05-15-2017 04:33 AM
this needs to be fixed to support SMBv2/3 rapidly, inline with guidance from Microsoft for mitigation of WannaCry and future exploits against the SMBv1 protocol.
https://blogs.technet.microsoft.com/msrc/2017/05/12/customer-guidance-for-wannacrypt-attacks/
Current stance from Cisco of "just enable SMBv1 again" isnt acceptable.
05-16-2017 09:49 AM
I am also currently facing this. SMBv1 is insecure and cannot be used. If Cisco doesn't do something about this we may have to decommission the product and go with a vendor who does support proper protocols.
Can anyone give insight to the AD agent that can be installed on the AD servers? Would this still require SMB at all to authenticate users?
05-16-2017 10:01 AM
There isn't an agent that gets installed on the AD servers.
You can deploy the CDA, a VM that is given access to the AD boxes. It scrapes the EventLog to get logins and IP's and passes that info to the WSA (and ASA).
You can also use ISE to do something similar.
05-16-2017 10:16 AM
Thank you Ken,
That clears some things up for me. Do you know if the solution via CDA would utilize SMBv1 at any point? I cant stress how important moving away from SMBv1 is as Thomas mentioned above.
05-16-2017 10:25 AM
We're currently using the CDA, however this still requires a domain join on the WSA (even for transparent identity) which still leverages SMBv1
05-16-2017 10:28 AM
Thank you Thomas,
That helps so I don't need to waste time going through an approval process to test it. Hopefully CIsco considers this a top priority.
05-17-2017 10:40 AM
I have a gc with SMB1 removed...
Time check still fails when I test against it using 10.1.1-234
05-17-2017 12:12 PM
Thank you. I had the same findings.
05-18-2017 12:29 AM
they really dont class it as urgent per their own annoucement:
https://bst.cloudapps.cisco.com/bugsearch/bug/CSCuo70696/?referring_site=bugquickviewredir
Support for SMBv2 and SMBv3 protocols on WSA is currently under development, and will be released for existing, and future releases of WSA by Q4CY17.
needless to say, we are displeased and are speaking with cisco regarding this, i recommend other do the same, more noise and cases that are raised for this will push it up their development timeframe.
05-18-2017 06:22 AM
Thank you Thomas,
We will also be contacting Cisco about this.
05-16-2017 10:27 AM
I'm still waiting for cisco to release new code with support for v2/v3. Have a TAC case open and now just waiting
05-17-2017 09:58 AM
I noticed 10.1.1 build 234 is available as of yesterday. Anyone got information regarding to this possibly having a fix?
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide