|
Platform Features
|
|
Firepower 1010E.
|
We introduced the Firepower 1010E, which does not support power over
Ethernet (PoE).
Minimum threat defense: 7.2.3, 7.4.1
|
|
Threat defense virtual for VMware on VMware vSphere/VMware ESXi
8.0.
|
|
|
Threat defense virtual for GCP.
|
You can now use device manager to configure threat defense virtual
for GCP.
See: Secure Firewall Threat
Defense Virtual getting started
guides
|
|
Threat defense virtual for Megaport.
|
You can now use device manager to configure threat defense virtual
for Megaport (Megaport Virtual Edge). High availability is
supported.
Minimum threat defense: 7.2.8
Other version restrictions: Initially, you may not be able to freshly
deploy Versions 7.3.x or 7.4.x. Instead, deploy Version 7.2.8–7.2.x
and upgrade.
See: Secure Firewall Threat
Defense Virtual getting started
guides
|
|
Network modules for the Secure Firewall 3100.
|
We introduced these network modules for the Secure Firewall 3100:
-
6-port 1G SFP Network Module, SX
(multimode) (FPR-X-NM-6X1SX-F)
-
6-port 10G SFP Network Module, SR
(multimode) (FPR-X-NM-6X10SR-F)
-
6-port 10G SFP Network Module, LR
(single mode) (FPR-X-NM-6X10LR-F)
-
6-port 25G SFP Network Module, SR
(multimode) (FPR-X-NM-X25SR-F)
-
6-port 25G Network Module, LR (single
mode) (FPR-X-NM-6X25LR-F)
-
8-port 1G Copper Network Module, RJ45
(copper) (FPR-X-NM-8X1G-F)
Minimum threat defense: 7.2.1
|
|
Intel Ethernet Network Adapter E810-CQDA2 driver with threat defense
virtual for KVM.
|
We now support the Intel Ethernet Network Adapter E810-CQDA2 driver
with threat defense virtual for KVM.
Minimum threat defense: 7.2.1
See: Deploy the Threat Defense Virtual on
KVM
|
|
ISA 3000 support for shutting down.
|
Support returns for shutting down the ISA 3000. This feature was
introducted in Version 7.0.2 but was temporarily deprecated in
Version 7.1.
|
|
Firewall and IPS Features
|
|
Object-group search is enabled by default for access control.
|
The CLI configuration command object-group-search access-control is now enabled by default for new deployments. However, if you upgrade to 7.2, the setting remains enabled or disabled depending
on your previous setting.
If you are configuring the command using FlexConfig, you should evaluate whether that is still needed. If you need to disable
the feature, use FlexConfig to implement the no object-group-search access-control command.
See: Cisco Secure
Firewall ASA Series Command
Reference
|
|
Rule hit counts persist over reboot.
|
Rebooting a device no longer resets access control rule hit counts to
zero. Hit counts are reset only if you actively clear the counters.
In addition, counts are maintained by each unit in an HA pair or
cluster separately. You can use the show rule
hits command to see cumulative counters across the
HA pair or cluster, or see the counts per node.
We modified the following Firewall Threat Defense CLI command: show rule hits .
See: Examining Rule Hit
Counts
|
|
VPN Features
|
|
IPsec flow offload.
|
On the Secure Firewall 3100, IPsec flows are offloaded by default. After the initial setup of
an IPsec site-to-site VPN or remote access VPN security association
(SA), IPsec connections are offloaded to the field-programmable gate
array (FPGA) in the device, which should improve device
performance.
You can change the configuration using FlexConfig and the
flow-offload-ipsec command.
See: IPSec Flow Offload
|
|
Interface Features
|
|
Breakout port support for the Secure Firewall 3130 and 3140.
|
You can now configure four 10GB breakout ports for each 40GB
interface on the Secure Firewall 3130 and 3140.
New/modified screens:
See: Manage the Network Module for the
Secure Firewall 3100
|
|
Enabling or disabling Cisco Trustsec on an interface.
|
You can enable or disable Cisco Trustsec on physical, subinterface,
EtherChannel, VLAN, Management, or BVI interfaces, whether named or
unnamed. By default, Cisco Trustsec is enabled automatically when
you name an interface.
We added the Propagate Security Group Tag
attribute to the interface configuration dialog boxes, and the
ctsEnabled attribute to the
various interface APIs.
See: Configure Advanced
Options
|
|
Licensing Features
|
|
Permanent License Reservation Support for ISA 3000.
|
ISA 3000 now supports Universal Permanent License Reservation for
approved customers.
See: Applying Permanent Licenses in
Air-Gapped Networks
|
|
Administrative and Troubleshooting Features
|
|
Ability to force full deployment.
|
When you deploy changes, the system normally deploys just the changes
made since the last successful deployment. However, if you are
experiencing problems, you can elect to force a full deployment,
which completely refreshes the configuration on the device. We added
the Apply Full Deployment option to the
deployment dialog box.
See: Deploying Your Changes
|
|
Automatically update CA
bundles.
|
Upgrade impact. The system connects to Cisco for something
new.
The local CA bundle contains certificates to access several
Cisco services. The system now automatically queries Cisco
for new CA certificates at a daily system-defined time.
Previously, you had to upgrade the software to update CA
certificates. You can use the CLI to disable this
feature.
New resources: https://cisco.com/security/pki/
New/modified CLI commands: configure cert-update
auto-update , configure
cert-update run-now ,
configure cert-update
test , show
cert-update
Version restrictions: Requires Version 7.0.5, 7.1.0.3, or
7.2.4+. Not supported with Version 7.0.0–7.0.4,
7.1.0–7.1.0.2, or 7.2.0–7.2.3.
See: Cisco Secure Firewall Threat
Defense Command Reference
|
|
Require the Message-Authenticator attribute
in all RADIUS
responses.
|
Upgrade impact. After upgrade, enable for existing
servers.
You can now require the Message-Authenticator attribute in all
RADIUS responses, ensuring that the threat defense VPN gateway
securely verifies every response from the RADIUS server, whether
for RA VPN or access to the device itself.
The Require Message-Authenticator for all RADIUS
Responses option is enabled by default for new
RADIUS servers. We also recommend you enable it for existing
servers. Disabling it may expose firewalls to potential
attacks.
New CLI commands:
message-authenticator-required
Version restrictions: Requires Version 7.0.7+ / 7.2.10+ / 7.4.3+ / 7.6.1+ / 7.7.0+.
|
|
Threat defense REST API version 6.3 (v6).
|
The Firewall Threat Defense REST API for software version 7.2 is version 6.3. You can use v6 in the API URLs, or preferentially, use /latest/ to signify
you are using the most recent API version that is supported on the device. Note that the URL version path element for 6.3
is the same as 6.0, 6.1, and 6.2: v6.
Please re-evaluate all existing calls, as changes might have been mode to the resource models you are using. To open the API
Explorer, where you can view the resources, log into Firewall Device Manager, then click the more options button ( ) and choose API Explorer.
See: Cisco Secure Firewall Threat
Defense REST API Guide
|