Cisco Cisco ASA 5525-X Adaptive Security Appliance - No Payload Encryption Notas de publicación
5
Release Notes for Cisco ASDM, Version 6.7(x)
New Features
New Features
Note
New, changed, and deprecated syslog messages are listed in the syslog messages guide.
Released: October 16, 2012
lists the new features for ASA Version 8.7(1.1)
/
ASDM Version 6.7(1).
Note
Version 8.7(1) was removed from Cisco.com due to build issues; please upgrade to Version 8.7(1.1) or
later.
later.
Table 3
New Features for ASA Version 8.7(1.1)/ASDM Version 6.7(1)
Feature
Description
Platform Features
Support for the ASA 1000V
We introduced support for the ASA 1000V for the Nexus 1000V switch.
Cloning the ASA 1000V
You can add one or multiple instances of the ASA 1000V to your deployment using the method
of cloning VMs.
of cloning VMs.
Management Features
ASDM mode
You can configure, manage, and monitor the ASA 1000V using the Adaptive Security Device
Manager (ASDM), which is the single GUI-based device manager for the ASA.
Manager (ASDM), which is the single GUI-based device manager for the ASA.
VNMC mode
You can configure and manage the ASA 1000V using the Cisco Virtual Network Management
Center (VNMC), which is a GUI-based multi-device manager for multiple tenants.
Center (VNMC), which is a GUI-based multi-device manager for multiple tenants.
XML APIs
You can configure and manage the ASA 1000V using XML APIs, which are application
programmatic interfaces provided through the Cisco VNMC. This feature is only available in
VNMC mode.
programmatic interfaces provided through the Cisco VNMC. This feature is only available in
VNMC mode.
Firewall Features
Cisco VNMC access and
configuration
configuration
Cisco VNMC access and configuration are required to create security profiles. You can
configure access to the Cisco VNMC through the Configuration > Device Setup > Interfaces
pane in ASDM. Enter the login username and password, hostname, and shared secret to access
the Cisco VNMC. Then you can configure security profiles and security profile interfaces. In
VNMC mode, use the CLI to configure security profiles.
configure access to the Cisco VNMC through the Configuration > Device Setup > Interfaces
pane in ASDM. Enter the login username and password, hostname, and shared secret to access
the Cisco VNMC. Then you can configure security profiles and security profile interfaces. In
VNMC mode, use the CLI to configure security profiles.
Security profiles and
security profile interfaces
security profile interfaces
Security profiles are interfaces that correspond to an edge security profile that has been
configured in the Cisco VNMC and assigned in the Cisco Nexus 1000V VSM. Policies for
through-traffic are assigned to these interfaces and the outside interface. You can add security
profiles through the Configuration > Device Setup > Interfaces pane. You create the security
profile by adding its name and selecting the service interface. ASDM then generates the
security profile through the Cisco VNMC, assigns the security profile ID, and automatically
generates a unique interface name. The interface name is used in the security policy
configuration.
configured in the Cisco VNMC and assigned in the Cisco Nexus 1000V VSM. Policies for
through-traffic are assigned to these interfaces and the outside interface. You can add security
profiles through the Configuration > Device Setup > Interfaces pane. You create the security
profile by adding its name and selecting the service interface. ASDM then generates the
security profile through the Cisco VNMC, assigns the security profile ID, and automatically
generates a unique interface name. The interface name is used in the security policy
configuration.
We introduced or modified the following screens:
Configuration > Device Setup > Interfaces
Configuration > Device Setup > Interfaces > Add Security Profile
Monitoring > Interfaces > Security Profiles
Configuration > Device Setup > Interfaces > Add Security Profile
Monitoring > Interfaces > Security Profiles