Cisco Cisco Firepower Management Center 2000 Notas de publicación
4
FireSIGHT System Release Notes
Version 5.3.1.4
Documentation Updates
Tip
Cisco documentation may refer to the Defense Center as the FireSIGHT Management Center. The
Defense Center and the FireSIGHT Management Center are the same appliance.
Defense Center and the FireSIGHT Management Center are the same appliance.
Features Introduced in Previous Versions
Functionality described in previous versions may be superseded by other new functionality or updated
through resolved issues.
through resolved issues.
Version 5.3.1.1
The following features and functionality were introduced in Version 5.3.1.1:
•
You can now configure access control rules with the
GRE 47
port condition.
•
You can now use the Defense Center’s proxy server to communicate with the Cisco Security
Manager (CSM).
Manager (CSM).
•
You can now reapply device configuration after editing the list of security zones of a cluster, stack
or clustered stack of devices from the Object Management page by selecting the apply icon for
device changes on the Device Management page (
or clustered stack of devices from the Object Management page by selecting the apply icon for
device changes on the Device Management page (
Devices > Device Management
).
•
You can now configure registered ASA FirePOWER devices with advanced options on the advanced
tab of the Device Management page (
tab of the Device Management page (
Devices > Devices Management
).
Documentation Updates
The documentation provided for Version 5.3.1.4 contains the following errors:
•
The FireSIGHT System User Guide incorrectly states the following about devices in a stack:
If a
secondary device fails, the primary device continues to sense traffic, generate
alerts, and send traffic to all secondary devices. On failed secondary devices,
traffic is dropped. A health alert is generated indicating loss of link.
The documentation should specify that, by default, if the secondary device in a stack fails, by
default, inline sets with configurable bypass enabled go into bypass mode on the primary device.
For all other configurations, the system continues to load balance traffic to the failed secondary
device. In either case, a health alert is generated to indicate loss of link. (122708/CSCze88292,
123380/CSCze88692, 138433/CSCze91099)
default, inline sets with configurable bypass enabled go into bypass mode on the primary device.
For all other configurations, the system continues to load balance traffic to the failed secondary
device. In either case, a health alert is generated to indicate loss of link. (122708/CSCze88292,
123380/CSCze88692, 138433/CSCze91099)
Cisco Adaptive Security Appliance (ASA)
ASA device
Refers to the Cisco ASA hardware
Cisco ASA with FirePOWER Services
Refers to ASA devices with the ASA FirePOWER
module installed
module installed
ASA FirePOWER module
Refers to the hardware and software modules
installed on compatible ASA devices
installed on compatible ASA devices
ASA software
Refers to the base software installed on Cisco ASA
devices
devices
Table 1
Changes to Terminology
Version 5.3.1 Terminology
Description