Примечания к выпуску для Cisco Cisco Firepower Management Center 2000
Firepower System Release Notes
Resolved Issues
38
Resolved an issue where, in rare cases, the system appeared unstable and did not recover from a reboot.
(CSCuu93154)
(CSCuu93154)
Resolved an issue where a drive failure on some DC4000 appliances caused RAID controller failure and data
loss. (CSCuu93159)
loss. (CSCuu93159)
Improved eStreamer performance. (CSCuu94902)
Resolved an issue where the system did not display the correct number of bytes in the Top Web Applications
Seen and Top Client Applications Seen widgets on the Summary Dashboard if you viewed high-volume media
such as video streaming on your web browser. (CSCuu97036)
Seen and Top Client Applications Seen widgets on the Summary Dashboard if you viewed high-volume media
such as video streaming on your web browser. (CSCuu97036)
Resolved an issue where, if you deployed an SSL policy set to
Decrypt-Resign
on a managed device, the
decrypted traffic that egressed from one interface set switched or routed so the traffic ingressed into a
different interface set on the same managed device and the system experienced a disruption in SSL traffic.
(CSCuu97712)
different interface set on the same managed device and the system experienced a disruption in SSL traffic.
(CSCuu97712)
Resolved an issue where the
Send email
check box on the Report Templates tab of the Reporting page did not
stay selected and you stopped receiving reports via email if you generated a report, navigated away from the
Report Templates tab, and then generated another report. (CSCuu97750, CSCuu41580, CSCuv43116)
Report Templates tab, and then generated another report. (CSCuu97750, CSCuu41580, CSCuv43116)
Resolved an issue where clicking
Continue
on interactive block web page did not always redirect you to the
blocked web page. (CSCuu97934, CSCuu97946)
Resolved an issue where, in some cases, updating failed. (CSCuu99337)
Resolved an issue where the system did not acknowledge users as members of their primary LDAP groups.
(CSCuv03821)
(CSCuv03821)
Resolved an issue where, if you generated a connection event report and modified the
Maximum Results
value,
the system did not save the new value and generated the report with the default value. (CSCuv06557)
Resolved an issue where, if you configured the system to use a remote NTP server to synchronize time to a
system with a managed device running a version older than Version 5.4 and you experienced a leap second,
your system used a high amount of CPU. (CSCuv11738)
system with a managed device running a version older than Version 5.4 and you experienced a leap second,
your system used a high amount of CPU. (CSCuv11738)
Resolved an issue where, if you created an access control rule configured with an Interactive Block action and
you viewed a blocked webpage in a Chrome web browser, the
you viewed a blocked webpage in a Chrome web browser, the
Continue
button to bypass the block page did
not work. (CSCuv21748)
Resolved an issue where generated internal CA certificates were valid for only 30 days instead of 10 years.
(CSCuv29004)
(CSCuv29004)
Resolved an issue where, if a host generated an Indication of Compromise (IoC) and you disabled the IoC for
that host on the Host Profile page, the Indications of Compromise by Host dashboard widget incorrectly
displayed the IoC when it should not. (CSCuv41376)
that host on the Host Profile page, the Indications of Compromise by Host dashboard widget incorrectly
displayed the IoC when it should not. (CSCuv41376)
Resolved an issue where, if you created an SSL policy default action set to
Decrypt - Known Key
or
Decrypt - Resign
on a 7000 Series or 8000 Series device and you choose to resume the SSL session with a different source IP
address, SSL inspection failed and the connection log displayed an incorrect SSL policy default action.
(CSCuv48689)
address, SSL inspection failed and the connection log displayed an incorrect SSL policy default action.
(CSCuv48689)
You can now view server names and association classification through the
show ntp
CLI command on your
Firepower Threat Defense devices. (CSCuv57818)
Improved file detection and blocking. (CSCuv59181)
To suppress IPv6 router advertisement messages on a Firepower Threat Defense device, clear the
Enable RA
checkbox in the Settings page (
Device > Device Management > Interfaces> IPv6 > Settings
) under the device interface
configuration on the Firepower Management Center. (CSCuv62594)
Improved memory utilization for port ranges in access control rules. (CSCuv64114)