Cisco Cisco FirePOWER Appliance 7010 Notas de publicación
Version 5.3.0.2
Sourcefire 3D System Release Notes
25
Issues Resolved in Version 5.3.0.2
•
Resolved an issue where, if you created a custom workflow with a large
number of pages, the time window in the top right portion of the page
obscured the link to the final pages of the workflow. (141335)
•
Resolved an issue where, in some cases, FireSIGHT rule recommendations
attempted to activate a preprocessor rule that was already active, causing
system problems. (141439)
•
Resolved an issue where, in rare cases, if you added multiple passive
interfaces to a security zone, then referenced the security zone in a
managed device configuration, the configuration apply failed and the
system experienced a disruption in detection. (141624, 141627)
•
Resolved an issue where, if one or more detection resources were
unresponsive on a managed device, installing an update of the vulnerability
database (VDB) caused system issues. (141757)
•
Improved efficiency and memory management of the disk manager.
(141795)
•
Improved the stability of Snort when inspecting traffic transmitted via Real
Time Streaming Protocol (RTSP). (141815)
•
Resolved an issue where completing a large number of access control
policy applies caused the system to experience a memory issue and
generate multiple
High unmanaged disk usage
health alerts. (141830)
•
Resolved an issue where, in some cases, revisions to the network address
translation (NAT) policy caused system problems. (142003)
•
Resolved an issue where, in rare cases, Series 3 devices experienced
delays during device shutdown. (142033)
Issues Resolved in Previous Updates
Because you can update your appliances from Version 5.3 to Version 5.3.0.2, this
update also includes the changes from Version 5.3. Previously resolved issues are
listed by version.
Version 5.3.0.1
•
Resolved an issue where, in rare cases, configuring an intrusion policy that
contained local intrusion rules in a layer that was shared with another
intrusion policy caused intrusion policy exports to fail. (132312)
•
Resolved an issue where, in rare cases, Snort stopped processing packets if
any of your intrusion rules contained the Sensitive Data (sdf) rule
classification. (132600)
•
Resolved an issue where, in rare cases, Snort drained system resources if
you created and applied an access control policy with rules that specified an
unusually large range of ports and contained other rule conditions that
would cause the Defense Center to send them to the device in expanded
form. (132998)