Cisco Cisco Firepower Management Center 4000 Release Notes
Version 5.3.0.2
Sourcefire 3D System Release Notes
31
Known Issues
•
You can only import a HTTPS certificate once. Modifying or re-importing a
server certificate fails. (140283)
•
Although you cannot enable bypass mode for clustered devices, the option
still appears in the web interface. (140604)
•
If you create a report in bar graph report form that shows data organized by
day, only a maximum of 10 days can appear in the graph. As a workaround,
create multiple reports in 10-day increments. (140833)
•
In some cases, the Password Lifetime column on the User Management
page (Operations > User Management) may display a negative value if a user’s
password has expired. (140839)
•
If you disable an access control rule that invokes an intrusion policy, then
reapply your access control policy, the system incorrectly indicates that the
appliances’ intrusion policy is out of date. As a workaround, delete access
control rules that use intrusion policies instead of disabling those rules.
(141044)
•
You cannot delete vulnerabilities from the third-party vulnerabilities table
(Analysis > Vulnerabilities > Third-Party Vulnerabilities). (141103)
•
Files that are intentionally not stored by the system (such as files seen for
the first time, or files outside the size limit) incorrectly appear with a File
Storage value of
Failed
. (141196, 141505)
•
If you create a configuration-only backup, the backup file includes
extraneous discovery event data. (141246)
•
The system-provided saved search Public Addresses Only incorrectly includes
the private 172.x.x.x IP address range. (141285)
•
When you update your appliances to a new software version, the update
overwrites any changes you made to default dashboard pages. As a
workaround, perform a system backup before updating, then restore the
backup. (141363)
•
Reports do not resolve DNS names for IP addresses, even if you have
configured them to do so. (141393)
•
When you configure a device inline between a host and a web server, block
the web server by URL in your access control policy, enable the
Cisco-provided block response page, then attempt to access the web server
from the host, a session timeout may result if the open connection limit of
the server’s operating system is reached. (141440)
•
In some cases, excessive saved revisions to the intrusion policy may cause
system performance issues. (141501, 141754)
•
The documentation does not reflect that, if you register a cluster, stack, or
clustered stack of devices to a Defense Center, you may have to manually
reapply the device configuration. (141624, 141412)