<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA Upgrade from 9.10(1) to 9.20(3) on ASAv – Best Practices in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-upgrade-from-9-10-1-to-9-20-3-on-asav-best-practices/m-p/5313428#M1121966</link>
    <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1882236"&gt;@Zaza1&lt;/a&gt;&amp;nbsp;a quick check of the release notes:-&amp;nbsp;&lt;A href="https://www.cisco.com/c/en/us/support/security/adaptive-security-appliance-asa-software/products-release-notes-list.html" target="_blank"&gt;https://www.cisco.com/c/en/us/support/security/adaptive-security-appliance-asa-software/products-release-notes-list.html&lt;/A&gt;&lt;/P&gt;
&lt;P class="p"&gt;&lt;STRONG class="ph b"&gt;Low-Security Cipher Removal in ASA 9.15(1)&lt;/STRONG&gt;—Support for the following less secure ciphers used by IKE and IPsec have been removed:&lt;/P&gt;
&lt;UL class="ul"&gt;
&lt;LI class="li"&gt;
&lt;P class="p"&gt;Diffie-Hellman groups: 2 and 24&lt;/P&gt;
&lt;/LI&gt;
&lt;LI class="li"&gt;
&lt;P class="p"&gt;Encryption algorithms: DES, 3DES, AES-GMAC, AES-GMAC-192, AES-GMAC-256, NULL, ESP-3DES, ESP-DES, ESP-MD5-HMAC&lt;/P&gt;
&lt;/LI&gt;
&lt;LI class="li"&gt;
&lt;P class="p"&gt;Hash algorithms: MD5&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/asa/asa915/release/notes/asarn915.html" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/asa/asa915/release/notes/asarn915.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI id="reference_yw3_ngz_vhb__dh-groups" class="li"&gt;
&lt;P class="p"&gt;&lt;STRONG class="ph b"&gt;No support for DH groups 2, 5, and 24 in 9.16(1)&lt;/STRONG&gt;—Support has been removed for the DH groups 2, 5, and 24 in SSL DH group configuration. The &lt;SPAN&gt;&lt;SPAN class="keyword kwd"&gt;ssl dh-group&lt;/SPAN&gt; command has been updated to remove the command options &lt;SPAN class="keyword kwd"&gt;group2&lt;/SPAN&gt;, &lt;SPAN class="keyword kwd"&gt;group5&lt;/SPAN&gt;, and &lt;SPAN class="keyword kwd"&gt;group24&lt;/SPAN&gt;. &lt;/SPAN&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/asa/asa916/release/notes/asarn916.html" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/asa/asa916/release/notes/asarn916.html&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 24 Jul 2025 08:26:39 GMT</pubDate>
    <dc:creator>Rob Ingram</dc:creator>
    <dc:date>2025-07-24T08:26:39Z</dc:date>
    <item>
      <title>ASA Upgrade from 9.10(1) to 9.20(3) on ASAv – Best Practices</title>
      <link>https://community.cisco.com/t5/network-security/asa-upgrade-from-9-10-1-to-9-20-3-on-asav-best-practices/m-p/5313374#M1121963</link>
      <description>&lt;P&gt;Hello everyone,&lt;/P&gt;
&lt;P&gt;I'm planning to upgrade our Cisco ASAv from version **9.10(1)42** to **9.20(3)20** directly.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-unicode-emoji" title=":pushpin:"&gt;📌&lt;/span&gt; Current environment:&lt;BR /&gt;- **Platform**: Cisco ASAv (virtual appliance)&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-unicode-emoji" title=":question_mark:"&gt;❓&lt;/span&gt; Questions:&lt;BR /&gt;1. Is a **direct upgrade** from 9.10 to 9.20 supported and stable for ASAv?&lt;BR /&gt;2. What **config or syntax changes** should I expect (e.g., SSL/TLS, VPN settings)?&lt;BR /&gt;3. Do I need to upgrade ASDM as well, and to which version?&lt;BR /&gt;4. Any known issues or rollback recommendations?&lt;/P&gt;
&lt;P&gt;Can anyone tell me the best practices for this progress?&lt;/P&gt;
&lt;P&gt;Thanks in advance for any guidance or experiences shared!&lt;/P&gt;</description>
      <pubDate>Thu, 24 Jul 2025 07:01:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-upgrade-from-9-10-1-to-9-20-3-on-asav-best-practices/m-p/5313374#M1121963</guid>
      <dc:creator>Zaza1</dc:creator>
      <dc:date>2025-07-24T07:01:18Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Upgrade from 9.10(1) to 9.20(3) on ASAv – Best Practices</title>
      <link>https://community.cisco.com/t5/network-security/asa-upgrade-from-9-10-1-to-9-20-3-on-asav-best-practices/m-p/5313388#M1121964</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1882236"&gt;@Zaza1&lt;/a&gt;&amp;nbsp;refer to table 9&amp;nbsp;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/asa/upgrade/asa-upgrade/planning.html#id_58680" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/asa/upgrade/asa-upgrade/planning.html#id_58680&lt;/A&gt;&amp;nbsp;reveals you can go direct from 9.10 to 9.20.&lt;/P&gt;
&lt;P&gt;You should upgrade to at least ASDM version&amp;nbsp;7.20(2) or higher when using ASA 9.20&lt;/P&gt;
&lt;P&gt;Between ASA version 9.10 and 9.20 Cisco has depreciated old weak crypto ciphers (DH groups, encryption algorthims and hash algorithms) so if you have any VPN's using depreciated ciphers these will no longer work.&amp;nbsp;Clientless SSL-VPN has been completely depreciated. You should review your current VPN configuration against the release notes, you may need to reconfigure any current VPNs before the upgrade if using unsupported ciphers.&lt;/P&gt;
&lt;P&gt;For more information refer to the ASA planning/upgrade guide.&amp;nbsp;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/asa/upgrade/asa-upgrade/planning.html" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/asa/upgrade/asa-upgrade/planning.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;See as you are using ASA virtual, take a snapshot so you can revert if there is a problem.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 24 Jul 2025 07:42:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-upgrade-from-9-10-1-to-9-20-3-on-asav-best-practices/m-p/5313388#M1121964</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2025-07-24T07:42:20Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Upgrade from 9.10(1) to 9.20(3) on ASAv – Best Practices</title>
      <link>https://community.cisco.com/t5/network-security/asa-upgrade-from-9-10-1-to-9-20-3-on-asav-best-practices/m-p/5313409#M1121965</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/97036"&gt;@Rob Ingram&lt;/a&gt;&amp;nbsp;Thank you for your support!&lt;/P&gt;
&lt;P&gt;Could you please confirm which exact crypto ciphers, hashing algorithms, or DH groups have been deprecated or removed in ASA version 9.20?&lt;/P&gt;
&lt;P&gt;We would like to cross-check our current VPN (IPSec/IKEv1/IKEv2) configuration to see which tunnels might break after the upgrade.&lt;/P&gt;
&lt;P&gt;Is there a complete list or command that shows which ciphers are no longer supported in 9.20?&lt;/P&gt;
&lt;P&gt;Thanks in advance!&lt;/P&gt;</description>
      <pubDate>Thu, 24 Jul 2025 08:02:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-upgrade-from-9-10-1-to-9-20-3-on-asav-best-practices/m-p/5313409#M1121965</guid>
      <dc:creator>Zaza1</dc:creator>
      <dc:date>2025-07-24T08:02:47Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Upgrade from 9.10(1) to 9.20(3) on ASAv – Best Practices</title>
      <link>https://community.cisco.com/t5/network-security/asa-upgrade-from-9-10-1-to-9-20-3-on-asav-best-practices/m-p/5313428#M1121966</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1882236"&gt;@Zaza1&lt;/a&gt;&amp;nbsp;a quick check of the release notes:-&amp;nbsp;&lt;A href="https://www.cisco.com/c/en/us/support/security/adaptive-security-appliance-asa-software/products-release-notes-list.html" target="_blank"&gt;https://www.cisco.com/c/en/us/support/security/adaptive-security-appliance-asa-software/products-release-notes-list.html&lt;/A&gt;&lt;/P&gt;
&lt;P class="p"&gt;&lt;STRONG class="ph b"&gt;Low-Security Cipher Removal in ASA 9.15(1)&lt;/STRONG&gt;—Support for the following less secure ciphers used by IKE and IPsec have been removed:&lt;/P&gt;
&lt;UL class="ul"&gt;
&lt;LI class="li"&gt;
&lt;P class="p"&gt;Diffie-Hellman groups: 2 and 24&lt;/P&gt;
&lt;/LI&gt;
&lt;LI class="li"&gt;
&lt;P class="p"&gt;Encryption algorithms: DES, 3DES, AES-GMAC, AES-GMAC-192, AES-GMAC-256, NULL, ESP-3DES, ESP-DES, ESP-MD5-HMAC&lt;/P&gt;
&lt;/LI&gt;
&lt;LI class="li"&gt;
&lt;P class="p"&gt;Hash algorithms: MD5&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/asa/asa915/release/notes/asarn915.html" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/asa/asa915/release/notes/asarn915.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI id="reference_yw3_ngz_vhb__dh-groups" class="li"&gt;
&lt;P class="p"&gt;&lt;STRONG class="ph b"&gt;No support for DH groups 2, 5, and 24 in 9.16(1)&lt;/STRONG&gt;—Support has been removed for the DH groups 2, 5, and 24 in SSL DH group configuration. The &lt;SPAN&gt;&lt;SPAN class="keyword kwd"&gt;ssl dh-group&lt;/SPAN&gt; command has been updated to remove the command options &lt;SPAN class="keyword kwd"&gt;group2&lt;/SPAN&gt;, &lt;SPAN class="keyword kwd"&gt;group5&lt;/SPAN&gt;, and &lt;SPAN class="keyword kwd"&gt;group24&lt;/SPAN&gt;. &lt;/SPAN&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/asa/asa916/release/notes/asarn916.html" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/asa/asa916/release/notes/asarn916.html&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 24 Jul 2025 08:26:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-upgrade-from-9-10-1-to-9-20-3-on-asav-best-practices/m-p/5313428#M1121966</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2025-07-24T08:26:39Z</dc:date>
    </item>
  </channel>
</rss>

