Cisco Cisco Firepower Management Center 4000 Release Notes

Page of 45
Version 5.3.0.2
Sourcefire 3D System Release Notes
25
Issues Resolved in Version 5.3.0.2
Resolved an issue where, if you created a custom workflow with a large 
number of pages, the time window in the top right portion of the page 
obscured the link to the final pages of the workflow. (141335)
Resolved an issue where, in some cases, FireSIGHT rule recommendations 
attempted to activate a preprocessor rule that was already active, causing 
system problems. (141439)
Resolved an issue where, in rare cases, if you added multiple passive 
interfaces to a security zone, then referenced the security zone in a 
managed device configuration, the configuration apply failed and the 
system experienced a disruption in detection. (141624, 141627)
Resolved an issue where, if one or more detection resources were 
unresponsive on a managed device, installing an update of the vulnerability 
database (VDB) caused system issues. (141757)
Improved efficiency and memory management of the disk manager. 
(141795)
Improved the stability of Snort when inspecting traffic transmitted via Real 
Time Streaming Protocol (RTSP). (141815)
Resolved an issue where completing a large number of access control 
policy applies caused the system to experience a memory issue and 
generate multiple 
High unmanaged disk usage
 health alerts. (141830)
Resolved an issue where, in some cases, revisions to the network address 
translation (NAT) policy caused system problems. (142003)
Resolved an issue where, in rare cases, Series 3 devices experienced 
delays during device shutdown. (142033)
Issues Resolved in Previous Updates
Because you can update your appliances from Version 5.3 to Version 5.3.0.2, this 
update also includes the changes from Version 5.3. Previously resolved issues are 
listed by version.
Version 5.3.0.1
Resolved an issue where, in rare cases, configuring an intrusion policy that 
contained local intrusion rules in a layer that was shared with another 
intrusion policy caused intrusion policy exports to fail. (132312)
Resolved an issue where, in rare cases, Snort stopped processing packets if 
any of your intrusion rules contained the Sensitive Data (sdf) rule 
classification. (132600)
Resolved an issue where, in rare cases, Snort drained system resources if 
you created and applied an access control policy with rules that specified an 
unusually large range of ports and contained other rule conditions that 
would cause the Defense Center to send them to the device in expanded 
form. (132998)