Cisco Cisco Firepower Management Center 4000 릴리즈 노트
Version 5.3.0.6
Sourcefire 3D System Release Notes
28
Known Issues
Known Issues
The following known issues are reported in Version 5.3.0.6:
•
In some cases, if you create an access control policy and enable URL
filtering without enabling Cloud communications (System > Local>
Configuration> Cloud Services), the system does not warn you that URL
filtering capabilities are non-functional without Cloud services.
(CSCus15243)
•
If you cannot connect to the cloud through your HTTP proxy but you can
connect via direct connection, contact Support. (CSCus83379)
•
In some cases, if you run the CLI
sudo ips_profile
command on a device
running at least Version 5.3 that is registered to a Defense Center running at
least Version 5.4, the rule profiling script may fail. If the rule profiling script
fails, contact Support. (CSCuu02211)
•
Updating a 3D1000 device to Version 5.3.0.6 may fail. If your update fails,
contact Support. (CSCuu24932)
•
The asterisk (
*
) character is not supported in file transfer protocol (FTP).
(CSCuu25329)
•
The system does not generate audit log entries for login attempts with
<script>alert(1)</script>
as the user name. (CSCuu39516,
CSCuu39521)
•
If you apply an access control policy set to Block on an ASA FirePOWER
module, the system incorrectly resets the session. (CSCuu60713)
Known Issues Reported in Previous Releases
The following is a list of known issues that were reported in previous releases of
the Sourcefire 3D System:
•
In some cases, applying changes to your access control policy, intrusion
policy, network discovery policy, or device configuration, or installing an
intrusion rule update or update of the vulnerability database (VDB), causes
the system to experience a disruption in traffic that uses Link Aggregation
Control Protocol (LACP) in fast mode. As a workaround, configure LACP
links in slow mode. (112070/CSCze87966)
•
In some cases, the system includes extraneous data about dropped packets
in intrusion event performance graphs. (124934/CSCze87728)
•
If the system generates intrusion events with a Destination Port/ICMP Code
of
0
, the Top 10 Destination Ports section of the Intrusion Event Statistics
page (Overview > Summary > Intrusion Event Statistics) omits port numbers
from the display. (125581/CSCze88014)