Cisco Cisco Firepower Management Center 4000 Release Notes
Version 5.2.0.6
Sourcefire 3D System Release Notes
23
Issues Resolved in Version 5.2.0.6
•
Improved system stability in cases where you applied an access control
policy revision that changed the file inspection options in an access control
rule. (132741)
•
Resolved an issue where setting the maximum transmission unit (MTU) of
an inline set on a Series 2 or a virtual device to a value below
1518
caused a
disruption in traffic. (134256)
Version 5.2.0.3
•
Resolved a NTP time synchronization issue between managed devices and
Defense Centers. (121909)
•
Resolved an issue where, in some cases, FireSIGHT rule state
recommendations did not generate if an intrusion rule variable contained a
network object. (125910)
•
Resolved an issue where, in some cases, the eStreamer client failed to
deserialize network discovery user events and the system generated an
error message. (126827)
•
Resolved an issue where, after updating an appliance running Version 5.1.x
of the Sourcefire 3D System and Version 2.0.3 of the Sourcefire User Agent
to Version 5.2 of the Sourcefire 3D System, the system generated an
extraneous health alert. (127082, 127265, 127724)
•
Resolved an issue where, if the system logged the only intrusion event
associated with a connection as
Would have dropped
, the associated
connection logged with the incorrect action of
Block
. (127141)
•
Resolved an issue where, in rare cases, the system detected a user login
through network discovery but the Defense Center incompletely logged the
user data. (127274)
•
Improved the stability of custom application detectors. (127309)
•
Resolved an issue where you could not replace one NetMod with another
on devices managed by Defense Centers in a high availability configuration.
(128091)
•
The system now notifies you upon intrusion policy commit if your intrusion
policy contains invalid system default variable configurations. (129105)
•
Resolved an issue where changes to the system variable set from within an
intrusion policy were not applied if the default action of your access control
policy was a Sourcefire authored policy. (129179)
•
Improved the stability of the
byte_extract
keyword and the HTTP inspect
preprocessor. (129329, 129843, 130005)
•
Resolved a hardware issue that, in rare cases, could cause a disruption in
traffic. (130055)
•
Resolved a memory leak on managed devices that, in some cases,
necessitated a system reboot. (130198)
•
Resolved a memory leak within the eStreamer client. (130478)