|
Platform Features
|
|
Secure Firewall 3105.
|
We introduced the Secure Firewall 3105.
Minimum threat defense: Version 7.3.1
|
|
Network modules for the Secure Firewall 4100.
|
We introduced these network modules for the Firepower 4100:
Supported platforms: Firepower 4112, 4115, 4125,
4145
|
|
ISA 3000 System LED support for shutting down.
|
Support returns for this feature. When you shut down the ISA 3000,
the System LED turns off. Wait at least 10 seconds after that before
you remove power from the device. This feature was introduced in
Version 7.0.5 but was temporarily deprecated in Versions
7.1–7.2.
|
|
New compute shapes for threat defense virtual for OCI.
|
Threat defense virtual for OCI adds support for the following compute
shapes:
-
Intel VM.DenseIO2.8
-
Intel VM.StandardB1.4
-
Intel VM.StandardB1.8
-
Intel VM.Standard1.4
-
Intel VM.Standard1.8
-
Intel VM.Standard3.Flex
-
Intel VM.Optimized3.Flex
-
AMD VM.Standard.E4.Flex
Note that the VM.Standard2.4 and VM.Standard2.8 compute shapes
reached end of orderability in February
2022.
If you are deploying Version 7.3+, we recommend a different compute
shape.
See: Cisco Secure Firewall
Threat Defense Virtual Getting Started
Guide
|
|
Support ends: Firepower 4110, 4120, 4140,
4150.
|
You cannot run Version 7.3+ on the Firepower 4110, 4120, 4140, or
4150.
|
|
Support ends: Firepower 9300: SM-24, SM-36, SM-44
modules.
|
You cannot run Version 7.3+ on the Firepower 9300 with SM-24, SM-36,
or SM-44 modules.
|
|
Firepower 1010E does not support Version
7.3.
|
The Firepower 1010E, which was introduced in Version 7.2.3, does
not support Version 7.3. Support returns in Version 7.4.
You cannot upgrade a Version 7.2.x Firepower 1010E to Version
7.3, and you should not reimage there either. If you have a
Firepower 1010E device running Version 7.3, reimage to a
supported release.
|
|
Firewall and IPS Features
|
|
TLS 1.3 support in SSL decryption policies, and
configurable behavior for undecryptable connections.
|
Upgrade impact. You can configure SSL decryption rules for
TLS 1.3 traffic. TLS 1.3 support is available when using Snort 3
only. You can also configure non-default behavior for undecryptable
connections. If you are using Snort 3, upon upgrade, TLS 1.3 is
automatically selected for any rules that have all SSL/TLS versions
selected; otherwise, TLS 1.3 is not selected. The same behavior
happens if you switch from Snort 2 to Snort 3.
We added TLS
1.3 as an option on the advanced tab of the add/edit rule dialog
box. We also redesigned the SSL decryption policy settings to
include the ability to enable TLS 1.3 decryption, and to configure
undecryptable connection actions.
See:
Advanced Criteria for SSL
Decryption Rules and Configure Advanced and
Undecryptable Traffic
Settings
|
|
Refined URL filtering lookup.
|
You can now explicitly set how URL filtering lookups occur. You can
select to use the local URL database only, both the local database
and cloud lookup, or cloud lookup only. We augmented the URL
Filtering system setting options.
See: Configuring URL Filtering
Preferences
|
|
Interface Features
|
|
IPv6 support for virtual appliances.
|
Threat defense virtual now supports IPv6 in the following
environments:
See: Cisco Secure Firewall
Threat Defense Virtual Getting Started
Guide
|
|
DHCPv6 Client.
|
You can now obtain an IPv6 address from DHCPv6.
New/modified screens:
See: Configure Advanced Interface
Options
|
|
Administrative and Troubleshooting Features
|
|
Automatically update CA
bundles.
|
Upgrade impact. The system connects to Cisco for something
new.
The local CA bundle contains certificates to access several
Cisco services. The system now automatically queries Cisco
for new CA certificates at a daily system-defined time.
Previously, you had to upgrade the software to update CA
certificates. You can use the CLI to disable this
feature.
New resources: https://cisco.com/security/pki/
New/modified CLI commands: configure cert-update
auto-update , configure
cert-update run-now ,
configure cert-update
test , show
cert-update
Version restrictions: Requires Version 7.0.5, 7.1.0.3, or
7.2.4+. Not supported with Version 7.0.0–7.0.4,
7.1.0–7.1.0.2, or 7.2.0–7.2.3.
See: Cisco Secure Firewall Threat Defense
Command Reference
|
|
Skip Certificate Authority checking for trusted certificates.
|
You can skip the check if you need to install a local CA certificate
as the trusted CA certificate.
We added the Skip CA Certificate Check option
when uploading trusted CA certificates.
|
|
Combined upgrade and install package for
Secure Firewall 3100.
|
Reimage Impact.
In Version 7.3, we combined the Firewall Threat Defense install and upgrade package for the Secure Firewall 3100,
as follows:
-
Version 7.1–7.2 install package:
cisco-ftd-fp3k.version.SPA
-
Version 7.1–7.2 upgrade package:
Cisco_FTD_SSP_FP3K_Upgrade-version-build.sh.REL.tar
-
Version 7.3+ combined package:
Cisco_FTD_SSP_FP3K_Upgrade-version-build.sh.REL.tar
Although you can upgrade Firewall Threat Defense without issue, you cannot reimage from older Firewall Threat Defense and ASA versions directly to Firewall Threat Defense Version 7.3+. This is due to a ROMMON update required by
the new image type. To reimage from those older versions,
you must "go through" ASA 9.19+, which is supported with the
old ROMMON but also updates to the new ROMMON. There is no
separate ROMMON updater.
To get to Firewall Threat Defense Version 7.3+, your options are:
|
|
Firewall Threat Defense REST API version 6.4 (v6).
|
The Firewall Threat Defense REST API for software version 7.3 is version 6.4. You can use v6
in the API URLs, or preferentially, use /latest/ to signify you are
using the most recent API version that is supported on the device.
Note that the URL version path element for 6.4 is the same as all
other 6.x versions: v6.
Please re-evaluate all existing calls, as changes might have been
mode to the resource models you are using. To open the API Explorer,
where you can view the resources, log into Firewall Device Manager, then click the more options button ( ) and choose API Explorer.
See: Cisco Secure Firewall Threat Defense
REST API Guide
|