Cisco Cisco Firepower Management Center 2000 Notas de publicación
20
FireSIGHT System Release Notes
Resolved Issues
6.
Click the install icon next to the update you are installing.
7.
Select the devices where you want to install the update.
If you are updating a stacked pair, selecting one member of the pair automatically selects the other. You must update
members of a stacked pair together.
members of a stacked pair together.
8.
Click Install. Confirm that you want to install the update and reboot the devices.
9.
The update process begins. You can monitor the update's progress in the Defense Center’s task queue (System >
Monitoring > Task Status).
Monitoring > Task Status).
Note that managed devices may reboot twice during the update; this is expected behavior.
Caution:
If you encounter issues with the update (for example, if the task queue indicates that the update has failed
or if a manual refresh of the task queue shows no progress for several minutes), do not restart the update. Instead,
contact Support.
contact Support.
10.
Select Devices > Device Management and confirm that the devices you updated have the correct software version:
Version 5.4.0.8.
Version 5.4.0.8.
11.
Verify that the appliances in your deployment are successfully communicating and that there are no issues reported
by the health monitor.
by the health monitor.
12.
Reapply device configurations to all managed devices.
Tip:
To reactivate a grayed-out Apply button, edit any interface in the device configuration, then click Save without
making changes.
13.
Reapply access control policies to all managed devices.
Caution:
When you apply an access control policy, resource demands may result in a small number of packets
dropping without inspection. Additionally, applying some configurations requires the Snort process to restart, which
interrupts traffic inspection. Whether traffic drops during the interruption or passes without further inspection
depends on the model of the managed device and how it handles traffic.For more information, see the
Configurations that Restart the Snort Process section in the FireSIGHT System User Guide.
interrupts traffic inspection. Whether traffic drops during the interruption or passes without further inspection
depends on the model of the managed device and how it handles traffic.For more information, see the
Configurations that Restart the Snort Process section in the FireSIGHT System User Guide.
14.
If a patch for Version 5.4.0.8 is available on the Support site, apply the latest patch as described in the FireSIGHT
System Release Notes for that version.
System Release Notes for that version.
You must update to the latest patch to take advantage of the latest enhancements and security fixes.
Resolved Issues
You can track defects resolved in this release using the Cisco Bug Search Tool (
https://tools.cisco.com/bugsearch/
). A
Cisco account is required. To view defects addressed in older versions, refer to the legacy caveat tracking system.
Issues Resolved in Version 5.4.0.8 and Version 5.4.1.7:
Resolved an issue where, if you registered a device to a pair of a Defense Centers and applied an access control
policy with URL rules and turned on URL cloud query, the managed device did not successfully request a URL lookup.
(CSCus99059)
policy with URL rules and turned on URL cloud query, the managed device did not successfully request a URL lookup.
(CSCus99059)
Resolved an issue where, if you clicked the Email Status to: link on the Scheduling page (System > Tools >
Scheduling), the web browser incorrectly displayed a 500 Internal Server Error message. (CSCuv22590)
Scheduling), the web browser incorrectly displayed a 500 Internal Server Error message. (CSCuv22590)
Resolved an issue where the FSIC incorrectly checked extraneous files. (CSCuv55284)
Resolved an issue where, in some cases, attempting to backup and restore a Defense Center failed. (CSCuv95657,
CSCuw71197)
CSCuw71197)
Improved general appliance functionality. (CSCuw44360)