SMA 15 0 Release Notes
SMA 15 0 Release Notes
Contents
• What’s New in this Release, page 2
• Changes in Behavior, page 7
• Accessing the New Web Interface, page 14
• Upgrade Paths, page 16
• Installation and Upgrade Notes, page 17
• Supported Hardware for this Release, page 23
• Known and Fixed Issues, page 23
• End-of-Sale and End-of-Life Announcement for Cisco SecureX, page 24
• Related Documentation, page 24
• Service and Support, page 25
Note You must ensure that you provide your email identifier with the domain name while you login the spam
quarantine portal.
Note If you already have a Cisco SecureX account that is managed by different administrator login, Cisco
recommends that you register your devices with SSE first before you perform smart licensing
registration. You must not perform smart licensing registration without registering your device with SSE
first. This is a known issue- Defect ID- CSCvy10226.
Feature Description
FIPS Compliance Cisco Secure Email and Web Manager is FIPS
compliant and has integrated the following FIPS 140-2
approved cryptographic module: Cisco Common
Crypto Module (FIPS 140-2 Cert. #4036).
Release Notes for AsyncOS 15.0 for Cisco Secure Email and Web Manager - MD (Maintenance Deployment)
2
What’s New in this Release
Release Notes for AsyncOS 15.0 for Cisco Secure Email and Web Manager - MD (Maintenance Deployment)
3
What’s New in this Release
Configuring CRL Sources The Secure Email and Web Manager checks a list of
revoked certificates called a Certificate Revocation
List (CRL) as part of its certificate verification to
ensure that the user's certificate has not been revoked.
You need to keep an up-to-date version of this list on a
server, and the Secure Email and Web Manager
downloads it on a schedule you create. You can
manually update the list too.
You can configure CRL sources using the following
ways:
• Navigate to Network > CRL Sources > Add CRL
Source > Add CRL (Certificate Revocation
Lists) Source window in the legacy web interface.
• Use the Certconfig > CRL subcommand in the
CLI.
For more information on Configuring CRL Sources,
see "Configuring CRL Sources" section in the
"Common Administrative Tasks" chapter of the user
guide.
Release Notes for AsyncOS 15.0 for Cisco Secure Email and Web Manager - MD (Maintenance Deployment)
4
What’s New in this Release
Removal of Old Splunk Data When you upgrade to Secure Email and Web Manager
15.0 and later, and if email tracking data is contained
in the Splunk database, the system will delete the
Splunk database and binaries if you proceed with the
upgrade.
Release Notes for AsyncOS 15.0 for Cisco Secure Email and Web Manager - MD (Maintenance Deployment)
5
What’s New in this Release
Resetting the Network Configuration to the A new subcommand Reload Status that displays the
Initial Manufacturer Value status of the execution of the last Reload subcommand
(that resets the network configuration) is added to the
Diagnostic command.
Release Notes for AsyncOS 15.0 for Cisco Secure Email and Web Manager - MD (Maintenance Deployment)
6
Changes in Behavior
Microsoft Hyper-V Server 2019 Support Secure Email and Web Manager 15.0 supports the
Microsoft Hyper-V Server 2019.
Generation 2 Deployment Support for From AsyncOS 15.0 release onwards, Secure Email
Hyper-V and Web Manager supports only Generation 2
deployment for Hyper-V.
Changes in Behavior
• Changes in Behavior in AsyncOS 15.0.0-413, page 8
• Changes in Behavior in AsyncOS 15.0.0-334, page 8
Release Notes for AsyncOS 15.0 for Cisco Secure Email and Web Manager - MD (Maintenance Deployment)
7
Changes in Behavior
IOPS Optimization As part of ongoing performance improvements, the Secure Email and
Web Manager is optimized to perform the I/O (read and write)
operations efficiently. There are no functional changes made in this
release.
Release Notes for AsyncOS 15.0 for Cisco Secure Email and Web Manager - MD (Maintenance Deployment)
8
Changes in Behavior
Note After you upgrade to Secure Email and Web Manager 15.0 and
enable FIPS mode, you must subscribe to one of the logs again
to get the new ssh-rsa key and configure the ssh-rsa key in the
remote server.
Release Notes for AsyncOS 15.0 for Cisco Secure Email and Web Manager - MD (Maintenance Deployment)
9
Changes in Behavior
[For FIPS mode only]: To enable FIPS mode, make sure you first
disable the following cipher and host key algorithms that are non-FIPS
compliant using the sshconfig > sshd > setup subcommand in the CLI.
• Cipher algorithms - aes192-ctr
• Host key algorithm - ssh-rsa
Release Notes for AsyncOS 15.0 for Cisco Secure Email and Web Manager - MD (Maintenance Deployment)
10
Changes in Behavior
Release Notes for AsyncOS 15.0 for Cisco Secure Email and Web Manager - MD (Maintenance Deployment)
11
Changes in Behavior
Release Notes for AsyncOS 15.0 for Cisco Secure Email and Web Manager - MD (Maintenance Deployment)
12
Changes in Behavior
Modifications to the SPoG When you enable or disable SPoG, the session of all the users
feature concurrently logged into the new web interface becomes invalid, and a
new request to the server logs them out. The users must log in again.
Also, if a Secure Email and Web Manager is added to SPoG, and you are
currently logged into the new web interface of the same Secure Email
and Web Manager, then you will be logged out due to a change in the
flow of JWT validation.
Note The SPoG feature works only if all the Secure Email and Web
Manager under the SPoG cluster have the same version.
Message Tracking - Before this release, you could enter a-z, A-Z, 0-9, and any special
Remediation Action characters for the Remediation Batch Name and Description fields in the
Changes Confirm Remediation dialog box.
From this release onwards, you can only enter a-z, A-Z, 0-9, _, -, and
spaces for the Remediation Batch Name and Description fields in the
Confirm Remediation dialog box. Any other special characters are not
allowed.
No support for TLSv1.0 for Before this release, the Secure Email and Web Manager used TLSv1.0
communicatoin between to communicate with the syslog server irrespective of the TLS version
Secure Email and Web enabled on the syslog server.
Manager and syslog server From this release onwards, the Secure Email and Web Manager uses the
highest TLS version enabled on the syslog server. For example, if the
highest TLS version on the syslog server is 1.2, then Secure Email and
Web Manager uses TLSv1.2 to communicate with syslog server.
Warning Message for From this release onwards, when you upgrade from Secure Email and
Syslog Disk Buffer Size Web Manager 14.2 release to Secure Email and Web Manager 15.0
release if the syslog disk buffer size is set to 10 GB and the size of the
syslog disk buffer data exceeds 1 GB, the Secure Email and Web
Manager displays a warning message in the CLI and on the web
interface.
You can ignore the warning message and continue the upgrade process
or abort the upgrade. If you abort the upgrade process, you can connect
the Secure Email and Web Manager to the syslog server, drain the syslog
disk buffer data, and then perform the upgrade process.
Release Notes for AsyncOS 15.0 for Cisco Secure Email and Web Manager - MD (Maintenance Deployment)
13
Accessing the New Web Interface
Notification Message for Before this release, if any service task in the phase 2 backup process was
Phase 2 Backup Process in progress and exceeded 2 hours to complete, a notification message
was not sent to the administrator.
After you upgrade to this release, if any service task in the phase 2
backup process is in progress and exceeds 2 hours to complete, a
notification message is sent to the administrator informing the status of
the backup process along with the service name that is taking longer to
complete.
Time Zone -> Country From this release onwards, the United States option available in the
field changes Time Zone ->Country field is modified to the United States of
America.
The new web interface provides a new look for monitoring reports, quarantines, and searching for
messages.
Note The new web interface of your appliance uses AsyncOS API HTTP/HTTPS ports (6080/6443) and
trailblazer HTTPS port (4431). You can use the trailblazerconfig command in the CLI to configure
the trailblazer HTTPS ports. Make sure that the trailblazer HTTPS port is opened on the firewall.
You can access the new web interface in any one of the following ways:
• When trailblazerconfig CLI command is enabled, use the following URL -
https://example.com:<trailblazer-https-port>/ng-login
where example.com is the appliance host name and <trailblazer-https-port> is the trailblazer
HTTPS port configured on the appliance.
By default, trailblazerconfig is enabled on the appliance.
– Make sure that the configured HTTPS port is opened on the firewall. The default HTTPS port
is 4431.
– Also ensure that your DNS server can resolve the hostname that you specified for accessing the
appliance.
• When trailblazerconfig CLI command is disabled, use the following URL -
https://example.com:<https-port>/ng-login
where example.com is the appliance host name and <https-port> is the HTTPS port configured on
the appliance.
Note If the trailblazerconfig CLI command is disabled, you may need to add multiple certificates for
API ports for certain browsers.
Release Notes for AsyncOS 15.0 for Cisco Secure Email and Web Manager - MD (Maintenance Deployment)
14
Accessing the New Web Interface
• Log into the appliance and click Security Management Appliance is getting a new look. Try it !
to navigate to the new web interface.
The new web interface opens in a new browser window and you must log in again to access it. If you
want to log out of the appliance completely, you need to log out of both the new and legacy web
interfaces of your appliance.
For a seamless navigation and rendering of HTML pages, Cisco recommends using the following
browsers to access the new web interface of the appliance (AsyncOS 12.0 and later):
• Google Chrome (Latest Stable Version)
• Mozilla Firefox (Latest Stable Version)
• Safari (Latest Stable Version)
You can access the legacy web interface of the appliance on any of the supported browsers.
The supported resolution for the new web interface of the appliance (AsyncOS 12.0 and later) is between
1280x800 and 1680x1050. The best viewed resolution is 1440x900, for all the browsers.
Note Cisco does not recommend viewing the new web interface of the appliance on higher resolutions.
The end-users can now access the spam quarantine on the new web interface in any one of the following
ways:
• When trailblazerconfig CLI command is enabled, use the following URL -
https://example.com:<trailblazer-https-port>/euq-login.
where example.com is the appliance host name and <trailblazer-https-port> is the trailblazer
HTTPS port configured on the appliance.
• When trailblazerconfig CLI command is disabled, use the following URL -
https://example.com:<https-port>/euq-login.
where example.com is the appliance host name and <https-port> is the HTTPS port configured on
the appliance.
Note Make sure that the HTTP/HTTPS and the AsyncOS API ports are opened on the firewall.
Release Notes for AsyncOS 15.0 for Cisco Secure Email and Web Manager - MD (Maintenance Deployment)
15
Upgrade Paths
Upgrade Paths
• Upgrading to Release 15.0.0-418 - MD (Maintenance Deployment), page 16
• Upgrading to Release 15.0.0-413 - MD (Maintenance Deployment), page 16
• Upgrading to Release 15.0.0-334 - GD (General Deployment), page 16
• Upgrading to Release 15.0.0-333 - LD (Limited Deployment) Refresh, page 17
• Upgrading to Release 15.0.0-317 - LD (Limited Deployment), page 17
Release Notes for AsyncOS 15.0 for Cisco Secure Email and Web Manager - MD (Maintenance Deployment)
16
Installation and Upgrade Notes
• 14.2.0-212
• 14.2.0-217
• 14.2.0-224
Release Notes for AsyncOS 15.0 for Cisco Secure Email and Web Manager - MD (Maintenance Deployment)
17
Installation and Upgrade Notes
Virtual Appliance
To set up a virtual appliance, see the Cisco Content Security Virtual Appliance Installation Guide,
available from
http://www.cisco.com/c/en/us/support/security/content-security-management-appliance/products-instal
lation-guides-list.html.
Note Fiber Network Interface Cards on virtual appliances are not compatible with AsyncOS versions 12.5 and
later. This is a known issue. Defect ID: CSCvr26218
Note The RAM size of M600V virtual appliance is increased from 8 GB to 16 GB. You will receive an alert
if your virtual appliance does not meet this requirement.
Step 1 Set up your virtual appliance using the documentation described in Virtual Appliance, page 18.
Step 2 Upgrade your physical appliance to this AsyncOS release.
Step 3 Save the configuration file from your upgraded physical appliance
Step 4 Load the configuration file from the hardware appliance onto the virtual appliance.
Be sure to select appropriate options related to disk space and network settings.
What To Do Next
If you will use your hardware appliance as a backup appliance, see information about backups in the user
guide or online help. For example, you should ensure that the backup appliance does not pull data directly
from managed email and web security appliances, or publish configurations to web security appliances.
Release Notes for AsyncOS 15.0 for Cisco Secure Email and Web Manager - MD (Maintenance Deployment)
18
Installation and Upgrade Notes
Pre-Upgrade Requirements
Perform the following important pre-upgrade tasks:
• Verify Associated Email and Web Security Appliance Versions, page 19
• Back Up Your Existing Configuration, page 19
• Centralized Policy, Virus, and Outbreak Quarantine Certificate Settings in FIPS Mode, page 19
• Back Up Your Existing Databases, page 19
Centralized Policy, Virus, and Outbreak Quarantine Certificate Settings in FIPS Mode
After upgrading your managed Email Security appliance in FIPS mode to AsyncOS 15.0 or later, the
Centralized Policy, Virus, and Outbreak Quarantine is disabled. From AsyncOS 13.0 onwards, Email
Security appliances in FIPS mode uses a certificate of 2048 bits to enable Centralized Policy, Virus,
and Outbreak Quarantines. The earlier AsyncOS versions have certificates of size 1024 bits.
Follow these steps to enable the Centralized Policy, Virus, and Outbreak Quarantines:
Step 1 Upgrade the Cisco Secure Email and Web Manager to AsyncOS 15.0.
Step 2 Upgrade your Cisco Email Security appliance to the latest supported version.
After the upgrade, the Centralized Policy, Virus and Outbreak Quarantines setting will be disabled.
Step 3 On the upgraded Cisco Secure Email and Web Manager, run the updatepvocert command on the CLI.
The CA certificate for Centralized Policy, Virus, and Outbreak Quarantines is updated to 2048 bits.
Step 4 On the upgraded Cisco Email Security appliance, verify if the Centralized Policy, Virus, and Outbreak
Quarantines is enabled. For more information, see the Cisco Secure Email and Web Manager User
Guide.
Release Notes for AsyncOS 15.0 for Cisco Secure Email and Web Manager - MD (Maintenance Deployment)
19
Installation and Upgrade Notes
For information on disaster recovery of the Secure Email and Web Manager, see Backing Up Security
Management Appliance section in Common Administrative Tasks chapter of the user guide. For detailed
steps to schedule a backup process, see Scheduling Single or Recurring Backups section in Common
Administrative Tasks chapter of the user guide.
Note Do not interrupt power to the appliance for any reason (even to troubleshoot an upgrade issue)
until at least 20 minutes have passed since you rebooted. If you have a virtual appliance, do not
use the hypervisor or host OS tools to reset, cycle, or power off the virtual machine.
Step 4 After about 10 minutes, access the appliance again and log in.
Step 5 Follow instructions in the “After Upgrading” section of the user guide PDF for THIS release.
Step 6 If applicable, see Migrating From a Hardware Appliance to a Virtual Appliance, page 18.
Important! After you upgrade to this release, you can try any one of the following steps to make the
navigation in your browser seamless:
• Accept the certificate used by the web interface and use the following URL syntax:
https://hostname.com:<https_api_port> (for example, https://some.example.com:6443) in a
new browser window and accept the certificate. Here <https_api_port> is the AsyncOS API
HTTPS port configured in Network > IP Interfaces. Also, ensure that the API ports
(HTTP/HTTPS) are opened on the firewall.
• By default, trailblazerconfig CLI command is enabled on your appliance. Make sure that the
HTTPS port is opened on the firewall. Also ensure that your DNS server can resolve the hostname
that you specified for accessing the appliance.
If the trailblazerconfig CLI command is disabled, you can run the trailblazerconfig > enable
command using the CLI to avoid the following issues:
– Requiring to add multiple certificates for API ports in certain browsers.
– Redirecting to the legacy web interface when you refresh the spam quarantine, Safelist or
Blocklist page.
Release Notes for AsyncOS 15.0 for Cisco Secure Email and Web Manager - MD (Maintenance Deployment)
20
Installation and Upgrade Notes
– Metrics bar on the Advanced Malware Protection report page does not contain any data.
For more information, see section "The trailblazerconfig Command" of the user guide.
Note Reboot your appliance or clear your browser cache if you are unable to access the web interface. If the
problem persists, contact Cisco Customer Support.
Post-Upgrade Requirements
Perform the following important post-upgrade tasks:
• Executing Vault Recovery Script to Resolve Vault Issues, page 21
• Spam Notification URL Changes, page 22
• Mandatory Usage of Cisco Smart Software Licensing in Next AsyncOS Release, page 22
Release Notes for AsyncOS 15.0 for Cisco Secure Email and Web Manager - MD (Maintenance Deployment)
21
Installation and Upgrade Notes
Your Secure Email and Web Manager recovers, and the vault is reinitialized.
Now, you can connect to the system without any issues.
Note In this scenario, the following encrypted variables are reset to their default factory values:
• Certificate private keys
• RADIUS passwords
• LDAP bind passwords
• Local users' password hashes
• SNMP password
• FTP Push log subscriptions' passwords
• IPMI LAN password
• Updater server URLs
• SAML certificate passphrase
If you want to restore the previous configuration, you must load the previously saved configuration file.
Note There will be no support for classic licensing from the next AsyncOS release. You will no longer be able
to order new feature licenses or renew existing feature licenses in the Classic Licensing mode.
Prerequisite: Make sure you create a smart account in the Cisco Smart Software Manager portal and
enable Cisco Smart Software Licensing on your Secure Email and Web Manager. For more information,
see the "Smart Software Licensing" section of the "Common Administrative Tasks" chapter of the user
guide.
Result: After you enable Cisco Smart Software Licensing, you can upgrade your Secure Email and Web
Manager from AsyncOS 15.0 to the next AsyncOS release seamlessly and continue to use the existing
feature licenses in the Smart Licensing mode.
Release Notes for AsyncOS 15.0 for Cisco Secure Email and Web Manager - MD (Maintenance Deployment)
22
Supported Hardware for this Release
Release Notes for AsyncOS 15.0 for Cisco Secure Email and Web Manager - MD (Maintenance Deployment)
23
End-of-Sale and End-of-Life Announcement for Cisco SecureX
Procedure
Step 1 Go to https://bst.cloudapps.cisco.com/bugsearch/.
Step 2 Log in with your Cisco account credentials.
Step 3 Click Select from list > Security > Email Security > Cisco Email Security Appliance, and click OK.
Step 4 In Releases field, enter the version of the release, for example, 15.0.
Step 5 Depending on your requirements, do one of the following:
• To view the list of resolved issues, select Fixed in these Releases from the Show Bugs drop-down.
• To view the list of known issues, select Affecting these Releases from the Show Bugs drop-down
and select Open from the Status drop down.
Note If you have questions or problems, click the Help or Feedback links at the top-right side of the tool.
There is also an interactive tour; to view it, click the link in the orange bar above the search fields.
Related Documentation
In addition to the main documentation in the following table, information about other resources,
including the knowledge base and Cisco support community, is in the More Information chapter in the
online help and user guide.
Release Notes for AsyncOS 15.0 for Cisco Secure Email and Web Manager - MD (Maintenance Deployment)
24
Service and Support
This document is to be used in conjunction with the documents listed in the “Related Documentation” section.
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of
Cisco trademarks, go to this URL: www.cisco.com/go/trademarks. Third-party trademarks mentioned are the property of their respective owners. The
use of the word partner does not imply a partnership relationship between Cisco and any other company. (1110R)
Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be actual addresses and phone numbers. Any
examples, command display output, network topology diagrams, and other figures included in the document are shown for illustrative purposes only.
Any use of actual IP addresses or phone numbers in illustrative content is unintentional and coincidental.
Release Notes for AsyncOS 15.0 for Cisco Secure Email and Web Manager - MD (Maintenance Deployment)
25