Cisco Cisco Firepower Management Center 2000 Notas de publicación
49
FireSIGHT System Release Notes
For Assistance
If you filter intrusion rules on the Rule State page (Rule Configuration > Rule State) and search for the FlowBit
keyword, the system generates inconsistent results. (CSCuy13901)
keyword, the system generates inconsistent results. (CSCuy13901)
If you apply an access control policy containing a file policy set to Block Malware and an SSL policy set to Decrypt
- Known key, the system does not successfully complete the initial file transfer for incoming traffic when it should.
As a workaround, download the file a second time. (CSCuy22114)
- Known key, the system does not successfully complete the initial file transfer for incoming traffic when it should.
As a workaround, download the file a second time. (CSCuy22114)
If you apply an SSL rule with the rule action set to Decrypt-Resign and browse decrypted websites using Chrome
Version 40 or later, the browser generates alerts for the decrypted websites. As a workaround, use the Internet
Explorer or Firefox web browser. (CSCuy30988)
Version 40 or later, the browser generates alerts for the decrypted websites. As a workaround, use the Internet
Explorer or Firefox web browser. (CSCuy30988)
In some cases, if you apply an access control policy referencing an intrusion policy and an SSL policy with the action
set to Decrypt-Resign, the system does not generate downloadable packet information on the packet view of the
Intrusion Events page (Analysis > Intrusion > Events). (CSCuy34078)
set to Decrypt-Resign, the system does not generate downloadable packet information on the packet view of the
Intrusion Events page (Analysis > Intrusion > Events). (CSCuy34078)
If you remove a user from all groups within a realm referenced in the access control policy and apply configuration
changes, then click Download users and groups from the Access Control tab, the system does not update the
applied configuration and continues to process traffic as if the group(s) still contained the user. (CSCuy39685)
changes, then click Download users and groups from the Access Control tab, the system does not update the
applied configuration and continues to process traffic as if the group(s) still contained the user. (CSCuy39685)
If you Create Email Alert on the Alerts page (Policies > Actions > Alerts) and enable the Retrospective Events
configuration option on the Advanced Malware Protection Alerts tab, then save and apply, the system generates
truncated emails when the alert is triggered when the emails should not be. (CSCuy49371)
configuration option on the Advanced Malware Protection Alerts tab, then save and apply, the system generates
truncated emails when the alert is triggered when the emails should not be. (CSCuy49371)
In some cases, if you enable the use of a proxy on the Defense Center and submit captured files to the Cisco cloud
for dynamic analysis, the system generates a Dynamic Analysis Failed (Network Issue) error and does not
successfully submit the files for analysis. (CSCuy49613)
for dynamic analysis, the system generates a Dynamic Analysis Failed (Network Issue) error and does not
successfully submit the files for analysis. (CSCuy49613)
In some cases, access control rules were not working for web applications and URLs that are SPDY-enabled.
(CSCuy65157)
(CSCuy65157)
In some cases, if you allow cloud communications enable both Enable URL Filtering and Query Cloud for Unknown
URLs on the Cloud Services page (Configuration > ASA FirePOWER Configuration > Local > Configuration > Cloud
Service) on an ASA Firepower device managed by ASDM and the device requests a URL lookup for an unknown
URL, the system does not assign a category when it should. (CSCuy79984)
URLs on the Cloud Services page (Configuration > ASA FirePOWER Configuration > Local > Configuration > Cloud
Service) on an ASA Firepower device managed by ASDM and the device requests a URL lookup for an unknown
URL, the system does not assign a category when it should. (CSCuy79984)
If you update a Defense Center to Version 5.4.1.6 or later and apply policy to a registered device running Version
5.3.x, policy apply fails. If you register a device running Version 5.3.x to a Defense Center running Version 5.4.1.6
and update the device to Version 5.4.1.6, the update fails. As a workaround, apply an access control policy with no
rules and the default action set to Network Discovery to the managed device running any version of 5.3 and update
the device to Version 5.4.1.5, then update the device to Version 5.4.1.6. (CSCuz52737)
5.3.x, policy apply fails. If you register a device running Version 5.3.x to a Defense Center running Version 5.4.1.6
and update the device to Version 5.4.1.6, the update fails. As a workaround, apply an access control policy with no
rules and the default action set to Network Discovery to the managed device running any version of 5.3 and update
the device to Version 5.4.1.5, then update the device to Version 5.4.1.6. (CSCuz52737)
For Assistance
Thank you for choosing the FireSIGHT System.
Cisco Support
For information on obtaining documentation, using the Cisco Bug Search Tool (BST), submitting a service request, and
gathering additional information about Cisco ASA devices, see What’s New in Cisco Product Documentation at:
gathering additional information about Cisco ASA devices, see What’s New in Cisco Product Documentation at:
Subscribe to What’s New in Cisco Product Documentation, which lists all new and revised Cisco technical
documentation, as an RSS feed and deliver content directly to your desktop using a reader application. The RSS feeds
are a free service.
documentation, as an RSS feed and deliver content directly to your desktop using a reader application. The RSS feeds
are a free service.
If you have any questions or require assistance with Cisco ASA devices, please contact Cisco Support:
http://support.cisco.com/
.