cc/td/doc/product/iaabu/pix
hometocprevnextglossaryfeedbacksearchhelp
PDF

Table of Contents

Release Notes for the PIX Firewall

Release Notes for the PIX Firewall

August 1999

Versions: 4.2(0), 4.2(1), 4.2(2), 4.2(3), 4.2(4), 4.2(5)

This document describes the changes for all 4.2(x) versions of the PIX Firewall software.

Contents

In the sections that follow, if an item is associated with a bug fix or workaround, the customer service number follows the note in brackets; for example, [CSCdm00000]. Bugs are summarized in the section "Resolved Caveats."

System Requirements

Version 4.2(3) and later requires that the PIX Firewall be equipped with a 2 MB Flash card.

Version 4.2(1) and later supports up to four Ethernet interfaces. Three Token Ring interfaces have been tested with the PIX Firewall.

Versions 4.2(4) and 4.2(5) support up to four interfaces, which may be either Token Ring or Ethernet.

New and Changed Information

Version 4.2 includes the following features.

New Features in Version 4.2(5)

No new features were added for this version---only bugs were fixed. The resolved bugs are CSCdk19979, CSCdk33996, CSCdm02200, CSCdm12973, CSCdm17608, CSCdm18870, CSCdm24909, CSCdm26456, CSCdm40856, CSCdm45461, CSCdm48728, CSCdm62060, and CSCdm69567. Refer to the section, "Resolved Caveats" for information on each bug. One open caveat was found in this release and is described as the first entry in the section, "Open Caveats."

New Features in Version 4.2(4)

AAA Authorization Port Ranges

The port parameter to the aaa authorization command now supports port ranges for UDP and TCP ports; for example, you can authorize access to ports 1024 to 5000 for TCP by specifying tcp/1024-5000.

Global Command Upgrade Improvements

During upgrade from version 4.1 to 4.2(4) when the previous configuration is converted to the new version, the global command now displays a warning message if the start or end addresses in the global command statement are on different subnets. The global command statement is accepted, with the provision that any network or broadcast addresses specified by the mask for this global are not included in the list of available translation slot addresses. The default value for the netmask parameter in the converted command statement is the mask of the interface's IP address for this global. The default value can be overridden by using the netmask parameter to the global command. [CSCdk88776]

IP Fragmentation Feature Disabled by Default

The sysopt security fragguard command that was formerly enabled in version 4.2(3) is now disabled by default.

MTU Support for linkpath Command

The linkpath command now lets you specify the MTU for a Private Link session. Refer to "Changed Commands" for more information.

Memory Upgrade Support

The PIX Firewall can now be upgraded to contain 128 MB of RAM. This permits approximately 260,000 simultaneous connections. Installation instructions are provided with the memory upgrade and can be viewed online in the Quick Installation Guide for the PIX Firewall Version 4.3 at:

http://www.cisco.com/univercd/cc/td/doc/product/iaabu/pix/pix_v43/pix43qig.htm

The memory upgrade information in this document also applies to version 4.2(3).

You can use the memory upgrade if:

The memory upgrade is not needed if:


Note PIX Firewall cannot exceed 128 MB. If more is installed, PIX Firewall will not boot.

Note The only memory upgrade is 128 MB---smaller quantities are not available from Cisco.

Note Cisco recommends that you purchase the 128 MB upgrade because it lets you manage all future code enhancements without concern for running out of memory.

NAT Parsing Changed

The parsing for the nat command has changed to fix reported errors. Refer to "NAT (Network Address Translation)" for more information.

PIX 520 Revision B Support

Due to a change in the manufacture of the PIX Firewall motherboards, a new version of motherboard is being introduced that will be supported by the PIX Firewall version 4.2(4) software. Use of this motherboard will not affect any use of the PIX Firewall or use of any peripheral boards or hardware. However, if you downgrade the software from version 4.2(4) to an earlier version that does not support this motherboard, the slots will be addressed in a different order. The order for the PIX 520 revision A (the version number is listed at the rear of the unit) starting from the leftmost slot, is outside, inside, perimeter1, perimeter2. If you downgrade a PIX 520 revision B unit to earlier software, the slot order will become inside, perimeter1, outside, perimeter2.

TFTP Configuration Improvements

The TFTP configuration feature that lets you store or load the configuration via TFTP has been improved for speed and reliability.

Token Ring Improvements

The Token Ring driver now supports frame sizes greater than 1500 bytes per frame. In addition, former problems with high traffic volumes causing failures is now fixed.

New Features in Version 4.2(3)

AAA Reauthenticate By User

Forces a specified user to reauthenticate with the clear uauth user command.

Connection License Counting

Only TCP connections from a higher security level interface to a lower security level interface are counted against the connection license; for example, from the inside to the outside, inside to a perimeter interface, a perimeter interface to the outside, or a higher security level perimeter interface to a lower security level perimeter interface. (Security levels are set with the nameif command.) Inbound connections are not denied if the connection license count is exceeded.

IP Frag Guard

Protects PIX Firewall from IP fragmentation attacks. Refer to the sysopt command description in the Configuration Guide for the PIX Firewall for information. This same command also lets you set the TCP maximum segment size and add additional cleanup time to connections that close simultaneously. You should increase the TCP maximum segment size when you have both Token Ring and Ethernet interface cards in your PIX Firewall.

Telnet Idle Timer

Lets you set the number of minutes a Telnet console session can be idle before PIX Firewall disconnects the session. The default is 5 minutes. Use the telnet timeout command to change the value or the show telnet timeout command to view the current setting.

Trace Channel

Permits debug icmp trace and debug sqlnet command output to display on a Telnet console session. You can also use the Telnet console session to start and stop debug packet command output.

Translation Information

The show xlate command now only displays translation information. To view connection information, use the show conn command. To view only the number of used and remaining connections, use the show conn count command.

Unused Interfaces

PIX Firewall sets the IP address of unused interfaces to 127.0.0.1 and the subnet mask for these interfaces to 255.255.255.255.

New Features in Version 4.2(1)

DNS Guard

Identifies an outbound DNS resolve request and only allows a single DNS response. A host may query several servers for a response (in the case that the first server is slow in responding), but only the first answer to the specific question is allowed. All additional answers from other servers are dropped.

Flood Defender

Protects PIX Firewall from SYN flood attacks. This feature lets you configure the maximum number of connections and embryonic connections with the static or nat commands. This feature lets a maximum number of unanswered SYN's accumulate before those connection attempts are dropped.

Flood Guard

Controls the AAA services' tolerance for unanswered login attempts. This prevents a Denial of Service attack on AAA services. This command is enabled by default with the floodguard command.

Four Interfaces

PIX Firewall supports up to four single-port 10/100BaseT Ethernet interfaces. Three 4-/16-Mbps Token Ring NICs (Network Interface Cards) have been tested with PIX Firewall. You can also mix Ethernet and Token Ring NICs in the same PIX Firewall.

PIX Firewall Setup Wizard

Simplifies initial configuration of the PIX Firewall. Refer to Appendix C, "Installing the PIX Firewall Setup Wizard" in the Configuration Guide for the PIX Firewall for installation instructions at:

http://www.cisco.com/univercd/cc/td/doc/product/iaabu/pix/pix_v42/pix42cfg/pix42apc.htm

PIX Firewall Manager

Provides a centralized configuration and management GUI (Graphical User Interface).

WebSENSE URL Filtering

Supports the WebSENSE URL filtering and accounting technology with the filter, url-cache, and url-server commands.

New Commands

The new commands described in this section were added starting with version 4.2(1).

Changed Commands

Table 1 lists command changes in version 4.2. All commands are documented in the Configuration Guide for the PIX Firewall.


Table 1: Command Changes
Command Change

All commands

For all commands, the following changes apply:

  • Interface names---Commands requiring an interface name can use any available interface in the PIX Firewall.

  • Network mask---Commands referencing a network mask can use an arbitrary subnetwork mask.

  • TCP and UDP port services---Commands requesting a TCP or UDP service can accept either a port number or literal name for most protocols or services.

aaa

1 .The aaa command provides authentication and accounting services for use with TACACS+ and RADIUS servers, and authorization services for use with TACACS+ servers.

2 .New accounting option enables or disables accounting services with an authentication server.

3 .New aaa authentication telnet console command lets you require authentication for access to the PIX Firewall console via Telnet or via both Telnet and the serial console.

4 .Version 4.2(4) and later: The aaa authentication serial console command lets you require authentication and have changes made to the configuration from the serial console be logged to a syslog server. The serial option requests a username and password before the first prompt on the serial console connection. The telnet option requests a username and password before the first prompt of a Telnet console connection. The enable option requests a username and password before the enable prompt for serial or Telnet connections.

5 .The port parameter to the aaa authorization command now supports port ranges for UDP and TCP ports; for example, you can authorize access to ports 1024 to 5000 for TCP by specifying tcp/1024-5000.

clear uauth

You can force a user to reauthenticate by specifying the user's login name with the clear uauth and show uauth commands; for example:

clear uauth myuser

conduit

1 .The conduit command provides new syntax to add, delete, or show conduits through the firewall for incoming connections.

2 .The conduit command provides new ICMP access control.

configure

The primary, secondary, and all options are added to the clear config command.

debug

Version 4.2(3): The debug icmp trace and debug sqlnet commands now send output to the Trace Channel feature. The Trace Channel determines where the output displays depending on whether or not a Telnet console session is running. If a Telnet console session is running, all the output displays on the first Telnet console session; otherwise, the output displays on the serial console session. The debug packet command only displays on the serial console session, but the debug packet command can be started and stopped from a Telnet session.

The downside of this feature is that if two different administrators are using the PIX Firewall, one on the console and one on a Telnet session, the Trace Channel can cause the appearance that the debug commands are not working on the console, and the Telnet session will unexpectedly receive the output.

failover

1 .The failover IP address is now required to specify the standby PIX Firewall.

2 .The reset option is added to the failover command. To take a unit out of the "failed" state, cycle the power or use the failover reset command.

3 .The show failover command displays the time, in seconds, that a PIX Firewall has been the active host.

4 .The timeout option lets the secondary PIX Firewall obtain translation slots for the traffic through the firewall. This lets traffic only be disrupted for 45 seconds or less before the secondary PIX Firewall becomes active.

global

1 .The global command includes a global netmask option that applies to global entries in the command syntax. This allows you to extend the pool of global entries across network boundaries.


Version 4.2(4) and later: The netmask parameter is only added to the configuration if it was entered by the user or existed in the configuration at load time. If the default is used at load time, it will continue to be used moving forward. PIX Firewall units upgraded from version 4.1 using software prior to version 4.2(4) will have a netmask parameter added to the configuration, even if the global command statement otherwise matched the default. [CSCdk91549]

2 .Version 4.2(4) and later: A PAT (Port Address Translation) global command statement now displays in the configuration with only the single address not the address as a range. [CSCdk91549]


For example, if the PAT IP address is 204.31.17.5, the command statement now displays in the configuration as:
global (outside) 1 204.31.17.5
 

Prior to version 4.2(4), the IP address would display as 204.31.17.5-204.31.17.5.

ip address

The show ip address command displays system IP addresses and current IP addresses which identify the Active unit when the failover feature is in use.

link

1 .The link command lets you specify that a Private Link tunnel can terminate on an interface other than the inside interface.

2 .The version 4.1 link command's ip and AUTO options for key generation are no longer supported.

linkpath

1 .The linkpath command lets you specify 0.0.0.0 for both the foreign_internal_ip and netmask to establish a default route to another PIX Firewall using Private Link.

2 .Version 4.2(4) and later: The linkpath command now lets you specify the MTU value for a Private Link session. The command syntax is:


linkpath foreign_internal_ip netmask foreign_external_ip mtu

Replace the foreign_internal_ip, netmask, and foreign_external_ip parameters as shown in the Configuration Guide for the PIX Firewall, on the "link/linkpath/age" command page in Chapter 5, "Command Reference." Replace the mtu parameter with the number of bytes for the MTU (maximum transmission unit) value. The default for Ethernet is 1500 bytes minus Private Link overhead; the Token Ring default is 8192 bytes minus the overhead. The overhead is computed as the length of the IP header, AH header, and the ESP header, plus 12 bytes.

3 .The MTU of all linkpaths associated with a Private Link tunnel is updated when a PIX Firewall receives an ICMP fragmentation needed message (ICMP message type 3, code 4). [CSCdk87134]

name

Version 4.2(3): the name string can now be 16 characters or less and cannot contain a dash (-).

nat

Version 4.2(4) and later: the nat command parser was changed so that the network mask is the primary key and the IP address is the secondary key. PIX Firewall sorts the list with most specific masks at the beginning, and the least specific masks at the end. If masks match, PIX Firewall puts the entries in ascending IP address order. Note that the nat_id has nothing to do with the sorting. [CSCdm00435]

show

1 .The show command has several options: show blocks, show checksum, show conn, show history, show memory, show processes, show tech-support, show traffic, and show version.

2 .In version 4.2(3), the show conn command lists the number of licensed connections and the active connections.

3 .In version 4.2(3), the show xlate command lists only translation slots and not connections.

snmp-server

Up to five SNMP servers can be specified. In version 4.2(4) and later, if you attempt to enter a sixth snmp-server command statement, an error message displays.[CSCdk63835]

static

The static command lets you optionally specify a pair of interface names as [(if_name,if_name)] and an arbitrary network mask for configuring network statics.

telnet

1 .Version 4.2(3): The telnet timeout minutes option was added. This option lets you specify the duration that a Telnet session to the PIX Firewall console can be idle before being logged off. The minutes option must be from 1 to 60 minutes. The default is 5 minutes.

2 .The PIX Firewall console can now be accessed via Telnet from the inside and perimeter interfaces. The originating host can be on any subnet accessible to the internal interface including those beyond the next hop router.

timeout

1 .The timeout command provides the new inactivity and absolute qualifiers to the uauth option. These qualifiers cause users to have to reauthenticate after either a period of inactivity or an absolute duration.

2 .Timeout values changed in version 4.2(2). The xlate timer default is now 3 hours and the conn timer default is now 1 hour.

write

The standby option is added to the write command and applies to PIX Firewall failover configurations.

Removed Commands

The following version 4.1 commands are obsolete in version 4.2:

Installation Notes

PIX Firewall only supports configuration upgrades from version 4.1(5) and later. With versions previous to 4.1(x), save your configuration to an ASCII text file using your terminal configuration program before upgrading, and write down your activation key. Table 2 lists the upgrade path to use to get to the current version.


Table 2: Upgrade Paths for Older Versions
If Your Pix Firewall Version Is: Install This Version:

2.7.x

3.0, then upgrade to the next version

3.0

4.0.7, then upgrade to the next version

4.0.7

4.1(7), then upgrade to the next version

4.1(5) or later

4.2(3), 4.2(4), or 4.2(5)

To upgrade from a previous PIX Firewall version:

http://www.cisco.com/univercd/cc/td/doc/product/iaabu/pix/pix_v42/pix42cfg/pix42int.htm

Limitations and Restrictions

This section contains critically important information.

    1. If your PIX Firewall has a serial number of 06002015 or earlier, do not attempt to load PIX Firewall version 4.2(2), 4.2(3), 4.2(4), or 4.2(5) software. If you have one of these units, you must upgrade your Flash memory to the 2 MB Flash memory card. Contact Cisco Customer Support about how to obtain the 2 MB Flash memory card.

Flash=string
 

    2. Versions 4.2(4) and 4.2(5): connections are not counted against the PIX Firewall license.

    3. PIX Firewall supports up to four Ethernet interfaces. Three Token Ring interfaces have been tested with PIX Firewall. If you use a mixed Token Ring and Ethernet environment, use the sysopt connection tcpmss 4056 command to increase the TCP maximum segment size for use with the IP Frag Guard feature (version 4.2(3) only).

    4. The maximum size of the configuration in a 2 MB Flash memory card is 400 KB. To view the number of characters in the configuration, use the UNIX wc command or a Windows word processing program, such as Microsoft Word. Previously the release notes reported a greater maximum configuration size for the 2 MB Flash memory card.

    5. Version 4.2(3): the sysopt security fragguard command is enabled by default but does not appear in the configuration when enabled. Use the show sysopt command to determine if this command is enabled.

    6. If a Telnet console session and serial console session are running at the same time, the debug icmp trace and debug sqlnet output will stop displaying without warning on the serial console and begin appearing on the Telnet session.  Before running the debug commands from the serial console session, use the who command to determine if Telnet sessions are present, and then inform other users that you will begin using debug commands. In addition, if both sessions are paging through output at the same time, the Telnet session may hang and cause the PIX Firewall to fail on your next attempt to use the write memory command. [CSCdk69399]

    7. PIX Firewall can sustain approximately 350 AAA transactions per minute.

    8. PIX Firewall supports up to 300 URL filtering transactions per minute without impacting normal NAT throughput. If your requirement exceeds this range, use the the url-cache command, which can provide significant relief depending on your cache-hit ratio. If the url-cache command does not improve capacity, you should consider purchasing additional PIX Firewall units.

    9. If you upgrade from a previous PIX Firewall software version, PIX Firewall converts your configuration to the new commands. Before using the PIX Firewall on a network, verify that no commands were lost from your configuration during the conversion process.

    10. PIX Firewall has been tested with 100 Mbps, full-duplex Ethernet only with Cisco switches. If the PIX Firewall is connected to a non-Cisco switch, half duplex settings may be required to maintain 100 Mbps throughput.

    11. When the PIX Firewall is operating with heavy traffic, do not set the logging console level to 7, debugging. This feature may cause PIX Firewall to fail. Use the logging buffered command to store messages and the show logging command to view them.

    12. Do not use the established command without the permitto and permitfrom options. Without these options, the established command can let users attack protected areas of your network. [CSCdk23441]

    13. To use the PIX Firewall serial console simultaneously with console Telnet sessions, disable paging at the serial console with the no pager command. Otherwise, a contention problem can arise between Telnet console sessions using More and the serial console using More, which causes the PIX Firewall to fail. [CSCdk69399]

    14. If the TACACS+, RADIUS, syslog, or URL servers go offline, the PIX Firewall will continue to send ARP requests for them and exhaust 256-byte memory blocks.

    15. The PIX Firewall Manager (PFM) is not compatible with Cisco Resource Manager (CRM) and PFSS, because all three use syslog UDP port 514. Do not run all three applications at the same time.

    16. Version 4.2(2): Define all interfaces on your PIX Firewall. For example, if three interface cards are installed, you must have interface and ip address statements in your configuration for each interface, even if a network cable is not connected to an interface.

    17. A host static without a conduit cannot be pinged.

    18. Before installing the current version from a previous release, save your configuration on floppy disk and write down your license activation key. You must have a copy of your activation key to restore a previous version from floppy disk.

Important Notes

The following sections contain usage information not included in other documentation or requiring special emphasis.


Note Use the clear xlate command after changing or removing these commands: alias, conduit, global, interface, ip address, nameif, nat, outbound, and static. If after using the clear xlate command, the previous behavior is unchanged, save your configuration with the write memory command, and reboot the PIX Firewall.

AAA

Unable to connect to remote host: Connection timed out
 

Access Control Lists

When using the outbound command, the default behavior is to permit access to all services. [CSCdk34668]

Refer to the outbound command page in the Configuration Guide for the PIX Firewall for more information on outbound command rules. You can view this information online at:

http://www.cisco.com/univercd/cc/td/doc/product/iaabu/pix/pix_v42/pix42cfg/pix42cmd.htm

Aliases

The period at the end of the domain name is required.
The alias command is:
alias 10.1.1.11 204.31.17.11 255.255.255.255
 
PIX Firewall doctors the nameserver replies to 10.1.1.11 for inside clients to directly connect to the web server.
The conduit you would expect to use is:
conduit permit tcp host 204.31.17.11 eq telnet host 192.150.50.7 
 
But with the alias command, use this command:
conduit permit tcp host 204.31.17.11 eq telnet host 192.159.1.7

Attacks

Automatic Recovery

On PIX Firewall units equipped with Token Ring interfaces, if a network error occurs that places the PIX Firewall in a state where it cannot receive or transmit information and which causes the unit to stop passing packets for 15 seconds, the PIX Firewall automatically reboots.


Note During automatic recovery, all connections are lost, and all Telnet console sessions or PIX Firewall Manager sessions are suspended and need to be restarted after the unit is back on line.

Command Lines

Configuration

Connections

Cookies

Version 4.2(4) and later: PIX Firewall now supports the HTTP POST command during proxy authentication. [CSCdk83285]

DHCP

If you are using DHCP to configure IP addresses for the hosts on the inside network, the DHCP server must provide the IP address, netmask, and gateway (default route) IP address. The default route must point to the PIX Firewall, either directly or via a router.

DLSw

Version 4.2(4) and later: PIX Firewall provides support for inbound DLSw (data-link switching) via the use of the static and conduit commands. Special provision for this protocol was made by letting connections stay open as long as SYN-SYN/ACK-SYN is received, even if data has not been received. [CSCdk77341]

DNS

established Command

The established command can potentially open a large security hole in the PIX Firewall if not used with discretion. Whenever you use this command, if possible, also use the permitto and permitfrom options to indicate ports to which and from which access is permitted. Without these options, users outside the PIX Firewall can access any ports on servers behind the firewall that are accessible with the conduit and static commands.

The following example illustrates this problem:

static (inside,outside) 204.31.17.42 192.168.1.42 netmask 255.255.255.255 
conduit permit tcp host 204.31.17.42 eq http any
established tcp
 

In this example, inside host 192.168.1.42 can be accessed from the outside interface for Web access as permitted by the conduit statement. Because this is a web server (using the HTTP port), access permission is granted to any outside host. However, the established command modifies the effect of the conduit statement and lets any user access any port on the 192.168.1.42 server. [CSCdk23441]

Failover Option

http://www.cisco.com/univercd/cc/td/doc/product/iaabu/pix/pix_v42/pix42cfg/pix42adv.htm

Flood Guard Feature

The floodguard command helps protect the AAA Cut-Through Proxy service by reclaiming the PIX Firewall "tcpusers" resource, which is used for the Cut-Through Proxies. Use floodguard 1 to enable this feature.

FTP Port

For AAA, the FTP port must be 21.

Global Addresses

Consult with your ISP (Internet service provider) to make sure that all addresses used in globals are routed to your outside router before configuring the PIX Firewall with global addresses.

IDENT Connections

PIX Firewall does not support the use of the established command with a PAT IP address for the IDENT service. Use the service resetinbound command to reset incoming IDENT connections.

Licenses

PIX Firewall provides the following connection licenses:

Only TCP connections from a higher security level interface to a lower security level interface are counted against the connection license.

Mail Guard Feature

This feature is only compliant with the RFC 821 section 4.5.1 commands. The RFC 1651 EHLO command returns a "500 command unrecognized" reply code.

MTU Requests

PIX Firewall now correctly handles path MTU (maximum transmission unit) requests. Path MTU relies on the PIX Firewall to generate an ICMP host unreachable message (code=3) on reception of a packet that needs to be fragmented but has the Don't Fragment flag set in the IP header (type=4). PIX Firewall formerly discarded these packets without returning the host unreachable message. [CSCdk38353]

Multimedia Applications

PIX Firewall supports the following multimedia and video conferencing applications:

NAT (Network Address Translation)

PAT (Port Addressed Translation)

pager Command

Using pager 0 disables screen paging in PIX Firewall.

Ping Use

Private Link Option

Protocol and Application Support

PIX Firewall supports the following TCP/IP protocols and applications:

Refer to the "Protocols" section in Chapter 1, "Introduction" in the Configuration Guide for the PIX Firewall for information on supported protocols. You can view the configuration guide online at:

http://www.cisco.com/univercd/cc/td/doc/product/iaabu/pix/pix_v42/pix42cfg/pix42int.htm

Routing and RIP

RPC Use

To configure NFS for inbound use:
PIX Firewall then manages the connection dynamically. Examples of the conduit statements are:
    conduit permit udp host 204.31.17.1 eq 111 any
    conduit permit udp host 204.31.17.1 eq 2049 any
     
    
Notes:
    conduit permit tcp host 204.31.17.1 eq 135 any
    conduit permit tcp host 204.31.17.1 range 1024 65535 any
     
    

Server Access

If RADIUS, SNMP, SMTP, syslog, TACACS+, or URL servers go down or are powered off, the PIX Firewall will ARP for the servers and may exhaust all 256-byte blocks. Traffic through the PIX Firewall will then stop. The workaround is to remove the statements for the servers from your configuration when they go down or are put out of service. [CSCdk34295]

show version Command

The show version command now lists the processor speed. [CSCdj57072]

SPX

PIX Firewall does not pass SPX packets across it.

Statics

Syslog Feature

    %PIX-3-305005: No translation group found for packet_shown_as_text
    %PIX-3-305006: xlate_type translation creation failed for packet_shown_as_text
     
    
where:
%PIX-3-106010: Deny inbound (No xlate) udp src outside:ip_addr/port 
dst inside:ip-_addr

Telnet Console Sessions

virtual telnet Command

Only use the virtual telnet command after the aaa authentication command.

Year 2000 Compliance

PIX Firewall is year 2000 compliant.

Caveats

The following caveats apply to PIX Firewall release 4.2(n). Refer to the previous versions of the PIX Firewall release notes for information on bugs in previous versions. You can view previous versions of the PIX Firewall release notes online at:

http://www.cisco.com/univercd/cc/td/doc/product/iaabu/pix/

If you have CCO access, you can view additional information about each open or resolved caveat at:

http://www.cisco.com/kobayashi/bugs/bugs.html

Open Caveats

The following issues are unresolved in this release:

static (inside,outside) 204.31.17.1 10.1.1.2
static (inside,outside) 204.31.17.1 10.9.9.9
 
For example:
alias (inside) 192.168.1.4 204.31.17.121 255.255.255.255
 
Host inside 10.1.1.1 goes to www.example.com which resolves at an outside ISP DNS to 204.31.17.121. The PIX Firewall fixes this DNS response sending the host a response of 192.168.1.4. The host uses its gateway (the PIX Firewall) to go to 192.168.1.4 which the PIX Firewall now aliases back to the 204.31.17.121. Because this is actually 192.168.1.4, a server on the perimeter interface of the PIX Firewall, the packet is dropped because the PIX Firewall sent the packet to the outside interface, which is the incorrect interface.
Workaround: Reverse the alias parameters as follows:
alias (inside) 204.31.17.121 192.168.1.4 255.255.255.255
 
This works properly because everything happens backwards. The DNS is now modified to 204.31.17.121 and the host inside uses its gateway (the PIX Firewall) to get there, the PIX Firewall aliases this back to 192.168.1.4 and routes it out the perimeter interface to the correct host and the TCP connection is established.

Resolved Caveats

Table 3 lists resolved version 4.2(n) DDTS bug reports.

Table 3: Resolved Bugs
DDTS Number Description Release

CSCdm69567

Use of an HTTP POST command now works correctly without causing a failure. Previously, customers with short uauth timeouts in their configuration or with a large number of authenticated users were more likely to be affected by this problem.

4.2(5)

CSCdm62060

The outbound command's except option now works correctly.

4.2(5)

CSCdm48728

The PIX Firewall now correctly updates its ARP cache when a gratuitous ARP broadcast is sent on the network.

4.2(5)

CSCdm45461

A Cisco IOS TN3270 client now echoes characters correctly when passing through a PIX Firewall.

4.2(5)

CSCdm40856

Entering the no aaa authentication telnet command no longer causes the PIX Firewall to fail.

4.2(5)

CSCdm26456

Currently the virtual http command redirects by IP address after authenticating. So if a user accesses a web site, after they are authenticated, they are sent to the IP address of the web site. This can cause problems at certain web sites, particularly those that use cookies to authenticate, because the browser will not be sent the cookie unless it sees a hostname it recognizes.

4.2(5)

CSCdm24909

Token Ring interfaces no longer stop transmitting and reset.

4.2(5)

CSCdm18770

The virtual http command now works correctly after the clear uauth command is executed.

4.2(5)

CSCdm17608

PIX Firewall no longer replies to gratuitous ARP requests unless the address exists on a PIX Firewall interface. This fix allows a Windows NT system to pass a gratuitous ARP to test to see if another host has taken its IP address. If the address belongs to a PIX Firewall interface, the PIX Firewall replies to the ARP request. Other regular ARP queries are still proxied if they are in the global or static pool.

4.2(5)

CSCdm12973

Entering two Class B addresses in a global command caused the "watchdog timer" to expire, which then caused the PIX Firewall to fail. The following is an example command that caused a failure:

global (outside) 2 172.168.0.1-172.168.255.254

4.2(5)

CSCdm03318

The outbound command now checks the protocol so that a protocol-unspecific best match will be replaced when a more specific protocol statement was found and matched with the packet being checked. Formerly, an implicit permit could override an explicit deny; this is no longer the case.

4.2(4)

CSCdm02200

One global pool address is no longer assigned to two or more local IP addresses

4.2(5)

CSCdm00435

The nat command parser was changed so that the network mask is the primary key and the IP address is the secondary key. PIX Firewall sorts the list with most specific masks at the beginning, and the least specific masks at the end. If masks match, PIX Firewall puts the entries in ascending IP address order. Note that the nat_id has nothing to do with the sorting.

4.2(4)

CSCdk92804

The former syslog message %PIX-2-106006: Deny inbound UDP has been dropped. This message was a duplicate of message %PIX-3-106010, which has been enhanced to now state:

%PIX-3-106010: Deny inbound (No xlate) udp 
src outside:ip_addr/port dst inside:ip-_addr

4.2(4)

CSCdk92547

PIX Firewall no longer fails during a passive FTP session that runs longer than the duration set by the timeout xlate command.

4.2(4)

CSCdk91549

The display of the network mask in PAT global command statements in the configuration changed. Refer to "Changed Commands" for more information.

4.2(4)

CSCdk88776

During upgrade from version 4.1 to 4.2(4) when the previous configuration is converted to the new version, the global command now displays a warning message if the start or end addresses in the global command statement are on different subnets.

4.2(4)

CSCdk87134

The MTU of all linkpaths associated with a Private Link tunnel is updated when a PIX Firewall receives an ICMP fragmentation needed message (ICMP message type 3, code 4).

4.2(4)

CSCdk87045

Command parsing is fixed so that PIX Firewall no longer fails when commands are entered with just three arguments. This bug noted that entering no tacacs (inside) caused PIX Firewall to fail.

4.2(4)

CSCdk84226

PIX Firewall now explicitly filters directed network layer broadcasts to address 255.255.255.255. These multicast broadcasts could pass through the PIX Firewall's data link layer when incorrect ARP mapping occurred by other hosts. The bug noted that the inside interface was passing broadcasts through the PIX Firewall.

4.2(4)

CSCdk83802

Syslog message PIX-2-108002 now displays the IP addresses in the correct order.

4.2(4)

CSCdk83300

Outbound lists now work correctly when the mask is different than the class of the IP address. For example, the outbound command would have previously failed if configured with Class C netmask for a Class B IP address as follows:

outbound 1 deny 172.16.6.0 255.255.255.0 0 tcp

4.2(4)

CSCdk83285

When proxy authenticating HTTP, PIX Firewall now correctly recognizes the POST command. The POST command transmits HTML cookies.

4.2(4)

CSCdk82957

Remote shell (rsh) now functions correctly with an HP 9000 if the EFT sysopt connection safeclose command is used.

4.2(4)

CSCdk81282

Syslog no longer displays incorrect characters in syslog messages, such as negative port numbers. This condition formerly existed while an outbound command statement was denying outbound access through a PAT global.

4.2(4)

CSCdk79683

PIX Firewall no longer closes connections when a single FIN is received. Instead, it now waits for two FINs to close the connection.

4.2(4)

CSCdk78956

The outbound command now permits a mask of 255.255.255.255.

4.2(4)

CSCdk78707

Under conditions such as low memory or memory corruption, PIX Firewall no longer generates frequent syslog messages containing the phrase, "PIX-2-SYS-CHUNKBOUNDS attempted to exceed freelist causing failover."

4.2(4)

CSCdk78398

Inbound mail is no longer denied when conduits are present. This problem occurred because an internally-coded embryonic connection timer was set too low. The embryonic state has been changed to track initial SYN sequences and not when data begins to flow. Also the embryonic connection timer continues to be updated until both sides of a TCP connection have begun the close down sequence.

4.2(4)

CSCdk78041

When the failover Primary and Standby configurations are synchronized, a message displays reminding you not to disturb the units.

4.2(4)

CSCdk77349

Token Ring no longer stops transmitting packets when the buffer index is incremented.

4.2(4)

CSCdk77341

Connections are not terminated as long as SYN-SYN/ACK-SYN is received, even if data has not been received.

4.2(4)

CSCdk77068

The telnet timeout command was changed from being an absolute timer to an inactivity timer. The version 4.2(3) documentation erroneously reported that the timer was an inactivity timer.

4.2(4)

CSCdk76744

The sysopt security fragguard is now disabled by default. If enabled, and a high amount of traffic is experienced, this command may cause the PIX Firewall to fail.

4.2(4)

CSCdk76293

The embryonic connection timeout was formerly hardcoded at 150 seconds. This timer has been changed so that the embryonic state excludes the data that has been seen; as long as a 3-way SYN is accepted, the connection is now subject to the duration set by the timeout conn command.

4.2(4)

CSCdk75115

International characters, those above ASCII 127, can now be entered in a Telnet console session. However, such characters will be rejected by the PIX Firewall command interpreter. Formerly entering these characters caused the PIX Firewall to fail.

4.2(4)

CSCdk74427

PIX Firewall no longer fails when receiving a UDP packet with length 0 or less, and when there is a server listening on the port.

4.2(4)

CSCdk72479

Syslog message "108001: SMTP made noop" has been improved to eliminate garbage characters at the end of the message.

4.2(4)

CSCdk72461

PIX Firewall now checks IP addresses and network masks for correct syntax. Formerly, nonsensical values could be added such as a netmask of 1.2.3.4. This affects the global, ip address, outbound, route, and static commands.

4.2(4)

CSCdk67488

PIX Firewall no longer reboots repeatedly when supplied with a long list of name statements.

4.2(3)

CSCdk66685

The fixup protocol smtp command now works correctly with multiline SMTP banners.

4.2(3)

CSCdk66556

Inbound pings through an authorized connection now work correctly. This formerly failed over a static when NAT was disabled (nat 0).

4.2(3)

CSCdk66331

PIX Firewall no longer puts the wrong subnet mask in the routing table when the rip inside passive command is enabled.

4.2(4)

CSCdk65675

The show failover command no longer causes an assertion error.

4.2(3)

CSCdk65454

PIX Firewall now delimits HTTP headers with CR-LF-CR-LF to make it HTTP 1.1 compliant, which is described in Section 4.1 of RFC-2068.

4.2(3)

CSCdk63839

The snmp-server command now lets you enter the contact and location strings with spaces. Formerly, the spaces were compressed out of the string.

4.2(4)

CSCdk63835

Up to five SNMP servers can be specified. In version 4.2(4), if you attempt to enter a sixth server command statement, a clear error message displays. Formerly, the error message was "SNMP ioctl() error, unable to set."

4.2(4)

CSCdk61913

PIX Firewall now permits multiple shared subnets on the same wire.This change permits backward compatibility with the behavior of version 4.0.7. To accomplish this change, PIX Firewall no longer rejects route statements when the next hop route destination is on the same subnet. In addition, the interface specifications in the static and global statements are used to select the correct routing table.

4.2(3)

CSCdk61170

Inbound SQL*Net now works correctly.

4.2(3)

CSCdk60423

Duplicate entries in the outbound are now ignored.

4.2(3)

CSCdk59508

The show xlate and show conn commands now list different information than previous PIX Firewall versions.

4.2(3)

CSCdk59467

The failover command now correctly recovers if an automatic update of the two units is interrupted.

4.2(3)

CSCdk59306

The alias command now creates the correct netmask if a mask is not specified.

4.2(3)

CSCdk59304

The new sysopt connection timewait command adds an additional 15 seconds to a connection being closed to let simultaneous closes complete successfully.

4.2(3)

CSCdk59286

For Telnet console access, in pages 10 and 11 of RFC 854, a CR character must be sent as a two-character sequence CR-NULL with the exception of CR-LF which represents a "single logical" new line command when in NVT ASCII mode.

Unfortunately, the QVT Telnet client does not follow this requirement in the RFC. To be compatible, Telnet console access has been modified for this exception with

CR-LF now produces a "logical newline."

CR-NULL produces "CR only" and the exception to NVT ASCII is:

CR-any_character, which is a CR followed by any_character.

4.2(4)

CSCdk58699

The pager command now displays the proper number of lines before prompting you to continue.

4.2(3)

CSCdk58145

The name command now works correctly without sporadic failures.

4.2(3)

CSCdk58142

The name command now accepts up to 16 characters for the name, and a dash character no longer is accepted in a name.

4.2(3)

CSCdk57769

PIX Firewall no longer hangs and causes a failover switch while modifying a WebSENSE database.

4.2(3)

CSCdk57230

Large ping packets no longer get dropped in dual NAT (alias command use).

4.2(3)

CSCdk57153

PIX Firewall no longer reboots during a ping of an outside host through a PAT connection started via user authentication.

4.2(3)

CSCdk57150

Outbound DNS lookups no longer fails with PAT and user authentication.

4.2(3)

CSCdk57107

The alias command now provides the correct netmask when not specified.

4.2(3)

CSCdk55691

The aaa authentication command has a new unsupported EFT feature that lets you prohibit RADIUS UDP access through the PIX Firewall unless specifically permitted. This capability is a precursor for support of RADIUS authorization in a future release. For TACACS+, you can prohibit UDP access with the aaa authorization command. The new command syntax adds the protocol/port options to the aaa authentication command. Refer to the aaa command page in the Configuration Guide for the PIX Firewall for a description of this syntax as it is used with the aaa authorization command.

4.2(3)

CSCdk53627

PIX Firewall no longer fragments packets in a mixed Token Ring and Ethernet environment.

4.2(3)

CSCdk52923

Inbound pings from the outside no longer fail when they have proper authorization.

4.2(3)

CSCdk52863

PIX Firewall no longer lets inbound ICMP fragments pass through firewall.

4.2(3)

CSCdk51545

Private Link now correctly handles large packets with the DF (Don't Fragment) bit set. Formerly, Private Link would drop the packets silently.

4.2(3)

CSCdk50549

PIX Firewall no longer fails when a 15-character IP address is used.

4.2(3)

CSCdk50529

An FTP back connection no longer ignores the norandomseq setting of the parent connection.

4.2(3)

CSCdk50224

UDP IP fragments no longer cause PIX Firewall failure. This bug is the basis of the new IP Frag Guard feature provided with the sysopt security fragguard command.

4.2(3)

CSCdk49981

Use of nslookup from a perimeter interface no longer can query a host on the inside interface without proper authorization.

4.2(3)

CSCdk49808

The aaa authorization command's handling of network addresses now works correctly with interfaces other than the inside.

4.2(3)

CSCdk49068

The debug icmp trace command no longer causes spontaneous failover.

4.2(3)

CSCdk47520

SQL*Net now connects correctly through PIX Firewall.

4.2(3)

CSCdk47456

The secondary failover host no longer sends RIP broadcasts while in standby mode.

4.2(3)

CSCdk47341

Unconfiguring RIP with failover active no longer causes the Secondary unit to fail.

4.2(3)

CSCdk47338

The secondary failover host no longer sends RIP broadcasts while in standby mode.

4.2(3)

CSCdk47235

PIX Firewall no longer reboots and crashes sporadically. The previous behavior would show in the syslog messages that PIX Firewall was switching to failover when neither the failover hardware was present or the failover command enabled. This problem was also seen when passing large packets through the PIX Firewall.

4.2(3)

CSCdk47051

PIX Firewall no longer displays an error message on bootup about Token Ring failure. The previous behavior displayed this message: (main.c:2268) cmd_taken(1) failed.

4.2(3)

CSCdk46673

PIX Firewall no longer corrupts e-mail passing through the unit when Mail Guard issues a NOOP command on receipt of a command that is not part of its RFC 821 permitted command set. The corruption caused sections of the email to be replaced with a series of Xs. Syslog messages would contain the statement "SMTP made noop" when the NOOP command was issued.

4.2(3)

CSCdk46553

Entering the mailhost command no longer causes PIX Firewall to fail.

4.2(3)

CSCdk46243

Inbound UDP authorization now requires authentication.

4.2(3)

CSCdk45124

The fixup protocol sqlnet command now works.

4.2(3)

CSCdk44746

When upgrading from a previous PIX Firewall version, global commands in the configuration now receive the correct network mask. The previous behavior ignored subnetting during the command conversion.

4.2(3)

CSCdk44220

PIX Firewall no longer displays the message "Smallest mtu" in the configuration. This was a debugging command that was removed from the code.

4.2(3)

CSCdk42950

PIX Firewall now handles RIF information properly for interaction between Token Ring and HSRP router on the same ring.

4.2(3)

CSCdk42655

The aaa authorization command no longer accepts out as a shortened form of outbound.

4.2(3)

CSCdk42254

The outbound command with a negative list_id no longer causes failures.

4.2(3)

CSCdk41882

Syslog messages are no longer stated to originate from port 0. This bug made it appear that syslog messages were not being received at the syslog server.

4.2(3)

CSCdk41825

The write floppy command no longer crashes failover-equipped PIX Firewalls.

4.2(3)

CSCdk41688

The aaa authorization command now works correctly when outbound UDP authorization is enabled.

4.2(3)

CSCdk40896

Authorization for UDP now works correctly on same port previously authorized for TCP.

4.2(3)

CSCdk40673

Checking failover status no longer causes PIX Firewall to fail.

4.2(3)

CSCdk40528

Failover no longer causes a race condition between the Active and Standby units. To correct the problem, a 10-second delay was added before the no failover active command takes effect.

4.2(2)

CSCdk39478

If you cut and paste text from your console computer into the configuration, check it carefully afterwards. Some lines may be dropped during the process due to buffer overflow.

4.2(2)

CSCdk38353

PIX Firewall now correctly handles path MTU (maximum transmission unit) requests. Path MTU relies on the PIX Firewall to generate an ICMP host unreachable message (code=3) on reception of a packet that needs to be fragmented but has the Don't Fragment flag set in the IP header (type=4). PIX Firewall formerly discarded these packets without returning the host unreachable message.

4.2(2)

CSCdk38092

The Private Link key now correctly accepts 14 hexadecimal characters.

4.2(2)

CSCdk37223

For the aaa, radius-server, and tacacs-server commands, 16 TACACS+, RADIUS, or URL servers are supported.

4.2(2)

CSCdk36912

When DNS traffic is logged, the ID field in the DNS response packet appears in the source port field. It is normal to see a UDP state with a "d" flag; such as:

Global 192.159.1.1 Local 10.8.8.11 static nconns 0 econns 0 flags s
UDP out 204.31.17.2:12345 in 10.8.8.11:67890 idle 0:01:30 flags d

4.2(2)

CSCdk36498

The maximum password length for accessing the console is 16 characters with the aaa authentication telnet console command.

4.2(2)

CSCdk36273

Hosts behind the PIX Firewall are no longer subject to DoS attacks to inside static IP addresses. Inside hosts are not susceptible to DoS attacks even when attacked with a high volume of IP fragments to penetrate across statics.

4.2(2)

CSCdk36092

The clear radius-server and clear tacacs-server commands do not have any arguments. In addition, before using these commands, remove the aaa commands from the configuration that references the AAA servers.

4.2(2)

CSCdk35931

Denying one service with the outbound command no longer denies other services.

4.2(2)

CSCdk35899

The maximum timeout value for the radius-server and tacacs-server commands is 30 seconds.

4.2(2)

CSCdk35552

The TCP random sequence value can no longer be predicted.

4.2(2)

CSCdk34855

For the aaa command, four attempts are allowed for Telnet authentication, infinite for HTTP, and only one for FTP.

4.2(2)

CSCdk34853

For the aaa, radius-server, and tacacs-server commands, 16 TACACS+, RADIUS, or URL servers are supported.

4.2(2)

CSCdk34799

The use of the traceroute command through a PAT global now works correctly.

4.2(2)

CSCdk34696

FTP works correctly when two PIX Firewall units' outside interfaces are connected to each other.

4.2(2)

CSCdk34668

PIX Firewall no longer denies access to all services when an outbound command statement is used in the configuration. The default is to permit all services until explicitly denied.

4.2(2)

CSCdk33996

PIX Firewall no longer lets non-dnat addresses go out on an existing dnat connection.

4.2(5)

CSCdk33877

PIX Firewall now correctly handles outbound encapsulated ICMP messages of types 3, 4, 5, 11, and 12.

4.2(2)

CSCdk33802

Failed authentication message no longer displays on the PIX Firewall console.

4.2(3)

CSCdk33420

A workaround has been provided for situations in which an attempt at authorization fails but a second attempt times out. Refer to the "AAA" usage note for more information.

4.2(2)

CSCdk32369

The configure floppy command does not check to see if a diskette is present.

4.2(3)

CSCdk31770

PIX Firewall now supports PAT with rsh (Rshell).

4.2(2)

CSCdk31760

PIX Firewall now correctly accesses the next AAA server when the current server becomes inaccessible.

4.2(2)

CSCdk30996

When a SYN packet arrives with PSH bit turned on, PIX Firewall allows the outbound traffic through the firewall.

4.2(2)

CSCdk29494

Denying one service with the outbound command no longer denies other services.

4.2(2)

CSCdk29476

PIX Firewall no longer removes all outbound statements from the configuration when the no outbound 1 permit 0.0.0.0 command is issued.

4.2(2)

CSCdk29475

Refer to "RPC Use" in the section, "Important Notes" for more information.

4.2(2)

CSCdk28193

PIX Firewall no longer fails every 5 minutes when the fixup protocol smtp command is enabled.

4.2(2)

CSCdk27770

PIX Firewall now permits passive FTP through a PAT global.

4.2(2)

CSCdk26803

The FTP port command now works correctly with PAT (Port Address Translation). The previous behavior caused FTP sessions to hang when the FTP ls command was entered when the only global statement in the PIX Firewall configuration was for PAT.

4.2(2)

CSCdk25962

PIX Firewall no longer fails after a user upgrades from a previous version of the PIX Firewall software.

4.2(2)

CSCdk25517

The apply command now correctly works with an interface specification in the command.

4.2(2)

CSCdk25487

SNMP MIBs now correctly provide return values when accessed through the PIX Firewall.

4.2(2)

CSCdk25383

Refer to "RPC Use" in the section, "Important Notes" for more information.

4.2(2)

CSCdk23717

PIX Firewall is no longer susceptible to a SYN denial of service attack through AAA authentication.

4.2(2)

CSCdk23711

PIX Firewall no longer fails after the unit is upgraded to version 4.2. The previous failures occurred because FTP mishandled the association between an xlate and a connection.

4.2(2)

CSCdk23441

Only use the established command with the permitto and permitfrom options. Without these options, the established command can be used to gain access to restricted parts of your network.

4.2(3)

CSCdk23329

PIX Firewall now lets FTP work when HTTP authentication is enabled. With this fix, when HTTP authentication in enabled, users are prompted for login credentials when accessing the network with a web browser. In addition, TCP sessions other than HTTP that are not denied by outbound lists are allowed through without requiring authentication.

4.2(2)

CSCdk22976

Telnet to an MS-Exchange server on port 25 across the PIX Firewall no longer causes every character to be accompanied by carriage-return, linefeed characters.

4.2(2)

CSCdk22832

PIX Firewall no longer fails after the aaa accounting command is set to monitor outbound connections. Previously, when an outbound connection started, the PIX Firewall would fail.

4.2(2)

CSCdk22568

Failover now works correctly when the PIX Firewall is configured to broadcast a default route using RIP.

4.2(2)

CSCdk22371

The Mail Guard feature now works correctly when sending an SMTP EHLO command to an MS Exchange server. Previously, the MS Exchange server would hang upon receipt of the EHLO command through the PIX Firewall. The Mail Guard feature is enabled on the PIX Firewall with the fixup protocol smtp command. Also refer to bug fix CSCdk09763 for further EHLO improvements.

4.2(2)

CSCdk21511

PIX Firewall now automatically upgrades users with a 64-connection license to a 128-connection license.

4.2(2)

CSCdk21408

AAA authentication no longer becomes inoperable when embryonic connections are exceeded. The previous behavior let inbound and outbound connections through without authentication after the limit was exceeded.

4.2(2)

CSCdk21312

The aaa authentication command now works correctly for inbound user authentication. Previously, use of the aaa authentication except command would fail. For example, the following commands failed so that the mail server at 10.1.1.1 would be challenged for login credentials and would not deliver mail:

aaa authentication any inbound 0.0.0.0 0.0.0.0
aaa authentication except inbound 10.1.1.1 255.255.255.255

4.2(2)

CSCdk21113

PIX Firewall no longer converts network conduit statements to host conduit statements when upgrading from a previous PIX Firewall version. Previously, if a 4.1(6) configuration contained the following conduit statement:

conduit (inside,outside) 204.31.17.0 0 tcp 0 0 
 

The PIX Firewall installation conversion script incorrectly converted the statement to the following by adding the host option:

conduit permit tcp host 204.31.17.0 any

4.2(2)

CSCdk20305

Pings to broadcast addresses no longer are answered with the broadcast address as the source address. The previous behavior resulted because PIX Firewall incorrectly swapped the source and destination addresses in the ICMP packet.

4.2(2)

CSCdk20122

PIX Firewall now permits 2,560 aaa authentication except statements.

4.2(2)

CSCdk19979

One global pool address is no longer assigned to two or more local IP addresses.

4.2(5)

CSCdk19656

PIX Firewall no longer fails during failover when PIX Firewall contains 3Com network interface cards.

4.2(2)

CSCdk17897

Use of the conduit command no longer results in random configuration corruption. In one instance, a conduit command was removed and PIX Firewall inserted 8000 identical conduit statements into the configuration.

4.2(3)

CSCdk17808

Syslog output now displays correctly when the write command is issued.

4.2(2)

CSCdk17788

At startup, the PIX Firewall now correctly displays an export control warning message when an encryption device is detected in the unit.

4.2(2)

CSCdk17784

Cisco recommends that you do not change the default port assigned to FTP with the fixup protocol command. Once changed, all traffic into the PIX Firewall will only work on the port you specify. Default FTP traffic through the PIX Firewall will no longer work.

4.2(2)

CSCdk16222

Do not use the virtual http command when an inside client is configured to access a proxy server located on an unprotected interface of the PIX Firewall.

4.2(2)

CSCdk16053

Refer to CSCdk21312 for resolution description.

4.2(2)

CSCdk15978

PIX Firewall no longer fails after the aaa accounting command is set to monitor outbound connections. Previously, when an outbound connection started, the PIX Firewall would fail.

4.2(2)

CSCdk15527

Failover on PIX Firewall units configured with two Token Ring interfaces now works properly.

4.2(1)

CSCdk14305

Performing a write memory command followed by a reload command no longer changes the outbound command list.

4.2(2)

CSCdk11848

Private Link now accepts the full 56-bit key. Previously 8 bits of the key were ignored. A new parity feature has been added so that an additional 8 bits have been added to the key just for parity to ensure that the key is passed correctly across the link.

4.2(2)

CSCdk11335

PIX Firewall now sends a syslog message when the uauth inactivity timer expires. This feature lets sites charge for connection time starting with the "%PIX-2-109001: Auth start for user" syslog message and ending when the uauth inactivity timer expires.

4.2(2)

CSCdk11011

Syslog no longer shows the amount of data as a negative number.

4.2(1)

CSCdk10909

The host name no longer disappears after reading in a large configuration from diskette.

4.2(2)

CSCdk09763

PIX Firewall now handles UNIX sendmail programs that send the EHLO command without a linefeed even though the RFC specifies that a CRLF must be sent. PIX firewall now sends "500 Command unrecognized" to suppress the negotiation of EHLO commands regardless of whether the sending client sends the EHLO with or without a linefeed.

4.2(2)

CSCdk06673

Syslog failover and reset messages were moved to the logging command's level 1 alerts. Formerly these messages were in levels 2 and 6 respectively.

4.2(2)

CSCdk05737

The conduit command now correctly accepts a zero in a port field to mean all ports. In version 4.2 and later, you can also specify all ports by not including a port value in the command.

4.2(1)

CSCdk04509

PIX Firewall now correctly handles aaa authentication statements that reference different authentication server types (RADIUS or TACACS+) for inbound and outbound connections.

4.2(2)

CSCdk04242

Outbound user authentication now works correctly with a PAT global address.

4.2(1)

CSCdk04054

The ip protocol is now recognized correctly.

4.2(1)

CSCdk03381

AAA accounting now works when a connection is created.

4.2(3)

CSCdk03375

PIX Firewall no longer runs the aaa accounting routines when this feature is not requested. This fix improves PIX Firewall performance.

4.2(2)

CSCdk00333

PAT now correctly handles ICMP MTU resize packets.

4.2(1)

CSCdj94418

The apply command now works correctly. Previously, outbound lists would not work correctly until the apply statement was removed and then reinserted.

4.2(2)

CSCdj93649

The new linkpath 0 0 ip_address command options let you specify the default Private Link route path. Refer to the Configuration Guide for the PIX Firewall for more information.

4.2(1)

CSCdj92046

Outbound lists denying access to all outbound users except for specifically allowed addresses now block outbound attempts from denied users, including attempts on high ports.

4.2(1)

CSCdj90814

Private Link no longer fails when blasted with prefragmented UDP packets.

4.2(2)

CSCdk85168

The global command now displays a PAT address correctly.

4.2(2)

CSCdj84604

PAT now works correctly with passive FTP.

4.2(2)

CSCdj82419

HP OpenView can now browse perimeter networks on the PIX Firewall.

4.2(1)

CSCdj70621

PIX Firewall's debug icmp trace command now displays ICMP packets arriving, departing, and traversing the PIX Firewall.

4.2(1)

CSCdj57072

The show version command now lists the processor speed.

4.2(1)

CSCdk54553

PAT now works correctly when a fragmented packet arrives in reverse order.

4.2(2)

Documentation Updates

The version 4.2(3) Configuration Guide for the PIX Firewall describes the telnet timeout command as an inactivity timer. For version 4.2(3), it was an absolute timer. In version 4.2(4) and later, it became an inactivity timer as described in the documentation.

Related Documentation

Use this document in conjunction with the following PIX Firewall documents:

All of these documents, including these release notes, apply to the PIX Firewall, PIX10000, PIX 510, and PIX 520 hardware models. Refer to the Release Notes for the PIX Firewall Version 4.4(1) for information on the PIX 515.

Cisco provides PIX Firewall technical tips at:

http://www.cisco.com/warp/public/110/index.shtml#pix

Cisco Connection Online

Cisco Connection Online (CCO) is Cisco Systems' primary, real-time support channel. Maintenance customers and partners can self-register on CCO to obtain additional information and services.

Available 24 hours a day, 7 days a week, CCO provides a wealth of standard and value-added services to Cisco's customers and business partners. CCO services include product information, product documentation, software updates, release notes, technical tips, the Bug Navigator, configuration notes, brochures, descriptions of service offerings, and download access to public and authorized files.

CCO serves a wide variety of users through two interfaces that are updated and enhanced simultaneously: a character-based version and a multimedia version that resides on the World Wide Web (WWW). The character-based CCO supports Zmodem, Kermit, Xmodem, FTP, and Internet e-mail, and it is excellent for quick access to information over lower bandwidths. The WWW version of CCO provides richly formatted documents with photographs, figures, graphics, and video, as well as hyperlinks to related information.

You can access CCO in the following ways:

For a copy of CCO's Frequently Asked Questions (FAQ), contact cco-help@cisco.com. For additional information, contact cco-team@cisco.com.


Note If you are a network administrator and need personal technical assistance with a Cisco product that is under warranty or covered by a maintenance contract, contact Cisco's Technical Assistance Center (TAC) at 800 553-2447, 408 526-7209, or tac@cisco.com. To obtain general information about Cisco Systems, Cisco products, or upgrades, contact 800 553-6387, 408 526-7208, or cs-rep@cisco.com.

Documentation CD-ROM

Cisco documentation and additional literature are available in a CD-ROM package, which ships with your product. The Documentation CD-ROM, a member of the Cisco Connection Family, is updated monthly. Therefore, it might be more current than printed documentation. To order additional copies of the Documentation CD-ROM, contact your local sales representative or call customer service. The CD-ROM package is available as a single package or as an annual subscription. You can also access Cisco documentation on the World Wide Web at http://www.cisco.com, http://www-china.cisco.com, or http://www-europe.cisco.com.

If you are reading Cisco product documentation on the World Wide Web, you can submit comments electronically. Click Feedback in the toolbar and select Documentation. After you complete the form, click Submit to send it to Cisco. We appreciate your comments.



hometocprevnextglossaryfeedbacksearchhelp
Posted: Thu Aug 5 20:26:48 PDT 1999
Copyright 1989-1999©Cisco Systems Inc.