Cisco Cisco Firepower Management Center 2000 Notas de publicación
![Cisco](https://files.manualsbrain.com/attachments/7380d0050044647c30f5c24bbbf5d0c0b6d9bb84/common/fit/150/50/faa183d287233c52228cfea3dbc2a127fe780f60564fcb0955d9c3d1cd23/brand_logo.png)
23
FireSIGHT System Release Notes
Resolved Issues
Resolved an issue where the passive interfaces on 7000 Series devices reported incorrect egress security zones
and interfaces. (144624/CSCze95206)
and interfaces. (144624/CSCze95206)
Resolved an issue where, if you edited the interface security zones from the Object Management page, the stacked
device configuration appeared to be up-to-date when it wasn't. (144626/CSCze94847)
device configuration appeared to be up-to-date when it wasn't. (144626/CSCze94847)
Resolved an issue where, if you enabled remote storage and created a scheduled email alert response on your
Defense Center, the scheduled email alert disabled remote storage and remote storage backups failed.
(145288/CSCze95993)
Defense Center, the scheduled email alert disabled remote storage and remote storage backups failed.
(145288/CSCze95993)
Resolved an issue where access control rules containing web application conditions did not match against traffic if
users on your network entered a URL into the address bar that was not lowercase. (CSCur37364)
users on your network entered a URL into the address bar that was not lowercase. (CSCur37364)
Resolved an issue where adding a Defense Center in a high availability configuration to your system caused the
secondary Defense Center to overwrite the existing SHA-256 values in the system’s file list. (CSCur57708)
secondary Defense Center to overwrite the existing SHA-256 values in the system’s file list. (CSCur57708)
Resolved an issue where, if you created aa correlation rule to trigger when an intrusion event or connection event
occurs and the condition matches an ingress security zone, egress security zone, ingress interfaces, or egress
interface as the condition, the system did not recognize the rule and failed to generate events for traffic matching
the rule. (CSCur59840)
occurs and the condition matches an ingress security zone, egress security zone, ingress interfaces, or egress
interface as the condition, the system did not recognize the rule and failed to generate events for traffic matching
the rule. (CSCur59840)
Improved multiple dashboard widgets. (CSCus11068)
Resolved an issue where your system occasionally experienced latency during Snort restart. (CSCus13247)
Resolved a bug where file names of uuencoded email attachments was not displayed in file events and malware
events. (CSCus30831)
events. (CSCus30831)
Resolved an issue where some HTTPS traffic inspections resulted in false positives. (CSCus32474)
Resolved an issue where the system generated an Internal Server Error message if the password for your registered
ASA FirePOWER device included an unsupported character. (CSCus68604)
ASA FirePOWER device included an unsupported character. (CSCus68604)
Resolved an issue where the system generated a malware alert on the second attempt to download a suspicious file
over HTTP instead of generating an alert on the first attempt to download the file. (CSCus83151)
over HTTP instead of generating an alert on the first attempt to download the file. (CSCus83151)
Resolved an issue where, if you created an user role in the Custom User Role tab of the User Management page, the
system disabled some check-boxes but enabled some options available under the disabled check boxes.
(CSCus87248)
system disabled some check-boxes but enabled some options available under the disabled check boxes.
(CSCus87248)
Resolved an issue where, if you attempted to download a file but the download was blocked and the file was
downloaded again, the system either did not identify the file type or the system generated incorrect SHA-256 values.
(CSCus87799)
downloaded again, the system either did not identify the file type or the system generated incorrect SHA-256 values.
(CSCus87799)
If your system restarts or reloads after a VDB install and the Inspect Traffic During Policy Apply option in your
firewall policy is unchecked, you may experience loss of network connectivity during the restart process.
(CSCut08225)
firewall policy is unchecked, you may experience loss of network connectivity during the restart process.
(CSCut08225)
Resolved an issue where, if you created an access control rule configured to send events to an external syslog server
and the system detected multiple truncated unified files, the device stopped sending connection events to the syslog
server. (CSCut14629)
and the system detected multiple truncated unified files, the device stopped sending connection events to the syslog
server. (CSCut14629)
Improved SFDatacorrelator performance when processing historical email and eStreamer alerts. (CSCut23688)
Resolved an issue where the FirePOWER fiber ports on the 4-Port 10Gbps non-bypass network modules would not
reliably achieve link connectivity with APCON IntellaFlex or IntellaPatch brand devices. (CSCut24654)
reliably achieve link connectivity with APCON IntellaFlex or IntellaPatch brand devices. (CSCut24654)
Resolved an issue where the system displayed incorrect file type information on the Network File Trajectory page.
(CSCut27978)
(CSCut27978)