New Features in FMC Version 7.1
Although you can manage older devices with a newer customer-deployed FMC, we recommend you always update your entire deployment. You should assume that new traffic-handling features require the latest release on both the FMC and device. Features where devices are not obviously involved (cosmetic changes to the web interface, cloud integrations) may only require the latest version on the FMC, but that is not guaranteed. In the new feature descriptions, we are explicit when version requirements deviate from the standard expectation.
New Features
New Feature |
Description |
||
---|---|---|---|
Version 7.1.0.3 Automatically update CA bundles |
The local CA bundle contains certificates to access several Cisco services. The system now automatically queries Cisco for new CA certificates at a daily system-defined time. Previously, you had to upgrade the software to update CA certificates. You can use the CLI to disable this feature.
New/modified CLI commands: configure cert-update auto-update , configure cert-update run-now , configure cert-update test , show cert-update For more information, see the Firepower Management Center Command Line Reference in the management center administration guide, and the Cisco Secure Firewall Threat Defense Command Reference. |
New Feature |
Description |
|||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Platform |
||||||||||||||||||||||||||||||
Secure Firewall 3100 |
We introduced the Secure Firewall 3110, 3120, 3130, and 3140. You can hot swap a network module of the same type while the firewall is powered up without having to reboot; making other module changes requires a reboot. Secure Firewall 3100 25 Gbps interfaces support Forward Error Correction as well as speed detection based on the SFP installed. The SSDs are self-encrypting drives (SEDs), and if you have 2 SSDs, they form a software RAID. These devices support up to 8 units for Spanned EtherChannel clustering. Note that the Version 7.1.0 release does not include online help for these devices; new online help is included in Version 7.1.0.2. New/modified screens:
New/modified FTD CLI commands: configure network speed , configure raid , show raid , show ssd |
|||||||||||||||||||||||||||||
FMCv300 for AWS FMCv300 for OCI |
We introduced the FMCv300 for both AWS and OCI. The FMCv300 can manage up to 300 devices. |
|||||||||||||||||||||||||||||
FTDv for AWS instances. |
FTDv for AWS adds support for these instances:
|
|||||||||||||||||||||||||||||
FTDv for Azure instances. |
FTDv for Azure adds support for these instances:
|
|||||||||||||||||||||||||||||
Use FDM to configure the FTD for management by the FMC. |
When you perform initial setup using FDM, all interface configuration completed in FDM is retained when you switch to FMC for management, in addition to the Management and FMC access settings. Note that other default configuration settings, such as the access control policy or security zones, are not retained. When you use the FTD CLI, only the Management and FMC access settings are retained (for example, the default inside interface configuration is not retained). After you switch to FMC, you can no longer use FDM to manage the FTD. New/modified FDM screens: |
|||||||||||||||||||||||||||||
Device Upgrade |
||||||||||||||||||||||||||||||
Revert a successful device upgrade. |
You can now revert major and maintenance upgrades to FTD. Reverting returns the software to its state just before the last upgrade, also called a snapshot. If you revert an upgrade after installing a patch, you revert the patch as well as the major and/or maintenance upgrade.
This feature is not supported for container instances. Minimum FTD: 7.1 |
|||||||||||||||||||||||||||||
Improvements to the upgrade workflow for clustered and high availability devices. |
We made the following improvements to the upgrade workflow for clustered and high availability devices:
|
|||||||||||||||||||||||||||||
Snort 3 backwards compatibility. |
For Snort 3, new features and resolved bugs require that you fully upgrade the FMC and its managed devices. Unlike Snort 2, you cannot update the inspection engine on an older device (for example, Version 7.0) by deploying from a newer FMC (for example, Version 7.1). When you deploy to an older device, the system lists any unsupported configurations and warns you that they will be skipped. We recommend you always update your entire deployment. |
|||||||||||||||||||||||||||||
Device Management |
||||||||||||||||||||||||||||||
Geneve interface support for an FTDv on AWS instances. |
Geneve encapsulation support was added to support single-arm proxy for the AWS Gateway Load Balancer (GWLB). The AWS GWLB combines a transparent network gateway (with a single entry and exit point for all traffic) and a load balancer that distributes traffic and scales FTDv to match the traffic demand. This support requires FMC with Snort 3 enabled and is available on the following performance tiers:
|
|||||||||||||||||||||||||||||
Single Root I/O Virtualization (SR-IOV) support for FTDv on OCI. |
You can now implement Single Root Input/Output Virtualization (SR-IOV) for FTDv on OCI. SR-IOV can provide performance improvements for an FTDv. Mellanox 5 as vNICs are not supported in SR-IOV mode. |
|||||||||||||||||||||||||||||
LLDP support for the Firepower 1100. |
You can now enable Link Layer Discovery Protocol (LLDP) for Firepower 1100 interfaces. New/modified screens: New/modified commands: show lldp status , show lldp neighbors , show lldp statistics Supported platforms: Firepower 1100 (1120, 1140, and 1150) |
|||||||||||||||||||||||||||||
Interface auto-negotiation is now set independently from speed and duplex, interface sync improved. |
Interface auto-negotiation is now set independently from speed and duplex. Also, when you sync the interfaces in FMC, hardware changes are detected more effectively. New/modified screens: Supported platforms: Firepower 1000/2100, Secure Firewall 3100 |
|||||||||||||||||||||||||||||
Support to specify trusted DNS servers. |
You can use FTD platform settings to specify trusted DNS servers for DNS snooping. This helps detect applications on the first packet by mapping domains to IP addresses. By default, trusted DNS servers include those in DNS server objects, and those discovered by dhcp-pool, dhcp-relay, and dhcp-client. |
|||||||||||||||||||||||||||||
Import and export device configurations. |
You can export the device-specific configuration, and you can then import the saved configuration for the same device in the following use cases:
New/modified screens: |
|||||||||||||||||||||||||||||
High Availability/Scalability |
||||||||||||||||||||||||||||||
High availability for:
|
We now support high availability on FMCv for AWS and FMCv for OCI. In an FTD deployment, you need two identically licensed FMCs, as well as one FTD entitlement for each managed device. For example, to manage 10 FTD devices with an FMCv10 high availability pair, you need two FMCv10 entitlements and 10 FTD entitlements. If you are managing Version 6.5.0–7.0.x Classic devices only (NGIPSv or ASA FirePOWER), you do not need FMCv entitlements. Supported platforms: FMCv10, FMCv25, FMCv300 (not supported for FMCv2) |
|||||||||||||||||||||||||||||
Autoscale on FTDv for OCI. |
We now support autoscaling on FTDv for OCI. The serverless infrastructure in cloud-based deployments allow you to automatically adjust the number of FTDv instances in an autoscale group based on capacity needs. This includes automatic registering/unregistering to and from the managing FMC. |
|||||||||||||||||||||||||||||
Cluster deployment for firewall changes completes faster. |
Cluster deployment for firewall changes now completes faster. Supported platforms: Firepower 4100/9300, Secure Firewall 3100 |
|||||||||||||||||||||||||||||
Clearing routes in a high availability group or cluster. |
In previous releases, the clear route command cleared the routing table on the unit only. Now, when operating in a high availability group or cluster, the command is available on the active or control unit only, and clears the routing table on all units in the group or cluster. |
|||||||||||||||||||||||||||||
NAT |
||||||||||||||||||||||||||||||
Manual NAT support for fully-qualified domain name (FQDN) objects as the translated destination. |
You can use an FQDN network object, such as one specifying www.example.com, as the translated destination address in manual NAT rules. The system configures the rule based on the IP address returned from the DNS server. |
|||||||||||||||||||||||||||||
Routing |
||||||||||||||||||||||||||||||
BGP configuration to interconnect virtual routers. |
You can configure BGP settings to dynamically leak routes among user-defined virtual routers, and between global virtual router and user-defined virtual routers. The import and export routes feature was introduced to exchange routes among the virtual routers by tagging them with route targets and optionally, filtering the matched routes with route maps. This BGP feature is accessible only when you select a user-defined virtual router. New/modified screens: For a selected user-defined virtual router, |
|||||||||||||||||||||||||||||
BGPv6 support for user-defined virtual routers. |
FTD now supports configuring BGPv6 on user-defined virtual routers. New/modified screens: For a selected user-defined virtual router, |
|||||||||||||||||||||||||||||
Equal-Cost-Multi-Path (ECMP) zone support. |
You can now group interfaces in traffic zones and configure Equal-Cost-Multi-Path (ECMP) routing in FMC. ECMP routing was previously supported through FlexConfig policies. New/modified screens: |
|||||||||||||||||||||||||||||
Direct Internet Access/Policy Based Routing |
||||||||||||||||||||||||||||||
Direct internet access with policy based routing. |
You can now configure policy based routing through the FMC to classify network traffic based on applications and to implement Direct Internet Access (DIA) to send traffic to the internet from a branch deployment. You can define a PBR policy and configure it on ingress interfaces, specifying match criteria and egress interfaces. Network traffic that matches the access control policy is forwarded through the egress interface based on priority or the order as configured in the policy. New/modified screens: New policy page for configuring the policy based routing policy: Supported platforms: FTD |
|||||||||||||||||||||||||||||
FMC REST API enhancements for direct internet access and policy based routing. |
You can use the FMC REST API to configure Direct Internet Access through Policy Based Routing. The following enhancements have been made to the FMC REST API to support this:
|
|||||||||||||||||||||||||||||
Remote Access VPN |
||||||||||||||||||||||||||||||
Copy RA VPN policies. |
You can now create a new RA VPN policy by copying an existing policy. We added a copy button next to each policy on . |
|||||||||||||||||||||||||||||
AnyConnect VPN SAML external browser. |
You can now configure AnyConnect VPN SAML External Browser to enable additional authentication choices, such as passwordless authentication, WebAuthN, FIDO, SSO, U2F, and an improved SAML experience due to the persistence of cookies. When you use SAML as the primary authentication method for a remote access VPN connection profile, you can elect to have the AnyConnect client use the client’s local browser instead of the AnyConnect embedded browser to perform the web authentication. This option enables single sign-on (SSO) between your VPN authentication and other corporate logins. Also choose this option if you want to support web authentication methods, such as biometric authentication and Yubikeys, that cannot be performed in the embedded browser. We updated the remote access VPN connection profile wizard to allow you to configure the SAML Login Experience. |
|||||||||||||||||||||||||||||
Multiple trustpoints for SAML identity providers on Microsoft Azure. |
You can now add multiple RA VPN trustpoints for SAML identity providers, as required by Microsoft Azure. In a Microsoft Azure network, Azure can support multiple applications for the same Entity ID. Each application (typically mapped to a different tunnel group) requires a unique certificate. This feature enables you to add multiple trustpoints for RA VPN in FTDv for Microsoft Azure. |
|||||||||||||||||||||||||||||
Site to Site VPN |
||||||||||||||||||||||||||||||
VPN filters. |
You can now configure site to site VPN filters with rules that determine whether to allow or reject tunneled data packets based on criteria such as source address, destination address, and protocol. The VPN filter is applied to post-decrypted traffic after it exits a tunnel and to pre-encrypted traffic before it enters a tunnel. |
|||||||||||||||||||||||||||||
Unique local tunnel ID for IKEv2. |
You can now configure a Local Tunnel ID per IKEv2 tunnel for both policy-based and route-based Site to Site VPNs. You can configure the local tunnel ID with the FMC web interface or from the REST API. This local tunnel ID configuration enables Umbrella SIG integration with FTD. |
|||||||||||||||||||||||||||||
Multiple IKE policies. |
You can now configure multiple IKE policies for both policy-based and route-based Site to Site VPNs. Multiple IKE policies can be configured through the FMC GUI and the REST API. |
|||||||||||||||||||||||||||||
VPN monitoring dashboard. |
Beta. The Site to Site VPN Monitoring Dashboard provides:
|
|||||||||||||||||||||||||||||
Security Intelligence |
||||||||||||||||||||||||||||||
Snort 3 support for Security Intelligence on proxied traffic. |
With Snort 3, you can now apply Security Intelligence to HTTP proxy traffic where the IP address is embedded into the HTTP request. For example, when a user uploads a Block list or an Allow list containing IP addresses or networks, the system matches on the destination server IP instead of proxy IP. As a result, traffic to the destination server can be blocked, monitored, or allowed (according to your Security Intelligence configuration). |
|||||||||||||||||||||||||||||
Intrusion Detection and Prevention |
||||||||||||||||||||||||||||||
Snort 3 support for drop, reject, rewrite, and pass rule actions. |
Version 7.1 FMCs now support the following intrusion rule actions for FTD devices with Snort 3, including Version 7.0 devices:
To configure these new rule actions, edit the Snort 3 version of an intrusion policy and use the Rule Action drop-down for each rule. |
|||||||||||||||||||||||||||||
Snort 3 support for TLS-based intrusion rules. |
You can now create TLS-based intrusion rules to inspect decrypted TLS traffic with Snort 3. This feature allows Snort 3 intrusion rules to use TLS information. |
|||||||||||||||||||||||||||||
Snort 3 support for inspection of DCE/RPC over SMB2. |
Upgrade impact. Version 7.1 with Snort 3 supports DCE/RPC inspection over SMB2. After the first post-upgrade deploy to Snort 3 devices, existing DCE/RPC rules begin inspecting DCE/RPC over SMB2; previously these rules only inspected DCE/RPC over SMB1. |
|||||||||||||||||||||||||||||
Snort 3 support for intrusion rule recommendations. |
Version 7.1 FMCs now support intrusion rule recommendations for FTD devices with Snort 3, including Version 7.0 devices. To configure this feature, edit the Snort 3 version of an intrusion policy and click the Recommendations button (in the left pane, next to All Rules). |
|||||||||||||||||||||||||||||
Snort 3 support for ssl_version and ssl_state keywords. |
Upgrade impact. Version 7.1 with Snort 3 supports the ssl_version and ssl_state intrusion rule keywords. Cisco-provided intrusion policies include active rules using those keywords. You can also create, upload, and deploy custom/third party rules using them. In Version 7.0.x, we supported those keywords with Snort 2 only. With Snort 3, rules with those keywords did not match traffic, and thus could not generate alerts or affect traffic. There was no indication that the rules were not working as expected. After the first post-upgrade deploy to Version 7.1+ Snort 3 devices, existing rules with those keywords can match traffic. |
|||||||||||||||||||||||||||||
Identity Services and User Control |
||||||||||||||||||||||||||||||
Snort 3 captive portal support for interception of HTTP/2 traffic. |
You can now intercept and redirect HTTP/2 traffic for user authentication with captive portal. When a redirect is received by the browser, the browser follows the redirect and authenticates with idhttpsd (Apache web server) using the same process as the HTTP/1 captive portal. After authentication, idhttpsd redirects the user back to the original URL. |
|||||||||||||||||||||||||||||
Snort 3 captive portal support for hostname-based redirect. |
You can configure active authentication for identity policy rules to redirect the user’s authentication to a fully-qualified domain name (FQDN) rather than the IP address of the interface through which the user’s connection enters the device. The FQDN must resolve to the IP address of one of the interfaces on the device. By using an FQDN, you can assign a certificate for active authentication that the client will recognize, thus avoiding the untrusted certificate warning users get when being redirected to an IP address. The certificate can specify the FQDN, a wildcard FQDN, or multiple FQDNs in the Subject Alternate Names (SAN) in the certificate. New/modified screens: We added the Redirect to Host Name option in the identity policy settings. |
|||||||||||||||||||||||||||||
Encrypted Traffic Handling (TLS/SSL) |
||||||||||||||||||||||||||||||
Advanced TLS/SSL policy options. |
You can now configure the following advanced TLS/SSL policy options in the Advanced Settings tab on the SSL Policy page:
|
|||||||||||||||||||||||||||||
Encrypted Visibility Engine for visibility into encrypted sessions. |
Beta. You can enable the Encrypted Visibility Engine to gain visibility into an encrypted session without needing to decrypt it. The engine fingerprints and analyzes encrypted traffic. In FMC 7.1, the Encrypted Visibility Engine provides more visibility into encrypted traffic, including protocols such as TLS and QUIC. It does not enforce any actions on that traffic. The Encrypted Visibility Engine is disabled by default. You can enable it on the Advanced tab of an access control policy in the Experimental Features section. New/modified screens:
|
|||||||||||||||||||||||||||||
Service Policy |
||||||||||||||||||||||||||||||
Configure the maximum segment size (MSS) for embryonic connections. |
You can configure a service policy to set the server maximum segment size (MSS) for SYN-cookie generation for embryonic connections upon reaching the embryonic connections limit. This is meaningful for service policies where you are also setting embryonic connection maximums. New/modified screens: Connection Settings in the Add/Edit Service Policy wizard. |
|||||||||||||||||||||||||||||
Network Discovery |
||||||||||||||||||||||||||||||
Improved Snort 3 support for network discovery (remote network access support). |
With improvements to network discovery and remote network access support, Snort 3 is now at parity with Snort 2 for those features. The improvements include:
In Snort 3, application detection is always enabled for all networks by default. |
|||||||||||||||||||||||||||||
Event Logging and Analysis |
||||||||||||||||||||||||||||||
Snort 3 support for elephant flow identification and monitoring. |
With FTD running Snort 3, you can now identify elephant flows—single-session network connections that are large enough to affect overall system performance. By default, elephant flow detection is automatically enabled, and tracks and logs connections larger than 1GB/10 seconds. A new predefined search for connection events (Reason = Elephant Flow) allows you to quickly identify elephant flows. You can also use the health monitor to view active elephant flows on your devices, and to create a custom health dashboard to correlate elephant flow incidence with other device metrics such as CPU usage. To disable this feature or to configure the size and time thresholds, use the FTD CLI.New/modified FTD CLI commands:
|
|||||||||||||||||||||||||||||
Send intrusion events and retrospective malware events to the Secure Network Analytics cloud from the FMC. |
Upgrade impact. When you configure the system to send security events to the Stealthwatch cloud using Cisco Security Analytics and Logging (SaaS), the FMC now sends:
If you already enabled this feature, the FMC starts sending this information after a successful upgrade. |
|||||||||||||||||||||||||||||
New datastore for intrusion events improves performance. |
To improve performance, Version 7.1 uses a new datastore for intrusion events. After the upgrade finishes and the FMC reboots, historical events are migrated in the background, newest events first. As part of this migration, we deprecated intrusion incidents, the intrusion event clipboard, and custom tables for intrusion events. We also introduced two new fields in the intrusion event table: Source Host Criticality and Destination Host Criticality. |
|||||||||||||||||||||||||||||
NAT IP address and port information in connection and Security Intelligence events. |
For additional visibility into NAT translations, we added the following fields to connection and Security Intelligence events:
In the table view of events, these fields are hidden by default. To change the fields that appear, click the x in any column name to display a field chooser. |
|||||||||||||||||||||||||||||
Packet tracer enhancements. |
Version 7.1 updates the packet tracer interface for better usability. In addition, you can now:
New/modified FTD CLI commands:
|
|||||||||||||||||||||||||||||
Object Management |
||||||||||||||||||||||||||||||
Network object support for HTTP, ICMP, and SSH platform settings. |
You can now use network object groups that contain network objects for hosts or networks when configuring the IP addresses in the Threat Defense Platform Settings policy. |
|||||||||||||||||||||||||||||
Snort 3 support for network wildcard mask objects. |
You can now create and manage network wildcard mask objects on the Object Management page. You can use network wildcard mask objects in access control, prefilter, and NAT policies. |
|||||||||||||||||||||||||||||
Deployment preview enhancements for objects. |
You can now preview deployment changes to Geolocation, File List, and Security Intelligence objects. Updated screen: Preview column, click the Preview icon for a device to see the changes to the file list objects. . In the |
|||||||||||||||||||||||||||||
Integrations |
||||||||||||||||||||||||||||||
Support for Cisco ACI Endpoint Update App, Version 2.0 and remediation module. |
Version 2.0 of the Cisco ACI Endpoint Update App has the following improvements over previous versions:
A new Cisco ACI Endpoint remediation module is also available with this update. |
|||||||||||||||||||||||||||||
Usability, Performance, and Troubleshooting |
||||||||||||||||||||||||||||||
Health monitoring enhancements. |
We updated the health monitor as follows:
New/modified screens:
|
|||||||||||||||||||||||||||||
Deployment history enhancements. |
You can now bookmark a deployment job, edit the deployment notes for a job, and generate a report. |
|||||||||||||||||||||||||||||
Global search enhancements. |
Global search now has the following capabilities:
|
|||||||||||||||||||||||||||||
New walkthroughs. |
We added the following walkthroughs:
|
|||||||||||||||||||||||||||||
Snort memory usage telemetry sent to Cisco Success Network. |
For improved serviceability, we now send telemetry on Snort memory and swap usage, including out-of-memory events, to Cisco Success Network. We send this information for both Snort 2 and Snort 3. You can change your Cisco Success Network enrollment at any time. |
|||||||||||||||||||||||||||||
Snort 3 support for statistics on start-of-flow and end-of-flow events. |
For FTD with Snort 3, the output of the show snort statistics command now reports statistics on start-of-flow and end-of-flow events. |
|||||||||||||||||||||||||||||
Web interface changes: SecureX, threat intelligence, and other integrations. |
Version 7.1 changes these FMC menu options if you are upgrading from Version 7.0.2 or any later Version 7.0.x maintenance release.
|
|||||||||||||||||||||||||||||
FMC REST API |
||||||||||||||||||||||||||||||
FMC REST API services/operations. |
For information on changes to the FMC REST API, see What's New in 7.1 in the REST API quick start guide. |
Deprecated Features
Deprecated Feature |
Description |
||
---|---|---|---|
End of support: FMC 1000, 2500, 4500 |
You cannot run Version 7.1+ on the FMC models FMC 1000, 2500, and 4500. You cannot manage Version 7.1+ devices with these FMCs. |
||
End of support: ASA 5508-X and 5516-X |
You cannot run Version 7.1+ on the ASA 5508-X or 5516-X. |
||
End of support: NGIPS software (ASA FirePOWER/NGIPSv). |
Version 7.1 is supported on the FMC and on FTD devices only. It is not supported on ASA FirePOWER or NGIPSv devices. You can still use a Version 7.1 FMC to manage older devices — FTD as well as ASA FirePOWER and NGIPSv — that are running Version 6.5 through 7.0. |
||
Deprecated: Intrusion incidents and the intrusion event clipboard. |
Data and configurations can be deleted. We removed the intrusion incidents feature and the related intrusion event clipboard. The upgrade removes all data related to incidents, and deletes report templates sections that use the clipboard as a data source. Deprecated screens/options:
|
||
Deprecated: Custom tables for intrusion events. |
Custom tables can be deleted. Version 7.1 ends support for custom tables for intrusion events. The upgrade deletes custom tables that contain fields from the intrusion event table. When adding fields to a custom table (Analysis > Advanced > Custom Tables), you can no longer choose the Intrusion Events table as a data source. |
||
Deprecated: ECMP zones with FlexConfig. |
FlexConfig settings ignored. Can prevent deploy. You can now group interfaces in traffic zones and configure Equal-Cost-Multi-Path (ECMP) routing in the management center web interface. After upgrade, the system ignores ECMP zones configured with FlexConfig. You cannot deploy with equal-cost static routes exist and must assign their interfaces to an ECMP zone. |
||
Temporarily deprecated: Improved SecureX integration, SecureX orchestration. |
Can prevent upgrade. Version 7.1 temporarily deprecates the SecureX integration and orchestration improvements introduced in Version 7.0.2. The improved experience returns in Version 7.2. If you newly enabled SecureX integration in Version 7.0.2 or later maintenance release, you must disable the feature before you upgrade to Version 7.1. You can re-enable the feature after successful upgrade, using the older method. There are no upgrade issues if you enabled SecureX integration in Version 7.0.0 or 7.0.1, or if you upgrade to Version 7.2. |
||
Deprecated: Geolocation details. |
In May 2022 we split the GeoDB into two packages: a country code package that maps IP addresses to countries/continents, and an IP package that contains additional contextual data associated with routable IP addresses. The contextual data in the IP package can include additional location details, as well as connection information such as ISP, connection type, proxy type, domain name, and so on. The new country code package has the same file name as the old all-in-one package: Cisco_GEODB_Update-date-build. This allows deployments running Version 7.1 and earlier to continue to obtain GeoDB updates. If you manually download GeoDB updates—for example, in an air-gapped deployment—make sure you get the country code package and not the IP package.
|