Features for Firepower Management Center Deployments
Note |
Version 6.6.0/6.6.x is the last release to support the Cisco Firepower User Agent software as an identity source. You cannot upgrade a Firepower Management Center with user agent configurations to Version 6.7.0+. You should switch to Cisco Identity Services Engine/Passive Identity Connector (ISE/ISE-PIC). This will also allow you to take advantage of features that are not available with the user agent. To convert your license, contact your Cisco representative or partner contact. For more information, see the End-of-Life and End-of-Support for the Cisco Firepower User Agent announcement and the Firepower User Identity: Migrating from User Agent to Identity Services Engine TechNote. |
New Features in FMC Version 6.3.0
Feature |
Description |
||
---|---|---|---|
Hardware |
|||
FMC models FMC 1600, 2600, and 4600 |
We introduced the Firepower Management Center models FMC 1600, 2600, and 4600. |
||
ISA 3000 with FirePOWER Services |
ISA 3000 with FirePOWER Services is supported in Version 6.3.0 (Protection license only). Although ISA 3000 with FirePOWER Services was also supported in Version 5.4.x, you cannot upgrade to Version 6.3.0. You must reimage. |
||
Firepower Threat Defense: Device Management |
|||
Hardware bypass support on the Firepower 2100 series for supported network modules |
Firepower 2100 series devices now support hardware bypass functionality when using the hardware bypass network modules. New/modified pages: Supported platforms: Firepower 2100 series |
||
Support for data EtherChannels in On mode |
You can now set data and data-sharing EtherChannels to either Active LACP mode or to On mode. Other types of EtherChannels only support Active mode. New/modified Firepower Chassis Manager pages: New/modified FXOS commands: set port-channel-mode Supported platforms: Firepower 4100/9300 |
||
Firepower Threat Defense: HA and Clustering |
|||
Multi-instance capability for Firepower 4100/9300 with FTD |
You can now deploy multiple logical devices, each with a Firepower Threat Defense container instance, on a single security engine/module. Formerly, you could only deploy a single native application instance. To provide flexible physical interface use, you can create VLAN subinterfaces in FXOS and also share interfaces between multiple instances. Resource management lets you customize performance capabilities for each instance. You can use high availability using a container instance on 2 separate chassis. Clustering is not supported.
New/modified FMC pages: > edit device > Interfaces tab New/modified Firepower Chassis Manager pages:
New/modified FXOS commands: connect ftdname , connect module telnet , create bootstrap-key PERMIT_EXPERT_MODE ,create resource-profile , create subinterface , scope auto-macpool , set cpu-core-count , set deploy-type , set port-type data-sharing , set prefix , set resource-profile-name , set vlan , scope app-instance ftd name , show cgroups container , show interface , show mac-address , show subinterface , show tech-support module app-instance , show version Supported platforms: Firepower 4100/9300 |
||
Cluster control link customizable IP Address for the Firepower 4100/9300 |
By default, the cluster control link uses the 127.2.0.0/16 network. You can now set the network when you deploy the cluster in FXOS. The chassis auto-generates the cluster control link interface IP address for each unit based on the chassis ID and slot ID: 127.2.chassis_id.slot_id. However, some networking deployments do not allow 127.2.0.0/16 traffic to pass. Therefore, you can now set a custom /16 subnet for the cluster control link in FXOS except for loopback (127.0.0.0/8) and multicast (224.0.0.0/4) addresses. New/modified Firepower Chassis Manager pages: New/modified options: CCL Subnet IP field New/modified FXOS commands: set cluster-control-link network Supported platforms: Firepower 4100/9300 |
||
Improved FTD cluster addition to the FMC |
You can now add any unit of a cluster to the FMC, and the other cluster units are detected automatically. Formerly, you had to add each cluster unit as a separate device, and then group them into a cluster with the FMC. Adding a cluster unit is also now automatic. Note that you must delete a unit manually. New/modified pages:
Supported platforms: Firepower 4100/9300 |
||
Firepower Threat Defense: Encryption and VPN |
|||
SSL hardware acceleration |
Additional FTD devices now support SSL hardware acceleration. Also, this option is now enabled by default. Upgrading to Version 6.3.0 automatically enables SSL hardware acceleration on eligible devices. Using SSL hardware acceleration if you are not decrypting traffic can affect performance. We recommend you disable SSL hardware acceleration on devices that are not decrypting traffic. Supported platforms: Firepower 2100 series, Firepower 4100/9300 |
||
RA VPN: RADIUS Dynamic Authorization or Change of Authorization (CoA) |
You can now use RADIUS servers for user authorization of RA VPN using dynamic access control lists (ACLs) or ACL names per user. Supported platforms: FTD |
||
RA VPN: Two-Factor Authentication |
Firepower Threat Defense now supports two-factor authentication for RA VPN users using the Cisco AnyConnect Secure Mobility Client. For the two-factor authentication process, we support:
For more information on Duo multi-factor authentication (MFA) for FTD, see the Cisco Firepower Threat Defense (FTD) VPN with AnyConnect documentation on the Duo Security website. Supported platforms: FTD |
||
Security Policies |
|||
Firepower Threat Defense service policy |
You can now configure a Firepower Threat Defense service policy as part of your access control policy advanced options. Use FTD service policies to apply services to specific traffic classes. Features supported include:
New/modified pages: > edit/create policy > Advanced tab > Threat Defense Service Policy Supported platforms: FTD |
||
Update interval for URL category and reputation data |
Upgrade impact. You can now force URL data to expire. There is a tradeoff between security and performance. A shorter interval means you use more current data, while a longer interval can make web browsing faster for your users. If you worked with Cisco TAC to specify a timeout value for the URL filtering cache, the upgrade may change that value. Otherwise, the setting defaults to disabled (the current behavior), meaning that cached URL data does not expire.New/modified pages: settingSupported platforms: FMC |
||
Event Logging and Analysis |
|||
Cisco Security Packet Analyzer Integration |
You can integrate with Cisco Security Packet Analyzer to examine events and display analysis results, or download results for further analysis. New/modified pages:
Supported platforms: FMC |
||
Contextual cross-launch |
You can right-click an event in the dashboard or event viewer to look up related information in predefined or custom, public or private URL-based resources. New/modified pages: Supported platforms: FMC |
||
Unified syslog configuration |
Upgrade impact. Version 6.3.0 changes and centralizes the way the system logs connection and intrusion events via syslog. Previously, you configured event logging via syslog in multiple places, depending on the event type. You now configure syslog messaging in the access control policy. These configurations affect connection and intrusion event logging for the access control, SSL, prefilter, and intrusion policies, as well as for Security Intelligence. The upgrade does not change your existing settings for connection event logging. However, you may suddenly start receiving intrusion events you did not "expect" via syslog. This is because the intrusion policy now sends syslog events to the destination specified in the access control policy. (Before, you could configure syslog alerting in an intrusion policy to send events to the syslog on the managed device itself rather than to an external host.) For FTD devices, some syslog platform settings now apply to connection and intrusion event messages. For a list, see the Platform Settings for Firepower Threat Defense chapter in the Firepower Management Center Configuration Guide. For NGIPS devices (7000/8000 series, ASA FirePOWER, NGIPSv), messages now use the ISO 8601 timestamp format as specified in RFC 5425. Supported platforms: Any |
||
Fully qualified syslog messages for connection and intrusion events |
The format of syslog messages for connection, security intelligence, and intrusion events have the following changes:
Supported platforms: Any |
||
Other syslog improvements for FTD devices |
You can send all syslog messages from the same interface (data or management), using the same IP address, using TCP or UDP protocol. Note that secure syslog is supported on data ports only. You can also use the RFC 5424 format for message timestamps. Supported platforms: FTD |
||
Administration and Troubleshooting |
|||
Export-controlled features for approved customers |
Customers whose Smart Accounts are not otherwise eligible to use restricted functionality can purchase term-based licenses, with approval. New/modified pages: Supported platforms: FMC, FTD |
||
Specific License Reservation for approved customers |
Customers can use Specific License Reservation to deploy Smart Licensing in an air-gapped network. The FMC reserves licenses from your virtual account for a specified duration without accessing the Cisco Smart Software Manager or Smart Software Satellite Server. New/modified pages: Supported platforms: FMC, FTD (except ISA 3000) |
||
IPv4 range, subnet, and IPv6 support for SNMP hosts |
You can now use IPv4 range, IPv4 subnet, and IPv6 host network objects to specify the SNMP hosts that can access a Firepower Threat Defense device. New/modified pages: > create or edit FTD policy > SNMP > Hosts tab Supported platforms: FTD |
||
Access control using fully qualified domain names (FQDN) |
You can now create fully qualified domain name (FQDN) network objects and use them in access control and prefilter rules. To use FQDN objects, you must also configure DNS server groups and DNS platform settings, so that the system can resolve the domain names. New/modified pages:
Supported platforms: FTD |
||
CLI for the FMC |
An CLI for the FMC supports a small set of basic commands (change password, show version, reboot/restart, and so on). By default the FMC CLI is disabled, and logging into FMC using SSH accesses the Linux shell. New/modified Classic CLI commands: The system lockdown-sensor command has changed to system lockdown . This command now works for both devices and FMCs. New/modified pages: check boxSupported platforms: FMC, including FMCv |
||
Copy device configurations |
You can copy device configurations and policies from one device to another. New/modified pages: > edit the device > General area > Get/Push Device Configuration icons. Supported platforms: FMC |
||
Backup/restore FTD device configurations |
You can use the FMC web interface to back up configurations for some FTD devices. New/modified pages: New/modified CLI commands: restore Supported platforms: All physical FTD devices, FTDv for VMware |
||
Skip deploying to up-to-date devices when you schedule deploy tasks |
Upgrade impact. When you schedule a task to deploy configuration changes, you can now opt to Skip Deployment for up-to-date devices. This performance-enhancing setting is enabled by default. The upgrade process automatically enables this option on existing scheduled tasks. To continue to force a scheduled deploy to up-to-date devices, you must edit the scheduled task. New/modified pages: > add or edit a task > choose Job Type of Deploy Policies Supported platforms: FMC |
||
New health modules |
New health modules alert you when:
New/modified pages:
Supported platforms: FMC |
||
Configurable packet capture size |
You can now store up to 10 GB of packet captures. New/modified CLI commands: file-size , show capture Supported platforms: Firepower 4100/9300 |
||
Security and Hardening |
|||
HTTPS Certificates |
The default HTTPS server certificate provided with the system now expires in three years. If your appliance uses a default server certificate that was generated before you upgraded to Version 6.3.0, the server certificate will expire 20 years from when it was first generated. If you are using the default HTTPS server certificate the system now provides the ability to renew it. New/modified pages: buttonNew/modified Classic CLI commands: show http-cert-expire-date , system renew-http-certnew_key Supported platforms: Physical FMCs, 7000/8000 series devices |
||
Improved login security |
Upgrade impact. Added FMC user configuration settings to improve login security:
We also updated the list of supported ciphers and cryptographic algorithms for secure SSH access. If your SSH client fails to connect with a Firepower appliance due to a cipher error, update your client to the latest version. New/modified pages: > User Configuration Supported platforms: FMC |
||
Limit SSH login failures on devices |
When a user accesses any device via SSH and fails three successive login attempts, the device terminates the SSH session. Supported platforms: Any device |
||
Firepower Management Center REST API |
|||
New REST API services |
Added REST API services to support these features:
Supported platforms: FMC |
||
Bulk overrides |
You can now perform bulk overrides on specific objects. For a full list, see the Cisco Firepower Management Center REST API Quick Start Guide. |
Deprecated Features in FMC Version 6.3.0
Feature |
Upgrade Impact |
Description |
|||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
EMS extension support for decryption |
EMS extension support discontinued until you patch or upgrade. |
Version 6.3.0 discontinues EMS extension support, which was introduced in Version 6.2.3.8/6.2.3.9. This means that the Decrypt-Resign and Decrypt-Known Key SSL policy actions no longer support the EMS extension during ClientHello negotiation, which would enable more secure communications. The EMS extension is defined by RFC 7627. In Firepower Management Center deployments, this feature depends on the device version. Upgrading the Firepower Management Center to Version 6.3.0 does not discontinue support, as long as the device is running a supported version. However, upgrading the device to Version 6.3.0 does discontinue support. Support is reintroduced in Version 6.3.0.1. |
|||||||||||||||||||||
Decryption on passive and inline tap Interfaces |
The system stops decrypting traffic in passive deployments. |
Version 6.3.0 ends support for decrypting traffic on interfaces in passive or inline tap mode, even though the GUI allows you to configure it. Any inspection of encrypted traffic is necessarily limited. |
|||||||||||||||||||||
Default DNS group FlexConfig objects |
You should redo your configurations after upgrade. |
Version 6.3.0 deprecates this FlexConfig object for Firepower Threat Defense with FMC:
And these associated text objects:
These allowed you to configure the Default DNS group, which defines the DNS servers that can be used when resolving fully qualified domain names on the data interfaces. This allowed you to use commands in the CLI, such as ping , using host names rather than IP addresses. You can now configure DNS for the data interfaces in the FTD platform settings policy: > create or edit FTD policy > DNS. |
|||||||||||||||||||||
Embryonic connection limit and timeout FlexConfig objects |
Post-upgrade deployment issues. You should redo your configurations after upgrade. |
Version 6.3.0 deprecates these FlexConfig objects for Firepower Threat Defense with FMC:
And these associated text objects:
These allowed you to configure embryonic connection limits and timeouts to protect against SYN Flood Denial of Service (DoS) attacks. You can now configure these features in the FTD service policy: > add/edit policy > Advanced tab > Threat Defense Service Policy.
|
|||||||||||||||||||||
Web interface changes |
None. |
Version 6.3.0 changes these menu options:
|
|||||||||||||||||||||
VMware 5.5 hosting |
Upgrade the hosting environment before you upgrade the Firepower software. |
Version 6.3.0+ virtual deployments have not been tested on VMware vSphere/VMware ESXi 5.5. This includes FMCv, FTDv, and NGIPSv for VMware. |
|||||||||||||||||||||
ASA 5506-X series and ASA 5512-X devices with Firepower software |
Upgrade prohibited. |
You cannot upgrade to or freshly install Version 6.3.0+ of the Firepower software (both Firepower Threat Defense and ASA FirePOWER) on ASA 5506-X, 5506H-X, 5506W-X, and 5512-X devices. |