Cisco Systems ASA 5580 Network Router User Manual


  Open as PDF
of 2086
 
1-15
Cisco ASA 5500 Series Configuration Guide using ASDM
Chapter 1 Introduction to the Cisco ASA 5500 Series
New Features
Support for Dual SSPs for
SSP-40 and SSP-60
For SSP-40 and SSP-60, you can use two SSPs of the same level in the same chassis.
Mixed-level SSPs are not supported (for example, an SSP-40 with an SSP-60 is not supported).
Each SSP acts as an independent device, with separate configurations and management. You
can use the two SSPs as a failover pair if desired.
Note When using two SSPs in the chassis, VPN is not supported; note, however, that VPN
has not been disabled.
Support for the IPS SSP-10,
-20, -40, and -60
We introduced support for the IPS SSP-10, -20, -40, and -60 for the ASA 5585-X. You can only
install the IPS SSP with a matching-level SSP; for example, SSP-10 and IPS SSP-10.
Also available in Version 8.2(5).
CSC SSM Features
CSC SSM Support For the CSC SSM, support for the following features has been added:
HTTPS traffic redirection: URL filtering and WRS queries for incoming HTTPS
connections.
Configuring global approved whitelists for incoming and outgoing SMTP and POP3
e-mail.
E-mail notification for product license renewals.
Monitoring Features
Smart Call-Home
Anonymous Reporting
Customers can now help to improve the ASA platform by enabling Anonymous Reporting,
which allows Cisco to securely receive minimal error and health information from the device.
Also available in Version 8.2(5).
IF-MIB ifAlias OID support The ASA now supports the ifAlias OID. When you browse the IF-MIB, the ifAlias OID will
be set to the value that has been set for the interface description.
Also available in Version 8.2(5).
Interface Features
Support for Pause Frames
for Flow Control on
1-Gigabit Ethernet Interface
You can now enable pause (XOFF) frames for flow control on 1-Gigabit Ethernet interfaces;
support was previously added for 10-Gigabit Ethernet interfaces in 8.2(2).
Also available in Version 8.2(5).
Management Features
Increased SSH security; the
SSH default username is no
longer supported
Starting in 8.4(2), you can no longer connect to the ASA using SSH with the pix or asa
username and the login password. To use SSH, you must configure AAA authentication using
the aaa authentication ssh console LOCAL command (CLI) or Configuration > Device
Management > Users/AAA > AAA Access > Authentication (ASDM); then define a local user
by entering the username command (CLI) or choosing Configuration > Device Management
> Users/AAA > User Accounts (ASDM). If you want to use a AAA server for authentication
instead of the local database, we recommend also configuring local authentication as a backup
method.
Unified Communications Features
Table 1-5 New Features for ASA Version 8.4(2)/ASDM Version 6.4(5) (continued)
Feature Description