Cisco Cisco NAC Appliance 4.9.5 Release Notes

Page of 92
 
56
Release Notes for Cisco NAC Appliance, Version 4.9(5)
 
  New Installation of Release 4.9(5)
Resolved Caveats - NAC OpenSSL Vulnerability Patch-January 2015
You can download the NAC OpenSSL vulnerability patch from Cisco Software Download Site 
(
).
Resolved Caveats - NAC OpenSSL Vulnerability Patch-June 2015
You can download the NAC OpenSSL vulnerability patch from Cisco Software Download Site 
(
).
New Installation of Release 4.9(5)
The following steps summarize how to perform new CD software installation of Release 4.9(5) on 
supported Cisco NAC Appliance hardware platforms (see 
 for additional support details).
To upgrade on an existing Cisco NAC Appliance, refer to the instructions in 
Note
The click in the NAC is configured with default settings like default priority, CPU usage etc. The driver 
loop of the click thread uses the full CPU whenever other processes are idle. The CPU usage of click can 
reach 99%. As the thread runs with default priority, other processes like tomcat can take over whenever 
requests come for them. The high CPU usage of click will not lead to any performance issues.
For New Installation:
With Release 4.9(5), installation occurs in two phases: 
1.
The software is installed from the CD, and when complete, the CD is ejected from the appliance.
2.
The admin logs in and performs the initial configuration.
Table 9
List of Resolved Caveats
DDTS Number
NAC OpenSSL Vulnerability Patch-January 2015
Corrected
Caveat
CSCus42840 
Yes
January 2015 OpenSSL vulnerabilities
CSCus42836 
Yes
January 2015 OpenSSL vulnerabilities
Table 10
List of Resolved Caveats
DDTS Number
NAC OpenSSL Vulnerability Patch-June 2015
Corrected
Caveat
CSCuu82725 
Yes
Evaluation of Clean Access Server for OpenSSL June 2015 
CSCuu83378 
Yes
Evaluation of Clean Access Manager for OpenSSL June 2015