Cisco Secure Firewall Threat Defense Release Notes
This document contains release information for:
-
Cisco Secure Firewall Threat Defense
-
Cisco Secure Firewall Management Center (on-prem)
-
Cisco Secure Firewall device manager
For cloud deployments, see the Cisco Cloud-Delivered Firewall Management Center Release Notes or What's New for Cisco Defense Orchestrator.
Release Dates
Version |
Build |
Date |
Platforms: Upgrade |
Platforms: Reimage |
---|---|---|---|---|
7.6.0 |
113 |
2024-09-16 |
All |
All |
41 |
2024-06-27 |
— |
No longer available. |
Compatibility
Before you upgrade or reimage, make sure the target version is compatible with your deployment. If you cannot upgrade or reimage due to incompatibility, contact your Cisco representative or partner contact for refresh information.
For compatibility information, see:
Features
For features in earlier releases, see Cisco Secure Firewall Management Center New Features by Release and Cisco Secure Firewall Device Manager New Features by Release.
Note |
Patches are largely limited to urgent bug fixes: Bugs. If a patch does include a feature or behavior change, it is described in the section for the "parent" release. |
Upgrade Impact
A feature has upgrade impact if upgrading and deploying can cause the system to process traffic or otherwise act differently without any other action on your part. This is especially common with new threat detection and application identification capabilities. A feature can also have upgrade impact if upgrading requires that you take action before or after upgrade to avoid an undesirable outcome; for example, if you must change a configuration. Having to enable a new setting or deploy a policy post-upgrade to take advantage of a new feature does not count as upgrade impact.
The feature descriptions below include upgrade impact where appropriate. For a more complete list of features with upgrade impact by version, see Upgrade Impact Features.
Snort 3
Snort 3 is the default inspection engine for threat defense.
Snort 3 features for management center deployments also apply to device manager, even if they are not listed as new device manager features. However, keep in mind that the management center may offer more configurable options than device manager.
Important |
If you are still using the Snort 2 inspection engine, switch to Snort 3 now for improved detection and performance. Snort 2 will be deprecated in a future release and will eventually prevent threat defense upgrade. |
Intrusion Rules and Keywords
Upgrades can import and auto-enable new and updated intrusion rules and preprocessor rules, modified states for existing rules, and modified default intrusion policy settings. If a newer intrusion rule uses keywords that are not supported in your current version, that rule is not imported when you update the SRU/LSP. After you upgrade and those keywords become supported, the new intrusion rules are imported and, depending on your IPS configuration, can become auto-enabled and thus start generating events and affecting traffic flow.
For details on new keywords, see the Snort release notes: https://www.snort.org/downloads.
FlexConfig
Upgrades can add web interface or Smart CLI support for features that previously required FlexConfig. The upgrade does not convert FlexConfigs. After upgrade, configure the newly supported features in the web interface or Smart CLI. When you are satisfied with the new configuration, delete the deprecated FlexConfigs.
The feature descriptions below include information on deprecated FlexConfigs when appropriate. For a full list of deprecated FlexConfigs, see your configuration guide.
Caution |
Although you cannot newly assign or create FlexConfig objects using deprecated commands, in most cases existing FlexConfigs continue to work and you can still deploy. However, sometimes, using deprecated commands can cause deployment issues. |
REST API
For information on what's new in the REST API, see the Secure Firewall Management Center REST API Quick Start Guide or the Cisco Secure Firewall Threat Defense REST API Guide.
Cisco Success Network Telemetry
Cisco Success Network sends usage information and statistics to Cisco, which are essential to provide you with technical support. For information on what's new with telemetry, see Cisco Success Network Telemetry Data Collected from Cisco Secure Firewall Management Center.
Language Preferences
If you are using the web interface in a language other than English, features introduced in maintenance releases and patches may not be translated until the next major release.
Management Center Features in Version 7.6.0
Feature |
Minimum Management Center |
Minimum Threat Defense |
Details |
---|---|---|---|
Reintroduced Features |
|||
Reintroduced features. |
Feature dependent |
Feature dependent |
Version 7.6.0 reintroduces the following features, enhancements, and critical fixes:
|
Platform |
|||
Secure Firewall 1200. |
7.6.0 |
7.6.0 |
We introduced the Secure Firewall 1200, which includes these models:
See: Cisco Secure Firewall CSF-1210CE, CSF-1210CP, and CSF-1220CX Hardware Installation Guide |
Management center virtual for VMware vSphere/VMware ESXi 8.0. |
7.6.0 |
Any |
You can now deploy management center virtual for VMware on VMware vSphere/VMware ESXi 8.0. See: Cisco Secure Firewall Management Center Virtual Getting Started Guide |
Disable the front panel USB-A port on the Firepower 1000 and Secure Firewall 3100/4200. |
7.6.0 |
7.6.0 |
You can now disable the front panel USB-A port on the Firepower 1000 and Secure Firewall 3100/4200. By default, the port is enabled. New/modified threat defense CLI commands: system support usb show , system support usb port disable , system support usb port enable New/modified FXOS CLI commands for the Secure Firewall 3100/4200 in multi-instance mode: show usb-port , disable USB port , enable usb-port See: Cisco Secure Firewall Threat Defense Command Reference and Cisco Firepower 4100/9300 FXOS Command Reference |
Device Management |
|||
Device templates. |
7.6.0 |
7.4.1 |
Device templates allow you to deploy multiple branch devices with pre-provisioned initial device configurations (zero-touch provisioning). You can also apply configuration changes to multiple devices with different interface configurations, and clone configuration parameters from existing devices. Restrictions: You can use device templates to configure a device as a spoke in a site-to-site VPN topology, but not as a hub. A device can be part of multiple hub-and-spoke site-to-site VPN topologies. New/modified screens: Supported platforms: Firepower 1000/2100, Secure Firewall 1200/3100. Note that Firepower 2100 support is for threat defense 7.4.1–7.4.x only; those devices cannot run Version 7.6.0. |
Serial-number registration (zero-touch provisioning) supported from an on-prem management center. |
7.6.0 |
Mgmt. center must be publicly reachable: 7.2.0 Restriction removed: 7.2.4/7.4.0 |
You can now register a device using its serial number from an on-prem management center. With templates (requires threat defense 7.4.1+ on the device), you can register multiple devices at once. This feature was previously known as low-touch provisioning. Requires Cisco Security Cloud. For upgraded management centers, your existing CDO integration continues to work until you enable Cisco Security Cloud. New/modified screens: Supported platforms: Firepower 1000/2100, Secure Firewall 1200/3100. Note that Firepower 2100 support is for threat defense 7.4.1–7.4.x only; those devices cannot run Version 7.6.0. |
IMDSv2 support for AWS deployments. |
7.6.0 |
7.6.0 |
Threat defense and management center virtual for AWS now support Instance Metadata Service Version 2 (IMDSv2), a security improvement over IMDSv1. When you enable the instance metadata service on AWS, IMDSv2 Optional mode is still the default, but we recommend you choose IMDSv2 Required. We also recommend you switch your upgraded instances. Platform restrictions: Not available for management center virtual 300 See: Cisco Secure Firewall Threat Defense Virtual Getting Started Guide and Cisco Secure Firewall Management Center Virtual Getting Started Guide |
AAA for user-defined VRF interfaces. |
7.6.0 |
7.6.0 |
A device's authentication, authorization, and accounting (AAA) is now supported on user-defined Virtual Routing and Forwarding (VRF) interfaces. The default is to use the management interface. In device platform settings, you can now associate a security zone or interface group having the VRF interface, with a configured external authentication server. New/modified screens: See: Enable Virtual-Router-Aware Interface for External Authentication of Platform |
Delete is now Unregister on the device management page. |
7.6.0 |
Any |
The Delete menu choice was renamed to Unregister to better indicate that the device, high-availability pair, or cluster is being unregistered from the management center and not deleted from the high availability pair or cluster or having its configuration erased. The device, high-availability pair, or cluster continues to pass traffic until it is re-registered. New/modified screens: > More () |
High Availability/Scalability: Threat Defense |
|||
Multi-instance mode for the Secure Firewall 4200. |
7.6.0 |
7.6.0 |
Multi-instance mode is now supported on the Secure Firewall 4200. |
Multi-instance mode conversion in the management center for the Secure Firewall 3100/4200. |
7.6.0 |
7.6.0 |
You can now register an application-mode device to the management center and then convert it to multi-instance mode without having to use the CLI. New/modified screens: |
16-node clusters for the Secure Firewall 3100/4200. |
7.6.0 |
7.6.0 |
For the Secure Firewall 3100 and 4200, the maximum nodes were increased from 8 to 16. |
Individual interface mode for Secure Firewall 3100/4200 clusters. |
7.6.0 |
7.6.0 |
Individual interfaces are normal routed interfaces, each with their own local IP address used for routing. The main cluster IP address for each interface is a fixed address that always belongs to the control node. When the control node changes, the main cluster IP address moves to the new control node, so management of the cluster continues seamlessly. Load balancing must be configured separately on the upstream switch. Restrictions: Not supported for container instances. New/modified screens: See: Clustering for the Secure Firewall 3100/4200 and Address Pools |
Deploy threat defense virtual clusters across multiple AWS availability zones. |
7.6.0 |
7.6.0 |
You can now deploy threat defense virtual clusters across multiple availability zones in an AWS region. This enables continuous traffic inspection and dynamic scaling (AWS Auto Scaling) during disaster recovery. |
Deploy threat defense virtual for AWS in two-arm-mode with GWLB. |
7.6.0 |
7.6.0 |
You can now deploy threat defense virtual for AWS in two-arm-mode with GWLB. This allows you to directly forward internet-bound traffic after traffic inspection, while also performing network address translation (NAT). Two-arm mode is supported in single and multi-VPC environments. Restrictions: Not supported with clustering. See: Cisco Secure Firewall Threat Defense Virtual Getting Started Guide |
SD-WAN |
|||
SD-WAN wizard. |
7.6.0 |
Hub: 7.6.0 Spoke: 7.3.0 |
A new wizard allows you to easily configure VPN tunnels between your centralized headquarters and remote branch sites. New/modified screens: |
Access Control: Threat Detection and Application Identification |
|||
Snort ML: neural network-based exploit detector. |
7.6.0 |
7.6.0 with Snort 3 |
A new Snort 3 inspector, snort_ml, uses neural network-based machine learning (ML) to detect known and 0-day attacks without needing multiple preset rules. The inspector subscribes to HTTP events and looks for the HTTP URI, which in turn is used by a neural network to detect exploits (currently limited to SQL injections). The new inspector is currently disabled in all default policies except maximum detection. A new intrusion rule, GID:411 SID:1, generates an event when the snort_ml detects an attack. This rule is also currently disabled in all default policies except maximum detection. |
Bypass EVE block verdict for trusted traffic. |
7.6.0 |
Any with Snort 3 |
You can now bypass EVE (encrypted visibility engine) block verdicts for known trusted traffic, based on destination network or EVE process name. Connections that bypass EVE in this way have the new EVE Exempted reason. New/modified screens:
|
Easily bypass decryption for sensitive and undecryptable traffic. |
7.6.0 |
Any |
It is now easier to bypass decryption for sensitive and undecryptable traffic, which protects users and improves performance. New decryption policies now include predefined rules that, if enabled, can automatically bypass decryption for sensitive URL categories (such as finance or medical), undecryptable distinguished names, and undecryptable applications. Distinguished names and applications are undecryptable typically because they use TLS/SSL certificate pinning, which is itself not decryptable. For outbound decryption, you enable/disable these rules as part of creating the policy. For inbound decryption, the rules are disabled by default. After the policy is created, you can edit, reorder, or delete the rules entirely. New/modified screens: |
QUIC decryption. |
7.6.0 |
7.6.0 with Snort 3 |
You can configure the decryption policy to apply to sessions running on the QUIC protocol. QUIC decryption is disabled by default. You can selectively enable QUIC decryption per decryption policy and write decryption rules to apply to QUIC traffic. By decrypting QUIC connections, the system can then inspect the connections for intrusion, malware, or other issues. You can also apply granular control and filtering of decrypted QUIC connections based on specific criteria in the access control policy. We modified the decryption policy Advanced Settings to include the option to enable QUIC decryption. |
Allow Cisco Talos to conduct advanced threat hunting and intelligence gathering using your traffic. |
7.6.0 |
7.6.0 with Snort 3 |
Upgrade impact. Upgrade enables telemetry. You can help Talos (Cisco’s threat intelligence team) develop a more comprehensive understanding of the threat landscape by enabling threat hunting telemetry. With this feature, events from special intrusion rules are sent to Talos to help with threat analysis, intelligence gathering, and development of better protection strategies. This setting is enabled by default in new and upgraded deployments. New/modified screens: System () |
Access Control: Identity |
|||
Passive identity agent for Microsoft AD. |
7.6.0 |
Any |
This feature is introduced. The passive identity agent identity source sends session data from Microsoft Active Directory (AD) to the management center. Passive identity agent software is supported on:
|
Microsoft Azure AD realms for active or passive authentication. |
7.6.0 |
Active: 7.6.0 with Snort 3 Passive: 7.4.0 with Snort 3 |
You can now use Microsoft Azure Active Directory (AD) realms for active and passive authentication:
We use SAML (Security Assertion Markup Language) to establish a trust relationship between a service provider (the devices that handle authentication requests) and an identity provider (Azure AD). Upgrade impact. If you had a Microsoft Azure AD realm configured before the upgrade, it is displayed as a SAML - Azure AD realm configured for passive authentication. All previous user session data is preserved. New/modified screens: New/modified CLI commands: none |
New connectors for Cisco Secure Dynamic Attributes Connector. |
7.6.0 |
Any |
Cisco Secure Dynamic Attributes Connector now supports AWS security groups, AWS service tags, and Cisco Cyber Vision. Version restrictions: For on-prem Cisco Secure Dynamic Attributes Connector integrations, requires Version 3.0. See: AWS service groups connector, AWS service tags connector, Cisco Cyber Vision connector |
Easily configure an ISE identity source. |
7.6.0 |
7.6.0 |
The system can use External RESTful Services (ERS) Operator user credentials to log into a Cisco ISE Primary Authentication Node (PAN), download certificates, and configure the identity source. Restrictions: Not supported for ISE-PIC. |
Event Logging and Analysis |
|||
MITRE and other enrichment information in connection events. |
7.6.0 |
7.6.0 with Snort 3 |
MITRE and other enrichment information in connection events makes it easy to access contextual information for detected threats. This includes information from Talos and from the encrypted visibility engine (EVE). For EVE enrichment, you must enable EVE. Connection events have two new fields, available in both the unified and classic event viewers:
The new Talos Connectivity Status health module monitors management center connectivity with Talos, which is required for this feature. For the specific internet resources required, see Internet Access Requirements. See: Connection and Security-Related Connection Event Fields |
Easily filter unified events by event type. |
7.6.0 |
Any |
The unified events viewer now has buttons under the Search field that allow you to quickly filter by event type. See: Unified Events |
Health Monitoring |
|||
Collect health data without alerting. |
7.6.0 |
Any |
You can now disable health alerts/health alert sub-types for ASP Drop, CPU, and Memory health modules, while continuing to collect health data. This allows you to minimize health alert noise and focus on the most critical issues. New/modified screens: In any health policy (System () ), there are now checkboxes that enable and disable ASP Drop (threat defense only), CPU, and Memory health alert sub-types. See: Health |
Apply a default health policy upon device registration. |
7.6.0 |
Any |
You can now choose a default health policy to apply upon device registration. On the health policy page, the policy name indicates which is the default. If you want to use a different policy for a specific device post-registration, change it there. You cannot delete the default device health policy. New/modified screens: System ()More () |
Deployment and Policy Management |
|||
Policy Analyzer & Optimizer for access control. |
From mgmt. center: 7.6.0 From CDO: 7.2.0 |
Any |
The Policy Analyzer & Optimizer evaluates access control policies for anomalies such as redundant or shadowed rules, and can take action to fix discovered anomalies. You can launch the access control Policy Analyzer & Optimizer directly from a Version 7.6+ management center; this requires Cisco Security Cloud. For Versions 7.2–7.4 management centers, use CDO. New/modified screens:
See: Identifying and Fixing Anomalies with Policy Analyzer & Optimizer |
Upgrade |
|||
Improved upgrade process for high availability management centers. |
7.6.0 |
Any |
Upgrading high availability management centers is now easier:
Note that although you can complete most of the upgrade process from one peer (we recommend the standby), you do have to log into the second peer to actually initiate its upgrade. New/modified screens: System () Version restrictions: This feature applies to upgrades from Version 7.6.0 and later, not to 7.6.0. See: Cisco Secure Firewall Threat Defense Upgrade Guide for Management Center |
Generate and download post-upgrade configuration change reports from the threat defense and chassis upgrade wizards. |
7.6.0 |
Any |
You can now generate and download post-upgrade configuration change reports from the threat defense and chassis upgrade wizards, as long as you have not cleared your upgrade workflow. Previously, you used the Advanced Deploy screens to generate the reports and the Message Center to download them. Note that you can still use this method, which is useful if you want to quickly generate change reports for multiple devices, or if you cleared your workflow. New/modified screens: See: Cisco Secure Firewall Threat Defense Upgrade Guide for Management Center |
Threat defense and chassis upgrade wizards optimized for lower resolution screens. |
7.6.0 |
Any |
We optimized the threat defense and chassis upgrade wizards for lower resolution screens (and smaller browser windows). Text appears smaller and certain screen elements are hidden. If you change your resolution or window size mid-session, you may need to refresh the page for the web interface to adjust. Note that the minimum screen resolution to use the management center is 1280 x 720. New/modified screens: |
Administration |
|||
Cisco AI Assistant for Security. |
7.6.0 |
Any |
The Cisco AI Assistant for Security can answer questions about your devices and policies and query documentation and reference materials, streamlining your workflow and boosting overall efficiency. Requires Cisco Security Cloud. See: Use Cisco AI Assistant for Security to Manage Your Threat Defense Devices Effectively |
Cisco Security Cloud replaces SecureX. |
7.6.0 |
Any |
Upgrade impact. Enable Cisco Security Cloud after upgrade. Remove the SecureX Firefox Extension. Registering an on-prem management center to the Cisco Security Cloud gives you access to the latest services such as the Cisco AI Assistant for Security, Policy Analyzer & Optimizer, and Cisco XDR Automation (replaces SecureX orchestration). With a Cisco Security Cloud account, you also have a centralized view of your inventory, and can easily perform Zero-Touch Provisioning, establish consistent policies across management centers, send events to the cloud, and enrich your threat hunts and investigations. New/modified screens: Deprecated screens:
See: Integrate Management Center with the Cisco Security Cloud |
Change management ticket takeover; more features in the approval workflow. |
7.6.0 |
Any user |
You can now take over another user’s ticket. This is useful if a ticket is blocking other updates to a policy and the user is unavailable. These features are now included in the approval workflow: decryption policies, DNS policies, file and malware policies, network discovery, certificates and certificate groups, cipher suite lists, Distinguished Name objects, Sinkhole objects. See: Change Management |
Reporting usability improvements. |
7.6.0 |
Any |
When including a table in a report, it's now easier to add, delete, sort, and move columns. New/modified screens:
See: Modify Fields in the Report Template Table Format Sections |
New theme for the management center. |
7.6.0 |
Any |
We introduced a new left-hand navigation theme for the management center. To try it, click your user name in the top right corner and select the New theme. We also deprecated the Classic theme. If you were using the Classic theme, the upgrade switches you to the Light theme. |
Subscribe to Cisco newsletters and other product-related communications. |
7.6.0 |
Any |
Provide an email address to receive sales and product renewal conversations, new release adoption newsletters, and other product-related communications from Cisco. Each management center internal user has their own email address. New/modified screens: System () |
Updated internet access requirements for URL filtering. |
7.6.0 |
Any |
Upgrade impact. The system connects to new resources. The system now requires access to *.talos.cisco.com for URL filtering data. It no longer requires access to regsvc.sco.cisco.com or est.sco.cisco.com. For a full list of resources required for this feature, see Internet Access Requirements. |
Threat defense high availability automatically resumes after restoring from backup. |
Any |
7.2.10 7.4.3 |
When replacing a failed unit in a high availability pair, you no longer have to manually resume high availability after the restore completes and the device reboots. You should still confirm that high availability has resumed before you deploy. Version restrictions: Not supported with threat defense Version 7.0–7.0.6, 7.1.x, 7.2.0–7.2.9, 7.3.x, or 7.4.0–7.4.2. |
Performance |
|||
Hardware DTLS 1.2 crypto acceleration for the Secure Firewall 3100/4200. |
7.6.0 |
7.6.0 with Snort 3 |
The Secure Firewall 3100/4200 now supports DTLS 1.2 cryptographic acceleration and egress optimization, which improves throughput of DTLS-encrypted and decrypted traffic. This is automatically enabled on new and upgraded devices. To disable, use FlexConfig. New/modified FlexConfig commands: flow-offload-dtls , flow-offload-dtls egress-optimization , show flow-offload-dtls |
Object group search performance enhancements. |
7.6.0 |
Any |
Object group search is now faster and uses fewer CPU resources. New CLI commands: clear asp table network-object , show asp table network-object , debug acl ogs Modified CLI comments (enhanced output): , packet-tracer , show access-list , show object-group See: Configure Object Group Search and Cisco Secure Firewall Threat Defense Command Reference |
Troubleshooting |
|||
Troubleshoot Snort 3 performance issues with a CPU and rule profiler. |
7.6.0 |
7.6.0 with Snort 3 |
New CPU and rule profilers help you troubleshoot Snort 3 performance issues. You can now monitor:
New/modified screens: Platform restrictions: Not supported for container instances. See: Advanced Troubleshooting for the Secure Firewall Threat Defense Device |
Receive additional threat defense troubleshooting syslogs, and view them as unified events. VPN troubleshooting syslogs moved. |
7.6.0 |
Any with Snort 3 |
You can now configure threat defense devices to send all device troubleshooting syslogs (instead of just VPN troubleshooting syslogs) to the management center. New/modified screens:
See: Configure Syslog Logging for Threat Defense Devices and View Troubleshooting Syslogs in the Secure Firewall Management Center |
Application detection debug logs in connection-based troubleshooting. |
7.6.0 |
7.6.0 with Snort 3 |
For connection-based troubleshooting, you can now collect debug logs from application detectors. New/modified CLI commands: debug packet-module appid enables and sets the severity level for application detector debug logs. You can choose 3 (error), 4 (warning), or 7 (debug). See: Connection-Based Troubleshooting and Cisco Secure Firewall Threat Defense Command Reference |
Packet tracer improvements. |
7.6.0 |
Varies. |
Packet tracker improvements allow you to:
New/modified commands:
See: Packet Tracer and Cisco Secure Firewall Threat Defense Command Reference |
Cisco Success Network and Cisco Support Diagnostics are enabled by default. |
7.6.0 |
Any |
Upgrade impact. Upgrade opts into Cisco Success Network and Cisco Support Diagnostics. Cisco Success Network and Cisco Support Diagnostics are now opt-out, instead of opt-in. If you were previously opted out, upgrade changes that. Also, you can no longer opt out when you register the management center to the Cisco Smart Software Manager (CSSM). You can still opt out on .See: Integrate Management Center with the Cisco Security Cloud |
Deprecated Features |
|||
End of support: Firepower 2110, 2120, 2130, 2140. |
— |
7.6.0 |
You cannot run Version 7.6+ on the Firepower 2110, 2120, 2130, or 2140. Although a newer management center can manage older devices, the Version 7.6 documentation only includes features supported in Version 7.6 threat defense. For features that are only supported with older devices, refer to the management center guide that matches your threat defense version. |
End of management support: ASA FirePOWER and NGIPSv. |
7.6.0 |
— |
You cannot manage Classic devices (ASA FirePOWER and NGIPSv) with a Version 7.6+ management center. This is because Classic devices cannot be upgraded past Version 7.0, and a Version 7.6 management center can only manage devices as far back as Version 7.1. New/modified screens: For new and upgraded management centers, Classic-specific configurations and screens are removed. This includes platform settings, NAT, syslog logging, licensing, and so on. In some cases, creating threat defense configurations is quicker because you do not have to begin by selecting a device type. |
Deprecated: Copy upgrade packages ("peer-to-peer sync") from device to device. |
7.6.0 |
7.6.0 |
You can no longer use the threat defense CLI to copy upgrade packages between devices over the management network. If you have limited bandwidth between the management center and its devices, configure devices to get upgrade packages directly from an internal web server. Deprecated CLI commands: configure p2psync enable , configure p2psync disable , show peers , show peer details , sync-from-peer , show p2p-sync-status |
End of support: analytics-only capabilities with the full range of threat defense devices supported with cloud-delivered Firewall Management Center. |
Any |
7.2.0 |
If you are co-managing Version 7.0.x devices with cloud-delivered Firewall Management Center and an on-prem analytics-only management center, you cannot upgrade the analytics management center to Version 7.6 (which would allow you to add Version 7.6 devices) until you upgrade the older devices to 7.2+, or replace or remove them. See: Cisco Secure Firewall Management Center Compatibility Guide |
Device Manager Features in Version 7.6.0
Feature |
Description |
---|---|
Platform Features |
|
Secure Firewall 1200. |
We introduced the Secure Firewall 1200, which includes these models:
See: Cisco Secure Firewall CSF-1210CE, CSF-1210CP, and CSF-1220CX Hardware Installation Guide |
Disable the front panel USB-A port on the Firepower 1000 and Secure Firewall 3100. |
You can now disable the front panel USB-A port on the Firepower 1000 and Secure Firewall 3100. By default, the port is enabled. New/modified CLI commands: system support usb show , system support usb port disable , system support usb port enable |
IMDSv2 support for AWS deployments. |
Threat defense virtual for AWS now supports Instance Metadata Service Version 2 (IMDSv2), a security improvement over IMDSv1. When you enable the instance metadata service on AWS, IMDSv2 Optional mode is still the default, but we recommend you choose IMDSv2 Required. We also recommend you switch your upgraded instances. See: Cisco Secure Firewall Threat Defense Virtual Getting Started Guide |
End of support: Firepower 2110, 2120, 2130, 2140. |
You cannot run Version 7.6+ on the Firepower 2110, 2120, 2130, or 2140. |
Firewall and IPS Features |
|
Object group search performance enhancements. |
Object group search is now faster and uses fewer resources. New CLI commands: clear asp table network-object , show asp table network-group Modified CLI comments (enhanced output): debug acl logs , packet-tracer , show access-list , show object-group |
Administrative and Troubleshooting Features |
|
Updated internet access requirements for URL filtering. |
Upgrade impact. The system connects to new resources. The system now requires access to *.talos.cisco.com for URL filtering data. It no longer requires access to regsvc.sco.cisco.com or est.sco.cisco.com. |
Canadian French translation for Firewall Device Manager. |
Firewall Device Manager includes a Canadian French version in addition to English, Chinese, Japanese, and Korean. You must select Canadian French as the browser language. You cannot see the French version by selecting any other type of French. |
Performance Features |
|
Hardware DTLS 1.2 crypto acceleration for the Secure Firewall 3100. |
The Secure Firewall 3100 now supports DTLS 1.2 cryptographic acceleration and egress optimization, which improves throughput of DTLS-encrypted and decrypted traffic. This is automatically enabled on new and upgraded devices. To disable, use FlexConfig. New/modified FlexConfig commands: flow-offload-dtls , flow-offload-dtls egress-optimization , show flow-offload-dtls |
Upgrade Impact Features
A feature has upgrade impact if upgrading and deploying can cause the system to process traffic or otherwise act differently without any other action on your part. This is especially common with new threat detection and application identification capabilities. A feature can also have upgrade impact if upgrading requires that you take action before or after upgrade to avoid an undesirable outcome; for example, if you must change a configuration. Having to enable a new setting or deploy a policy post-upgrade to take advantage of a new feature does not count as upgrade impact.
Note |
Deploying can affect traffic flow and inspection; see the appropriate upgrade guide for details: Cisco Secure Firewall Threat Defense: Install and Upgrade Guides. |
Tip |
Features, enhancements, and critical fixes can skip releases; these skipped releases are usually short-term major versions or early maintenance releases for long-term major versions. To minimize upgrade impact, do not upgrade to a release that deprecates features. In most cases, you can upgrade directly to the latest maintenance release for any major version. |
Upgrade Impact Features for Management Center
Check all releases between your current and target version.
Target Version |
Features with Upgrade Impact |
---|---|
7.6.0+ |
|
7.4.1+ |
|
7.4.0+ |
|
7.3.0+ |
|
7.2.4+ |
|
7.2.0+ |
Upgrade Impact Features for Threat Defense with Management Center
Check all releases between your current and target version.
Target Version |
Features with Upgrade Impact |
---|---|
7.4.1+ |
|
7.3.0+ |
|
7.2.4+ |
|
7.2.0+ |
Upgrade Impact Features for Threat Defense with Device Manager
Check all releases between your current and target version.
Target Version |
Features with Upgrade Impact |
---|---|
7.6.0+ |
|
7.4.1+ |
|
7.3.0+ |
|
7.2.4+ |
Upgrade Guidelines
The following sections contain release-specific upgrade warnings and guidelines. You should also check for features and bugs with upgrade impact. For general information on time/disk space requirements and on system behavior during upgrade, see the appropriate upgrade guide: For Assistance.
Upgrade Guidelines for Management Center
Target Version |
Current Version |
Guideline |
Details |
---|---|---|---|
7.6.x |
7.1.x–7.6.x |
There are no upgrade warnings or guidelines for this version right now, but you should still check for features and bugs with upgrade impact. |
Upgrade Guidelines for Threat Defense with Management Center
Target Version |
Current Version |
Guideline |
Details |
---|---|---|---|
7.2.0–7.6.x |
6.7.0–7.1.x |
Upgrade prohibited: threat defense virtual for GCP from Version 7.1.x and earlier to Version 7.2.0+. |
You cannot upgrade threat defense virtual for GCP from Version 7.1.x and earlier to Version 7.2.0+. You must deploy a new instance. |
Upgrade Guidelines for Threat Defense with Device Manager
Target Version |
Current Version |
Guideline |
Details |
---|---|---|---|
7.6.x |
7.1.x–7.6.x |
There are no upgrade warnings or guidelines for this version right now, but you should still check for features and bugs with upgrade impact. |
Upgrade Guidelines for the Firepower 4100/9300 Chassis
In most cases, we recommend you use the latest FXOS build in each major version. For release-specific FXOS upgrade warnings and guidelines, as well as features and bugs with upgrade impact, see the FXOS release notes. Check all release notes between your current and target version: http://www.cisco.com/go/firepower9300-rns.
Upgrade Path
Planning your upgrade path is especially important for large deployments, multi-hop upgrades, and situations where you need to coordinate chassis, hosting environment or other upgrades.
Upgrading the Management Center
The management center must run the same or newer version as its devices. Upgrade the management center to your target version first, then upgrade devices. If you begin with devices running a much older version than the management center, further management center upgrades can be blocked. In this case perform a three (or more) step upgrade: devices first, then the management center, then devices again.
Upgrading Threat Defense with Chassis Upgrade
Some devices may require a chassis upgrade (FXOS and firmware) before you upgrade the software:
-
Secure Firewall 3100/4200 in multi-instance mode: Any upgrade can require a chassis upgrade. Although you upgrade the chassis and threat defense separately, one package contains the chassis and threat defense upgrades and you perform both from the management center. The compatibility work is done for you. It is possible to have a chassis-only upgrade or a threat defense-only upgrade.
-
Firepower 4100/9300: Major versions require a chassis upgrade.
Because you upgrade the chassis first, you will briefly run a supported—but not recommended—combination, where the operating system is "ahead" of threat defense. If the chassis is already well ahead of its devices, further chassis upgrades can be blocked. In this case perform a three (or more) step upgrade: devices first, then the chassis, then devices again. Or, perform a full reimage. In high availability or clustered deployments, upgrade one chassis at a time.
Supported Direct Upgrades
This table shows the supported direct upgrades for management center and threat defense software. Note that although you can upgrade directly to major and maintenance releases, patches change the fourth digit only. You cannot upgrade directly to a patch from a previous major or maintenance release.
For the Firepower 4100/9300, the table also lists companion FXOS versions. If a chassis upgrade is required, threat defense upgrade is blocked. In most cases we recommend the latest build in each version; for minimum builds see the Cisco Secure Firewall Threat Defense Compatibility Guide.
Current Version |
Target Software Version |
||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
7.6 |
7.4 |
7.3 |
7.2 |
7.1 |
7.0 |
6.7 |
6.6 |
6.5 |
6.4 |
6.3 |
|
Firepower 4100/9300 FXOS Version for Chassis Upgrades | |||||||||||
2.16 |
2.14 |
2.13 |
2.12 |
2.11 |
2.10 |
2.9 |
2.8 |
2.7 |
2.6 |
2.4 |
|
7.6 |
YES |
— |
— |
— |
— |
— |
— |
— |
— |
— |
— |
7.4 |
YES |
YES † |
— |
— |
— |
— |
— |
— |
— |
— |
— |
7.3 |
YES |
YES |
YES |
— |
— |
— |
— |
— |
— |
— |
— |
7.2 |
YES |
YES |
YES |
YES |
— |
— |
— |
— |
— |
— |
— |
7.1 |
YES |
YES |
YES |
YES |
YES |
— |
— |
— |
— |
— |
— |
7.0 |
— |
YES |
YES |
YES |
YES |
YES |
— |
— |
— |
— |
— |
6.7 |
— |
— |
— * |
YES |
YES |
YES |
YES |
— |
— |
— |
— |
6.6 |
— |
— |
— |
YES |
YES |
YES |
YES |
YES |
— |
— |
— |
6.5 |
— |
— |
— |
— |
YES |
YES |
YES |
YES |
— |
— |
— |
6.4 |
— |
— |
— |
— |
— |
YES |
YES |
YES |
YES |
— |
— |
6.3 |
— |
— |
— |
— |
— |
— |
YES |
YES |
YES |
YES |
— |
6.2.3 |
— |
— |
— |
— |
— |
— |
— |
YES |
YES |
YES |
YES |
* You cannot upgrade from Version 6.7.x to 7.3.x. You can, however, manage Version 6.7.x devices with a Version 7.3.x management center.
† You cannot upgrade threat defense to Version 7.4.0, which is available as a fresh install on the Secure Firewall 4200 only. Instead, upgrade your management center and devices to Version 7.4.1+.
Bugs
For bugs in earlier releases, see the release notes for those versions. For cloud deployments, see the Cisco Cloud-Delivered Firewall Management Center Release Notes.
Important |
We do not list open bugs for maintenance releases or patches. Bug lists are auto-generated once and may not be subsequently updated. If updated, the 'table last updated' date does not mean that the list was fully accurate on that date—only that some change was made. Depending on how and when a bug was categorized or updated in our system, it may not appear in the release notes. If you have a support contract, you can obtain up-to-date bug lists with the Cisco Bug Search Tool. |
Open Bugs in Version 7.6.0
Table last updated: 2024-09-19
Bug ID |
Headline |
---|---|
UDP throughput highly variable on snort reload |
|
low memory/stress causing block double free and reload |
|
FMC - SDWAN - Same IKE identity issues between multiple topologies |
|
CSCwk48461 |
Cannot create 1024 subinterfaces on Secure Firewall 1200 when unnamed interfaces/etherchannels exist |
SDWAN: Same spoke in another topology with different community causes issues in route redistribution |
|
CSCwk90798 |
FMC HA role switch secondary FMC does not get event configuration and threat hunting is lost on FTD |
CSCwk98275 |
Unable to trigger second immediate backup after first scheduled backup completed |
Traffic on port-channel/port-channel subinterfaces not working with device template registration |
|
CSCwm38714 |
Change management: Error in save of SD-WAN topology if security zone is added inline in the wizard |
Break FTD-HA pair fails on MI app |
|
CSCwm44162 |
Child domain template adding through Global Device wizard page is not working |
CSCwm44656 |
Erroneous message - Interface 'management0' has no link - during device onboarding |
Edit configuration on Secure Firewall 3100 L3 Cluster fails with BGP enabled |
|
Policy deploy failing constantly after changing interface nameif if interface used in SAML CP rule |
|
Policy deployment failing constantly on Secure Firewall cluster data node post cluster break |
|
Secure Firewall 1200: sma reported fault: Lina has started, but is not yet running |
|
SSL Server check-box is missing only in default new theme for Device- >Certificates- > Add New Cert |
Resolved Bugs in Version 7.6.0
Table last updated: 2024-09-16
Bug ID |
Headline |
---|---|
FMC: critical processes can not boot up including vmsDBEngine |
|
ASA concatenates syslog event to other syslog event while sending to the syslog server |
|
FTD traceback in Thread Name cli_xml_server when deploying QoS policy |
|
FTD - Flow-Offload should be able to coexist with Rate-limiting Feature (QoS) |
|
Lack of throttling of ARP miss indications to CP leads to oversubscription |
|
Remove Syslog Messages 852001 and 852002 in Firewall Threat Defense |
|
SNMPv3: Special characters used in FXOS SNMPv3 configuration causes authentication errors |
|
FXOS Major Faults about adapter host and virtual interface being down |
|
FXOS: Fault "The password encryption key has not been set." displayed on FPR1000 and FPR2100 devices |
|
App-instance showing as Started instead of Online |
|
IPTables.conf file is disappearing resulting in backup and restore failure. |
|
Deployment fails with internal_errors - Cannot get fresh id |
|
ERROR: Deleted IDB found in in-use queue - message misleading |
|
Getting Unprocessable URL categories objects when using API call |
|
PLR license reservation for ASAv5 is requesting ASAv10 |
|
ASA may fail to create NAT rule for SNMP with: "error NAT unable to reserve ports." |
|
show access-control-config doesn't show NAP/IPS policy name |
|
ASA: FPR11xx: Loss of NTP sync following a reload after upgrade |
|
Some syslogs for AnyConnect SSL are generated in admin context instead of user context |
|
Tune throttling flow control on syslog-ng destinations |
|
ENH: Support for snapshots of RX queues on InternalData interfaces when "Blocks free curr" goes low |
|
Primary node disconnected from VPN-Cluster when performed HA failover on Primary with DNS lookup |
|
"SFDataCorrelator:Parser [ERROR] Syntax error" on FTD device |
|
ASA/FTD stuck after crash and reboot |
|
Microsoft update traffic blocked with Snort version 3 Malware inspection |
|
ASA/FTD Traceback and reload in Process Name: lina |
|
snort3 crashinfo sometimes fails to collect all frames |
|
MFIB RPF failed counter instead of Other drops increments when outgoing interface list is Null |
|
ASA: The timestamp for all logs generated by Admin context are the same |
|
cache and dump last 20 rmu request response packets in case failures/delays while reading registers |
|
Snort down due to missing lua files because of disabled application detectors (PM side) |
|
AnyConnect SAML - Client Certificate Prompt incorrectly appears within External Browser |
|
Cisco ASA and FTD Software RSA Private Key Leak Vulnerability |
|
Prevention of RSA private key leaks regardless of root cause. |
|
FTPS getting ssl3_get_record:bad record type during connection for KK and DR rules |
|
Unnecessary FAN error logs needs to be removed from thermal file |
|
ASA/FTD may traceback and reload during ACL changes linked to PBR config |
|
ASA/FTD may traceback and reload in Thread Name 'lina' |
|
FXOS ASA/FTD SNMP OID to poll Internal-data 'no buffer' interface counters |
|
logging/syslog is impacted by SNMP traps and logging history |
|
ASA: ASDM sessions stuck in CLOSE_WAIT causing lack of MGMT |
|
User/group download may fail if a different realm is changed and saved |
|
25G CU SFPs not working in Brentwood 8x25G netmod |
|
ASA/FTD tmatch compilation check when unit joins the cluster, when TCM is off |
|
cacert.pem on FMC expired and all the devices showing as disabled. |
|
AnyConnect SAML using external browser and round robin DNS intermittently fails |
|
Failover trigger due to Inspection engine in other unit has failed due to disk failure |
|
critical health alerts 'user configuration(FSM.sam.dme.AaaUserEpUpdateUserEp)' on FPR 1100/2100/3100 |
|
ASA/FTD may traceback and reload in Thread Name 'lina' following policy deployment |
|
ASA/FTD: Traceback and reload in Thread Name: EIGRP-IPv4 |
|
ASA/FTD may traceback and reload in Thread Name 'lina' |
|
User with no vpn-filter may get additional access when per-user-override is set |
|
DHCP Relay is looping back the DHCP offer packet causing dhcprelay to fail on the FTD/ASA |
|
FTD: Traceback & reload in process name lina |
|
ASA/FTD traceback and reload on thread name fover_fail_check |
|
ASA/FTD: Command "no snmp-server enable oid mempool" enabled by default or enforced during upgrades |
|
ssl policy errors: Unable to get server certificate's internal cached status |
|
SSL Policy DND default Rule fails on error unsupported cipher suite and SKE error. |
|
Analyze why there is no logrotate for /opt/cisco/config/var/log/ASAconsole.log |
|
FPR 2100: 10G interfaces with 1G SFP goes down post reload |
|
fxos log rotate failing to cycle files, resulting in large file sizes |
|
ASA/FTD: Traceback and reload in Thread Name: appAgent_reply_processor_thread |
|
256 / 1550 Block leak with TLS1.3 session |
|
Evaluate FMC for CVE-2022-42252 |
|
ASA restore is not applying vlan configuration |
|
AWS: SSL decryption failing with Geneve tunnel interface |
|
Stale CPU core health events seen on FMC UI post upgrade to 7.0.0+. |
|
FTD Lina traceback and reload in Thread Name 'IP Init Thread' |
|
Disable asserts in FTD production builds |
|
ASA/FTD: Traceback and reload due to SNMP group configuration during upgrade |
|
FMC UI Showing inaccurate data in S2S VPN Monitoring page |
|
ASA Connections stuck in idle state when DCD is enabled |
|
Cisco ASA and FTD AnyConnect SSL/TLS VPN Denial of Service Vulnerability |
|
FPR2100: Increase in failover convergence time with ASA in Appliance mode |
|
FTDv Single-Arm Proxy behind AWS GWLB drops due to geneve-invalid-udp-checksum with all 0 checksum |
|
AC clients fail to match DAP rules due to attribute value too large |
|
Packets through cascading contexts in ASA are dropped in gateway context after software upgrade |
|
ASA traceback and reload on Datapath process |
|
FPR1150 : Exec format error seen and the device hung until reload when erase secure all is executed |
|
ASA|FTD: Implement different TLS diffie-hellman prime based on RFC recommendation |
|
QEMU KVM console got stuck in "Booting the kernel" page |
|
Port-channel interfaces of secondary unit are in waiting status after reload |
|
Port-channel member port status flag and membership status are Down if LACPDUs are not received |
|
ASA/FTD may traceback and reload in idfw fqdn hash lookup |
|
FXOS: FP2100 FTW timeout triggered by high CPU usage during FTD Access Control Policy deploy. |
|
30+ seconds data loss when unit re-join cluster |
|
FTD with Snort3 might have memory corruption BT in snort file with same IP traffic scaling |
|
Cisco ASA and FTD ICMPv6 Message Processing Denial of Service Vulnerability |
|
ASA configured with HA may traceback and reload with multiple input/output error messages |
|
MI FTD running 7.0.4 is on High disk utilization |
|
Snort drops Bomgar application packets with Early Application Detection enabled |
|
High CPU Utilization on FXOS for processes smConlogger |
|
FTD Traffic failure due to 9344 block depletion in peer_proxy_tx_q |
|
LINA Traceback on FPR-1010 under Thread Name: update_cpu_usage |
|
Snort outputs massive volume of packet events - IPS event view may show "No Packet Information" |
|
Microsoft SCEP enrollment fails to get ASA identity cert - Unable to verify PKCS7 |
|
ASA/FTD may traceback and reload in Thread Name 'telnet/ci' |
|
ASA/FTD may traceback and reload in Thread Name 'lina' |
|
Observing some devcmd failures and checkheaps traceback when flow offload is not used. |
|
Snort3 stream core found init_tcp_packet_analysis |
|
AWS ASAv PAYG Licensing not working in GovCloud regions. |
|
Traceback and reload when webvpn users match DAP access-list with 36k elements |
|
ASA/FTD: Traceback and Reload on Netflow timer infra |
|
Cut-Through Proxy does not work with HTTPS traffic |
|
Enhance logging mechanism for syslogs |
|
ASA/FTD NAT Pool Cluster allocation and reservation discrepancy between units |
|
Stratix5950 and ISA3000 LACP channel member SFP port suspended after reload |
|
Traffic fails in Azure ASAv Clustering after "timeout conn" seconds |
|
ASA/FTD failure due to heartbeat loss between chassis and blade |
|
ASA: After upgrade cannot connect via ssh to interface |
|
ASA/FTD may traceback and reload in logging_cfg processing |
|
FAN LED flashing amber on FPR2100 |
|
Clientless VPN users are unable to download large files through the WebVPN portal |
|
Anyconnect users unable to connect when ASA using different authentication and authorization server |
|
Blade not coming up after FXOS update support on multi-instance due to ssp_ntp.log log rotation prob |
|
The Standby Device going in failed state due to snort heartbeat failure |
|
Primary ASA traceback upon rebooting the secondary |
|
ASA/FTD traceback and reload, Thread Name: rtcli async executor process |
|
Link Up seen for a few seconds on FPR1010 during bootup |
|
FTD: Unable to configure WebVPN Keepout or Certificate Map on FPR3100 |
|
ASA is unexpected reload when doing backup |
|
FPR41xx/9300: Blade does not capture or log a reboot signal |
|
ASA/FTD: External IDP SAML authentication fails with Bad Request message |
|
Cisco ASA and FTD Software VPN Packet Validation Vulnerability |
|
Optimization of Side Bar loading for HealthMon page |
|
License Commands go missing in Cluster data unit if the Cluster join fails. |
|
ASA/FTD may traceback and reload after a reload with DHCPv6 configured |
|
ASA/FTD may traceback and reload in Thread Name 'lina' |
|
FTD traceback and reload while deploying PAT POOL |
|
Need to provide rate-limit on "logging history <mode>" |
|
FTD/ASA traceback and reload during to tmatch compilation process |
|
Unexpected "No Traffic" health alert on Standby HA Data Interface where no data flows |
|
FTD traceback/reloads - Icmp error packet processing involves snp_nat_xlate_identity |
|
FPR1K/FPR2K: Increase in failover time in Transparent Mode with high number of Sub-Interfaces |
|
Cluster data unit drops non-VPN traffic with ASP reason "VPN reclassify failure |
|
FPR1120:connections are getting teardown after switchover in HA |
|
None option under trustpoint doesn't work when CRL check is failing |
|
FTD traceback and reload during policy deployment adding/removing/editing of NAT statements. |
|
FTD is dropping GRE traffic from WSA |
|
ASA binding with LDAP as authorization method with missing configuration |
|
Identity network filter not removed from FTD |
|
ASA: Traceback and reload while processing SNMP packets |
|
Nodes randomly fail to join cluster due to internal clustering error |
|
FTD: HA crash and interfaces down on FPR4200 |
|
High Lina memory use due to leaked SSL handles |
|
Secondary state flips between Ready & Failed when node is rebooted and mgmt interface is shutdown |
|
multimode-tmatch_df_hijack_walk traceback observed during shut/unshut on FO connected switch interfa |
|
IKEv2 Multi-DVTI Hub Support FTD/ASA |
|
FTD - 'show memory top-usage' providing improper value for memory allocation |
|
FTD: IP SLA Pre-emption not working even when destination becomes reachable |
|
ASA/FTD Traceback and reload of Standby Unit while removing capture configurations |
|
Multiple Cisco Products Snort 3 Access Control Policy Bypass Vulnerability |
|
cdFMC : User with VPN Sessions Manager Role can't access cdFMC |
|
null connection error seen in logs |
|
ASA/FTD: Improve GTP Inspection Logging |
|
ASA/FTD: GTP Inspection engine serviceability |
|
[FTD Multi-Instance][SNMP] - CPU OIDs return incomplete list of associated CPUs |
|
ASA/FTD may traceback and reload in Thread Name: CTM Daemon |
|
256-byte memory block gets depleted on start if jumbo frame is enabled with FTD on ASA5516 |
|
Traffic drop when primary device is active |
|
Cisco ASA and FTD Software Remote Access SSL VPN Multiple Certificate Auth Bypass |
|
ASA/FTD may drop multicast packets due to no-mcast-intrf ASP drop reason until UDP timeout expires |
|
Multicast connection built or teardown syslog messages may not always be generated |
|
Write wrapper around "kill" command to log who is calling it |
|
Snort3: Process in D state resulting in OOM with jemalloc memory manager |
|
SNMPD cores seen in in snmp_sess_close and notifyTable_register_notifications |
|
WR6, WR8, LTS18 and LTS21 commit id update in CCM layer (Seq 43) |
|
Partition "/opt/cisco/config" gets full due to wtmp file not getting logrotated |
|
Unexpected firewalls reloads with traceback. |
|
[SXP-UserIP Muted Leader]FMC HA Join flushes FW IP_SGT Mapping and restreams in registered sensors. |
|
NTP polling frequency changed from 5 minutes to 1 second causes large useless log files |
|
Multiple instances of nvram.out log rotated files under /opt/cisco/platform/logs/ |
|
8x10Gb netmod fails to come online |
|
ASA/FTD - SNMP related memory leak behavior when snmp-server is not configured |
|
rpc service detector causing snort traceback due to universal address being an empty string |
|
Azure D5v2 FTDv unable to send traffic - underruns and deplete DPDK buffers observed |
|
ASA Traceback & reload citing thread name: asacli/0 |
|
FTD taking longer than expected to form OSPF adjacencies after a failover switchover |
|
ASA/FTD may traceback and reload after executing 'clear counters all' when VPN tunnels are created |
|
Copy and pasting rules is broken and give blank error message in ID policy |
|
LINA traceback with icmp_thread |
|
The command "app-agent heartbeat" is getting removed when deleting any created context |
|
FPR 4115- primary unit lost all HA config after ftd HA upgrade |
|
CLUSTER: ICMP reply arrives at director earlier than CLU add flow request from flow owner. |
|
FTD MI does not adjust PVID on vlans attached to BVI |
|
ASA/FTD may traceback and reload in Thread Name 'None' at lua_getinfo |
|
ASA/FTD Show chunkstat top command implementation |
|
ASA/FTD might traceback in funtion "snp_fp_l2_capture_internal" due to cf_reinject_hide flag |
|
Traffic drops with huge rule evaluation on snort |
|
Workaround to set hwclock from ntp logs on low end platforms |
|
ASA/FTD may traceback and reload in Thread Name 'ci/console' when checking Geneve capture |
|
changing time window settings in FMC GUI event viewers may not work with FMC integrated with SecureX |
|
Supervisor does not reboot unresponsive module/blade due to IERR with minor severity sensor ID 79 |
|
ASA/FTD: High failover delay with large number of (sub)interfaces and http server enabled |
|
TLS Server Identity may cause certain clients to produce mangled Client Hello |
|
Gateway is not reachable from standby unit in admin and user context with shared mgmt intf |
|
Multiple traceback seen on standby unit. |
|
2100: Power switch toggle leads to ungraceful shutdowns and "PowerCycleRequest" reset |
|
Stale IKEv2 SA formed during simultaneous IKE SA handling when missing delete from the peer |
|
FDM WM-HA ssh is not working after upgrading 7.2.3 beta with data interface as management |
|
FTD may not reboot as expect post upgrade if bundled FXOS version is the same on old and new version |
|
ASA: FP2100 FTW timeout triggered by high CPU usage during FTD Access Control Policy deploy. |
|
Deleting a BVI in FTD interfaces is causing packet drops in other BVIs |
|
Classic and Unified Events should handle cases when SMC is unreachable |
|
FP2100:Update LINA asa.log files to avoid recursive messages-<date>.1.gz rotated filenames |
|
Syslog ASA-6-611101 is generated twice for a single ssh connection |
|
User with no vpn-filter may get additional access when per-user-override is set (IKEv2 RAVPN) |
|
FTD upgrade from 7.0 to 7.2.x and traceback/reload due to management-access enabled |
|
ASA/FTD drops traffic to BVI if floating conn is not default value due to no valid adjacency |
|
FTD: CLISH slowness due to command execution locking LINA prompt |
|
The public API function BIO_new_NDEF is a helper function used for str |
|
Management interface link status not getting synced between FXOS and ASA |
|
ASA/FTD may traceback and reload in Thread Name 'lina' |
|
ASA Evaluation of OpenSSL vulnerability CVE-2022-4450 |
|
SSL decrypted conns fails when tx chksum-offload is enabled with the egress interface a pppoe. |
|
FTD on FPR2140 - Lina traceback and reload by TCP normalization |
|
Protocol Down with lower CPU instances on ESXi 8 for ASAv and FTDv |
|
Memory leak observed on ASA/FTD when logging history is enabled |
|
ASA/FTD: Revision of cluster event message "Health check detected that control left cluster" |
|
FTD: "timeout floating-conn" not operating as expected for connections dependent on VRF routing |
|
ASA/FTD reboots due to traceback pointing to watchdog timeout on p3_tree_lookup |
|
CCM seq 45 - WR6, WR8, LTS18 and LTS21. |
|
FTD Traceback and reload on Thread Name "NetSnmp Event mib process" |
|
PIM register packets are not sent to RP after a reload if FTD uses a default gateway to reach the RP |
|
ASA Multicontext 'management-only' interface attribute not synced during creation |
|
ASA reboots due to heartbeat loss and "Communication with NPU lost" |
|
New context subcommands are not replicated on HA standby when multiple sessions are opened. |
|
Policy Deploy Failing when trying to remove Umbrella DNS Connector Configuration |
|
ASA/FTD traceback in snp_tracer_format_route |
|
ASA/FTD may traceback and reload in Thread Name 'lina' due to due to tcp intercept stat |
|
ASA/FTD: Ensure flow-offload states within cluster are the same |
|
Need fault/error for invalid firmware MF-111-234949 |
|
Post backup restore multiple processes are not up. No errors are observed during backup or restore. |
|
Cluster hardening fixes |
|
Cisco ASA and FTD ACLs Not Installed upon Reload |
|
ASA/FTD may traceback and reload |
|
ASA: Prevent SFR module configuration on unsuported platforms |
|
The command "neighbor x.x.x.x ha-mode graceful-restart" removed when deleting any created context |
|
FP2100 series devices might use excessive memory if there is a very high SNMP polling rate |
|
KP Generating invalid core files which cannot be decoded 7.2.4-64 |
|
show xlate does not display xlate entries for internal interfaces (nlp_int_tap) after enabling ssh. |
|
ASA - Standby device may traceback and reload during synchronization of ACL DAP |
|
ASA/FTD may traceback and reload in Thread Name 'lina' |
|
Last fragment from SIP IPv6 packets has MF equal to 1, flagging that more packets are expected |
|
ASA / FTD Traceback and reload when removing isakmp capture |
|
Failover fover_trace.log file is flooding and gets overwritten quickly |
|
Snort3 fails to match SMTPS traffic to ACP rules |
|
Multiple times the failover may be disabled by wrongly seeing a different "Mate operational mode". |
|
Connections not replicated to Standby FTD |
|
FTD Crash in Thead Name: CP Processing |
|
ASA/FTD may traceback and reload in Thread Name DATAPATH-3-21853 |
|
FTD LINA traceback and reload in Datapath thread after adding Static Routing |
|
Unable to login to FTD using external authentication |
|
Cross-interface-access: ICMP Ping to management access ifc over VPN is broken |
|
logrotate is not compressing files on 9.16 ASA or 7.0 FTD |
|
ASA/FTD may traceback and reload in Thread Name DATAPATH-1-1656 |
|
AnyConnect - mobile devices are not able to connect when hostscan is enabled |
|
Interface remains DOWN in an Inline-set with propagate link state |
|
ndclientd error message 'Local Disk is full' needs to provide mount details which is full |
|
ASA/FTD: From-the-box ping fails when using a custom VRF |
|
ASA/FTD : Degradation for TCP tput on FPR2100 via IPSEC VPN when there is delay between VPN peers |
|
User Group Download fetches less data than available or fails with "Size limit exceeded" error |
|
ASA/FTD may traceback and reload in Thread Name 'pix_flash_config_thread' |
|
ASA/FTD may traceback and reload in Thread Name 'lina' |
|
Default DLY value of port-channel sub interface mismatch with parent Portchannel |
|
ASA: Standby failure on parsing of "management-only" not reported to parser/failover subsystem |
|
health alert for [FSM:STAGE:FAILED]: external aaa server configuration |
|
PortChannel sub-interfaces configured as data/data-sharing, in multi-instance HA go into "waiting" |
|
ASA/FTD may traceback and reload in Thread Name 'lina' |
|
Prune target should account for the allocated memory from the thread pruned |
|
asa_snmp.log is not rotated, resulting in large file size |
|
FTD: 10Gbps/full interfaces changed to 1Gbps/Auto after upgrade and going to down state |
|
ASA/FTD traceback and reload on thread DATAPATH-14-11344 when SIP inspection is enabled |
|
ASA/FTD traceback and reload due citing thread name: cli_xml_server in tm_job_add |
|
Consul and Consul Enterprise allowed an authenticated user with service: |
|
ASA/FTD: Traceback and reload due to high rate of SCTP traffic |
|
Cisco FTD Software SSL/TLS URL Category and Snort 3 Detection Engine Bypass and DOS Vulnerability |
|
FMC UI response is very slow: Add health module monitoring FMC ntpd server(s) accessibility |
|
ASA traceback and reload with process name: cli_xml_request_process |
|
Serial number attribute from the subject DN of certificate should be taken as the username |
|
Firepower Chassis Manager is not accessible with ECDSA certificates |
|
Notification Daemon false alarm of Service Down |
|
CVIM Console getting stuck in "Booting the kernel" page |
|
Username-from-certificate feature cannot extract the email attribute |
|
Unable to Access FMC GUI when using Certificate Authentication |
|
ASA: Standby failure on parsing of "management-only" for dynamic configuraiton changes |
|
Elephant flow detection disabled on FMC, getting enabled on FTD after random deployment |
|
ASA Traceback and reload in parse thread due ha_msg corruption |
|
Snort3 is crashing frequently on cd_pdts.so |
|
FPR31xx - SNMP poll reports incorrect FanTray Status at Down while actually operational |
|
ngfwManager process continuously restarting leading to ZMQ Out of Memory traceback |
|
FTD returns no output of "show elephant-flow status" when efd.lua file's content is empty |
|
KP - multimode: ASA traceback observed during HA node break and rejoin. |
|
FXOS REST API: Unable to create a keyring with type "ecdsa" |
|
Threat-detection does not recognize exception objects with a prefix in IPv6 |
|
ASA/FTD may traceback and reload in Thread Name 'lina'. |
|
Threat-detection does not allow to clear individual IPv6 entries |
|
Cisco ASA and FTD VPN Web Client Services Client-Side Request Smuggling Vulnerability |
|
ASA not updating Timezone despite taking commands |
|
Deployment fails to FTD when reusing/reassigning existing vlan id to diff interface |
|
FTD DHCP Relay drops NACK if multiple DHCP Servers are configured |
|
Connection events incorrectly show OVERSUBSCRIPTION flow message for passive interface traffic |
|
Cisco ASA & FTD SAML Authentication Bypass Vulnerability |
|
ASA/FTD may traceback and reload in Thread Name 'lina' |
|
ASa/FTD: SNMP related traceback and reload immediately after upgrade from 6.6.5 to 7.0.1 |
|
ASA: Configurable CLU for Large amount of under/overruns on CLU RX/TX queues |
|
Observed ASA traceback and reload when performing hitless upgrade while VPN traffic running |
|
ASA/FTD Cluster: Change "cluster replication delay" with max value increase from 15 to 50 sec |
|
Snort3 cores seen in certain conditions with traffic |
|
ASAConfig multiple restarts are leaking 16K memory in every Restart leading to ZMQ Out Of Memory. |
|
Cisco FTD Software Software for Cisco Firepower 2100 Series Inspection Rules DoS Vulnerability |
|
traceback and reload thread datapath on process tcpmod_proxy_continue_bp |
|
Add knob to pause/resume file specific logging in asa log infra. |
|
FTD: Unable to process a TLS1.2 website with TLS Server Identity with client generating SSL Errors |
|
FTD/ASA Hub and spoke (U-turn) VPN fails when one spoke is IPSec flow offloaded and the other isn't |
|
TCP ping is completely broken starting in 9.18.2 |
|
Snort3 Crash in SslServiceDetector after call from nss_passwd_lookup |
|
portmanager.sh outputing continuous bash warnings to log files |
|
ASA/FTD may traceback and reload in Thread Name 'ci/console' |
|
ASA: "Ping <ifc_name> x.x.x.x" is not working as expected starting 9.18.x |
|
3100 unit failed to join the cluster with error "configured object (sys/switch-A/slot-2) not found" |
|
FTD running on FP1000 series might drop packets on TLS flows after the "Client Hello" message. |
|
Readiness check needs to be allowed to run without pausing FMC HA |
|
Setting heartbeat timeout to 6sec for Firepower 4100 and 9300 |
|
ASA running out of SNMP PDU and SNMP VAR chunks |
|
Lina traceback and reload due to fragmented packets |
|
LSP version not updated to latest in LINA Prompt in SSP_CLUSTER with 7.2.4 build. |
|
FPR3100: ASA/FTD High traffic impact on all data interfaces with high counter of "demux drops" |
|
FTD : Traceback in ZMQ running 7.3.0 |
|
TPK 3110 - Firmware version MISMATCH after upgrade to 7.2.4-144 |
|
ASA sends OCSP request without user-agent and host |
|
ASA: After upgrade to 9.16.4 all type-8 passwords are lost on first reboot |
|
FTDv: Traffic failure in VMware Deployments due to dpdk pool exhuastion and rx_buff_alloc_failure |
|
Deployments can cause certain RAVPN users mapping to get removed. |
|
Snort down due to missing lua files because of disabled application detectors (VDB side) |
|
ASA Traceback and reload citing process name 'lina' |
|
getting wrong destination zone on traffic causing traffic to match wrong AC rule |
|
traceback and reload in Process Name: lina related to Nat/Pat |
|
TCP normalizer needs stats that show actions like packet drops |
|
LDAP authentication over SSL not working for users that send large authorisation profiles |
|
Very specific "vpn-idle-timeout" values cause continuous SSL session disconnects and reconnects |
|
ASAv in Hyper-V drops packets on management interface |
|
HA Serviceability Enh: Maintain HA NLP client stats and HA CTL NLP counters for current App-sync |
|
ASDM replaces custom policy-map with default map on class inspect options at backup restore. |
|
FMC deploy logs rotating faster because of /internal_rest_api/accesscontrol/rapplicationsavailable |
|
ASA accepts replayed SAML assertions for RA VPN authentication |
|
Failure to remove snort stat files older than 70 days |
|
ASA/FTD may traceback and reload in Thread Name '19', free block checksum failure |
|
node is leaving TPK cluster due to interface health check failure |
|
ASA may traceback and reload in Thread Name 'DHCPv6 Relay' |
|
ASA/FTD: Traceback on thread name: snmp_master_callback_thread during SNMP and interface changes |
|
DBCheck shouldn't run against MonetDB if user is collecting config backup alone |
|
Correlation rule 'Security Intelligence Category' option is missing DNS and URL values |
|
ASA/FTD : Packet-tracer may displays incorrect ACL rule, though produces correct verdict. |
|
MYSQL, or any TCP high traffic, getting blocked by snort3, with snort-block as Drop-reason |
|
SSH to Chassis allows a 3-way handshake for IPs that are not allowed by the config |
|
Unable to establish BGP when using MD5 authentication over GRE TUNNEL and FTD as passthrough device |
|
Update Configuration State if sync is skipped |
|
crashhandler running with test mode snort |
|
FP2130- Unable to disassociate member from port channel, deployment fails, member is lost on FTD/FMC |
|
ASA/FTD: Connection information in SIP-SDP header remains untranslated with destination static Any |
|
Error loading data in NAT page - When unused port object is used |
|
FTD may fail to create a NAT rule with error: "IPv4 dst real obj address range is huge" |
|
KP: Cleanup/Reformat the second (MSP) disk on FTD reinstall |
|
AC policy change is not reflected in instance page on edit |
|
Inconsistent log messages seen when emblem is configured and buffer logging is set to debug |
|
Snort3 crash found during cleaning up a CHP object |
|
ASA in multi context shows standby device in failed stated even after MIO HB recovery. |
|
ASA integration with umbrella does not work without validation-usage ssl-server. |
|
Add CIMC reset as auto-recovery for CIMC IPMI hung issues |
|
[IMS_7_5_MAIN]High CPU usage on multiple appliances |
|
ASA traceback and reload with the Thread name: **CP Crypto Result Processing** |
|
Firewall may drop packets when routing between global or user VRFs |
|
ASA access-list entries have the same hash after upgrade |
|
[IMS_7_4_0] - Virtual FDM Upgrade fails: HA configStatus='OUT_OF_SYNC after UpgradeOnStandby |
|
FTD: GRE traffic is not being load balanced between CPU cores |
|
ASA: Traceback and reload while updating ACLs on ASA |
|
Cisco Adaptive Security Appliance Software and Firepower Threat Defense DoS |
|
FMC should handle error appropriately when ISE reports error during SXP download |
|
FXOS/SSP: System should provide better visibility of DIMM Correctable error events |
|
Traffic may be impacted if TLS Server Identity probe timeout is too long |
|
ASA/FTD: Traceback and reload with Thread Name 'PTHREAD' |
|
access-list: Cannot mix different types of access lists. |
|
AnyConnect Ikev2 Login Failed With certificate-group-map Configured |
|
Change in syslog message ASA-3-202010 |
|
Firewall rings may get stuck and cause packet loss when asp load-balance per-packet auto is used |
|
ASAv - High latency is experienced on Azure environment for ICMP ping packets while running snmpwalk |
|
Wyoming/SFCN ASA: Wrong values shown DBRG in show crypto ssl objects CLI |
|
WINSCP and SFTP detectors do not work as expected |
|
ASA/FTD client IP missing from TACACS+ request in SSH authentication |
|
Improper load-balancing for traffic on ERSPAN interfaces on FPR 3100/4200 |
|
PSEQ (Power-Sequencer) firmware may not be upgraded with bundled FXOS upgrade |
|
ASA/FTD may traceback and reload citing process name "lina" |
|
Traceback in Thread Name: ssh/client in a clustered setup |
|
Lina crash in thread name: cli_xml_request_process during FTD cluster upgrade |
|
ECMP + NAT for ipsec sessions support request for Firepower. |
|
99.20.1.16 lina crash on nat_remove_policy_from_np |
|
Traceback and reload on Thread DATAPATH-6-21369 and linked to generation of syslog message ID 202010 |
|
Old LSP packages are not pruned causing high disk utilization |
|
Snort3 matches SMTP_RESPONSE_OVERFLOW (IPS rule 124:3) when SMTPS hosts exchange certificates |
|
Remove Priority-queue command from FTD|| Priority-queue command causes silent egress packet drops |
|
Cisco ASA and FTD VPN Web Client Services Client-Side Request Smuggling Vulnerability |
|
VPN load-balancing cluster encryption using deprecated ciphers |
|
ASA/FTD: Traceback and reload when issuing 'show memory webvpn all objects' |
|
DNS cache entry exhaustion leads to traceback |
|
2100 Reload due to internal links going down and NPU disconnection |
|
FXOS SNMP "property community of sys/svc-ext/snmp-svc is out of range" is unclear to users |
|
FTD username with dot fails AAA-RADIUS external authentication login after upgrade |
|
ASA SNMP polling not working and showing "Unable to honour this request now" on show commands |
|
Reduce time taken to clear stale IKEv2 SAs formed after Duplicate Detection |
|
ASA traceback and reload on Thread Name: DHCPRA Monitor |
|
FMC config archives retention reverts to default if ca_purge tool was used prior to 7.2.4 upgrade |
|
vFTD runs out of memory and goes to failed state |
|
ASA Traceback & reload on process name lina due to memory header validation |
|
FXOS Traceback and reload caused by leak on MTS buffer queue |
|
KP2140-HA, reloaded primary unit not able to detect the peer unit |
|
Identity Policy Active auth snort3 redirect hostname doesn't list all FQDN objects\u0009 |
|
FTD/Lina - ZMQ issue OUT OF MEMORY. due to less Msglyr pool memory on certain platforms |
|
FTD: HA App sync failure due to fover interface flap on standby unit |
|
ASA generating traceback with thread-name: DATAPATH-53-18309 after upgrade to 9.16.4.19 |
|
"show route all summary" executed on transparent mode FTD is causing CLISH to become Sluggish. |
|
Cisco ASA/FTD Firepower 2100 SSL/TLS Denial of Service Vulnerability |
|
Failover: standby unit traceback and reload during modifying access-lists |
|
FTDv Single-Arm Proxy behind AWS GWLB drops due to geneve-invalid-udp-checksum. |
|
FTD Diskmanager.log is corrupt causing hm_du module to alert false high disk usage |
|
FTD snmpd process traceback and restart |
|
FTD taking longer than expected to form OSPF adjacencies after a failover switchover |
|
Units get kicked out of the cluster randomly due to HB miss | ASA 9.16.3.220 |
|
The exclude policy to exclude interface status will be removed on FMC after a while |
|
Selecting "All interfaces " under FTD exclude policy for interface status module doesn't work |
|
Firewall Traceback and reload due to SNMP thread |
|
FTD: Traceback and reload during OSPF redistribution process execution |
|
FTD: TLS Server Identity does not work if size of client hello more than TCP MSS bytes |
|
Cisco ASA and FTD ACLs Not Installed upon Reload |
|
FTD Lina engine may traceback, due to assertion, in datapath |
|
Add meaningful logs when the maximums system limit rules are hit |
|
Avoid both the devices in HA sends events to FMC |
|
FTD is dropping GRE traffic from WSA due to NAT failure |
|
Dumping of last 20 rmu request response packets failed |
|
ASA removes the IKEv2 Remote PSK if the Key String ends with a backslash "\" after reload |
|
ASA - The GTP inspection dropped the message 'Delete PDP Context Response' due to an invalid TEID=0 |
|
ASA appliance mode - 'connect fxos [admin]' will get ERROR: failed to open connection. |
|
FMC QoS dashboard does not show QoS rule matched |
|
False critical high CPU alerts for FTD device system cores running instantaneous high usage |
|
ASA: Checkheaps traceback and reload due to Clientless WebVPN |
|
FMC process ssp_snmp_trap_fwdr high memory utilization |
|
azure vftd node traceback while loading multiple network-service objects during ns_reload. |
|
after HA break, selected list shows both the devices when 1 device selected for upgrade |
|
Snort3 core in navl seen during traffic flow |
|
FTD: Firepower 3100 Dynamic Flow Offload showing as Enabled |
|
Policy deployment fails when a route same prefix/metric is configured in a separate VRF. |
|
Excessive logging of ssp-multi-instance-mode messages to /opt/cisco/platform/logs/messages |
|
Editing identity nat rule disables "perform route lookup" silently |
|
FTD: SNMP not working on management interface |
|
Snort2 engine is crashing after enabling TLS Server Identity Discovery feature |
|
Snort core while running IP Flow Statistics |
|
ASA/FTD traceback and reload on thread DATAPATH |
|
Cisco ASA Software and FTD Software SAML Assertion Hijack Vulnerability |
|
Decrypting engine/ssl connections hang with PKI Interface Error seen |
|
WM RM - SFP port status of 9 follows port of state of SFP 10|11|12 |
|
When state-link is flapped HA state changed from Standby-ready to Bulk-sync without failover reason |
|
Switch ports in trunk mode may not pass vlan traffic after power loss or reboot |
|
ASA/FTD: Traceback and reload due to NAT L7 inspection rewrite |
|
CDFMC: VDB version rolling back to old version after performing Disaster Recovery |
|
ASA: ISA3000 does not respond to entPhySensorValue OID SNMP polls |
|
ASA: Traceback and reload on Tread name "fover_FSM_thread" and ha_ntfy_prog_process_timer |
|
Traceback: CdFMC - Edit of network object (network/host/range/fqdn) override throws internal error |
|
HA secondary unit disabled after reboot - Process Manager failed to secure LSP |
|
ECDSA Self-signed certificate using SHA384 for EC521 |
|
ASA|FTD: Traceback & reload due to a free buffer corruption |
|
Some Vault secrets including LDAP missing files after upgrade if the Vault token is corrupted |
|
FTD Lina traceback Thread Name: DATAPATH due to memory corruption |
|
"failover standby config-lock" config is lost after both HA units are reloaded simultaneously |
|
OSPFv3 Traffic is Centralized in Transparent Mode |
|
FPR1k Switchport passing CDP traffic |
|
FMC: ACP Rule with UDP port 6081 is getting removed after subsequent deployment |
|
Management UI presents self-signed cert rather than custom CA signed one after upgrade |
|
Failed to transfer new image file to FPR2130 and traceback was observed |
|
Traceback @<capture_file_show+605 at ../infrastructure/capture/capture_file_finesse.c:282> |
|
FTD /ngfw disk space full from Snort3 url db files |
|
Radius authentication stopped working after ASAv on AWS upgrade to any higher version than 9.18.2 |
|
Do not enable TLS Server Identity Discovery on FTDv deployed with GWLB |
|
Snort crash in active response |
|
ASA Traceback & reload on process name lina due to memory header validation - webvpn side fix |
|
ASDM application randomly exits/terminates with an alert message on multi-context setup |
|
ASA/FTD HA checkheaps crash where memory buffers are corrupted |
|
ASA omits port in host field of HTTP header of OCSP request if non-default port begins with 80 |
|
Interface speed mismatch in SNMP response using OID .1.3.6.1.2.1.2.2 |
|
ASA traceback on Lina process with FREEB and VPN functions |
|
FTDv/AWS - NTP clock offset between Lina and FTD cluster |
|
FPR1010 in HA failed to send or receive to GARP/ARP with error "edsa_rcv: out_drop" |
|
ASA/FTD: Traceback and reload due to NAT change and DVTI in use |
|
ASA/FTD traceback and reload when invoking "show webvpn saml idp" CLI command |
|
Snort blacklisting traffic during deployment |
|
ASA/FTD may traceback and reload in Thread Name "RAND_DRBG_bytes" and CTM function on n5 platforms |
|
Max Detect on Detection is blocking some ping traffic |
|
Incorrect exit interface choose for VTI traffic next-hop |
|
ASA/FTD may traceback and reload in when changing capture buffer size |
|
Lina CiscoSSL upgrade to 1.1.1v and FOM 7.3a |
|
FTD 7.0.4 cluster drops Oracle's sqlnet packets due to tcp-not-syn |
|
Lina crash in snp_fp_tcp_normalizer() when DAQ/Snort sends malformed L3 header |
|
ARP learning issues with Multiple-instance running 100G Netmod |
|
Incorrect Hit count statistics on ASA Cluster only for Cluster-wide output |
|
SNMP is not working on the primary active ASA unit in multi-context environment |
|
Lack of validation of string length creating object/category names using API |
|
Site-to-Site VPN tunnel status on FMC shows down even though it is UP from FTD side |
|
Include "show env tech" in FXOS FPRM troubleshoot |
|
Intermittently flow is getting white-listed by the snort for the unknow app-id traffic. |
|
ASA/FTD Cluster: Reuse of TCP Randomized Sequence number on two different conns with same 5 tuple |
|
FMC fails deployment after removing NAT or ACL rule |
|
741 - HA & AppAgent - Long term solution for avoiding momentary split-brain situations |
|
Logging improvement for messages exchange between LinaConfigTool and xml server |
|
ASA unexpected HA failover due to MIO blade heartbeat failure |
|
ASA traceback when re-configuring access-list |
|
Snort 3 HTTP Intrusion Prevention System Rule Bypass Vulnerability |
|
FXOS: Remove enforcement of blades going into degraded state after multiple DIMM correctable errors |
|
Cisco ASA and FTD Software Remote Access VPN Unauthorized Access Vulnerability |
|
PAC Key file missing on standby on reload |
|
FXOS: Alperton 100G NetMod not being acknowledged properly |
|
ASA software on FP3110 showing incorrect serial number in show inventory output |
|
FTD VMWare: High disk utilization on /dev/sda8 partition caused by file system corruption |
|
SQL packets involved in large query is drop by SNORT3 with reason snort-block |
|
Connections are not cleared after idle timeout when the interfaces are in inline mode. |
|
Chassis Manager shows HTTP 500 Internal Server error in specific cases |
|
Specific OID 1.3.6.1.2.1.25 should not be responding |
|
Firewall Blocking packets after failover due to IP <-> SGT mappings |
|
ASA: Traceback and reload when switching from single to multiple mode |
|
snort3 crashes observed due to memory corruption in file api |
|
ASA/FTD: 1 Second failover delay for each NLP NAT rule |
|
Ping to the configured systemIP on management interface getting failed in cluster setup. |
|
ASA/FTD may traceback and reload in Thread Name 'ssh' when adding SNMPV3 config |
|
FTD - Traceback and reload due to nat rule removed by CPU core |
|
Enhancement for Lina copy operation for startup-config to backup-config.cfg in HA |
|
ASDM management-sessions quota reached due to HTTP sessions stuck in CLOSE_WAIT |
|
FTD not generating end of connection event after "Deleting Firewall session" |
|
Getting an exception on the UI while editing and saving the intrusion policy |
|
Policy deployment failed due to "1 errors seen during populateGlobalSnapshot" |
|
Snort2:Skip writing malware seed file duing process shutdown |
|
FTD responding to UDP500 packet with a Mac Address of 0000.000.000 |
|
ASA "pager line 25" command doesn't work as expected on few terminal applications |
|
Occasionally External auth may not work after HA failover to Active |
|
FTD hosted on KP incorrectly dropping decoded ESP packets if pre-filter action is analyze |
|
ASA traceback due to panic event during SNMP configuration |
|
Large file download failed due to hitting the max segment limit |
|
ASA/FTD: NAT64 error "overlaps with inside standby interface address" for Standalone ASA |
|
Extensive logging for a problematic deployment caused logs to rollover important logs |
|
Cisco_Firepower_GEODB_FMC_Update* are not included in diskmanager |
|
FTD Block 9344 leak due to fragmented GRE traffic over inline-set interface inner-flow processing |
|
Strong Encryption license is not getting applied to ASA firewalls in HA. |
|
FTD/ASA traceback and reload may occur when ssl packet debugs are enabled |
|
ENH - Exempt TSID probe from going through EVE inspection |
|
Cisco ASA and FTD Software Remote Access VPN Unauthorized Access Vulnerability |
|
2100: Interfaces missing from FTD after removing interfaces as members of a port-channel |
|
ASA/FTD may traceback and reload in Thread Name 'dns_cache_timer' |
|
ASA allows same BGP Dynamic routing process for Physical Data and management-only interfaces |
|
FTD: Failover/High Availability disabled with Mate version 0.0 is not compatible |
|
"show aaa-server" command always shows the Average round trip time 0ms. |
|
ASA/FTD may traceback and reload while running show inventory |
|
4200 Series: Portchannel in cluster may stay down sometimes when LACP is in active mode |
|
Message asa_log_client exited 1 time(s) seen multiple times |
|
FMC SSO timesout when user session is active for more than 1 hr (idle timeout) |
|
evaluate open-vm-tools / VMware Tools on FMC for VMware -- CVE-2023-20900 and VMSA-2023-0019 |
|
ASA:Management access via IPSec tunnel is NOT working |
|
The FMC is showing "The password encryption key has not been set" alert for a 11xx/21xx/31xx device |
|
FXOS: svc_sam_dcosAG process getting crashed repeatedly on FirePower 4100 |
|
FMC 4600 v7.2.4 EVE dashboard widget showing corrupt data |
|
After rebooting, the future date set on the FPR2100 platform is not reflected (set clock manually) |
|
Improve CPU utilization in ssl inspection for supported signature algorithm handling |
|
FMC Deployment failure in csm_snapshot_error |
|
ASA does not sent 'warmstart' snmp trap |
|
FMC Deployment failed due to internal errors after upgrade |
|
ASA/FTD traceback and reload with IPSec VPN, possibly involving upgrade |
|
SNORT3 - FTD - TSID high cpu, daq polling when ssl enabled is not pulling enough packets |
|
Source NAT Rule performing incorrect translation due to interface overload |
|
ASA/FTD may traceback and reload in Thread Name 'lina' while processing DAP data |
|
Fragmented UDP packet via MPLS tunnel reassemble fail |
|
NAT pool is not working properly despite is not reaching the 32k object ID limit. |
|
Multicast through the box traffic causing high CPU with 1GBps traffic |
|
FTD Upgrade from 6.6.5 to 7.2.5 removing OGS causing rule expansion on boot |
|
Lina core at snp_nat_xlate_verify_magic.part and soft traces |
|
FTD SNMPv3 host configuration gets deleted from IPTABLES after adding host-group configuration |
|
LINA show tech-support fails to generate as part of sf_troubleshoot.pl (Troubleshoot file) |
|
ASDM can not see log timestamp after enable logging timestamp on cli |
|
Configuring and unconfiguring "match ip address test" may lead to traceback |
|
Firepower WCCP router-id changes randomly when VRFs are configured |
|
FTD: Traceback and Reload in Process Name: lina |
|
Configuration to disable TLS1.3 |
|
Diskmanager process terminated unexpectedly |
|
FTD-HA does not fail over sometimes when snort3 crashes |
|
ASA: Traceback and reload when restore configuration using CLI |
|
WM DT - ASA in transparent mode doesn't send equal IPv6 Router Advertisement packets to all nodes |
|
Timestamp entry missing for some syslog messages sent to syslog server |
|
Community string sent from router is not matching ASA |
|
ASA/FTD may traceback and reload due to watchdog time exceeding the default 15 seconds |
|
Secondary lost failover communication on Inside, using IPv6, but next testing of Inside passes |
|
CSF 4200: PSU Fan speed is critical |
|
FXOS : Duplication of NTP entry results in Error message : Unreachable Or Invalid Ntp Server |
|
Unable to create VRF via FDM in Firepower 3105 device |
|
Coverity 886745: OVERRUN in verify_generic_signature |
|
ASA traceback under match_partial_keyword during CPU profiling |
|
FTD: Mariadb might cause OOM due to not-so-effective memory release algorithm in glibc allocator |
|
Snort3 dropping IP protocol 51 |
|
Upgrade from FMC 7.2.4.1 to 7.2.5 failed at 600_schema/000_install_fmc.sh |
|
Unexpected high values for DAQ outstanding counter |
|
FMC Primary disk degraded error |
|
ASA: Traceback and reload when executing the command "show nat pool detail" on a cluster setup |
|
FTD: The crucial upgrade script should not be bypassed by the Upgrade Retry |
|
ASA/FTD traceback and reload on process fsm_send_config_info_initiator |
|
Snort generating an excessive number of snort-unified log files with zero bytes |
|
[Multi-Instance] Second Hard Drive (FPR-MSP-SSD) not in use |
|
Bulk FTD backups to be generated in batches internally |
|
ASA/FTD HA pair EIGRP routes getting flushed after failover |
|
ASA/FTD: Traceback and reload on thread name CP Crypto Result Processing |
|
High CPU Utilization alerts caused by the process Telegraf |
|
SNMP fails to poll accurate hostname from FMC |
|
VTI tunnel goes down due to route change detected in VRF scenario |
|
Cannot configure Correlation rule because there are no values for GID that exceed 2000 |
|
In FPR4200/FPR3100-cluster observed core file ?core.lina? observed on device reboot. |
|
Disconnecting RA VPN users from the FMC gui fails. |
|
Backup restore: silent failure when the device managed locally |
|
Every HA sync attempts to disable URL filtering if already disabled. |
|
eStreamer JSON parse error and memory leak |
|
FTD: Internal certificate generation results to certificate and private key mismatch |
|
FTD unregisters the standby FMC immediately after a successful registration |
|
FTD installation fails on FPR-2K "Error in App Instance FTD. Available memory not updated by blade" |
|
FTD: Traceback in threadname cli_xml_request_process |
|
Firewall shows misleading SCP file copy failure reasons |
|
crypto_archive file generated after the software upgrade. |
|
Random FTD snort3 traceback |
|
File copy via SCP using ciscossh stack fails with error "no such file or directory" |
|
Last Rule hit shows a hex value ahead of current time in ASA and ASDM |
|
Init process spikes to 100% CPU usage after a failed backup |
|
Unexpected traceback on thread name Lina and device experienced reboot |
|
GTP connections, under certain circumstances do not get cleared on issuing clear conn. |
|
ASA/FTD may traceback and reload in Thread Name 'lina' |
|
Datapath hogs causing clustering units to get kicked out of the cluster |
|
Management DNS Servers may be unreacheable if data interface is used as the gateway |
|
ASA: Traceback and reload during tests of High number of traffic flows and syslog messages |
|
ASA/FTD may traceback and reload in Thread Name 'DATAPATH-34-17852' |
|
FTD VMWare tracebacks at PTHREAD-3587 |
|
SNMP OID ifOutDiscards on MIO are always zero despite show interface are non-zero |
|
ASA/FTD may traceback and reload in Thread Name 'lina' |
|
Connection drops during file transfers due to HeartBeat failures |
|
Thirty-day automatic upgrade revert-info deletion is not resilient to communication failures |
|
FMC clean_revert_backup script fails silently without creating any logs |
|
FTD sends multiple replicated NetFlow records for the same flow event |
|
SSX Eventing continues to go to old tenant upon FTD migration to CDO. |
|
FTD 1120 standby sudden reboot |
|
SNMP Unresponsive when snmp-server host specified |
|
Traceback on FP2140 without any trigger point. |
|
Cross ifc access: Revert PING to old non-cross ifc behavior |
|
Daily Change Reconciliation Report Randomly Generating Reports with the same time periods |
|
FTD upgrade failling on script 999_finish/999_zz_install_bundle.sh |
|
ASA - Traceback the standby device while HA sync ACL-DAP |
|
[ENH] FMC to pull FTD device current SRU version rather than device records for SRU deployed. |
|
FTD HA sync failure due to "CD App Sync error is Failed to apply SSP config on standby" |
|
Certificate Encoding Issue when using AnyConnect cert Authentication/Authorisation |
|
ASA/FTD traceback and reload on thread DATAPATH |
|
SFDataCorrelator logs "Killing MySQL connection" every minute, causing performance problems |
|
FMC backup fails with "Registration Blocking" failure caused by DCCSM issues |
|
Cisco Secure Access: Occasional traffic loss occurring through FWaaS |
|
FTD OSPFV3 IPV6 Routing: FTD is sending unsupported extended LSA request to neighbor routers |
|
ASA cluster traceback Thread Name: DATAPATH-8-17824 |
|
Hardware bypass not working as expected in FP3140 |
|
Source of the VTI interface is getting empty |
|
Config-url is accepting directory as the config file |
|
Node kicked out of cluster while enabling or disabling rule profiling |
|
ASA/FTD - may traceback and reload in Thread Name 'Unicorn Proxy Thread' |
|
ASA traceback and reload during ACL configuration modification |
|
FMC does not generate email health notifications for Database Integrity Check failures. |
|
Capture-traffic Clish command with snort3 not producing a proper resulting capture |
|
Firewall traceback and reload due to SSH thread |
|
FMC-4600: Pre-Filter policy is showing as none |
|
ASA/FTD may traceback and reload in Thread Name 'DATAPATH-13-6022' |
|
FTD/ASA may traceback and reload in PKI, syslog, during upgrade |
|
Fail open snort-down is off in inline pairs despite it being enabled and deployed from FMC |
|
VPN load-balancing cluster encryption using Phase 2 deprecated ciphers |
|
ASA/FTD may traceback and reload in Thread Name 'lina' due to a watchdog in 9.16.3.23 code |
|
ASA/FTD high memory usage due to SNMP caused by RAVPN OID polling |
|
FTD with may traceback in data-path during deployment when enabling TAP mode |
|
FailSafe admin password is not properly sync'd with system context enable pw |
|
ASA: The logical device may boot into failsafe mode because of an large configuration. |
|
ACP rule is deleted when discarding changes, post rule reposition. |
|
Standby manager addition is failed on Primary FMC due to previous entries in table |
|
Stale HA transactions need to be moved to failed and subsequent HA transaction needs to be created |
|
Device/port-channel goes down with a core generated for portmanager |
|
In FIPS mode, External auth with TLS config enabled, CLI logins are not working (FMC & FTDs) |
|
ASA dropping IPSEC traffic incorrectly when "ip verify reverse-path" is configured |
|
ASA : Modifying a route-map in one context affects other contexts |
|
ASA SNMP OID cpmCPUTotalPhysicalIndex returning zero values instead of CPU index values |
|
Stale asp entry for TCP 443 remains on standby after changing default port |
|
FTD: Update WM firmware to 1023.0207 |
|
User assigned to a read only custom role is not able to view content of intrusion policy for snort2 |
|
Log spam in /var/log/messages: Out of range value for column 'map_id' |
|
EIGRP migration failed using 'FlexConfig Policiies' script failed generating database corruption |
|
Cisco FXOS Software Link Layer Discovery Protocol Denial of Service Vulnerability |
|
Error Fetching Data in Exclude Policy Page when non permanent exclude periods are selected |
|
Deployment stuck on FMC when device goes down during deploy and doesn't boot up |
|
OSPF Redistribution route-map with prefix-list not working after upgrade |
|
Alert: Decommission failed, reason: Internal error is not cleared from FCM or CLI after acknowledge |
|
File-extracts.logs are not recognised by the diskmanager leading to high disk space |
|
PSU fan shows critical in show environment output while operating normally |
|
FTD ADI debugs may show incorrect server_group and/or realm_id for SAML-authenticated sessions |
|
ASA/FTD: SSL VPN Second Factor Fields Disappear |
|
Username-from-certificate secondary attribute is not extracted if the first attribute is missing |
|
ipv6 table flush exception when cli_firstboot installs bootstrap configuration multi instance |
|
ASA: Snmpwalk shows "No Such Instance" for the OID ceSensorExtThresholdValue |
|
Unable to SSH into FTD device using External authentication with Radius |
|
tls website decryption breaks with ERR_HTTP2_PROTOCOL_ERROR |
|
TLS1.3: core decode points to tls_trk_try_switch_to_bypass_aux() |
|
use kill tree function in SMA instead of SIGTERM |
|
Detailed logging related to reason behind sub-interface admin state change during operations |
|
ASA/FTD traceback and reload due to file descriptor limit being exceeded |
|
Health Monitor Alerts set in Global are not sending alert from devices assigned in leaf domain |
|
Hostnames are replaced with IP addresses in alert email content |
|
Module name displayed in the alert got changed and it is differ from the one set in FMC |
|
FTD HA should not be created partially on FMC |
|
FDM deployment failure |
|
Policy Apply failed moving from FDM to FMC |
|
Hairpinning of DCE/RPC traffic during the suboptimal lookup |
|
Deployment fails on new AWS FTDv device with "no username admin" |
|
FTD HA Failure after SNORT crash. |
|
ASA/FTD: Traceback and reload when running show tech and under High Memory utilization condition |
|
Umbrella Profile and others cleared incorrectly when editing group policy in the UI |
|
MonetDB startup enhancement to clean up large files |
|
Radius traffic not passing after ASA upgrade 9.18.2 and above version. |
|
installing GeoDB country code package update to FMC does not automatically push updates to FTDs |
|
ASA/FTD may traceback and reload in Thread Name IKEv2 Daemon |
|
Deployment fails if Network Discovery policy reference is missing from FMC Database |
|
ASA traceback and reload on Thread Name: DATAPATH |
|
GTP inspection dropping packets with IE 152 due to header length being invalid for IE type 152 |
|
FMC Validation failure for large object range and success for object network in NAT64 |
|
Incorrect health monitor alerts for ISE-PIC connectivity |
|
low memory/stress causing traceback in SNMP |
|
ISA3000 Traceback and reload boot loop |
|
We should be skipping sru_install during for Minor patch upgrades and install only on required basis |
|
FMC Deployment preview shows different information before and after FTD deploy |
|
Monetdb having 14GB of unknown BAT data causing "High unmanaged disk usage on /Volume" |
|
Snort3 traceback with fqdn traffics |
|
ASA/FTD: DNS Load Balancing with SAML does not work with VPN Load Balancing |
|
ASA/FTD: Cluster incorrectly generating syslog 202010 for invalid packets destined to PAT IP |
|
FTD drops double tagged BPDUs. |
|