Cisco Cisco Firepower Management Center 4000 Release Notes

Page of 45
Version 5.3.0.2
Sourcefire 3D System Release Notes
31
Known Issues
You can only import a HTTPS certificate once. Modifying or re-importing a 
server certificate fails. (140283)
Although you cannot enable bypass mode for clustered devices, the option 
still appears in the web interface. (140604)
If you create a report in bar graph report form that shows data organized by 
day, only a maximum of 10 days can appear in the graph. As a workaround, 
create multiple reports in 10-day increments. (140833)
In some cases, the Password Lifetime column on the User Management 
page (Operations > User Management) may display a negative value if a user’s 
password has expired. (140839)
If you disable an access control rule that invokes an intrusion policy, then 
reapply your access control policy, the system incorrectly indicates that the 
appliances’ intrusion policy is out of date. As a workaround, delete access 
control rules that use intrusion policies instead of disabling those rules. 
(141044)
You cannot delete vulnerabilities from the third-party vulnerabilities table 
(Analysis > Vulnerabilities > Third-Party Vulnerabilities). (141103)
Files that are intentionally not stored by the system (such as files seen for 
the first time, or files outside the size limit) incorrectly appear with a File 
Storage value of 
Failed
. (141196, 141505)
If you create a configuration-only backup, the backup file includes 
extraneous discovery event data. (141246)
The system-provided saved search Public Addresses Only incorrectly includes 
the private 172.x.x.x IP address range. (141285)
When you update your appliances to a new software version, the update 
overwrites any changes you made to default dashboard pages. As a 
workaround, perform a system backup before updating, then restore the 
backup. (141363)
Reports do not resolve DNS names for IP addresses, even if you have 
configured them to do so. (141393)
When you configure a device inline between a host and a web server, block 
the web server by URL in your access control policy, enable the 
Cisco-provided block response page, then attempt to access the web server 
from the host, a session timeout may result if the open connection limit of 
the server’s operating system is reached. (141440)
In some cases, excessive saved revisions to the intrusion policy may cause 
system performance issues. (141501, 141754)
The documentation does not reflect that, if you register a cluster, stack, or 
clustered stack of devices to a Defense Center, you may have to manually 
reapply the device configuration. (141624, 141412)