Cisco Cisco Firepower Management Center 2000

Seite von 56
   
Firepower System Release Notes
Known Issues
 
41
Resolved an issue where, if you generated a connection event report and modified the 
Maximum Results
 value, 
the system did not save the new value and generated the report with the default value. (CSCuv06557)
Resolved an issue where, if you configured the system to use a remote NTP server to synchronize time to a 
system with a managed device running a version older than Version 5.4 and you experienced a leap second, 
your system used a high amount of CPU. (CSCuv11738)
Resolved an issue where, if you created an access control rule configured with an Interactive Block action and 
you viewed a blocked web page in a Chrome web browser, the 
Continue
 button to bypass the block page did 
not work. (CSCuv21748)
Resolved an issue where generated internal CA certificates were valid for only 30 days instead of 10 years. 
(CSCuv29004)
Resolved an issue where, if a host generated an Indication of Compromise (IoC) and you disabled the IoC for 
that host on the Host Profile page, the Indications of Compromise by Host dashboard widget incorrectly 
displayed the IoC when it should not. (CSCuv41376)
Resolved an issue where, if you created an SSL policy default action set to 
Decrypt - Known Key
 or 
Decrypt - Resign
 
on a 7000 Series or 8000 Series device and you choose to resume the SSL session with a different source IP 
address, SSL inspection failed and the connection log displayed an incorrect SSL policy default action. 
(CSCuv48689)
You can now view server names and association classification through the 
show ntp
 CLI command on your 
Firepower Threat Defense devices. (CSCuv57818)
Improved file detection and blocking. (CSCuv59181)
To suppress IPv6 router advertisement messages on a Firepower Threat Defense device, clear the 
Enable RA
 
check box in the Settings page (
Device > Device Management > Interfaces> IPv6 > Settings
) under the device interface 
configuration on the Firepower Management Center. (CSCuv62594)
Improved memory utilization for port ranges in access control rules. (CSCuv64114)
Resolved an issue where, if you registered many devices or configured many interfaces on a managed device 
or created many VPN deployments, the system did not generate information for all of the devices or interfaces 
or VPN deployments on their respective pages. (CSCuv76287)
Improved Health Monitor alerting. (CSCuv96121)
Resolved an issue where merging intrusion policy layers generated errors. (CSCuw34380)
Improved email notification reliability. (CSCuw36354)
Resolved an issue where, in some cases, the system experienced errors caused by invalid username values. 
(CSCuw39725)
Resolved an issue where, if you switched from Serial Over LAN (SOL) to Lights-out-Management (LOM) on a 
MC4000, or vice versa, the system’s console port did not work. (CSCuw67319)
Resolved an issue where, if you enabled SSL debug logging via the s
ystem support ssl-debug
 or 
system 
support debug-DAQ-NSE
 CLI command and your system experienced a high amount of traffic for an extended 
amount of time, the system experienced disk space issues. (CSCuw68004)
Resolved an issue where, if you edited the global blacklist, the system incorrectly marked the access control 
policy as out-of-date. (CSCuy36653)
Known Issues
You can view known issues reported in this release using the Cisco Bug Search Tool 
(
https://tools.cisco.com/bugsearch/
). A Cisco account is required.
The following known issues are reported in Version 6.0.1.2: