Cisco Cisco FirePOWER Appliance 8250 Notas de publicación
Version 5.2.0.6
Sourcefire 3D System Release Notes
32
Known Issues
management network accessible only to trusted users and use a complex,
non-dictionary-based password. To prevent exposure to the vulnerability, do
not enable LOM. If you enable LOM and expose this vulnerability, change
the complex password every three months. (139286, 140954)
•
The documentation does not reflect that, if you register a cluster, stack, or
clustered stack of devices to a Defense Center, you may have to manually
reapply the device configuration. (142411, 141602)
•
In some cases, if you generate a report from a report template, reports only
display the IP address if the system cannot resolve the IP address to a host
name. (142640)
•
The documentation does not reflect that Lights-Out Management (LOM)
users on 7100 Family devices must limit their password to 16 characters
rather than 20 characters. (142752)
Known Issues Reported in Previous Releases
The following is a list of known issues that were discovered in previous releases
of the Sourcefire 3D System:
•
You must use the Defense Center’s web interface to unregister a managed
device. If you unregister a device using either the device’s web interface or
its command line interface (CLI), it is not removed from the Defense Center.
(112659)
•
The system will generate a health alert if the Defense Center is unable to
connect to the Sourcefire cloud. To troubleshoot, ensure the connection
from the Defense Center to the Sourcefire cloud (
54.243.248.19
and
54.243.248.162
) on port 32137 is working properly. (112708)
•
If multiple files are attached to a single email, the system may incorrectly
identify files after the first. (114523)
•
If you attempt to create multiple static NAT rules with the same original
values, the system may experience issues with traffic mapping. (116148)
•
In some cases, the Defense Center may show a cluster in a degraded state
when it has already recovered, generating extraneous system alerts.
(118122)
•
When Lights-Out Management is enabled, the system also enables a web
server in the background. The web server does not drain system resources
and has no known exploits. (119456)
•
Sourcefire documentation currently does not reflect that, on a Series 3
device, TCP connections matching a Trust access control rule on the first
packet generate different events depending on the presence of a Monitor
rule. If an active Monitor rule is present, the system generates both a
beginning and end-of-connection event, as expected. If no monitor rule is
active, the system does not generate a beginning-of-connection event.
(121060)