Cisco Cisco Firepower Management Center 4000 Release Notes

Page of 46
Version 5.3.0.6
Sourcefire 3D System Release Notes
28
Known Issues
Known Issues
The following known issues are reported in Version 5.3.0.6:
In some cases, if you create an access control policy and enable URL 
filtering without enabling Cloud communications (System > Local> 
Configuration> Cloud Services), the system does not warn you that URL 
filtering capabilities are non-functional without Cloud services. 
(CSCus15243)
If you cannot connect to the cloud through your HTTP proxy but you can 
connect via direct connection, contact Support. (CSCus83379)
In some cases, if you run the CLI 
sudo ips_profile
 command on a device 
running at least Version 5.3 that is registered to a Defense Center running at 
least Version 5.4, the rule profiling script may fail. If the rule profiling script 
fails, contact Support. (CSCuu02211)
Updating a 3D1000 device to Version 5.3.0.6 may fail. If your update fails, 
contact Support. (CSCuu24932)
The asterisk (
 *
 ) character is not supported in file transfer protocol (FTP). 
(CSCuu25329)
The system does not generate audit log entries for login attempts with 
<script>alert(1)</script>
 as the user name. (CSCuu39516, 
CSCuu39521)
If you apply an access control policy set to Block on an ASA FirePOWER 
module, the system incorrectly resets the session. (CSCuu60713)
Known Issues Reported in Previous Releases
The following is a list of known issues that were reported in previous releases of 
the Sourcefire 3D System:
In some cases, applying changes to your access control policy, intrusion 
policy, network discovery policy, or device configuration, or installing an 
intrusion rule update or update of the vulnerability database (VDB), causes 
the system to experience a disruption in traffic that uses Link Aggregation 
Control Protocol (LACP) in fast mode. As a workaround, configure LACP 
links in slow mode. (112070/CSCze87966)
In some cases, the system includes extraneous data about dropped packets 
in intrusion event performance graphs. (124934/CSCze87728)
If the system generates intrusion events with a Destination Port/ICMP Code 
of 
0
, the Top 10 Destination Ports section of the Intrusion Event Statistics 
page (Overview > Summary > Intrusion Event Statistics) omits port numbers 
from the display. (125581/CSCze88014)