Release Notes for the Cisco ASA Series, 9.5(x) First Published: 2015-08-31 Last Modified: 2017-04-17 Release Notes for the Cisco ASA Series, 9.5(x) This document contains release information for Cisco ASA software Version 9.5(x). Important Notes • Potential Traffic Outage (9.5(3) through 9.5(3.6))—Due to bug CSCvd78303, the ASA may stop passing traffic after 213 days of uptime. The effect on each network will be different, but it could range from an issue of limited connectivity to something more extensive like an outage. You must upgrade to a new version without this bug, when available. In the meantime, you can reboot the ASA to gain another 213 days of uptime. Other workarounds may be available. See Field Notice FN-64291 for affected versions and more information. • E-mail proxy commands deprecated—In ASA Version 9.5(2), the e-mail proxy commands (imap4s, pop3s, smtps) and subcommands are no longer supported. • CSD commands deprecated or migrated—In ASA Version 9.5(2), the CSD commands (csd image, show webvpn csd image, show webvpn csd, show webvpn csd hostscan, show webvpn csd hostscan image) are no longer supported. The following CSD commands will migrate: csd enable migrates to hostscan enable; csd hostscan image migrates to hostscan image. • Select AAA commands deprecated—In ASA Version 9.5(2), these AAA commands and subcommands (override-account-disable, authentication crack) are no longer supported. • The RSA toolkit version used in ASA 9.x is different from what was used in ASA 8.4, which causes differences in PKI behavior between these two versions. For example, ASAs running 9.x software allow you to import certificates with an Organizational Name Value (OU) field length of 73 characters. ASAs running 8.4 software allow you to import certificates with an OU field name of 60 characters. Because of this difference, certificates that can be imported in ASA 9.x will fail to be imported to ASA 8.4. If you try to import an ASA 9.x certificate to an ASA running version 8.4, you will likely receive the error, "ERROR: Import PKCS12 operation failed. System Requirements This section lists the system requirements to run this release. Release Notes for the Cisco ASA Series, 9.5(x) 1 Release Notes for the Cisco ASA Series, 9.5(x) ASA and ASDM Compatibility ASA and ASDM Compatibility For information about ASA/ASDM software and hardware requirements and compatibility, including module compatibility, see Cisco ASA Compatibility. VPN Compatibility For VPN compatibility, see Supported VPN Platforms, Cisco ASA 5500 Series. New Features This section lists new features for each release. Note New, changed, and deprecated syslog messages are listed in the syslog message guide. New Features in ASA 9.5(3.9)/ASDM 7.6(2) Released: April 11, 2017 Note Verion 9.5(3) was removed from Cisco.com due to bug CSCvd78303. Feature Description Remote Access Features Configurable SSH encryption and HMAC algorithm. Users can select cipher modes when doing SSH encryption management and can configure HMAC and encryption for varying key exchange algorithms. You might want to change the ciphers to be more or less strict, depending on your application. Note that the performance of secure copy depends partly on the encryption cipher used. By default, the ASA negotiates one of the following algorithms in order: 3des-cbc aes128-cbc aes192-cbc aes256-cbc aes128-ctr aes192-ctr aes256-ctr. If the first algorithm proposed (3des-cbc) is chosen, then the performance is much slower than a more efficient algorithm such as aes128-cbc. To change the proposed ciphers, use ssh cipher encryption custom aes128-cbc, for example. We introduced the following commands: ssh cipher encryption, ssh cipher integrity. We introduced the following screen: Configuration > Device Management > Advanced > SSH Ciphers Also available in 9.1(7) and 9.4(3). Release Notes for the Cisco ASA Series, 9.5(x) 2 Release Notes for the Cisco ASA Series, 9.5(x) New Features in ASAv 9.5(2.200)/ASDM 7.5(2.153) New Features in ASAv 9.5(2.200)/ASDM 7.5(2.153) Released: January 28, 2016 Note This release supports only the ASAv. Feature Description Platform Features Microsoft Azure support on the ASAv10 Microsoft Azure is a public cloud environment that uses a private Microsoft Hyper V Hypervisor. The ASAv runs as a guest in the Microsoft Azure environment of the Hyper V Hypervisor. The ASAv on Microsoft Azure supports one instance type, the Standard D3, which supports four vCPUs, 14 GB, and four interfaces. Licensing Features Permanent License Reservation for For highly secure environments where communication with the Cisco Smart Software Manager the ASAv is not allowed, you can request a permanent license for the ASAv. Not all accounts are approved for permanent license reservation. Make sure you have approval from Cisco for this feature before you attempt to configure it. We introduced the following commands: license smart reservation, license smart reservation cancel, license smart reservation install, license smart reservation request universal, license smart reservation return Note No ASDM support. Smart Agent Upgrade to v1.6 The smart agent was upgraded from Version 1.1 to Version 1.6. This upgrade supports permanent license reservation and also supports setting the Strong Encryption (3DES/AES) license entitlement according to the permission set in your license account. If you downgrade from Version 9.5(2.200), the ASAv does not retain the licensing registration state. You need to re-register with the license smart register idtoken id_token force commandConfiguration > Device Management > Licensing > Smart Licensing page with the Force registration option; obtain the ID token from the Smart Software Manager. We introduced the following commands: show license status, show license summary, show license udi, show license usage Note We modified the following commands: show license all, show tech-support license We deprecated the following commands: show license cert, show license entitlement, show license pool, show license registration We did not change any screens. Release Notes for the Cisco ASA Series, 9.5(x) 3 Release Notes for the Cisco ASA Series, 9.5(x) New Features in ASA 9.5(2.1)/ASDM 7.5(2) New Features in ASA 9.5(2.1)/ASDM 7.5(2) Released: December 14, 2015 Note This release supports only the ASA on the Firepower 9300. Feature Description Platform Features VPN support for the ASA on the Firepower 9300 With FXOS 1.1.3, you can now configure VPN features. Firewall Features Flow off-load for the ASA on the Firepower 9300 You can identify flows that should be off-loaded from the ASA and switched directly in the NIC (on the Firepower 9300). This provides improved performance for large data flows in data centers. Also requires FXOS 1.1.3. We added or modified the following commands: clear flow-offload, flow-offload enable, set-connection advanced-options flow-offload, show conn detail, show flow-offload. We added or modified the following screens: Configuration > Firewall > Advanced > Offload Engine, the Rule Actions > Connection Settings tab when adding or editing rules under Configuration > Firewall > Service Policy Rules. High Availability Features Inter-chassis clustering for 6 With FXOS 1.1.3, you can now enable inter-chassis, and by extension inter-site clustering. modules, and inter-site clustering for You can include up to 6 modules in up to 6 chassis. the ASA on the Firepower 9300 We did not modify any commands. We did not modify any screens. Licensing Features Strong Encryption (3DES) license automatically applied for the ASA on the Firepower 9300 For regular Cisco Smart Software Manager users, the Strong Encryption license is automatically enabled for qualified customers when you apply the registration token on the Firepower 9300. If you are using the Smart Software Manager satellite deployment, to use ASDM and other strong encryption features, after you deploy the ASA you must enable the Strong Encryption (3DES) license using the ASA CLI. This feature requires FXOS 1.1.3. Note We removed the following command for non-satellite configurations: feature strong-encryption We modified the following screen: Configuration > Device Management > Licensing > Smart License Release Notes for the Cisco ASA Series, 9.5(x) 4 Release Notes for the Cisco ASA Series, 9.5(x) New Features in ASA 9.5(2)/ASDM 7.5(2) New Features in ASA 9.5(2)/ASDM 7.5(2) Released: November 30, 2015 Feature Description Platform Features Cisco ISA 3000 Support The Cisco ISA 3000 is a DIN Rail mounted, ruggedized, industrial security appliance. It is low-power, fan-less, with Gigabit Ethernet and a dedicated management port. This model comes with the ASA Firepower module pre-installed. Special features for this model include a customized transparent mode default configuration, as well as a hardware bypass function to allow traffic to continue flowing through the appliance when there is a loss of power. We introduced the following command: hardware-bypass, hardware-bypass manual, hardware-bypass boot-delay We modified the following screen: Configuration > Device Management > Hardware Bypass Also in Version 9.4(1.225). Firewall Features DCERPC inspection improvements DCERPC inspection now supports NAT for OxidResolver ServerAlive2 opnum5 messages. and UUID filtering You can also now filter on DCERPC message universally unique identifiers (UUIDs) to reset or log particular message types. There is a new DCERPC inspection class map for UUID filtering. We introduced the following command: match [not] uuid. We modified the following command: class-map type inspect. We added the following screen: Configuration > Firewall > Objects > Class Maps > DCERPC. We modified the following screen: Configuration > Firewall > Objects > Inspect Maps > DCERPC. Diameter inspection You can now inspect Diameter traffic. Diameter inspection requires the Carrier license. We introduced or modified the following commands: class-map type inspect diameter, diameter, inspect diameter, match application-id, match avp, match command-code, policy-map type inspect diameter, show conn detail, show diameter, show service-policy inspect diameter, unsupported We added or modified the following screens: Configuration > Firewall > Objects > Inspect Maps > Diameter and Diameter AVP Configuration > Firewall > Service Policy add/edit wizard's Rule Actions > Protocol Inspection tab Release Notes for the Cisco ASA Series, 9.5(x) 5 Release Notes for the Cisco ASA Series, 9.5(x) New Features in ASA 9.5(2)/ASDM 7.5(2) Feature Description SCTP inspection and access control You can now use the SCTP protocol and port specifications in service objects, access control lists (ACLs) and access rules, and inspect SCTP traffic. SCTP inspection requires the Carrier license. We introduced the following commands: access-list extended , clear conn protocol sctp, inspect sctp, match ppid, nat static (object), policy-map type inspect sctp, service-object, service, set connection advanced-options sctp-state-bypass, show conn protocol sctp, show local-host connection sctp, show service-policy inspect sctp, timeout sctp We added or modified the following screens: Configuration > Firewall > Access Rules add/edit dialogs Configuration > Firewall > Advanced > ACL Manager add/edit dialogs Configuration > Firewall > Advanced > Global Timeouts Configuration > Firewall > NAT add/edit static network object NAT rule, Advanced NAT Settings dialog box Configuration > Firewall > Objects > Service Objects/Groups add/edit dialogs Configuration > Firewall > Objects > Inspect Maps > SCTP Configuration > Firewall > Service Policy add/edit wizard' s Rule Actions > Protocol Inspection and Connection Settings tabs Carrier Grade NAT enhancements For carrier-grade or large-scale PAT, you can allocate a block of ports for each host, rather now supported in failover and ASA than have NAT allocate one port translation at a time (see RFC 6888). This feature is now clustering supported in failover and ASA cluster deployments. We modified the following command: show local-host We did not modify any screens. Captive portal for active The captive portal feature is required to enable active authentication using identity policies authentication on ASA FirePOWER starting with ASA FirePOWER 6.0. 6.0. We introduced or modified the following commands: captive-portal, clear configure captive-portal, show running-config captive-portal. High Availability Features Release Notes for the Cisco ASA Series, 9.5(x) 6 Release Notes for the Cisco ASA Series, 9.5(x) New Features in ASA 9.5(2)/ASDM 7.5(2) Feature Description LISP Inspection for Inter-Site Flow Cisco Locator/ID Separation Protocol (LISP) architecture separates the device identity from Mobility its location into two different numbering spaces, making server migration transparent to clients. The ASA can inspect LISP traffic for location changes and then use this information for seamless clustering operation; the ASA cluster members inspect LISP traffic passing between the first hop router and the egress tunnel router (ETR) or ingress tunnel router (ITR), and then change the flow owner to be at the new site. We introduced or modified the following commands: allowed-eid, clear cluster info flow-mobility counters, clear lisp eid, cluster flow-mobility lisp, debug cluster flow-mobility, debug lisp eid-notify-intercept, flow-mobility lisp, inspect lisp, policy-map type inspect lisp, site-id, show asp table classify domain inspect-lisp, show cluster info flow-mobility counters, show conn, show lisp eid, show service-policy, validate-key We introduced or modified the following screens: Configuration > Device Management > High Availability and Scalability > ASA Cluster > Cluster Configuration Configuration > Firewall > Objects > Inspect Maps > LISP Configuration > Firewall > Service Policy Rules > Protocol Inspection Configuration > Firewall > Service Policy Rules > Cluster Monitoring > Routing > LISP-EID Table ASA 5516-X support for clustering The ASA 5516-X now supports 2-unit clusters. Clustering for 2 units is enabled by default in the base license. We did not modify any commands. We did not modify any screens. Configurable level for clustering trace entries By default, all levels of clustering events are included in the trace buffer, including many low level events. To limit the trace to higher level events, you can set the minimum trace level for the cluster. We introduced the following command: trace-level We did not modify any screens. Interface Features Support to map Secondary VLANs You can now configure one or more secondary VLANs for a subinterface. When the ASA to a Primary VLAN receives traffic on the secondary VLANs, it maps the traffic to the primary VLAN. We introduced or modified the following commands: vlan secondary, show vlan mapping We modified the following screens: Configuration > Device Setup > Interface Settings > Interfaces Configuration > Device Setup > Interface Settings > Interfaces > Add Interface > General Routing Features Release Notes for the Cisco ASA Series, 9.5(x) 7 Release Notes for the Cisco ASA Series, 9.5(x) New Features in ASA 9.5(2)/ASDM 7.5(2) Feature Description PIM Bootstrap Router (BSR) support The ASA currently supports configuring static RPs to route multicast traffic for different for multicast routing groups. For large complex networks where multiple RPs could exist, the ASA now supports dynamic RP selection using PIM BSR to support mobility of RPs. We introduced the following commands: clear pim group-map, debug pim bsr, pim bsr-border, pim bsr-candidate, show pim bsr-router, show pim group-map rp-timers We introduced the following screen: Configuration > Device Setup > Routing > Multicast > PIM > Bootstrap Router Remote Access Features Support for Remote Access VPN in You can now use the following remote access features in multiple context mode: multiple context mode • AnyConnect 3.x and later (SSL VPN only; no IKEv2 support) • Centralized AnyConnect image configuration • AnyConnect image upgrade • Context Resource Management for AnyConnect connections The AnyConnect Apex license is required for multiple context mode; you cannot use the default or legacy license. We introduced the following commands: limit-resource vpn anyconnect, limit-resource vpn burst anyconnect Note We modified the following screen: Configuration > Context Management > Resource Class > Add Resource Class Clientless SSL VPN offers SAML 2.0-based Single Sign-On (SSO) functionality The ASA acts as a SAML Service Provider. Clientless SSL VPN conditional debugging You can debug logs by filtering, based on the filter condition sets, and can then better analyze them. We introduced the following additions to the debug command: • [no] debug webvpn condition user <user name> • [no] debug webvpn condition group <group name> • [no] debug webvpn condition p-ipaddress <ipv4> [subnet<mask>] • [no] debug webvpn condition p-ipaddress <ipv6> [prefix<prefix>] • debug webvpn condition reset • show debug webvpn condition • show webvpn debug-condition Release Notes for the Cisco ASA Series, 9.5(x) 8 Release Notes for the Cisco ASA Series, 9.5(x) New Features in ASA 9.5(2)/ASDM 7.5(2) Feature Description Clientless SSL VPN cache disabled The clientless SSL VPN cache is now disabled by default. Disabling the clientless SSL VPN by default cache provides better stability. If you want to enable the cache, you must manually enable it. webvpn cache no disable We modified the following command: cache We modified the following screen: Configuration > Remote Access VPN > Clientless SSL VPN Access > Advanced > Content Cache Licensing Features Validation of the Smart Call Home/Smart Licensing certificate if the issuing hierarchy of the server certificate changes Smart licensing uses the Smart Call Home infrastructure. When the ASA first configures Smart Call Home anonymous reporting in the background, it automatically creates a trustpoint containing the certificate of the CA that issued the Smart Call Home server certificate. The ASA now supports validation of the certificate if the issuing hierarchy of the server certificate changes; you can enable the automatic update of the trustpool bundle at periodic intervals. We introduced the following command: auto-import We modified the following screen: Configuration > Remote Access VPN > Certificate Management > Trusted Certificate Pool > Edit Policy New Carrier license The new Carrier license replaces the existing GTP/GPRS license, and also includes support for SCTP and Diameter inspection. For the ASA on the Firepower 9300, the feature mobile-sp command will automatically migrate to the feature carrier command. We introduced or modified the following commands: feature carrier, show activation-key, show license, show tech-support, show version We modified the following screen: Configuration > Device Management > Licensing > Smart License Monitoring Features SNMP engineID sync In an HA pair, the SNMP engineIDs of the paired ASAs are synced on both units. Three sets of engineIDs are maintained per ASA—synced engineID, native engineID and remote engineID. An SNMPv3 user can also specify the engineID of the ASA when creating a profile to preserve localized snmp-server user authentication and privacy options. If a user does not specify the native engineID, the show running config output will show two engineIDs per user. We modified the following commands: snmp-server user, no snmp-server user We did not add or modify any screens. Also available in 9.4(3). Release Notes for the Cisco ASA Series, 9.5(x) 9 Release Notes for the Cisco ASA Series, 9.5(x) New Features in ASA 9.5(1.5)/ASDM 7.5(1.112) Feature Description show tech support enhancements The show tech support command now: • Includes dir all-filesystems output—This output can be helpful in the following cases: ◦SSL VPN configuration: check if the required resources are on the ASA ◦Crash: check for the date timestamp and presence of a crash file • Removes the show kernel cgroup-controller detail output—This command output will remain in the output of show tech-support detail. We modified the following command: show tech support We did not add or modify any screens. Also available in 9.1(7) and 9.4(3). logging debug-trace persistence Formerly, when you enabled logging debug-trace to redirect debugs to a syslog server, if the SSH connection were disconnected (due to network connectivity or timeout), then the debugs were removed. Now, debugs persist for as long as the logging command is in effect. We modified the following command: logging debug-trace We did not modify any screens. New Features in ASA 9.5(1.5)/ASDM 7.5(1.112) Released: November 11, 2015 Feature Description Platform Features Support for ASA FirePOWER 6.0 The 6.0 software version for the ASA FirePOWER module is supported on all previously supported device models. Support for managing the ASA You can manage the ASA FirePOWER module using ASDM instead of using Firepower FirePOWER module through ASDM Management Center (formerly FireSIGHT Management Center) when running version 6.0 for the 5512-X through 5585-X. on the module. You can still use ASDM to manage the module on the 5506-X, 5506H-X, 5506W-X, 5508-X, and 5516-X when running 6.0. No new screens or commands were added. Release Notes for the Cisco ASA Series, 9.5(x) 10 Release Notes for the Cisco ASA Series, 9.5(x) New Features in ASDM 7.5(1.90) New Features in ASDM 7.5(1.90) Released: October 14, 2015 Feature Description Remote Access Features AnyConnect Version 4.2 support ASDM supports AnyConnect 4.2 and the Network Visibility Module (NVM). NVM enhances the enterprise administrator’s ability to do capacity and service planning, auditing, compliance, and security analytics. The NVM collects the endpoint telemetry and logs both the flow data and the file reputation in the syslog and also exports the flow records to a collector (a third-party vendor), which performs the file analysis and provides a UI interface. We modified the following screen: Configuration > Remote Access VPN > Network (Client) Access > AnyConnect Client Profile (a new profile called Network Visibility Service Profile) New Features in ASAv 9.5(1.200)/ASDM 7.5(1) Released: August 31, 2015 Note This release supports only the ASAv. Feature Description Platform Features Microsoft Hyper-V supervisor support Extends the hypervisor portfolio for the ASAv. ASAv5 low memory support The ASAv5 now only requires 1 GB RAM to operate. Formerly, it required 2 GB. For already-deployed ASAv5s, you should reduce the allocated memory to 1 GB or you will see an error that you are using more memory than is licensed. New Features in ASA 9.5(1)/ASDM 7.5(1) Released: August 12, 2015 Note This version does not support the Firepower 9300 ASA security module or the ISA 3000. Release Notes for the Cisco ASA Series, 9.5(x) 11 Release Notes for the Cisco ASA Series, 9.5(x) New Features in ASA 9.5(1)/ASDM 7.5(1) Feature Description Firewall Features GTPv2 inspection and improvements GTP inspection can now handle GTPv2. In addition, GTP inspection for all versions now to GTPv0/1 inspection supports IPv6 addresses. We modified the following commands: clear service-policy inspect gtp statistics, clear service-policy inspect gtp pdpmcb, clear service-policy inspect gtp request, match message id, show service-policy inspect gtp pdpmcb, show service-policy inspect gtp request, show service-policy inspect gtp statistics, timeout endpoint We deprecated the following command: timeout gsn We modified the following screen: Configuration > Firewall > Objects > Inspect Maps > GTP IP Options inspection improvements IP Options inspection now supports all possible IP options. You can tune the inspection to allow, clear, or drop any standard or experimental options, including those not yet defined. You can also set a default behavior for options not explicitly defined in an IP options inspection map. We introduced the following commands: basic-security, commercial-security, default, exp-flow-control, exp-measure, extended-security, imi-traffic-description, quick-start, record-route, timestamp We modified the following screen: Configuration > Firewall > Objects > Inspect Maps > IP Options Carrier Grade NAT enhancements For carrier-grade or large-scale PAT, you can allocate a block of ports for each host, rather than have NAT allocate one port translation at a time (see RFC 6888). We introduced the following commands: xlate block-allocation size, xlate block-allocation maximum-per-host. We added the block-allocation keyword to the nat command. We introduced the following screen: Configuration > Firewall > Advanced > PAT Port Block Allocation. We added Enable Block Allocation the object NAT and twice NAT dialog boxes. High Availability Features Inter-site clustering support for Spanned EtherChannel in Routed firewall mode You can now use inter-site clustering for Spanned EtherChannels in routed mode. To avoid MAC address flapping, configure a site ID for each cluster member so that a site-specific MAC address for each interface can be shared among a site’s units. We introduced or modified the following commands: site-id, mac-address site-id, show cluster info, show interface We modified the following screen: Configuration > Device Management > High Availability and Scalability > ASA Cluster > Cluster Configuration Release Notes for the Cisco ASA Series, 9.5(x) 12 Release Notes for the Cisco ASA Series, 9.5(x) New Features in ASA 9.5(1)/ASDM 7.5(1) Feature Description ASA cluster customization of the auto-rejoin behavior when an interface or the cluster control link fails You can now customize the auto-rejoin behavior when an interface or the cluster control link fails. We introduced the following command: health-check auto-rejoin We introduced the following screen: Configuration > Device Management > High Availability and Scalability > ASA Cluster > Auto Rejoin The ASA cluster supports GTPv1 and GTPv2 The ASA cluster now supports GTPv1 and GTPv2 inspection. We did not modify any commands. We did not modify any screens. Cluster replication delay for TCP connections This feature helps eliminate the “unnecessary work” related to short-lived flows by delaying the director/backup flow creation. We introduced the following command: cluster replication delay We introduced the following screen: Configuration > Device Management > High Availability and Scalability > ASA Cluster Replication Also available for the Firepower 9300 ASA security module in Version 9.4(1.152). Disable health monitoring of a By default when using clustering, the ASA monitors the health of an installed hardware module hardware module in ASA clustering such as the ASA FirePOWER module. If you do not want a hardware module failure to trigger failover, you can disable module monitoring. We modified the following command: health-check monitor-interface service-module We modified the following screen: Configuration > Device Management > High Availability and Scalability > ASA Cluster > Cluster Interface Health Monitoring Enable use of the Management 1/1 interface as the failover link on the ASA 5506H On the ASA 5506H only, you can now configure the Management 1/1 interface as the failover link. This feature lets you use all other interfaces on the device as data interfaces. Note that if you use this feature, you cannot use the ASA Firepower module, which requires the Management 1/1 interface to remain as a regular management interface. We modified the following commands: failover lan interface, failover link We modified the following screen: Configuration > Device Management > High Availability and Scalability > Failover > Setup Routing Features Support for IPv6 in Policy Based Routing IPv6 addresses are now supported for Policy Based Routing. We introduced the following commands: set ipv6 next-hop, set default ipv6-next hop, set ipv6 dscp We modified the following screens: Configuration > Device Setup > Routing > Route Maps > Add Route Map > Policy Based Routing Configuration > Device Setup > Routing > Route Maps > Add Route Maps > Match Clause Release Notes for the Cisco ASA Series, 9.5(x) 13 Release Notes for the Cisco ASA Series, 9.5(x) New Features in ASA 9.5(1)/ASDM 7.5(1) Feature Description VXLAN support for Policy Based Routing You can now enable Policy Based Routing on a VNI interface. We did not modify any commands. We modified the following screen: Configuration > Device Setup > Interface Settings > Interfaces > Add/Edit Interface > General Policy Based Routing support for You can configure Identity Firewall and Cisco TrustSec and then use Identity Firewall and Identity Firewall and Cisco Trustsec Cisco TrustSec ACLs in Policy Based Routing route maps. We did not modify any commands. We modified the following screen: Configuration > Device Setup > Routing > Route Maps > Add Route Maps > Match Clause Separate routing table for management-only interfaces To segregate and isolate management traffic from data traffic, the ASA now supports a separate routing table for management-only interfaces. We introduced or modified the following commands: backup, clear ipv6 route management-only, clear route management-only, configure http, configure net, copy, enrollment source, name-server, restore, show asp table route-management-only, show ipv6 route management-only show route management-only We did not modify any screens. Protocol Independent Multicast Source-Specific Multicast (PIM-SSM) pass-through support The ASA now allows PIM-SSM packets to pass through when you enable multicast routing, unless the ASA is the Last-Hop Router. This feature allows greater flexibility in choosing a multicast group while also protecting against different attacks; hosts only receive traffic from explicitly-requested sources. We did not modify any commands. We did not modify any screens. Remote Access Features IPv6 VLAN Mapping ASA VPN code has been enhanced to support full IPv6 capabilities. No configuration change is necessary for the administrator. Clientless SSL VPN SharePoint 2013 Support Added support and a predefined application template for this new SharePoint version. We modified the following screen: Configuration > Remote Access VPN > Clientless SSL VPN Access > Portal > Bookmarks > Add Bookmark List > Select Bookmark Type > Predefined application templates Dynamic Bookmarks for Clientless Added CSCO_WEBVPN_DYNAMIC_URL and CSCO_WEBVPN_MACROLIST to the VPN list of macros when using bookmarks. These macros allow the administrator to configure a single bookmark that can generate multiple bookmark links on the clientless user’s portal and to statically configure bookmarks to take advantage of arbitrarily sized lists provided by LDAP attribute maps. We modified the following screen: Configuration > Remote Access VPN > Clientless SSL VPN Access > Portal > Bookmarks Release Notes for the Cisco ASA Series, 9.5(x) 14 Release Notes for the Cisco ASA Series, 9.5(x) Upgrade the Software Feature Description VPN Banner Length Increase The overall banner length, which is displayed during post-login on the VPN remote client portal, has increased from 500 to 4000. We modified the following command: banner (group-policy). We modified the following screen: Configuration > Remote Access VPN > .... Add/Edit Internal Group Policy > General Parameters > Banner Cisco Easy VPN client on the ASA This release supports Cisco Easy VPN on the ASA 5506-X series and for the ASA 5508-X. 5506-X, 5506W-X, 5506H-X, and The ASA acts as a VPN hardware client when connecting to the VPN headend. Any devices 5508-X (computers, printers, and so on) behind the ASA on the Easy VPN port can communicate over the VPN; they do not have to run VPN clients individually. Note that only one ASA interface can act as the Easy VPN port; to connect multiple devices to that port, you need to place a Layer 2 switch on the port, and then connect your devices to the switch. We introduced the following commands: vpnclient enable, vpnclient server, vpnclient mode, vpnclient username, vpnclient ipsec-over-tcp, vpnclient management, vpnclient vpngroup, vpnclient trustpoint, vpnclient nem-st-autoconnect, vpnclient mac-exempt We introduced the following screen: Configuration > VPN > Easy VPN Remote Monitoring Features Show invalid usernames in syslog messages You can now show invalid usernames in syslog messages for unsuccessful login attempts. The default setting is to hide usernames when the username is invalid or if the validity is unknown. If a user accidentally types a password instead of a username, for example, then it is more secure to hide the “username” in the resultant syslog message. You might want to show invalid usernames to help with troubleshooting login issues. We introduced the following command: no logging hide username We modified the following screen: Configuration > Device Management > Logging > Syslog Setup This feature is also available in 9.2(4) and 9.3(3). REST API Features REST API Version 1.2.1 We added support for the REST API Version 1.2.1. Upgrade the Software This section provides the upgrade path information and a link to complete your upgrade. Upgrade Path See the following table for the upgrade path for your version. Some versions require an interim upgrade before you can upgrade to the latest version. Release Notes for the Cisco ASA Series, 9.5(x) 15 Release Notes for the Cisco ASA Series, 9.5(x) Upgrade Link Current ASA Version First Upgrade to: Then Upgrade to: 8.2(x) and earlier 8.4(6) 9.1(3) and later 8.3(x) 8.4(6) 9.1(3) and later 8.4(1) through 8.4(4) 8.4(6) or 9.0(2+) 9.1(3) and later 8.4(5+) — 9.1(3) and later 8.5(1) 9.0(2+) 9.1(3) and later 8.6(1) 9.0(2+) 9.1(3) and later 9.0(1) 9.0(2+) 9.1(3) and later 9.0(2+) — 9.1(3) and later 9.1(1) 9.1(2) 9.1(3) and later 9.1(2+) — 9.1(3) and later 9.2(x) — 9.2(2) and later 9.3(x) — 9.3(2) and later 9.4(x) — 9.4(2) and later 9.5(x) — 9.5(2) and later 9.6(x) — 9.6(2) and later 9.7(x) — 9.8(1) and later Upgrade Link To complete your upgrade, see Upgrade to ASA 9.4 and ASDM 7.4. Open and Resolved Bugs The open and resolved bugs for this release are accessible through the Cisco Bug Search Tool. This web-based tool provides you with access to the Cisco bug tracking system, which maintains information about bugs and vulnerabilities in this product and other Cisco hardware and software products. Release Notes for the Cisco ASA Series, 9.5(x) 16 Release Notes for the Cisco ASA Series, 9.5(x) Open Bugs in Version 9.5(x) Note You must have a Cisco.com account to log in and access the Cisco Bug Search Tool. If you do not have one, you can register for an account. If you do not have a Cisco support contract, you can only look up bugs by ID; you cannot run searches. For more information about the Cisco Bug Search Tool, see the Bug Search Tool Help & FAQ. Open Bugs in Version 9.5(x) If you have a Cisco support contract, use the following dynamic search for all open bugs severity 3 and higher for Version 9.5(x): • 9.5 open bug search. The following table lists open bugs at the time of this Release Note publication. Caveat ID Number Description CSCto19832 OpenLDAP needs to be upgraded or patched CSCuv86562 Traceback: ASA crash in thread name fover_health_monitoring_thread CSCuw83618 ASA5508X SSD LED always green even when SSD is removed CSCux20294 Free memory drops to 0 after clientless VPN Test CSCux75565 ASA/DOC: Spaces can be used in LDAP DN CSCux85525 XMLSoft libxml2 Encoding Conversion Denial of Service Vulnerability CSCux85527 XMLSoft libxml2 xmlParserInputGrow Function Denial of Service Vulnerab CSCux85528 XMLSoft libxml2 XML Entity Processing Denial of Service Vulnerability CSCux85532 XMLSoft libxml2 xmlNextChar Function Memory Corruption Vulnerability CSCux85533 XMLSoft libxml2 xmlParseXMLDecl Function Denial of Service Vulnerabili CSCuy28172 DOC: ASA IPV6 LAN-to-LAN VPNs is compatible with non-ASA peers CSCuy47780 5508 and 5516 Devices may not boot 9.5.1 or later images CSCuy85511 libxml2 htmlParseNameComplex() Function Denial of Service Vulnerabilit CSCuz05856 XMLSoft libxml2 xmlStringGetNodeList Function Memory Exhaustion Denial CSCuz67536 Configuration retrieval from external server fails in multicontext mode CSCuz81201 ASA 5506 interface Counters & OIDs showing incorrect value for traffic! Release Notes for the Cisco ASA Series, 9.5(x) 17 Release Notes for the Cisco ASA Series, 9.5(x) Resolved Bugs Caveat ID Number Description CSCva32092 OSPFv3/IPv6 flapping every 30 min between ASA cluster and 4500 CSCva39094 ASA traceback in CLI thread while making MPF changes CSCva46651 ASAv Azure: ASAv not responding or passing traffic CSCva52514 ASAv-Azure: waagent may reload when asav deployed with load balancer CSCva62667 Shut down interfaces shows up in ASP routing table CSCva69346 Unable to relay DHCP discover packet from ASA when NAT is matched CSCva70079 SIP packets mangled when using TLS1.2 and ASA is server CSCva72317 Linux Kernel NULL Pointer Dereference Denial of Service Vulnerability CSCva72318 XMLSoft libxml2 XML Content Processing External Entity Expansion Vulne CSCva72319 XMLSoft libxml2 Format String Vulnerability CSCva79278 ASAv: TCP state bypass not matching the traffic required CSCva84089 ASA Crash Checkheap Free Buffer Corrupted CSCva89342 Interfaces get deleted on SFR during Multi-context HA configuration sync CSCvb11599 ASAv Azure: ASAv30 Anyconnect peer support. CSCvb13690 ASA : Botnet update fails with a lot of Errors Resolved Bugs This section lists resolved bugs per release. Resolved Bugs in Version 9.5(3.9) The following table lists select resolved bugs at the time of this Release Note publication. Caveat ID Number Description CSCtw90511 Packet captures cause CPU spike on Multi-Core platforms due to spin_lock CSCuc11186 ARP: Proxy IP traffic is hijacked. CSCum70304 FIPS self test power on fails - fipsPostDrbgKat CSCum74032 ASA traceback on standby when SNMP polling Release Notes for the Cisco ASA Series, 9.5(x) 18 Release Notes for the Cisco ASA Series, 9.5(x) Resolved Bugs Caveat ID Number Description CSCun21186 ASA traceback when retrieving idfw topn user from slave CSCup37416 Stale VPN Context entries cause ASA to stop encrypting traffic CSCup96099 "show resource usage detail counter all 1" causes cpu hog CSCuq80704 ASA classifies TCP packets as PAWS failure incorrectly CSCur87011 ASA low DMA memory on low end ASA-X -5512/5515 devices CSCus10787 Transactional ACL commit will bypass security policy during compilation CSCus16416 Share licenses are not activated on failover pair after power cycle CSCus37458 ASA traceback in Thread name DATAPATH when handling multicast packet CSCus53126 ASA traffic not sent properly using 'traffic-forward sfr monitor-only' CSCut10103 ASA 5545x Upgrade to 9.2(2)4 causes Traceback in Thread Name SSL CSCut14209 Cisco ASA XML Denial of Service Vulnerability CSCuu48197 ASA: Stuck uauth entry rejects AnyConnect user connections CSCuu50708 ASA Traceback on 9.1.5.19 CSCuv20449 Traceback in Thread Name: ssh when using capture or continuous ping CSCuv47191 9.5.1 - Crash in bcm_esw_init thread CSCuv49446 ASA traceback on Standby device during config sync in thread DATAPATH CSCuv86562 Traceback: ASA crash in thread name fover_health_monitoring_thread CSCuw02009 ASA - SSH sessions stuck in CLOSE_WAIT causing ASA to send RST CSCuw19671 ASA traceback while restoring backup configuration from ASDM CSCuw28735 Cisco ASA Software Version Information Disclosure Vulnerability CSCuw39685 ASA - Filtering HTTP via Websense or SFR may cause memory corruption CSCuw44038 Watchdog traceback in ldap_client_thread with large number of ldap grps CSCuw48499 QEMU coredump: qemu_thread_create: Resource temporarily unavailable CSCuw51576 SSH connections are not timed out on ASA (stuck in rtcli) Release Notes for the Cisco ASA Series, 9.5(x) 19 Release Notes for the Cisco ASA Series, 9.5(x) Resolved Bugs Caveat ID Number Description CSCuw55813 Standby ASA traceback in Thread Name: EIGRP-IPv4 CSCuw71147 Traceback in Unicorn Proxy Thread, in http_header_by_name CSCuw87331 ASA: Traceback in Thread name DATAPATH-7-1918 CSCuw90116 ASA 9.4.1 traceback upon clearing and reconfiguring ACL CSCuw92005 Thread Name: DATAPATH-17-3095: ASA in Cluster Reloads Unexpectedly CSCuw95262 After some time flash operations fail and configuration can not be saved CSCux00686 Evaluate CVE-2015-6360 for libsrtp Denial of Service (DoS) CSCux03626 Traceback in thread name: Unicorn Proxy Thread CSCux05081 RSA 4096 key generation causes failover CSCux07002 ASA: assertion "pp->pd == pd" failed: file "main.c", line 192 CSCux08783 CWS: ASA does not append XSS headers CSCux08838 ASA: Traceback in Checkheaps CSCux09181 http-form authentication fails after 9.3.2 CSCux09310 ASA traceback when using an ECDSA certificate CSCux10499 Smart Tunnel starts and Java closes without any message CSCux11440 ASA traceback in Unicorn Proxy Thread CSCux15273 show memory indicates inaccurate free memory available CSCux16427 PBR incorrect route selection for deny clause CSCux17527 ASA memory leak related to Botnet CSCux18455 SNMP: Memory Leak Walking CISCO-ENHANCED-MEMPOOL-MIB CSCux20178 OSPF neighbor goes down after "reload in xx" commnad in 9.2 and later CSCux21955 ASA: FAILOVER not working with password encryption. CSCux23659 ASA 9.1.6.10 traceback after remove compact flash and execute dir cmd CSCux29842 Primary and Secondary ASA in HA is traceback in Thread Name:DataPath Release Notes for the Cisco ASA Series, 9.5(x) 20 Release Notes for the Cisco ASA Series, 9.5(x) Resolved Bugs Caveat ID Number Description CSCux29929 ASA 9.4.2 traceback in DATAPATH CSCux30780 GTPv1 traceback in gtpv1_process_msg CSCux33808 ASA ERROR:FIPS Self-Test failure,fips_continuous_rng_test [-1:12:0:2:16] CSCux35538 Traceback in ctm_ssl_generate_key with DHE ciphers SSL VPN scaled test CSCux36112 PBR: Mem leak in cluster mode due to policy based route CSCux37303 Port-Channel Config on Gi 0/0 causes Boot Loop - FIPS related CSCux37442 Cisco signed certificate expired for WebVpn Port Forward Binary on ASA CSCux41145 Evaluation of pix-asa for OpenSSL December 2015 Vulnerabilities CSCux42936 ASA 9.5.1 traceback in Threadname Datapath due to SIP Inspection CSCux43978 DHCP Relay fails for cluster ASAs with long interface names CSCux45179 SSL sessions stop processing -"Unable to create session directory" error CSCux47195 ASA(9.5.2) changing the ACK number sent to client with SFR redirection CSCux56111 "no ipv6-vpn-addr-assign" CLI not working CSCux59122 ASA L7 policy-map comes into affect only if the inspection is re-applied CSCux61257 ASA: Traceback in Thread IP Address Assign CSCux66866 Traffic drop due to constant amount of arp on ASASM CSCux69987 ASA: Traceback on ASA device after adding FQDN objects in NAT rule CSCux70784 ASA traceback while viewing large ACL CSCux70998 Reload in Thread Name: IKE Daemon CSCux71197 "show resource usage" gives wrong number of routes after shut/no sh CSCux72610 ASA TACACS+: process tacplus_snd uses large percentage of CPU CSCux72835 ASA 9.5 - OCSP check using global routing table instead of management CSCux81683 ASA Traceback on Thread Name: Unicorn Admin Handler CSCux82835 Nat pool exhausted observed when enabling asp transactional-commit nat Release Notes for the Cisco ASA Series, 9.5(x) 21 Release Notes for the Cisco ASA Series, 9.5(x) Resolved Bugs Caveat ID Number Description CSCux86769 VLAN mapping doesn't work when connection falls back to TLS CSCux87457 ASA traceback in Thread Name: https_proxy CSCux88237 ASA traceback in DATAPATH thread CSCux92157 ASA Traceback Assert in Thread Name: ssh_init with component ssh CSCux93751 Cisco ASA Linux Kernel Vulnerability - CVE-2016-0728 CSCux94598 ASA using a huge dynamic ACL may cause Anyconnect connectivity failures CSCux96716 ASA tracebacks when replicating Xlate to the standby/slave CSCux98029 ASA reloads with traceback in thread name DATAPATH or CP Processing CSCuy00296 Traceback in Thread: IPsec message handler CSCuy01420 ASA traceback in Thread Name: Unicorn Proxy Thread. CSCuy01438 ASA traceback with SIP inspection and SFR enabled in 9.5.2 CSCuy03024 ASA traceback and reload citing Thread Name: idfw_proc CSCuy05949 ASA: MAC address changes on active context when WRITE STANDBY is issued CSCuy06125 Re-adding context creates context without configs on some slaves CSCuy07753 Smart tunnel does not work since Firefox 32bit version 43 CSCuy11281 ASA: Assert traceback in version 9.4.2 CSCuy11905 ASA 5585 traceback when the User name is mentioned in the Access list CSCuy13937 ASA Watchdog traceback in CP Processing thread during TLS processing CSCuy15636 ASA may traceback with: DATAPATH-9-3101/DATAPATH-7-3145/DATAPATH-3-1685 CSCuy21206 Traceback when drop is enabled with diameter inspection and tls-proxy CSCuy21287 STBY ASA does't pass traffic via ASA-IC-6GE-SFP-B ifc after reload CSCuy22561 VPN Load-Balancing does not send load-balancing cert for IPv6 Address CSCuy25163 Cisco ASA ACL ICMP Echo Request Code Filtering Vulnerability CSCuy32321 Traceback in ldap_client_thread with ldap attr mapping and pw-mgmt Release Notes for the Cisco ASA Series, 9.5(x) 22 Release Notes for the Cisco ASA Series, 9.5(x) Resolved Bugs Caveat ID Number Description CSCuy32728 VPN LB stops working when cluster encryption is configured CSCuy32964 ASA Crash on cluster member or on standby member of failover pair after replication of conns CSCuy34265 ASA Access-list missing and losing elements after configuration change CSCuy36897 Can't navigate to OWA 2013 due to ssl errors CSCuy40207 Traceback: assertion "0" failed: file "ctm_daemon.c" CSCuy41986 OCSP validation fails when multiple certs in chain are verified CSCuy42223 BGP:Deployment failed with reason supported on management-only interface CSCuy43839 ASA reloads in thread name: DATAPATH while encrypting L2L packet CSCuy44472 BVI : Interface IPv6 address deleted from standby context on HA - A/A CSCuy45475 ASA : Configuration not replicated on mate if standby IP is missing CSCuy47706 Traceback at gtpv1_process_pdp_create_req CSCuy50406 Crash in proxyi_rx_q_timeout_timer CSCuy51918 Buffer overflow in RAMFS dirent structure causing traceback CSCuy54567 Evaluation of pix-asa for OpenSSL March 2016 CSCuy55468 Unicorn Proxy Thread causing CP contention CSCuy57644 ASAv sub-interface failing to send traffic with customised mac-address CSCuy63642 ASA 9.1(6) traceback processing outbound DTLS Packet CSCuy66942 Cisco ASA Software DHCP Relay Denial of Service vulnerability CSCuy73652 Traceback in thread name idfw when modifying object-group having FQDN CSCuy74218 Assert Traceback in Thread Name: DATAPATH on clustered packet reassembly CSCuy78802 orignial master not defending all GARP packets after cluster split brain CSCuy80070 OSPF routes not populating over L2L tunnel CSCuy82905 ASA crashes when global access-list config is cleared CSCuy85243 ASA traceback when receive Radius attribute with improper variable type Release Notes for the Cisco ASA Series, 9.5(x) 23 Release Notes for the Cisco ASA Series, 9.5(x) Resolved Bugs Caveat ID Number Description CSCuy87597 ASA - Traceback in CP Processing Thread During Private Key Decryption CSCuy90936 ASA may stop responding to OSPF Hello packets CSCuy95543 Improve efficiency of malloc_avail_freemem() CSCuy96391 ASA clientless rewriter failure at 'CSCOPut_hash' function CSCuz00077 ASA 9.1.6.4 traceback with Thread Name: telnet/ci CSCuz04534 Memory leak in 112 byte bin when packet hits PBR and WCCP rules CSCuz08625 ASA traceback in SSH thread CSCuz09255 ASA does not respond to NS in Active/Active HA CSCuz09394 infinite loop in JS rewriter state machine when return followed by var CSCuz10371 ASA Traceback and reload by strncpy_sx.c CSCuz14600 Kenton 9.5.1'boot system/boot config' commands not retained after reload CSCuz14808 5585-10 traceback in Thread Name: idfw_proc CSCuz16398 Incorrect modification of NAT divert table. CSCuz16565 9.6.2 EST - assertion "0" failed: file "snp_vxlan.c" CSCuz21068 CSCOPut_hash can initiate unexepected requests CSCuz21178 ASA traceback in threadname ssh CSCuz23354 CPU usage is high after timer dequeue failed in GTP CSCuz28000 Context config may get rejected if all the units in Cluster reloaded CSCuz30425 Network command disappears from BGP after reload with name CSCuz33255 Traceback in IKEv2 Daemon with 20+ second CPU hog. CSCuz36938 Traceback on editing a network object on exceeding the max snmp hosts CSCuz38115 ASA Tback when large ACL applied to interface with object-group-search CSCuz38180 ASA: Page Fault traceback in DATAPATH on standby ASA after booting up CSCuz38888 WebVPN rewrite fails for MSCA Cert enrollment page / VBScript Release Notes for the Cisco ASA Series, 9.5(x) 24 Release Notes for the Cisco ASA Series, 9.5(x) Resolved Bugs Caveat ID Number Description CSCuz40081 ASA memory leak due to vpnfo CSCuz40793 Interfaces get deleted on SFR during HA configuration sync CSCuz42390 ASA Stateful failover for DRP works intermittently CSCuz44687 Traceback data path self deadlock panic while attempt to get spin lock CSCuz44968 Commands not installed on Standby due to parser switch CSCuz47295 Cisco ASA Software Local Certificate Authority Denial of Service Vulnerability CSCuz52474 Evaluation of pix-asa for OpenSSL May 2016 CSCuz54193 ASA: Traceback on ASA in Datapath as we enable SFR traffic redirection CSCuz54545 ASA Address not mapped traceback - configuring snmp-server host CSCuz61092 Interface health-check failover causes OSPF not to advertise ASA as ABR CSCuz63531 Observing Memory corruption, assert for debug ospf CSCuz64603 GTP traceback at gtp_update_sig_conn_timestamp while processing data CSCuz66661 ASA Cut-through Proxy inactivity timeout not working CSCuz67349 ASA Cluster fragments reassembled before transmission with no inspection CSCuz67590 ASA may Traceback with Thread Name: cluster rx thread CSCuz67596 ASA may Traceback with Thread Name: Unicorn Admin Handler CSCuz67690 ASA crashed due to Election severe problem no master is promoted CSCuz70330 ASA: SSH being denied on the ASA device as the maximum limit is reached CSCuz72352 traceback during tls-proxy handshake CSCuz80281 IPv6 neighbor discovery packet processing behavior CSCuz90648 2048/1550/9344 Byte block leak cause traffic disruption & module failure CSCuz92074 ASA with PAT fails to untranslate SIP Via field that doesnt contain port CSCuz92921 ASA crashes while clearing global access-list CSCuz94862 IKEv2: Data rekey collisions can cause inactive IPsec SAs to get stuck Release Notes for the Cisco ASA Series, 9.5(x) 25 Release Notes for the Cisco ASA Series, 9.5(x) Resolved Bugs Caveat ID Number Description CSCuz95806 DNS Doctoring DNS64 is not working CSCuz98220 ASA traceback with Thread Name: Dispatch Unit CSCuz98704 Traceback in CP Processing thread after upgrade CSCva00190 ASA 9.4.2.6 High CPU due to CTM message handler due to chip resets CSCva00939 Remove ACL warning messages in show access-list when FQDN is resolved CSCva01570 Unexpected end of file logon.html in WebVPN CSCva02817 ASA not rate limiting with DSCP bit set from the Server CSCva03607 show service-policy output reporting incorrect values CSCva03982 ASA : Mem leak in cluster mode due to PBR lookup CSCva10054 ASA ASSERT traceback in DATAPATH due to sctp inspection CSCva15911 On reloading the ASA, ASA mounts SSD as disk 0, instead of the flash. CSCva16471 IPv6 OSPF routes do not update when a lower metric route is advertised CSCva24924 ASA SM on 9300 reloads multi-context over SSH when config-url is entered CSCva26771 ASA : PBR Mem leak as packet dropped CSCva31378 ASA treaceback at Thread Name: rtcli async executor process CSCva35439 ASA DATAPATH traceback (Cluster) CSCva36202 BGP Socket not open in ASA after reload CSCva38556 Cisco ASA Input Validation File Injection Vulnerability CSCva39094 ASA traceback in CLI thread while making MPF changes CSCva39804 Interfaces get deleted on SFR during cluster rejoining CSCva40844 Crypto accelerator ring timeout causes packet drops CSCva46920 Traceback in Thread Name: ssh when issuing show tls-proxy session detail CSCva49256 memory leak in ssh CSCva62861 uauth is failed after failover Release Notes for the Cisco ASA Series, 9.5(x) 26 Release Notes for the Cisco ASA Series, 9.5(x) Resolved Bugs Caveat ID Number Description CSCva68987 ASA drops ICMP request packets when ICMP inspection is disabled CSCva69584 OSPF generates Type-5 LSA with incorrect mask, which gets stuck in LSDB CSCva69799 ASA stuck in boot loop due to FIPS Self-Test failure CSCva70095 ASA negotiates TLS1.2 when server in tls-proxy CSCva76568 ASA : Enabling IKEv1/IKEv2 opens RADIUS ports CSCva77852 ipsecvpn-ikev2_oth: 5525 9.4.2.11 traceback in Thread Name: IKEv2 Daemon CSCva81749 IPV6 address not assigned when connecting via IPSEC protocol CSCva84635 ASA: CHILD_SA collision brings down IKEv2 SA CSCva85382 ASA memory leak for CTS SGT mappings CSCva87077 GTP traceback at gtpv1_process_msg for echo response CSCva87160 OTP authentication is not working for clientless ssl vpn CSCva88796 AnyConnect Sessions Cannot Connect Due to Stuck L2TP Uauth Sessions CSCva90806 ASA Traceback when issue 'show asp table classify domain permit' CSCva91420 ASA Traceback in CTM Message Handler CSCva92151 Cisco ASA SNMP Remote Code Execution Vulnerability CSCva92813 ASA Cluster DHCP Relay doesn't forward the server replies to the client CSCva94702 Enqueue failures on DP-CP queue may stall inspected TCP connection CSCvb03994 Traceback in IKE_DBG CSCvb05667 H.323 inspection causes Traceback in Thread Name: CP Processing CSCvb05787 traceback in network udpmod_get after anyconnect test load application CSCvb13690 ASA : Botnet update fails with a lot of Errors CSCvb13737 wr mem/ wr standby is not syncing configs on standby CSCvb14997 ASA DHCP Relay rewrites netmask and gw received as part of DHCP Offer CSCvb19251 ASA as DHCP relay drops DHCP 150 Inform message Release Notes for the Cisco ASA Series, 9.5(x) 27 Release Notes for the Cisco ASA Series, 9.5(x) Resolved Bugs Caveat ID Number Description CSCvb19843 Buffer Overflow in ASA Leads to Remote Code Execution CSCvb22435 ASA Traceback in thread name CP Processing due to DCERPC inspection CSCvb22848 ASA 9.1.7-9 crash in Thread Name: NIC status poll CSCvb27868 ASA 1550 block depletion with multi-context transparent firewall CSCvb29411 AAA authentication/authorization fails if only accessible via mgmt vrf CSCvb29688 Stale VPN Context entries cause ASA to stop encrypting traffic despite fix for CSCup37416 CSCvb30445 ASA may generate DATAPATH Traceback with policy-based routing enabled CSCvb31833 Traceback : ASA with Threadname: DATAPATH-0-1790 CSCvb32297 WebVPN:VNC plugin:Java:Connection reset by peer: socket write error CSCvb36199 Thread Name: snmp ASA5585-SSP-2 running 9.6.2 traceback CSCvb39147 Lower NFS throughput rate on Cisco ASA platform CSCvb45039 ASA traceback with Thread Name aaa_shim_thread CSCvb48640 Evaluation of pix-asa for Openssl September 2016 CSCvb49273 Traceback triggered by CoA on ASA when sending/receiving to/from ISE CSCvb52988 ASA Traceback Thread Name: emweb/https CSCvb63503 AAA session handle leak with IKEv2 when denied due to time range CSCvb63819 ASA-SM traceback with Thread : fover_parse during upgrade OS 9.1.6 to 9.4.3 CSCvb64161 ASA fairly infrequently rewrites the dest MAC address of multicast packet for client CSCvb68766 ASA traceback at Thread Name: IKE Daemon. CSCvb74249 ASA dropping traffic with TCP syslog configured in multicontext mode CSCvd78303 ARP functions fail after 213 days of uptime, drop with error 'punt-rate-limit-exceeded' Resolved Bugs in Version 9.5(2.200) There were no bugs fixed in 9.5(2.200). Release Notes for the Cisco ASA Series, 9.5(x) 28 Release Notes for the Cisco ASA Series, 9.5(x) Resolved Bugs Resolved Bugs in Version 9.5(2.1) There were no bugs fixed in 9.5(2.1). Resolved Bugs in Version 9.5(2) If you have a Cisco support contract, use the following search for resolved bugs severity 3 and higher for Version 9.5(2): • 9.5(2) fixed bug search. The following table lists resolved bugs at the time of this Release Note publication. Identifier Description CSCuv94338 ASA traceback in Thread Name: CP Crypto Result Processing. CSCuu27334 ASA: Traceback with Thread Name - AAA CSCuu73395 Auth-prompt configured in one context appears in another context CSCuv32615 ASA: LDAP over SSL Authentication failure CSCuv12884 Unable to authenticate with remove aaa-server from different context CSCuw00971 ASA truncates url-redirect at 160 chars for ra vpn clients (ISE 1.3+) CSCut28210 AAA: RSA/SDI integration failing with ASA 9.3(2) - node secret issue CSCus47259 Cisco ASA XAUTH Bypass Vulnerability CSCut27332 ASA traceback in aaa_shim_thread / command author done for dACL install CSCuu48626 ASA - access list address argument changed from host 0.0.0.0 to host :: CSCuv92371 ASA traceback: SSH Thread: many users logged in and dACLs being modified CSCuv12564 Memory leak @regcomp_unicorn with APCF configured CSCus56590 ASA - Traceback in Thread Name: fover_parse CSCuw09578 ASA 9.3.3.224 traceback in ak47_platform.c with WebVPN stress test CSCuv87150 ASA traceback in Thread Name: fover_parse (ak47/ramfs) CSCut88287 ASA Traceback in vpnfol_thread_msg CSCuv87760 Unicorn proxy thread traceback with RAMFS processing CSCus32005 ASA - Traceback in thread name SSH while applying BGP show commands Release Notes for the Cisco ASA Series, 9.5(x) 29 Release Notes for the Cisco ASA Series, 9.5(x) Resolved Bugs Identifier Description CSCuu10284 ASA Dataplane captures dont capture packets when using match/access-list CSCuu61573 9.5.2 Gold Setup - Traceback in DATAPATH-6-2596 snp_fp_get_frag_chain CSCur20322 ASA 9.2.1 - DATAPATH Traceback in L2 cluster environment CSCus97061 ASA Cluster member traceback in DATAPATH CSCuv39775 ASA cluster-Incorrect "current conns" counter in service-policy CSCuu28909 ASA cluster: ICMP loop on CCL for ICMP packet destined to the VPN tunnel CSCuw36853 ASA: ICMP error loop on cluster CCL with Interface PAT CSCut56198 Clustering: Traceback in DATAPATH with transparent FW CSCuu66218 ASA is not correctly handling errors on AES-GCM ICV CSCuu18989 ASA %ASA-3-201011: Connection limit exceeded when not hitting max limit CSCuu75901 ASA failover due to issue show local-host command make CPU-hog CSCus92856 ASA traceback in DATAPATH Thread due to Double Block Free CSCut40770 Interface TLV to SFR is corrupt when frame is longer than 2048 bytes CSCuv91730 Request allow packets to pass when snort is down for ASA configurations CSCuv58559 Traceback in Thread Name: DATAPATH on modifying "set connection" in MPF CSCuw66397 DHCP Server Process stuck if dhcpd auto_config already enabled from CLI CSCuu84085 DHCP-DHCP Proxy thread traceback shortly after failover and reload CSCut44082 EIGRP configuration not being correctly replicated between failover ASAs CSCuu77207 ASA - URL filter - traceback on thread name uauth_urlb clean CSCut92194 ASA traceback in Thread Name: CP Processing CSCur07061 Traceback on standby ASA during hitless upgrade CSCuv01177 ASA: traceback in IDFW AD agent CSCze96017 Active ftp-data is blocked by Firepower on Chivas Beta on 5512 CSCuu45858 ASA Traceback in cp_syslog Release Notes for the Cisco ASA Series, 9.5(x) 30 Release Notes for the Cisco ASA Series, 9.5(x) Resolved Bugs Identifier Description CSCut86523 ASA: Silently Drops packets with SFR Module installed. CSCuu73716 Traceback in Thread CP Processing CSCuu56912 ASA change non-default port to 443 for https traffic redirected to CWS CSCut30741 ASA redirection to Scansafe tower fails with log id "775002" in syslog CSCuu91304 Immediate FIN from client after GET breaks scansafe connection CSCuq99821 ASA/ASASM drops SIP invite packets with From field containing "" and \ CSCut48009 Traceback in thread CP Processing CSCut45114 2048-byte block leak if DNS server replies with "No such name" CSCuu94945 ASA: Traceback while copying file using SCP on ASA CSCuw41548 DNS Traceback in channel_put() CSCut28217 Active ASA in failover setup reboots on its own CSCuu36639 ASA 5506X: ESP Packet drop due to crypto accelerator ring timeout CSCus08239 ASDM upload causes traceback, OCTEON_CRYPTO: SG buffers exceeds limit CSCuv70576 Cisco ASA VPN Memory Block Exhaustion Vulnerability CSCuo08193 Traceback in Thread Name: DATAPATH-1-1382 while processing nat-t packet CSCuu39636 Cert Auth fails with 'max simultaneous-login restriction' error CSCuu82229 ikev2 with DH 19 and above fails to pass traffic after phase2 rekey CSCut75983 ASA Traceback in PPP CSCuw17930 Improper S2S IPSec Datapath Selection for Remote Overlapping Networks CSCuw22886 Split-tunnel not working for EzVPN client on Kenton device (9.5.1) CSCut95793 ASA: Anyconnect IPv6 Traceroute does not work as expected CSCut01856 ASA dropping traffic with TCP syslog configured in multicontext mode CSCuv07106 ASATraceback in ssh whilst adding new line to extended ACL CSCuu63656 ASA not generating PIM register packet for directly connected sources Release Notes for the Cisco ASA Series, 9.5(x) 31 Release Notes for the Cisco ASA Series, 9.5(x) Resolved Bugs Identifier Description CSCuw22130 ASA traceback when removing dynamic PAT statement from cluster CSCtz98516 Observed Traceback in SNMP while querying GET BULK for 'xlate count' CSCuu45812 asa Traceback with Thread Name idfw_proc CSCuu39615 eglibc 2.18 is missing upstream fix #15073 CSCuv96011 OSPF over IKEv2 L2L tunnel is broken on ASA with 9.2.1 onwards CSCuv45756 ASA may tracebeck when displaying packet capture with trace option CSCuv11566 ASA LDAP CRL query baseObject DN string is malformed CSCuv66333 ASA picks incorrect trustpoint to verify OCSP Response CSCut67965 CRYPTO_PKI: ERROR: Unable to allocate new session. Max sessions reached CSCut15570 Anyconnect SSL VPN certificate authentication fails o ASA CSCuu46569 ASA CA certificate import fails with different types of Name Constraints CSCus78450 ASA cert validation fails when suitable TP is above the resident CA cert CSCuu45813 ASA Name Constraints dirName improperly verified CSCuv57389 ASA PKI: cert auth fails after upgrade to 9.1(6.4) / 9.1(6.6) / 9.1(6.8) CSCuv88785 RA validation failed when CA/subCA contains name constraints CSCui20213 5585 interface counters show 0 for working interfaces and console errors CSCuu04012 ASA CX - Data Plane marked as DOWN untill ASA reload. CSCuv10258 ASA5505 permanent base license, temp secplus, failover, vlan count issue CSCuw29566 ASA5585 9.5(1): Support Failover Lan on Management0/0 port CSCus62863 Kenton 5516: Interface dropping ARPs after flapping under traffic load CSCuq57307 ASA 8.4 Memory leak due to duplicate entries in ASP table CSCuw06294 ASA: Traceback in Thread Name Checkheaps due to webvpn CSCuv10938 'redistribute' cmds under 'router eigrp' removed on deleting any context CSCuu53928 ASA does not set forward address or p-bit in OSPF redistrubution in NSSA Release Notes for the Cisco ASA Series, 9.5(x) 32 Release Notes for the Cisco ASA Series, 9.5(x) Resolved Bugs Identifier Description CSCuu31751 ASA OSPF database not reflect changes CSCuv50968 CRL download functionality seems to be broken on ASA CSCuv42413 Dynamic Route Not Installed After Failover CSCut37974 EIGRP authentication not working with simple pasword CSCur09141 RRI static routing changes not updated in routing table CSCut10078 Standby ASA does not apply OSPF route after config replication CSCuv50709 Standby ASA inside IP not reachable after Anyconnect disconnect CSCuv79552 Standby traceback during config replication with customization export CSCuu06081 ASAv licesing enforcement should not be CLI parser based CSCuw59388 Unable to load ASDM to a Context in Multiple Context Mode CSCtx43501 CPU hog due to snmp polling of ASA memory pool information CSCuu04160 snmpwalk causes slow memory leak on ASA CSCuu84697 ASA Traceback in Thread Name ssh/client CSCus70693 ASA 9.3.2 SSL doesn't work with error: %ASA-4-402123: CRYPTO: CSCut03981 ASA SSLVPN Client cert validation failure - SSL Lib error: Bad RSA Sig CSCus27650 Cut Through proxy not working correctly with TLS1.2 CSCuv51649 SSL : Unable to Join nodes in Cluster CSCuu02848 Disable ECDSA SSL Ciphers When Manually Configuring RSA Cert for SSL CSCuu87823 ASAv traceback in DATAPATH when used for WebVPN CSCuv27197 ASA SSLVPN RDP Plugin session freezes under heavy load with activex CSCuv92384 ASA TCP Normalizer sends PUSH ACK for invalid ACK for half-open CONNS CSCuu86195 conn-max counter is not decreased accordingly CSCut39985 Per-session PAT RST sent to incorrect direction after closing session CSCut49111 ASA traceback because of TD tcp-intercept feature Release Notes for the Cisco ASA Series, 9.5(x) 33 Release Notes for the Cisco ASA Series, 9.5(x) Resolved Bugs Identifier Description CSCuw26991 ASA: Traceback in Thread Unicorn Admin Handler due to Threat Detection CSCut36927 Cluster destabilizes when contexts are removed CSCuv43902 ASA: Watchdog Traceback with Thread Name:- SXP CORE CSCur07369 SXP Version Mismatch Between ASA & N7K with clustering CSCuw86069 ASAv Cannot remove/change default global_policy or inspection_default CSCut49034 ASA: High CPU on standby due to RDP conn to AC client from CL SSL portal CSCuw14334 Trace back with Thread Name: IP Address Assign CSCut12513 ASA allows citrix ICA connection without authentication CSCuq97035 WEBVPN: Citrix 5/6 application doesn't launch with IE10/Windows 7 CSCut71095 ASA WebVPN clientless cookie authentication bypass CSCuv30184 AddThis widget is not shown causing Traceback in Unicorn Proxy Thread CSCuu32905 ASA WebVPN: Javascript fails to execute when accessing internal portal CSCuv05386 Clientless webvpn on ASA does not display asmx files CSCuv69235 HTTP chunked data causing watchdog CSCuv05916 Need to prevent traceback in js_parser_print_rest CSCuw87910 PCP 10.6 Clientless VPN Access is Denied when accessing Pages CSCuw44744 Traceback in WebVPN rewriter CSCuu78835 Webvpn rewrite issues for Confluence - by atlassian on latest v6.4.5 CSCus46895 WebVPN Rewriter: "parse" method returns curly brace instead of semicolon CSCuv86500 Webvpn: JS parser may crash if the underlying connection is closed Resolved Bugs in Version 9.5(1.5) If you have a Cisco support contract, use the following search for resolved bugs severity 3 and higher for Version 9.5(1.5): • 9.5(1.5) fixed bug search. Release Notes for the Cisco ASA Series, 9.5(x) 34 Release Notes for the Cisco ASA Series, 9.5(x) Resolved Bugs The following table lists resolved bugs at the time of this Release Note publication. Identifier Description CSCuq97035 WEBVPN: Citrix 5/6 application doesn't launch with IE10/Windows 7 CSCus08239 ASDM upload causes traceback, OCTEON_CRYPTO: SG buffers exceeds limit CSCut03981 ASA SSLVPN Client cert validation failure - SSL Lib error: Bad RSA Sig CSCut49034 ASA: High CPU on standby due to RDP conn to AC client from CL SSL portal CSCut95793 ASA: Anyconnect IPv6 Traceroute does not work as expected CSCuu73395 Auth-prompt configured in one context appears in another context CSCuu73716 Traceback in Thread CP Processing CSCuu75901 ASA failover due to issue show local-host command make CPU-hog CSCuu77207 ASA - URL filter - traceback on thread name uauth_urlb clean CSCuu87823 ASAv traceback in DATAPATH when used for WebVPN CSCuv05386 Clientless webvpn on ASA does not display asmx files CSCuv05916 Need to prevent traceback in js_parser_print_rest CSCuv09538 ASA: CLI commands not showing help(?) options for local authorization CSCuv11566 ASA LDAP CRL query baseObject DN string is malformed CSCuv12884 Unable to authenticate with remove aaa-server from different context CSCuv27197 ASA SSLVPN RDP Plugin session freezes under heavy load with activex CSCuv32615 ASA: LDAP over SSL Authentication failure CSCuv35243 ASA: Not able to remove ACE with "log default" keyword CSCuv39775 ASA cluster-Incorrect "current conns" counter in service-policy CSCuv42413 Dynamic Route Not Installed After Failover CSCuv43902 ASA: Watchdog Traceback with Thread Name:- SXP CORE CSCuv45756 ASA may tracebeck when displaying packet capture with trace option CSCuv57389 ASA PKI: cert auth fails after upgrade to 9.1(6.4) / 9.1(6.6) / 9.1(6.8) CSCuv69235 HTTP chunked data causing watchdog Release Notes for the Cisco ASA Series, 9.5(x) 35 Release Notes for the Cisco ASA Series, 9.5(x) Resolved Bugs Identifier Description CSCuv70576 Cisco ASA VPN Memory Block Exhaustion Vulnerability CSCuv79552 Standby traceback during config replication with customization export CSCuv86500 Webvpn: JS parser may crash if the underlying connection is closed CSCuv87150 ASA traceback in Thread Name: fover_parse (ak47/ramfs) CSCuv87760 Unicorn proxy thread traceback with RAMFS processing CSCuv88785 RA validation failed when CA/subCA contains name constraints CSCuv91730 Request allow packets to pass when snort is down for ASA configurations CSCuw00971 ASA truncates url-redirect at 160 chars for ra vpn clients (ISE 1.3+) CSCuw09578 ASA 9.3.3.224 traceback in ak47_platform.c with WebVPN stress test CSCuw30700 traffic-forward interface command is not working on 5585 Resolved Bugs in Version 9.5(1.200) There were no bugs fixed in 9.5(1.200). Resolved Bugs in Version 9.5(1) If you have a Cisco support contract, use the following search for resolved bugs severity 3 and higher for Version 9.5(1): • 9.5(1) fixed bug search. The following table lists resolved bugs at the time of this Release Note publication. Identifier Description CSCuu31281 AAA Authorization HTTP sends username in password field of authorization CSCus57241 ASA 9.3.2:DAP intermittently uses dflt policy for VPN RA sessions CSCuu73087 Standalone AnyConnect fails to connect due to empty DAP user message CSCur17006 Add cli to control masked username in syslog CSCut96928 ASA : Password creation date is decrementing by one with every reboot CSCuu27334 ASA: Traceback with Thread Name - AAA Release Notes for the Cisco ASA Series, 9.5(x) 36 Release Notes for the Cisco ASA Series, 9.5(x) Resolved Bugs Identifier Description CSCut22865 [ASA] CTP not working if proxyACL port_argument is gt CSCut54218 ASA tunnel-group"password-expire-in-days"not prompting a password change CSCut28210 AAA: RSA/SDI integration failing with ASA 9.3(2) - node secret issue CSCut27332 ASA traceback in aaa_shim_thread / command author done for dACL install CSCuu48626 ASA - access list address argument changed from host 0.0.0.0 to host :: CSCut92373 ASA 9.0.3 not logging permitted UDP traffic CSCus83942 ASA : ACL logging is not getting disabled with keyword "log disable" CSCut31315 [ASA] access-list ACL_name standard permit host 0.0.0.0 deleted CSCuv12564 Memory leak @regcomp_unicorn with APCF configured CSCur99653 Codenomicon HTTP-server suite may cause crash CSCus32005 ASA - Traceback in thread name SSH while applying BGP show commands CSCuv25327 bgp ipv6 neighborship fails with ASA after hard reset on router CSCuu10284 ASA Dataplane captures dont capture packets when using match/access-list CSCuu13345 Drop reasons missing from asp-drop capture CSCuu28909 ASA cluster: ICMP loop on CCL for ICMP packet destined to the VPN tunnel CSCut56198 Clustering: Traceback in DATAPATH with transparent FW CSCur56038 RPC error in request config after replicated a large configuration CSCut49711 show cluster mem indicates incorrect values CSCut44075 Traceback in snp_cluster_get_buffer CSCuu66218 ASA is not correctly handling errors on AES-GCM ICV CSCuu88607 Doubling counting flow bytes for decrypted packets CSCus56252 Cisco ASA DHCPv6 Relay Denial of Service Vulnerability CSCut49724 Corrupted host name may occur with DHCP CSCuu84085 DHCP-DHCP Proxy thread traceback shortly after failover and reload Release Notes for the Cisco ASA Series, 9.5(x) 37 Release Notes for the Cisco ASA Series, 9.5(x) Resolved Bugs Identifier Description CSCut44082 EIGRP configuration not being correctly replicated between failover ASAs CSCut92194 ASA traceback in Thread Name: CP Processing CSCuu16983 ASA: failover logging messages appear in user context CSCut11895 Failover assembly remained in active-active state permanantly CSCur07061 Traceback on standby ASA during hitless upgrade CSCut06531 ASA: XFRAME support for .JS and .JNLP URL's CSCuv01177 ASA: traceback in IDFW AD agent CSCuu54660 ASA Remote Access - Phase 1 terminated after xauth CSCur68226 ASA SMTP inspection should not disable TLS by default CSCut05676 Handling esmtp default parameters for TLS CSCze96017 Active ftp-data is blocked by Firepower on Chivas Beta on 5512 CSCuq69907 ASA traceback: thread name "scansafe_poll" CSCuq99821 ASA/ASASM drops SIP invite packets with From field containing "" and \ CSCut48009 Traceback in thread CP Processing CSCut83833 USB device hot plug not supported in running ASA CSCut45114 2048-byte block leak if DNS server replies with "No such name" CSCuu07799 Cisco ASA DNS Denial of Service Vulnerability CSCuu02761 DNS should perform IPv4 lookups if IPv6 address is not reachable CSCuv02304 EEM action not executed on absolute time when NTP is configured CSCuu36639 ASA 5506X: ESP Packet drop due to crypto accelerator ring timeout CSCur51051 LU allocate connection failed on the Standby ASA unit CSCuu39636 Cert Auth fails with 'max simultaneous-login restriction' error CSCuv07126 ikev2 enable added to config when zones are used despite ERROR msg CSCut80316 Ikev2 Session with bogus assigned IP address stays on ASA Release Notes for the Cisco ASA Series, 9.5(x) 38 Release Notes for the Cisco ASA Series, 9.5(x) Resolved Bugs Identifier Description CSCus85532 IKEv2: IPSec SA's are created by dynamic crypto map for static peers CSCut75983 ASA Traceback in PPP CSCut24490 L2TP/IPSec Optimal MSS is not what it's supposed to be CSCut64327 L2TP/IPsec traffic dropped due to "vpn-overlap-conflict" CSCut69675 Radius Acct-Terminate-Cause for L2TP over IPSec is incorrect. CSCus98309 Duplicate IPv6 address is configurable in 1 ASA or context CSCuu41142 IPv6 local host route fail when setting link-local/Global simultaneously CSCut01856 ASA dropping traffic with TCP syslog configured in multicontext mode CSCuu67411 Timeout:FloatingConnection valid(0:0:30-1193:0)remove http &telnet confg CSCuu19489 ASA inspection-MPF ACL changes not inserted into ASP table properly CSCuv07106 ASATraceback in ssh whilst adding new line to extended ACL CSCuu63656 ASA not generating PIM register packet for directly connected sources CSCus74398 Cisco ASA PIM Multicast Registration Vulnerability CSCus14147 ASA generate pool exhausted for sip inspect with embedded IP but no port CSCti05769 Migration of max_conn/em_limit to MPF is completely wrong in 8.3 CSCui37201 Misleading error msg for pat-pool with mapped object CSCtz98516 Observed Traceback in SNMP while querying GET BULK for 'xlate count' CSCut71347 PBA: Generate syslogs for port block allocation related failures CSCuu33321 Two Dynamic PAT with and without block-allocation CSCuu39615 eglibc 2.18 is missing upstream fix #15073 CSCus84220 ASA crashes for the OSPFv2 packets from codenomicon CSCuv01022 ASA:OSPF over L2L tunnels is not working with multiple cry map entries CSCut52679 Cisco ASA OSPFv2 Denial of Service Vulnerability CSCuu88548 Ampersand (&) not encoded in packet tracer phase 'extra' field Release Notes for the Cisco ASA Series, 9.5(x) 39 Release Notes for the Cisco ASA Series, 9.5(x) Resolved Bugs Identifier Description CSCus19673 "no nameif" is removing the policy-route configuration CSCus86487 PBR: DF & DSCP bits are not getting set without valid set next-hop CSCus78109 Policy based routing is not working with twice NAT CSCus63993 ASA - Traceback in thread name: CERT API CSCuu74823 Cryptomaps lose trustpoint when syncing configuration from cluster unit CSCuu81932 ASA tunnel-group-map cannot contain spaces CSCut67965 CRYPTO_PKI: ERROR: Unable to allocate new session. Max sessions reached CSCut15570 Anyconnect SSL VPN certificate authentication fails o ASA CSCuu46569 ASA CA certificate import fails with different types of Name Constraints CSCuu45813 ASA Name Constraints dirName improperly verified CSCut48571 Incorrect cert chain sent to connecting IPSec clients CSCut75202 PKI: potential pki session handle leak in IKEv2 L2L configurations CSCus69021 5506-X: 'no buffer' interface counter reports incorrect errors CSCus62863 Kenton 5516: Interface dropping ARPs after flapping under traffic load CSCuu75675 kenton: For ASA5516, ASAOS should support SSLVPN of 300 instead of 250 CSCuv72010 Kernel command line is displayed while booting 9.5.1 Image CSCuq27342 Traceback and reload triggered by failover configuration CSCut23991 PPPoE session state timer does not initialize properly CSCuq57307 ASA 8.4 Memory leak due to duplicate entries in ASP table CSCut67315 ASA :Top 10 Users status is not getting enabled from ASDM. CSCuu08031 ASA QoS Priority Queue tx-ring-limit 512 causes high impact to LLQ CSCut37042 Secondary ASA stuck in config sync while upgrading to 8.4.x CSCuj68919 Multiple problems with output of show processes memory CSCuv10938 'redistribute' cmds under 'router eigrp' removed on deleting any context Release Notes for the Cisco ASA Series, 9.5(x) 40 Release Notes for the Cisco ASA Series, 9.5(x) Resolved Bugs Identifier Description CSCus24519 ASA Cluster: Default OSPF route gone on Master unit CSCuu53928 ASA does not set forward address or p-bit in OSPF redistrubution in NSSA CSCut01395 ASA silently dropping OSPF LS Update messages from neighbors CSCuu99349 ASA-3-317012 and "No route to host" errors even though the route exists CSCuu00733 ASA: ECMP stopped working after upgrade to 9.3.2 CSCus64394 Misleading route-map warning message CSCur09141 RRI static routing changes not updated in routing table CSCut10078 Standby ASA does not apply OSPF route after config replication CSCut26062 xszASA 9.2.1 Eigrp Authentication does not work with 16 character key CSCuu02635 Remove demo and eval warning for sfr monitor-only CSCus79307 ASAv cannot send SL messages after toggeling of "service call-home" cmd CSCus79129 ASAv crashes when CiscoTAC-1 profile pointed to Transport Gateway w/ dbg CSCuu04160 snmpwalk causes slow memory leak on ASA CSCuu07308 "ssh scopy enable" deleted from configuration CSCuu52976 ASA not checking the MAC of the TLS records CSCuu93339 Cisco ASA Poodle TLS Variant CSCus27650 Cut Through proxy not working correctly with TLS1.2 CSCuu97304 SSL connection failing to WebVPN portal CSCuv51649 SSL : Unable to Join nodes in Cluster CSCuu83280 Evaluation of OpenSSL June 2015 CSCut46019 MARCH 2015 OpenSSL Vulnerabilities CSCuu87823 ASAv traceback in DATAPATH when used for WebVPN CSCus42901 JANUARY 2015 OpenSSL Vulnerabilities CSCut64846 To-the-box UDP traffic not getting inspected and getting dropped on ASA Release Notes for the Cisco ASA Series, 9.5(x) 41 Release Notes for the Cisco ASA Series, 9.5(x) Resolved Bugs Identifier Description CSCus11465 ASA teardown connection after receiving same direction fins CSCuu86195 conn-max counter is not decreased accordingly CSCut04182 NFS connections not timing out after failover CSCut39985 Per-session PAT RST sent to incorrect direction after closing session CSCut49111 ASA traceback because of TD tcp-intercept feature CSCus89139 Exception on asdm_handler stream line: </threat-detection> CSCus54537 ASAv requires a reboot for the license to take effect. CSCuu09302 ASAv: RSA key pair needs to be automatically generated with 2048 bits CSCuu07462 Cannot bootup ASAv-KVM when deployed via RHEL (7.1) / OpenStack (Juno) CSCus89286 ASA Traceback in SSL library due to DMA memory exhaustion CSCus53692 ASA traceback in Thread Name: fover_parse CSCus37840 AnyConnect upgrade from AC 2.5 to AC 3.1 fails CSCus95290 Cisco ASA VPN XML Parser Denial of Service Vulnerability CSCuc16662 HTML/Java File Browser- created file or folder shows 9 months offset CSCut71095 ASA WebVPN clientless cookie authentication bypass CSCuu48813 WebVpn: portal is not displayed after re-login CSCuv30184 AddThis widget is not shown causing Traceback in Unicorn Proxy Thread CSCuu18564 ASA WebVPN : jQuery based Calendar table fails to load; Empty frame CSCuu18527 ASA WebVPN: HTTP 302 Location URL rewritten incorrectly CSCuu32905 ASA WebVPN: Javascript fails to execute when accessing internal portal CSCut85049 Issue with downloading images from Sharepoint CSCuv38654 rewriter returns 302 for a file download CSCut35406 Src url of video track tag not mangled via webvpn CSCut58935 WebVPN: Tsweb fails to work through clientless portal Release Notes for the Cisco ASA Series, 9.5(x) 42 Release Notes for the Cisco ASA Series, 9.5(x) End-User License Agreement Identifier Description CSCut39169 WebVPN:Rewrite issue with 'eval' expressions inside JS on Peoplesoft app CSCur42776 Mac version smart-tunnel uses SSLv3 which is a vulnerability CSCuq10239 Windows 8 with new JRE, IE is not gaining access to smart tunnel End-User License Agreement For information on the end-user license agreement, go to http://www.cisco.com/go/warranty. Related Documentation For additional information on the ASA, see Navigating the Cisco ASA Series Documentation. Release Notes for the Cisco ASA Series, 9.5(x) 43 Release Notes for the Cisco ASA Series, 9.5(x) Related Documentation Release Notes for the Cisco ASA Series, 9.5(x) 44 Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL: http://www.cisco.com/go/trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (1110R) © 2017 Cisco Systems, Inc. All rights reserved.
© Copyright 2026 Paperzz