Cisco Cisco Firepower Management Center 2000

Seite von 32
Firepower System Release Notes
 
Resolved Issues
 
Resolved an issue where creating a search for an intrusion event with an original client IP using a negated subnet IP 
address caused the system to incorrectly exclude intrusion events with no original client IP. (CSCuu68438)
Resolved an issue where, in rare cases, the system appeared unstable and did not recover from a reboot. 
(CSCuu93154)
Resolved an issue where a drive failure on some DC4000 appliances caused RAID controller failure and data loss. 
(CSCuu93159)
Improved eStreamer performance. (CSCuu94902)
Resolved an issue where the system did not display the correct number of bytes in the Top Web Applications Seen 
and Top Client Applications Seen widgets on the Summary Dashboard if you viewed high-volume media such as 
video streaming on your web browser. (CSCuu97036)
Resolved an issue where, if you deployed an SSL policy set to 
Decrypt-Resign
 on a managed device, the decrypted 
traffic that egressed from one interface set switched or routed so the traffic ingressed into a different interface set 
on the same managed device and the system experienced a disruption in SSL traffic. (CSCuu97712)
Resolved an issue where the 
Send email 
check box on the Report Templates tab of the Reporting page did not stay 
selected and you stopped receiving reports via email if you generated a report, navigated away from the Report 
Templates tab, and then generated another report. (CSCuu97750, CSCuu41580, CSCuv43116)
Resolved an issue where clicking 
Continue
 on interactive block web page did not always redirect you to the blocked 
web page. (CSCuu97934, CSCuu97946)
Resolved an issue where, in some cases, updating failed. (CSCuu99337)
Resolved an issue where the system did not acknowledge users as members of their primary LDAP groups. 
(CSCuv03821)
Resolved an issue where, if you generated a connection event report and modified the 
Maximum Results
 value, the 
system did not save the new value and generated the report with the default value. (CSCuv06557)
Resolved an issue where, if you configured the system to use a remote NTP server to synchronize time to a system 
with a managed device running a version older than Version 5.4 and you experienced a leap second, your system 
used a high amount of CPU. (CSCuv11738)
Resolved an issue where, if you created an access control rule configured with an Interactive Block action and you 
viewed a blocked webpage in a Chrome web browser, the 
Continue
 button to bypass the block page did not work. 
(CSCuv21748)
Resolved an issue where generated internal CA certificates were valid for only 30 days instead of 10 years. 
(CSCuv29004)
Resolved an issue where, if a host generated an Indication of Compromise (IoC) and you disabled the IoC for that 
host on the Host Profile page, the Indications of Compromise by Host dashboard widget incorrectly displayed the 
IoC when it should not. (CSCuv41376)
Resolved an issue where, if you created an SSL policy default action set to 
Decrypt - Known Key
 or 
Decrypt - Resign
 on a 
7000 Series or 8000 Series device and you choose to resume the SSL session with a different source IP address, 
SSL inspection failed and the connection log displayed an incorrect SSL policy default action. (CSCuv48689)
Improved file detection and blocking. (CSCuv59181)
Improved memory utilization for port ranges in access control rules. (CSCuv64114)
Resolved an issue where, if you registered many devices or configured many interfaces on a managed device or 
created many VPN deployments, the system did not generate information for all of the devices or interfaces or VPN 
deployments on their respective pages. (CSCuv76287)
Improved Health Monitor alerting. (CSCuv96121)
Resolved an issue where merging intrusion policy layers generated errors. (CSCuw34380)
Improved email notification reliability. (CSCuw36354)