Cisco Cisco Firepower Management Center 4000 Release Notes

Page of 38
Version 5.2.0.2
Sourcefire 3D System Release Notes
21
Issues Resolved in Version 5.2.0.2
Resolved an issue where traffic matched an access control policy block rule 
and the system evaluated it against the access control policy default action 
configured as an intrusion policy. (124732)
Resolved a synchronization issue where, in rare cases, clusters lost their 
clustered status. (125497)
Resolved an issue where accessing the intrusion rule editor from the packet 
view (Analysis > Intrusion > Events) caused the system to display an error 
message and log the attempt as an unauthorized action. (125770)
Resolved an issue with the Sourcefire Data Correlator where complex 
queries slowed the system’s ability to process new connection events. 
(125754)
Updated Sourcefire documentation to reflect that when you reimage a 
device from Version 4.10.x to Version 5.1, if the device has interfaces 
configured to fail open, they will revert to a non-bypass (fail closed) 
configuration at first boot and remain closed until you configure bypass 
mode for them. (125957)
Improved performance statistics logging to more accurately reflect packet 
counts per time interval. (126437)
Resolved an issue where the device management page showed managed 
devices running an outdated version. (126564) 
Resolved an issue where, in some cases, system updates failed to 
download when you used a NLTM authenticated proxy server. (126872)
Issues Resolved in Previous Updates
Previously resolved issues are listed by version.
Version 5.2.0.1
The About page (Help > About) and Advanced display option for the Appliance 
Information dashboard widget now show the current version of Snort 
running on a Defense Center. (121228, 123403, 124615) 
Resolved an issue where, during an update, a device in a clustered, inline 
deployment could fail over incorrectly. (123239)
Resolved an issue where, in some cases, device configuration apply to a 
stack failed if it contained a NAT policy that referenced invalid interfaces. 
(123540)
Resolved an issue where, in some cases, intrusion events displayed 
incorrect VLAN ID information. (123696)
Resolved an issue where, in some cases, access control policy apply did not 
succeed on a cluster with both state sharing and Inspect Local Router Traffic 
enabled. (123710)