Platform
|
Threat defense Version 7.4.0 support.
|
7.4.0
|
You can now manage threat defense devices running Version 7.4.0.
Version 7.4.0 is available only on the Secure Firewall 4200.
You must use a Secure Firewall 4200 for features that require
Version 7.4.0. Support for all other platforms resumes in Version
7.4.1.
|
Secure Firewall
4200.
|
7.4.0
|
|
Performance profile support for
the Secure Firewall 4200.
|
7.4.0
|
The performance profile settings available in the platform
settings policy now apply to the Secure Firewall 4200.
Previously, this feature was supported only on the Firepower
4100/9300 and on threat defense virtual.
See: Configure the Performance
Profile
|
Numbering convention for cloud-delivered Firewall Management
system.
|
Any
|
The cloud-delivered Firewall Management system is a feature of CDO.
For the purposes of troubleshooting, we identify the version number
of the cloud-delivered Firewall Management Center on the FMC
Services page.
See: View Services Page Information.
|
Platform Migration
|
Migrate from Firepower 1000/2100 to
Secure Firewall 3100.
|
Any
|
You can now easily migrate configurations from the Firepower
1000/2100 to the Secure Firewall 3100.
New/modified screens:
Platform restrictions: Migration not supported from the
Firepower 1010 or 1010E.
See: Migrate the Configuration to a new
Model.
|
Migrate devices from Firepower
Management Center 1000/2500/4500 to cloud-delivered Firewall
Management Center.
|
Any
|
You can migrate devices from Firepower Management Center
1000/2500/4500 to cloud-delivered Firewall
Management Center.
To migrate devices, you must temporarily upgrade the
on-prem management center from Version 7.0.3 (7.0.5
recommended) to Version 7.4.0. This temporary upgrade is
required because Version 7.0 management centers do not
support device migration to the cloud. Additionally, only
standalone and high availability threat defense devices
running Version 7.0.3+ (7.0.5 recommended) are eligible for
migration. Cluster migration is not supported at this
time.
Important
|
Version 7.4.0 is only supported on the 1000/2500/4500
during the migration process. You should minimize the
time between management center upgrade and device
migration.
|
To summarize the migration process:
-
Prepare for upgrade and migration. Read, understand,
and meet all the prerequisites outlined in the
release notes, upgrade guides, and migration guide.
Before you upgrade, it is especially important that
the on-prem management center is "ready to go," that
is, managing only the devices you want to migrate,
configuration impact assessed (such as VPN impact),
freshly deployed, fully backed up, all appliances in
good health, and so on.
You should also provision, license, and prepare the
cloud tenant. This must include a strategy for
security event logging; you cannot retain the on-prem management
center for analytics because it will be running an
unsupported version.
-
Upgrade the on-prem management center and all its
managed devices to at least Version 7.0.3 (Version
7.0.5 recommended).
If you are already running the minimum version, you
can skip this step.
-
Upgrade the on-prem management center to Version
7.4.0.
Unzip (but do not untar) the upgrade package before
uploading it to the management center. Download
from: Special Release.
-
Onboard the on-prem management center to CDO.
-
Migrate all devices from the on-prem management
center to the cloud-delivered Firewall
Management Center as described in the migration guide.
When you select devices to migrate, make sure you
choose Delete FTD from On-Prem FMC. Note that
the device is not fully deleted unless you commit
the changes or 14 days pass.
-
Verify migration success.
If the migration does not function to your
expectations, you have 14 days to switch back or it
is committed automatically. However, note that
Version 7.4.0 is unsupported for general operations.
To return the on-prem management center to a
supported version you must remove the re-migrated
devices, re image back to Version 7.0.x, restore
from backup, and reregister the
devices.
See:
If you have questions or need assistance at any point in the
migration process, contact Cisco TAC.
|
S2S VPN support in FTD to cloud migration. Migrate threat defense
devices with VPN policies from on-prem to cloud-delivered Firewall
Management Center.
|
7.0.3-7.0.x
7.2 or later
|
Site-to-site VPN configurations on Secure Firewall Threat Defense
devices are now migrated along with the rest of the configuration
when the device is migrated from the on-prem Firewall Management
Center to the cloud-delivered Firewall Management Center.
See: Migrate On-Prem Management Center managed
Secure Firewall Threat Defense to Cloud-delivered Firewall
Management Center
|
Interfaces
|
Merged management and
diagnostic interfaces.
|
7.4.0
|
Upgrade impact. Merge
interfaces after upgrade.
For new devices using 7.4 and later, you cannot use the
legacy diagnostic interface. Only the merged management
interface is available.
If you upgraded to 7.4 or later and:
-
You did not have any configuration for the diagnostic
interface, then the interfaces will merge
automatically.
-
You have configuration for the diagnostic interface,
then you have the choice to merge the interfaces
manually, or you can continue to use the separate
diagnostic interface. Note that support for the
diagnostic interface will be removed in a later
release, so you should plan to merge the interfaces
as soon as possible.
Merged mode also changes the behavior of AAA traffic to use
the data routing table by default. The management-only
routing table can now only be used if you specify the
management-only interface (including Management) in the
configuration.
For platform settings, this means:
-
You can no longer enable HTTP, ICMP, or SMTP for
diagnostic.
-
For SNMP, you can allow hosts on management instead
of diagnostic.
-
For Syslog servers, you can reach them on management
instead of diagnostic.
-
If Platform Settings for syslog servers or SNMP hosts
specify the diagnostic interface by name, then you
must use separate Platform Settings policies for
merged and non-merged devices.
-
DNS lookups no longer fall back to the
management-only routing table if you do not specify
interfaces.
New/modified screens:
New/modified commands: show management-interface
convergence
See: Merge the Management and Diagnostic
Interfaces
|
VXLAN VTEP IPv6 support.
|
7.4.0
|
You can now specify an IPv6 address for the VXLAN VTEP
interface. IPv6 is not supported for the threat defense
virtual cluster control link or for Geneve
encapsulation.
New/modified screens:
See: Configure Geneve Interfaces
|
Loopback interface support for
BGP and management traffic.
|
7.4.0
|
You can now use loopback interfaces for AAA, BGP, DNS, HTTP,
ICMP, IPsec flow offload, NetFlow, SNMP, SSH, and
syslog.
New/modified screens: Devices
> Device Management > Edit
device > Interfaces >
Add Interfaces >
Loopback Interface
See: Configure Loopback
Interfaces
|
Loopback and management type
interface group objects.
|
7.4.0
|
You can create interface group objects with only
management-only or loopback interfaces. You can use these
groups for management features such as DNS servers, HTTP
access, or SSH. Loopback groups are available for any
feature that can utilize loopback interfaces. However, it's
important to note that DNS does not support management
interfaces.
New/modified screens:
See: Interface
|
High Availability/Scalability
|
Reduced "false failovers" for threat
defense high availability.
|
7.4.0
|
|
SD-WAN
|
Policy-based routing using HTTP path
monitoring.
|
7.2.0
|
Policy-based routing (PBR) can now use the performance
metrics (RTT, jitter, packet-lost, and MOS) collected by
path monitoring through HTTP client on the application
domain rather than the metrics on a specific destination IP.
HTTP-based application monitoring option is enabled by
default for the interface. You can configure a PBR policy
with match ACL having the monitored applications and
interface ordering for path determination.
New/modified screens: Devices >
Device Management > Edit
device > Edit interface > Path
Monitoring > Enable HTTP based
Application Monitoring check box.
Platform restrictions: Not supported for clustered
devices.
See: Configure Path Monitoring
Settings
|
Policy-based routing with user
identity and SGTs.
|
7.4.0
|
You can now classify network traffic based on users, user
groups, and SGTs in PBR policies. Select the identity and
SGT objects while defining the extended ACLs for the PBR
policies.
New/modified screens: Objects >
Object Management >
Access List >
Extended > Add/Edit Extended
Access List > Add/Edit Extended Access List Entry >
Users and Security
Group Tag
See: Configure Extended ACL
Objects
|
VPN
|
IPsec flow
offload on the VTI loopback
interface for the Secure Firewall 4200.
|
7.4.0
|
On the Secure Firewall 4200, qualifying IPsec connections
through the VTI loopback interface are offloaded by default.
Previously, this feature was supported for physical
interfaces on the Secure Firewall
3100.
You can change the configuration using FlexConfig and the
flow-offload-ipsec
command.
Other requirements: FPGA firmware 6.2+
See: IPSec Flow Offload
|
Crypto debugging enhancements for the
Secure Firewall
4200.
|
7.4.0
|
We made the following enhancements to crypto debugging:
-
The crypto archive is now available in text and
binary formats.
-
Additional SSL counters are available for debugging.
-
Remove stuck encrypt rules from the ASP table without
rebooting the device.
New/modified CLI commands: show
counters
|
VPN: Remote Access
|
Customize Secure Client
messages, icons, images, and connect/disconnect
scripts.
|
7.2.0
|
You can now customize Secure Client and deploy these
customizations to the VPN headend. The following are the
supported Secure Client customizations:
Threat defense distributes these customizations to the
endpoint when an end user connects from the Secure
Client.
New/modified screens:
See: Customize Secure Client
|
VPN: Site to Site
|
Easily exempt site-to-site VPN
traffic from NAT translation.
|
Any
|
We now make it easier to exempt site-to-site VPN traffic from
NAT
translation.
New/modified screens:
-
Enable NAT exemptions for an endpoint:
-
View NAT exempt rules for devices that do not have a
NAT policy:
-
View NAT exempt rules for a single device:
See: NAT Exemption
|
Easily view IKE and IPsec session details
for VPN nodes.
|
Any
|
You can view the IKE and IPsec session details of VPN nodes
in a user-friendly format in the Site-to-Site VPN
dashboard.
New/modified screens: Overview >
Site to Site VPN > Under the
Tunnel Status widget, hover over a topology, click
View, and then click the
CLI Details tab.
See: Monitoring the Site-to-Site
VPNs
|
Access Control: Threat Detection and Application
Identification
|
Sensitive data detection and
masking.
|
7.4.0 with Snort 3
|
Upgrade impact. New
rules in default policies take effect.
Sensitive data such as social security numbers, credit card
numbers, emails, and so on may be leaked onto the internet,
intentionally or accidentally. Sensitive data detection is
used to detect and generate events on possible sensitive
data leakage and generates events only if there is a
transfer of significant amount of Personally Identifiable
Information (PII) data. Sensitive data detection can mask
PII in the output of events, using built-in patterns.
Disabling data masking is not supported.
See: Custom Rules in Snort
3
|
Clientless zero-trust access.
|
7.4.0 with Snort 3
|
We introduced Zero Trust Access that allows you to
authenticate and authorize access to protected web based
resources, applications, or data from inside (on-premises)
or outside (remote) the network using an external SAML
Identity Provider (IdP) policy.
The configuration consists of a Zero Trust Application Policy
(ZTAP), Application Group, and Applications.
New/modified screens:
New/modified CLI commands:
-
show running-config zero-trust
application
-
show running-config zero-trust
application-group
-
show zero-trust
sessions
-
show zero-trust
statistics
-
show cluster zero-trust
statistics
-
clear zero-trust sessions
application
-
clear zero-trust sessions
user
-
clear zero-trust
statistics
|
Routing
|
Configure graceful restart
for BGP on IPv6 networks.
|
7.3.0
|
You can now configure BGP graceful restart for IPv6 networks
on managed devices version 7.3 and later.
New/modified screens: Devices >
Device Management > Edit
device > Routing >
BGP >
IPv6 >
Neighbor > Add/Edit Neighbor.
See: Configure BGP Neighbor
Settings
|
Virtual routing with dynamic
VTI.
|
7.4.0
|
You can now configure a virtual router with a dynamic VTI for
a route-based site-to-site VPN.
New/modified screens: Devices >
Device Management > Edit
Device > Routing >
Virtual Router Properties >
Dynamic VTI interfaces under Available
Interfaces
Platform restrictions: Supported only on native mode
standalone or high availability devices. Not supported for
container instances or clustered devices.
See: About Virtual Routers and Dynamic
VTI
|
Access Control: Threat Detection and Application
Identification
|
Encrypted visibility engine
enhancements.
|
7.4.0 with Snort 3
|
Encrypted Visibility Engine (EVE) can now:
-
Block malicious communications in encrypted traffic
based on threat score.
-
Determine client applications based on EVE-detected
processes.
-
Reassemble fragmented Client Hello packets for
detection purposes.
New/modified screens: Use the access control policy's
advanced settings to enable EVE and configure these
settings.
See: Encrypted Visibility Engine
|
Exempt specific networks and ports
from bypassing or throttling elephant flows.
|
7.4.0 with Snort 3
|
You can now exempt specific networks and ports from bypassing
or throttling elephant
flows.
New/modified screens:
-
When you configure elephant flow detection in the
access control policy's advanced settings, if you
enable the Elephant Flow
Remediation option, you can now click
Add Rule and specify
traffic that you want to exempt from bypass or
throttling.
-
When the system detects an elephant flow that is
exempted from bypass or throttling, it generates a
mid-flow connection event with the reason
Elephant Flow Exempted.
Platform restrictions: Not supported on the Firepower 2100
series.
|
Improved JavaScript
inspection.
|
7.4.0 with Snort 3
|
|
Access Control: Identity
|
Cisco Secure Dynamic Attributes
Connector on the management
center.
|
Any
|
|
Event Logging and Analysis
|
Configure threat defense devices as
NetFlow exporters from the management center web
interface.
|
Any
|
NetFlow is a Cisco application that provides statistics on
packets flows. You can now use the management center web
interface to configure threat defense devices as NetFlow
exporters. If you have an existing NetFlow FlexConfig and
redo your configurations in the web interface, you cannot
deploy until you remove the deprecated FlexConfigs.
New/modified screens:
See: Configure NetFlow
|
Health Monitoring
|
New asp drop metrics.
|
7.4.0
|
You can add over 600 new asp (accelerated security path) drop
metrics to a new or existing device health dashboard. Make
sure you choose the ASP Drops metric
group.
New/modified screens: System ()
See: show asp drop Command
Usage
|
Administration
|
Support for IPv6 URLs when
checking certificate revocation.
|
7.4.0
|
|
Store threat defense backup files in a secure remote location.
|
Any
|
When you back up a device, the cloud-delivered Firewall Management
Center stores the backup files in its secure cloud storage.
See: Backup/Restore
|
Usability, Performance, and Troubleshooting
|
Usability enhancements.
|
Any
|
You can now:
-
Manage Smart Licensing for threat defense clusters
from System (). Previously, you had to use the
Device Management page.
See: Licenses for
Clustering
-
Download a report of Message Center notifications. In
the Message Center, click the new
Download Report icon, next
to the Show Notifications
slider.
See: Managing System
Messages.
-
Download a report of all registered devices. On , click the new Download
Device List Report link, at the top
right of the page.
See: Download the Managed Device
List.
-
Easily create custom health monitoring dashboards,
and easily edit existing dashboards.
See: Correlating Device
Metrics
|
Specify the direction of traffic to
be captured with packet capture for the Secure Firewall
4200.
|
7.4.0
|
|
Management Center REST API
|
Cloud-delivered Firewall Management Center REST API.
|
Feature dependent
|
For information on changes to the management center REST API, see
What's New in the API quick start
guide.
|