Cisco Cisco Firepower Management Center 2000
Firepower System Release Notes
Resolved Issues
Resolved an issue where creating a search for an intrusion event with an original client IP using a negated subnet IP
address caused the system to incorrectly exclude intrusion events with no original client IP. (CSCuu68438)
address caused the system to incorrectly exclude intrusion events with no original client IP. (CSCuu68438)
Resolved an issue where, in rare cases, the system appeared unstable and did not recover from a reboot.
(CSCuu93154)
(CSCuu93154)
Resolved an issue where a drive failure on some DC4000 appliances caused RAID controller failure and data loss.
(CSCuu93159)
(CSCuu93159)
Improved eStreamer performance. (CSCuu94902)
Resolved an issue where the system did not display the correct number of bytes in the Top Web Applications Seen
and Top Client Applications Seen widgets on the Summary Dashboard if you viewed high-volume media such as
video streaming on your web browser. (CSCuu97036)
and Top Client Applications Seen widgets on the Summary Dashboard if you viewed high-volume media such as
video streaming on your web browser. (CSCuu97036)
Resolved an issue where, if you deployed an SSL policy set to
Decrypt-Resign
on a managed device, the decrypted
traffic that egressed from one interface set switched or routed so the traffic ingressed into a different interface set
on the same managed device and the system experienced a disruption in SSL traffic. (CSCuu97712)
on the same managed device and the system experienced a disruption in SSL traffic. (CSCuu97712)
Resolved an issue where the
Send email
check box on the Report Templates tab of the Reporting page did not stay
selected and you stopped receiving reports via email if you generated a report, navigated away from the Report
Templates tab, and then generated another report. (CSCuu97750, CSCuu41580, CSCuv43116)
Templates tab, and then generated another report. (CSCuu97750, CSCuu41580, CSCuv43116)
Resolved an issue where clicking
Continue
on interactive block web page did not always redirect you to the blocked
web page. (CSCuu97934, CSCuu97946)
Resolved an issue where, in some cases, updating failed. (CSCuu99337)
Resolved an issue where the system did not acknowledge users as members of their primary LDAP groups.
(CSCuv03821)
(CSCuv03821)
Resolved an issue where, if you generated a connection event report and modified the
Maximum Results
value, the
system did not save the new value and generated the report with the default value. (CSCuv06557)
Resolved an issue where, if you configured the system to use a remote NTP server to synchronize time to a system
with a managed device running a version older than Version 5.4 and you experienced a leap second, your system
used a high amount of CPU. (CSCuv11738)
with a managed device running a version older than Version 5.4 and you experienced a leap second, your system
used a high amount of CPU. (CSCuv11738)
Resolved an issue where, if you created an access control rule configured with an Interactive Block action and you
viewed a blocked webpage in a Chrome web browser, the
viewed a blocked webpage in a Chrome web browser, the
Continue
button to bypass the block page did not work.
(CSCuv21748)
Resolved an issue where generated internal CA certificates were valid for only 30 days instead of 10 years.
(CSCuv29004)
(CSCuv29004)
Resolved an issue where, if a host generated an Indication of Compromise (IoC) and you disabled the IoC for that
host on the Host Profile page, the Indications of Compromise by Host dashboard widget incorrectly displayed the
IoC when it should not. (CSCuv41376)
host on the Host Profile page, the Indications of Compromise by Host dashboard widget incorrectly displayed the
IoC when it should not. (CSCuv41376)
Resolved an issue where, if you created an SSL policy default action set to
Decrypt - Known Key
or
Decrypt - Resign
on a
7000 Series or 8000 Series device and you choose to resume the SSL session with a different source IP address,
SSL inspection failed and the connection log displayed an incorrect SSL policy default action. (CSCuv48689)
SSL inspection failed and the connection log displayed an incorrect SSL policy default action. (CSCuv48689)
Improved file detection and blocking. (CSCuv59181)
Improved memory utilization for port ranges in access control rules. (CSCuv64114)
Resolved an issue where, if you registered many devices or configured many interfaces on a managed device or
created many VPN deployments, the system did not generate information for all of the devices or interfaces or VPN
deployments on their respective pages. (CSCuv76287)
created many VPN deployments, the system did not generate information for all of the devices or interfaces or VPN
deployments on their respective pages. (CSCuv76287)
Improved Health Monitor alerting. (CSCuv96121)
Resolved an issue where merging intrusion policy layers generated errors. (CSCuw34380)
Improved email notification reliability. (CSCuw36354)