Terminology and Documentation in Version 6.2.2.x

Terminology for Version 6.2.2

The terminology and branding used in Version 6.2.2.x may differ from the terminology used in previous releases, as summarized in the following table. For more information about terminology and branding changes, see the Firepower Compatibility Guide.

Table 1. Product Terminology and Branding in Version 6.2.2.x

Name(s)

Description

Firepower

Firepower System

Refers to the product line

Firepower Management Center

Management Center

Refers to Firepower management software running on physical or virtual Firepower platforms

Cisco ASA with FirePOWER Services

ASA device running an ASA FirePOWER module

ASA FirePOWER module

Refers to Firepower software running on an ASA operating system installed on an ASA platform

ASA FirePOWER module managed via ASDM

Refers to ASA FirePOWER module's local configuration interface, accessible with ASDM

Firepower Threat Defense

Refers to Firepower Threat Defense software running on a Firepower operating system installed on an ASA, Firepower 2100 Series, Firepower 4100 Series, Firepower 9300 appliance, or virtual platform

Firepower Device Manager or FDM

Refers to Firepower Threat Defense's local configuration interface, accessible with specific Firepower Threat Defense platforms

Documentation for Version 6.2.2.x

The following documents were updated for Version 6.2.2.x to reflect the addition of new features and functionality and to address reported documentation issues:

For additional information about updating and configuring your system, see the documents in the Cisco Firepower System Documentation Roadmap.

For the ASA documentation roadmap and release notes (including known issues) for parallel ASA versions, see Navigating the Cisco ASA Series Documentation.

For the FXOS documentation roadmap and release notes (including known issues) for parallel FXOS versions, see Navigating the Cisco FXOS Documentation.

Known Documentation Issues in Version 6.2.2.x

  • The Firepower Management Center Configuration Guide does not state that if you deploy an access control rule, SSL rule, or identity rule with geolocation network conditions and the system detects an IP address that appears to be moving from country to country, the system incorrectly reports the continent rule as unknown country.

  • Online help is missing some information about Cisco Threat Intelligence Director configuration. Specifically, the topic Configure Policies to Support TID is missing information about SSL. The missing information is: If you choose Intrusion Prevention as the default action for the access control policy and you want to decrypt traffic for TID detection, associate an SSL policy with the access control policy; see the topic “Associating Other Policies with Access Control in the Firepower Management Center Configuration Guide. The Firepower Management Center Configuration Guide Version 6.2.2 is correct.