FMC Features in Version 6.6.x
Feature |
Details |
||
---|---|---|---|
Upgrades postpone scheduled tasks. |
Upgrade impact. Upgrades now postpone scheduled tasks. Any task scheduled to begin during the upgrade will begin five minutes after the post-upgrade reboot.
Note that this feature is supported for Firepower appliances running Version 6.6.3+. It is not supported for upgrades to Version 6.6.3, unless you are upgrading from Version 6.4.0.10 or any later patch. |
||
Appliance Configuration Resource Utilization health module. |
Upgrade impact for Version 6.7.0. Version 6.6.3 improves device memory management and introduces a new health module: Appliance Configuration Resource Utilization. The module alerts when the size of your deployed configurations puts a device at risk of running out of memory. The alert shows you how much memory your configurations require, and by how much this exceeds the available memory. If this happens, re-evaluate your configurations. Most often you can reduce the number or complexity of access control rules or intrusion policies. For information on best practices for access control, see the configuration guide. The upgrade process automatically adds and enables this module in all health policies. After upgrade, apply health policies to managed devices to begin monitoring.
|
Feature |
Details |
---|---|
Deprecated Features |
|
Deprecated: Custom intrusion rule import failure when rules collide. |
In Version 6.6.0, the FMC began rejecting custom (local) intrusion rule imports entirely if there were rule collisions. Version 6.6.1 deprecates this feature, and returns to the pre-Version 6.6 behavior of silently skipping the rules that cause collisions. Note that a collision occurs when you try to import an intrusion rule that has the same SID/revision number as an existing rule. You should always make sure that updated versions of custom rules have new revision numbers. We recommend you read the best practices for importing local intrusion rules in the FMC configuration guide. Version 6.7 adds a warning for rule collisions. |
Feature |
Description |
||
---|---|---|---|
Platform |
|||
FTD on the Firepower 4112. |
We introduced the Firepower 4112. You can also deploy ASA logical devices on this platform. Requires FXOS 2.8.1. |
||
Larger instances for AWS deployments. |
Upgrade impact. FTDv for AWS adds support for these larger instances:
FMCv for AWS adds support for these larger instances:
All existing FMCv for AWS instance types are now deprecated (c3.xlarge, c3.2xlarge, c4.xlarge, c4.2xlarge). You must resize before you upgrade. For more information, see FMCv Requires 28 GB RAM for Upgrade. |
||
Autoscale for cloud-based FTDv deployments. |
We introduced support for AWS Auto Scale/Azure Autoscale. The serverless infrastructure in cloud-based deployments allow you to automatically adjust the number of FTDv instances in the Auto Scale group based on capacity needs. This includes automatic registering/unregistering to and from the managing FMC. Supported platforms: FTDv for AWS, FTDv for Azure |
||
Firepower Threat Defense: Device Management |
|||
Obtain initial management interface IP address using DHCP. |
For Firepower 1000/2000 series and ASA-5500-X series devices, the management interface now defaults to obtaining an IP address from DHCP. This change makes it easier for you to deploy a new device on your existing network. This feature is not supported for Firepower 4100/9300 chassis, where you set the IP address when you deploy the logical device. Nor is it supported for FTDv or the ISA 3000, which continue to default to 192.168.45.45. Supported platforms: Firepower 1000/2000 series, ASA-5500-X series |
||
Configure MTU values in CLI. |
You can now use the FTD CLI to configure MTU (maximum transmission unit) values for FTD device interfaces. The default is 1500 bytes. Maximum MTU values are:
New FTD CLI commands: configure network mtu Modified FTD CLI commands: Added the mtu-event-channel and mtu-management-channel keyword to the configure network management-interface command. Supported platforms: FTD |
||
Get threat defense upgrade packages from an internal web server. |
FTD devices can now get upgrade packages from your own internal web server, rather than from the FMC. This is especially useful if you have limited bandwidth between the FMC and its devices. It also saves space on the FMC.
New/modified pages: System > Updates > Upload Update button > Specify software update source option Supported platforms: FTD |
||
Connection-based troubleshooting enhancements. |
We made the following enhancements to FTD CLI connection-based troubleshooting (debugging):
Supported platforms: FTD |
||
Firepower Threat Defense: Clustering |
|||
Multi-instance clustering. |
You can now create a cluster using container instances. On the Firepower 9300, you must include one container instance on each module in the cluster. You cannot add more than one container instance to the cluster per security engine/module. We recommend that you use the same security module or chassis model for each cluster instance. However, you can mix and match container instances on different Firepower 9300 security module types or Firepower 4100 models in the same cluster if required. You cannot mix Firepower 9300 and 4100 instances in the same cluster. New FXOS CLI commands: set port-type cluster New/modified Chassis Manager pages:
Supported platforms: Firepower 4100/9300 |
||
Parallel configuration sync to data units in FTD clusters. |
The control unit in an FTD cluster now syncs configuration changes with slave units in parallel by default. Formerly, synching occurred sequentially. Supported platforms: Firepower 4100/9300 |
||
Messages for cluster join failure or eviction added to show cluster history . |
We added new messages to the show cluster history command for when a cluster unit either fails to join the cluster or leaves the cluster. Supported platforms: Firepower 4100/9300 |
||
Firepower Threat Defense: Routing |
|||
Virtual routers and VRF-Lite. |
You can now create multiple virtual routers to maintain separate routing tables for groups of interfaces. Because each virtual router has its own routing table, you can provide clean separation in the traffic flowing through the device. Virtual routers implement the “light” version of Virtual Routing and Forwarding, or VRF-Lite, which does not support Multiprotocol Extensions for BGP (MBGP). The maximum number of virtual routers you can create ranges from five to 100, and depends on the device model. For a full list, see the Virtual Routing for Firepower Threat Defense chapter in the Firepower Management Center Configuration Guide. New/modified pages: Devices > Device Management > edit device > Routing tab New FTD CLI commands: show vrf . Modified FTD CLI commands: Added the [ vrf name | all] keyword set to the following CLI commands, and changed the output to indicate virtual router information where applicable: clear ospf , clear route , ping , show asp table routing , show bgp , show ipv6 route , show ospf , show route , show snort counters . Supported platforms: FTD, except Firepower 1010 and ISA 3000 |
||
Firepower Threat Defense: VPN |
|||
DTLS 1.2 in remote access VPN. |
You can now use Datagram Transport Layer Security (DTLS) 1.2 to encrypt RA VPN connections. Use FTD platform settings to specify the minimum TLS protocol version that the FTD device uses when acting as a, RA VPN server. If you want to specify DTLS 1.2, you must also choose TLS 1.2 as the minimum TLS version. Requires Cisco AnyConnect Secure Mobility Client, Version 4.7+. New/modified pages: Devices > Platform Settings > add/edit Threat Defense policy > SSL > DTLS Version option Supported platforms: FTD, except ASA 5508-X and ASA 5516-X |
||
Site-to-site VPN IKEv2 support for multiple peers. |
You can now add a backup peer to a site-to-site VPN connection, for IKEv1 and IKEv2 point-to-point extranet and hub-and-spoke topologies. Previously, you could only configure backup peers for IKEv1 point-to-point topologies. New/modified pages: Devices > VPN > Site to Site > add or edit a point to point or hub and spoke FTD VPN topology > add endpoint > IP Address field now supports comma-separated backup peers Supported platforms: FTD |
||
Security Policies |
|||
Usability enhancements for security policies. |
Version 6.6.0 makes it easier to work with access control and prefilter rules. You can now:
Supported platforms: FMC |
||
Object group search for access control policies. |
While operating, FTD devices expand access control rules into multiple access control list entries based on the contents of any network objects used in the access rule. You can reduce the memory required to search access control rules by enabling object group search. With object group search enabled, the system does not expand network objects, but instead searches access rules for matches based on those group definitions. Object group search does not impact how your rules are defined or how they appear in the FMC. It impacts only how the device interprets and processes them while matching connections to access control rules. Object group search is disabled by default. New/modified pages: Devices > Device Management > edit device > Device tab > Advanced Settings > Object Group Search option Supported platforms: FTD |
||
Time-based rules in access control and prefilter policies. |
You can now specify an absolute or recurring time or time range for a rule to be applied. The rule is applied based on the time zone of the device that processes the traffic. New/modified pages:
Supported platforms: FTD |
||
Egress optimization re-enabled. |
Upgrade impact. Version 6.6.0 fixes CSCvs86257. If egress optimization was:
Supported platforms: FTD |
||
Event Logging and Analysis |
|||
New datastore improves performance. |
Upgrade impact. To improve performance, Version 6.6.0 uses a new datastore for connection and Security Intelligence events. After the upgrade finishes and the FMC reboots, historical connection and Security Intelligence events are migrated in the background, resource constrained. Depending on FMC model, system load, and how many events you have stored, this can take from a few hours up to a day. Historical events are migrated by age, newest events first. Events that have not been migrated do not appear in query results or dashboards. If you reach the connection event database limit before the migration completes, for example, because of post-upgrade events, the oldest historical events are not migrated. You can monitor event migration progress in the Message Center. Supported platforms: FMC |
||
Wildcard support when searching connection and Security Intelligence events for URLs. |
When searching connection and Security Intelligence events for URLs having the pattern example.com, you must now include wildcards. Specifically, use *example.com* for such searches. Supported platforms: FMC |
||
Monitor up to 300,000 concurrent user sessions with FTD devices. |
In Version 6.6.0, some FTD device models support monitoring of additional concurrent user sessions (logins):
All other devices continue to support the old limit of 64,000, except ASA FirePOWER which is limited to 2000. A new health module alerts you when the user identity feature's memory usage reaches a configurable threshold. You can also view a graph of the memory usage over time. New/modified pages:
Supported platforms: FTD devices listed above |
||
Integration with IBM QRadar. |
You can use the new Cisco Firepower app for IBM QRadar as an alternate way to display event data and help you analyze, hunt for, and investigate threats to your network. Requires eStreamer. For more information, see the Integration Guide for the Cisco Firepower App for IBM QRadar. Supported platforms: FMC |
||
Administration and Troubleshooting |
|||
New options for deploying configuration changes. |
The Deploy button on the FMC menu bar is now a menu, with options that add the following functionality:
New/modified pages:
Supported platforms: FMC |
||
Initial configuration updates the VDB and schedules SRU updates. |
On new and reimaged FMCs, the setup process now:
Upgraded FMCs are not affected. New/modified pages:
Supported platforms: FMC |
||
VDB match no longer required to restore FMC. |
Restoring an FMC from backup no longer requires the same VDB on the replacement FMC. However, restoring does now replace the existing VDB with the VDB in the backup file. Supported platforms: FMC |
||
HTTPS certificates with subject alternative name (SAN). |
You can now request a HTTPS server certificate that secures multiple domain names or IP addresses by using SAN. For more information on SAN, see RFC 5280, section 4.2.1.6. New/modified pages: System > Configuration > HTTPS Certificate > Generate New CSR > Subject Alternative Name fields Supported platforms: FMC |
||
Real names associated with FMC user accounts. |
You can now specify a real name when you create or modify an FMC user account. This can be a person's name, department, or other identifying attribute. New/modified pages: System > Users > Users > Real Name field. Supported platforms: FMC |
||
Cisco Support Diagnostics on additional FTD platforms. |
Upgrade impact. Cisco Support Diagnostics is now fully supported on all FMCs and FTD devices. Previously, support was limited to FMCs, Firepower 4100/9300 with FTD, and FTDv for Azure. For more information, see Sharing Data with Cisco. Supported platforms: FMC, FTD |
||
Usability |
|||
Light theme. |
The FMC now defaults to the Light theme, which was introduced as a Beta feature in Version 6.5.0. Upgrading to Version 6.6.0 automatically switches you to the Light theme. You can switch back to the Classic theme in your user preferences. Although we cannot respond to everybody, we welcome feedback on the Light theme. Use the feedback link on the User Preferences page or contact us at fmc-light-theme-feedback@cisco.com. Supported platforms: FMC |
||
Display time remaining for upgrades. |
The FMC's Message Center now displays approximately how much time remains until an upgrade will complete. This does not include reboot time. New/modified pages: Message Center Supported platforms: FMC |
||
Security and Hardening |
|||
Default HTTPS server certificate renewals have 800 day lifespans. |
Upgrade impact. Unless the current default HTTPS server certificate already has an 800-day lifespan, upgrading to Version 6.6.0 renews the certificate, which now expires 800 days from the date of the upgrade. All future renewals have an 800 day lifespan. Your old certificate was set to expire depending on when it was generated. Supported platforms: FMC |
||
Firepower Management Center REST API |
|||
New REST API capabilities. |
Added the following REST API services to support Version 6.6.0 features:
Added the following REST API services to support older features:
Supported platforms: FMC |
||
Changed REST API service name for extended access lists. |
Upgrade impact. The extendedaccesslist (singular) service in the FMC REST API is now extendedaccesslists (plural). Make sure you update your client. Using the old service name fails and returns an Invalid URL error. Request Type: GET URL to retrieve the extended access list associated with a specific ID:
URL to retrieve a list of all extended access lists:
Supported platforms: FMC |
||
Deprecated Features |
|||
Deprecated: Lower-memory instances for cloud-based FMCv deployments. |
For performance reasons, the following FMCv instances are no longer supported:
All existing FMCv for AWS instance types are now deprecated (c3.xlarge, c3.2xlarge, c4.xlarge, c4.2xlarge). You must resize before you upgrade. For more information, see FMCv Requires 28 GB RAM for Upgrade. Additionally, as of the Version 6.6 release, lower-memory instance types for cloud-based FMCv deployments are fully deprecated. You cannot create new FMCv instances using them, even for earlier Firepower versions. You can continue running existing instances. |
||
Deprecated: e1000 Interfaces on FTDv for VMware. |
Prevents upgrade. Version 6.6 ends support for e1000 interfaces on FTDv for VMware. You cannot upgrade until you switch to vmxnet3 or ixgbe interfaces. Or, you can deploy a new device. For more information, see the Cisco Secure Firewall Threat Defense Virtual Getting Started Guide. |
||
Deprecated: Less secure Diffie-Hellman groups, and encryption and hash algorithms. |
Version 6.6 deprecates the following FTD security features:
These features are removed in Version 6.7. Avoid configuring them in IKE proposals or IPSec policies for use in VPNs. Change to stronger options as soon as possible. |
||
Deprecated: Custom tables for connection events. |
Version 6.6 ends support for custom tables for connection and Security Intelligence events. After you upgrade, existing custom tables for those events are still 'available' but return no results. We recommend you delete them. There is no change to other types of custom tables. Deprecated options:
|
||
Deprecated: Ability to delete connection events from the event viewer. |
Version 6.6 ends support for deleting connection and Security Intelligence events from the event viewer. To purge the database, select .Deprecated options:
|
||
Deprecated: Geolocation details. |
In May 2022 we split the GeoDB into two packages: a country code package that maps IP addresses to countries/continents, and an IP package that contains additional contextual data associated with routable IP addresses. The contextual data in the IP package can include additional location details, as well as connection information such as ISP, connection type, proxy type, domain name, and so on. The new country code package has the same file name as the old all-in-one package: Cisco_GEODB_Update-date-build. This allows deployments running Version 7.1 and earlier to continue to obtain GeoDB updates. If you manually download GeoDB updates—for example, in an air-gapped deployment—make sure you get the country code package and not the IP package.
|