernames to help with troubleshooting login issues.
We introduced the following command: no logging hide username
We modified the following screen: Configuration > Device Management > Logging >
Syslog Setup
This feature is also available in 9.2(4) and 9.3(3).
REST API Features
REST API Version 1.2.1
We added support for the REST API Version 1.2.1.
Upgrade the Software
This section provides the upgrade path information and a link to complete your upgrade.
Upgrade Path
See the following table for the upgrade path for your version. Some versions require an interim upgrade before
you can upgrade to the latest version.
Current ASA Version
First Upgrade to:
Then Upgrade to:
8.2(x) and earlier
8.4(5)
9.1(3) and later
8.3(x)
8.4(5)
9.1(3) and later
Release Notes for Cisco ASDM, 7.5(x)
19
Release Notes for Cisco ASDM, 7.5(x)
Upgrade Link
Current ASA Version
First Upgrade to:
Then Upgrade to:
8.4(1) through 8.4(4)
8.4(5) or 9.0(4)
9.1(3) and later
8.4(5) and later
—
9.1(3) and later
8.5(1)
9.0(4)
9.1(3) and later
8.6(1)
9.0(4)
9.1(3) and later
9.0(1)
9.0(4)
9.1(3) and later
9.0(2) or later
—
9.1(3) and later
9.1(1)
9.1(2)
9.1(3) and later
9.1(2) or later
—
9.1(3) and later
9.2(x)
—
9.2(2) and later
9.3(x)
—
9.3(2) and later
9.4(x)
—
9.4(2) and later
9.5(x)
—
9.5(2) and later
Upgrade Link
To complete your upgrade, see Upgrade to ASA 9.4 and ASDM 7.4.
Open and Resolved Bugs
The open and resolved bugs for this release are accessible through the Cisco Bug Search Tool. This web-based
tool provides you with access to the Cisco bug tracking system, which maintains information about bugs and
vulnerabilities in this product and other Cisco hardware and software products.
Note
You must have a Cisco.com account to log in and access the Cisco Bug Search Tool. If you do not have
one, you can register for an account. If you do not have a Cisco support contract, you can only look up
bugs by ID; you cannot run searches.
For more information about the Cisco Bug Search Tool, see the Bug Search Tool Help & FAQ.
Open Bugs
This section lists open bugs in each version.
Release Notes for Cisco ASDM, 7.5(x)
20
Release Notes for Cisco ASDM, 7.5(x)
Open Bugs
Open Bugs in Version 7.5(2.153)
If you have a Cisco support contract, use the following dynamic search for all open bugs severity 3 and higher
for Version 7.5(2.153):
• 7.5(2.153) open bug search.
The following table lists the open bugs at the time of this Release Note publication.
Identifier
Description
CSCux13150
ASDM: Backup/Restore does not work with policy-map global_policy
CSCux26490
ASDM Removes an Entire DAP Bookmark List If It Exceeds 245 Characters
CSCux59614
ASDM duplicates remarks when moving ACEs from order
CSCux63266
DAP policy - dap.xml should get updated for HS3.x to HS4.x upgrade
CSCux69363
ASDM 7.5(2) password-storage is shown disabled
Open Bugs in Version 7.5(2)
If you have a Cisco support contract, use the following dynamic search for all open bugs severity 3 and higher
for Version 7.5(2):
• 7.5(2) open bug search.
The following table lists the open bugs at the time of this Release Note publication.
Identifier
Description
CSCux11651
ASDM Cannot delete ACL description (remark) lines
CSCux13150
ASDM: Backup/Restore does not work with policy-map global_policy
CSCux26490
ASDM Removes an Entire DAP Bookmark List If It Exceeds 245 Characters
CSCux33151
ASDM duplicates remarks in ACL instead of replacing
CSCux35016
ASDM discrepencies in crypto map
CSCux37581
ASDM 7.5.2 Not displaying active anyconnect clients
CSCux59614
ASDM duplicates remarks when moving ACEs from order
CSCux63266
DAP policy - dap.xml should get updated for HS3.x to HS4.x upgrade
CSCux69363
ASDM 7.5(2) password-storage is shown disabled
Release Notes for Cisco ASDM, 7.5(x)
21
Release Notes for Cisco ASDM, 7.5(x)
Resolved Bugs
Open Bugs in Version 7.5(1.112)
If you have a Cisco support contract, use the following dynamic search for all open bugs severity 3 and higher
for Version 7.5(1.112):
• 7.5(1.112) open bug search.
The following table lists the open bugs at the time of this Release Note publication.
Identifier
Description
CSCuv76021
ASDM Gtp syslog mismatch
Open Bugs in Version 7.5(1.90)
If you have a Cisco support contract, use the following dynamic search for all open bugs severity 3 and higher
for Version 7.5(1.90):
• 7.5(1.90) open bug search.
The following table lists the open bugs at the time of this Release Note publication.
Identifier
Description
CSCuv76021
ASDM Gtp syslog mismatch
Open Bugs in Version 7.5(1)
If you have a Cisco support contract, use the following dynamic search for all open bugs severity 3 and higher
for Version 7.5(1):
• 7.5(1) open bug search.
The following table lists the open bugs at the time of this Release Note publication.
Identifier
Description
CSCuv76021
ASDM Gtp syslog mismatch
Resolved Bugs
This section lists resolved bugs per release.
Resolved Bugs in Version 7.5(2.153)
If you have a Cisco support contract, use the following search for all resolved bugs:
• 7.5(2.153) fixed bug search.
Release Notes for Cisco ASDM, 7.5(x)
22
Release Notes for Cisco ASDM, 7.5(x)
Resolved Bugs
The following table lists resolved bugs at the time of this Release Note publication.
Identifier
Description
CSCux11651
ASDM Cannot delete ACL description (remark) lines
CSCux33151
ASDM duplicates remarks in ACL instead of replacing
CSCux35016
ASDM discrepencies in crypto map
CSCux37581
ASDM 7.5.2 Not displaying active anyconnect clients
Open Bugs in Version 7.5(2)
If you have a Cisco support contract, use the following dynamic search for all open bugs severity 3 and higher
for Version 7.5(2):
• 7.5(2) open bug search.
The following table lists the open bugs at the time of this Release Note publication.
Identifier
Description
CSCux11651
ASDM Cannot delete ACL description (remark) lines
CSCux13150
ASDM: Backup/Restore does not work with policy-map global_policy
CSCux26490
ASDM Removes an Entire DAP Bookmark List If It Exceeds 245 Characters
CSCux33151
ASDM duplicates remarks in ACL instead of replacing
CSCux35016
ASDM discrepencies in crypto map
CSCux37581
ASDM 7.5.2 Not displaying active anyconnect clients
CSCux59614
ASDM duplicates remarks when moving ACEs from order
CSCux63266
DAP policy - dap.xml should get updated for HS3.x to HS4.x upgrade
CSCux69363
ASDM 7.5(2) password-storage is shown disabled
Resolved Bugs in Version 7.5(1.112)
If you have a Cisco support contract, use the following search for all resolved bugs:
• 7.5(1.112) fixed bug search.
The following table lists resolved bugs at the time of this Release Note publication.
Release Notes for Cisco ASDM, 7.5(x)
23
Release Notes for Cisco ASDM, 7.5(x)
Resolved Bugs
Identifier
Description
CSCuv20248
ASDM 7.4.x could not open device
Resolved Bugs in Version 7.5(1.90)
If you have a Cisco support contract, use the following search for all resolved bugs:
• 7.5(1.90) fixed bug search.
The following table lists resolved bugs at the time of this Release Note publication.
Identifier
Description
CSCut04399
ASDM hangs on MAC after upgrade to Java 8
CSCuv00153
ASDM NullPointerException when accessing SNMP configuration section
CSCuv20248
ASDM 7.4.x could not open device
CSCuw09242
Not able to configure more than 2 interface of ASA using ASDM 7.5.1
Resolved Bugs in Version 7.5(1)
If you have a Cisco support contract, use the following search for all resolved bugs:
• 7.5(1) fixed bug search.
The following table lists resolved bugs at the time of this Release Note publication.
Identifier
Description
CSCuo60919
ASDM connection profiles show 1 interface for multiinterface crypto map
CSCuq59528
DOC:ASDM Doc. needs update for Removing PDF feature for botnet reports
CSCur25021
ASDM command exec order - old object should always be removed first
CSCus47864
ASDM: PBR should accept multiple next-hops for verify-availability
CSCus59519
ENH: ASDM should have an option to clear dhcpd bindings
CSCus60471
Top 200 Hosts bar chart not plotted correctly
CSCut14280
ASDM doesn't allow change Authentication Key "trusted" to FALSE
CSCut35940
ASDM Check Updates finds 9.3.2.200 as Valid Build for Hardware Platforms
CSCut48058
ASDM 7.3(3) not reading some of the ACL's from ASA
Release Notes for Cisco ASDM, 7.5(x)
24
Release Notes for Cisco ASDM, 7.5(x)
End-User License Agreement
Identifier
Description
CSCut49785
ASDM 7.4.X gets stuck in "software update completed"
CSCut50204
ASDM: NPE when parsing ssl command
CSCut55416
ASDM: ACL with object user name is not populated in route-map
CSCut57751
ASDM 7.4.1 hangs at 87% while validating running configuration
CSCut63568
Can't configure DHCP server on interface with no IP
CSCut92725
ASDM 7.4.1 - Packet capture wizard does not work for ASA cluster
CSCut95424
ASDM Group Policy misbehave
CSCuu00966
ASDM does not read dap.xml file - ASA-SM only
CSCuu04312
ASDM Route Map menu is not listing extended ACLs
CSCuu09489
ASDM: DAP warning about CSD not enabled should mention HS instead of CSD
CSCuu10877
ASDM NAT Properties not Displayed
CSCuu13807
output split-tunnel-all-dns command selecting Group Policies by ASDM
CSCuu35093
ASDM: Ikev2 policy - Can't add multiple PRF Hash
CSCuu41337
ASDM sends incorrect cli for configuring PSK for IKEv2
CSCuu59497
ASDM sending commands in incorrect order to ASA
End-User License Agreement
For information on the end-user license agreement, go to http://www.cisco.com/go/warranty.
Related Documentation
For additional information on the ASA, see Navigating the Cisco ASA Series Documentation.
Release Notes for Cisco ASDM, 7.5(x)
25
Release Notes for Cisco ASDM, 7.5(x)
Related Documentation
Release Notes for Cisco ASDM, 7.5(x)
26
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco
trademarks, go to this URL: http://www.cisco.com/go/trademarks. Third-party trademarks mentioned are the property of their respective
owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (1110R)
© 2015
Cisco Systems, Inc. All rights reserved.