Cisco Cisco Firepower Management Center 2000 Notas de publicación
![Cisco](https://files.manualsbrain.com/attachments/7380d0050044647c30f5c24bbbf5d0c0b6d9bb84/common/fit/150/50/faa183d287233c52228cfea3dbc2a127fe780f60564fcb0955d9c3d1cd23/brand_logo.png)
24
FireSIGHT System Release Notes
Version 5.3.1.7
Known Issues
•
In some cases, if you generate a report template with a custom logo and create a backup file, then
backup and restore the Defense Center, the backup file does not save the custom logo in the report
template. (CSCuv44883)
backup and restore the Defense Center, the backup file does not save the custom logo in the report
template. (CSCuv44883)
•
In some cases, if you apply policy and then compare policies, the policy comparison always
generates differences even when there are none. (CSCuv76157)
generates differences even when there are none. (CSCuv76157)
•
If you create an access control rule and set the default action to Interactive Block, then edit the
interactive block response page on the HTTP Responses tab of the Default Access Control page
(Policies > Access Control) in Japanese, the interactive block page does not generate a Continue
button to bypass the interactive block page. (CSCuw21450)
interactive block response page on the HTTP Responses tab of the Default Access Control page
(Policies > Access Control) in Japanese, the interactive block page does not generate a Continue
button to bypass the interactive block page. (CSCuw21450)
•
The system cleans up archived files in no specific order, but attempts to insure that all events are
reported to the Defense Center. (CSCuw79989)
reported to the Defense Center. (CSCuw79989)
•
In some cases, if you apply an access control rule that uses more than one VLAN, traffic that should
trigger the applied access control rule incorrectly triggers other rules. (CSCuw99834)
trigger the applied access control rule incorrectly triggers other rules. (CSCuw99834)
•
In some cases, updating a managed device fails and the system does not indicate why in Task Status.
If you update a device and the update fails without a reason, contact Support. (CSCux56288)
If you update a device and the update fails without a reason, contact Support. (CSCux56288)
•
If you filter intrusion rules on the Rule State page (Rule Configuration > Rule State) and search
for the
for the
FlowBit
keyword, the system generates inconsistent results. (CSCuy13901)
•
If you remove a user from all groups within a realm referenced in the access control policy and
deploy configuration changes, then click Download users and groups from the Access Control tab,
the system does not update the deployed configuration and continues to process traffic as if the
group(s) still contained the user. (CSCuy39685)
deploy configuration changes, then click Download users and groups from the Access Control tab,
the system does not update the deployed configuration and continues to process traffic as if the
group(s) still contained the user. (CSCuy39685)
•
In some cases, generating troubleshoot for Series 3, ASA5512-X, ASA5515-X, ASA5525-X,
ASA5545-X, ASA5555-X, or ASA5585-X device from the Defense Center user interface fails.
(CSCuz00468)
ASA5545-X, ASA5555-X, or ASA5585-X device from the Defense Center user interface fails.
(CSCuz00468)
•
Updating appliances via CLI commands is not supported and you cannot recover the appliance after
the update reboot. Cisco strongly recommends updating the Defense Center and all managed devices
via the web interface. If you experience issues updating your appliances, contact Support.
(CSCuz01827, CSCuz09667)
the update reboot. Cisco strongly recommends updating the Defense Center and all managed devices
via the web interface. If you experience issues updating your appliances, contact Support.
(CSCuz01827, CSCuz09667)
The following known issues were reported in previous releases:
•
In some cases, applying changes to your access control policy, intrusion policy, network discovery
policy, or device configuration, or installing an intrusion rule update or update of the vulnerability
database (VDB) causes the system to experience a disruption in traffic that uses Link Aggregation
Control Protocol (LACP) in fast mode. As a workaround, configure LACP links in slow mode.
(112070/CSCze87966)
policy, or device configuration, or installing an intrusion rule update or update of the vulnerability
database (VDB) causes the system to experience a disruption in traffic that uses Link Aggregation
Control Protocol (LACP) in fast mode. As a workaround, configure LACP links in slow mode.
(112070/CSCze87966)
•
If the system generates intrusion events with a
Destination Port/ICMP Code
of
0
, the Top 10 Destination
Ports section of the Intrusion Event Statistics page (
Overview > Summary > Intrusion Event Statistics
)
omits port numbers from the display. (125581/CSCze88014)
•
Defense Center local configurations (
System > Local > Configuration
) are not synchronized between
high availability peers. You must edit and apply the changes on all Defense Centers, not just the
primary. (130612/CSCze89250, 130652)
primary. (130612/CSCze89250, 130652)
•
In some cases, large system backups may fail if disk space usage exceeds the disk space threshold
before the system begins pruning. (132501/CSCze88368)
before the system begins pruning. (132501/CSCze88368)
•
In some cases, using the RunQuery tool to execute a
SHOW TABLES
command may cause the query to
fail. To avoid query failure, only run this query interactively using the RunQuery application.
(132685/CSCze89153)
(132685/CSCze89153)