cc/td/doc/product/iaabu/pix
hometocprevnextglossaryfeedbacksearchhelp
PDF

Table of Contents

Release Notes for Cisco Secure
PIX Firewall Version 5.0(2)

Release Notes for Cisco Secure
PIX Firewall Version 5.0(2)

November 24, 1999

The Cisco Secure PIX Firewall provides secure networking and network address translation.

Contents

This document contains the following sections:

System Requirements

Version 5.0 requires at least 2 MB of Flash memory and at least 32 MB of RAM memory, although it will boot in 16 MB of RAM and work with a small configuration. The maximum configuration size is 350 KB for all PIX Firewall models. Use the show version command to verify how much memory is in your Flash memory and RAM. Installation instructions for replacing Flash or RAM memory are described in the Installation Guide for the Cisco Secure PIX Firewall Version 5.0.


Note You must have a new activation key before you can use any of the IPSec features or commands. You can have a new activation key sent to you by completing the form at the following site:
http://www.cisco.com/kobayashi/sw-center/internet/pix-56bit.shtml

New and Changed Information

Version 5.0(2) consists of bug fixes and new features. No commands were removed. This document describes only changes that occurred in version 5.0(2). For information on 5.0(1) features, installation notes, limitations and restrictions, usage notes, and caveats, refer to the 5.0(1) release notes at the following site:

http://www.cisco.com/univercd/cc/td/doc/product/iaabu/pix/pix_v50/pixrn501.htm

Unless noted otherwise, all information in the version 5.0(1) release notes apply to version 5.0(2).

New Commands

The sysopt ipsec pl-compatible command is new in version 5.0(2). This command provides Private Link compatibility to the IPSec feature. When this command is in use, foreign PIX Firewall users can access the current PIX Firewall over a virtual private network (VPN) link.


Note Use of this command requires you to add a static route command statement for every host on every internal interface that needs access through the PIX Firewall for non-IPSec traffic. Without these static route command statements, adding the sysopt ipsec pl-compatible command to your configuration will stop all non-IPSec traffic through the PIX Firewall unit. This restriction will be fixed in the next major release.

The Private Link compatibility feature simulates the version 4 Private Link feature by allowing incoming packets to terminate on the inside interface and to bypass NAT processing.

To allow an inside host to access the Internet using clear text or an encrypted tunnel, the PIX Firewall determines if a packet is destined for a tunnel or not. To make this determination, PIX Firewall routes a packet to the outside destination interface where the crypto map of tunnels are bound. Because the PIX Firewall bypasses NAT processing, it cannot use the NAT xlate (translation) table and requires that you enter static route command statements for all subnets of all interfaces that use the intra-PIX Firewall routing.

With version 4 Private Link, PIX Firewall required you to enumerate all subnets of all interfaces using the route command; however, Private Link did not require static route command statements for subnets defined in the global pool or with static command statements because they were created automatically and stored in the xlate table.

Although the PIX Firewall currently can simulate the Private Link inside termination with the use of the sysopt ipsec pl-compatible command, the termination on the inside interface is not a true termination. The use of the sysopt ipsec pl-compatible command allows IPSec packets to bypass the NAT and ASA features, and enables incoming IPSec packets to terminate on the inside interface only after initially terminating on the outside interface.

Changes to Existing Commands

    1. The show version command output now includes the activation key after the serial number at the end of the display.

    2. The prompt string in the auth-prompt command can be a maximum of 177 characters in this release instead of 256.

Installation Notes

No new installation notes were added in version 5.0(2).

Limitations and Restrictions

The following limitations and restrictions were added in version 5.0(2):

    1. The sysopt ipsec pl-compatible command stops all non-IPSec traffic unless you add static route command statements for every host on every internal interface wanting to start connections to a lower security interface.

    2. The clear access-list command stops all PIX Firewall traffic.

Important Notes

The following usage notes apply to version 5.0(2):

clear access-list Command

The clear access-list command stops all traffic through the PIX Firewall.

Failover

Version 5.0 supports Token Ring interfaces with a high speed Ethernet Stateful Failover interface connection. Version 5.0 also supports FDDI interfaces with non-Stateful Failover.

IPSec

    1. PIX Firewall only supports the Entrust and VeriSign certification authority (CA) servers. Support for other servers will be provided in the next major release. PIX Firewall only supports Entrust version 4.0. VeriSign support is provided through the VeriSign Private Certificate Services (PCS) and the OnSite service that lets you establish a CA system for issuing digital certificates.

    2. When you use mode config on the PIX Firewall, the routers handling the IPSec traffic must also support mode config.

    3. The second note in the Limitations and Restrictions section of the Release Notes for the Cisco Secure PIX Firewall Version 5.0(1) that stated "A PIX Firewall providing IPSec termination to Cisco Secure VPN Clients may not at the same time provide IPSec peer termination with another gateway device, such as another PIX Firewall or Cisco route" is no longer correct.

PFSS

PFSS (PIX Firewall Syslog Server) version 4.4(2) is now available for use with PIX Firewall version 5.0(1) and version 5.0(2). If you have a CCO login, you can download the pfss442.exe file at this site:

http://www.cisco.com/cgi-bin/tablebuild.pl/pix

TFTP

If you have an existing PIX Firewall configuration on a TFTP server and store a shorter configuration with the same file name on the TFTP server, some TFTP servers will leave some of the original configuration after the first ":end" mark. This does not affect the PIX Firewall because the configure net command stops reading when it reaches the first ":end" mark. However, this may cause confusion if you view the configuration and see extra text at the end of the configuration. This does not occur if you are using Cisco TFTP Server version 1.1 for Windows NT.

Caveats

Open Caveats

There are no new open caveats in version 5.0(2).

Resolved Caveats - Version 5.0(2)

Table 1 lists the resolved caveats fixed in version 5.0(2):


Table 1: Resolved Caveats
DDTS Number Description

CSCdp17059

Using the snmp-server enable traps command without first specifying an SNMP server no longer causes the PIX Firewall to reboot.

CSCdp15156

PIX Firewall units equipped with FDDI interfaces can now load an image from diskette.

CSCdp12048

IPSec now properly uses an access-list command statement bound to a dynamic crypto map command statement to detect IPSec spoof packets when a tunnel has not been instantiated.

CSCdp11592

The activation key can now be viewed with the show version command.

CSCdp03116

PIX Firewall no longer crashes when doing IPSec with another PIX Firewall unit that has Mode Config enabled.

CSCdp07532

Incomplete isakmp command statements no longer cause the PIX Firewall to crash. This problem occurred when the no isa client config address and the isa client config address local command statements were entered.

CSCdp06949

The PL1 (ISA-bus Private Link) card is no longer supported or acknowledged by PIX Firewall.

CSCdp06355

The filter url except command now works correctly.

CSCdp05339

The show tech-support (show interface) command with PAT via FTP or Telnet no longer causes a watchdog timer failure during very high traffic.

CSCdp02820

The "crypto map incomplete. No peer or access-list specified." message no longer appears when a dynamic crypto map command is configured correctly and the debug command is enabled.

CSCdp02625

An IPSec timer handler no longer causes a crash while running an IKE stress test with more than 1000 tunnels.

CSCdm95358

The no ca enroll command now fully cancels requests. Previously, if you cancelled a CA request and then enrolled again with the same server, information from the cancelled request was reused.

CSCdm87570

If many IPSec tunnels are configured between two peers and perfect forward secrecy (PFS) is not enabled, IKE negotiations with that peer no longer hang if a burst of many tunnel establishment and/or rekey requests are simultaneously sent.

CSCdm13489

Having more than six interfaces in the PIX Firewall no longer causes an assertion error. Now a warning message appears and any interfaces found beyond six are ignored.

Related Documentation

Use this document in conjunction with the PIX Firewall documentation at the following site:

http://www.cisco.com/univercd/cc/td/doc/product/iaabu/pix/index.htm

Cisco provides PIX Firewall technical tips at the following site:

http://www.cisco.com/warp/public/110/index.shtml#pix

Cisco Connection Online

Cisco Connection Online (CCO) is Cisco Systems' primary, real-time support channel. Maintenance customers and partners can self-register on CCO to obtain additional information and services.

Available 24 hours a day, 7 days a week, CCO provides a wealth of standard and value-added services to Cisco's customers and business partners. CCO services include product information, product documentation, software updates, release notes, technical tips, the Bug Navigator, configuration notes, brochures, descriptions of service offerings, and download access to public and authorized files.

CCO serves a wide variety of users through two interfaces that are updated and enhanced simultaneously: a character-based version and a multimedia version that resides on the World Wide Web (WWW).

The character-based CCO supports Zmodem, Kermit, Xmodem, FTP, and Internet e-mail, and it is excellent for quick access to information over lower bandwidths. The WWW version of CCO provides richly formatted documents with photographs, figures, graphics, and video, as well as hyperlinks to related information.

You can access CCO in the following ways:

For a copy of CCO's Frequently Asked Questions (FAQ), contact cco-help@cisco.com. For additional information, contact cco-team@cisco.com.


Note If you are a network administrator and need personal technical assistance with a Cisco product that is under warranty or covered by a maintenance contract, contact Cisco's Technical Assistance Center (TAC) at 800 553-2447, 408 526-7209, or tac@cisco.com. To obtain general information about Cisco Systems, Cisco products, or upgrades, contact 800 553-6387, 408 526-7208, or cs-rep@cisco.com.

Documentation CD-ROM

Cisco documentation and additional literature are available in a CD-ROM package, which ships with your product. The Documentation CD-ROM, a member of the Cisco Connection Family, is updated monthly. Therefore, it might be more current than printed documentation. To order additional copies of the Documentation CD-ROM, contact your local sales representative or call customer service. The CD-ROM package is available as a single package or as an annual subscription. You can also access Cisco documentation on the World Wide Web at http://www.cisco.com, http://www-china.cisco.com, or http://www-europe.cisco.com.

If you are reading Cisco product documentation on the World Wide Web, you can submit comments electronically. Click Feedback in the toolbar and select Documentation. After you complete the form, click Submit to send it to Cisco. We appreciate your comments.



hometocprevnextglossaryfeedbacksearchhelp
Posted: Sat Dec 11 20:34:57 PST 1999
Copyright 1989-1999©Cisco Systems Inc.