Release Notes for Version 4.2.0b15 Cisco 11000 Series Secure Content Accelerator: SCA/SCA2 CCO Date 06/27/2003 Note The most current Cisco documentation for released products is available at http://www.cisco.com. The online documents may contain updates and modifications made after the hardcopy documents were printed. Contents This release note applies to the Cisco 11000 Series Secure Content Accelerator, SCA and SCA2 versions. The note supplements information found in the Cisco 11000 Series Secure Content Accelerator Configuration Guide distributed with firmware version 4.2.0b15. The SCA2 offers significantly higher performance than the other SCA device. This release note contains the following sections: • System Requirements • New and Changed Information • Operational Notes • Caveats • FIPS Mode Changes • Firmware Version 4.2.0b15 Command Changes • Documentation Updates • Obtaining Documentation • Obtaining Technical Assistance • Obtaining Additional Publications and Information Corporate Headquarters: Cisco Systems, Inc., 170 West Tasman Drive, San Jose, CA 95134-1706 USA Copyright © 2003 Cisco Systems, Inc. All rights reserved. System Requirements System Requirements Hardware Supported This release note applies to the Cisco 11000 Series Secure Content Accelerator, SCA and SCA2 versions. The Web management GUI requires a minimum display resolution of SVGA (800x600 resolution). For best results, use XGA (1024x768 resolution). Software Compatibility The Web management GUI requires Microsoft® Internet Explorer version 5.x or later, or Netscape® Navigator 4.77 or later or 6.x or later. Determining the Current Firmware Version Use the appropriate method listed below to determine the currently installed firmware version. If the text “4.1” is returned, refer to section “Upgrading to a New Firmware Release” for upgrade instructions. Serial Console CLI Instructions 1. Connect to the Secure Content Accelerator via a serial management session at 9600 baud, N81. 2. Check the firmware version by using the show device command. The returned text should contain “MaxOS 4.1”. Telnet CLI Instructions 1. Connect to the Secure Content Accelerator using the IP address previously assigned to it. 2. Check the firmware version by using the show device command. The returned text should contain “MaxOS 4.1”. 1. Open a Web browser and connect to the Secure Content Accelerator. 2. Click General to activate the General tabs. 3. The Release panel should contain the text“4.1”. GUI Instructions Upgrading to a New Firmware Release This release updates SCA and SCA2 products using firmware 4.1.x and prior versions. Release Notes for Version 4.2.0b15 Cisco 11000 Series Secure Content Accelerator: SCA/SCA2 2 78-14640-05 System Requirements Upgrade Paths Table 1 lists the upgrade paths from previous version of SCA and SCA2 firmware. Table 1 SCA/SCA2 Upgrade Paths to 4.2.0b15 SCA Hardware Version Installed Firmware Version Upgrade to This Version Firmware Image File Name SCA 2.0.x/3.0.5 3.0.6 cisco.phr 3.0.x 3.1.0.x css-sca-2fe-k9.phz 3.0.x/3.1.0.x 3.2.0.x css-sca-2fe-k9.phz 3.1.0.x/3.2.0.x 4.1.0.x css-sca-2fe-k9-3_2-to-4_1.phz 4.1.0.x 4.2.0.x css-sca-2fe-k9.phz 4.0.x 4.1.0.x css-sca2-2fe-k9.phz 4.0.x/4.1.0.x 4.2.0.x css-sca2-2fe-k9.phz SCA2 The recommended upgrade path for the SCA is 2.0.1 to 3.0.6 to 3.1.0 to 4.1 to 4.2. For additional information, see the Release Note accompanying each firmware release. These are available on the Cisco Web site. Note When upgrading an SCA from 3.1 or 3.2 to 4.1 you must use an unsigned image. This is a different firmware image than that used when reflashing a device with 4.1 firmware. The image used for reflashing is a signed image. Serial Console CLI Instructions Note When flashing the SCA, use the file css-sca-2fe-k9.phz. When flashing the SCA2, use the file css-sca2-2fe-k9.phz. 1. Copy the firmware image to an HTTP, FTP, or TFTP server on the same LAN as the Secure Content Accelerator. An FTP URL is preferable. 2. Connect to the Secure Content Accelerator via a serial management session at 9600 baud, N81. 3. Enter these commands to load the firmware image, where protocol is HTTP, FTP, or TFTP; serverip is the IP address of the server; path is the path to the firmware image file; and filename is the appropriate filename as listed in the note above. enable copy to flash protocol://serverip/path/filename reload 4. Wait for several minutes for the device to reload and reboot. 5. Check the firmware version by using the show device command. The returned text should contain “MaxOS 4.2”. 6. Continue with configuration as desired. Release Notes for Version 4.2.0b15 Cisco 11000 Series Secure Content Accelerator: SCA/SCA2 78-14640-05 3 System Requirements Telnet CLI Instructions Note When flashing the SCA, use the file css-sca-2fe-k9.phz. When flashing the SCA2, use the file css-sca2-2fe-k9.phz. 1. Copy the firmware image to an HTTP, FTP, or TFTP server on the same LAN as the Secure Content Accelerator. An FTP URL is preferable. 2. Connect to the Secure Content Accelerator using the IP address previously assigned to it. 3. Enter these commands to load the firmware image, where protocol is HTTP, FTP, or TFTP; serverip is the IP address of the server; path is the path to the firmware image file; and filename is the appropriate filename as listed in the note above. enable copy to flash protocol://serverip/path/filename reload 4. You will see a status message stating the connection to the device was lost. Wait for several minutes for the device to reload and reboot. 5. Reconnect to the device using a telnet management session. 6. Check the firmware version by using the show device command. The returned text should contain “MaxOS 4.2”. 7. Continue with configuration as desired. GUI Instructions Note When flashing the SCA, use the file css-sca-2fe-k9.phz. When flashing the SCA2, use the file css-sca2-2fe-k9.phz.. 1. Open a Web browser and connect to the Secure Content Accelerator. 2. Ensure that the General>Status page is displayed. 3. Click Tools to activate the Tools tabs. 4. Click the Firmware tab. 5. Type the path and firmware image file name or URL in the Upload Firmware text box, or click Browse and navigate to and select the firmware image file from the local file system. 6. Click Upload to load the firmware image into the GUI. 7. Click Install Image next to the file information in the Installable Firmware Images panel. 8. After the new firmware has uploaded, click the Restart tab. 9. Click Reboot to reload the device. Wait several minutes for the device to reboot. 10. Reconnect to the device using the GUI and the IP address assigned to it. 11. Click General to activate the General tabs. 12. The Release panel should contain “4.2”. 13. Continue with configuration as desired. Release Notes for Version 4.2.0b15 Cisco 11000 Series Secure Content Accelerator: SCA/SCA2 4 78-14640-05 New and Changed Information New and Changed Information New Firmware Features in Release 4.2.0b15 Certificate Revocation List (CRL) A URL-based list of revoked certificates checked at user-definable intervals can be used for client authentication. The list at the specified URL is checked at intervals to ensure the list on the device is current. A CRL can be set independently for each normal SSL server. The example below demonstrates how to enable a CRL with an existing server. 1. Open a management session with the device. 2. Enter Privileged, Configuration, SSL, and Server modes. SCA2> enable SCA2# configure <config[SCA2]># ssl <config-ssl[SCA2]># server myServer <config-ssl-server[myServer]># 3. Specify the URL to be used for revocation list comparison. Then enable revocation list comparison. <config-ssl-server[myServer]># crl url “http://www.mycomp.com/crl.txt” <config-ssl-server[myServer]># crl enable <config-ssl-server[myServer]># Make sure that client authentication is configured and enabled. Any certificate revocation-related errors encountered are processed as specified with the clientauth error command. Use the show ssl server command to view CRL configuration information. See the Configuration Guide for examples of client authentication configuration. Additional CRL-related commands are listed in Table 5. URL Rewrite Uses HTTP 1.1 Protocols HTTP 1.1 protocols now are used for URL rewrite procedures. Certificate Expiration Validating Device-loaded certificates can be checked for date validity. This check can be done manually or automatically via SNMP trapping. To display a list of certificates that are expired or not yet valid, enter the following command at the Top Level: SCA2> show ssl cert-expiration-check A variation of the command can be used in SSL Configuration mode, as shown below: <config-ssl[SCA2]># cert-expiration-check To set the SNMP trap, use the following command in Configuration mode: <config[SCA2]># snmp trap-type enterprise ssl-cert-expire Release Notes for Version 4.2.0b15 Cisco 11000 Series Secure Content Accelerator: SCA/SCA2 78-14640-05 5 New and Changed Information Secure Shell (SSH) Management The SCA and SCA2 can be managed via a Secure Shell (SSH) connection. SSH clients must be set to accept “none” as the authentication method. The SSH subsystem has been tested and found functional with the clients listed below. • Cygwin1.3.15/Openssh 3.4p1 (Windows 2000) • Openssh 3.1p1 (Red Hat Linux 7.1) • PuTTY 0.53 (Windows 2000) • SecureCRT4.0 • TeraTerm Pro 3.1.3 (Windows 2000) Version Support Only SSHv2 is supported since SSHv1 is considered an unsecure protocol. If an SSHv1 client attempts to connect to the device, it is disconnected and an error message is displayed. Compression The following compression methods are supported: • None • Zlib Concurrent Users Only a single user connection is supported. If a second user attempts to connect to the device, no connection is allowed and an error message is displayed. Encryption The following encryption methods are supported: • 3DES-CBC • Arcfour • None • DES • 3DES Mac Support The following Mac methods are supported: • hmac-sha1 • hmac-md5 Key Exchange Method The diffie-hellman-group1-sha1 key exchange method is supported. Release Notes for Version 4.2.0b15 Cisco 11000 Series Secure Content Accelerator: SCA/SCA2 6 78-14640-05 New and Changed Information Public Key Algorithm RSA and DSA keys can be imported via the Key Configuration mode. The following public key algorithms are supported: • SSH-DSA • SSH-RSA Authentication Method This product supports the authentication method of “none”. Interactive Sessions The following session types are supported: • Session • pty-req • Shell Using SSH Sessions Follow the steps below to set up SSH management configuration. 1. Open a management session with the device. 2. Enter Privileged and Configuration modes. SCA2> enable SCA2# configure SCA2# 3. Specify the key to use for encryption. The host key can be in DSA or RSA format and is loaded in Key Configuration mode. <config[SCA2]># ssh hostkey rsa myKey <config[SCA2]># Note Although the command completer feature includes default and default-512 keys, neither of these keys can be used. Please see the Configuration Guide for more information about the command completer feature. 4. Enable the SSH subsystem. <config[SCA2]># ssh enable <config[SCA2]># Open an SSH session on the configuring computer, referencing the SCA or SCA2 IP address. Additional SSH-related commands are listed in Table 5. You must configure at least one host key prior to enabling SSH. If you attempt to enable SSH without a host key configured, the device generates the following error message: %%Failed: on SCA2:missing ssh host key If you do not specify a port for SSH, the default port 22 is used. Although the completer for the host key configuration includes entries for “default” and “default-512” keys, neither can be used for SSH communications. Release Notes for Version 4.2.0b15 Cisco 11000 Series Secure Content Accelerator: SCA/SCA2 78-14640-05 7 New and Changed Information Passing Client IP Addresses in the HTTP Header The client IP address can be passed in the HTTP header sent to the hardware server. Client IP address information is also passed when httpheader session is enabled. The format for passed text is “X-Forwarded-For: <Client IP>”. Follow the steps below to configure this feature. 1. Open a management session with the device. 2. Enter Privileged, Configuration, SSL, and Server modes. SCA2> enable SCA2# configure <config[SCA2]># ssl <config-ssl[SCA2]># server myServer <config-ssl-server[myServer]># 3. Specify the client IP address is to be passed in the HTTP header. <config-ssl-server[myServer]># httpheader forwarded <config-ssl-server[myServer]># User-Configured Diagnostics Report List Any combination of diagnostics reports can be executed at one time. In this example, the list of diagnostic reports is removed and two reports are added. After the reports are specified, the diagnostic list is generated. 1. Open a management session with the device. 2. Enter Privileged mode. SCA2> enable SCA2# 3. Remove all reports from the current diagnostic report list. SCA2# no set diag-list all SCA2# 4. Verify that all reports have been removed. SCA2# show diag-list no settings selected SCA2# 5. Add the netstat and processes reports to the list and verify their inclusion. SCA2# set diag-list netstat SCA2# set diag-list processes SCA2# show diag-list settings selected: netstat processes SCA2# 6. Run the customized diagnostic report by entering the show diagnostic-report command. Release Notes for Version 4.2.0b15 Cisco 11000 Series Secure Content Accelerator: SCA/SCA2 8 78-14640-05 New and Changed Information New GUI Features in Release 4.2.0b15 Certificate Revocation List A URL-based list of revoked certificates can be used for client authentication. The list at the specified URL is checked at intervals to ensure the list on the device is current. A CRL can be set independently for each normal SSL server. The example below demonstrates how to enable a CRL with an existing server using Web management. 1. Log into the device using the Web GUI. 2. Click SSL to activate the SSL tabs. 3. Click the Secure Servers tab. 4. Either click Add Secure Server to create a new server or Edit next to an existing server to change the configuration. The Secure Server window opens. 5. Scroll to the bottom of the window to display the Certificate Revocation List - CRL panel as shown in Figure 1. Figure 1 Certificate Revocation List - CRL panel. 6. Type the URL to be used for updating the CRL in the CRL URL text box. 7. If desired, change the interval between updates in the CRL Update Interval text box. 8. Select the CRL Enable text box to activate use of this feature. 9. Continue with any other configuration as desired. Make sure to save the configuration to flash. SNMP Certificate Expiration Trap Device-loaded certificates can be checked for date validity using an SNMP trap. The following example demonstrate how to configure this trap using Web management. 1. Log into the device using the Web GUI. 2. Click SNMP to activate the SNMP tabs. 3. Click the Traps tab. The tab contents are displayed as shown in Figure 2. Release Notes for Version 4.2.0b15 Cisco 11000 Series Secure Content Accelerator: SCA/SCA2 78-14640-05 9 New and Changed Information Figure 2 Traps Tap with SSL Certificate Expiration Tab. 4. Select the SSL Certificate Expiration check box to enable the trap. 5. Click Update to save the change to the running configuration. 6. Continue with any other configuration as desired. Make sure to save the configuration to flash. Secure Shell (SSH) Management Configuration You can use the Web GUI to configure SSH management of the device. 1. Log into the device using the Web GUI. 2. Click Access to activate the Access tabs. 3. Click the Subsystem tab. The Subsystem tab contents are displayed as shown in Figure 3. Release Notes for Version 4.2.0b15 Cisco 11000 Series Secure Content Accelerator: SCA/SCA2 10 78-14640-05 New and Changed Information Figure 3 Subsystem Tab Used to Configure SSH Management. 4. Use the SSH & Telnet Management panel to configure SSH management. 5. Change the default SSH port in the Port text box, if desired. 6. Type an access control list number to use for security in the Access Control List Id text box, if desired. 7. Select either an RSA or DSA Host Key from the appropriate drop-down list box. 8. Click Update to write the configuration to the device. 9. Continue with any other configuration as desired. Make sure to save the configuration to flash. Passing Client IP Addresses in the HTTP Header The client IP address can be passed in the HTTP header sent to the hardware server. Client IP address information is also passed when httpheader session is enabled. Follow the steps below to configure this feature using Web management. 1. Log into the device using the Web GUI. 2. Click SSL to activate the SSL tabs. 3. Click the Secure Servers tab. 4. Either click Add Secure Server to create a new server or Edit next to an existing server to change the configuration. The Secure Server window opens. 5. Scroll to the Add HTTP Headers to the backend HTTP Stream panel. This section is shown in Figure 4. Release Notes for Version 4.2.0b15 Cisco 11000 Series Secure Content Accelerator: SCA/SCA2 78-14640-05 11 Operational Notes Figure 4 Adding the Client IP Address to the Backend HTTP Stream. 6. Select the Add Client IP Address check box to enable the feature. 7. Continue with any other configuration as desired. Make sure to save the configuration to flash. Operational Notes • To negotiate a connection with FIPS 104-2-compliant servers configured on the SCA2, some client browsers must be configured with TLS only. SSL must be disabled, and data is still encrypted. • The commands erase running-config and erase startup-config are not available in FIPS Mode. • Due to limitations with Netscape 4.X and earlier, the Netscape browser can hang in the following instance: Client authentication on the device is configured with the error state set to send an HTML error message to the browser. In this scenario, if Netscape does not send the client certificate or if an error condition is present, the first connection appears to successfully connect, but an IO error also occurs on the device. Therefore, subsequent connection attempts do not successfully create connections to the device. This scenario causes Netscape to stop allowing connections to the device. If this situation occurs, start Task Manager by right-clicking the task bar and selecting Task Manager from the menu. Locate the "netscape.exe" process in the list of processes currently running on the system. Select "netscape.exe", and right-click. Then select "End Process Tree". You now can make connections using Netscape. It is strongly recommended that you upgrade your Netscape browser to a more current version to prevent the above usage conditions. • Configuring a device using multiple sessions or methods simultaneously can cause undesirable results. We recommend only one session be used at a time to make configuration changes. • Changing terminal settings in variance with the actual window size can affect the readline capabilities of the device: the displayed cursor position might not be indicative of its actual position. • No error message is displayed when deleting an access list that is referenced by certain subsystems. Access is denied. • In two-port mode services such as syslog, RIP, RDATE server, SNTP server, and SNMP are available only through the “Server” port. Release Notes for Version 4.2.0b15 Cisco 11000 Series Secure Content Accelerator: SCA/SCA2 12 78-14640-05 Operational Notes • To use the syslog ability, the configured syslog server must be set to listen for remote entries. • For optimal performance, the maximum total session cache for the SCA should not exceed 75,000. The maximum total session cache for the SCA2 should not exceed 300,000. For example, for an SCA2 with five secure servers, each secure server should set the cache size to 60,000 (300,000/5). • A saved configuration file does not contain private keys or passwords. Private keys must be loaded separately with names exactly matching those referenced by the secure server. Additionally, old private keys are not removed from the startup-configuration by copying a new configuration to the device. To remove the old private keys, delete each private key, and write the running-configuration to the startup configuration or erase the startup-configuration. • When using client authentication, individual Web browsers behave very differently in the way they filter requests for client certificates and how they cache certain aspects of the session. • Erasing the running-configuration of a device using the GUI disconnects the Web browser from the device. To continue configuration, reconnect to the device. • Setting the localport in a secure server entry to the listening TCP port of the Web management subsystem renders the GUI is inaccessible. You must use a different listening TCP port for each entity. • When writing a configuration via the GUI, the existing configuration is erased first; therefore, all configurations written using the GUI should be complete configurations. Incremental configuration updates are only possible by adding the changes to a complete configuration, and then writing this configuration. An option for overwriting or incrementally updating a configuration using a written configuration will be added at a future date. • The GUI caches certain items and can misrepresent the state of the actual device in certain circumstances, such as if the device is rebooted without saving changes. To obtain the current device state, refresh the page. This can be accomplished by holding the SHIFT-clicking the Refresh button. • Once Web management is enabled, it is always accessible via the "Server" port (two-port mode) or the "Network" port (one-port mode) even if SSL client-side access has been configured. Use an access list to prevent unwanted access. • Assigning a Web management access list to the device completely prevents HTTPS access from the GUI. Setting the following access list allows HTTPS access to the GUI from any IP address: access-list 10 permit 127.0.0.1 0.0.0.0 web-mgmt access-list 10 • The copy to startup-configuration command replaces the public startup-configuration. The keys and passwords still exist unless they have been deleted or erased. • Erasing the running-configuration of a device using the CLI disconnects any GUI or telnet sessions from the device. To continue configuration, reconnect to the device. • The custom completer completes previously created objects with the word “create” if TAB is pressed after the full name is typed. To edit an existing object, ensure “create” is not part of the command. • When writing configuration files to the running configuration, the new configuration file appends to the existing configuration rather than replacing it. In the process of recreating existing configuration information, some errors will be displayed. These can be ignored safely. • The factory-set default SNMP community is “public”; however, “public” is not listed in the configuration. The behavior of setting and resetting the SNMP community is demonstrated in the table below. Release Notes for Version 4.2.0b15 Cisco 11000 Series Secure Content Accelerator: SCA/SCA2 78-14640-05 13 Operational Notes Command SNMP community is set to... SNMP community in configuration is... snmp default community XYZ XYZ XYZ no snmp default community XYZ No default community listed snmp default community public public public • The arrow keys on the Windows NT 4.0 default telnet client when accessing the CLI do not behave as expected. To scroll through the command history, use CTRL-N and CTRL-P. • Pasting certificates or keys using the default Windows NT telnet client may fail. This may be the result of the Return character at the end of each line in the file. If you open the file with Notepad and see black boxes at the end of each line, delete them and replace them with carriage returns using the Enter key. The file should load after this. • After changing a device from one-port to two-port mode, write the configuration to flash and reload (reboot) the device for proper functioning. • Changing the interface speed and duplex from autonegotiation does not display forced configuration if open connections are present. Forced speed and duplex settings are displayed only if a non-autonegotiated speed is specified. • Multiple subsystems can be set to use the same access port. However, this causes undesirable results. Please ensure each subsystem “listening” port is unique on the device. • If the first DNS server does not return a response for an unknown host before the timeout occurs, it will not use the next domain-name suffix. • Non-transparent server objects are not updated if the device IP address is changed. Reloading the device or accessing the configuration of each server object resets the IP address assignment. • Adding a static route entry for duplicating a previously RIP-discovered route is not supported. Deleting a RIP-discovered route is not supported. A RIP-discovered default route cannot be cleared with the command clear ip routes or by disabling RIP alone. To remove this type of route, disable RIP and reload the device. The command ip route does not allow a change to an existing entry. To change an entry, delete the old entry first and then add the new one. • In certain situations, spaces are echoed to the device when using the Cygwin SSH client. • SCA2/SSL-RX network driver stops passing traffic • It was observed that in two port mode with high amounts of non-SSL traffic present a network driver would eventually stop passing traffic. The driver ring buffer operation was changed to a more reliable configuration. • An enhancement in the urlrewrite User Interface has been made to support multiple ports for the same domain name. That is, the user can now specify "urlrewrite <domain-name> 81 444" and "urlrewrite <domain-name> 82 445" for the same Normal Server. Previously, the domain name is unique for each urlrewrite entry. • Initial values for server TCP tuning parameters are taken from the global settings. The mtu setting can be configured at the global level, but not the server level. Thus, the device will display errors on boot because the mtu setting has been duplicated to the server TCP tuning parameters in the startup-configuration file. This has been fixed so that the mtu setting can never be set on a per server basis. Release Notes for Version 4.2.0b15 Cisco 11000 Series Secure Content Accelerator: SCA/SCA2 14 78-14640-05 Caveats • A bug was seen where the device fails to parse and rewrite URLs correctly when receiving HTTP responses, sent by a Microsoft IIS Server, which do not contain the headers "Content-Length:" and "Connection:". A fix has been made to interpret the missing combination of the two headers as if the header "Connection: close" exists so that the HTTP response can be parsed correctly. This has resolved the failures seen. • A bug was seen where the device, in one-armed port mode, replies to a message destined to an UDP Multicast address. A fix has been made and the device now no longer responds to any message destined for an UDP multicast address. • A bug was seen where the device, even under moderate load, suddenly lost all its memory and did not recover. The memory was found to be locked up in the tfTcpVect and some buf-xxx memory zones. The failure was traced to a minor performance enhancement in a network driver send routine. The enhancement has now been disabled and it was verified to have fixed the memory leakage. • It was observed that HP openview could not load the MIB for the SCA device when other Cisco MIBS had already been loaded. The enterprises object identifier was modified from "cisco" to "ciscosca" to resolve this conflict. Caveats Table 2 and Table 3, respectively, summarize the release and resolved caveats for this release. Table 2 Release Caveats Reference Software Release: 4.2.0b15 DDTS Number Discovered Corrected Caveat CSCea35189 4.1 Using the no session cache command on an active device can temporarily suspend the console. CSCea45897 4.1 Device does not pass e-mail address to server if the subject too long. CSCea54234 4.1 Completer for urlrewrite command is unclear. CSCea55998 4.1 Changing the Web management port with the GUI might result in anomalous behavior. CSCea61328 4.2 Enabling HTTPS management using the GUI will assign an inappropriate CRL interval. CSCea61334 4.1 Values for mtu in global TCP tuning parameters are copied into the startup-configuration file when server-level TCP tuning is configured. CSCea63441 4.2 Vulnerability: Klima-Pokorny-Rosa attack on RSA in SSL/TLS. CSCea63444 4.1 Use of some commands might slow down transaction processing in high-load situations. Release Notes for Version 4.2.0b15 Cisco 11000 Series Secure Content Accelerator: SCA/SCA2 78-14640-05 15 Caveats Table 3 Resolved Caveats Reference Software Release: 4.2.0b15 DDTS Number Discovered Corrected Caveat CSCdz65838 4.0 4.2 Setting GMT with DST in GUI does not display properly CSCdz84449 4.1 4.2 Possible memory leakage with step-up certificate and exportable client connections. CSCdz88341 4.0 4.2 SSL statistics for active server connections in the GUI and CLI might differ CSCdz89220 3.2 3.2 Parsing responses stops if urlredirect is enabled and content length is zero. CSCdz89280 4.1 4.1 Device can hang when an exportable client browser issues a TCP RST. CSCdz89374 3.2 3.2 Device fails to insert customer Content-Length: 0 HTTP header. CSCdz89383 4.0 4.0 Failure with HTTP/1.1 chunked-transfer and urlrewrite. CSCdz89391 4.0 4.0 Failure to reset SCA to factory defaults. CSCdz89399 4.1 3.2 Large SSL transactions can lead to a DOS attack. CSCdz89405 3.2 3.2 Connection closed and HTTP redirect fails when a TCP RST is propagated to client. CSCdz89410 3.2 3.2 When upgrading the device via FTP from a telnet client, initial attempts to load new firmware would fail (subsequent attempts would be successful). CSCdz89414 3.2 3.2 Malformed httpheader session inserts using Netscape 4.7x HTTP POST. CSCdz89421 3.2 3.2 Race condition using MS SGC, 40-bit cipher, when the client sends GET too fast. CSCdz89429 3.2 3.2 OpenSSL Security Advisory Alert on openssl 0.9.5a. CSCea09188 4.1 4.2 Using step-up certificates with the export Netscape browser fails when the strong security policy has been configured. CSCea09200 4.1 4.2 Device may hang with high memory usage. CSCea25694 4.1 4.2 Failure to redirect using urlrewrite redirectonly with HTTP/1.1 clients and a web server using chunked transfer-encoding in subsequent HTTP responses of a persistent connection. CSCea35158 4.1 4.2 GMT settings in the timezone string were unclear. CSCea35160 4.1 4.2 TCP tuning parameters were only set on the SSL port listening socket. CSCea35169 4.2 4.2 The openssl version is potentially susceptible to password interception. Release Notes for Version 4.2.0b15 Cisco 11000 Series Secure Content Accelerator: SCA/SCA2 16 78-14640-05 Caveats Table 3 Resolved Caveats Reference Software Release: 4.2.0b15 DDTS Number Discovered Corrected Caveat CSCea35172 4.1 4.2 Linux telnet client can cause situation where configuration sessions hang. CSCea35178 4.2 4.2 The GUI does not display the correct timezone setting. CSCea35194 4.2 4.2 Incorrect FIPS server validation routine. CSCea63433 4.1 4.1 Some memory problems might be observed with multiple telnet sessions under high device load conditions. CSCea63433 4.1 4.2 Memory problems might be encountered with a high load on the device and multiple telnet sessions. CSCea55998 4.1 4.2 GUI hangs on changing management port number CSCea61328 4.1 4.2 Bad CRL interval assigned enabling HTTPS management CSCea89051 4.1 4.2 SSL subsystem locks up and Server Hellos stop. CSCeb13816 4.1 4.2 Multicast Ethernet destination address in Inline mode CSCea45897 4.1 4.2 Device does not pass e-mail address to server if subject too long CSCeb27753 4.1 4.2 TCP Tuning settings vs TCP stack defaults CSCea63441 4.1 4.2 Vulnerability: Klima-Pokorny-Rosa attack on RSA in SSL/TLS Open Caveats - Release 4.2.0b15 • CSCea35189 We do not recommend disabling session caching while traffic is going through the device. If session caching is disabled while the device is experiencing heavy traffic, device functionality might be lost for a period of time. • CSCea45897 In situations when the device is configued to send the client certificate to the server and the subject field is larger than the device configuration will allow, the clent certificate is sent, but the e-mail address is not included in the packet. • CSCea54234 The urlrewrite completer help shows “/path/afile” as part of the syntax. This may be misleading as URL rewrite uses only the domain name: URL rewrite cannot be used on a per file or directory basis. • CSCea61334 Initial values for server TCP tuning parameters are taken from the global settings. The mtu setting can be configured at the global level, but not the server level. Thus, the device will display errors on boot because the mtu setting has been duplicated to the server TCP tuning parameters in the startup-configuratin file. No other errors are associated with this caveat. Release Notes for Version 4.2.0b15 Cisco 11000 Series Secure Content Accelerator: SCA/SCA2 78-14640-05 17 Caveats • CSCea63444 Certain commands are very CPU intensive. We recommend the following commands not be run with active connections present unless instructed by customer support: – write memory – write flash – show netstat (when a large number of connections are present) – show diagnostic-report (when a large number of connections are present) If the device is experiencing high load, issuing these commands might max out the CPU, resulting in a slowdown of transactions. Applications which have low timeout values might disconnect in this situation. Release Notes for Version 4.2.0b15 Cisco 11000 Series Secure Content Accelerator: SCA/SCA2 18 78-14640-05 Caveats Resolved Caveats - Release 4.2.0b15 • CSCdz65838 In the GUI, on the Time Page, if you set the timezone to GMT and have the DST box checked when you click update it will revert to Eastern Standard Time with the DST box unchecked. • CSCea84449 If an SSL server has been configured with a step-up certificate, exportable client connections can cause a memory leakage during the SSL re-negotiation phase, and the device may eventually hang. The bug can be revealed by using the show memory zones periodically, and observing increased connBlock zones over time, even after exportable client connections have finished. • CSCdz88341 SSL statistics for active server connections in the GUI and CLI might differ. • CSCdz89220 When urlrewrite redirectonly is enabled and HTTP responses do not have “the header content-length:” value, the algorithm would stop parsing responses for that connection, resulting in no rewrite of 3xx HTTP responses and hence, no secure redirection. The fix has now been made to treat such HTTP responses as having a content length of 0 (zero). • CSCdz89280 Device can hang when an exportable client browser issues a TCP RST during SSL session negotiation. If an exportable client browser issues a TCP RST while negotiating an SSL session, a connection in a particular transition state could become stuck in the execution queue forever leading to a device hang. Serial console access may still be available but the device would not respond to SSL traffic and would need to be rebooted. • CSCdz89374 When an HTTP request contains a header line "Content-Length: 0", the parsing algorithm fails to parse correctly. Custom header data might not be inserted. The result is that the returned data from OWA will contain incorrect links, "http://..." instead of "https://...” The fix has been made to correct the parsing error, and custom header data are now inserted into every HTTP request. • CSCdz89383 An SSL server configured with urlrewrite redirectonly may fail when attempting to process HTTP/1.1 chunked-transfer encoded transactions with size greater than 16k. • CSCdz89391 Attempting to reset the device to factory defaults using the FailSafe password may cause a device failure. This has been fixed so that a reset to factory defaults resets the passwords to default values and deletes any private keys stored on the device. The possible corruption of configuration files during an upgrade or repair has also been fixed. Release Notes for Version 4.2.0b15 Cisco 11000 Series Secure Content Accelerator: SCA/SCA2 78-14640-05 19 Caveats • CSCdz89399 The device TCP/IP stack can consume too much memory under certain heavy load scenarios, particularly under a heavy load of large SSL transactions, where each transaction has a size of 20KB. This could potentially lead to frequent memory allocation failures and possible device failure. This scenario is now prevented by introducing a low system memory limit into the TCP/IP stack code to prevent the device from consuming too much memory. If the remaining memory is less than the low memory limit, all SSL server TCP traffic is now dropped. In order to provide quality of service for device telnet and Web management sessions, as well as syslog and SNMP, TCP traffic intended for the telnet and Web management server ports and all UDP traffic is allowed to pass. Additional checks already exist in these subsystems to prevent DoS attacks on these systems. • CSCdz89405 It was discovered that an HTTP 3.0x response consisting of more than one packet under a certain scenario could cause the device to incorrectly propagate the TCP RST to the client browser, causing the device to ignore the redirection. In this scenario, no part of the HTTP request was received by the backend server, and the server has already sent out its 3.0x response and closed the connection (TCP FIN). Any data belonging to the HTTP request arriving after the connection was already closed cause lead the server to send out a TCP RST in response. The device incorrectly interpreted this TCP RST and propagated it to the client browser. The fix has now been made to discard any erroneous TCP RST events after a TCP FIN is already received. • CSCdz89410 When upgrading the device via FTP from a telnet client, initial attempts to load new firmware would fail (subsequent attempts would be successful). • CSCdz89414 A problem has been fixed to correctly insert SSL session information in the HTTP request headers (httpheader session command). This problem occurred only when Netscape 4.7x sends an HTTP POST request. The header-body CRLF delimiter can be received with CR and LF characters in separate buffers. In this scenario, the SSL session information was incorrectly added to the HTTP headers. The additional headers were inserted between the CR and LF, causing a malformed request. • CSCdz89421 A corner-case race condition for 40-bit client step-up in all prior versions of SSL firmware has been fixed. This bug was only present when all of the following conditions existed: a. A Microsoft Server Gated Cryptographic (SGC) certificate is used. b. A 40-bit cipher is negotiated first. c. Step-up happens on the same connection. d. The client sends an HTTP GET faster than the device connection to the backend server is made. The race condition would hang-up the client browser in which case the user could “reload” the page to get around the problem. • CSCdz89429 All the OpenSSL vulnerabilities announced on July 30, 2002 were patched. For more information, please see http://www.openssl.org/news/secadv_20020730. • CSCea09188 In configurations with a secpolicy composed of only 128 bit and stronger ciphers and a step-up certificate, connections through the device using an exportable Netscape client will fail. This is due to the client browser attempting to step up while still in the first SSL handshake and using a weak cipher. Release Notes for Version 4.2.0b15 Cisco 11000 Series Secure Content Accelerator: SCA/SCA2 20 78-14640-05 Caveats • CSCea09200 In high memory usage situations, such as when a large session cache setting is used and/or keepalive is enabled the device can enter a state where SSL transactions are no longer serviced. • CSCea25694 A bug was seen where the device, configured with urlrewrite redirectonly, would fail to rewrite URLs starting with the second HTTP response of a persistent connection in which the client is HTTP/1.1 and the web server uses chunked transfer-encoding for the body. Additionally, if the chunk-size had leading 0s, it was incorrectly processed as the last chunk, and urlrewrite parsing would stop. • CSCea35158 The timezone setting was enhanced for the CLI and corrected for the GUI. Previously the timezone string was interpreted as xxxyyyzzz, where xxx was the timezone at the device location, yyy was the number of hours to get from the present timezone to GMT, and zzz was the Daylight Savings Time setting. It now supports a timezone string of the form: GMT+n or GMT-n. Note that this offset is from GMT and is interpreted opposite from the offset in the original form. For example, the string “MDT7MST” is the same timezone as “GMT-7”. • CSCea35160 TCP tuning parameters were set only on the SSL port listening socket of a server object. There were issues where special applications on the physical server could not handle fast TCP retransmits and needed tuning of the device to apply to the clear text socket. The TCP tuning subsystem was enhanced to apply settings also to the remoteport (clear text) socket. • CSCea35169 Using a timing attack an active attacker can substitute specifically made-up cipher text blocks for blocks sent by legitimate SSL/TLS parties and measure the time until a response arrives. SSL/TLS includes data authentication to ensure that such modified cipher text blocks will be rejected by the peer (and the connection aborted), but the attacker may be able to use timing observations to distinguish between two different error cases, namely block cipher padding errors and MAC verification errors. This is sufficient for an adaptive attack that finally can obtain the complete plaintext block. This vulnerability has been fixed by applying a patch to the SSL libraries. • CSCea35172 When using a Linux telnet session with the device, the write flash command would sometimes terminate the session. In subsequent configuration sessions, accessing the flash file system with such commands as write memory would hang the session. The device was not hung, but a reboot was required before access to the flash is restored. A patch has been implemented which addresses this situation. • CSCea35178 The GUI does not display the correct timezone setting. When initially connected, the GUI shows Eastern Timezone. • CSCea35194 Through code review, a problem was discovered in the server validation routine in FIPS mode There was a check for key length appropriateness in the server validation code when in FIPS mode that would improperly access the key. The result of configuring a server without a assigning a key would be that an inappropriate message: "Invalid key length 0" was sent to the console. A check was added to the server validation code to make sure the key exists before accessing it. Release Notes for Version 4.2.0b15 Cisco 11000 Series Secure Content Accelerator: SCA/SCA2 78-14640-05 21 Caveats • CSCea63433 When the device is under high load conditions and experiencing a low memory critical state, it might become unstable when multiple telnet sessions are initiated to the device. The additional telnet sessions might overrun the available memory. Appropriate fixes have been made to budget memory for multiple telnet sessions in this critical low memory state, and a check has been added to refuse telnet clients when memory is not available to support a new telnet session. • CSCea55998 A bug was seen in which changing the management port while in a GUI management session would hang the session. This was fixed by replacing the problematic timeout with a semaphore in the web server enable. • CSCea61328 A bug was seen where enabling HTTPS management would assign a inappropriate value of zero to the CRL interval of the server filter. The code was fixed to assign an appropriate default value when enabling this feature. • CSCea89051 A bug was found in the processing path when a crypto operation hardware offload failed due to lack of resources and the process then would call a software equivalent. An issue existed in the setup to call the software routine that caused the job to stall, and subsequent access to the crypto chip to stall. This has been fixed and verified to behave properly when this condition occurs. • CSCeb13816 A bug was seen where the device, in inline mode, interferes with a pass-through established TCP connection by sending a TCP RST when seeing a packet with a Multicast Ethernet destination address. In this configuration, the client is a Checkpoint Firewall configured with a multicast Ethernet address and any packet sent back by a Web Server would contain the multicast Ethernet destination address. A fix has been made and the SSL device now no longer processes any TCP-protocol packet destined for a multicast Ethernet address. • CSCea45897 In situations when the device is configured to send the client certificate to the server and the subject field is larger than the device configuration will allow, the client certificate was sent, but the e-mail address is not included in the packet. This has been fixed to accept larger subject fields. • CSCeb27753 Concern has been expressed that after setting TCP tuning parameters, the output of "show ip statistics" differs from these new values. This occurs both with the GUI and the CLI, and is the expected behaviour. The result of "show ip statistics" lists values associated with the TCP/IP stack on the device as a whole. TCP tuning parameters are applied to either a specific ssl server, or in a global setting as defaults for ssl servers where not specifically overridden. Neither the global settings nor the per-server settings are applicable to the TCP/IP stack for the device as a whole, thus even when tuning parameters are changed, they will not be reflected in the output of "show ip statistics" or any other commands that interrogate the state of the device stack. • CSCea63441 Czech cryptologists Vlastimil Klima, Ondrej Pokorny, and Tomas Rosa have come up with an extension of the "Bleichenbacher attack" on RSA with PKCS #1 v1.5 padding as used in SSL 3.0 and TLS 1.0. Their attack requires the attacker to open millions of SSL/TLS connections to the server under attack; the server’s behaviour when faced with specially made-up RSA ciphertexts can reveal information that in effect allows the attacker to perform a single RSA private key operation on a ciphertext of its choice using the server’s RSA key. Note that the server’s RSA key is not compromised in this attack. Release Notes for Version 4.2.0b15 Cisco 11000 Series Secure Content Accelerator: SCA/SCA2 22 78-14640-05 FIPS Mode Changes The appropriate patches have been made to the SSL libraries. FIPS Mode Changes Several changes have been made to FIPS mode operation commands. These command changes are listed in Table 4. Table 4 Deprecated FIPS Mode Commands in Version 4.2.0b15. Mode Command and Syntax Description Key Configuration Mode der Imports a DER-encoded key. genrsa Generates an RSA key. net-iis Imports an IIS-encoded key. pem Imports a PEM-encoded key. RSA keys must be at least 1024 bits in length for use in FIPS mode. While shorter keys can be entered, users are warned those keys cannot be used. The following text is displayed: %% Invalid key length 512 for FIPS mode! %% Key length must be 1024 at least for FIPS mode! Firmware Version 4.2.0b15 Command Changes Table 5 and Table 6 list commands added and changed in firmware version 4.2.0b15, respectively. Table 5 Mode CLI Commands Added in Firmware Version 4.2.0b15. Command and Syntax Description Top Level Mode: show ssh Non-Privileged Mode show ssl cert-expiration-check Displays whether SSH is enabled, the port defined for SSH use, and host key specified for use. Top Level Mode: [no] set diag-list Privileged Mode <all|cpu|device|memory|netstat| processes|running-config|ssl|ssl-errors| ssl-session-statistics|ssl-statistics| startup-config|zones> Specifies one or more reports to be added or removed from the diagnostic report list. Use the no form of the command to remove a report. Use the all keyword to include all diagnostic reports. show diag-list Displays a list of invalid certificates stored on the device as indicated by the certificate validity dates. Displays a list of the user-specified diagnostic reports generated by the show diagnostic-report command. Release Notes for Version 4.2.0b15 Cisco 11000 Series Secure Content Accelerator: SCA/SCA2 78-14640-05 23 Firmware Version 4.2.0b15 Command Changes Table 5 CLI Commands Added in Firmware Version 4.2.0b15. Mode Command and Syntax Description Configuration Mode [no] snmp trap-type enterprise ssl-cert-expire Sets an SNMP trap to monitor for use of a certificate that has expired or is not yet valid. Use the no form of the command to remove the trap. If this trap has been set, it is included in the output of the show snmp command. ssh access-list <listid> Assigns an access list for communication with the device via SSH, where listid is the identifier of the existing access list. [no] ssh enable Enables SSH management with device if one or two host keys have been configured. Using the no form of the command disables SSH management. [no] ssh hostkey <dsa|rsa> <keyname> Assigns a DSA or RSA key to be used as a host key for SSH management, where keyname is the name of the key. Keys of less than 768 bits are not allowed to be used as host keys. If the specified key is invalid for use as a hostkey, an error message is displayed. Use the no form of the command to remove the specified key name from the configuration. ssh port <portid|default> Assigns a port for use with SSH management of the device, where portid is the number of the port. The default option can be used to return the port number to 22. SSL Configuration Mode cert-expiration-check Displays a list of invalid certificates stored on the device as indicated by the certificate validity dates. Server Configuration Mode [no] crl enable Enables use of a Certificate Revocation List for the server being configured. crl interval <days> Specifies the number of days between CRL updates from the configured URL. The default interval is 30 days. crl url <url> Specifies the URL to be used for CRL updates, where url is the complete URL entered within quotation marks. Replace the existing URL by specifying another one. [no] httpheader forwarded Enables passing of the client IP address in the HTTP header sent to the hardware server. The state of this configuration is displayed in the output of the show ssl server command and info command in Server Configuration mode. The format of the passed IP is “X-Forwarded-For: <Client IP>”. Release Notes for Version 4.2.0b15 Cisco 11000 Series Secure Content Accelerator: SCA/SCA2 24 78-14640-05 Documentation Updates Table 6 CLI Commands Changed in Firmware Version 4.2.0b15. Mode Command and Syntax Top Level Mode: show device Non-Privileged Mode Server Configuration Mode Description Secure Shell (SSH) information as been added to the output of this command. If SSH is enabled, the SSH host key(s) and port are displayed. If only one SSH host key has been configured, the other is displayed as “(null)”. show ssl server [servername] Certificate Revocation List (CRL) information as been added to the output of this command. CRL information includes whether CRL is enabled, the CRL update interval, and the URL to use for the CRL. httpheader session The client IP is now passed to the hardware server via the HTTP header. The format of the passed IP is “X-Forwarded-For: <Client IP>”. Documentation Updates All information pertaining to version 4.2.0b15 of the firmware not described in the latest Configuration Guide is located in this Release Note. Obtaining Documentation Cisco provides several ways to obtain documentation, technical assistance, and other technical resources. These sections explain how to obtain technical information from Cisco Systems. Cisco.com You can access the most current Cisco documentation on the World Wide Web at this URL: http://www.cisco.com/univercd/home/home.htm You can access the Cisco website at this URL: http://www.cisco.com International Cisco web sites can be accessed from this URL: http://www.cisco.com/public/countries_languages.shtml Documentation CD-ROM Cisco documentation and additional literature are available in a Cisco Documentation CD-ROM package, which may have shipped with your product. The Documentation CD-ROM is updated monthly and may be more current than printed documentation. The CD-ROM package is available as a single unit or through an annual subscription. Registered Cisco.com users can order the Documentation CD-ROM (product number DOC-CONDOCCD=) through the online Subscription Store: http://www.cisco.com/go/subscription Release Notes for Version 4.2.0b15 Cisco 11000 Series Secure Content Accelerator: SCA/SCA2 78-14640-05 25 Obtaining Technical Assistance Ordering Documentation You can find instructions for ordering documentation at this URL: http://www.cisco.com/univercd/cc/td/doc/es_inpck/pdi.htm You can order Cisco documentation in these ways: • Registered Cisco.com users (Cisco direct customers) can order Cisco product documentation from the Networking Products MarketPlace: http://www.cisco.com/en/US/partner/ordering/index.shtml • Registered Cisco.com users can order the Documentation CD-ROM (Customer Order Number DOC-CONDOCCD=) through the online Subscription Store: http://www.cisco.com/go/subscription • Nonregistered Cisco.com users can order documentation through a local account representative by calling Cisco Systems Corporate Headquarters (California, U.S.A.) at 408 526-7208 or, elsewhere in North America, by calling 800 553-NETS (6387). Documentation Feedback You can submit comments electronically on Cisco.com. On the Cisco Documentation home page, click Feedback at the top of the page. You can e-mail your comments to bug-doc@cisco.com. You can submit your comments by mail by using the response card behind the front cover of your document or by writing to the following address: Cisco Systems Attn: Customer Document Ordering 170 West Tasman Drive San Jose, CA 95134-9883 We appreciate your comments. Obtaining Technical Assistance Cisco provides Cisco.com, which includes the Cisco Technical Assistance Center (TAC) Website, as a starting point for all technical assistance. Customers and partners can obtain online documentation, troubleshooting tips, and sample configurations from the Cisco TAC website. Cisco.com registered users have complete access to the technical support resources on the Cisco TAC website, including TAC tools and utilities. Cisco.com Cisco.com offers a suite of interactive, networked services that let you access Cisco information, networking solutions, services, programs, and resources at any time, from anywhere in the world. Cisco.com provides a broad range of features and services to help you with these tasks: • Streamline business processes and improve productivity • Resolve technical issues with online support Release Notes for Version 4.2.0b15 Cisco 11000 Series Secure Content Accelerator: SCA/SCA2 26 78-14640-05 Obtaining Technical Assistance • Download and test software packages • Order Cisco learning materials and merchandise • Register for online skill assessment, training, and certification programs To obtain customized information and service, you can self-register on Cisco.com at this URL: http://www.cisco.com Technical Assistance Center The Cisco TAC is available to all customers who need technical assistance with a Cisco product, technology, or solution. Two levels of support are available: the Cisco TAC website and the Cisco TAC Escalation Center. The avenue of support that you choose depends on the priority of the problem and the conditions stated in service contracts, when applicable. We categorize Cisco TAC inquiries according to urgency: • Priority level 4 (P4)—You need information or assistance concerning Cisco product capabilities, product installation, or basic product configuration. • Priority level 3 (P3)—Your network performance is degraded. Network functionality is noticeably impaired, but most business operations continue. • Priority level 2 (P2)—Your production network is severely degraded, affecting significant aspects of business operations. No workaround is available. • Priority level 1 (P1)—Your production network is down, and a critical impact to business operations will occur if service is not restored quickly. No workaround is available. Cisco TAC Website You can use the Cisco TAC website to resolve P3 and P4 issues yourself, saving both cost and time. The site provides around-the-clock access to online tools, knowledge bases, and software. To access the Cisco TAC website, go to this URL: http://www.cisco.com/tac All customers, partners, and resellers who have a valid Cisco service contract have complete access to the technical support resources on the Cisco TAC website. Some services on the Cisco TAC website require a Cisco.com login ID and password. If you have a valid service contract but do not have a login ID or password, go to this URL to register: http://tools.cisco.com/RPF/register/register.do If you are a Cisco.com registered user, and you cannot resolve your technical issues by using the Cisco TAC website, you can open a case online at this URL: http://www.cisco.com/en/US/support/index.html If you have Internet access, we recommend that you open P3 and P4 cases through the Cisco TAC website so that you can describe the situation in your own words and attach any necessary files. Release Notes for Version 4.2.0b15 Cisco 11000 Series Secure Content Accelerator: SCA/SCA2 78-14640-05 27 Obtaining Additional Publications and Information Cisco TAC Escalation Center The Cisco TAC Escalation Center addresses priority level 1 or priority level 2 issues. These classifications are assigned when severe network degradation significantly impacts business operations. When you contact the TAC Escalation Center with a P1 or P2 problem, a Cisco TAC engineer automatically opens a case. To obtain a directory of toll-free Cisco TAC telephone numbers for your country, go to this URL: http://www.cisco.com/warp/public/687/Directory/DirTAC.shtml Before calling, please check with your network operations center to determine the level of Cisco support services to which your company is entitled: for example, SMARTnet, SMARTnet Onsite, or Network Supported Accounts (NSA). When you call the center, please have available your service agreement number and your product serial number. Obtaining Additional Publications and Information Information about Cisco products, technologies, and network solutions is available from various online and printed sources. • The Cisco Product Catalog describes the networking products offered by Cisco Systems as well as ordering and customer support services. Access the Cisco Product Catalog at this URL: http://www.cisco.com/en/US/products/products_catalog_links_launch.html • Cisco Press publishes a wide range of networking publications. Cisco suggests these titles for new and experienced users: Internetworking Terms and Acronyms Dictionary, Internetworking Technology Handbook, Internetworking Troubleshooting Guide, and the Internetworking Design Guide. For current Cisco Press titles and other information, go to Cisco Press online at this URL: http://www.ciscopress.com • Packet magazine is the Cisco monthly periodical that provides industry professionals with the latest information about the field of networking. You can access Packet magazine at this URL: http://www.cisco.com/en/US/about/ac123/ac114/about_cisco_packet_magazine.html • iQ Magazine is the Cisco monthly periodical that provides business leaders and decision makers with the latest information about the networking industry. You can access iQ Magazine at this URL: http://business.cisco.com/prod/tree.taf%3fasset_id=44699&public_view=true&kbns=1.html • Internet Protocol Journal is a quarterly journal published by Cisco Systems for engineering professionals involved in the design, development, and operation of public and private internets and intranets. You can access the Internet Protocol Journal at this URL: http://www.cisco.com/en/US/about/ac123/ac147/about_cisco_the_internet_protocol_journal.html • Training—Cisco offers world-class networking training, with current offerings in network training listed at this URL: http://www.cisco.com/en/US/learning/le31/learning_recommended_training_list.html Release Notes for Version 4.2.0b15 Cisco 11000 Series Secure Content Accelerator: SCA/SCA2 28 78-14640-05 Obtaining Additional Publications and Information CCIP, the Cisco Arrow logo, the Cisco Powered Network mark, the Cisco Systems Verified logo, Cisco Unity, Follow Me Browsing, FormShare, iQ Breakthrough, iQ Expertise, iQ FastTrack, the iQ Logo, iQ Net Readiness Scorecard, Networking Academy, ScriptShare, SMARTnet, TransPath, and Voice LAN are trademarks of Cisco Systems, Inc.; Changing the Way We Work, Live, Play, and Learn, Discover All That’s Possible, The Fastest Way to Increase Your Internet Quotient, and iQuick Study are service marks of Cisco Systems, Inc.; and Aironet, ASIST, BPX, Catalyst, CCDA, CCDP, CCIE, CCNA, CCNP, Cisco, the Cisco Certified Internetwork Expert logo, Cisco IOS, the Cisco IOS logo, Cisco Press, Cisco Systems, Cisco Systems Capital, the Cisco Systems logo, Empowering the Internet Generation, Enterprise/Solver, EtherChannel, EtherSwitch, Fast Step, GigaStack, Internet Quotient, IOS, IP/TV, LightStream, MGX, MICA, the Networkers logo, Network Registrar, Packet, PIX, Post-Routing, Pre-Routing, RateMUX, Registrar, SlideCast, StrataView Plus, Stratm, SwitchProbe, TeleRouter, and VCO are registered trademarks of Cisco Systems, Inc. and/or its affiliates in the U.S. and certain other countries. All other trademarks mentioned in this document or Web site are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (0208R) Copyright © 2003 Cisco Systems, Inc. All rights reserved. Release Notes for Version 4.2.0b15 Cisco 11000 Series Secure Content Accelerator: SCA/SCA2 78-14640-05 29 Obtaining Additional Publications and Information Release Notes for Version 4.2.0b15 Cisco 11000 Series Secure Content Accelerator: SCA/SCA2 30 78-14640-05