cc/td/doc/product/vpn/client
hometocprevnextglossaryfeedbacksearchhelp
PDF

Table of Contents

Release Notes for the Cisco VPN Client, Release 3.7.2, for Linux, Solaris, and Mac OS X

Release Notes for the Cisco VPN Client, Release 3.7.2, for Linux, Solaris, and Mac OS X

CCO Date: December 11, 2002

Part Number: 78-13966-04


Note   You can find the most current documentation for the VPN Client at http://www.cisco.com or http://cco.cisco.com. These electronic documents may contain updates and changes made after the hard copy documents were printed.

These release notes support VPN Client software Release 3.7 for the Linux, Solaris, and Mac OS X operating systems and for the incremental "point" release, Release 3.7.2. Please note that there is no Release 3.7.1. These release notes are updated as needed to describe new features, product and procedure changes, caveats, and related documentation. Please read the release notes carefully prior to installation.

Contents

This document contains the following sections:

New Features

Release 3.7.2 fixes a number of caveats that were outstanding in Release 3.7. There are no new features in this release. The features in the following list were introduced in Release 3.7.

System Requirements

The VPN Client supports:

Supported Hardware

The Cisco VPN Client supports the following Cisco VPN devices:

Caveats Fixed in This Release

This section describes the caveats resolved in the Cisco VPN Client Version 3.7.2 for Solaris and Mac OS X. There are no new fixes for the Linux platform.

Caveats Fixed for Solaris

While using a VPN Client for Solaris, over a period of heavy traffic, the workstation locked up or panicked. This condition was usually caused by certain traffic types that unexpectedly caused problems with the workstations stack. The file transfer protocols NFS and SCP have been known to cause this issue.

In rare circumstances, users of the VPN Client for Solaris, Release 3.6, experienced system failures after creating a VPN tunnel and passing an indeterminate amount of traffic when running in 32- or 64-bit mode.

VPN Client version 3.7.2did not support the ipdptp dialup interface on Solaris platforms. This ipdptp interface is used for dialup connections on the Solaris 6, 7, and 8 platforms. Solaris 8 can be upgraded with a standard patch from SUN. This allows them to use the new pppd 4.0 driver, which is still supported by the VPN Client. Newer Solaris 8 installations and Solaris 9 use pppd 4.0 as their standard dialup and pppoe driver.

Caveats Fixed for Mac OS X

The certificate enrollment dialogue was very tall. On 800x600 screens, it was slightly larger than the desktop.

Text labels on buttons could not be clicked on. You had to click on the actual button icon.

The Simple GUI allowed resizing, but it should not do so.

If the VPN Client disconnected, the MTU was not reset to its pre-connected value. For example, if the MTU was 1500 before the connection, the VPN Client reduced it to 1356 upon connecting. If the connection was lost, due to an interface going down or the Macintosh going to sleep, the MTU stayed at 1356, rather than being reset to 1500, as was expected.

Connection attempts using a VPN Client for Mac OS X failed when the VPN Concentrator was configured for load balancing.

This condition appeared only when the VPN Client is attempting to connect using TCP NAT (TunnelingMode=1). This issue was introduced in Release 3.6.2; it had been working in previous versions. However, Mac OS X 10.2.x did not allow TCP NAT connections in previous versions and was limited in which interfaces were functional in earlier versions. Mac OS X 10.1.x is fully functional in earlier versions supporting Mac OS X.

IPSec over TCP (cTCP) worked inconsistently with Release 3.7 of the Cisco VPN Client when running on Mac OS X 10.2. You could usually get TCP to connect the first time you tried, but after that it would not connect unless you restarted the VPN Client. Tried this via dial-up and via broadband (wireless and wired).

Uninstaller from the Applications folder appeared to do nothing. Running the command line uninstaller failed with the following errors:

[labusers-Computer:~] labuser% cd /Applications/Uninstall\ Cisco\ VPN\ Client.app/Contents/MacOS/
[labusers-Computer:Uninstall Cisco VPN Client.app/Contents/MacOS] labuser% ls
Uninstall Cisco VPN Client
[labusers-Computer:Uninstall Cisco VPN Client.app/Contents/MacOS] labuser% ls -l total 16
-rwxrwxr-x 1 root admin 6148 Nov 8 14:21 Uninstall Cisco VPN Client
[labusers-Computer:Uninstall Cisco VPN Client.app/Contents/MacOS] labuser% ./Uninstall\ Cisco\ VPN\ Client
./Uninstall Cisco VPN Client: Exec format error. Binary file not executable.
[labusers-Computer:Uninstall Cisco VPN Client.app/Contents/MacOS] labuser%
sudo ./Uninstall\ Cisco\ VPN\ Client
Password:
./Uninstall Cisco VPN Client: ./Uninstall Cisco VPN Client: cannot execute binary file

Caveats Fixed in Previous Releases

The following sections list caveats fixed in previous releases of the VPN Client for Linux, Solaris, and Mac OS X.

Caveats Fixed for Linux, Release 3.7

An unresolved symbol error no longer appears when the VPN Client builds the driver during the installation. Previously, this occurred because the get_fast_time function, required by the VPN Client, was removed from the Linux kernel API in the 2.4.18 release.

The VPN Client for Linux now binds only to supported interfaces (asynchronous serial PPP and Ethernet).

When you install the VPN Client for Linux on a Mandrake Linux, the installer script now looks for the ID in the previous default location usr/bin/id and the new default location usr/id.

The VPN Client now supports the new Linux distributions that use Version 3.2 + of the GCC compiler.

Caveats Fixed for Solaris, Release 3.7

The VPN Client for Solaris install script now properly identifies the 10-MB Ethernet network interface and provides the correct entry in the /etc/iu.ap file.

Caveats Fixed for Mac OS X, Release 3.7

Connection reliability issues no longer occur when you use the VPN Client for Mac OS X configured for cTCP NAT (TunnelingMode=1).

You can now configure a VPN Client for IPSec over TCP when running Mac OS Version 10.2.

Split tunneling now functions properly for a VPN Client running Mac OS Version 10.2.

A VPN Client running Mac OS Version 10.2 no longer fails to connect to a VPN device if IPv6 is enabled.

You can now pass nontunneled traffic (other than ICMP) with split tunneling enabled on a VPN Client for Mac OS X and with OS Version 10.2.x on your workstation.

Caveats Fixed in Release 3.6.1

This section lists caveats fixed for the VPN Client for Linux, Solaris, and Mac OS X in Release 3.6.1.

Caveats Fixed for Linux, Release 3.6.1

If you enroll certificates from a file and enter information in all fields, a segmentation fault no longer occurs.

Caveats Fixed for Mac OS X, Release 3.6.1

A VPN Client configured to use IPSec over TCP for NAT Transparency (TunnelingMode=1) can now use backup servers during connection attempts.

If you use a large certificate for authentication (such as one created by a Microsoft CA), a VPN Client configured to use IPSec over TCP for NAT Transparency (Tunneling Mode=1) can now establish a connection using PPP or Ethernet.

The VPN Client now works correctly on interface en1 (Apple AirPort WiFi) card when running Mac OS Version 10.2.

Caveats Fixed in Release 3.5.1

This section lists caveats fixed for the VPN Client for Linux, Solaris, and Mac OS X in Release 3.5.1.

Caveats Fixed for Linux, Release 3.5.1

If you issue the cisco_cert_manager command or any associated command operations, numerical error codes that cannot be interpreted without a translation table no longer appear.

The VPN Client for Linux can now establish a connection using certificates generated by a Microsoft Certificate Authority (CA).

The Simple Certificate Enrollment Protocol (SCEP) option is now available from the VPN Client cisco_cert_mgr -E -op enroll command.

The VPN Client can now pass large packets over a PPP connection if the client is configured to use IPSec over TCP or UDP for NAT transparency.

When you import a certificate, the password prompt now prompts you for an import password instead of a password to clarify which password to enter.

NFS file systems and directories are no longer unusable when the VPN Client is connected.

If IP masquerading is enabled on your workstation, you no longer experience difficulty using certain applications after the VPN Client is installed.

If you issue the kill -9 command to the VPN Client or the cvpnd process, the tunnel is properly closed.

Caveats Fixed for Solaris, Release 3.5.1

The documentation for the VPN Client for Solaris has been updated to more accurately reflect the certificate enrollment process and now contains certificate troubleshooting tips.

The VPN Client can now use large certificates (such as one created by a Microsoft CA) over a PPP connection and when it is configured to use IPSec over TCP for NAT transparency.

Caveats Fixed for Mac OS X, Release 3.5.1

When you establish a VPN connection, legacy Mac OS applications can now pass traffic through the tunnel.

You can now make use of DNS servers to resolve names and perform lookup requests when the VPN Client is connected.

The value in the file 'StartupParameters.plist' is now a list instead of a string and subsequent startup items no longer fail to load.

Caveats Fixed in Release 3.5.0

This section lists caveats fixed for the VPN Client for Linux in Release 3.5.0.


Note   Release 3.5.0 was the first release for the VPN Client supporting the Mac OS X and Solaris operating systems.

Caveats Fixed for Linux, Release 3.5.0

The VPN Client can now upload large packets to a VPN 3000 concentrator over a PPP or Ethernet connection if NAT transparency is enabled on both ends of the tunnel.

If the VPN Client is shut down improperly, the /etc/rc.d/init.d/vpnclient_init stop command now correctly unloads the client kernel module.

During the installation process, the VPN Installer now correctly unloads a currently running VPN module.

FTP downloads performed using IPSec/UDP are no longer slower than FTP downloads performed using IPSec Protocol 50 (ESP).

The VPN Client no longer becomes inoperable if your Version 2.4 kernel is compiled with CONFIG_NETFILTER enabled.

Systems behind a device using port address translation (PAT) are now able to access web pages when the VPN Client is loaded on a workstation, but not in use.

The host name on the computer running the VPN Client is now resolved in DNS. Previously, this occurred on a Mandrake Version 8.0 system running Version 2.4.7 kernel.

The VPN Client module is now built properly on Redhat Version 7.1.

When you use the VPN Client with Redhat Version 6.2 with the Enable Backup feature enabled, you can now pass traffic when it is redirected to a backup server or a load balancing server.

When LZS Compression is enabled on the VPN Client, DNS names are resolved and you can access internal web pages.

The VPN Client now has the capability to fragment large certificates and establish an IPSec over TCP connection with a VPN 3000 concentrator using Software Version 3.5.

Open Caveats

The following sections describe known issues for the VPN Client Version 3.7.

Open Caveats for Linux

The make module process fails during installation of the VPN Client.

Workaround: The module build process must use the same configuration information as your running kernel.

The VPN Client does not function if it is installed on a Linux system using hotplug.

No workaround.

A Linux workstation becomes inoperable when you use the VPN Client with a PPP connection and configured to use SecurID for authentication. This occurs using kernel revision 2.4.7 to 2.4.17 on Red Hat.

No workaround.

The VPN Client does not support Wireless LAN Ethernet cards.

No workaround.

Open Caveats for Mac OS X

The VPN Client does not provide a 30-day warning when your certificate is near expiration or when your user identity certificate is near expiration. If your certificate expires, the following message appears:

    Unable to contact security gateway.
Workaround: Confirm your expiration date on the Certificates tab in the Validity field.

The progress bar for the VPN Client for Mac OS X installer does not accurately reflect the progress of the installation process, which takes an inordinate amount of time.

No workaround.

Open Caveats for Solaris

If an IP firewall is installed on your workstation, the reboot after installation of the VPN Client takes an inordinate amount of time. This is caused by a conflict between the VPN Client kernel module cipsec and the ipfilter firewall kernel module.

Workaround: Disable the ipfilter firewall kernel module before you install the VPN Client.

If you use the VPN Client for Solaris with the pppd Version 4.0 driver over PPPoE, the client can establish a VPN connection, but cannot pass traffic. This occurs because the client is unable to pass traffic if used with a PPPoE connection exclusively. The VPN Client must first attempt an hme connection, even a failed one, to properly prepare for the PPPoE connection.

Workaround:

VPN traffic should pass normally. If you restart your workstation for any reason, you must repeat this process.

Obtaining Documentation

These sections explain how to obtain documentation from Cisco Systems.

World Wide Web

You can access the most current Cisco documentation on the World Wide Web at this URL:

http://www.cisco.com

Translated documentation is available at this URL:

http://www.cisco.com/public/countries_languages.shtml

Documentation CD-ROM

Cisco documentation and additional literature are available in a Cisco Documentation CD-ROM package, which is shipped with your product. The Documentation CD-ROM is updated monthly and may be more current than printed documentation. The CD-ROM package is available as a single unit or through an annual subscription.

Ordering Documentation

You can order Cisco documentation in these ways:

http://www.cisco.com/cgi-bin/order/order_root.pl

http://www.cisco.com/go/subscription

Documentation Feedback

You can submit comments electronically on Cisco.com. In the Cisco Documentation home page, click the Fax or Email option in the "Leave Feedback" section at the bottom of the page.

You can e-mail your comments to bug-doc@cisco.com.

You can submit your comments by mail by using the response card behind the front cover of your document or by writing to the following address:

Cisco Systems
Attn: Document Resource Connection
170 West Tasman Drive
San Jose, CA 95134-9883

Obtaining Technical Assistance

Cisco provides Cisco.com as a starting point for all technical assistance. Customers and partners can obtain online documentation, troubleshooting tips, and sample configurations from online tools by using the Cisco Technical Assistance Center (TAC) Web Site. Cisco.com registered users have complete access to the technical support resources on the Cisco TAC Web Site.

Cisco.com

Cisco.com is the foundation of a suite of interactive, networked services that provides immediate, open access to Cisco information, networking solutions, services, programs, and resources at any time, from anywhere in the world.

Cisco.com is a highly integrated Internet application and a powerful, easy-to-use tool that provides a broad range of features and services to help you with these tasks:

If you want to obtain customized information and service, you can self-register on Cisco.com. To access Cisco.com, go to this URL:

http://www.cisco.com

Technical Assistance Center

The Cisco Technical Assistance Center (TAC) is available to all customers who need technical assistance with a Cisco product, technology, or solution. Two levels of support are available: the Cisco TAC Web Site and the Cisco TAC Escalation Center.

Cisco TAC inquiries are categorized according to the urgency of the issue:

The Cisco TAC resource that you choose is based on the priority of the problem and the conditions of service contracts, when applicable.

Cisco TAC Web Site

You can use the Cisco TAC Web Site to resolve P3 and P4 issues yourself, saving both cost and time. The site provides around-the-clock access to online tools, knowledge bases, and software. To access the Cisco TAC Web Site, go to this URL:

http://www.cisco.com/tac

All customers, partners, and resellers who have a valid Cisco service contract have complete access to the technical support resources on the Cisco TAC Web Site. The Cisco TAC Web Site requires a Cisco.com login ID and password. If you have a valid service contract but do not have a login ID or password, go to this URL to register:

http://www.cisco.com/register/

If you are a Cisco.com registered user, and you cannot resolve your technical issues by using the Cisco TAC Web Site, you can open a case online by using the TAC Case Open tool at this URL:

http://www.cisco.com/tac/caseopen

If you have Internet access, we recommend that you open P3 and P4 cases through the Cisco TAC Web Site.

Cisco TAC Escalation Center

The Cisco TAC Escalation Center addresses priority level 1 or priority level 2 issues. These classifications are assigned when severe network degradation significantly impacts business operations. When you contact the TAC Escalation Center with a P1 or P2 problem, a Cisco TAC engineer automatically opens a case.

To obtain a directory of toll-free Cisco TAC telephone numbers for your country, go to this URL:

http://www.cisco.com/warp/public/687/Directory/DirTAC.shtml

Before calling, check with your network operations center to determine the level of Cisco support services to which your company is entitled: for example, SMARTnet, SMARTnet Onsite, or Network Supported Accounts (NSA). When you call the center, have your service agreement number and your product serial number available.


Copyright © 2002, Cisco Systems, Inc.
All rights reserved.


hometocprevnextglossaryfeedbacksearchhelp
Posted: Fri Dec 13 13:46:45 PST 2002
All contents are Copyright © 1992--2002 Cisco Systems, Inc. All rights reserved.
Important Notices and Privacy Statement.