Cisco Cisco Firepower Management Center 4000 Release Notes

Page of 38
Version 5.2.0.2
Sourcefire 3D System Release Notes
26
Issues Resolved in Version 5.2.0.2
Resolved an issue where the system truncated text in long syslog 
messages. (118816)
Resolved an issue where some TCP connections detected by virtual 
devices were not logged to the Defense Center. (118827)
Resolved an issue with the formatting of text files sent with email alerts by 
the Defense Center. (119267)
Improved the IP defragmentation preprocessor to avoid a possible evasion 
using packet fragments. (119531)
Resolved an issue where TCP connections that were reset took a long time 
to generate connection events. (119557)
Resolve an issue where the system experienced issues with packet 
reassembly when the port configuration in an applied intrusion policy 
differed from the base intrusion policy. (119714)
Improved functionality of access control rules with user conditions. (119962)
Resolved an issue where intrusion rules using the 
file_data
 keyword did 
not drop traffic if Drop when Inline was disabled in the base intrusion policy. 
(120156)
Resolved an issue where the TCP stream preprocessor did not correctly 
identify the server in HTTP traffic when detected midstream. (120170)
Improved Teredo traffic decoding. (120292)
Resolved an issue where, in some cases, intrusion events generated during 
a network discovery policy apply were associated with incorrect security 
zones. (120316)
Resolved an issue with high availability configurations where you could not 
change the secondary Defense Center to the primary role if the original 
primary Defense Center was offline. (120327)
Improved logging of Security Intelligence decisions to the syslog. (120564, 
120565, 121050)
Resolved an issue where, in some cases, URL filtering database updates 
were not synchronized from the Defense Center to managed devices. 
(120572)
Resolved an issue where access control policy apply failed when the default 
action was Block All Traffic and the HOME_NET variable was 
any
. Because 
this combination is invalid, the system now warns you if you attempt to 
configure it. (120578)
Resolved an issue where fragmented IP traffic that would normally match a 
Trust access control rule and pass without further inspection was instead 
evaluated by the intrusion policy associated with the default action. 
(120734)
Resolved an issue where, in some cases, changing the dashboard widget 
time range caused the widget to display incorrect event statistics. (121009)