Cisco Cisco Firepower Management Center 2000

Seite von 56
Firepower System Release Notes
 
New Features and Functionality
 
8
Updated Terminology
The terminology used in Version 6.0.1.2 may differ from the terminology used in previous releases. For more 
information, see the 
.
Updated Documentation
To access the full documentation for the Firepower System, see the documentation roadmap at 
. In Version 6.0.1.2, the 
following documents were updated to reflect the addition of new features and changed functionality and to 
address reported documentation issues:
Firepower Management Center Configuration Guide
Firepower Management Center Online Help
The documentation updated for Version 6.0.1.2 contains the following errors:
The Firepower Management Center Configuration Guide incorrectly states that Cisco does not recommend 
enabling more than one non-SFRP IP address on a 7000 or 8000 Series device high availability pair's routed 
or hybrid interface where one SFRP IP address is already configured. The system does not perform NAT if a 
7000 or 8000 Series device high availability pair experience failover while in standby mode. 
The Firepower Management Center Configuration Guide does not reflect that in a multidomain deployment, 
when you create a DNS policy, the Descendant Whitelists for DNS rule and Descendant Blacklists for DNS rule 
are disabled by default. You can enable each rule by editing them. 
Note: 
The online help content may differ from the Firepower Management Center Configuration Guide content. 
The Firepower Management Center Configuration Guide content is updated more regularly than the online help.
Features and Changed Functionality Introduced in Previous Versions
Functionality described in previous versions may be superseded by other new functionality or updated through 
resolved issues. The following features and functionality were introduced in previous versions:
Version 6.0.1
Fully Integrated, Threat-Focused Next-Generation Firewall
Most next-generation firewalls (NGFWs) focus heavily on enabling application control, but little on their threat 
defense capabilities. To compensate, some NGFWs try to supplement their first-generation intrusion prevention 
with a series of non-integrated add-on products. However, this approach does little to protect your business 
against the risks posed by sophisticated attackers and advanced malware. Further, once you do get infected, they 
offer no assistance in scoping the infection, containing it, and remediating quickly.
The Cisco Firepower™ Next-Generation Firewall (NGFW) is the industry’s first fully integrated, threat-focused 
NGFW. It delivers comprehensive, unified policy management of firewall functions, application control, threat 
prevention, and advanced malware protection from the network to the endpoint.
Firepower Threat Defense
The Firepower Threat Defense software package can be deployed on Cisco Firepower 4100 and 9300 appliances 
to provide a performance and density optimized NGFW security platform for Internet edge and other 
high-performance environments. Firepower Threat Defense functionality added in this release includes device and 
interface management, routing, NAT, and device high availability, in addition to support for the full Firepower 
NGIPS offering.