Cisco Cisco Firepower Management Center 4000 Release Notes

Page of 37
Version 5.2.0.1
Sourcefire 3D System Release Notes
31
Features Introduced in Previous Versions
You can view network file trajectories on any file where a malware cloud lookup 
occurred using AMP or on any file detected or quarantined by FireAMP, 
Sourcefire’s endpoint-based advanced malware analysis and protection solution. 
Next-Generation Firewall (NGFW)
Several new device management features were added in Version 5.2: high 
availability state sharing, gateway VPN configuration, policy-based configuration 
of network address translation (NAT), and clustered stacking. 
Clustered State Sharing
The clustered state sharing feature, also referred to as high availability (HA) state 
sharing, allows clustered devices or clustered stacks to synchronize their states 
so that, if either device or stack in the cluster fails, the other peer can take over 
with no interruption to traffic flow. This provides improved failover capability for 
strict TCP enforcement, unidirectional access control rules, and blocking 
persistence. Clustered state sharing is supported for VPN and NAT 
configurations.
With state sharing, devices in the cluster allow TCP sessions to continue after 
failover without having to reevaluate the connection against your access control 
rules, even if strict TCP enforcement is enabled. 
State sharing also allows the system to transfer the status of allowed connections 
matching unidirectional access control rules during failover. Without state sharing, 
if an allowed connection is still active following a failover and the next packet is 
seen as a response packet, the system denies the connection. With state 
sharing, a midstream pickup matches the existing connection and the connection 
continues to be allowed.
Another advantage of state sharing is that while many connections are blocked on 
the first packet based on access control rules or other factors, there are cases 
where the system allows some number of packets through before determining 
that the connection should be blocked. With state sharing, the system 
immediately blocks the connection on the peer device or stack as well.
You can enable state sharing on clustered Series 3 managed devices with a 
Control license enabled. 
Gateway VPN
You can now configure the Sourcefire 3D System to build secure Virtual Private 
Network (VPN) tunnels between virtual routers on Sourcefire managed devices 
and a remote device. After the VPN connection is established, the hosts behind 
the local gateway can connect to the hosts behind the remote gateway through 
the secure VPN tunnel.
The Sourcefire 3D System builds tunnels using the Internet Protocol Security 
(IPSec) protocol suite. The system uses the IKE protocol to mutually authenticate 
the two gateways against each other as well as to negotiate the security 
association (SA) for the tunnel. Packets across a VPN tunnel are supported for