New Features in Cloud-Delivered Firewall Management Center 2025

December 15, 2025

Table 1. Features in Version 20251121

Feature

Minimum Threat Defense

Details

Deployment and policy management

Simultaneous editing of access control policies by multiple users

Any

In previous releases, if two or more users simultaneously edited an access control policy, the first user who saved would retain their changes, and all other users would immediately lose all of their edits. Now, these users have the ability to selectively merge their changes, and changes that do not conflict with the first user’s saved changes will automatically be accepted. This improves collaboration between users and reduces the need to lock the policy during edits.

Tenable vulnerability management

10.0.0

Tenable Vulnerability Management is a platform that helps organizations understand, report, and manage known vulnerabilities. When used with the Cloud-Delivered Firewall Management Center, the Tenable connector creates a dynamic object with a list of IP addresses known to have Common Vulnerability Exposures (CVEs) and populates those IP addresses as host entries.

Real-time Policy Analyzer and Optimizer

Any

This feature detects and reports anomalies, such as shadowing or redundancy, in access control rules, when they are being created or edited in the Cloud-Delivered Firewall Management Center in order to streamline policy management. To use this feature, enable AIOps Insights in Security Cloud Control.

Encrypted traffic handling

New decryption policy user interface, including basic and advanced policy creation

10.0.0

Easily create standard decryption policies using a new interface tailored to the most common and effective scenarios, with single-page certificate management. Or, stick with the legacy wizard and advanced rules-based policy editor.

After Firewall Management Center upgrade, existing policies are labeled as legacy policies and continue to work as before. You can switch from a standard policy to legacy, but not from legacy to standard.

Change server certificates without impacting decryption by using an internal certificate to decrypt/reencrypt traffic

10.0.0

You can now use a certificate and key defined in the decryption rule to decrypt traffic. This certificate and key can be the internal server's certificate or it can be a different certificate; in addition, you can change the certificate and key at any time. You can replace the certificate using the API, a system like the Automated Certificate Management Environment (ACME), or using Object Management.

Hardware

Secure Firewall 200

10.0.0

The Secure Firewall 200 is an affordable security appliance for branch offices and remote locations that balances cost and features. During deployment, the system alerts you to any unsupported configurations.

Limitations include:

  • No clustering or multi-instance mode.

  • Smaller vulnerability database.

  • Cloud-based URL filtering and malware analysis only—no local databases or analysis.

  • Less frequent Security Intelligence updates.

  • Minimal default system logging.

  • Limited health alerts.

  • Identity limits to user IPs, SXP/SGT mappings, endpoint profiles, and dynamic objects.

    Limits to IP mappings, users, SGTs, endpoint profiles

Version restrictions: In Version 10.0.0, the Secure Firewall 220 is the only supported device in the Secure Firewall 200 series.

Secure Firewall 6100

10.0.0

The Secure Firewall 6100 is an ultra-high-end firewall for demanding data center and telecom networks. It has exceptional price-to-performance, modular capability, and high throughput.

The Secure Firewall 6100 supports Spanned EtherChannel and Individual interface clustering for up to 4 nodes.

View field-replaceable memory module details for the Secure Firewall 6100

10.0.0

You can view details, including operational status, for the field-replaceable memory module on the Secure Firewall 6100.

New/modified screens: Choose Devices > Device Management, then edit the device and select the Device tab. In the System section, click View next to Inventory > Memory.

New/modified Firewall Threat Defense commands: show inventory

New/modified FXOS commands: show dimm detail

DC power supply for the Secure Firewall 4200

7.4.3, 7.6.2. 7.7.0

The FPR4200-PWR-DC for Secure Firewall 4200 is a 1500 W DC power supply. The dual power supply modules can supply up to 1500 W power across the input voltage range (48 VDC to 60 VDC). The load is shared when both power supply modules are plugged in and running at the same time.

Network module for the Secure Firewall 4200

10.0.0

The FPR4K-XNM-6X1SXF for the Secure Firewall 4200 is a 6-port 1-Gbps SFP hardware bypass network module that operates in SX multimode. This network module has built-in SFP transceivers.

High availability/scalability

More container instances (21) on the Secure Firewall 4225 in multi-instance mode

10.0.0

The Secure Firewall 4225 in multi-instance mode now supports 21 container instances. The previous limit was 14.

Cluster redirect: flow offload support for the Secure Firewall 4200 asymmetric cluster traffic

10.0.0

For asymmetric flows, cluster redirect lets the forwarding node offload flows to hardware. This feature is enabled by default but can be configured using FlexConfig.

When traffic for an existing flow is sent to a different node, then that traffic is redirected to the owner node over the cluster control link. Because asymmetric flows can create a lot of traffic on the cluster control link, letting the forwarder offload these flows can improve performance.

Added/modified commands: flow-offload cluster-redirect (FlexConfig), show conn , show flow-offload flow , show flow-offload info

IPsec flow offload for traffic on the cluster control link on the Secure Firewall 4200 in distributed site-to-site VPN mode

10.0.0

For asymmetric flows, cluster redirect lets the forwarding node offload flows to hardware. This feature is enabled by default but can be configured using FlexConfig.

When traffic for an existing flow is sent to a different node, then that traffic is redirected to the owner node over the cluster control link. Because asymmetric flows can create a lot of traffic on the cluster control link, letting the forwarder offload these flows can improve performance.

Added/modified commands: flow-offload cluster-redirect (FlexConfig), show conn , show flow-offload flow , show flow-offload info

Identity

Identity-based dynamic access control

7.3.0 (AD realm)

7.4.0 (Azure AD realm)

Handle traffic based on real-time user posture and risk by correlating identity and device context (from Cisco ISE or pxGrid Cloud) with Cisco Identity Intelligence (from Microsoft Entra ID or Cisco Duo).

pxGrid Cloud identity source

7.3.0 (AD realm)

7.4.0 (Azure AD realm)

The Cisco Identity Services Engine (Cisco ISE) pxGrid Cloud Identity Source enables you to use subscription and user data from a Cisco ISE server or cluster Cisco ISE in access control rules.

Logging and analysis features

Send security events to Splunk or other SIEM via syslog

10.0.0

A new Splunk integration wizard (Integrations > Splunk) and updated logging options in access control make it easier to send security events to Splunk (or any other SIEM via syslog)..

Generate and send protocol-aware (enriched) inspector logs via syslog

10.0.0

You can generate protocol-aware (enriched) inspector logs for traffic that you specify. Send these logs via syslog to Splunk or to any syslog server configured as an alert.

To use this feature, enable advanced logging in your access control policy's advanced settings. Then, use access control rules to pinpoint the traffic where you want advanced logs. In those rules, enable the protocols you want to inspect.

To receive alerts when there are communication issues between devices and the syslog server, enable the Snort 3 Statistics module in the device health policy.

Packet data included with intrusion events sent to Cisco Security Cloud

10.0.0

Packet data is now included with intrusion events sent to Cisco Security Cloud.

Model migration

Migrate Firepower 4100/9300 to Secure Firewall 3100, 4200, and 6100

Any (source) 7.4.1 (target)

Migrate to the Secure Firewall 3100, 4200, and 6100 from:

  • Firepower 4112, 4115, 4125, 4145

  • Firepower 9300: SM-40, SM-48, SM-56

Migrate Firepower 1010 to Secure Firewall 200 and 1200

Any (source) 7.6.0 (target)

Migrate the Firepower 1010 and 1010E to the Secure Firewall 200 and 1200.

Performance and resiliency

Block depletion autorecovery for clusters

10.0.0

The firewall block depletion fault manager introduced in Version 7.7.0 now supports clustered devices. Fault monitoring is automatically enabled on new and upgraded devices. To disable, use FlexConfig.

Other performance and resiliency improvements

Feature dependent

We made performance and resiliency improvements to:

  • Deploying configuration changes

  • Event logging to external servers such as syslog or Cisco Security Cloud, for the Secure Firewall 4200 and 6100

  • Install and upgrade

  • High availability for Firewall Threat Defense

  • Snort ML

  • Zero-touch provisioning

Public and private cloud

Firewall Threat Defense Virtual for Microsoft Hyper-V

10.0.0

Firewall Threat Defense Virtual now supports Microsoft Hyper-V.

Larger default disk size and the ability to resize the disk post-deployment

10.0.0

Firewall Threat Defense Virtual supports dynamic disk expansion on all virtual platforms. This capability optimizes disk utilization on high-capacity systems (for example, systems with 64 vCPUs and 128 GB RAM), ensuring that large core dump files do not trigger disk-space alerts.

Unlimited performance tier (FTDvU) for VMware and KVM

10.0.0

Firewall Threat Defense Virtual for VMware and KVM now support an unlimited performance tier (FTDvU). This tier does not rate limit and the RA VPN session limit depends on the allocated resources:

  • 20,000 sessions with 32 vCPU and 64 GB RAM

  • 32,000 sessions with 64 vCPU and 128 GB RAM

Azure MANA NIC support

10.0.0

Firewall Threat Defense Virtual for Microsoft Azure now supports MANA NIC hardware, which is optimized for enhanced networking performance.

Supported instances: Standard_D8s_v5, Standard_D16s_v5

Nutanix AOS 6.8 support

10.0.0

Firewall Management Center Virtual and Firewall Threat Defense Virtual for Nutanix now support Nutanix AOS 6.8. This includes Virtual Private Cloud (VPC) support, whose flexible and cloud-like network segmentation and isolation allows you to effectively design and scale secure multi-tenant architectures.

OpenStack Caracal support

10.0.0

Firewall Management Center Virtual and Firewall Threat Defense Virtual for OpenStack now support the Caracal release.

OCI Ampere Compute instances

10.0.0

Firewall Threat Defense Virtual for OCI now supports Flex instances powered by an Ampere ARM-based processor.​ ARM architecture provides high performance with lower power consumption, enabling cost-efficient scaling.

Supported instances: VM.Standard.A1.Flex, VM.Standard.A2.Flex

Secure Boot and UEFI firmware support

10.0.0

Firewall Threat Defense Virtual is now compatible with UEFI-based virtual machines. This modern firmware interface replaces legacy BIOS, improves boot performance, and provides enhanced hardware/VM compatibility.

Secure Boot ensures that only signed and trusted bootloaders, kernel modules, and drivers are executed when the VM starts. It improves the virtual appliances security.

Routing

Use PBR to handle traffic based on custom application patterns.

10.0.0

You can now use policy based routing to handle traffic using custom application patterns (basic supported from Version 7.7.0). Create an advanced custom application detector by uploading a Lua file with your detection pattern. Then, use the detector in an extended ACL in your PBR policy.

See: Policy Based Routing

IPv6 router advertisements assign RDNSS/DNSSL

10.0.0

You can now configure recursive DNS server (RDNSS) and DNS search list (DNSSL) options to provide DNS servers and domains to SLAAC clients using router advertisements.

New/modified screens: Devices > Device Management > Interfaces > Add/Edit Interfaces > IPv6 > Settings

New/modified commands: show ipv6 nd detail , show ipv6 nd ra dns-search-list , show ipv6 nd ra dns server , show ipv6 nd summary

Threat detection and application identification

EVE improvements

10.0.0 (widgets)

Any (all others)

EVE improvements include:

  • EVE configuration moved from the access control policy advanced settings to the main access control policy page (in the More drop-down list).

  • New monitor and protect modes. The monitor mode allows you to see EVE verdicts without blocking.

  • Five-level threat confidence scale now only two levels: high and very high.

  • EVE is now automatically used for application detection when you enable EVE.

  • EVE exceptions are now objects, and are automatically shared across all access control policies.

  • Security-related connection events now include those for connections with malware processes detected by EVE at higher threat confidence levels.

  • New EVE widgets on the Summary Dashboard provide information on targeted resources, as well as on connections blocked over time. Note that new dashboard widgets only show data for Version 10+ devices.

Default ports in application-based access control rules

Any with Snort 3

For access control rules, a new Application Default option on the Applications tab lets you limit the rule to the application's default ports. You can also specify that the application be identified on Any port, which is the system's previous behavior.

Note that any specification on the Ports tab overrides these options. You can use the Ports tab to limit the rule to one, multiple, or a range of ports.

Dynamic objects and security group tags in DNS rules

10.0.0

You can configure DNS rules in the DNS policy to use dynamic objects or security group tags (SGT). If you are using these types of objects in access control rules already, you can now extend their use to your DNS policy.

We added the Dynamic Attributes tab to the add/edit DNS rule dialog box.

HTTP command line injection attack detection with Snort ML

10.0.0

Snort ML now detects HTTP command line injection attacks.

The snort_ml inspector is currently disabled in all default policies except maximum detection. The intrusion rule the generates an event when the snort_ml detects an attack (GID:411 SID:1) is also currently disabled in all default policies except maximum detection.

Portscan detection for clusters

10.0.0

You can configure threat detection at the cluster level. For nodes in a cluster, detection and prevention happen at the cluster level. Portscans can be detected when they happen across nodes or in an individual node. Shunned hosts are shunned on all devices in the cluster. Shuns are released at the same time on all nodes. Statistics are available at the cluster level.

Troubleshooting and serviceability

MTU ping test on cluster node join provides more information by trying smaller MTUs

Any

When a node joins the cluster, it checks MTU compatibility by sending a ping to the control node with a packet size matching the cluster control link MTU. If the ping fails, it tries the MTU divided by 2 and keeps dividing by 2 until an MTU ping is successful. A notification is generated so you can fix the MTU to a working value and try again. We recommend increasing the switch MTU size to the recommended value, but if you can't change the switch configuration, a working value for the cluster control link will let you form the cluster.

New/modified commands: show cluster history

Improved cluster control link health check with high CPU

Any

When a cluster node CPU usage is high, the health check will be suspended, and the node will not be marked as unhealthy. This feature is enabled by default when the CPU usage reaches 90% but can be configured using FlexConfig.

New/modified FlexConfig commands: cpu-healthcheck-threshold

Ensure temporarily unavailable nodes can rejoin an oversubscribed cluster

10.0.0

Prioritizing critical control traffic increases resiliency in high availability and clustered deployments, especially when forming high availability or rejoining a cluster during times of heavy load.

New/modified commands: show asp priority-polling , show cluster info trace , show failover trace

Deployment restrictions: Not supported with container instances

Platform restrictions: Supported with Secure Firewall 3100, 4200, and 6100 only

Use the packet tracer to modify PCAPs

10.0.0

You can now use the packet tracer to modify the source and destination IP address, source and destination port, and VLAN ID of a PCAP. In transparent mode, you can also modify the destination MAC address. You can then run a trace with the modified PCAP.

Generate a kernel dump on demand, or automatically on crash

10.0.0

You can now use the CLI to configure most hardware devices to generate a Linux kernel dump on crash. After you enable this feature, the device must reboot for it to take effect. Using the force keyword reboots the device and generates a kernel dump immediately. Or, manually reboot the device later. The upgrade automatically enables this feature.

New CLI command: system support kernel-crash-dump

Platform restrictions: Supported on all hardware devices except the Secure Firewall 200 and ISA 3000.

Recovery-config mode support for NAT and other interface commands

10.0.0

Recovery-config mode now supports NAT and related object and object-group commands.

It also supports the following interface commands:

  • duplex

  • fec

  • negotiate-auto

  • speed

These interface commands, in addition to shutdown, are not supported in recovery-config mode on the cluster control link or failover link.

New/modified diagnostic CLI (system support diagnostic-cli ) command: configure recovery-config

Platform restrictions: Not supported with the Firepower 4100/9300, ISA 3000, or virtual firewall. Not supported for the Secure Firewall 3100/4200 in multi-instance mode.

Minimal system logging

10.0.0

You can now configure minimal (notice and above) system logging. For most devices, the default is full logging. For the new Secure Firewall 220, the default is minimal logging.

New/modified CLI commands: system support logging-show , system support logging-full , system support logging-minimal

Upgrade

New device and chassis upgrade wizard

Any

A new, streamlined upgrade wizard makes it easier to select and prepare devices for upgrade, and to identify issues preventing upgrade.

Note that the Firewall Threat Defense wizard takes advantage of a new prepare-only option for unattended mode. This means that while the wizard copies packages and checks readiness, you may see messages about unattended mode running even if you did not explicitly start it.

Prepare-only and skip-checks options for unattended Firewall Threat Defense upgrade

Any

With unattended Firewall Threat Defense upgrades:

  • Prepare for upgrade only—copy packages and check readiness, but do not perform the actual upgrade.

  • Skip readiness checks for devices that already passed.

These new options are available when you start unattended mode.

New options for downloading upgrade packages

Any

You can now:

  • Prevent devices from downloading upgrade packages from the internet. That is, you can now require that devices get upgrade packages from the Firewall Management Center or an internal server, even if the devices have internet access.

  • Specify how long devices retry failed downloads from an internal server or the internet. This setting does not apply to transfers between the Firewall Management Center and device.

New/modified screens: Administration > Product Upgrades > Global upgrade settings

Usability

Redesigned menus for the Firewall Management Center

Any

We redesigned the Firewall Management Center menus to be more intuitive and consistent with the Cisco Security Cloud user interface. A main, single-column menu provides a subset of your most used items, while all items are visible in expanded mode. You can customize which items to include on the main menu to suit your priorities. Preferences are per user.

Existing and renamed top-level menus include:

  • Overview is now Insights & Reports

  • Analysis is now Events & Logs

  • Policies, Devices, and Objects are the same

  • Integration is now Integrations

  • System (system gear icon) is now Administration and appears in the left navigation

New top-level menus include:

  • Secure Connections

  • Troubleshooting

Some submenus were moved to new main menu locations.

Device Management page enhancements

Any

A redesigned user interface has been launched for the Device Management page, offering better usability and enhanced performance.

Key improvements include:

  • Advanced Search: Find devices more easily using multiple device-related criteria for more precise results.

  • Device Status Banner: Quickly view the number of devices in Normal, Error, and Offline states, displayed with a color-coded legend for easy identification.

  • Performance Enhancements: Enjoy faster page loading time and pagination that supports up to 1,000 devices per page.

  • Streamlined Device Actions: Perform device actions and bulk operations more efficiently through an intuitive side panel.

  • Centralized Troubleshooting: Access diagnostic tools such as Packet Tracer and Packet Capture from a single, convenient troubleshooting panel.

Note

 

This enhanced interface is currently in a preliminary phase. You can switch back to the legacy UI to access any features that are not yet available in the new interface.

Updated screens: Go to Devices > Device Management and enable the New Device Management UI toggle button.

VPN

ACME-based TLS certificate management for remote access VPN

10.0.0

You can now use an ACME certificate to authenticate a managed device as an RA VPN gateway.

New/modified screens: Objects > PKI > Cert Enrollment > Add Cert Enrollment > Enrollment Type > ACME

New/modified commands: crypto ca trustpoint

Site-to-site VPN tunnels over IPsec VTIs preserve SGT metadata

10.0.0

Cisco TrustSec uses security group tags (SGTs) to control access and enforce traffic on a network. This option enables SGT propagation over SVTIs and DVTIs of route-based and SD-WAN VPN topologies. To enable SGT propagation on a specific SVTI or DVTI, configure it in individual devices.

New/modified screens:

  • Secure Connections > Site-to-Site VPN & SD-WAN > SD-WAN Topology > Advanced Settings

  • Secure Connections > Site-to-Site VPN & SD-WAN > Route-based VPN > Advanced > Tunnel

Site-to-site VPN hub support for ECMP load balancing with dynamic VTIs

10.0.0

You can now enable Equal Cost Multi-Path (ECMP) on the dynamic VTIs of hub devices. All virtual access interfaces on the hub connecting to the same spoke are grouped into an ECMP zone.

New/modified screens:

  • Secure Connections > Site-to-Site VPN & SD-WAN > SD-WAN Topology > Add Hub

  • Secure Connections > Site-to-Site VPN & SD-WAN > Route-based VPN > Hub

Site-to-site VPN support for BFD-based failover

10.0.0

You can now enable the BFD routing protocol on the SVTIs and DVTIs of route-based and SD-WAN VPN topologies.

New/modified screens:

  • Secure Connections > Site-to-Site VPN & SD-WAN > SD-WAN Topology > Advanced Settings

  • Secure Connections > Site-to-Site VPN & SD-WAN > Route-based VPN > Advanced > Tunnel

Distributed site-to-site VPN with clustering for the Secure Firewall 4200

10.0.0

A cluster on the Secure Firewall 4200 supports site-to-site VPN in distributed mode. Distributed mode provides the ability to have many site-to-site IPsec IKEv2 VPN connections distributed across members of a cluster, not just on the control node (as in centralized mode). This significantly scales VPN support beyond centralized VPN capabilities and provides high availability.

Added/modified commands: cluster redistribute vpn-sessiondb , show cluster vpn-sessiondb , cluster vpn-mode , show cluster resource usage , show vpn-sessiondb , show conn detail , show crypto ikev2 stats

Zero trust access

ACME trustpoint as identity certificate for zero trust access

10.0.0

You can choose an ACME certificate for authenticating a managed device as a SAML SP for a zero-trust application policy. ACME certificates automate the lifecycle management of SSL and TLS certificates, including their auto-renewal.

New/modified screens: Objects > PKI > Cert Enrollment > ACME

New/modified commands: crypto ca trustpoint

IPv6 support for zero trust access

10.0.0

Clientless ZTNA now provides secure access to applications connected over IPv6 networks.

Limitations: IPv6 source NAT for applications is only for homogeneous scenarios such as NAT66 and NAT44. NAT64 and NAT46 are not supported.

New/modified screens: Policies > Zero Trust Application > Clientless Policy > Add Application

New/modified CLIs: show running-config zero-trust

Deprecated features

End of support: Firewall Threat Defense Version 7.0.x

10.0.0

Cloud-Delivered Firewall Management Center stopped managing Firewall Threat Defense devices, Version 7.0.x, as of December 15, 2025. For more information, see frequently asked question.

Deprecated: Enable a DHCP server on the firewall management interface

10.0.0

We deprecated these firewall CLI commands:

  • configure network ipv4 dhcp-server-enable

  • configure network ipv4 dhcp-server-disable

  • show network-dhcp-server

See: Cisco Secure Firewall Threat Defense Command Reference

Deprecated: Secure Network Analytics manager-only deployments

Any

You can no longer configure a Secure Network Analytics manager-only deployment to store events. Note that manager-only deployments are deprecated in Secure Network Analytics Version 7.5.1.

Although existing manager-only integrations continue to work, we recommend you switch to a single-node data store deployment with the latest supported version of Secure Network Analytics. This allows you to take advantage of new features, resolved issues, and performance improvements.

End of support: VMware vSphere/VMware ESXi 6.5, 6.7, 7.0, and 7.5

Any

Upgrade impact. Upgrade VMware before you upgrade the software.

We discontinued support for virtual deployments on VMware vSphere/VMware ESXi 6.5, 6.7, 7.0, and 7.5. Upgrade your hosting environment to Version 8.0 before you upgrade any virtual appliance.

Version restrictions: Versions 7.3.x and 7.4.0–7.4.1 are not qualified on VMware 8.0. If you run any of these versions, upgrade to VMware 8.0 first. Move to the next step as soon as possible. For best results, perform a multi-step upgrade: first the virtual appliance to 7.4.2–7.7.x, then VMware, then the virtual appliances again.

Deprecated: Monitor device revert in the Message Center

Any

You can no longer monitor device revert from the Message Center. Instead, use the Device Management page (Devices > Device Management). On the Upgrade tab, click View Details next to the device you are reverting.

Deprecated: Selected walkthroughs

Any

Some walkthroughs are no longer available. For a list of supported walkthroughs by version, see Walkthroughs in Secure Firewall Management Center.

March 13, 2025

Table 2. Features in Version 20250219

Feature

Minimum Threat Defense

Details

Platform

Threat defense Version 7.7.0 support.

7.7.0

You can now manage threat defense devices running Version 7.7.0.

Secure Firewall 1230, 1240, and 1250 (rack-mount).

7.7.0

We introduced the Secure Firewall CSF-1230 and CSF-1240:

  • 8x1Gbps RJ-45 1000BASET/2.5BBASE-T copper

  • 4x1Gbps SFP+ optical

And the Secure Firewall CSF-1250:

  • 8x2.5Gbps1000BASET/2.5BBASE-T copper

  • 4x2.5Gbps SFP28 optical

See: Cisco Secure Firewall CSF-1230,CSF-1240, and CSF-1250 Hardware Installation Guide

Optical transceivers for the Secure Firewall 4200.

7.7.0

The Secure Firewall 4200 now supports these optical transceivers on the FPR4K-X-NM-2X200/400G network module: QDD-400G-DR4-S, QDD-4x100G-FR-S, QDD-4x100G-LR-S, QDD-400G-SR4.2-BD, QDD-400G-FR4-S, QDD-400G-LR4-S, QDD-400-CUxM, QDD-400-AOCxM, QDD-2X100-LR4-S, QDD-2X100-SR4-S, QDD-4ZQ100-CUxM.

See: Cisco Secure Firewall 4215, 4225, and 4245 Hardware Installation Guide

Secure Firewall 1210CP IEEE 802.3bt support (PoE++ and Hi-PoE).

7.7.0

We made the following improvements related to support for IEEE 802.3bt:

  • PoE++ and Hi-PoE—Up to 90W per port.

  • Single- and dual-signature powered devices (PDs).

  • Power budgeting is done on a first-come, first-served basis.

  • Power budget fields were added to show power inline .

New/modified screens: Devices > Device ManagementInterfaces > PoE

New/modified commands: show power inline

See: Regular Firewall Interfaces, Cisco Secure Firewall Threat Defense Command Reference.

Instances for AWS, Azure, and GCP.

7.7.0

We added instances for and Firewall Threat Defense Virtual from the following families:

  • AWS (Amazon Web Services): C6i and C6a

  • Azure (Microsoft Azure): Dv4 and Dv5

  • GCP (Google Cloud Platform): E2, N1, N2D, C2D

See: Cisco Secure Firewall Threat Defense Virtual Getting Started Guide

Device Management

Recovery-config mode for emergency on-device configuration and out-of-band configuration detection on the Firewall Management Center.

7.7.0

If you lose the management connection to your device, you can make select configuration changes directly at the device CLI to:

  • Restore the management connection if you are using a data interface for manager access.

  • Make select policy changes that can't wait until the connection is restored.

After the management connection is restored, the Firewall Management Center will detect the configuration changes on the device. It does not automatically update the device configuration in the Firewall Management Center; you must view the configuration differences, acknowledge that the device configuration is different, and then manually make the same changes in the Firewall Management Center before you deploy.

New/modified screens: Devices > Device ManagementDevice > Health > Out of Band Status

New/modified diagnostic CLI (system support diagnostic-cli ) command: configure recovery-config

See Device Settings, Cisco Secure Firewall Threat Defense Command Reference

Interfaces

Sync Device is now Sync Interfaces.

Any

Sync Device was changed to Sync Interfaces to indicate that this function is only for interface changes. This function no longer detects changes made to the manager access interface; see Devices > Device ManagementDevice > Management > Manager Access Details: Configuration.

Other out-of-band configuration changes performed at the diagnostic CLI in recovery-config mode need to be discovered at Devices > Device Management>Device > Health > Out of Band Status.

New/modified screens: Devices > Device Management>Interfaces

See: Interfaces

High Availability/Scalability

Threat defense high availability supported with redundant manager access data interfaces.

7.7.0

You can now use redundant manager access data interfaces with Firewall Threat Defense high availability.

See: High Availability

Autoscale for Firewall Threat Defense Virtual for Azure clusters.

7.7.0

We now support autoscale for new Firewall Threat Defense Virtual for Azure clusters. You cannot convert upgraded deployments.

Platform restrictions: Not supported with FTDv5 or FTDv10.

See: Cisco Secure Firewall Threat Defense Virtual Getting Started Guide

VPN: Remote Access

Geolocation-based RA VPN.

7.7.0

You can now allow or block remote access VPN connections based on country or region. Connections that don't meet your location-based criteria are blocked before authentication and logged for auditing purposes.

New/modified screens: Objects > Object Management > Access List > Service Access

See: Remote Access VPN

Easily configure posture assessment criteria for dynamic access policies.

7.2.0

In dynamic access policies (DAP), you can now easily configure posture assessment criteria—that is, file, process, or registry endpoint attributes with unique endpoint IDs that you can then use to configure DAP records.

New/modified screens:

  • Devices > Dynamic Access Policy > Add/Edit Policy > Posture Assessment Criteria

  • Devices > Dynamic Access Policy > Add/Edit Policy > Add/Edit DAP Record > Advanced > Endpoint Criteria

See: Dynamic Access Policies

Routing

BGP AS-Override.

7.7.0

Firewall Threat Defense can now overwrite an ASN received from a peer with its own BGP ASN. This allows other routers peering with Firewall Threat Defense to accept advertised prefixes without detecting a loop based on the contents of the AS_PATH attribute.

New/modified screens: Devices > Device Management > Add/Edit Device > Routing > BGP IPv4 or IPv6 > Add/Edit Neighbor > AS Override

See: BGP

Access Control: Threat Detection and Application Identification

Easily block traffic based on TLS version and server certificate status.

7.7.0

New options in the decryption policy wizard make it easier to block traffic based on TLS version and server certificate status. Enabling these options adds predefined rules that do this. After the policy is created, you can edit, reorder, or delete the rules.

New/modified screens: Policies > Decryption > Create Decryption Policy > Blocking

See: Decryption Policies, Decryption Rules

Use EVE to easily bypass decryption for low-risk connections to trusted URLs.

7.7.0

A new Client Threat decryption rule condition and a new option in the decryption policy wizard and make it easier to bypass decryption to trusted URLs for low risk (as identified by EVE) connections.

New decryption policies now include predefined rules that do this, using Category (trusted) and Client Threat (low) conditions. The Client Threat condition is new and represents the EVE verdict. For outbound decryption, you enable/disable these rules as part of creating the policy. For inbound decryption, the rules are disabled by default. After the policy is created, you can edit, reorder, or delete the rules.

New/modified screens: Policies > Decryption > Create Decryption Policy > Decryption Exclusions

Version restrictions: You cannot deploy policies with Client Threat rules to older devices.

See: Decryption Policies, Decryption Rules

New EVE exceptions.

7.7.0

You can now bypass EVE (encrypted visibility engine) block verdicts based on source network and on destination dynamic attributes. And, when bypassing based on network, you can now use FQDN network objects. Previously, you could only block based on destination network or EVE process name and could not use FQDNs.

New/modified screens:

  • To add an exception from the access control policy, in the advanced settings, edit and enable Encrypted Visibility Engine, enable Block Traffic Based on EVE Score, and Add Exception Rule.

  • To add an exception from the Unified Events viewer, right-click a connection that was blocked by EVE and select Add EVE Exception.

See: Cisco Secure Firewall Management Center Snort 3 Configuration Guide

Access Control: Identity

Multicloud Defense connector for Dynamic Attributes Connector.

Any

The Multicloud Defense connector sends dynamic application address objects to the configured Cloud-Delivered Firewall Management Center.

For more information, see the Address Objects chapter in the Cisco Multicloud Defense User Guide and address object API documentation.

Health Monitoring

Get alerts before service authentication certificates expire.

7.7.0

To help prevent unexpected service disruptions, a new Certificate Monitoring health module alerts you before service authentication certificates expire on managed devices.

New/modified screens: System (system gear icon) > Health > Policy > Health Modules > Certificate Monitoring

See: Health

Independently configure health monitoring for physical and subinterfaces.

Any

You can now disable health monitoring for a physical interface while continuing to monitor and receive health alerts for its subinterfaces. You can disable alerts permanently or temporarily.

To do this, configure the device for health monitoring exclusion, edit that configuration to enable module-level exclusion, and finally configure exclusion settings for the Interface Settings health module.

New/modified screens: System (system gear icon) > Health > Exclude

See: Health

Upgrade

Devices with internet access download upgrade packages from the internet.

Any (some restrictions)

You can now begin device and chassis upgrades without the upgrade package. At the appropriate time, devices will get the package directly from the internet. This saves time and Firewall Management Center disk space.

Devices without internet access can continue to get the package from the Firewall Management Center or an internal server. Note that devices try the internal server (if configured) before either the internet or the Firewall Management Center. If the internal server download fails, newer devices with internet access try the internet then the Firewall Management Center, while older devices and devices without internet access just try the Firewall Management Center. (In this context, "newer" means Firewall Threat Defense 7.6+ or chassis 7.4.1+.)

Restrictions: Firewall Management Center and devices must be able to access the internet. There is no way to force a device with internet access to try the Firewall Management Center before it tries the internet. Not supported for hotfixes.

Download location: https://cdo-ftd-images.s3-us-west-2.amazonaws.com/

See: Cisco Secure Firewall Threat Defense Upgrade Guide for Cloud-Delivered Firewall Management Center

Upgrade Firewall Threat Defense or chassis without a manual readiness check.

7.7.0

You no longer have to run time-consuming pre-upgrade readiness checks for Firewall Threat Defense or chassis upgrades. Instead, these checks are now regularly run by the system and reported in the health monitor. This allows you to preemptively fix any issues that will block upgrade.

  • The Database module, new for devices, manages monitors database schema and configuration data (EO) integrity.

  • The FXOS Health module, new for devices, monitors the FXOS httpd service on FXOS-based devices.

  • The Disk Status module is now more robust, alerting on disk health issues reported by daily running of smartctl (a Linux utility for monitoring reliability, predicting failures, and performing other self-tests).

Version restrictions: This feature is supported for upgrades from Version 7.7+. Devices running earlier versions still require the in-upgrade readiness check.

See: Cisco Secure Firewall Threat Defense Upgrade Guide for Cloud-Delivered Firewall Management Center

Administration

Cancel Firewall Threat Defense backups, view detailed backup status.

7.7.0

The Message Center now displays detailed backup status for the Firewall Management Center and its devices. You can also cancel in-progress device backups.

See: Backup/Restore

Clear disk space utility.

7.7.0

A new utility allows you to click to safely remove unneeded files such as old backups, content updates, and troubleshooting files. Low disk space can reduce performance, prevent upgrade, and increase the risk of accidentally deleting important files when trying to recover space.

New/modified screens: We added a Clear disk space button to the Disk Usage widget on device health dashboards: System (system gear icon) > Health > Monitor.

See: Troubleshooting

Send detailed Firewall Management Center audit logs to syslog. Any

You can stream configuration changes as part of audit log data to syslog by specifying the configuration data format and the hosts. The Firewall Management Center supports backup and restore of the audit configuration log.

New/modified screens: System (system gear icon) > Configuration > Audit Log > Send Configuration Changes

See: System Configuration

Performance and Resiliency

Faster failover for high availability Firewall Threat Defense.

7.7.0

With Firewall Threat Defense high availability failover, the new active device generates multicast packets for each MAC address entry and sends them to all bridge group interfaces, which prompts the upstream switches to update their routing tables. This task now runs asynchronously in the data plane, privileging critical failover tasks in the control plane. This makes failover faster, reducing downtime.

See: High Availability

High-bandwidth encrypted application traffic bypasses unnecessary intrusion inspection.

7.7.0

Specific high-bandwidth encrypted application traffic now bypasses unncessary intrusion inspection even if the connection matches an Allow rule. Intrusion rule (LSP) and vulnerability database (VDB) updates can change the applications bypassed but right now they are: AnyConnect, IPsec, iCloud Private Relay, QUIC (including HTTP/3), Webex Media, Secure RTCP.

Configure Firewall Threat Defense autorecovery from block depletion using FlexConfig.

7.7.0

To reduce downtime due to service disruption, a new fault manager monitors block depletion and automatically reloads devices when necessary. In high availability deployments, this triggers failover. Fault monitoring is automatically enabled on new and upgraded devices. To disable, use FlexConfig.

New/modified FlexConfig commands:

  • fault-monitor block-depletion recovery-action { none| reload}

    Specifying none turns off automatic reload, but does not turn off fault monitoring. For that, use no fault-monitoring .

  • fault-monitor block-depletion monitor-interval seconds

    You can configure how long (in seconds) before the device reloads.

New/modified Firewall Threat Defense CLI commands: show fault-monitor block-depletion{ status| statistics}

Platform restrictions: Not supported for clustered devices.

See: Troubleshooting

Troubleshooting

CPU profiler includes application identification statistics.

7.7.0

The CPU profiler now includes application identification statistics. That is, you can now see the resources used by processing specific application traffic. After you enable CPU profiling, use the CLI to see results.

New/modified CLI commands: system support appid-cpu-profiling status , system support appid-cpu-profiling dump

See: Troubleshooting, Cisco Secure Firewall Threat Defense Command Reference

New IP flow statistics.

7.7.0

When collecting IP flow statistics from Firewall Threat Defense under the direction of Cisco TAC, a new all parameter logs additional statistics to the specified file: port, protocol, application, cumulative latency, and inspection time.

New/modified commands: system support flow-ip-profiling start flow-ip-file filename all { enable| disable}

See: Cisco Secure Firewall Threat Defense Command Reference

Security and Hardening

Require the Message-Authenticator attribute in all RADIUS responses.

7.0.7

7.7.0

Upgrade impact. After threat defense upgrade, enable for existing servers.

You can now require the Message-Authenticator attribute in all RADIUS responses, ensuring that the threat defense VPN gateway securely verifies every response from the RADIUS server, whether for RA VPN or access to the device itself.

The RADIUS Server-Enabled Message Authenticator option is enabled by default for new RADIUS servers. We also recommend you enable it for existing servers. Disabling it may expose firewalls to potential attacks.

New/modified screens:

  • Objects > AAA Server > RADIUS Server Group > Add RADIUS Server Group > Add RADIUS Server

  • System (system gear icon) > Users > External Authentication > Add External Authentication Object (RADIUS)

New CLI commands: message-authenticator-required

Other restrictions: This feature introduced a login bug where the Firewall Management Center treats the RADIUS Class attribute (25) as octets instead of a string, which can break role mapping and cause login failures. For a list of fixed releases, or a workaround if you cannot upgrade, see CSCwq03404.

See: Objects Management, Platform Settings

Limited user privileges for Threat Defense CLI Basic user.

7.7.0

The scope of the Threat Defense CLI Basic user privilege is now limited to the following commands: dig, ping, traceroute. If you have created users with the Basic privilege, evaluate whether you need to change them to the Config privilege. You can change a user’s privilege level using the configure user access command.

See: Cisco Secure Firewall Threat Defense Command Reference

Deprecated Features

Deprecated: Snort 2.

7.7.0

Upgrade impact. Cannot upgrade Snort 2 devices.

Snort 2 is deprecated. You cannot upgrade a Snort 2 device to Version 7.7.0+. Although you can use a Version 7.7.0+ Firewall Management Center to manage older Snort 2 devices, you should still switch to Snort 3 for improved detection and performance.

Deprecated CLI commands: show snort counters , show snort preprocessor-memory-usage .

See: Cisco Secure Firewall Management Center Snort 3 Configuration Guide

Deprecated: Access control policy legacy interface.

Any

You can no longer use the legacy user interface for access control policies. If you were using it, you switch to the improved user interface.

New/modified screens: Switch to Legacy UI toggle is removed

November 20, 2025

Table 3. Features in Version 20251025

Feature

Minimum Threat Defense

Details

Device Management

Maximum Firewall Threat Defense Devices Supported.

Any

This release enhances device-management capabilities, supporting up to 1,500 standalone devices, 750 high-availability pairs, and 1,500 cluster nodes. The increased device count improves scalability for complex network environments.

August 14, 2025

Table 4. Features in Version 20250725

Feature

Minimum Threat Defense

Details

Zero Trust Access

Universal Zero Trust Network Access (universal ZTNA).

7.7.10

Universal Zero Trust Network Access (universal ZTNA) is a comprehensive solution that provides secure access to internal network resources based on user identity, trust, and posture. It ensures that access to one application does not implicitly grant access to the entire network, as with remote access VPN.

New/modified screens: Policies > Zero Trust Application

Requires Cisco Secure Access and Security Cloud Control.

Deployment restrictions: Not supported with clustered devices, container instances, or transparent mode.

Supported platforms: Secure Firewall 1150, 3100, 4100, 4200, and Firewall Threat Defense Virtual.

See Managing Firewall Threat Defense with Cloud-Delivered Firewall Management Center in Security Cloud Control

Administration

Backup of Threat Defense devices.

Any

The Cloud-Delivered Firewall Management Center now retains only the five most recent Threat Defense device backups. All the older backups are deleted automatically.

See About Backup and Restore

Migration

Multi-instance Threat Defense device migration.

7.6

You can now migrate multi-instance Threat Defense devices that are part of a chassis, such as the Secure Firewall 3100/4200, to the Cloud-Delivered Firewall Management Center using the Migrate FTD to cdFMC feature in Security Cloud Control.

See Supported Features

Migrate select Firepower 4100/9300 models to Secure Firewall 3100/4200.
  • The source devices must be Version 7.2.x and later.

  • The target devices must be Version 7.4.1 and later.

You can now easily migrate configurations to the Secure Firewall 3100/4200 from these devices:

  • Firepower 4110, 4120, 4140, 4150

  • Firepower 9300: SM-24, SM-36, SM-44

See Threat Defense Model Migration

Multi-instance mode conversion in the Firewall Management Center for the Secure Firewall 3100/4200.

7.6.0

You can now register an application-mode device to the Firewall Management Center and then convert it to multi-instance mode without having to use the CLI.

New/modified screens:

  • Devices > Device Management, then for a device, click More (more icon) > Convert to Multi-Instance

  • Devices > Device Management, then select multiple devices and choose Select Bulk Action > Convert to Multi-Instance

See: Convert a Device to Multi-Instance Mode

July 03, 2025

Table 5. Features in Version 20250604

Feature

Minimum Threat Defense

Details

Troubleshooting

Cisco RADKit integration.

7.7.0

Cisco RADKit integration allows Cisco TAC engineers to remotely connect with your deployment (including sudo access) for an enhanced troubleshooting experience. You control the appliances and duration of access. This also gives you and Cisco TAC access to diagnostic data and logs.

New/modified screens: Devices > Troubleshoot > Remote Diagnosticsthen click Enable the RADKit service

See: Troubleshooting