1-13
Cisco ASA 5500 Series Configuration Guide using the CLI
Chapter1 Introduction to the Cisco ASA 5500 Series
New Features
PAT pool and round robin
address assignment
You can now specify a pool of PAT addresses instead of a single address. You can also
optionally enable round-robin assignment of PAT addresses instead of first using all ports on a
PAT address before using the next address in the pool. These features help prevent a large
number of connections from a single PAT address from appearing to be part of a DoS attack
and makes configuration of large numbers of PAT addresses easy.
Note Currently in 8.4(2), the PAT pool feature is not available as a fallback method for
dynamic NAT or PAT. You can only configure the PAT pool as the primary method for
dynamic PAT (CSCtq20634).
IPv6 Inspection You can configure IPv6 inspection by configuring a service policy to selectively block IPv6
traffic based on the extension header. IPv6 packets are subjected to an early security check. The
ASA always passes hop-by-hop and destination option types of extension headers while
blocking router header and no next header.
You can enable default IPv6 inspection or customize IPv6 inspection. By defining a policy map
for IPv6 inspection you can configure the ASA to selectively drop IPv6 packets based on
following types of extension headers found anywhere in the IPv6 packet:
Hop-by-Hop Options
Routing (Type 0)
Fragment
Destination Options
Authentication
Encapsulating Security Payload
Remote Access Features
Portal Access Rules This enhancement allows customers to configure a global clientless SSL VPN access policy to
permit or deny clientless SSL VPN sessions based on the data present in the HTTP header. If
denied, an error code is returned to the clients. This denial is performed before user
authentication and thus minimizes the use of processing resources.
Also available in Version 8.2(5).
Clientless support for
Microsoft Outlook Web App
2010
The ASA 8.4(2) clientless SSL VPN core rewriter now supports Microsoft Outlook Web App
2010.
Secure Hash Algorithm
SHA-2 Support for IPsec
IKEv2 Integrity and PRF
This release supports the Secure Hash Algorithm SHA-2 for increased cryptographic hashing
security for IPsec/IKEv2 AnyConnect Secure Mobility Client connections to the ASA. SHA-2
includes hash functions with digests of 256, 384, or 512 bits, to meet U.S. government
requirements.
Table1-5 New Features for ASA Version 8.4(2) (continued)
Feature Description