|
Platform Features
|
|
Network modules for the Secure Firewall 3130 and 3140.
|
We introduced these network modules for the Secure Firewall 3130 and
3140:
See: Cisco Secure Firewall
3110, 3120, 3130, and 3140 Hardware Installation
Guide
|
|
Firewall and IPS Features
|
|
Sensitive data detection and
masking.
|
Upgrade impact. New rules in default policies take effect.
Sensitive data such as social security numbers, credit card numbers,
emails, and so on may be leaked onto the internet, intentionally or
accidentally. Sensitive data detection is used to detect and
generate events on possible sensitive data leakage and generates
events only if there is a transfer of significant amount of
Personally Identifiable Information (PII) data. Sensitive data
detection can mask PII in the output of events, using built-in
patterns. Disabling data masking is not supported.
Requires Snort 3.
|
|
VPN Features
|
|
IPsec flow
offload on the VTI loopback
interface for the Secure Firewall 3100.
|
Upgrade impact. Qualifying connections start being
offloaded.
On the Secure Firewall 3100, qualifying IPsec connections through the
VTI loopback interface are now offloaded by default. Previously,
this feature was only supported on physical interfaces. This feature
is automatically enabled by the upgrade.
You can change the configuration using FlexConfig and the
flow-offload-ipsec command.
|
|
Interface Features
|
|
Merged management and diagnostic
interfaces.
|
Upgrade impact. Merge interfaces after upgrade.
For new devices using 7.4 and later, you cannot use the legacy
diagnostic interface. Only the merged management interface is
available. If you upgraded to 7.4 or later, and you did not have any
configuration for the diagnostic interface, then the interfaces will
merge automatically.
If you upgraded to 7.4 or later, and you have configuration for the
diagnostic interface, then you have the choice to merge the
interfaces manually, or you can continue to use the separate
diagnostic interface. Note that support for the diagnostic interface
will be removed in a later release, so you should plan to merge the
interfaces as soon as possible.
Merged mode also changes the behavior of AAA traffic to use the data
routing table by default. The management-only routing table can now
only be used if you specify the management-only interface (including
management) in the configuration.
New/modified screens:
-
interface
-
(Moved to Interfaces)
-
New/modified commands: show management-interface
convergence
|
|
Deploy without the diagnostic interface on threat defense virtual for
Azure and GCP.
|
You can now deploy without the diagnostic interface on threat defense
virtual for Azure and GCP. Azure deployments still require at least
two data interfaces, but GCP requires that you replace the
diagnostic interface with a data interface, for a new minimum of
three. (Previously, threat defense virtual deployments required one
management, one diagnostic, and at least two data interfaces.)
Restrictions: This feature is supported for new deployments only. It
is not supported for upgraded devices.
See: Cisco Secure Firewall
Threat Defense Virtual Getting Started
Guide
|
|
Inline sets for Firepower 1000 series, Firepower 2100, and Secure Firewall 3100.
|
You can configure inline sets on Firepower 1000 series, Firepower 2100, and Secure Firewall 3100 devices. We added the inline sets tab to the Interface page.
|
|
Licensing Features
|
|
Changes to license names and support for the Carrier license.
|
Licenses have been renamed:
-
Threat is now IPS
-
Malware is now Malware Defense
-
Base is now Essentials
-
AnyConnect Apex is now Secure Client Premier
-
AnyConnect Plus is now Secure Client Advantage
-
AnyConnect VPN Only is now Secure Client VPN Only
In addition, you can now apply the Carrier license, which allows you
to configure GTP/GPRS, Diameter, SCTP, and M3UA inspections. Use
FlexConfig to configure these features.
|
|
Administrative and Troubleshooting Features
|
|
Default NTP server updated.
|
Upgrade impact. The system connects to new resources. The
default NTP servers have changed from sourcefire.pool.ntp.org to
time.cisco.com. To use a different NTP server, select
Device, then click Time
Services in the System
Settings panel.
|
|
SAML servers for HTTPS management user access.
|
You can configure a SAML server to provide external authentication
for HTTPS management access. You can configure external users with
the following types of authorization access: Administrator, Audit
Admin, Cryptographic Admin, Read-Write User, Read-Only User. You can
use Common Access Card (CAC) for login when using a SAML server.
We updated the SAML identity source object configuration, and the page to accept them.
|
|
Detect configuration mismatches in threat defense high availability
pairs.
|
You can now use the CLI to detect configuration mismatches in threat
defense high availability pairs.
New/modified CLI commands: show failover config-sync
error , show failover config-sync
stats
See: Cisco Secure Firewall Threat Defense
Command Reference
|
|
Capture dropped packets with the Secure Firewall 3100.
|
Packet losses resulting from MAC address table inconsistencies can
impact your debugging capabilities. The Secure Firewall 3100 can now
capture these dropped packets.
New/modified CLI commands:
[drop{ disable| mac-filter} ]
in the capture command.
See: Cisco Secure Firewall Threat Defense
Command Reference
|
|
Firmware upgrades included in FXOS
upgrades.
|
Chassis/FXOS upgrade impact. Firmware upgrades cause an extra
reboot.
For the Firepower 4100/9300, FXOS upgrades to Version 2.14.1+ now
include firmware upgrades. If any firmware component on the device
is older than the one included in the FXOS bundle, the FXOS upgrade
also updates the firmware. If the firmware is upgraded, the device
reboots twice—once for FXOS and once for the firmware.
Just as with software and operating system upgrades, do not make or
deploy configuration changes during firmware upgrade. Even if the
system appears inactive, do not manually reboot or shut down during
firmware upgrade.
See: Cisco Firepower 4100/9300
FXOS Firmware Upgrade Guide
|
|
Quick recovery after data plane failure for the Firepower 1000/2100
and Firepower 4100/9300.
|
When the data plane process on the Firepower 1000/2100 or the
Firepower 4100/9300 crashes, the system reloads the process instead
of rebooting the device. Reloading the data plane also restarts
other processes, including Snort. If the data plane crashes during
bootup, the device follows the normal reload/reboot sequence; this
avoids a reload loop.
This feature is enabled by default for both new and upgraded devices.
To disable it, use FlexConfig.
New/modified ASA CLI commands: data-plane
quick-reload , show data-plane
quick-reload status
New/modified threat defense CLI commands: show data-plane
quick-reload status
See: Cisco Secure Firewall Threat Defense
Command Reference and Cisco Secure Firewall ASA
Series Command Reference.
|