Cisco Cisco Firepower Management Center 2000 Notas de publicación

Descargar
Página de 32
 
24
FireSIGHT System Release Notes
Version 5.3.1.7
  Known Issues
In some cases, if you generate a report template with a custom logo and create a backup file, then 
backup and restore the Defense Center, the backup file does not save the custom logo in the report 
template. (CSCuv44883)
In some cases, if you apply policy and then compare policies, the policy comparison always 
generates differences even when there are none. (CSCuv76157)
If you create an access control rule and set the default action to Interactive Block, then edit the 
interactive block response page on the HTTP Responses tab of the Default Access Control page 
(Policies > Access Control) in Japanese, the interactive block page does not generate a Continue 
button to bypass the interactive block page. (CSCuw21450)
The system cleans up archived files in no specific order, but attempts to insure that all events are 
reported to the Defense Center. (CSCuw79989)
In some cases, if you apply an access control rule that uses more than one VLAN, traffic that should 
trigger the applied access control rule incorrectly triggers other rules. (CSCuw99834)
In some cases, updating a managed device fails and the system does not indicate why in Task Status. 
If you update a device and the update fails without a reason, contact Support. (CSCux56288)
If you filter intrusion rules on the Rule State page (Rule Configuration > Rule State) and search 
for the 
FlowBit
 keyword, the system generates inconsistent results. (CSCuy13901)
If you remove a user from all groups within a realm referenced in the access control policy and 
deploy configuration changes, then click Download users and groups from the Access Control tab, 
the system does not update the deployed configuration and continues to process traffic as if the 
group(s) still contained the user. (CSCuy39685)
In some cases, generating troubleshoot for Series 3, ASA5512-X, ASA5515-X, ASA5525-X, 
ASA5545-X, ASA5555-X, or ASA5585-X device from the Defense Center user interface fails. 
(CSCuz00468)
Updating appliances via CLI commands is not supported and you cannot recover the appliance after 
the update reboot. Cisco strongly recommends updating the Defense Center and all managed devices 
via the web interface. If you experience issues updating your appliances, contact Support. 
(CSCuz01827, CSCuz09667)
The following known issues were reported in previous releases:
In some cases, applying changes to your access control policy, intrusion policy, network discovery 
policy, or device configuration, or installing an intrusion rule update or update of the vulnerability 
database (VDB) causes the system to experience a disruption in traffic that uses Link Aggregation 
Control Protocol (LACP) in fast mode. As a workaround, configure LACP links in slow mode. 
(112070/CSCze87966) 
If the system generates intrusion events with a 
Destination Port/ICMP Code
 of 
0
, the Top 10 Destination 
Ports section of the Intrusion Event Statistics page (
Overview > Summary > Intrusion Event Statistics
omits port numbers from the display. (125581/CSCze88014)
Defense Center local configurations (
System > Local > Configuration
) are not synchronized between 
high availability peers. You must edit and apply the changes on all Defense Centers, not just the 
primary. (130612/CSCze89250, 130652)
In some cases, large system backups may fail if disk space usage exceeds the disk space threshold 
before the system begins pruning. (132501/CSCze88368)
In some cases, using the RunQuery tool to execute a 
SHOW TABLES
 command may cause the query to 
fail. To avoid query failure, only run this query interactively using the RunQuery application. 
(132685/CSCze89153)