Release Notes for Cisco ASDM, Version 7.3(x) Released: July 24, 2014 Updated: February 18, 2015 This document contains release information for Cisco ASDM Version 7.3(x) for the Cisco ASA series. • Important Notes, page 1 • System Requirements, page 1 • New Features, page 8 • Upgrading the Software, page 17 • Open Bugs, page 18 • Resolved Bugs, page 19 • End-User License Agreement, page 21 • Related Documentation, page 22 • Obtaining Documentation and Submitting a Service Request, page 22 Important Notes • Windows NT AAA server was deprecated—In ASA Version 9.3, the Windows NT AAA server is no longer supported. • IPS Module management—For the IPS module, ASDM 7.1(6) and later are not compatible with IPS 7.3(2) and earlier—To manage an IPS module on an ASA, you must connect to the IPS IP address directly through your browser. • Default color scheme for ASDM in Windows—In 7.3(2) and later, the default color scheme for ASDM now defaults to not use the Office look and feel. To change the color scheme back, choose View > Office Look and Feel. System Requirements • ASDM Client Operating System and Browser Requirements, page 2 Americas Headquarters: Cisco Systems, Inc., 170 West Tasman Drive, San Jose, CA 95134-1706 USA System Requirements • Java and Browser Compatibility, page 3 • Install an Identity Certificate for ASDM, page 6 • Increase the ASDM Configuration Memory, page 6 • ASA and ASDM Compatibility, page 8 • VPN Compatibility, page 8 ASDM Client Operating System and Browser Requirements The following table lists the supported and recommended client operating systems and Java for ASDM. Table 1 Operating System and Browser Requirements Browser Internet Explorer Firefox Safari Chrome Java SE Plug-in Yes Yes No support Yes 7.0 or later Apple OS X 10.4 and later No support Yes Yes Yes (64-bit version only) 7.0 or later Red Hat Enterprise Linux 5 (GNOME or KDE): N/A Yes N/A Yes 7.0 or later Operating System Microsoft Windows (English and Japanese): • 8 • 7 • Server 2008 • Server 2012 • Desktop • Desktop with Workstation Release Notes for Cisco ASDM, Version 7.3(x) 2 System Requirements Java and Browser Compatibility The following table lists compatibility caveats for Java, ASDM, and browser compatibility. Table 2 Java Version Java Caveats for ASDM Compatibility Conditions 7 update 51 ASDM Launcher requires trusted certificate Notes To continue using the Launcher, do one of the following: • Upgrade to Java 8 or downgrade Java to 7 update 45 or earlier. • Install a trusted certificate on the ASA from a known CA. • Install a self-signed certificate and register it with Java. See Install an Identity Certificate for ASDM. • Alternatively use Java Web Start. ASDM 7.1(5) and earlier are not supported with Java 7 update 51. If you already upgraded Java, and can no longer launch ASDM in order to upgrade it to Version 7.2 or later, then you can either use the CLI to upgrade ASDM, or you can add a security exception in the Java Control Panel for each ASA you want to manage with ASDM. See the “Workaround” section at: Note http://java.com/en/download/help/java_blocked.xml After adding the security exception, launch the older ASDM and then upgrade to 7.2 or later. In rare cases, online help does not load when using Java Web Start In rare cases, when launching online help, the browser window loads, but the content fails to appear. The browser reports an error: “Unable to connect”. Workaround: • Use the ASDM Launcher Or: • Clear the -Djava.net.preferIPv6Addresses=true parameter in Java Runtime Parameters: a. Launch the Java Control Panel. b. Click the Java tab. c. Click View. d. Clear this parameter: -Djava.net.preferIPv6Addresses=true e. Click OK, then Apply, then OK again. Release Notes for Cisco ASDM, Version 7.3(x) 3 System Requirements Table 2 Java Version Java Caveats for ASDM Compatibility (continued) Conditions Notes 7 update 45 ASDM shows a yellow warning about the missing Permissions attribute when using an untrusted certificate Due to a bug in Java, if you do not have a trusted certificate installed on the ASA, you see a yellow warning about a missing Permissions attribute in the JAR manifest. It is safe to ignore this warning; ASDM 7.2 and later includes the Permissions attribute. To prevent the warning from appearing, install a trusted certificate (from a known CA); or generate a self-signed certificate on the ASA by choosing Configuration > Device Management > Certificates > Identity Certificates. Launch ASDM, and when the certificate warning is shown, check the Always trust connections to websites check box. 7 ASDM requires an SSL connection to the ASA. You can request a 3DES license from Cisco: Requires strong encryption license (3DES/AES) on ASA All • Self-signed certificate or an untrusted certificate • IPv6 • Firefox and Safari • SSL encryption on the ASA must include both RC4-MD5 and RC4-SHA1 or disable SSL false start in Chrome. • Chrome Go to www.cisco.com/go/license. 2. Click Continue to Product License Registration. 3. In the Licensing Portal, click Get Other Licenses next to the text field. 4. Choose IPS, Crypto, Other... from the drop-down list. 5. Type ASA in to the Search by Keyword field. 6. Select Cisco ASA 3DES/AES License in the Product list, and click Next. 7. Enter the serial number of the ASA, and follow the prompts to request a 3DES/AES license for the ASA. When the ASA uses a self-signed certificate or an untrusted certificate, Firefox and Safari are unable to add security exceptions when browsing using HTTPS over IPv6. See https://bugzilla.mozilla.org/show_bug.cgi?id=633001. This caveat affects all SSL connections originating from Firefox or Safari to the ASA (including ASDM connections). To avoid this caveat, configure a proper certificate for the ASA that is issued by a trusted certificate authority. If you change the SSL encryption on the ASA to exclude both RC4-MD5 and RC4-SHA1 algorithms (these algorithms are enabled by default), then Chrome cannot launch ASDM due to the Chrome “SSL false start” feature. We suggest re-enabling one of these algorithms (see the Configuration > Device Management > Advanced > SSL Settings pane); or you can disable SSL false start in Chrome using the --disable-ssl-false-start flag according to Run Chromium with flags. IE9 for servers For Internet Explorer 9.0 for servers, the “Do not save encrypted pages to disk” option is enabled by default (See Tools > Internet Options > Advanced). This option causes the initial ASDM download to fail. Be sure to disable this option to allow ASDM to download. OS X On OS X, you may be prompted to install Java the first time you run ASDM; follow the prompts as necessary. ASDM will launch after the installation completes. Release Notes for Cisco ASDM, Version 7.3(x) 4 1. System Requirements Table 2 Java Caveats for ASDM Compatibility (continued) Java Version Conditions Notes All OS X 10.8 and later You need to allow ASDM to run because it is not signed with an Apple Developer ID. If you do not change your security preferences, you see an error screen. 1. To allow ASDM to run, right-click (or Ctrl-Click) the Cisco ASDM-IDM Launcher icon, and choose Open. 2. You see a similar error screen; however, you can open ASDM from this screen. Click Open. The ASDM-IDM Launcher opens. Release Notes for Cisco ASDM, Version 7.3(x) 5 System Requirements Install an Identity Certificate for ASDM When using Java 7 update 51 and later, the ASDM Launcher requires a trusted certificate. An easy approach to fulfill the certificate requirements is to install a self-signed identity certificate. You can use Java Web Start to launch ASDM until you install a certificate. See the following document to install a self-signed identity certificate on the ASA for use with ASDM, and to register the certificate with Java. http://www.cisco.com/go/asdm-certificate Increase the ASDM Configuration Memory ASDM supports a maximum configuration size of 512 KB. If you exceed this amount you may experience performance issues. For example, when you load the configuration, the status dialog box shows the percentage of the configuration that is complete, yet with large configurations it stops incrementing and appears to suspend operation, even though ASDM might still be processing the configuration. If this situation occurs, we recommend that you consider increasing the ASDM system heap memory. • Increase the ASDM Configuration Memory in Windows (ASDM 7.3(2) and Later), page 6 • Increase the ASDM Configuration Memory in Windows (ASDM 7.3(1)), page 6 • Increase the ASDM Configuration Memory in Mac OS (ASDM 7.3(3) and Later), page 7 Increase the ASDM Configuration Memory in Windows (ASDM 7.3(2) and Later) To increase the ASDM heap memory size, edit the run.bat file by performing the following procedure. Procedure Step 1 Go to the ASDM installation directory, for example C:\Program Files (x86)\Cisco Systems\ASDM. Step 2 Edit the run.bat file with any text editor. Step 3 In the line that starts with “start javaw.exe”, change the argument prefixed with “-Xmx” to specify your desired heap size. For example, change it to -Xmx768M for 768 MB or -Xmx1G for 1 GB. Step 4 Save the run.bat file. Increase the ASDM Configuration Memory in Windows (ASDM 7.3(1)) To increase the ASDM heap memory size, modify the launcher shortcut by performing the following procedure. Procedure Step 1 Right-click the shortcut for the ASDM-IDM Launcher, and choose Properties. Release Notes for Cisco ASDM, Version 7.3(x) 6 System Requirements Step 2 Click the Shortcut tab. Step 3 In the Target field, change the argument prefixed with “-Xmx” to specify your desired heap size. For example, change it to -Xmx768M for 768 MB or -Xmx1G for 1 GB. Increase the ASDM Configuration Memory in Mac OS (ASDM 7.3(3) and Later) To increase the ASDM heap memory size, edit the Info.plist file by performing the following procedure. Procedure Step 1 Right-click the Cisco ASDM-IDM icon, and choose Show Package Contents. Step 2 In the Contents folder, double-click the Info.plist file. If you have Developer tools installed, it opens in the Property List Editor. Otherwise, it opens in TextEdit. Step 3 Under Java > VMOptions, change the string prefixed with “-Xmx” to specify your desired heap size. For example, change it to -Xmx768M for 768 MB or -Xmx1G for 1 GB. Step 4 If this file is locked, you see an error such as the following: Release Notes for Cisco ASDM, Version 7.3(x) 7 New Features Step 5 Click Unlock and save the file. If you do not see the Unlock dialog box, exit the editor, right-click the Cisco ASDM-IDM icon, choose Copy Cisco ASDM-IDM, and paste it to a location where you have write permissions, such as the Desktop. Then change the heap size from this copy. ASA and ASDM Compatibility For information about ASA/ASDM requirements and compatibility, see Cisco ASA Compatibility. VPN Compatibility For VPN compatibility, see Supported VPN Platforms, Cisco ASA 5500 Series. New Features • New Features in ASA 9.3(2)/ASDM 7.3(2.102), page 9 • New Features in ASA 9.3(2.200)/ASDM 7.3(2), page 9 • New Features in ASA 9.3(2)/ASDM 7.3(2), page 9 • New Features in ASA 9.2(3)/ASDM 7.3(1.101), page 13 • New Features in ASA 9.3(1)/ASDM 7.3(1), page 13 New Features in ASA 9.3(2)/ASDM 7.3(3) Released: February 2, 2015 Release Notes for Cisco ASDM, Version 7.3(x) 8 New Features The following table lists the new features for ASDM Version 7.3(3). Table 3 New Features for ASDM Version 7.3(3) Feature Description Platform Features ASA FirePOWER software module for the ASA 5506-X You can configure ASA FirePOWER on the ASA 5506-X using ASDM; a separate FireSIGHT Management Center is not required, although you can use one instead of ASDM. We introduced the following screens: Home > ASA FirePOWER Dashboard Home > ASA FirePOWER Reporting Configuration > ASA FirePOWER Configuration Monitoring > ASA FirePOWER Monitoring New Features in ASA 9.3(2)/ASDM 7.3(2.102) Released: January 21, 2015 There were no new features in this release. New Features in ASA 9.3(2.200)/ASDM 7.3(2) Released: December 18, 2014 The following table lists the new features for ASA Version 9.3(2.200)/ASDM Version 7.3(2). Note Table 4 This release supports only the ASAv. New Features for ASA Version 9.3(2.200)/ASDM Version 7.3(2) Feature Description Platform Features ASAv with KVM and Virtio You can deploy the ASAv using the Kernel-based Virtual Machine (KVM) and the Virtio virtual interface driver. New Features in ASA 9.3(2)/ASDM 7.3(2) Released: December 18, 2014 The following table lists the new features for ASA Version 9.3(2)/ASDM Version 7.3(2). Release Notes for Cisco ASDM, Version 7.3(x) 9 New Features Table 5 New Features for ASA Version 9.3(2)/ASDM Version 7.3(2) Feature Description Platform Features ASA 5506-X We introduced the ASA 5506-X. ASA FirePOWER passive You can now configure a traffic forwarding interface to send traffic to the monitor-only mode using traffic module instead of using a service policy. In this mode, neither the module nor redirection interfaces the ASA affects the traffic. We fully supported the following command: traffic-forward sfr monitor-only. You can configure this in CLI only. Mixed level SSPs in the ASA 5585-X You can now use the following mixed level SSPs in the ASA 5585-X: • ASA SSP-10/ASA FirePOWER SSP-40 • ASA SSP-20/ASA FirePOWER SSP-60 Requirements: ASA SSP in slot 0, ASA FirePOWER SSP in slot 1 ASA REST API 1.0.1 A REST API was added to support configuring and managing major functions of the ASA. Support for ASA image signing ASA images are now signed using a digital signature. The digital signature is and verification verified after the ASA is booted. This feature is not supported in ASDM. Accelerated security path load balancing The accelerated security path (ASP) load balancing mechanism reduces packet drop and improves throughput by allowing multiple cores of the CPU to receive packets from an interface receive ring and work on them independently. We introduced the following screen: Configuration > Device Management > Advanced > ASP Load Balancing Firewall Features Configuration session for editing ACLs and objects. Forward referencing of objects and ACLs in access rules. You can now edit ACLs and objects in an isolated configuration session. You can also forward reference objects and ACLs, that is, configure rules and access groups for objects or ACLs that do not yet exist. This feature is not supported in ASDM. SIP support for Trust Verification Services, NAT66, CUCM 10.5, and model 8831 phones. You can now configure Trust Verification Services servers in SIP inspection. You can also use NAT66. SIP inspection has been tested with CUCM 10.5. Unified Communications support for CUCM 10.5 SIP and SCCP inspections were tested and verified with Cisco Unified Communications Manager 10.5. We introduced the following screen: Configuration > Firewall > Objects > Inspection Maps > SIP > Add/Edit SIP Inspect Map > Details > TVS Server Remote Access Features Browser support for Citrix VDI We now support an HTML 5-based browser solution for accessing the Citrix VDI, without requiring the Citrix Receiver client on the desktop. Clientless SSL VPN for Mac OSX 10.9 We now support Clientless SSL VPN features such as the rewriter, smart tunnels, and plugins on all browsers that are supported on Mac OSX 10.9. Release Notes for Cisco ASDM, Version 7.3(x) 10 New Features Table 5 New Features for ASA Version 9.3(2)/ASDM Version 7.3(2) (continued) Feature Description Interoperability with standards-based, third-party, IKEv2 remote access clients We now support VPN connectivity via standards-based, third-party, IKEv2 remote-access clients (in addition to AnyConnect). Authentication support includes preshared keys, certificates, and user authentication via the Extensible Authentication Protocol (EAP). We introduced or modified the following screens: Wizards > IPsec IKEv2 Remote Access Wizard. Configuration > Remote Access VPN > Network (Client) Access > IPsec (IKEv2) Connection Profiles Configuration > Remote Access VPN > Network (Client) Access > IPsec (IKEv2) Connection Profiles > Add/Edit > Advanced > IPsec Monitoring > VPN > VPN Statistics > Sessions Transport Layer Security (TLS) We now support TLS version 1.2 for secure message transmission for ASDM, version 1.2 support Clientless SSVPN, and AnyConnect VPN. We modified the following screens: Configuration > Device Management > Advanced > SSL Settings Configuration > Remote Access VPN > Advanced > SSL Settings AnyConnect 4.0 support for TLS version 1.2 AnyConnect 4.0 now supports TLS version 1.2 with the following four additional cipher suites: DHE-RSA-AES256-SHA256, DHE-RSA-AES128-SHA256, AES256-SHA256, and AES128-SHA256. Licensing Features Cisco Smart Software Licensing for the ASAv Smart Software Licensing lets you purchase and manage a pool of licenses. Unlike PAK licenses, smart licenses are not tied to a specific serial number. You can easily deploy or retire ASAvs without having to manage each unit’s license key. Smart Software Licensing also lets you see your license usage and needs at a glance. We introduced or modified the following screens: Configuration > Device Management > Licensing > Smart License Configuration > Device Management > Smart Call-Home Monitoring > Properties > Smart License High Availability Features Lock configuration changes on the standby unit or standby context in a failover pair You can now lock configuration changes on the standby unit (Active/Standby failover) or the standby context (Active/Active failover) so you cannot make changes on the standby unit outside normal configuration syncing. We modified the following screen: Configuration > Device Management > High Availability and Scalability > Failover > Setup Release Notes for Cisco ASDM, Version 7.3(x) 11 New Features Table 5 New Features for ASA Version 9.3(2)/ASDM Version 7.3(2) (continued) Feature Description ASA clustering inter-site deployment in transparent mode with the ASA cluster firewalling between inside networks You can now deploy a cluster in transparent mode between inside networks and the gateway router at each site (AKA East-West insertion), and extend the inside VLANs between sites. We recommend using Overlay Transport Virtualization (OTV), but you can use any method that ensures that the overlapping MAC Addresses and IP addresses of the gateway router do not leak between sites. Use a First Hop Redundancy Protocol (FHRP) such as HSRP to provide the same virtual MAC and IP addresses to the gateway routers. Interface Features Traffic Zones You can group interfaces together into a traffic zone to accomplish traffic load balancing (using Equal Cost Multi-Path (ECMP) routing), route redundancy, and asymmetric routing across multiple interfaces. Note You cannot apply a security policy to a named zone; the security policy is interface-based. When interfaces in a zone are configured with the same access rule, NAT, and service policy, then load-balancing and asymmetric routing operate correctly. We introduced or modified the following screens: Configuration > Device Setup > Interface Parameters > Zones Configuration > Device Setup > Interface Parameters > Interfaces Routing Features BGP support for IPv6 We added support for IPv6. We introduced the following screen: Configuration > Device Setup > Routing > BGP > IPv6 Family Monitoring Features SNMP MIBs and traps The CISCO-PRODUCTS-MIB and CISCO-ENTITY-VENDORTYPE-OID-MIB have been updated to support the new ASA 5506-X. The ASA 5506-X have been added as new products to the SNMP sysObjectID OID and entPhysicalVendorType OID. The ASA now supports the CISCO-CONFIG-MAN-MIB, which enables you to do the following: • Know which commands have been entered for a specific configuration. • Notify the NMS when a change has occurred in the running configuration. • Track the time stamps associated with the last time that the running configuration was changed or saved. • Track other changes to commands, such as terminal details and command sources. We modified the following screen: Configuration > Device Management > Management Access > SNMP > Configure Traps > SNMP Trap Configuration Showing route summary The show route-summary command output has been added to the show information for troubleshooting tech-support detail command. Release Notes for Cisco ASDM, Version 7.3(x) 12 New Features Table 5 New Features for ASA Version 9.3(2)/ASDM Version 7.3(2) (continued) Feature Description Management Features System backup and restore We now support complete system backup and restoration using the CLI. We did not modify any screens. This functionality is already available in ASDM. New Features in ASA 9.2(3)/ASDM 7.3(1.101) Released: December 15, 2014 Table 6 lists the new features for ASA Version 9.2(3)/ASDM Version 7.3(1.101). Table 6 New Features for ASA Version 9.2(3)/ASDM Version 7.3(1.101) Feature Description Remote Access Features Clientless SSL VPN session cookie access restriction You can now prevent a Clientless SSL VPN session cookie from being accessed by a third party through a client-side script such as Javascript. Use this feature only if Cisco TAC advises you to do so. Enabling this command presents a security risk because the following Clientless SSL VPN features will not work without any warning. Note • Java plug-ins • Java rewriter • Port forwarding • File browser • Sharepoint features that require desktop applications (for example, MS Office applications) • AnyConnect Web launch • Citrix Receiver, XenDesktop, and Xenon • Other non-browser-based and browser plugin-based applications We introduced the following screen: Configuration > Remote Access VPN > Clientless SSL VPN Access > Advanced > HTTP Cookie New Features in ASA 9.3(1)/ASDM 7.3(1) Released: July 24, 2014 The following table lists the new features for ASA Version 9.3(1)/ASDM Version 7.3(1). Release Notes for Cisco ASDM, Version 7.3(x) 13 New Features Note Table 7 The ASA 5505 is not supported in this release or later. ASA Version 9.2 was the final release for the ASA 5505. New Features for ASA Version 9.3(1)/ASDM Version 7.3(1) Feature Description Firewall Features SIP, SCCP, and TLS Proxy support for IPv6 You can now inspect IPv6 traffic when using SIP, SCCP, and TLS Proxy (using SIP or SCCP). We did not modify any ASDM screens. Support for Cisco Unified Communications Manager 8.6 The ASA now interoperates with Cisco Unified Communications Manager Version 8.6 (including SCCPv21 support). We did not modify any ASDM screens. Transactional Commit Model on rule engine When enabled, a rule update is applied after the rule compilation is completed; for access groups and NAT without affecting the rule matching performance. We introduced the following screen: Configuration > Device Management > Advanced > Rule Engine Remote Access Features XenDesktop 7 Support for clientless SSL VPN We added support for XenDesktop 7 to clientless SSL VPN. When creating a bookmark with auto sign-on, you can now specify a landing page URL or a Control ID. We modified the following screen: Configuration > Remote Access VPN > Clientless SSL VPN Access > Portal > Bookmarks AnyConnect Custom Attribute Enhancements Custom attributes define and configure AnyConnect features that have not been incorporated into the ASA, such as Deferred Upgrade. Custom attribute configuration has been enhanced to allow multiple values and longer values, and now requires a specification of their type, name and value. They can now be added to Dynamic Access Policies as well as Group Policies. Previously defined custom attributes will be updated to this enhanced configuration format upon upgrade to 9.3.x. We introduced or modified the following screens: Configuration > Remote Access VPN > Network (Client) Access > Advanced > AnyConnect Custom Attributes Configuration > Remote Access VPN > Network (Client) Access > Advanced > AnyConnect Custom Attribute Names Configuration > Remote Access VPN > Network (Client) Access > Group Policies > Add/Edit > Advanced > AnyConnect Client > Custom Attributes Configuration > Remote Access VPN > Network (Client) Access > Dynamic Access Policies > Add/Edit > AnyConnect Custom Attributes Release Notes for Cisco ASDM, Version 7.3(x) 14 New Features Table 7 New Features for ASA Version 9.3(1)/ASDM Version 7.3(1) (continued) Feature Description AnyConnect Identity Extensions (ACIDex) for Desktop Platforms ACIDex, also known as AnyConnect Endpoint Attributes or Mobile Posture, is the method used by the AnyConnect VPN client to communicate posture information to the ASA. Dynamic Access Polices use these endpoint attributes to authorize users. The AnyConnect VPN client now provides Platform identification for the desktop operating systems (Windows, Mac OS X, and Linux) and a pool of MAC Addresses which can be used by DAPs. We modified the following screen: Configuration > Remote Access VPN > Dynamic Access Policies > Add/Edit > Add/Edit (endpoint attribute), select AnyConnect for the Endpoint Attribute Type. Additional operating systems are in the Platform drop-down list and MAC Address has changed to Mac Address Pool. TrustSec SGT Assignment for VPN TrustSec Security Group Tags (SGT) can now be added to the SGT-IP table on the ASA when a remote user connects. We introduced or modified the following screens: Configuration > Remote Access VPN > AAA/Local Users > Local Users > Edit User > VPN Policy Configuration > Remote Access VPN > Network (Client) Access > Group Policies > Add a Policy High Availability Features Improved support for monitoring module health in clustering We added improved support for monitoring module health in clustering. Disable health monitoring of a hardware module By default, the ASA monitors the health of an installed hardware module such as the ASA FirePOWER module. If you do not want a hardware module failure to trigger failover, you can disable module monitoring. We did not modify any ASDM screens. We modified the following screen: Configuration > Device Management > High Availability and Scalability > Failover > Interfaces Platform Features ASP Load Balancing The new auto option in the asp load-balance per-packet command enables the ASA to adaptively switch ASP load balancing per-packet on and off on each interface receive ring. This automatic mechanism detects whether or not asymmetric traffic has been introduced and helps avoid the following issues: • Overruns caused by sporadic traffic spikes on flows • Overruns caused by bulk flows oversubscribing specific interface receive rings • Overruns caused by relatively heavily overloaded interface receive rings, in which a single core cannot sustain the load We did not modify any ASDM screens. SNMP MIBs The CISCO-REMOTE-ACCESS-MONITOR-MIB now supports the ASASM. Interface Features Release Notes for Cisco ASDM, Version 7.3(x) 15 New Features Table 7 New Features for ASA Version 9.3(1)/ASDM Version 7.3(1) (continued) Feature Description Transparent mode bridge group maximum increased to 250 The bridge group maximum was increased from 8 to 250 bridge groups. You can configure up to 250 bridge groups in single mode or per context in multiple mode, with 4 interfaces maximum per bridge group. We modified the following screens: Configuration > Device Setup > Interfaces Configuration > Device Setup > Interfaces > Add/Edit Bridge Group Interface Configuration > Device Setup > Interfaces > Add/Edit Interface Routing Features BGP support for ASA clustering We added support for BGP with ASA clustering. We modified the following screen: Configuration > Device Setup > Routing > BGP > IPv4 Family > General BGP support for nonstop forwarding We added support for BGP Nonstop Forwarding. We modified the following screens: Configuration > Device Setup > Routing > BGP > General Configuration > Device Setup > Routing > BGP > IPv4 Family > Neighbor Monitoring > Routing > BGP Neighbors BGP support for advertised maps We added support for BGPv4 advertised map. We modified the following screen: Configuration > Device Setup > Routing > BGP > IPv4 Family > Neighbor > Add BGP Neighbor > Routes OSPF Support for Non-Stop Forwarding (NSF) OSPFv2 and OSPFv3 support for NSF was added. We added the following screens: Configuration > Device Setup > Routing > OSPF > Setup > NSF Properties Configuration > Device Setup > Routing > OSPFv3 > Setup > NSF Properties AAA Features Layer 2 Security Group Tag Imposition You can now use security group tagging combined with Ethernet tagging to enforce policies. SGT plus Ethernet Tagging, also called Layer 2 SGT Imposition, enables the ASA to send and receive security group tags on Gigabit Ethernet interfaces using Cisco proprietary Ethernet framing (Ether Type 0x8909), which allows the insertion of source security group tags into plain-text Ethernet frames. We modified the following screens: Configuration > Device Setup > Interfaces > Add Interface > Advanced Configuration > Device Setup > Interfaces > Add Redundant Interface > Advanced Configuration > Device Setup > Add Ethernet Interface > Advanced Wizards > Packet Capture Wizard Tools > Packet Tracer Release Notes for Cisco ASDM, Version 7.3(x) 16 Upgrading the Software Table 7 New Features for ASA Version 9.3(1)/ASDM Version 7.3(1) (continued) Feature Description Removal of AAA Windows NT domain authentication We removed NTLM support for remote access VPN users. We modified the following screen: Configuration > Remote Access VPN > AAA/Local Users > AAA Server Groups > Add AAA Server Group ASDM Identity Certificate Wizard When using the current Java version, the ASDM Launcher requires a trusted certificate. An easy approach to fulfill the certificate requirements is to install a self-signed identity certificate. The ASDM Identity Certificate Wizard makes creating a self-signed identity certificate easy. When you first launch ASDM and do not have a trusted certificate, you are prompted to launch ASDM with Java Web Start; this new wizard starts automatically. After creating the identity certificate, you need to register it with the Java Control Panel. See https://www.cisco.com/go/asdm-certificate for instructions. We added the following screen: Wizards > ASDM Identity Certificate Wizard Monitoring Features Monitoring Aggregated Traffic for Physical Interfaces The show traffic command output has been updated to include aggregated traffic for physical interfaces information. To enable this feature, you must first enter the sysopt traffic detailed-statistics command. ASDM can save Botnet Traffic Filter reports ASDM can no longer save Botnet Traffic Filter reports as PDF files; it can as HTML instead of PDF instead save them as HTML. The following screen was modified: Monitoring > Botnet Traffic Filter Upgrading the Software See the following table for the upgrade path for your version. Some versions require an interim upgrade before you can upgrade to the latest version. Note There are no special requirements for Zero Downtime Upgrades for failover and ASA clustering with the following exception. Upgrading ASA clustering from 9.0(1) or 9.1(1): due to CSCue72961, hitless upgrading is not supported. Current ASA Version First Upgrade to: Then Upgrade to: 8.2(x) and earlier 8.4(6) 9.3(1) or later 8.3(x) 8.4(6) 9.3(1) or later 8.4(1) through 8.4(4) 8.4(6), 9.0(4), or 9.1(2) 9.3(1) or later 8.4(5) and later — 9.3(1) or later 8.5(1) 9.0(4) or 9.1(2) 9.3(1) or later 8.6(1) 9.0(4) or 9.1(2) 9.3(1) or later Release Notes for Cisco ASDM, Version 7.3(x) 17 Open Bugs Current ASA Version First Upgrade to: Then Upgrade to: 9.0(1) 9.0(4) or 9.1(2) 9.3(1) or later 9.0(2) or later — 9.3(1) or later 9.1(1) 9.1(2) 9.3(1) or later 9.1(2) or later — 9.3(1) or later 9.2(x) — 9.3(1) or later For detailed steps about upgrading, see the 9.3 upgrade guide. Open Bugs • Open Bugs in 7.3(3), page 18 • Open Bugs in 7.3(2.102), page 18 • Open Bugs in 7.3(2), page 19 • Open Bugs in 7.3(1.101), page 19 • Open Bugs in 7.3(1), page 19 Open Bugs in 7.3(3) The following table contains open bugs in ASDM software Version 7.3(3). Table 8 Open Bugs in ASDM Version 7.3(2.102) Bug Description CSCus51974 ASDM: CSDM Section to be redesigned to remove deprecated features CSCus56092 Add max TLS session values for 5506, 5508 and 5516 CSCus70758 ASDM should not allow changing speed/duplex on gi1/9 on 5506 CSCus79187 ASDM may stall @ 72% refreshing large number of VPN Sessions CSCus79614 Can't configure TLS proxy max sessions on 5506 Open Bugs in 7.3(2.102) The following table contains open bugs in ASDM software Version 7.3(2.102). Table 9 Open Bugs in ASDM Version 7.3(2.102) Bug Description CSCur29821 ASDM becomes unresponsive after some time CSCur60489 ASDM Identity Certificate Wizard error due to usage-keys CSCus05440 ASDM: Unableto display correct NAT Rules using specific object name Release Notes for Cisco ASDM, Version 7.3(x) 18 Resolved Bugs Open Bugs in 7.3(2) The following table contains open bugs in ASDM software Version 7.3(2). Table 10 Open Bugs in ASDM Version 7.3(2) Bug Description CSCur29821 ASDM becomes unresponsive after some time CSCur60489 ASDM Identity Certificate Wizard error due to usage-keys CSCus05440 ASDM: Unableto display correct NAT Rules using specific object name Open Bugs in 7.3(1.101) The following table contains open bugs in ASDM software Version 7.3(1.101). Registered Cisco.com users can view more information about each bug by using Bug Search. Table 11 Open Bugs in ASDM Version 7.3(1.101) Bug Description CSCup69456 Command to negate ACL remarks not sent from ASDM CSCup82758 ASDM sorting VPNs freezes up at 97% Open Bugs in 7.3(1) The following table contains open bugs in ASDM software Version 7.3(1). Registered Cisco.com users can view more information about each bug by using Bug Search. Table 12 Open Bugs in ASDM Version 7.3(1) Bug Description CSCup69456 Command to negate ACL remarks not sent from ASDM CSCup82758 ASDM sorting VPNs freezes up at 97% Resolved Bugs • Resolved Bugs in 7.3(3), page 20 • Resolved Bugs in 7.3(2.102), page 20 • Resolved Bugs in 7.3(2), page 20 • Resolved Bugs in 7.3(1.101), page 21 • Resolved Bugs in 7.3(1), page 21 Release Notes for Cisco ASDM, Version 7.3(x) 19 Resolved Bugs Resolved Bugs in 7.3(3) There were no resolved bugs in this release. Resolved Bugs in 7.3(2.102) The following table contains the resolved bugs in ASDM software Version 7.3(2.102). Table 13 Resolved Bugs in ASDM Version 7.3(2.102) Bug Description CSCur23947 ASDM 7.3.2 doesn't display the "Endpoint Attribute Type: Policy" in DAP CSCus11684 ASDM goes unresponsive with HPM enabled CSCus30737 ASDM 7.3.2 becomes slow when hpm topN is enabled CSCus46034 Collapse All button is missing in Advanced/ACL Manager CSCus52758 Top 200 Hosts bar chart doesn't work Resolved Bugs in 7.3(2) The following table contains the resolved bugs in ASDM software Version 7.3(2). Table 14 Resolved Bugs in ASDM Version 7.3(2) Bug Description CSCuo97033 ASDM nat- ASDM changes interface to object if obj. with such name exists CSCup33692 Unable to add PUBLIC SERVER through ASDM CSCup37140 ASDM 7.2(1) hangs up at 90%: "Populating GUI modules" CSCup82758 ASDM sorting VPNs freezes up at 97% CSCuq10801 ASA - User with privilege level less than 15 cannot login to ASDM CSCuq24052 EIGRP neighbors not showing in ASDM after upgrade to 7.1.6 CSCuq40844 Packet tracer doesn't work for ASDM version 7.3(1) CSCuq41877 ASDM should check for dependencies when deleting host from Public Server CSCuq53503 ASDM 7.3.1 loading process gets stuck at 15% or 17% CSCuq54818 ASDM 7.3.1 goes unresponsive after 2 minutes with Poller exception CSCuq87483 ASDM 7.3(1): Unable to configure a Web type ACL with URL containing '/' CSCur27774 Unable to create User Identity domain from ASDM CSCur33996 ASDM Launcher doesn't work after upgrading to Java 8 CSCur41682 ASDM real time logs freezes after removing filter by "show all" button CSCur49880 ASDM: TLS - SSLv3 keywords deprecated Release Notes for Cisco ASDM, Version 7.3(x) 20 End-User License Agreement Resolved Bugs in 7.3(1.101) The following table contains the resolved bugs in ASDM software Version 7.3(1.101). Registered Cisco.com users can view more information about each bug by using Bug Search. Table 15 Resolved Bugs in ASDM Version 7.3(1.101) Bug Description CSCuq40844 Packet tracer doesn't work for ASDM version 7.3(1) CSCuq54818 ASDM 7.3.1 goes unresponsive after 2 minutes with Poller exception Resolved Bugs in 7.3(1) The following table contains the resolved bugs in ASDM software Version 7.3(1). Registered Cisco.com users can view more information about each bug by using Bug Search. Table 16 Resolved Bugs in ASDM Version 7.3(1) Bug Description CSCul79308 Enh: ASDM knob to export user-identity inactive/active/all user file CSCum23202 Webvpn customisation editor should error out when it fails CSCum24568 ASDM not responding properly if "anyconnect profile none" is configured CSCum57517 ASDM launcher is not working with Java 7u51 CSCun78199 ASDM unable to add subinterfaces CSCuo10523 ASDM 7.1 - Trustsec support is not enabled for ASA-SM in ASDM CSCuo55691 ASDM 7.1.6 RSA key generation fail (command syntax error) CSCuo62386 ASDM 7.1.6: No DNS Configuration warnings on managing GP through CP CSCuo64879 ASDM apply button does not work when adding anyconnect xml profile CSCuo71581 ASDM re-enables ikev1 if you switch from basic to the advanced config. CSCuo80011 "Enable auto-generation of MAC addresses..." checkbox missing in ASDM CSCuo89106 ASDM does not show empty object group in object-group section CSCup26608 ASDM logs out vpn sessions when trying to cancel operation End-User License Agreement For information on the end-user license agreement, see Product Warranties. Release Notes for Cisco ASDM, Version 7.3(x) 21 Related Documentation Related Documentation For additional information on the ASA, see Navigating the Cisco ASA Series Documentation. Obtaining Documentation and Submitting a Service Request For information on obtaining documentation, using the Cisco Bug Search Tool (BST), submitting a service request, and gathering additional information, see What’s New in Cisco Product Documentation. Subscribe to What’s New in Cisco Product Documentation, which lists all new and revised Cisco technical documentation, as an RSS feed and deliver content directly to your desktop using a reader application. The RSS feeds are a free service. This document is to be used in conjunction with the documents listed in the “Related Documentation” section. Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL: www.cisco.com/go/trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (1110R) Any Internet Protocol (IP) addresses used in this document are not intended to be actual addresses. Any examples, command display output, and figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses in illustrative content is unintentional and coincidental. ©2015 Cisco Systems, Inc. All rights reserved. Release Notes for Cisco ASDM, Version 7.3(x) 22
© Copyright 2026 Paperzz