Table of Contents
Release Notes for the Cisco 7600 Wireless Security Gateway, Release 4.3.1
WSG Release 4.3.1—Open Caveats
Open Caveats Prior to WSG Release 4.3.1
WSG Release 4.3.1—Resolved Caveats
Resolved Caveats Prior to WSG Release 4.3.1
Obtaining Documentation and Submitting a Service Request
Release Notes for the
Cisco 7600 Wireless Security Gateway,
Release 4.3.1
This document explains features, requirements, and caveats for the Cisco 7600 Wireless Security Gateway (WSG), Release 4.3.1.
Features
The WSG is a high-density IPSec gateway for mobile wireless carrier networks. IP Security (IPSec) is an open standards set. IPSec gives confidentiality, integrity, and authentication for data between IP layer peers. The WSG uses an IPSec-protected tunnel to connect outside endpoints.
The WSG runs on the Cisco Service and Application Module for IP (SAMI), a new-generation high performance service module for the Cisco 7600 series router platforms.
For more information about the WSG, see the Cisco 7600 Wireless Security Gateway Configuration Guide, Release 4.3 . For more information about the Cisco SAMI, see the Cisco Service and Application Module for IP User Guide .
WSG Release 4.3 supports the following features:
- DHCPv6 address allocation.
- IKEv2 redirect.
- High Availability Active-Active Redundancy Mode.
- Path MTU.
- SSH authentication using RADIUS.
- Reverse DNS lookup for IKE peers.
- S2S blacklisting.
- IPv6.
- Virtual Routing and Forwarding (VRF).
- Data Plane Routing.
- SSH server.
- Per Peer IP tunnel debug.
- Reverse Route Injection (RRI).
- Peer authentication through EAP-MD5, EAP-AKA and EAP-SIM.
- RADIUS Accounting.
- Traffic-based Phase 2 rekey.
- Blacklisting remote peer.
- Multiple IKE proposals.
- Multiple DH groups, EAP authentication algorithms, and transform sets.
- DHCP address allocation.
- High Availability Active-Standby Redundancy Mode.
- Site-to-Site scalability improvements.
- Certificate Management Protocol.
- Online Certificate Status Protocol.
- IKEv1 and IKEv2 and Public Key Infrastructure (PKI).
- Both remote access and site-to-site type profiles can be used in combination on a SAMI.
- The DPD initiation feature allows the WSG to send DPD to peers at a regular interval. This allows WSG to detect and remove dead connections or peers.
- WSG supports the extended form of traffic selectors.
- Multiple Child SAs—For a single IKE association with a peer, multiple child IPSec SAs can be created, each with its own traffic selector rules.
- DNS to AP feature allows the WSG to pass the DNS server IP address to the remote peer.
- The WSG supports platform traps for PPC CPU congestion and memory exhaustion.
- The OAM traffic routing feature allows the WSG to do static routes on the PPC to carry OAM traffic directly to a local network through a VLAN interface.
- Single Entity configuration allows you to configure the SAMI from a single login interface rather than going to each of the 6 PPCs individually and configuring them.
- All traps, syslog and SNMP stats are sent from a single PPC. For SNMP stats, the external SNMP manager goes to the single PPC to retrieve stats for all the PPCs.
- The PPC Traffic Throttle feature, throttles the number of IKE INIT messages sent to the PPC. This prioritizes the DPD traffic over new tunnel requests, and allows existing tunnels to remain intact.
- WSG supports debugs using the CLI.
- Diffie-Helman (DH) Groups 14, 15, 16, 17, and 18 are added to groups 1, 2 and 5 .
- WSG adds Extended Sequence Number (ESN) support as longer lifetimes are expected in customer deployments. Additionally, higher traffic is expected in site-to-site setups. Extended Sequence Number (64 bit sequence number) implementation is required in such cases.
- Processes Internet Key Exchange version 2 (IKEv2) initialization requests from endpoints.
- Creates IPSec tunnels.
- Exchanges information with endpoints.
- Authenticates endpoints.
- Assigns IP addresses to endpoints.
- Does cryptographic algorithm negotiation.
- Rekeys security associations (SAs).
- Does traffic selector negotiation.
- Supports network address translation (NAT) traversal.
- Encrypts, decrypts, authenticates, encapsulates, and decapsulates packets.Capacity and performance limit recognition, providing system wide throughput capacity characteristics and helping to identify the traffic load for future expansion.
- Fresher IKE/IPSec statistics will be delivered via SNMP. In earlier releases, the same statistics could be up to 10 minutes stale. Now user can configure the freshness to be adjusted dynamically based on number of SAs, or be set to a fixed interval between 1 and 300 seconds.
- Load balancing in support of 100 % uni-directional ESP or clear traffic.
- Upgrade support from release 3.1.1. to release 4.x.
- Performance and throughput indicators to provide system wide throughput capacity characteristics of WSG.
- Persistent IKE/IPSec tunnel index for SNMP during a tunnel’s lifetime.
Requirements
For hardware requirements, such as power supply and environmental requirements, as well as hardware installation instructions, see the Cisco Service and Application Module for IP User Guide .
WSG Release 4.3 software application ships preloaded on the Cisco SAMI processors with fully-functional default settings. During an image upgrade, the image is automatically loaded onto each SAMI processor.
WSG Release 4.3 requires the following hardware and software:
- Any module with ports connected to the network.
- Cisco 7600 Series Supervisor Engine 720 (WS-SUP720-3BXL) with a Multilayer Switch Feature Card 3 (WS-SUP720) or Policy Feature Card 3 (WS-F6K-PFC3BXL) running
Cisco IOS Release 12.2(33)SRC or later,Cisco Supervisor Engine 32 with a Multilayer Switch Feature Card 2A (MSFC2A) or Policy Feature Card 3 (PFC3B) running Cisco IOS Release 12.2(33)SRC or later.
The Cisco Supervisor Engine 32 requires LCP ROMMON version 12.2[121] or later on the
Cisco SAMI.For details on upgrading the Cisco IOS release running on the SUP, refer to the “Upgrading to a New Software Release” section in the Release Notes for Cisco IOS Release 12.2SR.
For details on verifying and upgrading the LCP ROMMON image on the Cisco SAMI, refer to the Cisco Service and Application Module for IP User Guide .
- Cisco Service and Application Module for IP (Cisco Product Number: WS-SVC-SAMI-BB-K9) with the 2 GB memory option (Cisco Product Number: MEM-SAMI-6P-2GB[=]).
To find out which IOS version your system is running, log in to the SUP and enter the show version command.
To find out which WSG version your system is running, establish a session with a PPC, and enter the show version command.
Caveats
Caveats are unexpected behavior in Cisco software releases. Severity 1 caveats are the most serious caveats, Severity 2 caveats are less serious, and Severity 3 caveats are moderate. Typically, only Severity 1, Severity 2, and select Severity 3 caveats are included in the caveats lists.
If you have an account with Cisco.com, you can use the Bug Navigator II tool to find the current list of caveats of any severity for any software release. To access the Bug Navigator II tool, go to http://www.cisco.com/support/bugtools .
Open Caveats Prior to WSG Release 4.3.1
The following caveats are unresolved in this release:
Description: WSG data path might crash intermittently. This condition might occur with IPv6 over IPv4 traffic.
Description: The gateway address should be verified as routable before being accepted. If it fails then an error code should be returned.
Description: Following configuration issues observed in crypto ipsec-fragmentation configuration.
– User unable to know the default path MTU since both following configuration are consider as default but not in running configuration, though the configuration successful.
– After crypto ipsec-fragmentation none configured and saved to start configuration, then after sami reload, then new tunnel established, the path MTU is 1400 instead 0.
– Path MTU is changed in CLI output but function does work for existing tunnel.
Description: WSG doesn't provide ipv6 interface and address information via SNMP get or snmpwalk. This is seen with ipv6 interface and address information.
In WSG Release 4.2 and above when a customer is configuring a site to site access permit, a check has been added to determine, if the user has configured overlapping traffic selectors. If mis-configured, a warning will be triggered to the user and will be logged into the syslog.
Description: After removing a root certificate from the WSG configuration, the removal appears to be successful. However, the root certificate is not deleted from the WSG database.
– Attempting to remove a root certificate while crypto profiles are active.
– Attempting to update an existing root certificate while crypto profiles are active.
Workaround: Deactivate all crypto profiles when deleting or modifying root certificates.
Description: This issue may be observed when the above mentioned CLI is executed on the WSG instance. Upon execution:
– It allows sending the traffic up to size 1300.
– Traffic gets dropped and no error is reported when the traffic size is between 1300 and 1400.
– “Destination un-available (Fragmentation needed) error is reported when the traffic size exceeds 1400
Workaround: It is possible to mitigate this issue by reconfiguration.
Description: This issue may be observed when WSG is in the idle state and no profile is selected. In some scenarios following trace is observed:
[7ffc9d00] [40005cc0] show_stack+0x58/0x198 (unreliable)
[7ffc9d50] [40287488] yield+0x54/0x68
[7ffc9d60] [401abe2c] netlink_broadcast+0x32c/0x35c
[7ffc9db0] [401ac45c] nlmsg_notify+0x60/0xa0
WSG Release 4.3.1—Resolved Caveats
The following caveat is resolved in WSG Release 4.3.1:
Description: When the AP has two different certs with the same subject name and tries to create two different tunnel with WSG, Authentication failure is seen.
Resolved Caveats Prior to WSG Release 4.3.1
The following caveats are resolved in WSG Release 4.3:
Description: Session to LCP from SUP may not work at times showing the following message:
If the sysmgr cores in LCP, without this DDTS fix, core will not be copied to dir core: In LCP and sysmgr, core will not result in SAMI reload. Also, sysmgr will keep generating core files in /var/tmp directory leading to /var/tmp getting full.
Description: Removed the DHCPv6 configs, de-activated and also removed from the profile, however, new address-pool config fails with the cause “Remove DHCP server configuration before adding address pools”.
When the DHCPv6 config is removed and the profile de-activated, configure the address-pool config and activate the profile. Profile should get activated.
Description: Address pool configs cannot be removed even after de-activating the profile.
This condition is seen when an address pool is configured with an active profile. WSG wont allow un-configuring address pool when the profile is in active state.
Description: WSG blocks user from configuring 0.0.0.0 as access-permit IP address
This condition occurs when user tries to configure 0.0.0.0 as access permit under any profile.
Description: During the unexpected reload of any of the SAMI processors possibly due to a software defect, the SAMI LCP attempts to collect debug information that will help determine the cause of the unexpected reload. On rare occasions, the LCP itself can undergo an unexpected reload during such information collection with the following error message:
%SAMI-2-SAMI_SYSLOG_CRIT: SAMI <CmdArg>slot<noCmdArg>/0: %SAMI-2-443001: System experienced fatal failure.Service name:sme(<CmdArg>pid<noCmdArg>) crashed, could not save last core,mv command failed, code 256,reloading systemDescription: Core Dump File includes Proc Mem Info Details. LCP Sysmgr crashes due to Proc Memory Info Corruption.
The following caveats were resolved in WSG Release 4.2:
Description: In this scenario there are 16k and 8 k IPv6 tunnels on different profiles and VRF. When WSG initiated P2 re-keys fail due to TS lookup failure on any of the profile. The active WSG IpSec process hangs after 99% completion, after execution of clear cry ips sa – command. Then it again initiates the set-up of 16 k IPv6-VRF tunnels for both profiles. It also requires to load both the active as well as stand-by WSG for recovery.
Description: This issue is observed when a single SNMP getnext request tries to query two objects from the ipAddress Table. The OID of the second result is incorrect in most cases. This issue is observed only when there are more than two queries in a single getnext request.
Workaround: Whenever the SNMP getnext is used, the request should be split into single OID queries.
The following caveats were resolved in WSG Release 4.0.3:
After a phase-2 re-key, a small number of IPSec tunnels (approx. 10-20) may be deleted.
This has been seen with large number of tunnels (8500 tunnels on each PPC) established at a high rate and the lifetime was set to a short value in an engineering environment.
Description: After removing a root certificate from the WSG configuration, the removal appears to be successful. However, the root certificate is not deleted from the WSG database.
– Attempting to remove a root certificate while crypto profiles are active.
– Attempting to update an existing root certificate while crypto profiles are active.
Workaround: Deactivate all crypto profiles when deleting or modifying root certificates.
Description: With a BGP related configuration for the WSG Reverse Route Injection (RRI) feature, the removal of the BGP configuration off the WSG may result in an abnormal SAMI reload.
Workaround: Block the BGP neighbors from sending any routes to the WSG. Remove the BGP neighbor configurations one by one before removing the BGP configuration.
Description: This occurs if a SNMP getnext is the first operation performed on the objects after the tunnel is established.
Workaround: Do not perform getnext immediately after establishing the tunnel. If the getnext operation is the first one performed, the returned values will be correct after the tunnel has been established for at least 15 minutes.
Description: This occurs after connectivity is lost with the BGP neighbor for more than 3 minutes.
Workaround: Remove and re-add the BGP neighbor configuration.
Description: Normally, the “copy start run” command is used at the beginning of setup. In a case where the user used this command after the tunnels were created, we observed all of the tunnels were torn down (e.g. the start and running configurations were the same). This bug was filed to find a way to avoid it.
Description: The values returned by snmpwalk on ceipSecGlobalStats and some cikeGlobalStats objects are not accumulated across all PPCs.
Snmpwalk on CISCO-ENHANCED-IPSEC-FLOW-MIB stops.
The HA switchover occurs during the snmpwalk.
Workaround: Re-run the snmpwalk after the switchover is complete. The required statistics are not available immediately after the switchover.
Description: Output from crypto debugs is displayed incorrectly. SAMI resets after enabling crypto debugs and debug messages are displayed. WSG is configured with a timezone consisting of at least four characters.
Workaround: Ensure that the configured timezone is less than four characters.
The following caveats were resolved in WSG Release 3.0:
The CMP initialize command returns error when executed.
This occurs when the access method (as indicated in the URL) to the CA server is TCP.
Workaround: Use the HTTP access method (http://...) in the CMP initialize command to communicate with the CA server.
sh run in entity-all fails on one or another secondary PPC. snmpd does not respond to configuration request and times out with SAPS-->28 error.
This condition occurs when you execute snmpwalk on UDP-MIB in continuos loop with sleep 200 secs in between two successive iterations. In entity-all mode execute the show running-config command. snmpd on one or more secondary PPCs timeouts with SAPS-->28 error.
Workaround: On the bash shell of the secondary that got stuck, issue killall -9 snmpd command. This causes snmpd to re-spawn again.
The WSG deletes tunnels after an HA switchover.
This conditions rarely occurs when there are 100,000 remote-access tunnels established. With 100,000 tunnels established, 12 were deleted.
SNMP walk may periodically fail to poll MIB instances/elements on secondary WSGs.
SNMP walk fails to poll data from secondary WSG/PPC periodically. This situation occurs when CPU utilization on primary WSG increases considerably. However, the CPU utilization on secondary WSG always remain normal. High CPU utilization situation remains for very brief time period. The whole issue is not observed on tunnels established on primary WSG.
In the rare instance where a tunnel is not fully imported on the standby card, the standby cannot recover the tunnel from this issue.
To see if the standby card has a tunnel in this state, issue the show crypto isakmp summary command and show crypto ha db info command. This will show if a tunnel count mismatch has occurred.
Workaround: Reboot the standby card to force a new sync of the tunnels.
Observed SNMP crashinfo on SUP related to primary WSG/PPC3.
This condition occurred when we configured an SNMP related configuration on primary WSG/PPC. Leave these commands configured on the primary WSG for overnight tests. You may observe SNMP crashinfo files (on SUP disk0) due to SNMP process crash and re-initialization.
WSG Initiated IKEv2 Phase 2 rekey happens only for one child SA.
IKE SA with multiple child IPSec SAs, with Phase 2 rekeys initiated by WSG (client Phase 2 rekey lifetime > the Phase 2 lifetime configured on WSG).
Workaround: Initiate rekeys from the client side (configure client Phase 2 rekey lifetime < WSG Phase 2 lifetime).
The UDP source port is not correctly displayed using the show crypto ipsec sa remote-ip command.
This problem occurs under the following conditions:
– IPSec tunnel is established via a device performing PAT.
– A condition triggers a source port change (for example, a timeout).
Workaround: Use the show crypto isakmp sa command to display the UDP source port.
The ipsecpm process failed after tunnel failure with auto-initiate.
The ipsecpm failure is observed with the following conditions:
– IKE ID for the remote peer does not match the DN, and Certificate does not include a subjectALtName extension.
Workaround: Configure the remote peer to use DN as the ID.
Authentication sometimes fails when there is more than one trust point configured.
If you have two trust points configured, two entries of get certificate request in IKE_SA_INIT all point to the certificate in the first trust point.
Workaround: One trust point works.
The following caveat was resolved in WSG Release 2.2.2:
Description: IPSec tunnel establishment fails when certificate based authentication is used. The messages "Certificate Path Construction Failed" or "No Certificate Found Anywhere" appear in the WSG event log. This symptom occurs when the certificates in use have an entry for "CAIssuers" in the AIA extension.
Workaround: Use certificates that do not use “CAIssuers” in the AIA extension.
The following caveats were resolved in WSG Release 2.2.1:
Description: The WSG sends DHCP release prematurely under certain conditions:
1. Access Point reboot on an existing IPSec tunnel.
2. The reboot cycle occurs before the WSG can delete the IPSec tunnel via dead-peer-detection.
The WSG sends the DHCP release when the old tunnel is deleted.Workaround: The client IP address is re-assigned via DHCP when the IKE SA is rekeyed, provided
the address is still available. Otherwise, the tunnel is torn down, requiring re-establishment by the Access Point.
- CSCtq89837—WSG allows tunnels to be established with remote peer ID not matching the ID in the remote peer certificate
Description: WSG allows tunnels to be established with remote peer ID not matching the ID in the remote peer certificate. This issue is seen in 2.X images.
The following caveats were resolved in WSG Release 1.2:
Description: Some tunnels are deleted by WSG. The corresponding IKE error counters do not show any errors.
This happens in multiple circumstances:
1. Immediately after a large number of tunnel creation (For example, when creating tunnels at 90 tunnels per second).
2. If the client does not respond to the INFORMATIONAL messages (and probably the IKE timeout happens).
Description: The snmpwalk utility returns zero values for all instance statistics (per tunnel in/out packets and octets) for the cisco-enhanced-ipsec-flow-mib table.
Workaround: Use the snmpget utility to see valid statistics for each specific instance.
Description: Crashinfo files for syslogd are created and saved to the SUP. No other problems are observed with syslog after the SAMI comes up. The files are saved to the SUP after the SAMI is reset. This could occur after upgrading the software image (a reset is required to complete the upgrade), or simply resetting the SAMI.
Description: Adding new trustpoint (i.e. root) certificates to the WSG configuration requires deactivation of all crypto profiles. Additional root certificates are required when tunnels are already established.
Description: Multiple access-permit statements cannot be configured in remote access crypto profiles.
Description: The show crypto ipsec sa command does not display all of the traffic selector information. Only the first traffic selector data is displayed. Occurs when:
– Remote access crypto profile configuration on WSG.
– Remote access tunnels are established using multiple traffic selectors.
Description: Attempting to configure the remote secret results in the message, “Configuration failed in ipsecpm.” Occurs when the user attempts to configure the remote secret parameter while a crypto profile is active.
Workaround: Deactivate all profiles prior to configuring the remote secret.
Description: Traffic lost on a particular WSG or the show arp command displays the wrong MAC address. Occurs when HSRP WSG active/standby is configured.
Workaround: Reload the WSG exhibiting this problem.
Description: WSG has no configuration after a reboot. The startup configuration is corrupted. Occurs after these steps:
– An error condition such as SAP->611 is encountered which prints an error message into the running configuration when it is displayed using the show running-configuration command.
– User saves the running configuration.
Workaround: If an error message is displayed during the execution of the show running-configuration command, do not save the running configuration.
Description: The standby WSG will sporadically usurp the MAC address of the active WSG and announce itself causing ARP resolution to fail. This issue can also cause a failure to pass traffic on newly added routes. This issue is seen intermittently in a redundant HA setup when there is no traffic for a period longer than 5 minutes.
Workaround: Configure mac mac-address table timeout to 4 hours on the appropriate VLAN. Adding new routes requires a WSG reload to take effect.
Description: ESP packets are dropped on the WSG. This issue occurs when the VLAN currently configured on a PPC was previously configured on a lower numbered PCC, and the SAMI was not reset since that last configuration change. The information pertaining to the previously configured VLAN is not removed from memory when the configuration changes.
Description: Traffic fails on an IPSec tunnel. The tunnel does not pass traffic until a subsequent IPSec SA (phase-2) rekey occurs on the same tunnel.
– Remote access tunnels are terminated on WSG.
– Tunnels are terminated on two adjacent PPCs (e.g. 3 and 4, or 7 and 8).
– Multiple traffic selectors are configured or negotiated for the tunnels terminating on the higher numbered PPC.
– A phase-2 rekey occurs on a tunnel terminating on the higher numbered PPC. This triggers the traffic loss on a tunnel terminating on the lower numbered PPC.
Workaround: If remote-access tunnels with multiple traffic selectors are needed, do not terminate tunnels on an adjacent, lower numbered PPC.
Description: Traffic does not pass through the WSG even though the IPSec tunnel is successfully established. This issue has been observed after configuration changes to VLAN interfaces on different WSG instances (i.e. PPCs) on the same SAMI. Typically, the VLANs are reused but moved to interfaces on different WSG instances.
Description: The following message may appear in the system log. However, the system does not reload:
Jun 9 2008 00:53:01: %ACE-2-443001: System experienced fatal failure.Service name:System Manager (core-server)(30822) has terminated on receiving signal 11,reloading systemThis process is not supposed to initiate a system reset. It is spawned upon demand and will be re-created as necessary.
Related Documentation
For more detailed installation and configuration information, see the following publications:
- Cisco Wireless Security Gateway Release Configuration Guide for Release 4.2
- Cisco Service and Application Module for IP User Guide
- Application Control Engine Module Server Load-Balancing Configuration Guide
- Release Notes for Cisco IOS Release 12.2SR for the Cisco 7600 Series Routers
- Cisco 7600 Series Cisco IOS Software Configuration Guide
- Cisco 7600 Series Cisco IOS Command Reference
- For information about MIBs, see:
http://www.cisco.com/public/sw-center/netmgmt/cmtk/mibs.shtml
Obtaining Documentation and Submitting a Service Request
For information on obtaining documentation, using the Cisco Bug Search Tool (BST), submitting a service request, and gathering additional information, see What’s New in Cisco Product Documentation at: http://www.cisco.com/c/en/us/td/docs/general/whatsnew/whatsnew.html .
Subscribe to What’s New in Cisco Product Documentation , which lists all new and revised Cisco technical documentation, as an RSS feed and deliver content directly to your desktop using a reader application. The RSS feeds are a free service.
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL: www.cisco.com/go/trademarks . Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (1110R)
Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be actual addresses and phone numbers. Any examples, command display output, network topology diagrams, and other figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses or phone numbers in illustrative content is unintentional and coincidental.