-
Fixes an issue where the log forwarding profile for Splunk was showing unreachable even though the Splunk endpoint was reachable.
-
Fixes an issue where de-orchestrating an AWS Service VPC would not fully clean up all VPC resources, including the VPC itself.
-
Fixes an issue where all address objects would be displayed when a user is creating or editing a reverse proxy service object.
Only reverse proxy service objects are now being displayed.
-
Fixes an issue where the controller was using an incorrect Project ID when orchestrating a gateway into a GCP shared VPC scenario.
-
Fixes an issue where the list of address objects was not showing in the drop down when creating or modifying a group address
object.
-
Fixes the typeahead search for cloud service provider account in the create gateway workflow.
-
Fixes an issue when adding a rule within the policy rule set to improve the performance and ensure the operation is quick.
-
Fixes an issue where adding an AWS account through the page, formerly known as "Cisco Defense Orchestrator", could result
in a timeout.
-
Fixes the count issue for FQDN match and FQDN filtering objects. The counts were representing both types of objects in each
view.
-
Fixes various advanced search and filter issues.
-
Fixes an issue where deploying a gateway into Azure when Azure has no available capacity would fail deployment and not clean
up the created resources. When Azure has no capacity, it does not inhibit creating a virtual machine and its associated resources.
It creates the VM, but brings up the VM in a failed state with an error message. This scenario needed to be handled in a specific
way to ensure that it is recognized, the proper action is taken to clean up the resources and the user is made aware of the
cloud service provider issue through a system log message.
-
Fixes an issue where the cloud service provider resource and capacity information is not displayed when deploying a gateway
in Azure.
-
Improves the performance of displaying the list of rules in a policy rule set.
-
Fixes an issue where deleting the GCP-based account would not delete all of the inventory objects related to inventory discovery.
-
Addresses an issue with gateway instance per-zone rows that would inhibit a user from removing the first row. This only applies
to scenarios where the gateway is deployed into a user-managed VPC or VNet.
-
Fixes an issue where deploying a gateway into GCP would not orchestrate the egress route into the orchestrated service VPC.
-
Fixes an issue where orchestrating spoke VPC protection could fail.
-
Corrects an issue where the SNI and L7 DOS profiles would not be displayed when editing a reverse proxy service object.
-
Fixes an issue where a UI change operation to the assign public IPs settings could trigger an unnecessary blue/green gateway
replacement.
-
Fixes an issue where orchestrating a gateway into multiple GCP regions could result in a race condition that would inhibit
the gateway from becoming active.
-
Fixes an issue where a new gateway deployment would become immediately inactive due to an internal error.
-
Fixes an issue where a forwarding or forward proxy policy rule set that was created by Terraform would be displayed in the
UI as a reverse proxy rule.
-
Fixes an issue where rules could not be reordered when editing a policy rule set.
-
Fixes an issue where a service object that contained more than 20 rows would be accepted and pushed to the gateway resulting
in a gateway crash. The service object is now limited to 20 rows. This limit validation is performed by both the controller
and gateway.
-
Fixes an issue to ensure the Gateway Details page displays the date modified and data created times.
-
Fixes an issue with proper sorting for views containing objects and profiles that span multiple pages.
-
Improves performance of various object creation pages.
-
Improves the user experience through fixes and enhancements throughout the UI.
-
Ensures the user-specified time setting of local or UTC is honored across views and persists across portal invocations. The
persistence across portal invocations is achieved by storing this setting in the browser cache.
-
Fixes a UI issue where the tooltip information was missing for custom managed Encryption Key gateway configuration.
-
Ensures the controller generates System Log messages when the gateway fails to become active due to cloud service provider
errors.