Cisco ASA Series Cli Configuration Manual page 81

Software version 9.0 for the services module
Hide thumbs Also See for ASA Series:
Table of Contents

Advertisement

Chapter 1
Introduction to the Cisco ASA
Table 1-5
New Features for ASA Version 9.0(1)/ASDM Version 7.0(1) (continued)
Feature
Unified ACL for IPv4 and IPv6
Mixed IPv4 and IPv6 object groups
Range of IPv6 addresses for a Network
object
Inspection support for IPv6 and NAT64
Remote Access Features
Description
ACLs now support IPv4 and IPv6 addresses. You can also specify a mix of
IPv4 and IPv6 addresses for the source and destination. The IPv6-specific
ACLs are deprecated. Existing IPv6 ACLs are migrated to extended ACLs.
ACLs containing IPv6 addresses can be applied to clients configured to use the
SSL protocol. This feature is not supported for the IKEv2/IPsec protocol.
We modified the following commands: access-list extended, access-list
webtype.
We removed the following commands: ipv6 access-list, ipv6 access-list
webtype, ipv6-vpn-filter.
We modified the following screens:
Configuration > Firewall > Access Rules
Configuration > Remote Access VPN > Network (Client) Access > Group
Policies > General > More Options
Previously, network object groups could only contain all IPv4 addresses or all
IPv6 addresses. Now network object groups can support a mix of both IPv4 and
IPv6 addresses.
Note
You cannot use a mixed object group for NAT.
We modified the following command: object-group network.
We modified the following screen: Configuration > Firewall > Objects >
Network Objects/Groups.
You can now configure a range of IPv6 addresses for a network object.
We modified the following command: range.
We modified the following screen: Configuration > Firewall > Objects >
Network Objects/Groups.
We now support DNS inspection for IPv6 traffic.
We also support translating between IPv4 and IPv6 for the following
inspections:
DNS
FTP
HTTP
ICMP
You can now also configure the service policy to generate a syslog message
(767001) when unsupported inspections receive and drop IPv6 traffic.
We modified the following command: service-policy fail-close.
We modified the following screen: Configuration > Firewall > Service Policy
Rules > Add Service Policy Rule Wizard - Service Policy.
Cisco ASA Series CLI Configuration Guide
New Features
1-19

Advertisement

Table of Contents
loading

Table of Contents