Table Of Contents
Cisco Content Security and Control Version 6.1.1569.0 Patch Release Notes
This document contains release information for the Cisco Content Security and Control (CSC) Version 6.1.1569.0 patch release. It includes the following sections:
About the CSC 6.1.1569.0 Patch
The CSC Version 6.1.1569.0 patch contains the following new features:
•Password reset, which allows you to reset the default CSC SSM password to "cisco."
•A single password is required to access the CSC SSM GUI and CLI. For more information, see the Cisco Content Security and Control SSM Administrator Guide.
•Version numbering has been changed to reflect the software version number, build number, and patch release number. The format is as follows:
major software version.minor software version.build number.patch release number
•License renewal is available through the Cisco website.
•The TCP window size has been adjusted.
•The URL Reclassification Request has been changed to a web-based submission.
•Workaround to CSCsd17818: Use the adaptive security appliance Modular Policy Framework to bypass CSC SSM scanning of website IP addresses.
See the "Resolved Caveats" section for information about the caveats that have been resolved by this patch.
Installing the CSC SSM 6.1.1569.0 Patch
Install this patch only if you are running CSC SSM version 6.1-b1519 and version 6.1, patch 1. To verify the version of the CSC SSM installed on the device, see the "Verifying the Installed Version of the CSC SSM Software" section.
To upgrade the CSC SSM, perform the following steps:
Step 1 Download the csc-p-6.1.1569.0.pkg file from the Software Center on Cisco.com. You need to log into Cisco.com to download the software. If you do not have a Cisco.com account, visit the following website to become a registered user:
Step 2 Access the Trend Micro CSC SSM console by doing the following:
a. Launch ASDM.
b. Choose Configuration > Trend Micro Content Security.
Step 3 Choose Administrator > Product Upgrade from the menu.
Step 4 Click Browse and select the .pkg file you downloaded.
Step 5 Click Install.
Step 6 Click Summary to confirm the installed software version.
Step 7 Optional) Use an Eicar test file to confirm that the upgrade was successful and that the scanning services have been configured correctly.
For more information, see Appendix A, "Reimaging and Configuring the CSC SSM Using the CLI," in the Cisco Content Security and Control SSM Administrator Guide.
Verifying the Installed Version of the CSC SSM Software
You can confirm the version of the CSC SSM software, and software components and patches from the ASA 5500 series adaptive security appliance CLI.
Note The software version also appears on the main page of the Trend Micro InterScan for Cisco CSC SSM interface.
To view the version of software installed on the CSC SSM using the CLI, perform the following steps:
Step 1 Use the session command to access the CSC SSM. Use cisco as the login name.hostname(config)# session 1Opening command session with slot 1.Connected to slot 1. Escape character sequence is 'CTRL-^X'.login: ciscoPassword:Trend Micro InterScan for Cisco CSC SSM Setup Main Menu---------------------------------------------------------------------1. Network Settings2. Date/Time Settings3. Product Information4. Service Status5. Change Password for Command Line Interface6. Restore Factory Default Settings7. Troubleshooting Tools8. Reset Management Port Access Control List9. Ping10. Exit ...
Step 2 Type 3 and press Enter to access the Product Information screen.
The Product Information screen displays the version and build number of each component of the CSC SSM. Installed patches appear below the component list.Enter a number from [1-10]: 3Product Information---------------------------------------------------------------------Main version 6.1 build 1519Mail component version 5.5 build 1118Web component version 2.1 build 1154Patches:p-6.1-b1519-1 07/10/2006 22:31:14 CSC SSM 6.1 Patch 1Press Enter to continue ...
Step 3 Press Enter.
The Trend Micro InterScan for Cisco CSC SSM Setup Main Menu appears.
This section describes the open and resolved caveats for the CSC SSM 6.1.1569.0 release. To view more information about an open or resolved caveat, use the Bug Toolkit on Cisco.com. If you are a registered Cisco.com user, access the Bug Toolkit on cisco.com at the following website:
To become a registered Cisco.com user, go to the following website:
For your convenience in locating caveats in the Cisco Bug Toolkit, the caveat titles listed in this section are taken directly from the Bug Toolkit database. These caveat titles are not intended to be read as complete sentences, because the title field length is limited. In the caveat titles, some truncation of wording or punctuation may be necessary to provide the most complete and concise description. The only modifications made to these titles are as follows:
•Commands are in boldface type.
•Product names and acronyms may be standardized.
•Spelling and typographical errors may be corrected.
This section includes the following topics:
Table 1 lists the caveats that are open in Version CSC 6.1.1569.0.
Table 1 Open Caveats
ID Number Caveat Title
TCP flow dropped due to CSC card failed during SSM stress.
Yahoo! Finance MarketTracker does not work. For a workaround, see About the CSC 6.1.1569.0 Patch.
Nothing seems to happen when downloading infected file from/to webmail.
The HTTP proxy connection cannot tunnel through the CSC SSM.
FTP file blocking will not work when file unscanned due to cfg.
Connections may be interrupted during SSM service failure.
Connections may be interrupted during the SSM restarting period.
E-mail notification from the CSC SSM is not received.
With CSC enabled, large file transfer using HTTP/FTP or Windows Update fail.
Modify e-mails sent by Trend CSC-SSM module to include device name, IP.
The spyware pattern number may appear to be rolled back.
NRS feature is not working on the CSC SSM after registration.
Some spyware may be detected even if Spyware category is not enabled.
Fails to convert non-UTF8 Japanese characters to UTF-8.
Filename may not be properly displayed in the e-mail inline insertion.
Japanese strings may not be displayed correctly in system log messages.
Multi-byte strings are not allowed on the GUI.
Original e-mail may break if not encoded in UTF-8.
Multi-byte filename may not be displayed correctly.
Number of licensed seats shows a different value for Base and Plus licenses.
Citrix not supported with CSC module.
CSC module needs to support TFTP blocksize option - RFC 2347, RFC 2348.
CSC software blocks Ameritrade streamer.
CSC software stops processing POP3 traffic.
CSC module generates compact Flash almost-full messages.
VPN users using proxy have problem browsing via HTTP: 1264.
White IP List on NRS will disappear from Trend UI: 1253.
Bypass filter for CSC module.
HTTP scanner causes system to hit 100% busy.
CSC module - Import function for user-defined domain lists
Trend URL filtering service does not currently support SOCKS-based proxy service.
Last 30-day counter is not updating correctly.
Flash image on www.cisco.com home page sometimes cannot be loaded.
Table 2 lists the caveats that have been resolved in Version CSC 6.1.1569.0.
For additional information, see the ASDM online Help or the following documentation found on Cisco.com:
•Cisco Content Security and Control SSM Administrator Guide
•Cisco ASDM Release Notes
•Cisco ASA 5500 Series Hardware Installation Guide
•Cisco ASA 5500 Series Adaptive Security Appliance Getting Started Guide
•Cisco ASA 5500 Series Release Notes
•Cisco Security Appliance Command Line Configuration Guide
•Cisco Security Appliance Command Reference
Obtaining Documentation and Submitting a Service Request
For information on obtaining documentation, submitting a service request, and gathering additional information, see the monthly What's New in Cisco Product Documentation, which also lists all new and revised Cisco technical documentation, at:
Subscribe to the What's New in Cisco Product Documentation as a Really Simple Syndication (RSS) feed and set content to be delivered directly to your desktop using a reader application. The RSS feeds are a free service and Cisco currently supports RSS version 2.0.