Introduction
Cisco Security Manager and its related applications support the devices and operating system versions listed in these sections:
Note |
From version 4.21 onwards, Cisco Security Manager terminates whole support, including support for any bug fixes or enhancements, for all Aggregation Service Routers, Integrated Service Routers, Embedded Service Routers, and any device operating on Cisco IOS software, including the following devices:
|
Note |
From version 4.18, Cisco Security Manager does not support SFR from ASA 9.10(1) onwards for ASA 5512, ASA 5506, ASA 5506H and ASA 5506W models. |
General Device to Feature Support for Cisco Security Manager
Broadly speaking, Cisco Security Manager has these main features: device configuration, event management, report management, health and performance monitor, and image management. Table 1 explains which classes of device are supported for each feature. The exact models and software versions supported in each device class are listed in subsequent sections.
Device Class |
Device Configuration |
Event Management |
Report Management |
Health and Performance Monitor |
Image Manager |
---|---|---|---|---|---|
Adaptive Security Appliance (ASA), including the Cisco Adaptive Security Virtual Appliance (ASAv) and service modules |
Yes |
Yes (ASA 8.0+ only) |
Yes (ASA 8.0+ only) |
Yes |
|
Note |
Beginning with Cisco Security Manager 4.21, although ASA software enhancements and bug fixes are still supported, any hardware support for routers is not rendered, as Cisco IOS Software has reached its end of life. |
IPv6 Support Summarized by Device Class and Application
Cisco Security Manager provides some support for IPv6, but only for configuring policies on a device (for example, firewall rules). Support is for traffic through the device. However, Cisco Security Manager does not support client-server communication using IPv6.
Cisco Security Manager also provides management support for ASA devices.
Table 2 summarizes IPv6 support by device class in each Cisco Security Manager application (for example, Configuration Manager).
If a particular device class has no policies that use IPv6, then the table lists “Not applicable.” The table also lists “Not applicable” for devices that are not supported at all by a particular application (for example, Image Manager supports only ASAs and ASAv’s).
For the specific policies that you can configure, see the Getting Started chapter in the User Guide for Cisco Security Manager.
Device Class |
Configuration Manager |
Event Viewer |
Report Manager |
Health and Performance Monitor |
Image Manager |
---|---|---|---|---|---|
Adaptive Security Appliance (ASA), including the Cisco Adaptive Security Virtual Appliance (ASAv) and service modules (Single or multiple security context configurations) |
Yes (ASA 7.0+ in router mode; 8.2+ transparent mode) |
Yes (ASA 8.0+ only) |
Yes (ASA 8.0+ only) |
Yes |
Yes1 |
Explicitly Supported Devices for Cisco Security Manager
The following table lists the devices you can manage in Cisco Security Manager. These specific models are explicitly supported, that is, Cisco Security Manager is aware of the features available on the device and recognizes the device module.
Tip |
If a device model is not listed in this table, you might still be able to manage it as a generic device type. For more information, see Note. |
Series |
Supported Device Models |
||
---|---|---|---|
Adaptive Security Appliances and Firewalls |
|||
Cisco Secure Firewall 4200 Series [support for ASA Version 9.20.1 and above] |
|
||
Cisco Secure Firewall 3100 Series [support for ASA Version 9.17.1 and above] |
|
||
Cisco Firepower 1000 Series [support for ASA Version 9.13.1 and above] |
|
||
Cisco Firepower 9000 Series [support for ASA Version 9.12.2 and above] |
|
||
Cisco Firepower 2000 Series [support for ASA Version 9.8.2 and above] |
|
||
Cisco Firepower 4000 series [support for ASA Version 9.12.1 and above] |
|
||
Cisco Firepower 4000 Series [support for ASA Version 9.6.2 and above] |
|
||
Cisco Firepower 4000 Series [support for ASA Version 9.14.1 and above] |
|
||
Cisco Firepower 9000 series [support for ASA Version 9.12.1 and above] |
|
||
ISA 3000 [support for ASA Version 9.4.1, 9.5.1, 9.5.2, 9.6.1 and 9.6.2] |
|
||
Cisco 1783 Industrial Security Appliance[support for ASA Version 9.5.2 and above] |
|
||
Cisco ASA-5500 Series Adaptive Security Appliance [support for ASA Version 9.4.1, 9.5.1, 9.5.2, 9.6.1 and 9.6.2] |
|
||
Cisco ASA-5500 Series Adaptive Security Appliance [support for ASA Version 9.4.1 till 9.16.1] |
|
||
Cisco ASA-5500 Series Adaptive Security Appliance [support for ASA Version 9.2 and earlier] |
|
||
Cisco ASA-5500 Series Adaptive Security Appliance [support for ASA Version 9.3(2) and later] |
|
||
Cisco ASA-5500 Series Adaptive Security Appliance [support for ASA Version 9.1 and earlier] |
|
||
Cisco ASA-5500 Series Adaptive Security Appliance [support for ASA versions 8.6(1), 9.0(1), and later] |
|
||
Cisco ASA-5500 Series Adaptive Security Appliance [support for ASA versions 8.2(3), 8.4(1-6), 9.0(1), and later] |
|
||
Cisco Adaptive Security Virtual Appliance (ASAv) [support for ASA version 9.2(1) and later] |
|||
ASA-SM on 7600 Series Routers
|
Note |
You cannot upgrade device models 5585, 5515, and 5512 to version 9.13(1), as ASA does not support them. |
Generically Supported Devices for Cisco Security Manager
Cisco Security Manager can manage some device models even if the model does not appear in the supported device list. This type of generic device support relies on the fact that device features are controlled more by the software running on the device than the device model.
If you have a device that does not appear in the explicitly supported device list, you can try to manage it as a generic device using the device modules listed in the following table.
Tips
-
Because this support is generic, Cisco Security Manager cannot determine if a particular feature is not available on the specific model you are managing. You are responsible for determining if a feature that you are allowed to configure in Cisco Security Manager is not supported on the device. If you configure an unsupported feature, you will see errors when you deploy the configuration to the device.
-
If the device contains an explicitly supported module, the module is also supported. However, the module’s model must be explicitly supported: there is no generic module support.
Note |
From version 4.21 onwards, Cisco Security Manager terminates whole support, including support for any bug fixes or enhancements, for all Aggregation Service Routers, Integrated Service Routers, Embedded Service Routers, and any device operating on Cisco IOS software. |
Supported Software for Cisco Security Manager
Cisco Security Manager supports the software on the devices that it manages as described in ASA Supported Software Versions.
ASA Supported Software Versions
The following list describes the minimum supported software versions plus the specific release numbers that have additional support in Cisco Security Manager for devices that run operating systems. You must use a software version that meets at least the minimum required version. If you use a version that is not listed, Cisco Security Manager will treat it as one of these versions (the most closely-matching version, which is typically the release number nearest to it but lower). Any features that are unique to the version you are using are not supported in Cisco Security Manager.
Tip |
The primary software support that is new in Version 4.28 of Cisco Security Manager is ASA 9.20.2. |
-
Cisco ASA-5500 Series Adaptive Security Appliances (ASA)—ASA Software Release 7.0(1-2, 4-8), 7.1(1-2), 7.2(1-5), 8.0(2-3, 5), 8.1(1-2), 8.2(1-3), 8.3(1-2), 8.4(1-6), 8.5(1), 8.6(1), 9.0(1), 9.1(1-5), 9.2(1-3), 9.3(1-2), 9.4.1, 9.5(1-2), 9.6(1-2), 9.6.4, 9.7.1, 9.8(1-2), 9.9(1-2), 9.10.1, and 9.12.1.
-
The following special cases and exceptions apply to ASA software support:
-
If you upgrade a device that you are already managing in Cisco Security Manager from 8.x to 9.0(1) or higher, you must rediscover the device inventory so that Cisco Security Manager starts interpreting the device as a 9.x device and then you must rediscover the policies on the device to ensure that Cisco Security Manager looks for and discovers the appropriate policy types. Alternatively, you can delete the device from Cisco Security Manager and then add the device again.
-
If you perform one of the following upgrades to a device that you are already managing in Cisco Security Manager:
-
—from 7.x to 8.x
-
—from any lower version to 8.3(1) or higher
-
—from 8.3(x) to 8.4(2) or higher
-
You must rediscover the device in Cisco Security Manager. This is required due to significant policy changes between the two releases.
-
For detailed information on these scenarios, refer to the section titled “Validating a Proposed Image Update on a Device” in the User Guide for Cisco Security Manager 4.8 at the following URL:
http:// www.cisco.com/c/en/us/support/security/security-manager/products-user-guide-list.html
-
Although 8.2(4) is supported in downward compatibility mode as 8.2(3), Cisco Security Manager does support ASA 5585 models with SSP-10 and SSP-40 running 8.2(4).
-
You cannot use Cisco Security Manager to manage SSL VPNs on ASA 7.x.
-
You cannot use Cisco Security Manager to manage an ASA 8.3+ device if you enable password encryption using the password encryption aes command. You must turn off password encryption before you can add the device to the Cisco Security Manager inventory.
-
The ASA-SM does not support any type of VPN configuration for this version. However, starting from the 9.0(1) version, ASA-SM supports VPN configurations.
-
Release 8.6(1) applies to the following Cisco ASA 5500 based Adaptive Security Appliance models only: 5512, 5515, 5525, 5545, and 5555.
-
Cisco Security Manager 4.8 supports ASAv’s when you are using ASA 9.2(1) or other versions of ASA that support ASAv’s.
-
Table provides the details of the ASA platforms that are supported and not supported for ASA 9.2(1) and above.
-
ASA Version |
Supported |
Not Supported |
||
---|---|---|---|---|
9.2(1) |
ASA 5505, 5512, 5515, 5525, 5545, 5555, 5585; ASASM; ASAv |
ASA 1000V, 5510, 5520, 5540, 5550, 5580-20, 5580-40 |
||
9.2(2) |
ASA 5505, 5512, 5515, 5525, 5545, 5555, 5585; ASASM; ASAv |
ASA 1000V, 5510, 5520, 5540, 5550, 5580-20, 5580-40 |
||
9.2(3) |
ASA 5505, 5512, 5515, 5525, 5545, 5555, 5585; ASASM; ASAv |
ASA 1000V, 5510, 5520, 5540, 5550, 5580-20, 5580-40 |
||
9.3(1) |
ASA 5512, 5515, 5525, 5545, 5555, 5585; ASASM; ASAv |
ASA 1000V, 5505, 5510, 5520, 5540, 5550, 5580-20, 5580-40 |
||
9.3(2) |
ASA 5506, 5512, 5515, 5525, 5545, 5555, 5585; ASASM; ASAv |
ASA 1000V, 5505, 5510, 5520, 5540, 5550, 5580-20, 5580-40 |
||
9.4(1) |
ASA 5506, 5512, 5515, 5525, 5545, 5555, 5585; ASASM; ASAv, ASA 5506W, 5506H, 5508, 5516, Cisco FPR9K-SM-24,Cisco FPR9K-SM-36, Cisco FPR9K-SM-44 |
ASA 1000V, 5505, 5510, 5520, 5540, 5550, 5580-20, 5580-40 |
||
9.5(1) |
ASA 5506, 5512, 5515, 5525, 5545, 5555, 5585; ASASM; ASAv, ASA 5506W, 5506-H, 5508, 5516, Cisco FPR9K-SM-24,Cisco FPR9K-SM-36, Cisco FPR9K-SM-44 |
ASA 1000V, 5505, 5510, 5520, 5540, 5550, 5580-20, 5580-40 |
||
9.5(2) |
ASA 5506, 5512, 5515, 5525, 5545, 5555, 5585; ASASM; ASAv, ASA 5506W, 5506-H, 5508, 5516, Cisco FPR9K-SM-24,Cisco FPR9K-SM-36, Cisco FPR9K-SM-44 |
ASA 1000V, 5505, 5510, 5520, 5540, 5550, 5580-20, 5580-40 |
||
9.6(1) |
ASA 5506, 5512, 5515, 5525, 5545, 5555, 5585; ASASM; ASAv, ASA 5506W, 5506-H, 5508, 5516, Cisco FPR9K-SM-24,Cisco FPR9K-SM-36, Cisco FPR9K-SM-44, Cisco FPR-4K-SM-12, Cisco FPR-4K-SM-24, Cisco FPR-4K-SM-36 |
ASA 1000V, 5505, 5510, 5520, 5540, 5550, 5580-20, 5580-40 |
||
9.6(2) |
ASA 5506, 5512, 5515, 5525, 5545, 5555, 5585; ASASM; ASAv, ASA 5506W, 5506-H, 5508, 5516, Cisco FPR9K-SM-24,Cisco FPR9K-SM-36, Cisco FPR9K-SM-44, Cisco FPR-4K-SM-12, Cisco FPR-4K-SM-24, Cisco FPR-4K-SM-36 |
ASA 1000V, 5505, 5510, 5520, 5540, 5550, 5580-20, 5580-40 |
||
9.6(4) |
ASA 5506, 5512, 5515, 5525, 5545, 5555, 5585; ASASM; ASAv, ASA 5506W, 5506-H, 5508, 5516, Cisco FPR9K-SM-24,Cisco FPR9K-SM-36, Cisco FPR9K-SM-44, Cisco FPR-4K-SM-12, Cisco FPR-4K-SM-24, Cisco FPR-4K-SM-36 |
ASA 1000V, 5505, 5510, 5520, 5540, 5550, 5580-20, 5580-40 |
||
9.7(1) |
ASA 5506, 5512, 5515, 5525, 5545, 5555, 5585; ASASM; ASAv, ASA 5506W, 5506-H, 5508, 5516, Cisco FPR-4110(FPR4K-SM-12), Cisco FPR-4120(FPR4K-SM-24), Cisco FPR-4140(FPR4K-SM-36), Cisco FPR-4150(FPR4K-SM-44), Cisco FPR9K-SM-24,Cisco FPR9K-SM-36, Cisco FPR9K-SM-44 |
ASA 1000V, 5505, 5510, 5520, 5540, 5550, 5580-20, 5580-40 |
||
9.8(1) |
ASA 5506, 5512, 5515, 5525, 5545, 5555, 5585; ASASM; ASAv, ASA 5506W, 5506-H, 5508, 5516, Cisco FPR-4110(FPR4K-SM-12), Cisco FPR-4120(FPR4K-SM-24), Cisco FPR-4140(FPR4K-SM-36), Cisco FPR-4150(FPR4K-SM-44),Cisco FPR9K-SM-24,Cisco FPR9K-SM-36, Cisco FPR9K-SM-44 |
ASA 1000V, 5505, 5510, 5520, 5540, 5550, 5580-20, 5580-40 |
||
9.8(2) |
ASA 5506, 5512, 5515, 5525, 5545, 5555, 5585; ASASM; ASAv, ASA 5506W, 5506-H, 5508, 5516, Cisco FPR-4110(FPR4K-SM-12), Cisco FPR-4120(FPR4K-SM-24), Cisco FPR-4140(FPR4K-SM-36), Cisco FPR-4150(FPR4K-SM-44), Cisco FPR9K-SM-24,Cisco FPR9K-SM-36, Cisco FPR9K-SM-44, Cisco FPR-2110, Cisco FPR-2120, Cisco FPR-2130, Cisco FPR-2140 |
ASA 1000V, 5505, 5510, 5520, 5540, 5550, 5580-20, 5580-40 |
||
9.9(1) |
ASA 5506, 5512, 5515, 5525, 5545, 5555, 5585; ASASM; ASAv, ASA 5506W, 5506-H, 5508, 5516, Cisco FPR-4110(FPR4K-SM-12), Cisco FPR-4120(FPR4K-SM-24), Cisco FPR-4140(FPR4K-SM-36), Cisco FPR-4150(FPR4K-SM-44), Cisco FPR9K-SM-24,Cisco FPR9K-SM-36, Cisco FPR9K-SM-44, Cisco FPR-2110, Cisco FPR-2120, Cisco FPR-2130, Cisco FPR-2140 |
ASA 1000V, 5505, 5510, 5520, 5540, 5550, 5580-20, 5580-40 |
||
9.9(2) |
ASA 5506, 5512, 5515, 5525, 5545, 5555, 5585; ASASM; ASAv, ASA 5506W, 5506-H, 5508, 5516, Cisco FPR-4110(FPR4K-SM-12), Cisco FPR-4120(FPR4K-SM-24), Cisco FPR-4140(FPR4K-SM-36), Cisco FPR-4150(FPR4K-SM-44), Cisco FPR9K-SM-24,Cisco FPR9K-SM-36, Cisco FPR9K-SM-44, Cisco FPR-2110, Cisco FPR-2120, Cisco FPR-2130, Cisco FPR-2140 |
ASA 1000V, 5505, 5510, 5520, 5540, 5550, 5580-20, 5580-40 |
||
9.10(1) |
ASA 5506, 5512, 5515, 5525, 5545, 5555, 5585; ASASM; ASAv, ASA 5506W, 5506-H, 5508, 5516, Cisco FPR-4110(FPR4K-SM-12), Cisco FPR-4120(FPR4K-SM-24), Cisco FPR-4140(FPR4K-SM-36), Cisco FPR-4150(FPR4K-SM-44), Cisco FPR9K-SM-24,Cisco FPR9K-SM-36, Cisco FPR9K-SM-44, Cisco FPR-2110, Cisco FPR-2120, Cisco FPR-2130, Cisco FPR-2140 |
ASA 1000V, 5505, 5510, 5520, 5540, 5550, 5580-20, 5580-40 |
||
9.12(1) |
ASA 5512, 5515, 5525, 5545, 5555, 5585; ASASM; ASAv, ASA 5506, 5508, 5516, Cisco FPR-4110(FPR4K-SM-12), Cisco FPR-4115(FPR4K-SM-24S), Cisco FPR-4120(FPR4K-SM-24), Cisco FPR-4125(FPR4K-SM-32S),Cisco FPR-4140(FPR4K-SM-36), Cisco FPR-4145(FPR4K-SM-44S),Cisco FPR-4150(FPR4K-SM-44), Cisco FPR9K-SM-24,Cisco FPR9K-SM-36, Cisco FPR9K-SM-40,Cisco FPR9K-SM-44, Cisco FPR9K-SM-48, Cisco FPR9K-SM-56, Cisco FPR-2110, Cisco FPR-2120, Cisco FPR-2130, Cisco FPR-2140 |
ASA 1000V, 5505, 5510, 5520, 5540, 5550, 5580-20, 5580-40 |
||
9.12(2) |
ASA 5512, 5515, 5525, 5545, 5555, 5585; ASASM; ASAv, ASA 5506, 5506W, 5506H, 5508, 5516, Cisco FPR-4110(FPR4K-SM-12), Cisco FPR-4115(FPR4K-SM-24S), Cisco FPR-4120(FPR4K-SM-24), Cisco FPR-4125(FPR4K-SM-32S),Cisco FPR-4140(FPR4K-SM-36), Cisco FPR-4145(FPR4K-SM-44S),Cisco FPR-4150(FPR4K-SM-44), Cisco FPR9K-SM-24,Cisco FPR9K-SM-36, Cisco FPR9K-SM-40,Cisco FPR9K-SM-44, Cisco FPR9K-SM-48, Cisco FPR9K-SM-56, Cisco FPR-2110, Cisco FPR-2120, Cisco FPR-2130, Cisco FPR-2140 |
ASA 1000V, 5505, 5510, 5520, 5540, 5550, 5580-20, 5580-40 |
||
9.13(1) |
ASA 5506,5506W, 5506H, 5525, 5545, 5555; ASASM; ASAv, ASA 5508, 5516, Cisco FPR-4110(FPR4K-SM-12), Cisco FPR-4115(FPR4K-SM-24S), Cisco FPR-4120(FPR4K-SM-24), Cisco FPR-4125(FPR4K-SM-32S),Cisco FPR-4140(FPR4K-SM-36), Cisco FPR-4145(FPR4K-SM-44S), Cisco FPR-4150(FPR4K-SM-44), Cisco FPR9K-SM-24,Cisco FPR9K-SM-36, Cisco FPR9K-SM-40,Cisco FPR9K-SM-44, Cisco FPR9K-SM-48, Cisco FPR-1010, Cisco FPR-1120, Cisco FPR-1140, Cisco FPR-1150, Cisco FPR9K-SM-56, Cisco FPR-2110, Cisco FPR-2120, Cisco FPR-2130, Cisco FPR-2140 |
ASA 1000V, 5505, 5510, 5520, 5540, 5550, 5580-20, 5580-40, 5512, 5515, 5585 |
||
9.14(1) |
ASA 5506, 5506W, 5506H, 5525, 5545, 5555; ASASM; ASAv, ASA 5508, 5516, Cisco FPR-4110(FPR4K-SM-12), Cisco FPR-4115(FPR4K-SM-24S) Cisco FPR-4112 (FPR4K-SM-12S), Cisco FPR-4120(FPR4K-SM-24), Cisco FPR-4125(FPR4K-SM-32S),Cisco FPR-4140(FPR4K-SM-36), Cisco FPR-4145(FPR4K-SM-44S),Cisco FPR-4150(FPR4K-SM-44), Cisco FPR9K-SM-24,Cisco FPR9K-SM-36, Cisco FPR9K-SM-40,Cisco FPR9K-SM-44, Cisco FPR9K-SM-48, Cisco FPR-1010, Cisco FPR-1120, Cisco FPR-1140, Cisco FPR-1150, Cisco FPR9K-SM-56, Cisco FPR-2110, Cisco FPR-2120, Cisco FPR-2130, Cisco FPR-2140 |
ASA 1000V, 5505, 5510, 5520, 5540, 5550, 5580-20, 5580-40, 5512, 5515, 5585 |
||
9.15(1) |
ASA 5506, 5525, 5545, 5555; ASASM; ASAv, ASA 5506,5506W, 5506H, 5508, 5516, Cisco FPR-4110(FPR4K-SM-12), Cisco FPR-4115(FPR4K-SM-24S) Cisco FPR-4112 (FPR4K-SM-12S), Cisco FPR-4120(FPR4K-SM-24), Cisco FPR-4125(FPR4K-SM-32S),Cisco FPR-4140(FPR4K-SM-36), Cisco FPR-4145(FPR4K-SM-44S),Cisco FPR-4150(FPR4K-SM-44), Cisco FPR9K-SM-24,Cisco FPR9K-SM-36, Cisco FPR9K-SM-40,Cisco FPR9K-SM-44, Cisco FPR9K-SM-48, Cisco FPR-1010, Cisco FPR-1120, Cisco FPR-1140, Cisco FPR-1150, Cisco FPR9K-SM-56, Cisco FPR-2110, Cisco FPR-2120, Cisco FPR-2130, Cisco FPR-2140 |
ASA 1000V, 5505, 5510, 5520, 5540, 5550, 5580-20, 5580-40, 5512, 5515, 5585 |
||
9.16(1) |
ASA 5506, 5525, 5545, 5555; ASASM; ASAv, ASA 5506, 5506W, 5506H, 5508, 5516, Cisco FPR-4110(FPR4K-SM-12), Cisco FPR-4115(FPR4K-SM-24S) Cisco FPR-4112 (FPR4K-SM-12S), Cisco FPR-4120(FPR4K-SM-24), Cisco FPR-4125(FPR4K-SM-32S),Cisco FPR-4140(FPR4K-SM-36), Cisco FPR-4145(FPR4K-SM-44S),Cisco FPR-4150(FPR4K-SM-44), Cisco FPR9K-SM-24,Cisco FPR9K-SM-36, Cisco FPR9K-SM-40,Cisco FPR9K-SM-44, Cisco FPR9K-SM-48, Cisco FPR-1010, Cisco FPR-1120, Cisco FPR-1140, Cisco FPR-1150, Cisco FPR9K-SM-56, Cisco FPR-2110, Cisco FPR-2120, Cisco FPR-2130, Cisco FPR-2140 |
ASA 1000V, 5505, 5510, 5520, 5540, 5550, 5580-20, 5580-40, 5512, 5515, 5585 |
||
9.17(1) |
ASA 5525, 5545, 5555; ASASM; ASAv, ASA 5506, 5506W, 5506H, 5508 , 5516, Cisco FPR-4110(FPR4K-SM-12), Cisco FPR-4115(FPR4K-SM-24S) Cisco FPR-4112 (FPR4K-SM-12S), Cisco FPR-4120(FPR4K-SM-24), Cisco FPR-4125(FPR4K-SM-32S),Cisco FPR-4140(FPR4K-SM-36), Cisco FPR-4145(FPR4K-SM-44S),Cisco FPR-4150(FPR4K-SM-44), Cisco FPR9K-SM-24,Cisco FPR9K-SM-36, Cisco FPR9K-SM-40,Cisco FPR9K-SM-44, Cisco FPR9K-SM-48, Cisco FPR-1010, Cisco FPR-1120, Cisco FPR-1140, Cisco FPR-1150, Cisco FPR9K-SM-56, Cisco FPR-2110, Cisco FPR-2120, Cisco FPR-2130, Cisco FPR-2140, FPR-3110,FPR-3120, FPR-3130, FPR-3140 |
ASA 1000V, 5505, 5510, 5520, 5540, 5550, 5580-20, 5580-40, 5512, 5515, 5585 |
||
9.18(1) |
ASA 5525, 5545, 5555; ASASM; ASAv, ASA 5506,5506W, 5506H, 5508, 5516, Cisco FPR-4110(FPR4K-SM-12), Cisco FPR-4115(FPR4K-SM-24S) Cisco FPR-4112 (FPR4K-SM-12S), Cisco FPR-4120(FPR4K-SM-24), Cisco FPR-4125(FPR4K-SM-32S),Cisco FPR-4140(FPR4K-SM-36), Cisco FPR-4145(FPR4K-SM-44S),Cisco FPR-4150(FPR4K-SM-44), Cisco FPR9K-SM-24,Cisco FPR9K-SM-36, Cisco FPR9K-SM-40,Cisco FPR9K-SM-44, Cisco FPR9K-SM-48, Cisco FPR-1010, Cisco FPR-1120, Cisco FPR-1140, Cisco FPR-1150, Cisco FPR9K-SM-56, Cisco FPR-2110, Cisco FPR-2120, Cisco FPR-2130, Cisco FPR-2140, FPR-3110,FPR-3120, FPR-3130, FPR-3140 |
ASA 1000V, 5505, 5510, 5520, 5540, 5550, 5580-20, 5580-40, 5512, 5515, 5585 |
||
9.18(3) |
ASA 5525, 5545, 5555; ASASM; ASAv, ASA 5506, 5506W, 5506H, 5508, 5516, Cisco FPR-4110(FPR4K-SM-12), Cisco FPR-4115(FPR4K-SM-24S), Cisco FPR-4112 (FPR4K-SM-12S), Cisco FPR-4120(FPR4K-SM-24), Cisco FPR-4125(FPR4K-SM-32S),Cisco FPR-4140(FPR4K-SM-36), Cisco FPR-4145(FPR4K-SM-44S),Cisco FPR-4150(FPR4K-SM-44), Cisco FPR9K-SM-24,Cisco FPR9K-SM-36, Cisco FPR9K-SM-40,Cisco FPR9K-SM-44, Cisco FPR9K-SM-48, Cisco FPR-1010, Cisco FPR-1120, Cisco FPR-1010E, Cisco FPR-1140, Cisco FPR-1150, Cisco FPR9K-SM-56, Cisco FPR-2110, Cisco FPR-2120, Cisco FPR-2130, Cisco FPR-2140, Cisco FPR-3110,Cisco FPR-3120, Cisco FPR-3130, Cisco FPR-3140
|
ASA 1000V, 5505, 5510, 5520, 5540, 5550, 5580-20, 5580-40, 5512, 5515, 5585 |
||
9.19(1) |
ASA 5525, 5545- 5555; ASASM; ASAv, ASA 5506, 5506W, 5506H, 5508, 5516, Cisco FPR-4125(FPR4K-SM-32S), Cisco FPR9K-SM-40,Cisco FPR9K-SM-56, Cisco FPR9K-SM-48, Cisco FPR-1010, Cisco FPR-1120, Cisco FPR-1140, Cisco FPR-1150, Cisco FPR-2110, Cisco FPR-2120, Cisco FPR-2130, Cisco FPR-2140, Cisco FPR-3110, Cisco FPR-3120, Cisco FPR-3130, Cisco FPR-3140, Cisco FPR-3105 |
ASA 1000V, 5505, 5510, 5520, 5540, 5550, 5580-20, 5580-40, 5512, 5515, 5585, FPR4K-SM-12, FPR4K-SM-24, FPR-4k SM-36 and FPR-4k-SM-44, FPR9k-SM-24, FPR9k-SM-36, FPR9k-SM-44 |
||
9.20(1) |
ASA 5525, 5545, 5555; ASASM; ASAv, ASA 5506, 5506W, 5506H, 5508, 5516, Cisco FPR-4125(FPR4K-SM-32S), Cisco FPR9K-SM-40,Cisco, Cisco FPR9K-SM-48, Cisco FPR-1010, Cisco FPR-1120, Cisco FPR-1010E, Cisco FPR-1140, Cisco FPR-1150, Cisco FPR9K-SM-56, Cisco FPR-2110, Cisco FPR-2120, Cisco FPR-2130, Cisco FPR-2140, Cisco FPR-3110,Cisco FPR-3120, Cisco FPR-3130, Cisco FPR-3140, Cisco FPR-3105, Cisco FPR-4215, Cisco FPR-4225, Cisco FPR-4245 |
ASA 1000V, 5505, 5510, 5520, 5540, 5550, 5580-20, 5580-40, 5512, 5515, 5585, FPR4K-SM-12, FPR4K-SM-24, FPR-4k SM-36, FPR-4k-SM-44, FPR9k-SM-24,FPR9k-SM-36,FPR9k-SM-44 |
||
9.20(2) |
ASA 5525, 5545, 5555; ASASM; ASAv, ASA 5506, 5506W, 5506H, 5508, 5516, Cisco FPR-4125(FPR4K-SM-32S), Cisco FPR9K-SM-40,Cisco, Cisco FPR9K-SM-48, Cisco FPR-1010, Cisco FPR-1120, Cisco FPR-1010E, Cisco FPR-1140, Cisco FPR-1150, Cisco FPR9K-SM-56, Cisco FPR-2110, Cisco FPR-2120, Cisco FPR-2130, Cisco FPR-2140, Cisco FPR-3110,Cisco FPR-3120, Cisco FPR-3130, Cisco FPR-3105, Cisco FPR-3140, Cisco FPR-4215, Cisco FPR-4225, Cisco FPR-4245 |
ASA 1000V, 5505, 5510, 5520, 5540, 5550, 5580-20, 5580-40, 5512, 5515, 5585, FPR4K-SM-12, FPR4K-SM-24, FPR-4k SM-36 and FPR-4k-SM-44, FPR9k-SM-24, FPR9k-SM-36, FPR9k-SM-44 |
Software Supported in Downward Compatibility Mode
Cisco Security Manager directly supports many individual point releases for the various operating systems you can use with the supported devices. When Cisco Security Manager supports a specific point release, it means that you can configure some features new to that release using the product.
Some point releases are supported in “downward compatibility mode.” In this mode, you can use the product to configure devices running that point release, but you cannot configure features that are new in the release unless you use FlexConfigs. Thus, the point release is treated as being the same as the nearest point release to it, and Cisco Security Manager maps the release number to that supported release.
The following table lists the releases that are specifically supported in Cisco Security Manager, and the point releases that are supported as downward equivalents to the release. The table might not include information about every downward compatible release. In general, if a version is not listed here or in Supported Software for Cisco Security Manager, Cisco Security Manager will treat it as one of the supported versions (the most closely-matching version, which is typically the release number nearest to it but lower).
Releases Supported in Downward Compatibility Mode |
Supported As These Releases |
---|---|
ASA Software Releases |
|
8.2(5), 8.2(4.4), 8.2(4.1), 8.2(4), 8.2(3.9) |
8.2(3) |
8.0(4) |
8.0(3) |
Product Documentation
For the complete list of documents supporting this release, see the release-specific document roadmap:
-
Guide to User Documentation for Cisco Security Manager
Lists document set that supports the Cisco Security Manager release and summarizes contents of each document.
-
For general product information, see:
http://www.cisco.com/go/csmanager
Communications, Services, and Additional Information
-
To receive timely, relevant information from Cisco, sign up at Cisco Profile Manager.
-
To get the business impact you’re looking for with the technologies that matter, visit Cisco Services.
-
To submit a service request, visit Cisco Support.
-
To discover and browse secure, validated enterprise-class apps, products, solutions and services, visit Cisco Marketplace.
-
To obtain general networking, training, and certification titles, visit Cisco Press.
-
To find warranty information for a specific product or product family, access Cisco Warranty Finder.
Cisco Bug Search Tool
Cisco Bug Search Tool (BST) is a web-based tool that acts as a gateway to the Cisco bug tracking system that maintains a comprehensive list of defects and vulnerabilities in Cisco products and software. BST provides you with detailed defect information about your products and software.
This document is to be used in conjunction with the documents listed in the Communications, Services, and Additional Information section.