<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA ssh timeout vulnerability in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-ssh-timeout-vulnerability/m-p/2160139#M377027</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello David,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We are definetly on a different page &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But... well.. Nice talking to you man.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Have a great night .&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sat, 16 Mar 2013 04:04:13 GMT</pubDate>
    <dc:creator>Julio Carvajal</dc:creator>
    <dc:date>2013-03-16T04:04:13Z</dc:date>
    <item>
      <title>ASA ssh timeout vulnerability</title>
      <link>https://community.cisco.com/t5/network-security/asa-ssh-timeout-vulnerability/m-p/2160130#M377016</link>
      <description>&lt;P&gt;Hello&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is there anyone that face this recent vulnerability?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://tools.cisco.com/security/center/viewAlert.x?alertId=27927" target="_blank"&gt;http://tools.cisco.com/security/center/viewAlert.x?alertId=27927&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://tools.cisco.com/Support/BugToolKit/search/getBugDetails.do?method=fetchBugDetails&amp;amp;bugId=" target="_blank"&gt;http://tools.cisco.com/Support/BugToolKit/search/getBugDetails.do?method=fetchBugDetails&amp;amp;bugId=&lt;/A&gt;&lt;A href="https://www.cisco.com/cisco/psn/bssprt/bss?searchType=bstbugidsearch&amp;amp;page=bstBugDetail&amp;amp;BugID=CSCtc59462" target="_blank"&gt;CSCtc59462&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My understanding is that for ASA 8.4.1 and prior, there's a vulnerability that opening many ssh sessions and one of them times out, the firewalls crashes!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As we have many customers with ASA using 8.2.5(26) (for example) I'd like a confirmation that for fixing that bug I need to upgrade my ASA image to at least 8.4.x.&lt;/P&gt;&lt;P&gt;Case that, I believe that all the former firewall configuration must be reviewed because 8.2.x version has many different commands that 8.4.x (for example, NAT)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope that Cisco provide a patch for 8.2.x versions&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 01:03:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-ssh-timeout-vulnerability/m-p/2160130#M377016</guid>
      <dc:creator>Christian Jorge</dc:creator>
      <dc:date>2019-03-12T01:03:54Z</dc:date>
    </item>
    <item>
      <title>ASA ssh timeout vulnerability</title>
      <link>https://community.cisco.com/t5/network-security/asa-ssh-timeout-vulnerability/m-p/2160131#M377017</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Christian, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For the time being, I dont see a fixed version in the 8.2 trend. Mostlikely the code update may need to go up to 8.4 to be sure that you are not going to run with this issue. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 25 Feb 2013 23:43:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-ssh-timeout-vulnerability/m-p/2160131#M377017</guid>
      <dc:creator>Maykol Rojas</dc:creator>
      <dc:date>2013-02-25T23:43:10Z</dc:date>
    </item>
    <item>
      <title>ASA ssh timeout vulnerability</title>
      <link>https://community.cisco.com/t5/network-security/asa-ssh-timeout-vulnerability/m-p/2160132#M377018</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I'd like an official confirmation from Cisco, regarding upgrades of prior versions (like 8.2)&lt;/P&gt;&lt;P&gt;It seems that this vulnerability could affect many devices in the world and the migration to the last version base (for example 8.4, 9.1) could be traumatic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Another point, there are some ASA devices (for example old 5520) that could not support newer image versions (due to hardware restrictions, for example 512MB)&lt;/P&gt;&lt;P&gt;How could we deal with this case, only upgrading the hardware?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 27 Feb 2013 17:59:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-ssh-timeout-vulnerability/m-p/2160132#M377018</guid>
      <dc:creator>Christian Jorge</dc:creator>
      <dc:date>2013-02-27T17:59:55Z</dc:date>
    </item>
    <item>
      <title>ASA ssh timeout vulnerability</title>
      <link>https://community.cisco.com/t5/network-security/asa-ssh-timeout-vulnerability/m-p/2160133#M377019</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Opened a TAC with Cisco for further analyzing&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cisco stated not planning a new patch for software 8.2, informing the possibility to harm all the software structure when trying building a fix. Although software 8.2 is not considered EOL, Cisco recommends an upgrade to newer version of software 8.4 (probably 9.x too)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This way, I think it lasts 2 choices regarding vulnerability/impact:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- continuing to use software 8.2 software knowing about the vulnerability and possibility of crash of the firewall. In a case of failover cluster, there would be a minimal impact due to firewall failover/switchover.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- trying to migrate to newer software versions (and a possibility of impact related to upgrading process and differences in config/commands among software versions)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The question now is: using version 8.2.5(26) which path do I have to choose for minimal impact/downtime:&lt;/P&gt;&lt;P&gt;8.2.5(26)-&amp;gt;8.3-&amp;gt;8.4-&amp;gt;newer 8.4.x ?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 14 Mar 2013 13:33:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-ssh-timeout-vulnerability/m-p/2160133#M377019</guid>
      <dc:creator>Christian Jorge</dc:creator>
      <dc:date>2013-03-14T13:33:37Z</dc:date>
    </item>
    <item>
      <title>ASA ssh timeout vulnerability</title>
      <link>https://community.cisco.com/t5/network-security/asa-ssh-timeout-vulnerability/m-p/2160134#M377020</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You can go straight from 8.2(5.26) to any of the 8.4 versions.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 15 Mar 2013 01:00:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-ssh-timeout-vulnerability/m-p/2160134#M377020</guid>
      <dc:creator>jocamare</dc:creator>
      <dc:date>2013-03-15T01:00:07Z</dc:date>
    </item>
    <item>
      <title>ASA ssh timeout vulnerability</title>
      <link>https://community.cisco.com/t5/network-security/asa-ssh-timeout-vulnerability/m-p/2160135#M377021</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Chrsitian,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As my co-worker correctly mentioned you can go straight to any of the 8.4 versions....&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now take into considerations there are several changes between one version and the other ( NAT,ACL,etc,etc) This to make our lifes easier,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;At the beginning might be hard but at the end you will see that everything was done to make everything easier...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now my recommendation&amp;nbsp; is GO TO THE newest version &lt;SPAN __jive_emoticon_name="grin" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/grin.gif"&gt;&lt;/SPAN&gt;.. I mean you have an ASA firewall, take advantage of this beauty and use as many features as you can &lt;SPAN __jive_emoticon_name="grin" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/grin.gif"&gt;&lt;/SPAN&gt; You will be amazed by the amount of new features add it on the new code.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Just to end here you have&amp;nbsp; a link so you can check the syntax changes for NAT and ACL's and the recommendations before an upgrade:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-wiki-small" href="https://community.cisco.com/docs/DOC-12690"&gt;https://supportforums.cisco.com/docs/DOC-12690&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So have fun man,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio Carvajal &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 15 Mar 2013 04:01:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-ssh-timeout-vulnerability/m-p/2160135#M377021</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2013-03-15T04:01:34Z</dc:date>
    </item>
    <item>
      <title>Re: ASA ssh timeout vulnerability</title>
      <link>https://community.cisco.com/t5/network-security/asa-ssh-timeout-vulnerability/m-p/2160136#M377022</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;P&gt;jcarvaja wrote:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;Now my recommendation&amp;nbsp; is GO TO THE newest version &lt;SPAN __jive_emoticon_name="grin" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/grin.gif"&gt;&lt;/SPAN&gt;.. I mean you have an ASA firewall, take advantage of this beauty and use as many features as you can &lt;SPAN __jive_emoticon_name="grin" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/grin.gif"&gt;&lt;/SPAN&gt; You will be amazed by the amount of new features add it on the new code.&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is a typical advice "go to the newest version" from someone who work for cisco and IMHO, a dumb one.&amp;nbsp; Have you ever worked in operational position?&amp;nbsp; If you're going to mention the "upside" of the new code, you also need to mention the "downside" of the new code as well, like a lot of bugs in the new code.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is the issue:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When you're working with the old code, you know what the issue(s) are and try to come up with a work-around, if possible, because you know exactly what the issue(s) are.&amp;nbsp; In other words, at least you know what you're dealing with.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When you upgrade to the newest version, you might fix that particular issue but you're going to deal with many unknown issues.&amp;nbsp; Are you willing to trade a "known" issue with many "unknown" issue(s)?&amp;nbsp; Reasonable people would &lt;EM&gt;&lt;STRONG&gt;not&lt;/STRONG&gt;&lt;/EM&gt;.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I learned this hard lesson many years ago when I was a junior engineer.&amp;nbsp; I had an&amp;nbsp; issue with the Pix code 7.0.2 code and the TAC engineer gave me the code 7.2.2(22) to put it on the production environment.&amp;nbsp; Guess what, the device rebooted itself when I typed "show run" and then "quit".&amp;nbsp; Yes, it did fix the problem that I had but rebooted the box.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You do NOT use the newest version because of bugs and issues that come with it because the newest version has not been vested yet.&amp;nbsp; The normal approach is to use a couple releases behind the newest version.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;my 2c&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 15 Mar 2013 10:12:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-ssh-timeout-vulnerability/m-p/2160136#M377022</guid>
      <dc:creator>david.tran</dc:creator>
      <dc:date>2013-03-15T10:12:18Z</dc:date>
    </item>
    <item>
      <title>Re: ASA ssh timeout vulnerability</title>
      <link>https://community.cisco.com/t5/network-security/asa-ssh-timeout-vulnerability/m-p/2160137#M377024</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;STRONG&gt;This is a typical advice "go to the newest version" from someone who work for cisco and IMHO, a dumb one.&amp;nbsp; Have you ever worked in operational position?&amp;nbsp; If you're going to mention the "upside" of the new code, you also need to mention the "downside" of the new code as well, like a lot of bugs in the new code.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So wrong......... If I have a device that supports A,B,C,D why would I conform just with A,B.. I mean for me&amp;nbsp; ( and anyone that knows what this ASA beauty is) I would take as much as I can from the unit. If I stay on that old version I would not do that. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And FYI on every version we have NEW bugs ( I mean nothing is perfect) BUT the previous bugs, those mention on the 8.2 track, 8.3,etc,etc,etc are supposed to be fixed on the new code implementation.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So it's a winning everywhere you see it.. If you want to be limited then be it and stay on that code but if you want to take advantage of what you have... Go to the release notes of the new version, check the NEW features, check the Open bugs and determine if it fits for you.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;&lt;STRONG&gt;I learned this hard lesson many years ago when I was a junior engineer.&amp;nbsp; I had an&amp;nbsp; issue with the Pix code 7.0.2 code and the TAC engineer gave me the code 7.2.2(22) to put it on the production environment.&amp;nbsp; Guess what, the device rebooted itself when I typed "show run" and then "quit".&amp;nbsp; Yes, it did fix the problem that I had but rebooted the box&lt;/STRONG&gt;.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;As a recommendation, try to check the release notes before an upgrade, that is a must.. Unless that was a new bug it should have appear there.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;NOTE: By newest mention we refered to the track version.............&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I like this discussions &lt;SPAN __jive_emoticon_name="grin" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/grin.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Have a great one David&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 15 Mar 2013 19:37:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-ssh-timeout-vulnerability/m-p/2160137#M377024</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2013-03-15T19:37:34Z</dc:date>
    </item>
    <item>
      <title>Re: ASA ssh timeout vulnerability</title>
      <link>https://community.cisco.com/t5/network-security/asa-ssh-timeout-vulnerability/m-p/2160138#M377025</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;P&gt;jcarvaja wrote:&lt;/P&gt;If I have a device that supports A,B,C,D why would I conform just with A,B.. I mean for me&amp;nbsp; ( and anyone that knows what this ASA beauty is) I would take as much as I can from the unit. If I stay on that old version I would not do that. &lt;P&gt;&lt;/P&gt;&lt;/PRE&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Yes, the device that supports A,B,C,D but I only need to use A &amp;amp; B so why would I need to upgrade to the latest.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; That is asking for trouble with the new bugs.&amp;nbsp; If you work in a "real" world, you would know that people separate &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; the function of Firewall and VPN into two different devices because it is much easier to manage.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;P&gt;jcarvaja wrote:&lt;/P&gt;&lt;P&gt;( and anyone that knows what this ASA beauty is) &lt;/P&gt;&lt;/PRE&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; I would not call the ASA a beauty.&amp;nbsp; It is still way behind Cisco IOS in term of VPN capability.&amp;nbsp; Example, it can not&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; terminate GRE on the ASA itself, and no BGP either.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;P&gt;jcarvaja wrote:&lt;/P&gt;And FYI on every version we have NEW bugs ( I mean nothing is perfect) BUT the previous bugs, those mention on the 8.2 track, 8.3,etc,etc,etc are supposed to be fixed on the new code implementation.&lt;BR /&gt;&lt;/PRE&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; That is precisely my point.&amp;nbsp; They mentioned all the previous bugs have been fixed but you will definitely run into new &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; one that you don't know.&amp;nbsp; You're trading old "known" issues with new "unknown" issues.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;P&gt;jcarvaja wrote:&lt;/P&gt;So it's a winning everywhere you see it.. If you want to be limited then be it and stay on that code but if you want to take advantage of what you have... Go to the release notes of the new version, check the NEW features, check the Open bugs and determine if it fits for you.&lt;/PRE&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; That might help a little bit but one needs to throughly test the code that you will deploy in your environmnet or you &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; will be sorry. Your statement of "winning everywhere" shows that you lack the knowledge of working in a production &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; environment where downtime is "not" an option.&amp;nbsp; I can not tell you how many times I've run into issues with sqlnet &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; and smtp with ASA that the only option is to disable sqlnet and smtp inspect.&amp;nbsp; So much for new features.&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;P&gt;jcarvaja wrote:&lt;/P&gt;As a recommendation, try to check the release notes before an upgrade, that is a must.. &lt;EM&gt;&lt;STRONG&gt;Unless that was a new bug&lt;/STRONG&gt;&lt;/EM&gt; it should have appear there.&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;NOTE: By newest mention we refered to the track version.............&lt;/SPAN&gt;&lt;/P&gt;&lt;/PRE&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; That's precisely the point.&amp;nbsp; You're trading old "known" bugs for new "unknown" bugs.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; The point I am taking from this is that unless it is a security vulnerability that I have to upgrade, I will stay away &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; and try to make it work as much as I can.&amp;nbsp; With the new code, it needs to vested throughly in-house (not by Cisco) &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; because Cisco does not understand my environment.&amp;nbsp; They may know the ASA but I don't know the applications&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; that operate in my environment.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 16 Mar 2013 01:58:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-ssh-timeout-vulnerability/m-p/2160138#M377025</guid>
      <dc:creator>david.tran</dc:creator>
      <dc:date>2013-03-16T01:58:56Z</dc:date>
    </item>
    <item>
      <title>Re: ASA ssh timeout vulnerability</title>
      <link>https://community.cisco.com/t5/network-security/asa-ssh-timeout-vulnerability/m-p/2160139#M377027</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello David,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We are definetly on a different page &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But... well.. Nice talking to you man.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Have a great night .&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 16 Mar 2013 04:04:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-ssh-timeout-vulnerability/m-p/2160139#M377027</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2013-03-16T04:04:13Z</dc:date>
    </item>
    <item>
      <title>ASA ssh timeout vulnerability</title>
      <link>https://community.cisco.com/t5/network-security/asa-ssh-timeout-vulnerability/m-p/2160140#M377028</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I performed my first asa software upgrade. Customer firewall this time has many VPNs configured but few NATs (some exempt and one PAT).&lt;/P&gt;&lt;P&gt;I follow the path: 8.2.5(26) -&amp;gt; 8.3.(2) -&amp;gt; 8.4.5(6)&lt;/P&gt;&lt;P&gt;The result:&lt;/P&gt;&lt;P&gt;- from 8.2.5(26) -&amp;gt; 8.3(2) : NAT-exempt conversion results a lot of garbage (all combinations related to source to all possible destination segments - as Nat-exempt declares no destination segments) and the dangerous "unidirectional" command after each NAT-exempt line converted.&lt;/P&gt;&lt;P&gt;- from 8.3(2) -&amp;gt; 8.4.5(6) there was no change in configuration (not even removing "unidirectional" commands in NAT)&lt;/P&gt;&lt;P&gt;Results: I had to clean all NAT garbage and delete all "unidirectional" command.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now I have to upgrade a firewall with a huge configuration, mixing PATs, Statics, NAT Exemption, Dynamic NAT.&lt;/P&gt;&lt;P&gt;What exactly path from 8.2.5(26) to 8.4.5(6) should I follow to have a smooth upgrade and convertion?&lt;/P&gt;&lt;P&gt;Shoud I use 8.3(1) path instead of 8.3(2), use both, use 8.4(2) after some 8.3.x to final version?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 08 Apr 2013 19:49:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-ssh-timeout-vulnerability/m-p/2160140#M377028</guid>
      <dc:creator>Christian Jorge</dc:creator>
      <dc:date>2013-04-08T19:49:10Z</dc:date>
    </item>
    <item>
      <title>ASA ssh timeout vulnerability</title>
      <link>https://community.cisco.com/t5/network-security/asa-ssh-timeout-vulnerability/m-p/2160141#M377029</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Go directly from 8.2 to 8.4.2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 08 Apr 2013 20:17:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-ssh-timeout-vulnerability/m-p/2160141#M377029</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2013-04-08T20:17:30Z</dc:date>
    </item>
    <item>
      <title>ASA ssh timeout vulnerability</title>
      <link>https://community.cisco.com/t5/network-security/asa-ssh-timeout-vulnerability/m-p/2160142#M377031</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello JCarvaja&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My main concern is regarding going from 8.2 directly to 8.4.2, the firewall ignores the NAT configuration. Not even the firewall try to translate or convert to new format.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As told in last topic, we have emulated software 8.4 and input all configuration still in 8.2 format as a script. All VPN configuration, for example has been automatically converted to new format (ikev1/ikev2 commands) after script input.&lt;/P&gt;&lt;P&gt;...but all NAT commands had gone, no convertion done by firewall.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 09 Apr 2013 02:01:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-ssh-timeout-vulnerability/m-p/2160142#M377031</guid>
      <dc:creator>Christian Jorge</dc:creator>
      <dc:date>2013-04-09T02:01:47Z</dc:date>
    </item>
    <item>
      <title>ASA ssh timeout vulnerability</title>
      <link>https://community.cisco.com/t5/network-security/asa-ssh-timeout-vulnerability/m-p/2160143#M377033</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello &lt;/P&gt;&lt;P&gt;Before the upgrade&lt;/P&gt;&lt;P&gt;remove nat-control&lt;/P&gt;&lt;P&gt;no names&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A _jive_internal="true" href="https://community.cisco.com/docs/DOC-12690"&gt;https://supportforums.cisco.com/docs/DOC-12690&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The NAT configuration should be done by itself.. Do you see any errors on the flash ( Startup-config errors)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 09 Apr 2013 04:01:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-ssh-timeout-vulnerability/m-p/2160143#M377033</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2013-04-09T04:01:38Z</dc:date>
    </item>
    <item>
      <title>ASA ssh timeout vulnerability</title>
      <link>https://community.cisco.com/t5/network-security/asa-ssh-timeout-vulnerability/m-p/2160144#M377034</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;No errors found, but in 8.4 emulations, no NATs anyway.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That documment relates only to 8.3 migration, not 8.4. As far as I know, Cisco recommends not jump intermediate versions for zero downtime upgrades (for example 8.2 directly to 8.3).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Even jumping directly from 8.2.5(26) to 8.4(2), my final goal would be 8.4.5(6). &lt;/P&gt;&lt;P&gt;So the your recommendation path would be8.2.5(26)-&amp;gt;8.4.2 -&amp;gt; 8.4.5(6)?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards and thanks for helping me&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 09 Apr 2013 12:49:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-ssh-timeout-vulnerability/m-p/2160144#M377034</guid>
      <dc:creator>Christian Jorge</dc:creator>
      <dc:date>2013-04-09T12:49:55Z</dc:date>
    </item>
    <item>
      <title>ASA ssh timeout vulnerability</title>
      <link>https://community.cisco.com/t5/network-security/asa-ssh-timeout-vulnerability/m-p/2160145#M377037</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Zero-downtime it's exclusive for FAILOVER, if you do not have a failover pair then you should not consider that.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I mean zero-downtime with a single unit will never happen ( the unit MUST be rebooted)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The document refers to 8.3 and higher versions, I highly recommend to avoid the 8.3 track and I can ensure you my colleagues at TAC will do the same,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So go from 8.2 to 8.4.5(6) directly, the migration should happen &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 09 Apr 2013 16:31:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-ssh-timeout-vulnerability/m-p/2160145#M377037</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2013-04-09T16:31:21Z</dc:date>
    </item>
    <item>
      <title>ASA ssh timeout vulnerability</title>
      <link>https://community.cisco.com/t5/network-security/asa-ssh-timeout-vulnerability/m-p/2160146#M377038</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Good Morning JCarvaja&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Considering your recommendation (and probably, as you told, Cisco TAC recommendation) is there any trap or recommendation regarding my configuration?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- 2 firewall ASAs as failover active-standby&lt;/P&gt;&lt;P&gt;- names configured&lt;/P&gt;&lt;P&gt;- no nat-control&lt;/P&gt;&lt;P&gt;- IPSec VPN client-to-gateway and gateway-to-gateway, client-to-gateway authentication by AAA LDAP server&lt;/P&gt;&lt;P&gt;- some static router with tracking (no dynamic routing)&lt;/P&gt;&lt;P&gt;- no specific policy-maps (only default)&lt;/P&gt;&lt;P&gt;- NATs: exempt for VPNs, policy PAT, usual static and policy static.&lt;/P&gt;&lt;P&gt;- outside to inside access-list rules with mapped IPs in destination (usual for static NATs in 8.2 version)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is there any impact regarding inputing "no names"?&lt;/P&gt;&lt;P&gt;Is there any inconsistency regarding failover with 8.2 and 8.4.5 for a while during migration?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 09 Apr 2013 17:30:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-ssh-timeout-vulnerability/m-p/2160146#M377038</guid>
      <dc:creator>Christian Jorge</dc:creator>
      <dc:date>2013-04-09T17:30:41Z</dc:date>
    </item>
    <item>
      <title>ASA ssh timeout vulnerability</title>
      <link>https://community.cisco.com/t5/network-security/asa-ssh-timeout-vulnerability/m-p/2160147#M377040</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;Is there any impact regarding inputing "no names"?&lt;/P&gt;&lt;P&gt; Negative, not at all.. All positive as we are not longer using it on the newer versions&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is there any inconsistency regarding failover with 8.2 and 8.4.5 for a while during migration?&lt;/P&gt;&lt;P&gt;As long as you proceed with a zero-downtime failover you should be good.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Make sure the NAT exemption rules are as specific as possible&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio Carvajal &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 09 Apr 2013 21:02:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-ssh-timeout-vulnerability/m-p/2160147#M377040</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2013-04-09T21:02:51Z</dc:date>
    </item>
    <item>
      <title>ASA ssh timeout vulnerability</title>
      <link>https://community.cisco.com/t5/network-security/asa-ssh-timeout-vulnerability/m-p/2160148#M377042</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Any concern or recommendation regarding outside to inside access-list rules with mapped IPs in destination or the mapped (static NAT'ed) destination is converted automatically to real IP destination based on the former static rule ?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 10 Apr 2013 17:32:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-ssh-timeout-vulnerability/m-p/2160148#M377042</guid>
      <dc:creator>Christian Jorge</dc:creator>
      <dc:date>2013-04-10T17:32:58Z</dc:date>
    </item>
    <item>
      <title>ASA ssh timeout vulnerability</title>
      <link>https://community.cisco.com/t5/network-security/asa-ssh-timeout-vulnerability/m-p/2160149#M377043</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Christian,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Nope, just remember to make the nat exemption rules are specific as possible ( try not to overlap ) and you should be fine&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 10 Apr 2013 17:43:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-ssh-timeout-vulnerability/m-p/2160149#M377043</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2013-04-10T17:43:40Z</dc:date>
    </item>
  </channel>
</rss>

