cc/td/doc/product/iaabu/pix
hometocprevnextglossaryfeedbacksearchhelp
PDF

Table of Contents

Release Notes for the Cisco Secure
PIX Firewall Version 5.0(1)

Release Notes for the Cisco Secure
PIX Firewall Version 5.0(1)

December 1999

The Cisco Secure PIX Firewall provides secure networking.

Contents

These release notes contains the following sections:

System Requirements

Version 5.0 requires at least 2 MB of Flash memory and at least 32 MB of RAM memory, although it will boot in 16 MB of RAM and work with a small configuration. The maximum configuration size is 350 KB for all PIX Firewall models. Use the show version command to verify how much memory is in your Flash memory and RAM. Installation instructions for replacing Flash or RAM memory are described in the Installation Guide for the Cisco Secure PIX Firewall Version 5.0.


Note You must have a new activation key before you can use any of the IPSec features or commands. You can have a new activation key sent to you by completing the form at:
http://www.cisco.com/kobayashi/sw-center/internet/pix-56bit.shtml

New and Changed Information

The sections that follow describe each new feature in this release. See "Important Notes" for additional information on new features.


Note See "Downgrades" for important new information on downgrading to version 4.4.

New Features in Release 5.0(1)

The following features are available in version 5.0(1).

AAA

The current AAA accounting feature now logs all Internet traffic. Previously, it only logged Telnet, HTTP, and FTP traffic. AAA authorization now handles all well-known protocols such as NNTP and ICQ, as well as any other traffic that can be specified by a UDP or TCP port number or an IP protocol number.

AAA now logs AAA authenticated usernames on FTP stored and retrieved syslog messages for FTP puts and gets.

Cisco IOS Access Control Lists

Access lists can now be specified in support of the IPSec feature. In addition, in conjunction with the access-group command, the access-list command can replace the outbound command or conduit command.


Note At this time, the Configuration Guide for the Cisco Secure PIX Firewall Version 5.0 does not provide either examples or information for converting conduit or outbound command statements to access-list or access-group commands. This information will be provided in a future documentation release.

H.323 RAS Support

PIX Firewall now supports H.323 version 1 with RAS (Registration, Admission, and Status) version 1. This feature handles the increased popularity of multimedia applications such as video conferencing and Voice over IP that require video and audio encoding. These applications use a high number of dynamically negotiated data and control channels to handle the various visual and auditory streams. A RAS channel carries bandwidth change, registration, admission, and status messages (following the recommendations in H.225.0) between endpoints and gatekeepers. A gatekeeper is an H.323 entity on the network that provides H.323 terminals.

The support for this service provides channel cut-through, which includes a RAS channel used for the discovery of gatekeepers and endpoint registration. RAS messages are encoded using ASN.1 PER encoding rules. The default ports are 1718 and 1719; port 1718 is the well-known gatekeeper UDP discovery port, and port 1719 is the well-known gatekeeper UDP registration and status port.

In conjunction with the RAS support, PIX Firewall now supports Cisco Multimedia Conference Manager (MCM), a video conferencing product.

IPSec

The IPSec (IP Security) feature is based on the Cisco IOS IPSec implementation and provides seamless functionality with those IPSec-compliant products that already work with Cisco IOS IPSec, such as the Cisco Secure VPN Client.

IPSec provides a mechanism for secure data transmission. IPSec ensures confidentiality, integrity, and authenticity of data communications across a public IP network.

The PIX Firewall IPSec feature uses the existing Private Link circuit board.

This feature replaces the previous Private Link capability and contains the new access-list, ca, crypto, ipsec, isakmp, and map commands.

The PIX Firewall IPSec implementation supports both data transmission through the PIX Firewall for establishing a VPN security gateway and termination at the PIX Firewall for remote management of a security client.

PIX Firewall Manager Access

PIX Firewall Manager version 4.3(2)c now works with PIX Firewall version 5.0, but does not support any new feature or command from either version 4.4 or version 5.0. You can use this interface for managing syslog messages and configuring many of the PIX Firewall features. Refer to the Release Notes for the PIX Firewall Manager Version 4.3(2)c for more information. You can view this document online at:

http://www.cisco.com/univercd/cc/td/doc/product/iaabu/pix/pix_v50/pfm432c.htm

PIX Firewall Setup Wizard

A new version of the PIX Firewall Setup Wizard is available that works with PIX Firewall version 5.0. The Setup Wizard lets you simplify the PIX Firewall installation. Refer to the Chapter 9, "Installing the PIX Firewall Setup Wizard," in the Installation Guide for the Cisco Secure PIX Firewall Version 5.0 for more information. This product is available on CCO for download in the PIX Firewall directory. The installation filename is psw501.exe. You can view the installation guide online at:

http://www.cisco.com/univercd/cc/td/doc/product/iaabu/pix/pix_v50/instlgd/index.htm

Product Name Change

PIX Firewall has been renamed as the Cisco Secure PIX Firewall. The name change is being gradually incorporated into the product and while the software and book titles have changed, you will need to access software on CCO using the older spelling. By the next release, the name change will be completed throughout the network.

Remote Management from the Outside Interface

With IPSec configured, you can now remotely manage a PIX Firewall from the outside interface with Telnet access to the console.

Stateful Failover

The Stateful Failover feature provides a mechanism for hardware and software redundancy by allowing two identical PIX Firewall units to serve the same functionality in case one fails in an unattended environment. Normally, one PIX Firewall is considered the Active unit while the other is the Standby unit. The Active unit actively performs normal network functions while the Standby unit only monitors, ready to take control should the Active unit fail.

The Stateful Failover feature has been enhanced so that the stateful connection information is passed on to the Standby unit during a failover. Previously, the existing connections would be lost after a switchover because stateful connection information was not passed on to the Standby unit.

As a result, client applications had to perform a new connect to restart communication. Currently, during a failover, the Active unit passes all stateful connection information to the Standby unit, thereby continuing a connection with the client application.

The Stateful Failover feature uses the new failover link command to specify a LAN link for passing state information.

Voice over IP Support

PIX Firewall now supports Voice over IP in its H.323 RAS feature; however, Cisco CallManager, also known as the "skinny protocol," is not supported.

New Commands

The following commands are new in version 5.0:

Changes to Existing Commands

The following new options were added to existing commands:

Removed Commands

The age, link, and linkpath commands have been removed. VPN support is now handled with the IPSec feature.

Installation Notes

The following notes contain valuable installation information:

    1. Refer to the Installation Guide for the Cisco Secure PIX Firewall Version 5.0 for installation information.

    2. The ISA slot Private Link card, also known as the PL1 card, is no longer supported by the PIX Firewall. Refer to the Installation Guide for the Cisco Secure PIX Firewall Version 5.0 for information about how to remove this card.

New Installations

For new installations, each network interface is disabled. Each interface you intend to use must be explicitly enabled. In a new installation if you use the write terminal command to locate the interface command statements, each interface appears with the shutdown command as shown in this example for a unit with two Ethernet interfaces:

interface ethernet0 auto shutdown
interface ethernet1 auto shutdown
 

To enable access to these interfaces, enter the interface commands in your configuration as follows:

interface ethernet0 auto
interface ethernet1 auto

Upgrades

Before upgrading, write down your activation key and save a copy of your configuration.

Downgrades

    1. The clear flashfs command must be used before downgrading a PIX Firewall from version 5 back to any version 4 release. Neglecting this step may cause Flash memory problems during a subsequent upgrade to a version 5 release, even if you make the upgrade months in the future.


Note The previous edition of these release notes specified that you should use the write erase command to fix Flash memory. Do not use this command. Instead, just use the clear flashfs and reload commands.

    2. The datafile area, used to store the PKI data in version 5.0, has no parallel in version 4 and will be lost during downgrades to version 4.

    3. If you downgrade from version 5.0 to a version 4 release, the activation key used in version 5.0 will not work in version 4. Before upgrading from a version 4 release, write down your activation key and save a copy of your configuration. In any downgrade, commands unique to version 5.0 will be lost in the earlier version.

Limitations and Restrictions

The following limitations and restrictions are present in this release:

    1. You must have a new activation key before you can use any of the IPSec features or commands. You can have a new activation key sent to you by completing the form at:

    2. A PIX Firewall providing IPSec termination to Cisco Secure VPN Clients may not at the same time provide IPSec peer termination with another gateway device, such as another PIX Firewall or Cisco router.

    3. DNAT IP addresses are not supported with IPSec in version 5.0(1). (DNAT IP addresses are created with the alias command.)

    4. The maximum configuration size in this release is 350 KB.

Important Notes

Read the following notes for additional information on this version. Notes listed here may be fixed before the Configuration Guide for the Cisco Secure PIX Firewall Version 5.0 is reprinted next.

clear configure Command

The clear config secondary command does not clear TFTP entries. The documentation for previous versions of PIX Firewall incorrectly indicated that this command would clear TFTP entries.

Commands with Parentheses

If the right parentheses is accidentally omitted when entering the interface option in the aaa-server, alias, apply, global, nat, static, or url-server commands, the following message appears:

invalid global IP address
 

You will need to reenter the command correctly until the error message no longer appears. This takes from 5 to 10 times to correct itself.

Domain Names and Host Names

The change of a domain or host name causes the change of the fully qualified domain name. Once the fully qualified domain name is changed, delete the RSA key pairs with the ca zeroize rsa command and delete related certificates with the no ca identity ca_nickname command.

Failover

    1. On PIX10000 and older PIX Firewall units using version 5.0 when failover is disabled, the following messages may appear during startup and can be ignored:

**** WARNING ***
         Configuration Replication is NOT performed from Standby unit to Active unit.
         Configurations are no longer synchronized.
 

    2. Stateful Failover does not save state for HTTP Web connections. These connections can re-establish themselves quickly on their own. In addition, RIP state information is not stored, but is re-established within 30 seconds.

    3. The Stateful Failover dedicated interface needs to be one of the following:

    4. Because of the increased speed requirements, use of Stateful Failover on Token Ring interfaces or on LANs using VPN is not supported.

    5. The PIX Firewall failover Standby unit is intended to be used solely for failover and not in standalone mode. If a failover unit is used in standalone mode, the unit will reboot at least once every 24 hours until the unit is returned to failover duty. When the unit reboots, the following message displays at the console:

=========================NOTICE ==========================
    This machine is running in secondary mode without
     a connection to an active primary PIX. Please
      check your connection to the primary system.
 
               REBOOTING....
==========================================================
 

    6. If a failover-only PIX Firewall is not attached to a failover cable or is attached to the Primary end of a failover cable, then it will hang at boot time. It must be a Secondary unit.

    7. Because the PIX Firewall clock is stored in the CMOS, you need do to specify the clock set time command on the Active PIX Firewall to synchronize the time on both PIX Firewall units.

    8. In the event of a failover, information on idle TCP connections is not always sent to the Standby unit when using Stateful Failover. This can cause idle TCP connections to be dropped. The information is sent correctly approximately 66% of the time, but approximately 34% of the time it is not.

FDDI

FDDI interfaces cannot be shut down using the shutdown option to the interface command.

Interfaces

In version 5.0, interfaces are shut down by default and must be explicitly enabled by reentering the interface command for each interface you want to operate.

IPSec

The following sections provide important information about using IPSec with the PIX Firewall.

CA Servers

PIX Firewall only supports the Entrust and VeriSign certification authority (CA) servers. Support for other servers will be provided in the next major release. PIX Firewall only supports Entrust version 4.0. VeriSign support is provided through the VeriSign Private Certificate Services (PCS) and the OnSite service, which lets you establish a CA system for issuing digital certificates.

Clock Dependency

IPSec depends on the PIX Firewall clock being set (using the clock command). The PKI (public key infrastructure) feature uses the clock to check that the CRL (certificate revocation list) has not expired.

Debugging IPSec

    1. In version 5.0, PIX Firewall provides new debug commands (described in "New Commands"). We recommend you start these commands before creating IPSec command statements.

    2. Output from the debug crypto ipsec and debug crypto isakmp commands does not display in a Telnet console session.

    3. If creating certificates with Entrust, use the debug crypto ca command to ensure that the certificate is created correctly. Important error messages only display when the debug command is enabled. If you enter the fingerprint value incorrectly, the only warning message that the value is not correct appears in the debug crypto ca command output.

    4. Output of the show ipsec sa command lists the PCP protocol. This is a compression protocol that came with the Cisco IOS code on which the PIX Firewall IPSec implementation is based; however, PIX Firewall does not support the PCP protocol.

Entrust

    1. If you use the Entrust CA, PIX Firewall supports the newest VPN Connector version 4.1 (build 4.1.0.337).

    2. If creating certificates with Entrust, use the debug crypto ca command to ensure that the certificate is created correctly. Important error messages only display when the debug command is enabled. If you enter the fingerprint value incorrectly, the only warning message that the value is not correct appears in the debug crypto ca command output.

IPSec sysopt Commands

    1. PIX Firewall sets the sysopt connection tcpmss 1380 value by default even though this command does not appear in the default configuration. The calculation for setting the TCP maximum segment size to 1380 bytes is as follows:

1380 data + 20 TCP + 20 IP + 24 AH + 24 ESP_CIPHER + 12 ESP_AUTH + 20 IP = 1500 bytes
 

    2. Use the sysopt connection permit-ipsec command in IPSec configurations to permit IPSec traffic to pass through the PIX Firewall without a conduit check. If the sysopt connection permit-ipsec command is not configured, you must explicitly configure a conduit command statement to permit IPSec traffic to traverse the PIX Firewall.

Multiple Tunnels to a Single Peer

IKE negotiations with a remote peer may hang when a PIX Firewall has numerous tunnels that originate from the PIX Firewall and terminate on a single remote peer. This problem occurs when perfect forward secrecy (PFS) is not enabled and the local peer requests many simultaneous rekey requests. If this problem occurs, the IKE SA will not recover until it has timed out or until you manually clear it with the clear isakmp sa command. PIX Firewall units configured with many tunnels to many peers or many clients sharing the same tunnel are not affected by this problem. If your configuration is affected, enable PFS with the crypto map mapname seqnum set pfs command.

Private Link Card Issues

    1. If you do not have a DES or Triple DES activation key, an ISA Private Link card no longer causes an export message to appear in the startup messages.

    2. The PCI slot Private Link VPN card is now accessed by IPSec. Use of this card accelerates IPSec processing.

    3. The former ISA slot Private Link cards are no longer supported with version 5.0 software and should be removed.

VeriSign

    1. If you use the VeriSign CA, specify the crloptional option to the ca configure command.

    2. Neither Cisco IOS or PIX Firewall currently works with the VeriSign CRL.VeriSign is reportedly working on a fix for this.

    3. Using the RSA-sig feature with the VeriSign certification authority, PIX Firewall is able to establish a security association with a router, but the security association eventually fails. When the failure occurs, the router displays "Querying key pair failed." The PIX Firewall retransmits the phase 1 authentication indefinitely.

VPN

    1. When VPN is not enabled, the following error message appears when you enter a VPN-related command, such as crypto, ca, isakmp, or any command that may have a hidden association with VPN, such as the clear config command:

VPN-DES is not enabled with current activation key.
 

    2. PIX Firewall negotiates indefinitely when its peer has a revoked IPSec certificate.

RAS Support

PIX Firewall does not support multicast RAS messages in this release.

Setup Wizard

PIX Firewall Setup Wizard version 5.0(1) does not support the new failover link option that enables Stateful Failover. You can set this command manually from the PIX Firewall command line interface.

SNMP

The MIB-II ifEntry.ifAdminStatus object returns 1 if the interface is accessible and 2 if you administratively shut down the interface using the shutdown option to the interface command.

Software

If you have access to CCO, you can obtain the latest version of the PIX Firewall software online at:

http://www.cisco.com/pcgi-bin/tablebuild.pl/pix

Syslog

When DNS traffic is logged, the ID field in the DNS response packet appears in the source port field.

Telnet

If you do not specify an interface name, the telnet command adds command statements to the configuration to let the host or network access the Telnet console from all internal interfaces, but not the outside interface. When you use the show telnet command, this assumption may not seem to make sense. For example, if you enter the telnet command without a network mask or interface name:

telnet 192.168.1.1
 

If you then use the show telnet command, PIX Firewall inserts a command statement for each internal interface:

show telnet
192.168.1.1 255.255.255.255 inside
192.168.1.1 255.255.255.255 intf2
192.168.1.1 255.255.255.255 intf3
 

The purpose of the show telnet command is that, were it possible, the 192.168.1.1 host could access the Telnet console from any of these internal interfaces. In addition, to remove access to the host, you must delete each associated command statement as shown in the following example:

no telnet 192.168.1.1 255.255.255.255 inside
no telnet 192.168.1.1 255.255.255.255 intf2
no telnet 192.168.1.1 255.255.255.255 intf3

TFTP Server

The PIX 515 requires that you download images from a TFTP server, which you can download for free from Cisco at:

http://www.cisco.com/cgi-bin/tablebuild.pl/tftp

Caveats

Open Caveats

Table 1 lists the open caveats in version 5.0(1):


Table 1: Open Caveats
DDTS Number Description

CSCdp03116

A PIX Firewall providing IPSec termination to Cisco Secure VPN Clients may not at the same time provide IPSec peer termination with another gateway device, such as another PIX Firewall or Cisco router.

CSCdp02637

Under heavy traffic over a number of hours of operating, displaying ISAKMP security associations can cause the PIX Firewall to reboot.

CSCdp02616

A typographical error accidentally entered on a command line can cause a spurious error message even after the command is reentered correctly. If you reenter the correct command a second time, the command is then accepted.

CSCdm95406

The ca conf command has a parameter to specify the number of enrollment attempts the PIX Firewall should make. The default value of zero indicates that the PIX Firewall should continue trying to enroll until it gets a response from the certification authority (CA). This setting is appropriate to most environments. However, if you configure this command for a specific number of enrollment attempts, and the PIX Firewall does not get a response from the CA within that specified limit, then before any subsequent enrollment attempts, use the no ca conf command followed by the original ca conf command to clear the retry counter.

CSCdm94541

Entering an Entrust fingerprint incorrectly creates an unusable certificate. The error message that indicates an error occurred only appears in the output of the debug crypto ca command, not as a regular error message on the console. For this reason, always use the debug crypto ca command before creating a certificate.

CSCdm92876

In the event of a failover, idle TCP connection information is not always sent to the Standby unit when using Stateful Failover, which can cause the idle TCP connection to be dropped. The information is sent correctly approximately 66% of the time, but approximately 34% of the time it is not.

CSCdm69004

PIX Firewall negotiates indefinitely when its peer has a revoked IPSec certificate.

CSCdm64261

Using the RSA-sig feature with the VeriSign certification authority, PIX Firewall is able to establish a security association with a router, but the security association eventually fails. When the failure occurs, the router displays "Querying key pair failed." The PIX Firewall retransmits the phase 1 authentication indefinitely.

Resolved Caveats - Version 5.0(1)

Table 2 lists the externally found caveats fixed in version 5.0(1):


Table 2: Resolved Caveats
DDTS Number Description

CSCdm66305

PIX Firewall now displays an error if you enter static command statements in which the IP address range overlaps. Previously, you could enter command statements such as the following:

static (inside,outside) 209.165.201.1 192.168.1.1 
static (inside,outside) 209.165.201.0 192.168.1.1

This caused two global IP addresses to be assigned to the same local address.

CSCdm66259

Syslog IP address options now list the correct values.

CSCdm61027

Token Ring MTU (maximum transmission unit) code no longer has a 16-byte miscalculation. Formerly, if you set the MTU of the Token Ring interface to be the same size as the Ethernet in a mixed environment, packet loss then occurs on the Token Ring.

CSCdm55622

PIX Failover no longer assigns an incorrect MAC address before the configuration is stored after failover. Formerly, when failover occurs, the secondary PIX Firewall became active before the reconfiguration of the NIC of the failover unit is complete.

CSCdm55298

PIX Firewall now allows TFTP to be done on interfaces other than the inside. An interface argument has been added to the tftp-server command.

CSCdm50692

If another task is using the Flash memory device, such as when two administrators accessing the console from Telnet both issue the show config command, the following message now displays:

 The flash device is in use by another task.

CSCdm45429

The teardown syslog messages now state who sent the TCP Reset message. More information has been added to syslog messages in the PIX Firewall.

CSCdm44424

PIX Firewall fails with an assertion error if the unit only has 8 MB of RAM. 16 MB of RAM is required to run versions 4.4 and 5.0 and later.

CSCdm06714

PIX Firewall now supports Voice over IP in its H.323 feature.

CSCdk89540

The PIX Firewall command line parser now checks for overlapping static command statement addresses.

CSCdk59856

PIX Firewall now supports Cisco Multimedia Conference Manager (MCM), a video conferencing product, which is described in the section, "H.323 RAS Support."

CSCdk50579

The new sysopt nodnsalias inbound command disconnects DNS A record fixups from interaction with the alias command. Formerly, when a DNS server was on a perimeter interface, use of the alias command required reversing the two argument IP addresses for the command to work correctly. This new command applies this fix to all inbound DNS A record fixups.

CSCdk10767

PIX Firewall now supports the access-list and access-group commands that operate the same as those in Cisco IOS.

CSCdj17840

SNMP traps can now be passed through the PIX Firewall in a connection.

Related Documentation

Use this document in conjunction with the PIX Firewall documentation available online at:

http://www.cisco.com/univercd/cc/td/doc/product/iaabu/pix/index.htm

Cisco provides PIX Firewall technical tips at:

http://www.cisco.com/warp/public/110/index.shtml#pix

Cisco Connection Online

Cisco Connection Online (CCO) is Cisco Systems' primary, real-time support channel. Maintenance customers and partners can self-register on CCO to obtain additional information and services.

Available 24 hours a day, 7 days a week, CCO provides a wealth of standard and value-added services to Cisco's customers and business partners. CCO services include product information, product documentation, software updates, release notes, technical tips, the Bug Navigator, configuration notes, brochures, descriptions of service offerings, and download access to public and authorized files.

CCO serves a wide variety of users through two interfaces that are updated and enhanced simultaneously: a character-based version and a multimedia version that resides on the World Wide Web (WWW). The character-based CCO supports Zmodem, Kermit, Xmodem, FTP, and Internet e-mail, and it is excellent for quick access to information over lower bandwidths. The WWW version of CCO provides richly formatted documents with photographs, figures, graphics, and video, as well as hyperlinks to related information.

You can access CCO in the following ways:

For a copy of CCO's Frequently Asked Questions (FAQ), contact cco-help@cisco.com. For additional information, contact cco-team@cisco.com.


Note If you are a network administrator and need personal technical assistance with a Cisco product that is under warranty or covered by a maintenance contract, contact Cisco's Technical Assistance Center (TAC) at 800 553-2447, 408 526-7209, or tac@cisco.com. To obtain general information about Cisco Systems, Cisco products, or upgrades, contact 800 553-6387, 408 526-7208, or cs-rep@cisco.com.

Documentation CD-ROM

Cisco documentation and additional literature are available in a CD-ROM package, which ships with your product. The Documentation CD-ROM, a member of the Cisco Connection Family, is updated monthly. Therefore, it might be more current than printed documentation. To order additional copies of the Documentation CD-ROM, contact your local sales representative or call customer service. The CD-ROM package is available as a single package or as an annual subscription. You can also access Cisco documentation on the World Wide Web at http://www.cisco.com, http://www-china.cisco.com, or http://www-europe.cisco.com.

If you are reading Cisco product documentation on the World Wide Web, you can submit comments electronically. Click Feedback in the toolbar and select Documentation. After you complete the form, click Submit to send it to Cisco. We appreciate your comments.



hometocprevnextglossaryfeedbacksearchhelp
Posted: Wed Jan 5 16:26:10 PST 2000
Copyright 2000©Cisco Systems Inc.