Features for Firepower Management Center Deployments
Note |
Version 6.6.0/6.6.x is the last release to support the Cisco Firepower User Agent software as an identity source. You cannot upgrade a Firepower Management Center with user agent configurations to Version 6.7.0+. You should switch to Cisco Identity Services Engine/Passive Identity Connector (ISE/ISE-PIC). This will also allow you to take advantage of features that are not available with the user agent. To convert your license, contact your Cisco representative or partner contact. For more information, see the End-of-Life and End-of-Support for the Cisco Firepower User Agent announcement and the Firepower User Identity: Migrating from User Agent to Identity Services Engine TechNote. |
New Features in FMC Version 6.5.0
Feature |
Description |
||
---|---|---|---|
Hardware and Virtual Appliances |
|||
FTD on the Firepower 1150 |
We introduced the Firepower 1150. |
||
Larger instances for FTDv for Azure |
Firepower Threat Defense Virtual on Microsoft Azure now supports larger instances: D4_v2 and D5_v2. |
||
FMCv 300 for VMware |
We introduced the FMCv 300, a larger Firepower Management Center Virtual for VMware. It can manage up to 300 devices, compared to 25 devices for other FMCv instances. You can use the FMC model migration feature to switch to the FMCv 300 from a less powerful platform. |
||
VMware vSphere/VMware ESXi 6.7 support |
You can now deploy FMCv, FTDv, and NGIPSv virtual appliances on VMware vSphere/VMware ESXi 6.7. |
||
Firepower Threat Defense |
|||
Firepower 1010 hardware switch support |
The Firepower 1010 now supports setting each Ethernet interface to be a switch port or a firewall interface. New/modified pages:
Supported platforms: Firepower 1010 |
||
Firepower 1010 PoE+ support on Ethernet 1/7 and Ethernet 1/8 |
The Firepower 1010 now supports Power over Ethernet+ (PoE+) on Ethernet 1/7 and Ethernet 1/8. New/modified pages: Devices > Device Management > Interfaces > Edit Physical Interface > PoE Supported platforms: Firepower 1010 |
||
Carrier-grade NAT enhancements |
For carrier-grade or large-scale PAT, you can allocate a block of ports for each host, rather than have NAT allocate one port translation at a time (see RFC 6888). New/modified pages: > add/edit FTD NAT policy > add/edit NAT rule > PAT Pool tab > Block Allocation option Supported platforms: FTD |
||
TLS crypto acceleration for multiple container instances on Firepower 4100/9300 |
TLS crypto acceleration is now supported on multiple container instances (up to 16) on a Firepower 4100/9300 chassis. Previously, you could enable TLS crypto acceleration for only one container instance per module/security engine. New instances have this feature enabled by default. However, the upgrade does not enable acceleration on existing instances. Instead, use the create hw-crypto and scope hw-crypto CLI commands. For more information, see the Cisco Firepower 4100/9300 FXOS Command Reference. New FXOS CLI commands:
Removed FXOS CLI commands:
Removed FTD CLI commands:
Supported platforms: Firepower 4100/9300 |
||
Security Policies |
|||
Access control rule filtering |
You can now filter access control rules based on search criteria. New/modified pages: Policies > Access Control > Access Control > add/edit policy > filter button ('show only rules matching filter criteria') Supported platforms: FMC |
||
Dispute URL category or reputation |
You can now dispute the category or reputation of a URL. New/modified pages:
Supported platforms: FMC |
||
User control with destination-based Security Group Tags (SGT) |
You can now use ISE SGT tags for both source and destination matching criteria in access control rules. SGT tags are tag-to-host/network mappings obtained by ISE. New connection event fields:
Renamed connection event fields:
New/modified pages: System > Integration > Identity Sources > Identity Services Engine > Subscribe to Session Directory Topic and SXP Topic options Supported platforms: Any |
||
Cisco Firepower User Agent Version 2.5 integration |
We released Version 2.5 of the Cisco Firepower User Agent, which you can integrate with Firepower Versions 6.4.0 through 6.6.x.
New/modified FMC CLI commands: configure user-agent Supported platforms: FMC |
||
Event Logging and Analysis |
|||
Threat Intelligence Director priorities. |
TID blocking/monitoring observable actions now have priority over blocking/monitoring with Security Intelligence Block lists. If you configure the Block TID observable action, even if the traffic also matches a Security Intelligence Block list set to Block:
If you configure the Monitor TID observable action, even if the traffic also matches a Security Intelligence Block list set to Monitor:
Previously, in each of these cases, the system reported the category by analysis and did not generate a TID incident.
For complete information on system behavior when you enable both Security Intelligence and TID, see the TID-Firepower Management Center Action Prioritization information in the Firepower Management Center Configuration Guide. Supported platforms: FMC |
||
'Packet profile' CLI commands |
You can now use the FTD CLI to obtain statistics on how the device handled network traffic. That is, how many packets were fastpathed by a prefilter policy, offloaded as a large flow, fully evaluated by access control (Snort), and so on. New FTD CLI commands:
Supported platforms: FTD |
||
Additional event types for Cisco SecureX threat response |
Firepower can now send file and malware events to Cisco SecureX threat response, as well as high priority connection events — those related to intrusion, file, malware, and Security Intelligence events. Note that the FMC web interface refers to this offering as Cisco Threat Response (CTR). New/modified pages: System > Integration > Cloud Services. Supported platforms: FTD (via syslog or direct integration) and Classic (via syslog) devices |
||
Administration and Troubleshooting |
|||
Precision Time Protocol (PTP) configuration for ISA 3000 devices. |
You can use FlexConfig to configure the Precision Time Protocol (PTP) on ISA 3000 devices. PTP is a time-synchronization protocol developed to synchronize the clocks of various devices in a packet-based network. The protocol is designed specifically for industrial, networked measurement and control systems. We now allow you to include the ptp (interface mode) command, and the global commands ptp mode e2etransparent and ptp domain , in FlexConfig objects. New/modified commands: show ptp Supported platforms: ISA 3000 with FTD |
||
Configure more domains (multitenancy) |
When implementing multitenancy (segment user access to managed devices, configurations, and events), you can create up to 100 subdomains under a top-level Global domain, in two or three levels. The previous maximum was 50 domains. Supported platforms: FMC |
||
ISE Connection Status Monitor enhancements |
The ISE Connection Status Monitor health module now alerts you to issues with TrustSec SXP (SGT Exchange Protocol) subscription status. Supported platforms: FMC |
||
Regional clouds |
Upgrade impact. If you use the Cisco Threat Response integration, Cisco Support Diagnostics, or Cisco Success Network features, you can now select a regional cloud. By default, the upgrade assigns you to the US (North America) region. New/modified pages: Supported platforms: FMC, FTD |
||
Cisco Support Diagnostics |
Upgrade impact. Cisco Support Diagnostics (sometimes called Cisco Proactive Support) sends configuration and operational health data to Cisco, and processes that data through our automated problem detection system, allowing us to proactively notify you of issues. This feature also allows Cisco TAC to collect essential information from your devices during the course of a TAC case. During initial setup and upgrades, you may be asked to enroll. You can also change your enrollment at any time. For more information, see Sharing Data with Cisco. In Version 6.5.0, Cisco Support Diagnostics support is limited to select platforms. New/modified pages:
Supported platforms: FMC, Firepower 4100/9300, FTDv for Azure |
||
FMC model migration |
You can now use the backup and restore feature to migrate configurations and events between FMCs, even if they are not the same model. This makes it easier to replace FMCs due to technical or business reasons such as a growing organization, migration from a physical to a virtual implementation, hardware refresh, and so on. In general, you can migrate from a lower-end to a higher-end FMC, but not the reverse. Migration from KVM and Microsoft Azure is not supported. You must also unregister and reregister with Cisco Smart Software Manager (CSSM). For details, including supported target and destination models, see the Firepower Management Center Model Migration Guide. Supported platforms: FMC |
||
Security and Hardening |
|||
Secure erase for appliance components on FXOS-based FTD devices |
You can now use the FXOS CLI to securely erase a specified appliance component. New FXOS CLI commands: erase secure Supported platforms: Firepower 1000/2000 and Firepower 4100/9300 |
||
Stricter password requirements for FMC |
FMC initial setup now requires that you choose a ‘strong’
password for
Supported platforms: FMC |
||
Concurrent user session limits |
You can now limit the number of users that can be logged into the FMC at the same time. You can limit concurrent sessions for users with read only roles, read/write roles, or both. Note that CLI users are limited by the read/write setting. New/modified pages: System > Configuration > User Configuration > Max Concurrent Sessions Allowed options Supported platforms: FMC |
||
Authenticated NTP servers |
You can now configure secure communications between the FMC and NTP servers using SHA1 or MD5 symmetric key authentication. For system security, we recommend using this feature. New/modified pages: System > Configuration > Time Synchronization Supported platforms: FMC |
||
Usability and Performance |
|||
Improved initial configuration experience |
On new and reimaged FMCs, a wizard replaces the previous initial setup process. If you use the GUI wizard, when initial setup completes, the FMC displays the device management page so that you can immediately begin licensing and setting up your deployment. The setup process also automatically schedules the following:
These tasks are scheduled in UTC, which means that when they occur locally depends on the date and your specific location. Also, because tasks are scheduled in UTC, they do not adjust for Daylight Saving Time, summer time, or any such seasonal adjustments that you may observe in your location. If you are affected, scheduled tasks occur one hour "later" in the summer than in the winter, according to local time.
Upgraded FMCs are not affected. For details on the initial configuration wizard, see the Getting Started Guide for your FMC model; for details on scheduled tasks, see the Firepower Management Center Configuration Guide. Supported platforms: FMC |
||
Light theme |
Beta. The FMC web interface defaults to the Classic theme, but you can also choose a new Light theme.
New/modified pages: User Preferences, from the drop-down list under your username Supported platforms: FMC |
||
Usability enhancements for viewing objects |
We have enhanced 'view object' capabilities for network, port, VLAN, and URL objects, as follows:
New/modified pages:
Supported platforms: FMC |
||
Usability enhancements for deploying configuration changes |
We streamlined the display of errors and warnings related to deploying configuration changes. Instead of an immediate verbose view, you can now Click to view all details to see more information about a particular error or warning. New/modified pages: Errors and Warnings for Requested Deployment dialog box Supported platforms: FMC |
||
Usability enhancements to FTD NAT policy management |
When configuring FTD NAT, you can now:
New/modified pages: Devices > NAT > create or edit FTD NAT policy > Show Warnings and Rules Per Page options Supported platforms: FTD |
||
Firepower Management Center REST API |
|||
New REST API capabilities |
Added the following REST API objects to support Version 6.5.0 features:
Added the following REST API objects to support older features:
Supported platforms: FMC |
Deprecated Features in FMC Version 6.5.0
Feature |
Upgrade Impact |
Description |
||
---|---|---|---|---|
Ability to disable the Firepower Management Center CLI |
None. |
Version 6.3.0 introduced the Firepower Management Center CLI, which you had to explicitly enable. In Version 6.5.0, the CLI is automatically enabled, for both new and upgraded deployments. If you want to access the Linux shell (also called expert mode), you must log in to the CLI and then use the expert command.
Deprecated options: System > Configuration > Console Configuration > Enable CLI access check box |
||
MD5 authentication algorithm and DES encryption for SNMPv3 users (deprecated) |
None, but you should switch now. |
Version 6.5.0 deprecates the MD5 authentication algorithm and DES encryption for SNMPv3 users on Firepower Threat Defense. Although these configurations continue to work post-upgrade, the system displays a warning when you deploy. And, you cannot create new users or edit existing users with these options. Support will be removed in a future release. If you are still using these options in your platform settings policy, we recommend you switch to stronger options now. New/modified screens: Devices > Platform Settings > SNMP > Users |
||
TLS 1.0 & 1.1 |
Client may fail to connect with an upgraded appliance. |
To enhance security:
If your client fails to connect with a Firepower appliance, we recommend you upgrade your client to support TLS 1.2. |
||
TLS crypto acceleration FXOS CLI commands for Firepower 4100/9300 |
None. |
As part of allowing TLS crypto acceleration for multiple container instances on Firepower 4100/9300, we removed the following FXOS CLI commands:
And this FTD CLI command:
For information on their replacements, see the new feature documentation. |
||
Cisco Security Packet Analyzer integration |
None, but integration is no longer supported. |
Version 6.5.0 ends support for Firepower Management Center integration with Cisco Security Packet Analyzer. Deprecated screens/options:
|
||
Default HTTPS server certificates |
None. |
If you are upgrading from Version 6.4.0.9+, the default HTTPS server certificate's lifespan-on-renew returns to 3 years, but this is again updated to 800 days in Version 6.6.0+. Your current default HTTPS server certificate is set to expire depending on when it was generated, as follows:
|
||
Firepower Management Center models FMC 750, 1500, 3500 |
Upgrade prohibited. |
You cannot upgrade to or freshly install Version 6.5.0+ of the Firepower Management Center software on the FMC 750, FMC 1500, and FMC 3500. You cannot manage Version 6.5.0+ devices with these Firepower Management Centers. |
||
ASA 5515-X and ASA 5585-X series devices with Firepower software |
Upgrade prohibited. |
You cannot upgrade to or freshly install Version 6.5.0+ of the Firepower software (both Firepower Threat Defense and ASA FirePOWER) on ASA 5515-X and ASA 5585-X series devices (SSP-10, -20, -40, and -60). |
||
Firepower 7000/8000 series devices |
Upgrade prohibited. |
You cannot upgrade to or freshly install Version 6.5.0+ of the Firepower software on Firepower 7000/8000 series devices, including AMP models. |