vCloud Networking and Security 188.8.131.52 Release Notes
vCloud Networking and Security 184.108.40.206 | 1 JUL 2014 | Build 1912202
The vCloud Networking and Security 220.127.116.11 release replaces the 5.1.4 release.
What's in the Release Notes
The release notes cover the following topics:
The vCloud Networking and Security 18.104.22.168 release includes a fix for the OpenSSL known issues CVE-2014-0224, CVE-2014-0198, CVE-2010-5298, and CVE-2014-3470, as well as other bug fixes documented in the Resolved Issues section.
Customers using vCloud Networking and Security 5.1.4 or earlier must immediately upgrade to 22.214.171.124.
System Requirements and Installation
For information about system requirements and installation instructions, see the
vShield Installation and Upgrade Guide.
To upgrade to this release, follow the steps below.
- Upgrade vShield Manager and all vShield App and vShield Edge virtual machines in your environment to the vCloud Networking and Security 126.96.36.199 release. For instructions, see Upgrading vShield in the
vShield Installation and Upgrade Guide.
Note: If you use SSL VPN, you must uninstall the SSL VPN client after upgrading to 188.8.131.52 and then reinstall it. To install the new client, go to https://ssl-vpn-ip-address where ssl-vpn-ip-address is the uplink IP address assigned to the Edge interface with which SSL VPN service is configured to listen on.
- Perform this step only if you are upgrading from vShield 5.1.3 or earlier.
Change the certificates and keys used by SSL VPN by following the steps below.
- Add a new server certificate.
- In the vSphere Client, select Inventory > Hosts and Clusters.
- Select a datacenter resource from the inventory panel.
- Click the Network Virtualization tab and click the Edges link.
- Double-click a vShield Edge and click the Configure tab.
- Click the Certificates link.
- Click the Add icon and select Certificate.
- Paste the certificate contents and private key.
- Click OK
- Delete the old server certificate.
- Select the old certificate and click the Delete icon.
- Click OK.
- Configure SSL VPN to work with the new certificate.
- Click the SSL VPN-Plus tab.
- In the Configure panel, click Server Settings. and click Change
- From the Server Certificates table, select the new server certificate and click OK.
- Contact your certificate provider to get the old certificate revoked.
- Perform this step only if you are upgrading from vShield 5.1.3 or earlier.
Remove trust to the old certificate from your browser and OS. Also, ensure that revocation checking is enabled for your system.
- Change the SSL VPN passwords. For instructions, see Managing VPN Services
vShield Administration Guide.
The following known issues have been discovered through rigorous testing and will help you understand some behavior you might encounter in this release.
The known issues are grouped as follows:
SSL VPN client must be uninstalled and re-installed after upgrade
After upgrading to vShield 184.108.40.206, you must uninstall the SSL VPN client and then reintsall it. To install the latest client, go to https://ssl-vpn-ip-address where ssl-vpn-ip-address is the uplink IP address assigned to the Edge interface with which SSL VPN service is configured to listen on.
vShield Manager Issues
vShield Manager registered to vCenter using IP address instead of FQDN
vShield Manager UI does not accept fully qualified domain name (FQDN) during registration with vCenter Server.
Workaround: Use IP address instead of FQDN.
vShield Manager upgrade fails with an error
When vShield Manager has been upgraded from 4.1 to 5.0 to 5.1, vShield Manager fails to connect to the vCenter Server and the UI displays an Internal Server Error.
Workaround: Re-enter the vCenter Server credentials. If connectivity is not restored, reboot the vShield Manager.
"Invalid Data Format" error displayed in spite of ports being entered in correct format
While adding/creating a service, you may get an "Invalid Data Format" error in spite of ports being entered in correct format. This may happen when number of ports entered exceeds the maximum limit of 15 ports.
Workaround: If the service has more than 15 ports, create multiple services.
User must logout to view modified or added role
When a user adds or modifies his/her role while logged into a session, the session does not reflect the role changes.
Workaround: Log out and then log back in to view updated role assignments.
'Internal server error' displayed on deletion of a local user or role assignment for a vCenter user
Workaround: Disable the user account you want to delete.
vShield App Issues
If the vCenter Server becomes unavailable during the vShield App upgrade process, the upgrade fails and the Update link is not available
See Update link not available during vShield App upgrade.
Clusters cannot be prepared when vShield App is installed on a host
Preparing a cluster for VXLAN does not succeed as the host cannot enter maintenance mode when vShield App is installed.
Workaround: Manually enter the host(s) into maintenance mode. When manually triggered, the vShield App appliances are shut down and the cluster preparation is allowed to proceed. Once completed, the host(s) exit maintenance mode and vShield App appliances continue to operate as normal.
vShield Edge Issues
Cannot configure different certificates for two different features
Cannot configure different certificates for two different features. For example, you cannot use certificate a for IPsec and certificate b for SSL VPN.
Workaround: Use the same certificate for both features and then change the certificate for one of the features.
Cannot create CSR of size 512/1024 bit if vShield Manager is upgraded to 5.1.x but Edge version is still 5.0.2
When vShield Manager is upgraded to 5.1.x but Edge version is still 5.0.2 you cannot create a CSR of size 512/1024 bit.
Workaround: Create CSR of size 2048/3072 bit.
The following issues have been resolved in the 220.127.116.11 release.
- Where required, OpenSSL 1.0.1 is updated to 1.0.1h to address CVE-2014-0224, CVE-2014-0198, CVE-2010-5298, and CVE-2014-3470.
- Where required, OpenSSL 0.9.8 is updated to version openssl-0.9.8za to address CVE-2014-0224, CVE-2014-0198, CVE-2010-5298, and CVE-2014-3470.
- Virtual machine loses network connectivity during migration between resource pools, clusters, or vApps. For details, see A virtual machine loses network connectivity during migration between resource pools, clusters or vApps in vCloud Networking and Security 5.1.4, 5.5.2 and NSX for vSphere 6.0.4.
The following issues have been resolved in the 5.1.4 release.
- OpenSSL security issue CVE-2014-0160/CVE-2014-0346 (Heartbleed) applicable to OpenSSL 1.0.1 pre-g leads to the leak of memory contents from the server to the client and vice versa
- Virtual machines losing network connectivity
- vShield Manager failed to come up after upgrading from 5.1.2a to 5.1.3 with Cisco N1k
- Adding a 5.1 ESX host to a 5.5 vCenter running a NetX service fails to install fast path vib
- NTPD running on vShield Manager discloses NTP variables
- To support vShield Networking and Security appliance deployment on NFS or SAN, scsi block layer timeout should be increased
- vShield 5.1.3 tries to load the 5.5 fast-path vib in a 5.1 vSphere environment
- vShield App logs rotation failure causing 100% disc usage
- Logs rotation failure causing 100% disc usage on secondary vShield Edge virtual machine
- Inconsistent status of load balancer HTTP/HTTPS protocols
- Low network throughput in vShield environment
- ISEC 8: Encryption Keys Stored Within the Source Code
- Possible breach in vShield Manager Manager due to insufficient hardening of web server ciphers
- Various XSS vulnerabilities found in vShield 5.1.2
The following issues have been resolved in the 5.1.3 release.
- vShield Manager did not come up after upgrading from 5.1.2a to 5.1.3 with CiscoN1k
- Adding a 5.1 ESX host to a 5.5 vCenter running a NetX service fails to install fast path vib from vShield
- Virtual machines protected by vShield App don't have network connectivity after moving between vApps
- Low network throughput in vShield environment with large number of L2 rules, each rule containing MAC security groups
- Cannot import two intermediate root CA certificates in vShield Manager version 5.1.1
- Increase in rule provisioning since upgrade to version 5.1.2a
- vShield Manager CPU is at 90+ percent utilization since all DCN threads are stuck on flushing the objects in the transaction for large inventory
- Edge TCP idle timeout value can be configured using REST APIs in 5.1.3
- vShield Manager kernel panics after the storage which it is running on has problems or is unavailable due to low disk timeout value. New value is set to 120 seconds.
- Updates of Mac Address grouping (mac-set) do not happen for port groups that are members of security groups
- Certificate Signing Requests are generated with NULL in the City Name and State Name fields
- If vCloud Director license "vCloud Networking and Security - Networking for VCD" is used, new Isolation Org VDC Network cannot be created and fails with the error: "VSM response error (214): Not licensed for Entity : vcloud-netsec feature : vxlan : add on :".
- Virtual machines lose network connectivity after being migrated using vMotion from an ESXi host with no vShield App to an ESXi host with vShield App
- vShield App installation fails due to the vShield Manager sending invalid VNIC UUIDs in VMInfo message
- Virtual machines are not able to get on the network and/or get a DHCP address shortly after being migrated using vMotion. A force sync is required to allow them to get a DHCP address
- Connectivity to third-party antivirus offloading products is affected when vShield App is installed on the same ESXi host
- Virtual machines are not able to get on the network in some cases shortly after being migrated using vMotion
- Provisioning of firewall rules takes a long time
- Traffic blocked for virtual machines that have packets with shortened Ethernet trailers
- vShield App blocks traffic despite having no rules or all rules set to allow after the vSA is not able to communicate between key infrastructure components due to an end user mis configuration such as combining powering off the vSM and/or vSA, disconnecting the vSA vnics and/or powering off the ESXi host which will cause an out of sync condition
- vSA kernel panics after the storage where it runs has problems, or it is unavailable due to a low disk timeout value. New disk timeout value is set to 180 seconds.
- Virtual machines on a vDS lose network connectivity as a result of moving an ESXi host between clusters
- Virtual machines moved from one vCenter Server object to another, such as vApp, Cluster, or Resource Pool, do not inherit the firewall rules applied on the target object
- vShield App appliance reboots when a large IP range (for example, entire class A) is used to define a rule
- Traffic is dropped due to sessions timing out at incorrect intervals
- Flow Monitoring reports reversed source and destination for some types of traffic originating from physical sources
- Security Groups may be inadvertently deleted by publishing a firewall rule after this rule has been re-published a certain number of times
- Publishing of Ethernet (L2) firewall rules fail when large MACsets are used
- Unable to add a load balancer Virtual IP (VIP) to a vShield Edge if RSA ACE server is also running
- RSA authentication fails after applying vShield Edge configuration changes such as a redeploy, upgrade, HA event
- Mac client for SSL VPN is not able to log in when password is about to reach the expiration timeout configured in the password policy
- vShield Edges configured in HA mode kernel panic simultaneously
- vShield Edge DHCP does not work on a VNIC on which two separate IP addresses and subnets are defined with one subnet as 0.0.0.0/32
- Both vShield Edges in an HA pair go into Active mode
- vShield Edge is not able to re-establish IPSEC VPN tunnels that have been dropped after hitting an Out of Memory (OoM) condition
- vShield Edge upgrade fails if a resource pool on which the vShield Edge was initially deployed is no longer available
- HA enabled vShield Edges utilizing SSL VPN services show high CPU utilization and fail over multiple times in a small window of time
- DHCP static binding configuration in the UI shows blank for vShield Edges that are connected to a Virtual Wire
- Low throughput and performance seen with vShield Edge
- Added an option for deploying 4-vCPU vShield Edge
- Datapath issues when going through an SSL L2 VPN tunnel
- SNAT rule over a vSE L2VPN tunnel prevents VMs behind vSE to reach public IPs
- vShield Edge appliance has no support for saving core dumps. Added debug crashdump command to the CLI
- IPsec tunnels get dropped frequently when PFS is enabled
- Setting or changing the Load Balancer Persistence Method from the UI fails to commit the changes
- Load Balancer crashes when the Persistence Method is set to SSL_SESSION_ID
- SSL VPN Client fails to install on OSX 10.9 (Mavericks)
- Inconsistent behavior between the UI and REST when using Security Groups in firewall rules
- vShield Edge configuration/installation/upgrade workflows report these errors
- An invalid response was received from VIX agent
- VIX agent is not connected to VC
- IPsec tunnels with certificate mode cannot be established