Terminology and Documentation for Version 6.2.0

Product Terminology and Branding in Version 6.2.0

The terminology and branding used in Version 6.2.0 may differ from the terminology used in previous releases as summarized in the following table. See the Firepower System Compatibiltiy Guide for more information about terminology and branding changes.

Product Terminology and Branding

Name

Description

Firepower System

Firepower

Refers to the product line.

Firepower Management Center

Management Center

Refers to Firepower management software running on physical or virtual Firepower platforms.

Cisco ASA with FirePOWER Services

ASA device running an ASA FirePOWER module

ASA FirePOWER module

Refers to Firepower software running on a Cisco Adaptive Security Appliance (ASA) operating system installed on an ASA platform.

ASA FirePOWER module managed with ASDM

Refers to ASA FirePOWER module local configuration interface accessible with ASDM.

Firepower Threat Defense

Refers to Firepower Threat Defense software running on a Firepower operating system installed on an ASA, Firepower 9300 appliance, Firepower 4100 series, or virtual platform.

Firepower Device Manager

Refers to Firepower Threat Defense local configuration interface accessible with specific Firepower Threat Defense platforms.

Documentation for Version 6.2.0

The following documents were updated for Version 6.2.0 to reflect the addition of new features and functionality and to address reported documentation issues:

For additional information about updating and configuring your system, see the documents in the Cisco Firepower System Documentation Roadmap.

For parallel ASA versions, see the ASA documentation roadmap and release notes (including known issues).

For the FXOS documentation roadmap and release notes (including known issues) for parallel FXOS versions, see the Cisco FXOS Documentation roadmap.

Known Documentation Issues in Version 6.2.0

  • The Cisco ASA with FirePOWER Services Local Management Configuration Guide refers to creating new, custom access control and system policies. ASA with FirePOWER Services does not support multiple custom policies. Instead, edit and deploy the system-provided policies.

  • The Firepower Management Center Configuration Guide does not state that if you deploy an access control rule, SSL rule, or identity rule with geolocation network conditions and the system detects an IP address that appears to be moving from country to country, the system incorrectly reports the continent rule as unknown country.

  • The Cisco ASA with FirePOWER Services Local Management Configuration Guide states After you establish remote management and register the Cisco ASA with FirePOWER Services to a Firepower Management Center, you must manage the ASA FirePOWER module from the Firepower Management Center instead of ASDM. However the guide does not state that once remote management is established, you cannot access the ASA FirePOWER configuration with the ASDM manager.