Platform Features
|
Secure Firewall 3105.
|
We introduced the Secure Firewall 3105.
Minimum threat defense: Version 7.3.1
|
Network modules for the Secure Firewall 4100.
|
We introduced these network modules for the Secure Firewall 4100:
|
ISA 3000 System LED support for shutting down.
|
Support returns for this feature. When you shut down the ISA 3000,
the System LED turns off. Wait at least 10 seconds after that before
you remove power from the device. This feature was introduced in
Version 7.0.5 but was temporarily deprecated in Versions
7.1–7.2.
|
Support ends: Firepower 4110, 4120, 4140,
4150.
|
You cannot run Version 7.3+ on the Firepower 4110, 4120, 4140, or
4150.
|
Support ends: Firepower 9300: SM-24, SM-36, SM-44
modules.
|
You cannot run Version 7.3+ on the Firepower 9300 with SM-24, SM-36,
or SM-44 modules.
|
No support for Firepower 1010E (temporary).
|
The Firepower 1010E, which was introduced in Version 7.2.3, does
not support Version 7.3. Support will return in a future
release.
You cannot upgrade a Version 7.2.x Firepower 1010E to Version
7.3, and you should not reimage there either. If you have a
Firepower 1010E device running Version 7.3, reimage to a
supported release.
|
Firewall and IPS Features
|
TLS 1.3 support in SSL decryption policies, and configurable behavior
for undecryptable connections.
|
Upgrade impact. You can configure SSL decryption rules for
TLS 1.3 traffic. TLS 1.3 support is available when using Snort 3
only. You can also configure non-default behavior for undecryptable
connections. If you are using Snort 3, upon upgrade, TLS 1.3 is
automatically selected for any rules that have all SSL/TLS versions
selected; otherwise, TLS 1.3 is not selected. The same behavior
happens if you switch from Snort 2 to Snort 3.
We added TLS
1.3 as an option on the advanced tab of the add/edit rule dialog
box. We also redesigned the SSL decryption policy settings to
include the ability to enable TLS 1.3 decryption, and to configure
undecryptable connection actions.
See:
Advanced Criteria for SSL
Decryption Rules and Configure Advanced and
Undecryptable Traffic
Settings
|
Refined URL filtering lookup.
|
You can now explicitly set how URL filtering lookups occur. You can
select to use the local URL database only, both the local database
and cloud lookup, or cloud lookup only. We augmented the URL
Filtering system setting options.
See: Configuring URL Filtering
Preferences
|
Smaller VDB for lower memory
devices.
|
For VDB 363+, the system now installs a smaller VDB (also called
VDB lite) on lower memory devices running Snort 2. This
smaller VDB contains the same applications, but fewer detection
patterns. Devices using the smaller VDB can miss some
application identification versus devices using the full
VDB.
Note
|
The ability to install a smaller VDB begins in Version
6.4.0.17, but is temporarily deprecated in Version 6.5, 6.6,
6.7, 7.0–7.0.5, 7.1, 7.2.0–7.2.3, and
7.3.0–7.3.1. If you
upgrade from a supported version to an unsupported version,
you cannot install VDB 363+ on lower memory devices
running Snort
2.
|
Lower memory devices: ASA 5506-X series, ASA-5508-X, ASA-5512-X,
5515-X, 5516-X, 5525-X, and 5545-X
See: Updating System Databases and
Feeds
|
Interface Features
|
IPv6 support for virtual appliances.
|
Threat defense virtual now supports IPv6 in the following
environments:
See: Cisco Secure Firewall
Threat Defense Virtual Getting Started
Guide
|
DHCPv6 Client.
|
You can now obtain an IPv6 address from DHCPv6.
New/modified screens:
See: Configure Advanced Interface
Options
|
Administrative and Troubleshooting Features
|
Automatically update CA bundles.
|
Upgrade impact.
The local CA bundle contains certificates to access several Cisco
services. The system now automatically queries Cisco for new CA
certificates at a daily system-defined time. Previously, you had to
upgrade the software to update CA certificates. You can use the CLI
to disable this
feature.
New/modified CLI commands: configure cert-update
auto-update , configure cert-update
run-now , configure cert-update
test , show
cert-update
See: Cisco Secure Firewall Threat Defense
Command Reference
|
Skip Certificate Authority checking for trusted certificates.
|
You can skip the check if you need to install a local CA certificate
as the trusted CA certificate.
We added the Skip CA Certificate Check option
when uploading trusted CA certificates.
|
Combined upgrade and install package for Secure Firewall 3100.
|
Reimage impact.
In Version 7.3, we combined the threat defense install and
upgrade package for the Secure Firewall 3100, as
follows:
-
Version 7.1–7.2 install package:
cisco-ftd-fp3k.version.SPA
-
Version 7.1–7.2 upgrade package:
Cisco_FTD_SSP_FP3K_Upgrade-version-build.sh.REL.tar
-
Version 7.3+ combined package:
Cisco_FTD_SSP_FP3K_Upgrade-version-build.sh.REL.tar
Although you can upgrade threat defense without issue, you
cannot reimage from older threat defense and ASA versions
directly to threat defense Version 7.3+. This is due to a
ROMMON update required by the new image type. To reimage
from those older versions, you must "go through" ASA 9.19+,
which is supported with the old ROMMON but also updates to
the new ROMMON. There is no separate ROMMON updater.
To get to threat defense Version 7.3+, your options are:
|
Threat Defense REST API version 6.4 (v6).
|
The threat
defense REST API for software version 7.3 is version 6.4. You can use v6
in the API URLs, or preferentially, use /latest/ to signify you are
using the most recent API version that is supported on the device.
Note that the URL version path element for 6.4 is the same as all
other 6.x versions: v6.
Please re-evaluate all existing calls, as changes might have been
mode to the resource models you are using. To open the API Explorer,
where you can view the resources, log into device manager, then click the more options button () and choose API Explorer.
See: Cisco Secure Firewall Threat Defense
REST API Guide
|