Cisco Cisco FirePOWER Appliance 7115

Seite von 46
Version 5.3.0.6
Sourcefire 3D System Release Notes
21
Resolved Issues
Resolved an issue where, in rare cases, the system displayed incorrect, 
extremely high packet counts in the dashboard and event views for Series 3 
managed devices. (138608/CSCze91081)
Improved the stability of clustered state sharing on 3D8250 and 3D8350 
managed devices. (139141/CSCze91387)
Resolved an issue where, if you enabled telnet on a Cisco IOS Null Route 
remediation module and configured the username for the Cisco IOS 
instance to enable by default on the Cisco IOS router, Cisco IOS Null route 
remediation failed on the Defense Center. (139387/CSCze91484)
Resolved an issue where, if one of your network variables in a variable set 
excluded 
:: 
or 
::0
 addresses and you referenced the variable set in an 
access control policy, applying your access control (or an intrusion policy 
referenced by your access control policy) failed. (139406/CSCze91378)
Improved the stability of Snort when a nightly intrusion event performance 
statistics rotation occurred at the same time as an intrusion policy apply. 
(139958/CSCze91909)
Resolved an issue where, when creating a network address translation 
(NAT) policy on a 70xx Family managed device and positioning a dynamic 
NAT rule specifying a destination port range before a second dynamic NAT 
rule specifying a destination port included in the first range, the system did 
not match traffic against the second dynamic rule if the traffic did not match 
the first dynamic rule. (140216/CSCze91789, 140307)
Resolved an issue where, if you deleted a managed device from a Defense 
Center, then added a different device, then reapplied an access control 
policy with an intrusion policy associated with the default action, the system 
indicated that the intrusion policy was out of date on more devices than the 
Defense Center managed. (140525/CSCze92023)
Resolved an issue where, in some cases, you could not create new 
scheduled tasks on managed devices. (140557/CSCze92065)
Resolved an issue where managing 100 or more managed devices with a 
single Defense Center caused system issues. (140566/CSCze92086)
Resolved an issue where, if you added a device stack to a group of devices 
and edited the applied access control policy, the system removed all 
targeted devices from the policy, prevented you from adding new devices, 
and corrupted the policy name. (140605/CSCze92048)
Resolved an issue where, in rare cases, applying a single health policy to 
100 or more managed devices caused system issues. 
(140976/CSCze92387)
Resolved an issue where the system experienced a memory issue if 
eStreamer retrieved a large number of file events. (141075/CSCze92527)
Resolved an issue where, if you created an access control or intrusion rule 
that blocked traffic, then applied the access control or intrusion policy to a 
virtual managed device that used an inline interface set, you experienced a 
disruption in traffic until you restarted the appliance. (141111/CSCze92684)