|
Platform Features
|
|
FTDv for HyperFlex and Nutanix.
|
We introduced FTDv for Cisco HyperFlex and Nutanix Enterprise
Cloud.
|
|
FTDv for VMware vSphere/VMware ESXi
7.0.
|
You can now deploy FTDv on VMware vSphere/VMware ESXi 7.0.
Note that Version 7.0 also discontinues support for VMware 6.0.
Upgrade the hosting environment to a supported version before you
upgrade the FTD.
|
|
New default password for the Firewall Threat Defense Virtual on AWS.
|
On AWS, the default admin password for the Firewall Threat Defense Virtual is the AWS Instance ID, unless you define a default password with user data () during the initial deployment.
|
|
ISA 3000 support for shutting down.
|
In Version 7.0.2+, you can shut down the ISA 3000; previously, you
could only reboot the device.
In Version 7.0.5+, when you shut
down the ISA 3000, the System LED turns off. Wait at least 10
seconds after that before you remove power from the
device.
Version restrictions: Version 7.1 temporarily deprecates
support for this feature. Support returns in Version 7.2.
|
|
Firewall and IPS Features
|
|
New Section 0 for system-defined NAT rules.
|
A new Section 0 has been added to the NAT rule table. This section is
exclusively for the use of the system. Any NAT rules that the system
needs for normal functioning are added to this section, and these
rules take priority over any rules you create. Previously,
system-defined rules were added to Section 1, and user-defined rules
could interfere with proper system functioning. You cannot add,
edit, or delete Section 0 rules, but you will see them in
show nat detail command output.
|
|
Custom intrusion rules for Snort 3.
|
You can use offline tools to create custom intrusion rules for use with Snort 3, and upload them into an intrusion policy.
You can organize custom rules in your own custom rule groups, to make it easy to update them as needed. You can also create
the rules directly in Firewall Device Manager, but the rules have the same format as uploaded rules. Firewall Device Manager does not guide you in creating the rules. You can duplicate existing rules, including system-defined rules, as a basis for
a new intrusion rule.
We added support for custom groups and rules to the page, when you edit an intrusion policy.
|
|
Snort 3 new features for Firewall Device Manager-managed systems.
|
You can now configure the following additional features when using Snort 3 as the inspection engine on an Firewall Device Manager-managed system:
-
Time-based access control rules. (Firewall Threat Defense API only.)
-
Multiple virtual routers.
-
The decryption of TLS 1.1 or lower connections using the SSL
Decryption policy.
-
The decryption of the following protocols using the SSL
Decryption policy: FTPS, SMTPS, IMAPS, POP3S.
|
|
DNS request filtering based on URL category and reputation.
|
You can apply your URL filtering category and reputation rules to DNS
lookup requests. If the fully-qualified domain name (FQDN) in the
lookup request has a category and reputation that you are blocking,
the system blocks the DNS reply. Because the user does not receive a
DNS resolution, the user cannot complete the connection. Use this
option to apply URL category and reputation filtering to non-web
traffic. You must have the URL filtering license to use this
feature.
We added the Reputation Enforcement on DNS
Traffic option to the access control policy
settings.
|
|
Smaller VDB for lower memory devices with Snort
2.
|
Upgrade impact. Application
identification on lower memory devices is affected.
For Version 7.0.6+ devices with Snort 2, for VDB 363+, the system now
installs a smaller VDB (also called VDB lite) on lower memory
devices running Snort 2. This smaller VDB contains the same
applications, but fewer detection patterns. Devices using the
smaller VDB can miss some application identification versus devices
using the full VDB.
Lower memory devices: ASA-5508-X, ASA-5516-X
Version restrictions: The smaller VDB is not supported in all
versions. If you upgrade from a supported
version to an unsupported
version, you cannot install VDB 363+ on lower
memory devices running Snort 2. For a list of affected releases, see
CSCwd88641.
|
|
VPN Features
|
|
Firewall Device Manager SSL cipher settings for remote access VPN.
|
You can define the TLS versions and encryption ciphers to use for remote access VPN connections in Firewall Device Manager. Previously, you needed to use the Firewall Threat Defense API to configure SSL settings.
We added the following pages: ; .
|
|
Support for Diffie-Hellman group 31.
|
You can now use Diffie-Hellman (DH) group 31 in IKEv2 proposals and
policies.
|
|
The maximum number of Virtual Tunnel Interfaces on the device is
1024.
|
The maximum number of Virtual Tunnel Interfaces (VTI) that you can
create is 1024. In previous versions, the maximum was 100 per source
interface.
|
|
IPsec lifetime settings for site-to-site VPN security
associations.
|
You can change the default settings for how long a security
association is maintained before it must be re-negotiated.
We added the Lifetime Duration and
Lifetime Size options to the site-to-site
VPN wizard.
|
|
Routing Features
|
|
Virtual router support for the ISA 3000.
|
You can configure up to 10 virtual routers on an ISA 3000 device.
|
|
Equal-Cost Multi-Path (ECMP) routing.
|
You can configure ECMP traffic zones to contain multiple interfaces, which lets traffic from an existing connection exit or
enter the Firewall Threat Defense device on any interface within the zone. This capability allows Equal-Cost Multi-Path (ECMP) routing on the Firewall Threat Defense device as well as external load balancing of traffic to the Firewall Threat Defense device across multiple interfaces.
ECMP traffic zones are used for routing only. They are not the same
as security zones.
We added the ECMP Traffic Zones tab to the Routing pages. In the Firewall Threat Defense API, we added the ECMPZones resources.
|
|
Interface Features
|
|
New default inside IP address.
|
The default IP address for the inside interface is being changed to
192.168.95.1 from 192.168.1.1 to avoid an IP address
conflict when an address on 192.168.1.0/24 is assigned to the
outside interface using DHCP.
|
|
Default outside IP address now has IPv6 autoconfiguration enabled;
new default IPv6 DNS server for Management.
|
The default configuration on the outside interface now includes IPv6
autoconfiguration, in addition to the IPv4 DHCP client. The default
Management DNS servers now also include an IPv6 server:
2620:119:35::35.
|
|
EtherChannel support for the ISA 3000.
|
You can now use Firewall Device Manager to configure EtherChannels on the ISA 3000.
New/modified screens:
|
|
Licensing Features
|
|
Performance-Tiered Licensing for Firewall Threat Defense Virtual.
|
The Firewall Threat Defense Virtual now supports performance-tiered Smart Licensing based on throughput requirements and RA VPN session limits. When the Firewall Threat Defense Virtual is licensed with one of the available performance licenses, two things occur. First, a rate limiter is installed that limits
the device throughput to a specified level. Second, the number of VPN sessions is capped to the level specified by the license.
|
|
Administrative and Troubleshooting Features
|
|
DHCP relay configuration using the Firewall Threat Defense API.
|
Upgrade impact. Can prevent post-upgrade deploy.
You can use the Firewall Threat Defense API to configure DHCP relay. Using DHCP relay on an interface, you can direct DHCP requests to a DHCP server that is accessible
through the other interface. You can configure DHCP relay on physical interfaces, subinterfaces, EtherChannels, and VLAN interfaces.
You cannot configure DHCP relay if you configure a DHCP server on any interface.
Note that if you used FlexConfig in prior releases to configure DHCP
relay (the dhcprelay command), you must
re-do the configuration using the API, and delete the FlexConfig
object, after you upgrade.
We added the following model to the Firewall Threat Defense API: dhcprelayservices
|
|
Faster bootstrap processing and early login to Firewall Device Manager.
|
The process to initially bootstrap an Firewall Device Manager-managed system has been improved to make it faster. Thus, you do not need to wait as long after starting the device to log
into Firewall Device Manager. In addition, you can now log in while the bootstrap is in progress. If the bootstrap is not complete, you will see status
information on the process so you know what is happening on the device.
|
|
Improved CPU usage and performance for many-to-one and one-to-many
connections.
|
The system no longer creates local host objects and locks them when
creating connections, except for connections that involve dynamic
NAT/PAT and scanning threat detection and host statistics. This
improves performance and CPU usage in situations where many
connections are going to the same server (such as a load balancer or
web server), or one endpoint is making connections to many remote
hosts.
We changed the following commands: clear
local-host (deprecated), show
local-host
|
|
Upgrade readiness check for Firewall Device Manager-managed devices.
|
You can run an upgrade readiness check on an uploaded Firewall Threat Defense upgrade package before attempting to install it. The readiness check verifies that the upgrade is valid for the system, and
that the system meets other requirements needed to install the package. Running an upgrade readiness check helps you avoid
failed installations.
A link to run the upgrade readiness check was added to the
System Upgrade section of the page.
|
|
Automatically update CA
bundles.
|
Upgrade impact. The system connects to Cisco for something
new.
The local CA bundle contains certificates to access several
Cisco services. The system now automatically queries Cisco
for new CA certificates at a daily system-defined time.
Previously, you had to upgrade the software to update CA
certificates. You can use the CLI to disable this
feature.
New resources: https://cisco.com/security/pki/
New/modified CLI commands: configure cert-update
auto-update , configure
cert-update run-now ,
configure cert-update
test , show
cert-update
Version restrictions: Requires Version 7.0.5, 7.1.0.3, or
7.2.4+. Not supported with Version 7.0.0–7.0.4,
7.1.0–7.1.0.2, or 7.2.0–7.2.3.
See: Cisco Secure Firewall Threat
Defense Command Reference
|
|
Require the Message-Authenticator attribute
in all RADIUS
responses.
|
Upgrade impact. After upgrade, enable for existing
servers.
You can now require the Message-Authenticator attribute in all
RADIUS responses, ensuring that the threat defense VPN gateway
securely verifies every response from the RADIUS server, whether
for RA VPN or access to the device itself.
The Require Message-Authenticator for all RADIUS
Responses option is enabled by default for new
RADIUS servers. We also recommend you enable it for existing
servers. Disabling it may expose firewalls to potential
attacks.
New CLI commands:
message-authenticator-required
Version restrictions: Requires Version 7.0.7+ / 7.2.10+ / 7.4.3+ / 7.6.1+ / 7.7.0+.
|
|
FTD REST API version 6.1 (v6).
|
The Firewall Threat Defense REST API for software version 7.0 is version 6.1 You can use v6 in the API URLs, or preferentially, use /latest/ to signify
you are using the most recent API version that is supported on the device. Note that the URL version path element for 6.1
is the same as 6.0: v6.
Please re-evaluate all existing calls, as changes might have been mode to the resource models you are using. To open the API
Explorer, where you can view the resources, log into Firewall Device Manager, then click the more options button ( ) and choose API Explorer.
|