- Introduction
- Supported Platforms and Environments in Version 6.2.0.x
- Management Capability in Version 6.2.0.x
- Features and Functionality
- Terminology and Documentation for Version 6.2.0.x
- Product Compatibility in Version 6.2.0.x
- Update vs. Reimage vs. Deploy
- Important Update Notes
- Update to Version 6.2.0.x
- Uninstall Version 6.2.0.x
- Resolved Issues
- Known Issues
- For Assistance
Known Issues
The following tables address known issues open at the time of publication of these release notes. For an updated list of known issues, run the provided query in the Bug Search Tool.
- Known Issues in Version 6.2.0.3
- Known Issues in Version 6.2.0.2
- Known Issues in Version 6.2.0.1
- Known Issues in Version 6.2.0
Known Issues in Version 6.2.0.3
The following table addresses open caveats at the time of publication of these release notes. If you have a Cisco support contract, use the following dynamic queries for an updated list of open caveats, run the provided query in the Bug Search Tool:
Caveat ID Number |
Description |
---|---|
Internal server error seen on the UI when we enable CC mode |
|
Prebuilt reports fail to generate immediately due to DiskManager handling of drains |
|
Time to upgrade from 6.2.0.3-362 to 6.2.2-1310 takes too long -- 3hr 27mins. |
|
White-List page throws error when automatically populated from events page |
Known Issues in Version 6.2.0.2
The following table addresses open caveats at the time of publication of these release notes. If you have a Cisco support contract, use the following dynamic queries for an updated list of open caveats, run the provided query in the Bug Search Tool:
Caveat ID Number |
Description |
---|---|
User groups are not available in access control rule after switching to ASDM management |
|
Internal error message while loading access control policy in Japanese environment |
|
AMP file detection on windows SMB shares fails after drive is mapped for 30 minutes or more. |
|
ASA to Threat Defense 6.1.0.2 Migration tool introduces special character "#" to migrate rules |
|
Mis-match between actual device version and Management Center stored version causes deploy failures |
|
Correlation events showing up with random SI Category |
|
estreamer certificate generates errors with a McAfee ESM generationQualifier verification failed |
|
SFDataCorrelator still in local management mode after deployed from Management Center |
|
SSL Policy goes out of date after Firepower Threat Defense failover |
|
Snort memcals for startup memory incorrect on Firepower Threat Defense |
|
Smart Licensing registration fails even after importing CA Cert into Trusted CA Objects |
|
Policy deployment failure when PF setting contains Security Zone associated with multiple interface |
|
Threat Defense ICMP platform settings security zones with multiple interfaces not handled properly |
|
synchronization and dhcpd daemon exited 100 time(s) while Registering |
|
Error message "Unable to translate SSL cipher suite 65535" needs cleaning up |
|
Manager gets deleted after upgrade on Firepower 9300 - 6.2.0.1-41 |
|
ADI process exits one time while registering Firepower Threat Defense device routed/transparent mode |
|
Domain join with subdomain with broader object schema fails |
|
SFDataCorrelator segfault due to null field in internally generated logoff event |
|
Should not allow configuration of multiple realms pointing to the same domain. |
|
UIMP continues to attempt import for deleted users |
|
User session propagation in Management Center stalls if bookmark is set to the future then corrected |
|
Deleting a user from the Firepower Management Center does not function |
Known Issues in Version 6.2.0.1
The following table addresses open caveats at the time of publication of these release notes. If you have a Cisco support contract, use the following dynamic queries for an updated list of open caveats, run the provided query in the Bug Search Tool:
Caveat ID Number |
Description |
---|---|
User groups are not available in AC rule after Offbox to Onbox switch |
|
SSL Policy goes out of date after FTD failover |
|
NGFW NAT policy apply failure after editing IPv6 network object |
|
synchronization and dhcpd daemon exited 100 time(s) while Registering a FTD to FMC |
|
ICMP Any in dst/src ports are saved incorrectly, which can result in broken pre-filter policy |
|
After a patch upgrade from 6.2.0-362, software version is not being updated in DatabaseInfo |
|
Manager gets deleted after upgrade on SSP3RU - 6.2.0.1-41 |
|
ADI process exited one time while registering FTD routed or transparent mode to 6.2.0.1-36 FMC |
|
Domain join with subdomain with broader object schema fails |
|
Should not allow configuration of multiple realms pointing to the same domain. |
|
When user cannot be identified change user display from 'Unknown' to something more intuitive |
|
Deleting a user from the FMC does not function |
Known Issues in Version 6.2.0
Caveat ID Number |
Description |
---|---|
CSCun43602 |
The configured IPv6 address for an ASA FirePOWER module does not display when you run the show module 1 details CLI command. |
CSCuw79243 |
If you deploy an intrusion policy to a clustered or stacked 7000 and 8000 Series devices (in Version 6.0.0 known as a high availability pair), Firepower incorrectly counts all devices in the cluster or stack rather than indicating one device for the cluster or stack. |
Traceback: ASA crash in thread name fover_health_monitoring_thread. |
|
If you deploy an intrusion policy with Drop when Inline enabled, intrusion events that use the detection_filter keyword and are set to drop and generate now display Dropped instead of Would be dropped. |
|
CSCux67809 |
Executing the show crypto key mypubkey rsa CLI command on an ASA FirePOWER running Firepower Threat Defense erroneously generates device output. |
CSCux64898 |
In some cases, if you deploy an access control policy with the default action set to Block and execute the configure network management-interface disable-event-channel CLI command, Firepower continues to generate intrusion and connection events when it should not. |
CSCux65770 |
In some cases, if you attempt to log into Firepower with the incorrect password, Firepower incorrectly locks you out of Firepower after two attempts instead of three attempts. |
Snort is not able to decode traffic. |
|
run_qemu_kvm.sh core dumped on 5506 when device low on memory. |
|
The Firepower Threat Defense device overwrites core files configuration of FXOS when it should not. |
|
CSCva40041 |
If you enable failopen on a series 3 device configured with inline sets and then update the device, the device may incorrectly drop link connectivity for up to 10 seconds before it goes into hardware bypass mode. |
CSCva40867 |
If you switch an ASA FirePOWER module from being managed by ASDM to being managed by an Firepower Management Center and the initial device registration fails, but the device eventually successfully registers to the Firepower Management Center, the network map does not update the status of the device after the failed registration attempt and the Firepower Management Center does not generate an connection events or file events for the device when it should. |
CSCva54597 |
Firepower does not deploy the correct Regular Expression Limits default values within the access control policy when you deploy configuration. |
CSCva74166 |
The show environment CLI command does not work on Firepower Threat Defense devices. |
CSCvb11320 |
If you edit latency-based performance setting values on the Advanced tab of the access control policy editor page and deploy to a registered Firepower Threat Defense device, Firepower does not save the correct latency rule values when it should. |
CSCvb39435 |
If you deploy a file policy to a device with an excessive amount of endpoints configured, Firepower may experience high CPU use and network latency. As a workaround, redeploy configuration. |
CSCvb46169 |
GRE tunnel flow matches QoS rule ID 0. |
CSCvb61021 |
The show ipv6 ospf neighbor CLI command does not work on Firepower Threat Defense devices. As a workaround, execute the system support diagnostic-cli CLI command and then execute the show ipv6 ospf neighbor CLI command again. |
CSCvb61805 |
Firepower Device Manager 5506 deployment takes about a minute more in Version 6.2.0. |
You cannot change the master role, remove a unit, or execute on a selected unit from a clustered Firepower Threat Defense device via the following CLI commands: cluster primary security module, cluster exec unit, and cluster remove unit. To use these commands, you must include the unit number as seen from the output of the show cluster info CLI command: cluster master unit unit-1-1. |
|
CSCvb62508 |
Missing suboptions under capture command from converged cli to capture only blacklisted blocked packets. |
Rate Limiting may not take effect on trusted FTP/TFTP data channel in a cluster deployment. |
|
CSCvb77003 |
Firepower Device Manager- Unable to filter connection events using zones. |
CSCvb79547 |
If you are using ASDM to manage an ASA FirePOWER module, access control policy comparison does not work. This means you cannot display the differences between your running configuration and your planned changes. |
CSCvb80626 |
In rare cases, Firepower Threat Defense Virtual with low memory allocation does not detect some of intrusion policy violations. |
CSCvb88724 |
The clear conn CLI command on the Firepower Threat Defense device only allows you to enter a single IP address for the source or destination; any connections matching the IP address for either the source OR destination are cleared. The CLI help shows that you can enter both a source and destination IP address, but you can only enter 1 address. |
ASA matches incorrect ACL with object-group-search enabled. |
|
CSCvc01792 |
Some Firepower Threat Defense commands are model-specific, but may be visible on non-supported models. If you enter an unsupported command, you see the following error: -ERROR: % Invalid input detected at '^' marker. Check your command in the Firepower Threat Defense Command Reference Guide for model limitations. |
CSCvc03720 |
The clear mac-address-table CLI command is only supported on devices deployed in transparent mode when it should be supported on devices deployed in transparent and routed mode. As a workaround, execute the system support diagnostic-cli CLI command for devices deployed in routed mode. |
CSCvc05098 |
If the active Firepower Management Center of a high availability pair fails and the standby Firepower Management Center continues to process traffic while the pair is in a degraded state, then the active Firepower Management Center recovers, Firepower incorrectly displays unknown user for events generated during the degraded state for up to 24 hours before correcting. |
CSCvc09167 |
Firewall rules may not be in sync with firmware rules following policy apply. |
Management interface receives no traffic after port flap or failover on 5506/5508/5516. |
|
CSCvc35890 |
If you deploy configuration, Firepower may experience a prolonged amount of time writing syslogs and incorrectly trigger Automatic Application Bypass (AAB) when it should not. |
ASA with FirePOWER module generates traceback and reloads. |
|
CSCvc41387 |
If you click the help icon next to the filter textbox, Firepower incorrectly generates an Error 404: Page not found error. As a workaround, search the Online Help for intrusion policy keywords. |
If intra-clustered Firepower Threat Defense devices configured with passive mode or inline tap interfaces experience fragmented traffic, virtual reassembly may fail and the device incorrectly drops traffic. As a workaround, restart the device. |
|
CSCvc50022 |
Firepower may not be able to process as many HTTP connections in Version 6.2.0 compared to Version 6.1.0. |
CSCvc51442 |
Firepower Threat Defense virtual: ESXi standalone having trouble with serial number. |
CSCvc51459 |
If you run the managed_pruning.pl CLI command on an Firepower Management Center and click Purge Event database & (2), the script generates an extraneous warning after purging the database. |
Reloading Active unit in Active/Standby ASA failover pair is not triggering a failover. |
|
CSCvc53140 |
OSPF retransmissions and VPN tunnels lost after Active ASA reload. |
CSCvc53558 |
If you add a 10GB management interface to a Firepower Management Center, adding fails and Firepower generates an unable to change mode for eth2 error. |
CSCvc54069 |
If you create a VPN connection with a reverse route that is same as the already present static route on a Firepower Threat Defense device, then restart the device, the static route breaks and you cannot successfully use the VPN connection. |
CSCvc55105 |
The web interface pages of a Firepower Management Center running Version 6.2.0 takes longer to load than the pages of a Firepower Management Center running Version 6.1.0.x |
A resource depletion issue can occur on the ASA 5516-X if more than 500 concurrent IPsec or SSL connections are established to the unit. This is unrelated to the maximum IPsec/IKE endpoint count and pertains only to IPsec (either ESP or NAT-T) or SSL connections. The resource depletion will trigger an error and prevent new IPsec or SSL connections from being created to the unit. This issue is specific to the ASA 5506/5508/5516-X family of devices, but is most likely to be seen with the ASA 5516-X. No other ASA FirePOWER modules are affected by this issue. |
|
CEP records edit page take minutes to load. |
|
CSCvc56717 |
In some cases, if Firepower experiences a database error and you attempt to create a domain, you may not be able to delete a domain or move a device to a domain. |
CSCvc56746 |
The Objects page in the FC2000 and FC4000 web interface takes more time to load in Version 6.2 compared to Version 6.1.x. |
CSCvc56767 |
The FC2000 web interface takes more time to save an access control policy in Version 6.2 compared to Version 6.1.x. |
Traffic drops for reverse UDP/TCP IPv6 traffic over IPv4 tunnel. |
|
CSCvc58132 |
When upgrading Firepower Threat Defense, Firepower may fail to detect applications during the upgrade. Issue will be automatically resolved once deployment is manually triggered post upgrade. |
CSCvc58296 |
In some cases, if you update Firepower and configure Open Shortest Path First (OSPF) in the Dynamic Routing tab of the Virtual router page (Devices > Devices Management > Virtual routers > Dynamic Routing), Firepower does not display the available routes when it should. As a workaround, restart the managed device. . |
CSCvc58453 |
Firepower Threat Defense devices running FXOS Version 2.1.1(64) do not support Firepower Version 6.1.0. |
ASA incorrectly processing negative numbers in wrappers, resulting in graphical webvpn issue. |
|
Firepower Management Center warnings needed during high availability configuration that configuration on standby will be wiped. |
|
CSCvc59613 |
If you assign both an active and standby MAC address to a registered Firepower 4100 series or Firepower 9300 high availability pair with the Add Interface MAC Address option in the High Availability tab of the Integration page and deploy, then edit the interfaces and delete the interface, Firepower does not delete the MAC address associated with the interface after synchronizing the pair and redeploying fails. As a workaround, delete both the interface and the MAC address associated with the interface, then synchronize changes and redeploy. |
CSCvc59811 |
If you place an access control rule configured to Allow a subdomain URL (site.example.com) above an access control rule configured to Block the domain URL (example.com), the system may block request to subdomain URL. As a workaround, create an access control to Allow each subdomain URL (site.example.com, site2.example.com, etc.) you do not want blocked instead of the rule to block the domain URL, then save and redeploy. |
SIP: 200 OK messages with multiple seqments not reassembled correctly. |
|
Tracking route is up while the reachability is down. |
|
ASA: File system becomes read-only after very long up time. |
|
Traceback in ASA Cluster Thread Name: qos_metric_daemon. |
|
Report Generation of large no of Events is failing. |
|
ASA traceback in Thread Name: Event mib process. |
|
ASAConfig uses wrong interface IDs after slave unit rejoins multi context ASA cluster. |
|
CSCvc65262 |
After Snort restart, UDP processing performance may decrease. |
Traceback observed on gtpv2_process_msg on cluster. |
|
CSCvc65470 |
In some cases, connection events and security intelligence events generated from identity policy activity show the Initiator User 0 instead of the username. |
CSCvc65528 |
Pages in the MC4000 web interface take more time to load in Version 6.2.0 compared to Version 6.1.x. |
CSCvc68358 |
The show lacp CLI command does not work on ASA 5585-X devices. |
CSCvc74395 |
If you deploy an access control policy containing an access rule with Original Client IP, logging enabled and an SSL rule with the default actions set to Decrypt - Resign, Firepower does not display the Action and Access control rule columns of some generated events in the Connection Events page . |
CSCvc75561 |
If you use non-ASCII characters in a Flex Config object, the Flex Config policy fails to deploy. As a workaround, replace the non-ASCII characters with the ASCII equivalents. |
CSCvc76439 |
If you create a GID:135 intrusion rule, the rule does not save and Firepower generates a failed to set the rule state error. |
CSCvc79719 |
SMB upload - Malware block miss on first attempt. |
CSCvc81525 |
In rare cases, Firepower Threat Defense devices managed by the Firepower Device Manager and ASA with FirePOWER Services devices managed with ASDM can experience an exhaustion of database handles, which prevents any attempt to upgrade to Version 6.2.0. Prior to running the upgrade, contact Cisco TAC to enable upgrade by restarting the appropriate processes. |
CSCvc82066 |
If you update a Firepower Management Center from Version 6.1.0 to 6.2.0 and deploy, deployment may fail and Firepower may generate a mtu 9188 ^ ERROR: % Invalid input detected at '^' marker. error message. As a workaround, change the MTU value before you update to Version 6.2.0. |
CSCvc92934 |
If you deploy an access control policy containing an access control rule configured to Allow a subdomain URL (site.example.com) placed before an access control rule configured to Block the domain URL (example.com) that references an SSL policy with decryption enabled, the system may inconsistently match traffic against the HTTPs certificate instead of the actual URL and navigating to the subdomain may get blocked when it should not. |