Firepower Release Notes, Version 6.6.1 and 6.6.3
Firepower Release Notes, Version 6.6.1 and 6.6.3
Firepower Release Notes, Version 6.6.1 and 6.6.3
3
First Published: 2020-09-08
Last Modified: 2021-03-15
Americas Headquarters
Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134-1706
USA
http://www.cisco.com
Tel: 408 526-4000
800 553-NETS (6387)
Fax: 408 527-0883
THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS,
INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND,
EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS.
THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH
THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY,
CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY.
The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB's public domain version of
the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California.
NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS" WITH ALL FAULTS.
CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF
MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE.
IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT
LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS
HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be actual addresses and phone numbers. Any examples, command display output, network
topology diagrams, and other figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses or phone numbers in illustrative content is unintentional
and coincidental.
All printed copies and duplicate soft copies of this document are considered uncontrolled. See the current online version for the latest version.
Cisco has more than 200 offices worldwide. Addresses and phone numbers are listed on the Cisco website at www.cisco.com/go/offices.
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL:
https://www.cisco.com/c/en/us/about/legal/trademarks.html. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a
partnership relationship between Cisco and any other company. (1721R)
© 2020–2021 Cisco Systems, Inc. All rights reserved.
CONTENTS
CHAPTER 2 Compatibility 3
Firepower Management Centers 3
Firepower Devices 4
Manager-Device Compatibility 6
Web Browser Compatibility 7
Screen Resolution Requirements 8
Upgrade Checklist 17
New Guidelines for Version 6.6.x 22
CHAPTER 6 Documentation 53
Documentation Roadmaps 53
Release Dates
For a list of all platforms available with this version, see Compatibility, on page 3.
Sometimes Cisco releases updated builds. In most cases, only the latest build for each platform is available
on the Cisco Support & Download site. We strongly recommend you use the latest build. If you downloaded
an earlier build, do not use it. For more information, see Resolved Issues in New Builds, on page 56.
90 2020-09-08 —
2020-04-06 FMC/FMCv
All devices except Firepower 4112
We recommend you keep the BIOS and RAID controller firmware up to date. For more information, see the
Cisco Firepower Compatibility Guide.
For supported FMCv instances, see the Cisco Firepower Management Center Virtual Getting Started Guide.
Firepower Devices
Cisco Firepower devices monitor network traffic and decide whether to allow or block specific traffic based
on a defined set of security rules. Some Firepower devices run Firepower Threat Defense (FTD) software;
some run NGIPS/ASA FirePOWER software. Some can run either—but not both at the same time.
The following tables list the device platforms supported in this release, along with any (separately upgradeable)
OS/hypervisor requirements. For versions and builds of bundled operating systems, see the Bundled Components
information in the Cisco Firepower Compatibility Guide.
Note These are the supported devices for this release. Even if an older device has reached EOL and you can no
longer upgrade, you can still manage that device with a newer FMC, up to a few versions ahead. Similarly,
newer versions of ASDM can manage older ASA FirePOWER modules. For supported management methods,
including backwards compatibility, see Manager-Device Compatibility, on page 6.
Firepower 4110, 4120, 4140, 4150 FXOS 2.8.1.105 or later build Upgrade FXOS first.
Firepower 4112, 4115, 4125, 4145 To resolve issues, you may need to
upgrade FXOS to the latest build.
Firepower 9300: SM-24, SM-36,
To help you decide, see the Cisco
SM-44 modules
FXOS Release Notes, 2.8(1).
Firepower 9300: SM-40, SM-48,
SM-56 modules
Firepower Threat Defense Virtual Any of: For supported instances, see the
(FTDv) appropriate FTDv Getting Started
• AWS: Amazon Web Services
guide.
• Azure: Microsoft Azure
• KVM: Kernel-based Virtual
Machine
• VMware vSphere/VMware
ESXi 6.0, 6.5, or 6.7
Manager-Device Compatibility
Firepower Management Center
All Firepower devices support remote management with a Firepower Management Center (FMC), which can
manage multiple devices. The FMC must run the same or newer version as its managed devices. You cannot
upgrade a device past the FMC. Even for maintenance (third-digit) releases, you must upgrade the FMC first.
A newer FMC can manage older devices up to a few major versions back, as listed in the following table.
However, we recommend you always update your entire deployment. New features and resolved issues often
require the latest release on both the FMC and its managed devices.
6.5.0 6.2.3
6.4.0 6.1.0
6.3.0 6.1.0
6.2.3 6.1.0
All FTD devices support CDO concurrently with FDM local management. Because FDM is built into FTD,
and because CDO is a cloud-based product, there is no concept of manager-device compatibility in this type
of deployment.
In most cases, newer ASDM versions are backwards compatible with all previous ASA versions. However,
there are some exceptions. For example, ASDM 7.13(1) can manage an ASA 5516-X on ASA 9.10(1). ASDM
7.13(1) and ASDM 7.14(1) did not support ASA 5512-X, 5515-X, 5585-X, and ASASM; you must upgrade
to ASDM 7.13(1.101) or 7.14(1.48) to restore ASDM support. For details, see Cisco ASA Compatibility.
A newer ASA FirePOWER module requires a newer version of ASDM, as listed in the following table.
6.5.0 7.13.1
6.4.0 7.12.1
6.3.0 7.10.1
6.2.3 7.9.2
If you encounter issues with any other browser, or are running an operating system that has reached end of
life, we ask that you switch or upgrade. If you continue to encounter issues, contact Cisco TAC.
Note We do not perform extensive testing on this Firepower version with Apple Safari or Microsoft Edge, nor do
we test Microsoft Internet Explorer with FMC walkthroughs. However, Cisco TAC welcomes feedback on
issues you encounter.
Note that some browser extensions can prevent you from saving values in fields like the certificate and key
in PKI objects. These extensions include, but are not limited to, Grammarly and Whatfix Editor. This happens
because these extensions insert characters (such as HTML) in the fields, which causes the system to see them
invalid. We recommend you disable these extensions while you’re logged into Firepower appliances.
Securing Communications
When you first log in to a Firepower web interface, the system uses a self-signed digital certificate to secure
web communications. Your browser should display an untrusted authority warning, but also should allow you
to add the certificate to the trust store. Although this will allow you to continue to the Firepower web interface,
we do recommend that you replace the self-signed certificate with a certificate signed by a globally known
or internally trusted certificate authority (CA).
To begin replacing the self-signed certificate:
• FMC: Select System > Configuration, then click HTTPS Certificates.
• FDM: Click Device, then the System Settings > Management Access link, then the Management Web
Server tab.
For detailed procedures, see the online help or the configuration guide for your Firepower product.
Interface Resolution
Firepower Management Center 1280 x 720
Interface Resolution
ASDM managing an ASA FirePOWER module 1024 x 768
Note These release notes list the new and deprecated features in this series of maintenance releases, including
upgrade impact. If your upgrade skips versions, see the appropriate Cisco Firepower Release Notes for historical
feature information and upgrade impact.
Note Version 6.6.0/6.6.x is the last release to support the Cisco Firepower User Agent software as an identity source.
You cannot upgrade an FMC with user agent configurations to Version 6.7.0+. You should switch to Cisco
Identity Services Engine/Passive Identity Connector (ISE/ISE-PIC). This will also allow you to take advantage
of features that are not available with the user agent. To convert your license, contact Sales.
For more information, see the End-of-Life and End-of-Support for the Cisco Firepower User Agent
announcement and the Firepower User Identity: Migrating from User Agent to Identity Services Engine
TechNote.
Feature Description
Note that this feature is supported for Firepower appliances running Version
6.6.3+. It is not supported for upgrades to Version 6.6.3, unless you are
upgrading from Version 6.4.0.10 or any later patch.
Appliance Configuration Version 6.6.3 improves device memory management and introduces a new
Resource Utilization health health module: Appliance Configuration Resource Utilization.
module
This health module alerts when the size of your deployed configurations puts
the device at risk of running out of memory. If this happens, re-evaluate your
configurations. Most often you can reduce the number or complexity of access
control rules or intrusion policies. For information on best practices for access
control, see the Firepower Management Center Configuration Guide.
Note To use this health module, you must upgrade both the FMC and its
devices to Version 6.6.3, then reapply health policies to the devices.
Although the upgrade process automatically adds and enables this
health module in all health policies, you must manually apply the
health policy before the module can start working.
This module is not supported in Version 6.7.0. Support will return in later
releases.
Custom intrusion None. In Version 6.6.0, the FMC began rejecting custom (local)
rule import does not intrusion rule imports entirely if there were rule collisions.
fail when rules Version 6.6.1 deprecates this feature, and returns to the
collide pre-Version 6.6.0 behavior of silently skipping the rules that
cause collisions.
Note that a collision occurs when you try to import an intrusion
rule that has the same SID/revision number as an existing rule.
You should always make sure that updated versions of custom
rules have new revision numbers. We recommend you read the
best practices for importing local intrusion rules in the Firepower
Management Center Configuration Guide.
Version 6.7.0 adds a warning for rule collisions in a later release.
Caution In most cases, your existing FlexConfig configurations continue to work post-upgrade and you can still deploy.
However, in some cases, using deprecated commands can cause deployment issues.
About FlexConfig
Some Firepower Threat Defense features are configured using ASA configuration commands. Beginning with
Version 6.2.0 (FMC deployments) or Version 6.2.3 (FDM deployments), you can use Smart CLI or FlexConfig
to manually configure various ASA features that are not otherwise supported in the web interface.
FTD upgrades can add GUI or Smart CLI support for features that you previously configured using FlexConfig.
This can deprecate FlexConfig commands that you are currently using; your configurations are not automatically
converted. After the upgrade, you cannot assign or create FlexConfig objects using the newly deprecated
commands.
After the upgrade, examine your FlexConfig policies and objects. If any contain commands that are now
deprecated, messages indicate the problem. We recommend you redo your configuration. When you are
satisfied with the new configuration, you can delete the problematic FlexConfig objects or commands.
You can also find your Snort version in the Bundled Components section of the Cisco Firepower Compatibility
Guide.
The Snort release notes contain details on new keywords. You can read the release notes on the Snort download
page: https://www.snort.org/downloads.
Note FMC walkthroughs are tested on the Firefox and Chrome browsers. If you encounter issues with a different
browser, we ask that you switch to Firefox or Chrome. If you continue to encounter issues, contact Cisco
TAC.
The following table lists some common problems and solutions. To end a walkthrough at any time, click the
x in the upper right corner.
Problem Solution
Cannot find the How To link to Make sure walkthroughs are enabled. From the drop-down list under
start walkthroughs. your username, select User Preferences then click How-To Settings.
Problem Solution
Walkthrough appears when you do If a walkthrough appears when you do not expect it, end the walkthrough.
not expect it.
Walkthrough is out of sync with the If a walkthrough is out of sync, you can:
FMC:
• Attempt to continue.
• Starts on the wrong step.
For example, if you enter an invalid value in a field and the FMC
• Advances prematurely. displays an error, the walkthrough can prematurely move on. You
may need to go back and resolve the error to complete the task.
• Will not advance.
• End the walkthrough, navigate to a different page, and try again.
Sometimes you cannot continue. For example, if you do not click
Next after you complete a step, you may need to end the
walkthrough.
Note Upgrades to Version 6.2.3 through 6.6.x can enable (or reenable) web analytics tracking. This can occur even
if your current setting is to opt out. If you do not want Cisco to collect this data, opt out after upgrading.
Upgrades to 6.7.0+ respect your current setting.
Upgrade Checklist
This checklist highlights actions that can prevent common upgrade issues. However, we still recommend you
refer to the appropriate upgrade or configuration guide for full instructions: Upgrade Instructions, on page
42.
Important At all times during the process, make sure that the appliances in your deployment are successfully
communicating and that there are no issues reported. Do not deploy changes to or from, manually reboot, or
shut down an upgrading appliance. Do not restart an upgrade in progress. The upgrade process may appear
inactive during prechecks; this is expected. If you encounter issues with the upgrade, including a failed upgrade
or unresponsive appliance, contact Cisco TAC.
Table 11:
✓ Action/Check
Important If your upgrade skips versions, you may also be directed to older release notes or other
resources for historical guidelines and upgrade impact.
✓ Action/Check
Check bandwidth.
Make sure your management network has the bandwidth to perform large data transfers.
In FMC deployments, if you transfer an upgrade package to a managed device at the time of upgrade,
insufficient bandwidth can extend upgrade time or even cause the upgrade to time out. Whenever
possible, copy upgrade packages to managed devices before you initiate the device upgrade.
See Guidelines for Downloading Data from the Firepower Management Center to Managed Devices
(Troubleshooting TechNote).
Upgrade Packages
To upgrade Firepower software, the upgrade package must be on the appliance. Upgrade packages are available
for download on the Cisco Support & Download site.
Table 12:
✓ Action/Check
Backups
The ability to recover from a disaster is an essential part of any system maintenance plan.
Table 13:
✓ Action/Check
Perform backups.
Back up before and after upgrade, when supported:
• Before upgrade: If an upgrade fails catastrophically, you may have to reimage and restore.
Reimaging returns most settings to factory defaults, including the system password. If you have
a recent backup, you can return to normal operations more quickly.
• After upgrade: This creates a snapshot of your freshly upgraded deployment. In FMC deployments,
we recommend you back up the FMC after you upgrade its managed devices, so your new FMC
backup file 'knows' that its devices have been upgraded.
Caution We strongly recommend you back up to a secure remote location and verify transfer success.
Backups left on an appliance may be deleted, either manually or by the upgrade process,
which purges locally stored backups. And especially because backup files are unencrypted,
do not allow unauthorized access. If backup files are modified, the restore process will fail.
Backup and restore can be a complex process. You do not want to skip any steps or ignore security or
licensing concerns. For detailed information on requirements, guidelines, limitations, and best practices
for backup and restore, see the configuration guide for your Firepower product.
Associated Upgrades
Because operating system and hosting environment upgrades can affect traffic flow and inspection, perform
them in a maintenance window.
Table 14:
✓ Action/Check
Final Checks
A set of final checks ensures you are ready to upgrade the Firepower software.
Table 15:
✓ Action/Check
Check configurations.
Make sure you have made any required pre-upgrade configuration changes, and are prepared to make
required post-upgrade configuration changes.
Deploy configurations.
Deploying configurations before you upgrade reduces the chance of failure.
This checklist contains older upgrade guidelines. Review these guidelines if you are currently running Version
6.2.3 through 6.4.0.
Historical Data Removed During FTD with FDM 6.2.3 through 6.5.0+
FTD/FDM Upgrade, on page 24 6.4.0.x
RA VPN Default Setting Change Can FTD with FMC 6.2.0 through 6.3.0+
Block VPN Traffic, on page 31 6.2.3.x
Note As of the Version 6.6.0 release, lower-memory instance types for cloud-based FMCv deployments (AWS,
Azure) are fully deprecated. You cannot create new FMCv instances using them, even for earlier Firepower
versions. You can continue running existing instances.
VMware Allocate 28 GB minimum/32 GB recommended. Power off the virtual machine first.
For instructions, see the VMware
documentation.
KVM Allocate 28 GB minimum/32 GB recommended. For instructions, see the documentation for your
KVM environment.
AWS Resize instances: Stop the instance before you resize. Note that
when you do this, data on the instance store
• From c3.xlarge to c3.4xlarge.
volume is lost, so migrate your instance
• From c3.2.xlarge to c3.4xlarge. store-backed instance first. Additionally, if your
management interface does not have an Elastic
• From c4.xlarge to c4.4xlarge. IP address, its public IP address is released.
• From c4.2xlarge to c4.4xlarge. For instructions, see the documentation on
changing your instance type in the AWS user
We also offer a c5.4xlarge instance for new guide for Linux instances.
deployments.
Azure Resize instances: Use the Azure portal or PowerShell. You do not
need to stop the instance before you resize, but
• From Standard_D3_v2 to
stopping may reveal additional sizes. Resizing
Standard_D4_v2.
restarts a running virtual machine.
For instructions, see the Azure documentation
on resizing a Windows VM.
Cisco Talos Intelligence Group (Talos) has introduced new categories and renamed reputations to classify
and filter URLs. For detailed lists of category changes, see the Cisco Firepower Release Notes, Version 6.5.0.
For descriptions of the new URL categories, see the Talos Intelligence Categories site.
Also new are the concepts of uncategorized and reputationless URLs, although rule configuration options
stay the same:
• Uncategorized URLs can have a Questionable, Neutral, Favorable, or Trusted reputation.
You can filter Uncategorized URLs but you cannot further constrain by reputation. These rules will
match all uncategorized URLs, regardless of reputation.
Note that there is no such thing as an Untrusted rule with no category. Otherwise uncategorized URLs
with an Untrusted reputation are automatically assigned to the new Malicious Sites threat category.
• Reputationless URLs can belong to any category.
You cannot filter reputationless URLs. There is no option in the rule editor for 'no reputation.' However,
you can filter URLs with Any reputation, which includes reputationless URLs. These URLs must also
be constrained by category. There is no utility to an Any/Any rule.
The following table summarizes the changes on upgrade. Although they are designed for minimal impact and
will not prevent post-upgrade deploy for most customers, we strongly recommend you review these release
notes and your current URL filtering configuration. Careful planning and preparation can help you avoid
missteps, as well as reduce the time you spend troubleshooting post-upgrade.
Change Details
Modifies URL rule The upgrade modifies URL rules to use the nearest equivalents in the new category
categories. set, in the following policies:
• Access control
• SSL
• QoS (FMC only)
• Correlation (FMC only)
These changes may create redundant or preempted rules, which can slow
performance. If your configuration includes merged categories, you may
experience minor changes to the URLs that are allowed or blocked.
Renames URL rule The upgrade modifies URL rules to use the new reputation names:
reputations.
1. Untrusted (was High Risk)
2. Questionable (was Suspicious sites)
3. Neutral (was Benign sites with security risks)
4. Favorable (was Benign sites)
5. Trusted (was Well Known)
Change Details
Clears the URL cache. The upgrade clears the URL cache, which contains results that the system
previously looked up in the cloud. Your users may temporarily experience slightly
longer access times for URLs that are not in the local data set.
Labels 'legacy' events. For already-logged events, the upgrade labels any associated URL category and
reputation information as Legacy. These legacy events will age out of the
database over time.
Action Details
Make sure your The system must be able to communicate with the following Cisco resources
appliances can reach after the upgrade:
Talos resources.
• https://regsvc.sco.cisco.com/ — Registration
• https://est.sco.cisco.com/ — Obtain certificates for secure communications
• https://updates-talos.sco.cisco.com/ — Obtain client/server manifests
• http://updates.ironport.com/ — Download database (note: uses port 80)
• https://v3.sds.cisco.com/ — Cloud queries
The cloud query service also uses the following IP address blocks:
• IPv4 cloud queries:
• 146.112.62.0/24
• 146.112.63.0/24
• 146.112.255.0/24
• 146.112.59.0/24
Action Details
Identify potential rule Understand the upcoming changes. Examine your current URL filtering
issues. configuration and determine what post-upgrade actions you will need to take (see
the next section).
Note You may want to modify URL rules that use deprecated categories
now. Otherwise, rules that use them will prevent deploy after the
upgrade.
In FMC deployments, we recommend you generate an access control policy
report, which provides details on the policy's current saved configuration,
including access control rules and rules in subordinate policies (such as SSL).
For each URL rule, you can see the current categories, reputations, and associated
rule actions. On the FMC, choose Policies > Access Control , then click the
report icon ( ) next to the appropriate policy.
Action Details
Remove deprecated categories The upgrade does not modify URL rules that use deprecated categories.
from rules. Required. Rules that use them will prevent deploy.
On the FMC, these rules are marked.
Create or modify rules to include Most of the new categories identify threats. We strongly recommend
the new categories. you use them.
On the FMC, these new categories are not marked after this upgrade,
but Talos may add additional categories in the future. When that happens,
new categories are marked.
Evaluate rules changed as a result Each rule that included any of the affected categories now include all
of merged categories. of the affected categories. If the original categories were associated with
different reputations, the new rule is associated with the broader, more
inclusive reputation. To filter URLs as before, you may have to modify
or delete some configurations; see Guidelines for Rules with Merged
URL Categories, on page 28.
Depending on what changed and how your platform handles rule
warnings, changes may be marked. For example, the FMC marks wholly
redundant and wholly preempted rules, but not rules that have partial
overlap.
Action Details
Evaluate rules changed as a result The upgrade replaces each old, single category in URL rules with all
of split categories. the new categories that map to the old one. This will not change the way
you filter URLs, but you can modify affected rules to take advantage of
the new granularity.
These changes are not marked.
Understand which categories were Although no action is required, you should be aware of these changes.
renamed or are unchanged.
These changes are not marked.
Evaluate how you handle Even though it is now possible to have uncategorized and reputationless
uncategorized and reputationless URLs, you cannot still cannot filter uncategorized URLs by reputation,
URLs. nor can you filter reputationless URLs.
Make sure that rules that filter by the Uncategorized category, or by
Any reputation, will behave as you expect.
Guideline Details
Rule Order Determines When considering rules that include the same category, remember that traffic
Which Rule Matches Traffic matches the first rule in the list that includes the condition.
Categories in the Same Rule Merging categories in a single rule will merge into a single category in the
vs Categories in Different rule. For example, if Category A and Category B are merging to become
Rules Category AB, and you have a rule with both Category A and Category B, then
after merge the rule will have a single Category AB.
Merging categories in different rules will result in separate rules with the same
category in each rule after the merge. For example, if Category A and Category
B are merging to become Category AB, and you have Rule 1 with Category
A and Rule 2 with Category B, then after merge Rule 1 and Rule 2 will each
include Category AB. How you choose to resolve this situation depends on
the rule order, on the actions and reputation levels associated with the rules,
on the other URL categories included in the rule, and on the non-URL
conditions that are included in the rule.
Associated Action If merged categories in different rules were associated with different actions,
then after merge you may have two or more rules with different actions for the
same category.
Guideline Details
Associated Reputation Level If a single rule includes categories that were associated with different reputation
levels before merging, the merged category will be associated with the more
inclusive reputation level. For example, if Category A was associated in a
particular rule with Any reputation and Category B was associated in the
same rule with reputation level 3 - Benign sites with security risks, then after
merge Category AB in that rule will be associated with Any reputation.
Duplicate and Redundant After merge, different rules may have the same category associated with
Categories and Rules different actions and reputation levels.
Redundant rules may not be exact duplicates, but they may no longer match
traffic if another rule earlier in the rule order matches instead. For example, if
you have pre-merge Rule 1 with Category A that applies to Any Reputation,
and Rule 2 with Category B that applies only to Reputation 1-3, then after
merge, both Rule 1 and Rule 2 will have Category AB, but Rule 2 will never
match if Rule 1 is higher in the rule order.
On the FMC, rules with an identical category and reputation will show a
warning. However, these warnings will not indicate rules that include the same
category but a different reputation.
Caution: Consider all conditions in the rule when determining how to resolve
duplicate or redundant categories.
Other URL Categories in a Rules with merged URLs may also include other URL categories. Therefore,
Rule if a particular category is duplicated after merge, you may want to modify
rather than delete these rules.
Non-URL Conditions in a Rules with merged URL categories may also include other rule conditions,
Rule such as application conditions. Therefore, if a particular category is duplicated
after merge, you may want to modify rather than delete these rules.
The examples in the following table use Category A and Category B, now merged into Category AB. In
two-rule examples, Rule 1 comes before Rule 2.
Merged categories Rule 1 includes Category A with Rule 1 includes Category AB with
in different rules Reputation Any. Reputation Any.
have different
Rule 2 includes Category B with Rule 2 includes Category AB with
reputation levels
Reputation 1-3. Reputation 1-3.
Rule 1 will match all traffic for this
category.
Rule 2 will never match traffic, but you
will not see a warning indicator because
the reputations are not identical.
Valid Invalid
Include: 10.0.0.0/8 Include: 10.1.0.0/16
Exclude: 10.1.0.0/16 Exclude: 172.16.0.0/12
Exclude: 10.0.0.0/8
Before Version 6.3.0, you could successfully save a network variable with this type of invalid configuration.
Now, these configurations block deploy with the error: Variable set has invalid excluded
values.
If this happens, identify and edit the incorrectly configured variable set, then redeploy. Note that you may
have to edit network objects and groups referenced by your variable set.
Condition Details
Versions For major upgrades, we test upgrades from all eligible previous major versions.
For patches, we test upgrades from the base version.
Models In most cases, we test on the lowest-end models in each series, and sometimes on
multiple models in a series.
Virtual settings We test with the default settings for memory and resources.
Components Values represent only the time it takes for the Firepower software upgrade script. They
do not include time for:
• Operating system upgrades.
• Transferring upgrade packages.
• Readiness checks.
• VDB and intrusion rule (SRU) updates.
• Deploying configurations.
• Reboots, although reboot time may be provided separately.
Platform Disk Space Disk Space: FMC /var Upgrade Time Reboot Time
ASA 5500-X series with FTD 8.5 GB in /ngfw/var 1.2 GB 20 min 19 min
756 KB in /ngfw
Platform Space on /Volume Space on / Space on FMC Upgrade Time Reboot Time
Device type, deployment type (standalone, high availability, clustered), and interface configurations (passive,
IPS, firewall, and so on) determine the nature of the interruptions. We strongly recommend performing any
upgrade or uninstall in a maintenance window or at a time when any interruption will have the least impact
on your deployment.
Standalone — Dropped.
Upgrade FXOS on the active peer before Dropped until one peer is online.
the standby is finished upgrading.
Upgrade chassis at the same time, so all Dropped until at least one module is online.
modules are down at some point.
Table 30: Traffic Behavior During Firepower Software Upgrade: Standalone FTD Device
Inline set, hardware bypass standby mode: Dropped during the upgrade, while the
Bypass: Standby (6.1+). device is in maintenance mode. Then,
passed without inspection while the device
completes its post-upgrade reboot.
IPS-only interfaces Inline set, Failsafe enabled or disabled Passed without inspection.
(6.0.1–6.1).
A few packets might drop if Failsafe is
disabled and Snort is busy but not down.
Table 32: Traffic Behavior During Firepower Software Upgrade: Standalone FTD Device
IPS-only interfaces Inline set, hardware bypass force-enabled: Passed without inspection until you either
Bypass: Force (Firepower 2100 series, disable hardware bypass, or set it back to
6.3+). standby mode.
Inline set, hardware bypass standby mode: Dropped during the upgrade, while the
Bypass: Standby (Firepower 2100 series, device is in maintenance mode. Then,
6.3+). passed without inspection while the device
completes its post-upgrade reboot.
IPS-only interfaces Inline set, Failsafe enabled or disabled Passed without inspection.
(6.0.1–6.1).
A few packets might drop if Failsafe is
disabled and Snort is busy but not down.
Monitor only (sfr {fail-close}|{fail-open} Egress packet immediately, copy not inspected
monitor-only)
Upgrade Instructions
The release notes do not contain upgrade instructions. After you read the guidelines and warnings in these
release notes, see one of the following documents.
Task Guide
Upgrade Firepower Threat Defense Cisco Firepower Threat Defense Configuration Guide for Firepower
Software with FDM. Device Manager
See the System Management chapter in the guide for the FTD version
you are currently running—not the version you are upgrading to.
Task Guide
Upgrade the ROMMON image on Cisco ASA and Firepower Threat Defense Reimage Guide
the ISA 3000, ASA 5508-X and
See the Upgrade the ROMMON Image section. You should always make
5516-X.
sure you have the latest image.
Upgrade Packages
Upgrade packages are available on the Cisco Support & Download site.
• Firepower Management Center, including FMCv: https://www.cisco.com/go/firepower-software
• Firepower Threat Defense (ISA 3000): https://www.cisco.com/go/isa3000-software
• Firepower Threat Defense (all other models, including FTDv): https://www.cisco.com/go/ftd-software
To find a Firepower software upgrade package, select or search for your Firepower appliance model, then
browse to the Firepower software download page for your current version. Available upgrade packages are
listed along with installation packages, hotfixes, and other applicable downloads.
Tip An FMC with internet access can download Firepower maintenance releases (Version 6.6.x third-digit upgrades)
directly from Cisco, about two weeks after they become available for manual download. Direct download
from Cisco is not supported for:
• Major releases.
• Most patches to Version 6.6 or later.
• In FDM or ASDM deployments.
You use the same upgrade package for all Firepower models in a family or series. Upgrade package file names
reflect the platform, package type (upgrade, patch, hotfix), and Firepower version. Note that maintenance
releases use the upgrade package type.
For example:
• Package: Cisco_Firepower_Mgmt_Center_Upgrade-6.6.0-999.sh.REL.tar
So that Firepower can verify that you are using the correct files, upgrade and hotfix packages are signed
archives. Do not untar signed (.tar) packages.
Note After you upload a signed upgrade package, the GUI can take several minutes to load as the system verifies
the package. To speed up the display, remove packages after you no longer need them.
Platform Package
FMC/FMCv Cisco_Firepower_Mgmt_Center
NGIPSv Cisco_Firepower_NGIPS_Virtual
Note Address licensing concerns before you reimage or switch management. If you are using Cisco Smart Licensing,
you may need to unregister from the Cisco Smart Software Manager (CSSM) to avoid accruing orphan
entitlements. These can prevent you from reregistering.
Change FTD management Use the configure manager CLI command; see Cisco Unregister the device before you switch
from FDM to FMC (local to Firepower Threat Defense Command Reference. management. Reassign its license after you
remote). add it to the FMC.
Change FTD management Use the configure manager CLI command; see Cisco Remove the device from the FMC to
from FMC to FDM (remote Firepower Threat Defense Command Reference. unregister it. Reregister using FDM.
to local).
Exception: The device is running or was upgraded from
Version 6.0.1. In this case, reimage.
Change ASA FirePOWER Start using the other management method. Contact Sales for new Classic licenses.
management between ASA FirePOWER licenses are associated
ASDM and FMC. with a specific manager.
Replace NGIPSv with Reimage. Contact Sales for new Smart licenses.
FTDv.
Uninstall an FTD patch with Reimage. Unregister the device before you reimage.
FDM. Reregister after.
You cannot uninstall patches in FDM deployments.
Return to a previous major Reimage. Do not unregister before you reimage, and
or maintenance release. do not remove devices from the FMC. If
You cannot uninstall major or maintenance upgrades. If
you do, you must unregister again after you
possible, restore from backup.
restore, then re-register.
Instead, revert any licensing changes made
since you took the backup. After the restore
completes, reconfigure licensing. If you
notice licensing conflicts or orphan
entitlements, contact Cisco TAC.
Reimage Checklist
Reimaging returns most settings to factory defaults, including the system password. This checklist highlights
actions that can prevent common reimage issues. However, this checklist is not comprehensive. Refer to the
appropriate installation guide for full instructions: Installation Instructions, on page 50.
Table 40:
✓ Action/Check
For devices, make sure traffic from your location does not have to traverse the device itself to access
the device's management interface. In FMC deployments, you should also able to access the FMC
management interface without traversing the device.
✓ Action/Check
Perform backups.
Back up before reimaging, when supported.
Note that if you are reimaging so that you don't have to upgrade, due to version restrictions you cannot
use a backup to import your old configurations. You must recreate your configurations manually.
Caution We strongly recommend you back up Firepower appliances to a secure remote location and
verify transfer success. Reimaging returns most settings to factory defaults, including the
system password. It deletes any backups left on the appliance. And especially because backup
files are unencrypted, do not allow unauthorized access. If backup files are modified, the
restore process will fail.
Backup and restore can be a complex process. You do not want to skip any steps or ignore security or
licensing concerns. For detailed information on requirements, guidelines, limitations, and best practices
for backup and restore, see the configuration guide for your Firepower product.
If you plan to restore from backup after reimaging, you do not need to remove devices from remote
management.
Note If you need to restore an FMC or FTD device from backup, do not unregister before you reimage, and do not
remove devices from the FMC. Instead, revert any licensing changes made since you took the backup. After
the restore completes, reconfigure licensing. If you notice licensing conflicts or orphan entitlements, contact
Cisco TAC.
Unregistering removes an appliance from your virtual account, unregisters it from the cloud and cloud services,
and releases associated licenses so they can be can be reassigned. When you unregister an appliance, it enters
Enforcement mode. Its current configuration and policies continue to work as-is, but you cannot make or
deploy any changes.
Manually unregister from CSSM before you:
• Reimage a Firepower Management Center that manages FTD devices.
• Shut down the source Firepower Management Center during model migration.
• Reimage a Firepower Threat Defense device that is locally managed by FDM.
• Switch a Firepower Threat Defense device from FDM to FMC management.
Automatically unregister from CSSM when you remove a device from the FMC so you can:
• Reimage an Firepower Threat Defense device that is managed by an FMC.
• Switch a Firepower Threat Defense device from FMC to FDM management.
Note that in these two cases, removing the device from the FMC is what automatically unregisters the device.
You do not have to unregister manually as long as you remove the device from the FMC.
Tip Classic licenses for NGIPS devices are associated with a specific manager (ASDM/FMC), and are not controlled
using CSSM. If you are switching management of a Classic device, or if you are migrating from an NGIPS
deployment to an FTD deployment, contact Sales.
Installation Instructions
The release notes do not contain installation instructions. Instead, see one of the following documents.
Installation packages are available on theCisco Support & Download site.
FMC 1600, 2600, 4600 Cisco Firepower Management Center 1600, 2600, and 4600 Getting Started
Guide
FMC 1000, 2500, 4500 Cisco Firepower Management Center 1000, 2500, and 4500 Getting Started
Guide
FMC 2000, 4000 Cisco Firepower Management Center 750, 1500, 2000, 3500 and 4000 Getting
Started Guide
FMCv and FMCv 300 Cisco Firepower Management Center Virtual Getting Started Guide
Firepower 1000/2100 series Cisco ASA and Firepower Threat Defense Reimage Guide
Cisco FXOS Troubleshooting Guide for the Firepower 1000/2100 Series
Running Firepower Threat Defense
Firepower 4100/9300 chassis Cisco Firepower 4100/9300 FXOS Configuration Guides: Image Management
chapters
Cisco Firepower 4100 Getting Started Guide
Cisco Firepower 9300 Getting Started Guide
ASA 5500-X series Cisco ASA and Firepower Threat Defense Reimage Guide
ISA 3000 Cisco ASA and Firepower Threat Defense Reimage Guide
FTDv: AWS Cisco Firepower Threat Defense Virtual for the AWS Cloud Getting Started
Guide
FTDv: Azure Cisco Firepower Threat Defense Virtual for the Microsoft Azure Cloud Quick
Start Guide
FTDv: KVM Cisco Firepower Threat Defense Virtual for KVM Getting Started Guide
FTDv: VMware Cisco Firepower Threat Defense Virtual for VMware Getting Started Guide
ASA FirePOWER Cisco ASA and Firepower Threat Defense Reimage Guide
ASDM Book 2: Cisco ASA Series Firewall ASDM Configuration Guide:
Managing the ASA FirePOWER Module
Documentation Roadmaps
Documentation roadmaps provide links to currently available and legacy documentation:
• Navigating the Cisco Firepower Documentation
• Navigating the Cisco ASA Series Documentation
• Navigating the Cisco FXOS Documentation
Note Each list is auto-generated once and is not subsequently updated. Depending on how and when a bug was
categorized or updated in our system, it may not appear in the release notes. You should regard the Cisco Bug
Search Tool as the 'source of truth.'
Bug ID Headline
CSCvm82290 ASA core blocks depleted when host unreachable in IRB/TFW configuration
CSCuw51499 TCM doesn't work for ACE addition/removal, ACL object/object-group edits
CSCvt48260 Standby unit traceback at fover_parse and boot loop when detecting Active unit
CSCvt64952 "Show crypto accelerator load-balance detail" has missing and undefined output
Bug ID Headline
CSCvu27868 ASA: Lack of specific syslog messages to external IPv6 logging server after ASA
upgrade
CSCvv49800 ASA/FTD: HA switchover doesn't happen with graceful reboot of firepower chassis
CSCvv58605 ASA traceback and reload in thread:Crypto CA,mem corruption by unvirtualized pki
global table in MTX
CSCvv63412 ASA dropping all traffic with reason "No route to host" when tmatch compilation is
ongoing
CSCvv72466 OSPF network commands go missing in the startup-config after upgrading the ASA
CSCvw22986 Secondary unit stuck in Bulk sync infinitely due to interface of Primary stuck in init
state
CSCvw24556 TCP File transfer (Big File) not properly closed when Flow offload is enabled
CSCvw32518 ASASM traceback and reload after upgrade up to 9.12(4)4 and higher
CSCvw53884 M500IT Model Solid State Drives on ASA5506 may go unresponsive after 3.2 Years
in service
CSCvs68576 Deploy failure when deleting auto nat rule due to double negate
CSCvu95109 KVM/KP FDM upgrade from 6.6 - 6.7.0 failed due to diskspace.
/ngfw/var/cisco/deploy/fdm
Bug ID Headline
CSCvv87495 FMC randomly become unresponsive (no SSH or GUI) - Error 500
CSCvw03229 Device doesn't send malware/connection events after upgrade from 6.4 to 6.6.1
CSCvw85377 URL is not updated in the access policy URL filtering rule
CSCvs13204 ASAv failover traffic on SR-IOV interfaces might be dropped due to interface-down
CSCvt13822 ASA: VTI rejecting IPSec tunnel due to no matching crypto map entry
CSCvt61196 ASA on multicontext mode, deleting a context does not delete the SSH keys.
CSCvu17852 Current connection count is negative on 'show service policy' when connection limit
is set in MPF
CSCvu44135 syslog 710004 not generated when SSH management connection limit exceeded
CSCvu70931 Cluster / aaa-server key missing after "no key config-key" is entered
CSCvu89110 ASA: Block new conns even when the "logging permit-hostdown" is set & TCP syslog
is down
CSCvv09396 Stale VPN routes for L2TP, after the session was terminated
CSCvv15572 ASA traceback observed when "config-url" is entered while creating new context
CSCvv32425 ASA traceback when running show asp table classify domain permit
CSCvv66920 Inner flow: U-turn GRE flows trigger incorrect connection flow creation
CSCvw12100 ASA stale VPN Context seen for site to site and AnyConnect sessions
Bug ID Headline
CSCvw44122 ASA: "class-default" class-map redirecting non-DNS traffic to DNS inspection engine
CSCvw64623 Standby ASA linkdown SNMPtrap sent from standby interface with active IP address
CSCvw98840 ASA: dACL with no IPv6 entries is not applied to v6 traffic after CoA
CSCvx26221 Traceback into snmp at handle_agentx_packet / snmp takes long time to come up on
FP1k and 5508
CSCvt43136 Multiple Cisco Products Snort TCP Fast Open File Policy Bypass Vulnerability
CSCvt48601 Cisco Firepower Manament Center Software Stored Cross-Site Scripting Vulnerability
CSCvt70854 6.6.0-90: [Firepower 1010] Tomcat restarted during SRU update because of out of
memory
CSCvt99020 Cisco Firepower Manament Center Software Stored Cross-Site Scripting Vulnerability
CSCvv26683 "configure high-availability disable" command when executed from CLI causes
exception in next HAJoin
CSCvv45106 CSD does not start on 2100 due to missing csd-service.json file
CSCvv55271 REST API to fetch Audit logs from FMC returns only the first 25 entries with or
without startIndex
CSCvv57476 CSS Styles loading issue in Chrome 85, IE and Edge browsers
CSCvv58604 Reset not sent when traffic matches AC-policy configured with block/reset and SSL
inspection
CSCvv74951 Disable memory cgroups when running the system upgrade scripts
CSCvv92897 System might hit previously missing memcap limits on upgrade to version 6.6.0
CSCvw03256 FMC dashboard shows "No Data" for intrusion table when 'Message' Field is Selected
CSCvw05415 FDM: Edit to object group does not update in S2S VPN match criteria version of object
CSCvg73237 ENH: Configure CAC as an absolute value as well instead of just percentage of total
VPN capacity.
CSCvn12453 Implement debug menu command to show RX ring number a flow is hashed to
Bug ID Headline
CSCvq81410 ASA::Unable to execute any ASA command via http using safari browser.
CSCvs99356 Snort2: on SSP platforms large files download takes time with ssl policy configured
CSCvt11302 On FPR devices when FIPS is enabled cannot create webtype ACLs
CSCvt33785 IPSec SAs are not being created for random VPN peers
CSCvt41357 "no logging permit-hostdown" does not block connections when syslog host is
inaccessible
CSCvu98505 ASA licensed via PLR does not have 'export-controlled functionality enabled' flag set
correctly
CSCvv63208 ASA 5506/5508 - SNMP polling fails following reboot but restores after some time
CSCvw54640 FPR-4150 - ASA traceback and reload with thread name DATAPATH
CSCvx09535 ASA Traceback: CRL check for an Anyconnect client with a revoked certificate triggers
reload
CSCvv22208 In onbox mode, zones.conf didn't roll back when deployment fails
Bug ID Headline
CSCvv67754 Memory calculations are producing incorrect results leading to higher memory usage
in snort.
CSCvq47743 AnyConnect and Management Sessions fail to connect after several weeks
CSCvs85196 ASA SIP connections drop after several consecutive failovers: pinhole timeout/closed
by inspection
CSCvt76688 The syslog message 201008 should include reason of drop when TCP server is down
CSCvt88454 using Clientless portal, there is a character string that does not match the set language
CSCvv10778 Traceback in threadname DATAPATH (5585) or Lina (2100) after upgrade to 9.12.4
CSCvv19230 ASAv Anyconnect users unexpectedly disconnect with reason: Idle Timeout
CSCvv41453 Removing static ipv6 route from management-only route table affects data traffic
CSCvv86861 Observed crash in KP in timer while running VPN, EMIX and SNMP traffic for
overnight.
CSCvw51985 ASA: AnyConnect sessions cannot be resumed due to ipv6 DACL failure
CSCvw53255 FTD/ASA HA: Standby Unit FXOS is still able to forward traffic even after failover
due to traceback
CSCvo57004 Analyze Hit Counts displaying timestamps in UTC instead of the configured user time
zone.
CSCvr02310 Server Hello is dropped when TLS1.3 is the only accepted TLS version with DND
rule
Bug ID Headline
CSCvs47365 Event rate seen on FMC slows down or stops coming from devices using FXOS 2.9.1
update
CSCvt61370 Events may stop coming from a device due to a communication deadlock
CSCvu30756 User Identity does not correctly handle identical sessions in different netmaps
CSCvu33591 FPWR 4100 - Snort down due to corrupt files under /var/sf/fwcfg/
CSCvu35768 After upgrade FMC from 6409-59 to 6.6.0-90 unable to log UI using Radius external
user in subdomain.
CSCvv04441 ngfw.rules mismatch between Primary and Secondary FTD HA when RA-VPN is
configured before upgrade
CSCvv19573 Deployment is failed when an interface associated in static route update with
management-only
CSCvv21045 Database may stop accepting new connections causing event processing to stop
CSCvw07352 SFDataCorrelator log spam, metadata fails after Sybase connection status 0
CSCvu71324 ASA: Automatic DENY rule applied in multiple contexts due to the use of the
dhcp-network-scope
CSCvv14621 Reword the error message displayed in case of command replication timeout in cluster
CSCvv43885 'show sctp' command is unavailable when carrier license is out of compliance
CSCvv62305 ASA traceback and reload in fover_parse when attempting to join the failover pair.
CSCvv88017 ASA: EasyVPN HW Client triggers duplicate phase 2 rekey causing disconnections
across the tunnel
CSCvw26171 ASA syslog traceback while strncpy NULL string passed from SSL library
CSCvw63862 ASA: Random L2TP users cannot access resources due to stale ACL filter entries
CSCvw97821 ASA: VPN traffic does not pass if no dACL is provided in CoA
Bug ID Headline
CSCvt72683 NAT policy configuration after NAT policy deployment on FP 8130 is not seen
CSCvu93834 FDM/FTD-API: Password cannot be changed on standby for the admin user
CSCvw21628 Upgrade from pre-6.6.x to 6.6.x and above breaks Intrusion Event Packet-Drill down
CSCvw28894 SFDataCorrelator slow startup and vuln remap due to duplicate entries in vuln tables
CSCvw83498 FTD-API: LDAP Attribute map not handlign ldapValue including a space
CSCvr85295 Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software
Remote
CSCvs72450 FXOS - Recover hwclock of service module from corruption due to simultaneous write
collision
CSCvs72378 ASDM session being abruptly terminated when switching between different contexts
CSCvt18199 IPv6 Nat rejected with error "overlaps with inside standby interface address" for
Standalone ASA
CSCvu82738 The drop rate in show interface for inline sets is incorrect
CSCvu83389 ASA drops GTPV1 Forward relocation Request message with Null TEID
CSCvu84066 bfd map source address with /32 mask is not working
CSCvv34140 ASA IKEv2 VTI - Failed to request SPI from CTM as responder
Bug ID Headline
CSCvt26530 FTD failed over due to 'Inspection engine in other unit has failed due to snort failure'
CSCvv04023 FDM (On box manager)Traffic not hit in the proper rule because interface is removed
from zones.conf
CSCvv08244 Firepower module may block trusted HTTPS connections matching 'Do not decrypt'
SSL decryption rule
CSCvv73540 Create a monitor to drop file cache once it exceeds a certain limit
CSCvw38810 FTD in AWS: Disk Manager process does not start after upgrade to 6.6.1
CSCvv31629 Intermittently embedded ping reply over GRE drops on FTD cluster if traffic passes
asymmetrically.
CSCvp47536 AAA requests on FTD not following V-routes learned from RRI
CSCvt27585 Observed traceback on 2100 while performing Failover Switch from Standby.
CSCvv90720 ASA/FTD: Mac address-table flap seen on connected switch after a HA switchover
CSCvv94701 ASA keeps reloading with "octnic_hm_thread". After the reload, it takes very long
time to recover.
CSCvw00161 ASA traceback and reload due to VPN thread on firepower 2140
CSCvw12008 ASA traceback and reload while executing "show tech-support" command
Bug ID Headline
CSCvw21844 FTD traceback and reload on DATAPATH thread when processing encapsulated flows
CSCvw37259 VPN syslogs are generated at a rate of 600/s until device goes into a hang state
CSCvx09248 SNMP walk for v2 and v3 fails with No Such Object available on this agent at this
OID is seen
CSCvt29771 invalid Response message when we change the security zone from the object
management page
CSCvt89183 FDM unable to load CA signed certificate via Management Web Server
CSCvu75315 Report does not show intrusion events on bar and pie charts after upgrade to 6.6.0
CSCvv40316 FDM - Unable to add the BGP 11th neighbor using smart CLI routing object
CSCvx09324 Config Import fails when named/unnamed SubInterface inside the unnamed
Etherchannel interface
CSCvt73407 TACACS Fallback authorization fails for Username enable_15 on ASA device.
CSCvu29660 Block exhaustion snapshot not created when available blocks goes to zero
CSCvv36725 ASA logging rate-limit 1 5 message ... limits to 1 message in 10 seconds instead of 5
CSCvw47321 IPSec transport mode traffic corruption for inbound traffic for some FPR platforms
CSCvw53427 ASA Fails to process HTTP POST with SAML assertion containing multiple query
parameters
Bug ID Headline
CSCvu63397 Integer overflow (in FileExtract Health Alert) causes log spam "file capture perf stats"
CSCvu82272 Upgrade on Firepower Management Center may fail due to inactive stale entries of
managed devices
CSCvu85421 deployment failure with the message: no crypto map s2sCryptoMap interface inside
CSCvv59676 Snort2: Implement aggressive pruning for certificate cache for TLS to free up memory
CSCvv23370 Observed traceback in FPR2130 while running webVPN, SNMP related traffic.
CSCvv54831 ASA traceback and reload when running Packet Tracer commands
CSCvt15163 Cisco ASA and FTD Software Web Services Information Disclosure Vulnerability
CSCvu48886 FTD deployment failure when removing non-default "crypto ikev2 limit
max-in-negotiation-sa"
CSCvv25394 After upgrade ASA swapped names for disks, disk0 became disk1 and vice versa.
CSCvw16619 Offloaded traffic not failed over to secondary route in ECMP setup
CSCvw31569 Director/Backup flows are left behind and traffic related to this flow is blackholed
Bug ID Headline
CSCvv43864 Preview change log is blank when changes are made to the policy
CSCvv62931 FTD does not send Server Hello & Server Certificate to the client when
src.port==dst.port
CSCvw23286 High CPU usage my Mysql on FMC due to database optimizer exiting prematurely
CSCvx01381 FMC GUI year drop-down list for Manual Time set up only listing until 2020
CSCvu43827 ASA & FTD Cluster unit traceback in thread Name "cluster config sync" or
"fover_FSM_thread"
CSCvu48285 ASA configured with TACACS REST API: /cli api fail with "Command authorization
failed" message
CSCvv02245 ASA 'session sfr' command disconnects from FirePOWER module for initial setup
CSCvv34003 snmpwalk for OID 1.3.6.1.2.1.47.1.1.1.1.5 on ISA 3000 returning value of 0 for .16
and .17
CSCvv57842 WebSSL clientless user accounts being locked out on 1st bad password
CSCvs07922 Active ASA generates logging messages with incorrect IP for WebVPN with IPv6
CSCvs81763 vFTD not able to pass vlan tagged traffic (trunk mode)
CSCvt56923 FTD manual certificate enrollment fails with "&" (ampersand) in Organisation subject
field
CSCvt70664 ASA: acct-session-time accounting attribute missing from Radius Acct-Requests for
AnyConnect
Bug ID Headline
CSCvt70879 "clear configure access-list" on ACL used for vpn-filter breaks access to resources
CSCvt89790 Setting "snmp-server location" sets same value for "snmp-server contact" as well on
ASA 9.14.1
CSCvt97205 SNMPPOLL/SNMPTRAP to remote end (site-to-site vpn) ASA interface fails on ASA
9.14.1
CSCvt99137 With huge FTP traffic in cluster, the SEC_FLOW messages are in a retransmit loop
CSCvu40834 Fix merge damage for calendar update on native SSP platforms
CSCvu98222 FTD Lina engine may traceback in datapath after enabling SSL decryption policy
CSCvu98468 SDI: SDI File doesn't get synced to the standby if new device joins in Failover
CSCvv37629 Malformed SIP packets leads to 4k block hold-up till SIP conn timeout causing probable
traffic issue
CSCvv53696 ASA/FTD traceback and reload during AAA or CoA task of Anyconnect user
CSCvv87496 ASA cluster members 2048 block depletion due to "VPN packet redirect on peer"
CSCvw30252 ASA/FTD may traceback and reload due to memory corruption in SNMP
CSCvx09123 M500IT Model Solid State Drives on ISA3000 may go unresponsive after 3.2 Years
in service
CSCvx17785 Crash seen consistently by adding/removing acl & entering into route-map command
CSCvv55066 FPR1010: Internal-Data0/0 and data interfaces are flapping during SMB file transfer
CSCvs71969 Multiple Cisco Products Snort HTTP Detection Engine File Policy Bypass Vulnerability
Bug ID Headline
CSCvb92169 ASA should provide better fragment-related logs and ASP drop reasons
CSCvn64647 ASA traceback and reload due to tcp_retrans_timeout internal thread handling
CSCvn82441 [SXP] Issue with establishing SXP connection between ASA on FPR-2110 and switches
CSCvn93683 ASA: cluster exec show commands not show all output
CSCvq87625 ENH: Addition of 'show run all sysopt' to 'show tech' output
CSCvr02080 CPU Hogs observed in CERT API process while decoding the CRL with large number
of entries in it
CSCvr15503 ASA: SSH and ASDM sessions stuck in CLOSE_WAIT causing lack of MGMT for
the ASA
CSCvr57051 Policy deployment failed with error "Can't use an undefined value as a HASH reference
"
CSCvr58411 RRI on static HUB/SPOKE config is not working on HUB when a new static SPOKE
is added or deleted
CSCvr60195 ASA/FTD may traceback and reload in Thread Name 'HTTP Cli Exec'
CSCvr99642 ASA traceback and reload multiple times with trace "webvpn_periodic_signal"
CSCvs09533 FP2100: Traceback and reload when processing traffic through more than two inline
sets
CSCvs21705 admin user is not authorized to access the device routing configuration inside the
domain.
CSCvs39253 Firepower 7000 & 8000 cannot sent emails on version 6.4
CSCvs41883 Deployment fails after upgrading to 6.4.0.x if ND policy refs are missing
CSCvs59056 ASA/FTD Tunneled Static Routes are Ignored by Suboptimal Lookup if Float-Conn
is Enabled
CSCvs64510 Deployment failure with message (Can't call method "binip" on unblessed reference)
CSCvs73754 ASA/FTD: Block 256 size depletion caused by ARP of BVI not assigned to any physical
interface
CSCvs82829 Calls fail once anyconnect configuration is added to the site to site VPN tunnel
CSCvs90100 ASA/FTD may traceback and reload in Thread Name 'License Thread'
CSCvs94061 NTP script error leading to clock drift and traffic interruption
CSCvs97863 Reduce number of fsync calls during close in flash file system
CSCvt00113 ASA/FTD traceback and reload due to memory leak in SNMP community string
CSCvt01397 Deployment is marked as success although LINA config was not pushed
CSCvt03598 Cisco ASA Software and FTD Software Web Services Read-Only Path Traversal
Vulnerability
CSCvt05862 IPv6 DNS server resolution fails when the server is reachable over the management
interface.
CSCvt06606 Flow offload not working with combination of FTD 6.2(3.10) and FXOS 2.6(1.169)
CSCvt06841 Incorrect access-list hitcount seen when configuring it with a capture on ASA
CSCvt13730 FP1010 / 2100 - FTD: Management port down/down after FTD upgrade to release
6.6.0
CSCvt15062 FTD 2100: Packet drops during the transition of BYPASS to NON-BYPASS when
device is rebooted
CSCvt16642 FMC not sending some audit messages to remote syslog server
CSCvt20709 Wrong direction in SSL-injected RESET causes it to exit through wrong interface,
causing MAC flap
CSCvt23643 VPN failover recovery is taking approx. 30 seconds for data to resume
CSCvt30731 WR6, WR8 and LTS18 commit id update in CCM layer(sprint 80)
CSCvt35233 Excessive logging from the daq modules process_snort_verdict verdict blacklist
CSCvt35945 Encryption-3DES-AES should not be required when enabling ssh version 2 on 9.8
train
CSCvt39135 snort instances CPU spikes to >90% at low non-SSL traffic with SSL policy applied
CSCvt41333 Dynamic RRI route is not destroyed when IKEv2 tunnel goes down
CSCvt43967 Pad packets received from RA tunnel which are less than or equal 46 bytes in length
with zeros
CSCvt45206 Event search may fail when searching events that existed before upgrade
CSCvt45863 Crypto ring stalls when the length in the ip header doesn't match the packet length
CSCvt46830 FPR2100 'show crypto accelerator statistics' counters do not track symmetric crypto
CSCvt50528 Warning Message for default settings with Installation of Certificates in ASA/FTD -
CLI
CSCvt50946 Stuck uauth entry rejects AnyConnect user connections despite fix of CSCvi42008
CSCvt51348 PKI-CRL: Memory Leak on Download Large CRL in loop without clearing it
CSCvt51349 Fragmented packets forwarded to fragment owner are not visible on data interface
captures
CSCvt51987 Traffic outage due to 80 size block exhaustion on the ASA FPR9300 SM56
CSCvt52607 Reduce SSL HW mode flow table memory usage to reduce the probability of Snort
going in D state
CSCvt53640 ASA5585 traceback and reload after upgrading SFR from 6.4.0 to 6.4.0.9-34
CSCvt54182 LINA cores are generated when FTD is configured to do SSL decryption.
CSCvt59770 FTD: Failure to retrieve certificate via SCEP will cause outage
CSCvt61370 Events may stop coming from a device due to a communication deadlock
CSCvt64035 remote acess mib - SNMP 64 bit only reporting 4Gb before wrapping around
CSCvt64270 ASA is sending failover interface check control packets with a wrong destination mac
address
CSCvt64822 ASA may traceback and unexpectedly reload after SSL handshake
CSCvt65982 Route Fallback doesn't happen on Slave unit, upon RRI route removal.
CSCvt68131 FTD traceback and reload on thread "IKEv2 Mgd Timer Thread"
CSCvt68819 Copy to clipboard may fail when copying events that existed before upgrade
CSCvt73806 FTD traceback and reload on FP2120 LINA Active Box. VPN
CSCvt75241 Redistribution of VPN advertised static routes fail after reloading the FTD on FPR2100
CSCvt79988 Policy deployment failure due to snmp configuration after upgrading FMC to 6.6
CSCvt80126 ASA traceback and reload for the CLI "show asp table socket 18421590 det"
CSCvt83133 Unable to access anyconnect webvpn portal from google chrome using group-url
CSCvt91258 FDM: None of the NTP Servers can be reached - Using Data interfaces as Management
Gateway
CSCvt92647 Connectivity over the state link configured with IPv6 addresses is lost after upgrading
the ASA
CSCvt93142 ASA should allow null sequence encoding in certificates for client authentication.
CSCvt93177 Disable Full Proxy to Light Weight Proxy by Default. (FP2LWP) on FTD Devices
CSCvt97917 ASAv on AWS 9.13.1.7 BYOL image cannot be enabled for PLR
CSCvt98599 IKEv2 Call Admission Statistics "Active SAs" counter out of sync with the real number
of sessions
CSCvu00112 tsd0 not reset when ssh quota limit is hit in ci_cons_shell
CSCvu01039 Traceback: Modifying FTD inline-set tap-mode configuration with active traffic
CSCvu03562 Device loses ssh connectivity when username and password is entered
CSCvu03675 FPR2100: ASA console may hang & become unresponsive in low memory conditions
CSCvu05180 aaa-server configuration missing on the FTD after a Remote Access VPN policy
deployment
CSCvu05216 cert map to specify CRL CDP Override does not allow backup entries
CSCvu07602 FPR-41x5: 'clear crypto accelerator load-balance' will cause a traceback and reload
CSCvu07880 ASA on QP platforms display wrong coredump filesystem space (50 GB)
CSCvu08013 DTLS v1.2 and AES-GCM cipher when used drops a particular size packet frequently.
CSCvu09199 Push upgrade image is taking 30 mins for 6.6.0 ftd image on 6.7.0 FMC
CSCvu12039 Slave unit might fail to synchronize SCTP configuration from the cluster master after
bootup
CSCvu12248 ASA-FPWR 1010 traceback and reload when users connect using AnyConnect VPN
CSCvu12307 FTD-HA: "ERROR: The specified AnyConnect Client image does not exist."
CSCvu13287 FDM unable to import certificate with no subject or issuer - fails upgrade as well
CSCvu15611 FTD-HA: Standby failed to join HA "CD App Sync error is App Config Apply Failed"
CSCvu17965 ASA generated a traceback and reloaded when changing the port value of a manual
nat rule
CSCvu18510 MonetDB's eventdb crash causes loss of connection events on FMC 6.6.0
CSCvu20257 WR6, WR8 and LTS18 commit id update in CCM layer (sprint 85)
CSCvu26296 ASA interface ACL dropping snmp control-plane traffic from ASA
CSCvu26561 WebVPN SSO Gives Unexpected Results when Integrated with Kerberos
CSCvu29145 Snort flow IP profiling cannot be enabled using command 'system support
flow-ip-profiling start'
CSCvu29395 Traceback observed while performing master role change with active IGMP joins
CSCvu30512 PKI-CRL: Traceback observed while clearing CRL with memory tracking enabled
CSCvu32698 ASA Crashes in SNMP while joining the cluster when key config-key
password-encryption" is present
CSCvu36539 Upgrade will fail if a smart licensed device is upgraded from 6.2.2 -> 6.4.0 -> 6.6.0.
CSCvu37547 Memory leak: due to resource-limit MIB handler, eventually causing reload
CSCvu38795 FTD firewall unit cannot join the cluster after a traceback due to invalid interface
GOID entry
CSCvu40324 ASA traceback and reload with Flow lookup calling traceback
CSCvu40398 ASAv reload due to FIPS SELF-TEST FAILURE after enabling FIPS
CSCvu40531 FXOS LACP packet logging to pktmgr.out and lacp.out fills up /opt/cisco/platform/logs
to 100%
CSCvu42434 ASA: High CPU due to stuck running SSH sessions / Unable to SSH to ASA
CSCvu49625 [PKI] Standard Based IKEv2 Certificate Auth session does second userfromcert lookup
unnecessarily
CSCvu55843 ASA traceback after TACACS authorized user made configuration changes
CSCvu60011 FTD: Snort policy changes deployed to a HA on failed state are not fully synced
CSCvu63458 FPR2100: Show crash output on show tech does not display outputs from most recent
tracebacks
CSCvu65070 Lina 9.14: Improve debug snmp framework to use agentx and avoid SIGHUP
CSCvu65688 IKEv2 CAC "Active SAs" counter out of sync with the real number of sessions despite
CSCvt98599
CSCvu65843 FP2100: Fiber SFP Interfaces down due to autonegotiation changes in 6.6.0
CSCvu66119 URL rules are incorrectly promoted on series 3 resulting in traffic matching the wrong
rule.
CSCvu70529 Binary rules (SO rules) are not loaded when snort reloads
CSCvu72278 In nghttp2 before version 1.41.0, the overly large HTTP/2 SETTINGS fra
CSCvu72658 AnyConnect Connected Client IPs Not Advertised into OSPF Intermittently
CSCvu73207 DSCP values not preserved in DTLS packets towards AnyConnect users
CSCvu75594 FTD: Traceback and reload when changing capture buffer options on a already applied
capture
CSCvu75930 Service module not returning error to supervisor when SMA resources are depleted
CSCvu75993 Transparent Traffic doesn't pass on FTDv deployed in KVM (Routed mode)
CSCvu77095 ASA unable to delete ACEs with remarks and display error "Specified remark does
not exist"
CSCvu83178 EIGRP summary route not being replicated to standby and causing outage after
switchover
CSCvu90727 Native VPN client with EAP-TLS authentication fails to connect to ASA
CSCvu91105 High unmanaged disk usage on /ngfw due to large process_stdout.log file
CSCvu98197 HTTPS connections matching 'Do not decrypt' SSL decryption rule may be blocked
CSCvv03130 'show banner' command on FTD clish does not return any output
CSCvv09944 Lina Traceback during FTD deployment when WCCP config is being pushed
CSCvv10948 FDM upgrade - There are no visible pending changes on UI -- but upgrade is not
starting
CSCvv12273 SNMP get-response using snmpget with multiple OIDs on hardwareStatus MIB returns
noSuchObject
CSCvv12943 Threat data is missing GID:SID fields in FDM 6.5+ versions, it was present in 6.4
(CDO Impacting)
CSCvv12988 tomcat does not recover gracefully after getting killed during backup
CSCvv14442 FMC backup restore fails if it contains files/directories with future timestamps
CSCvv21782 6.6.1: Prefilter Policy value shown as Invalid ID for all the traffic in ASA SFR Platform
CSCvv27750 High unmanaged disk usage on /ngfw due to logs not rotating
CSCvv29275 FMC OSPF area limits until 49 entries. Upon adding 50th entry, process gets disabled
automatically
CSCvv31334 Lina traceback and reload seen on trying to Switch peer on KP HA with 6.6.1-63 (lock
nested crash)
CSCvv33013 FDM: Unable to add the secret key with the character ^ @ _
These general queries display open bugs for Firepower products running Version 6.6.x maintenance releases:
• Firepower Management Center
• Firepower Management Center Virtual
• Firepower Threat Defense
• Firepower Threat Defense Virtual
• ASA with FirePOWER Services
• NGIPSv
Access to most tools on the Cisco Support & Download site requires a Cisco.com user ID and password.
Contact Cisco
If you cannot resolve an issue using the online resources listed above, contact Cisco TAC:
• Email Cisco TAC: [email protected]
• Call Cisco TAC (North America): 1.408.526.7209 or 1.800.553.2447
• Call Cisco TAC (worldwide): Cisco Worldwide Support Contacts