This document describes the new features, caveats, and limitations for Cisco Secure Workload software, release 3.6.x.

The Cisco Secure Workload platform, formerly branded as Cisco Tetration, is designed to provide comprehensive workload security by establishing a micro perimeter around every workload across your on-premises and multi-cloud environment using firewalling and segmentation, compliance and vulnerability tracking, behavior-based anomaly detection, and workload isolation. The platform uses an advanced analytics and algorithmic approach to offer these capabilities. This solution supports the following capabilities:

  • Automatically generated micro-segmentation policies resulting from comprehensive analysis of application communication patterns and dependencies.

  • Dynamic label-based policy definition with a hierarchical policy model to deliver comprehensive controls across multiple user groups with role-based access control

  • Consistent policy enforcement at scale through distributed control of native operating system firewalls and infrastructure elements like ADCs (Application Delivery Controllers) and physical or virtual firewalls

  • Near real-time compliance monitoring of all communications to identify and alert against policy violation or potential compromise.

  • Workload behavior baselining and proactive anomaly detection.

  • Common vulnerability detection with dynamic mitigation and threat-based workload isolation.

The following table shows the changed history for the releases:

Table 1. Release Notes Change History

Date

Description

February 02, 2023

Release 3.6.1.52 is introduced.

May 26, 2022

Release 3.6.1.36 is introduced.

March 10, 2022

Release 3.6.1.21 is introduced.

February 14, 2022

Release 3.6.1.17 is introduced.

October 29th, 2021

Release 3.6.1.5 is introduced.

Compatibility Information

Release 3.6.1.36

OS

Flavors

New Agents Operating System Support

  • AIX 7.3

  • AlmaLinux 8.x

  • Rocky Linux 8.x

Ingest Appliances

  • AnyConnect Appliance supports IPFIX V5 template

  • Agents on Windows beyond 2008R2 now use NPCAP version 1.55

Agents

Agents on Windows beyond 2008R2 now use NPCAP version 1.55

Release 3.6.1.21

OS

Flavors

No changes to the software in this release.

Release 3.6.1.17

OS

Flavors

Secure Workload Agent Installer

Secure Workload agent installer will now permit installation on any minor Linux distribution release where the major release is supported. Support for Linux minor releases is now extended through support of the corresponding major release.

Supported operating system versions are documented on Platform Information on Cisco.com.

The software agents in the 3.6.1.5 release support the following operating systems (virtual machines and bare-metal servers) for micro-segmentation (deep visibility and enforcement). A per-version list is always accessible through the Platform Information page.

Release 3.6.1.5

OS

Flavors

Linux

  • Amazon Linux 2

  • CentOS-6.x: 6.1 to 6.10

  • CentOS-7.x: 7.0 to 7.9

  • CentOS-8.x: 8.0 to 8.4

  • Red Hat Enterprise Linux-6.x: 6.1 to 6.10

  • Red Hat Enterprise Linux-7.x: 7.0 to 7.9

  • Red Hat Enterprise Linux-8.x: 8.0 to 8.4

  • Oracle Linux Server-6.x: 6.1 to 6.10

  • Oracle Linux Server-7x: 7.0 to 7.9

  • Oracle Linux Server-8.x: 8.0 to 8.4

  • SUSE Linux-11.x: 11.2 to 11.4

  • SUSE Linux-12.x: 12.0 to 12.5

  • SUSE Linux-15.x: 15.0 to 15.2

  • Ubuntu-14.04

  • Ubuntu-16.04

  • Ubuntu-18.04

  • Ubuntu-20.04

Linux on IBM Z

  • Red Hat Enterprise Linux-7.x: 7.3 to 7.9

  • Red Hat Enterprise Linux-8.x: 8.2 to 8.4

  • SUSE Linux-11.x: 11.4

  • SUSE Linux-12.x: 12.4, 12.5

  • SUSE Linux-15.x: 15.0 to 15.2

Windows Server (64-bit)

  • Windows Server 2008R2 Datacenter

  • Windows Server 2008R2 Enterprise

  • Windows Server 2008R2 Essentials

  • Windows Server 2008R2 Standard

  • Windows Server 2012 Datacenter

  • Windows Server 2012 Enterprise

  • Windows Server 2012 Essentials

  • Windows Server 2012 Standard

  • Windows Server 2012R2 Datacenter

  • Windows Server 2012R2 Enterprise

  • Windows Server 2012R2 Essentials

  • Windows Server 2012R2 Standard

  • Windows Server 2016 Standard

  • Windows Server 2016 Essentials

  • Windows Server 2016 Datacenter

  • Windows Server 2019 Standard

  • Windows Server 2019 Essentials

  • Windows Server 2019 Datacenter

Windows VDI desktop Client

  • Microsoft Windows 8.1

  • Microsoft Windows 8.1 Pro

  • Microsoft Windows 8.1 Enterprise

  • Microsoft Windows 10

  • Cisco Tetration Release Notes

  • Microsoft Windows 10 Pro

  • Microsoft Windows 10 Enterprise

  • Microsoft Windows 10 Enterprise 2016 LTSB

IBM AIX operating system

  • AIX version 7.1

  • AIX version 7.2

Container host OS version for policy enforcement

  • Red Hat Enterprise Linux Release 7.1 to 7.9

  • CentOS Release 7.1 to 7.9

  • Ubuntu-16.04

  • Red Hat Enterprise Linux Core OS Release 4.5

Operating System support

The 3.6.1.5 release supports the following operating systems for deep visibility use cases only:

  • Windows VDI desktop Client:

  • Microsoft Windows 7

  • Microsoft Windows 7 Pro

  • Microsoft Windows 7 Enterprise

The 3.6.1.5 release supports the following operating systems for the universal visibility agent:

  • Windows Server (32-bit and 64-bit where deep visibility agent is not available)

  • AIX 6.1 (PPC)

The 3.6.1.5 release no longer supports the following operating systems for any software agent:

  • Red Hat Enterprise Linux Release 5.x

  • CentOS Release 5.x

  • AIX 5.3 (PPC)

  • Microsoft Windows 8

The 3.6.1.5 release deprecates supports the following Cisco Nexus 9000 series switches in NX-OS and Cisco Application Centric Infrastructure (ACI) mode. If you are using HW sensors, please plan a migration to NetFlow as an alternative source:

Previously Supported Cisco Nexus 9000 Series Switches in NX-OS and ACI Mode (deprecated in 3.6.1.5, see changes in behavior section).

Product line

Platform

Minimum Software Release

Cisco Nexus 9300 platform switches (NX-OS mode)

Cisco Nexus 93180YC-EX, 93108TC-EX, and 93180LC-EX

Cisco NX-OS Release 9.2.1 and later

Cisco Nexus 93180YC-FX, 93108TC-FX, and 9348GC-FXP

Cisco NX-OS Release 9.2.1 and later

Cisco Nexus 9336C-FX2

Cisco NX-OS Release 9.2.1 and later

Cisco Nexus 9300 platform switches (ACI mode)

Cisco Nexus 93180YC-EX, 93108TC-EX, and 93180LC-EX

  • Cisco ACI Release 3.1(1i) and later

Cisco Nexus 93180YC-FX, 93108TC-FX

Cisco ACI Release 3.1(1i) and later

Cisco Nexus 9348GC-FXP

Cisco ACI Release 3.1(1i) and later

Cisco Nexus 9336C-FX2

Cisco ACI Release 3.2 and later

Cisco Nexus 9500 series switches with N9K-X9736C-FX linecards only

Cisco ACI Release 3.1(1i) and later

Usage Guidelines

This section lists usage guidelines for the Cisco Secure Workload software.

  • You must use the Google Chrome browser version 90.0.0 or later to access the web-based user interface.

  • After setting up your DNS, browse to the URL of your Cisco Secure Workload cluster: https://<cluster.domain>

When using the commission / decommission feature for Cisco Secure Workload virtual appliance environments, please observe the following usage guidelines.

This feature is meant to be used with the assistance of TAC and can cause unrecoverable damage if used incorrectly. No two VMs should ever be decommissioned at the same time, without explicit approval from TAC. The following combinations of VMs must never be decommissioned concurrently:

  • More than one orchestrator

  • More than one datanode

  • More than one namenode (namenode or secondaryNamenode)

  • More than one resourceManager

  • More than one happobat

  • More than one mongodb (mongodb or mongoArbiter)

  • Only one decommission/commission process can be executed at a time. Do not overlap the decommission/commission of different VMs at the same time.

    Please always contact TAC prior to using the esx_commission snapshot endpoint

Verified Scalability Limits

The following tables provide the scalability limits for Cisco Secure Workload (39-RU), Cisco Secure Workload M (8-RU), and Cisco Secure Workload Cloud:

Table 2. Scalability Limits for Cisco Secure Workload (39-RU)

Configurable Option

Scale

Number of workloads

Up to 25,000 (VM or bare-metal).

Up to 50,000 (2x) when all the sensors are in conversation mode.

Flow features per second

Up to 2 million.

Number of hardware agent enabled Cisco Nexus 9000 series switches

Up to 100 (deprecated).

Table 3. Scalability Limits for Cisco Secure Workload M (8-RU)

Configurable Option

Scale

Number of workloads

Up to 5,000 (VM or bare-metal).

Up to 10,000 (2x) when all the sensors are in conversation mode.

Flow features per second

Up to 500,000.

Number of hardware agent enabled Cisco Nexus 9000 series switches

Up to 100 (deprecated).

Table 4. Scalability Limits for Cisco Secure Workload Virtual (VMWare ESXi)

Configurable Option

Scale

Number of workloads

Up to 1,000 (VM or bare-metal).

Flow features per second

Up to 70,000.

Number of hardware agent enabled Cisco Nexus 9000 series switches

Not supported.


Note


Supported scale is based on whichever parameter reaches the limit first.


Behavior Changes

Release 3.6.1.36

Feature

Description

New Agents Operating System Support

  • AIX 7.3

  • AlmaLinux 8.x

  • Rocky Linux 8.x

Ingest Appliances

  • AnyConnect Appliance supports IPFIX V5 template

  • Agents on Windows beyond 2008R2 now use NPCAP version 1.55

Agents

Agents on Windows beyond 2008R2 now use NPCAP version 1.55

Table 5. Release 3.6.1.21

Feature

Description

No changes to software in this patch release.

Table 6. Release 3.6.1.17

Feature

Description

Secure Workload Agent Installer

Secure Workload agent installer will now permit installation on any minor Linux distribution release where the major release is supported. Support for Linux minor releases is now extended through support of the corresponding major release.

Supported operating system versions are documented on Platform Information on Cisco.com.

Table 7. Release 3.6.1.5

Feature

Description

External Orchestrators

New external orchestrators for AWS or Kubernetes EKS can no longer be created. Instead, create AWS cloud connectors. For more information, sbove.

Instances of external orchestrators for AWS or Kubernetes EKS that were created before upgrade to 3.6.1.5 are still functional, but they cannot be modified. If changes are required, you must create a new AWS cloud connector instead which ingests information from the same set of cloud assets and then delete the old AWS or EKS external orchestrator configuration.

UI

From release 3.6.1.5 and later, the left menu is now the primary point of navigation as pages were moved from the top navigation bar to the left menu.

The following are key changes:

  • All Segmentation related features, such as ADM, Enforcement Status and Enforcement Templates are now under the Defend top-level menu

  • All analytics data exploration related to Flows, Processes and Vulnerabilities are now under Investigate top-level menu

  • All integrations related to External Orchestrators, Agents and Connectors are now under Manage top-level menu

  • All appliance related configuration and troubleshooting features are now under Platform and Troubleshooting top-level menus, respectively.

Cluster Features

The lookout feature was deprecated in 3.5 and remains in this state. In 3.6, you will no longer be able to turn on lookout features. However, if you currently use lookout, you will still be able to see your existing setup.

In order to simplify this product, the UserApps feature has been removed.

Agents

  • WFP enforcement mode is no longer beta. The Windows Filtering Platform (WFP) allows the Enforcement Agent to directly apply network filters without the need for Windows Advanced Firewall (WAF).

  • Universal Agents have now been marked for deprecation; they will no longer be supported or made available for installation in the next major release. If you use universal agents, please plan to replace them with deep visibility agents.

  • Hardware Agents have now been marked for deprecation; these are no longer supported or available for installation from the next major release. If you use hardware sensors, please plan to migrate to NetFlow or ERSPAN virtual appliance.

Virtual Appliances

ERSPAN virtual appliances must now be deployed using the Secure Workload Data Ingest OVA. The ERSPAN OVA is no longer published. No changes are needed for existing ERSPAN virtual appliances deployed with an older ERSPAN OVA.

Support Policy

We have released our EOL end-of-support policy for Secure Workload software versions. See Maintain and Operate TechNotes

Enhancements

Release 3.6.1.47

Feature

Description

Software Agents

Software Agents now support Redhat Enterprise Server 9 on x86_64 and s390x architectures.

Release 3.6.1.36

Feature

Description

FMC External Orchestrator

Support for enforcement per FMC Domain. You can now enable/disable enforcement on an FMC Domain by selecting the domain name while configuring the external orchestrator.

Segmentation policy for Windows

With segmentation policy for Windows, you can enter a list of users or user groups in the process level control section, in addition to just a single user name.

Inventory labels while creating installer script

You can specify inventory labels when creating the installer script. All the agents installed through the script are automatically tagged with such labels. The feature is supported only on Linux and Windows workloads deployments.

Release 3.6.1.21

Feature

Description

Kubernetes version for External Orchestrator integration

Kubernetes versions 1.21 and 1.22 are now supported for External Orchestrator integration.

Release 3.6.1.17

Feature

Description

Secure Workload and flow logs

If the AWS user account credentials provided during connector creation have access to both the VPC flow logs and the S3 bucket, Secure Workload can now ingest flow logs from an S3 bucket associated with any account.

Release 3.6.1.5

Features

Description

ServiceNow supports integration with ServiceNow scripted REST APIs.

In the configuration workflow, you can choose to The ServiceNow connector now supports integration with ServiceNow scripted REST APIs.

The Cisco Integrated Management Controller (CIMC) versions have been updated. M4 CIMC has been updated to 4.1(2b) and M5 CIMC has been updated to 4.1(3b). Upgrading the Secure Workload cluster to 3.6 does not automatically upgrade CIMC firmware on bare metal nodes. Upgrading CIMC firmware is optional and may take up to four hours per bare metal host. This process should be performed only when recommended by Cisco TAC.

The Secure Workload integration with Firepower Management Center (Beta feature) allows policy enforcement using the firewall. In this release, the integration uses access control policies using dynamic objects instead of prefilter policies, so changes in network inventory do not require deploy, resulting in fewer deployments and faster response to inventory changes.

For details including supported versions and requirements, see the Cisco Secure Workload and Firepower Management Center Integration Guide if you have configured FMC integration in release 3.5, see important caveats before upgrading in the Cisco Secure Workload Upgrade Guide.

Conversation mode Flow Analysis Fidelity now applies to AIX agents.

Cisco Integrated Management Controller (CIMC)version updated

The Cisco Integrated Management Controller (CIMC) versions have been updated:

  • M4 CIMC has been updated to 4.1(2b) and M5 CIMC has been updated to 4.1(3b). Upgrading the Secure Workload cluster to 3.6 does not automatically upgrade CIMC firmware on bare metal nodes.

    (Optional) Upgrade CIMC firmware, it may take upto four hours per bare metal host. This process should be performed only when recommended by Cisco TAC.

FMC integration with Secure Workload

The Secure Workload integration with Firepower Management Center (Beta feature) allows policy enforcement using the firewall. In this release, the integration uses access control policies using dynamic objects instead of prefilter policies, so changes in network inventory do not require deploy, resulting in fewer deployments and faster response to inventory changes.

For details including supported versions and requirements, see Cisco Secure Workload and Firepower Management Center Integration Guide.

Note

 

If you configured FMC integration in release 3.5, see important caveats in the Cisco Secure Workload Upgrade Guide before upgrading.

Flow Analysis Fidelity

Conversation mode Flow Analysis Fidelity now also applies to AIX agents.

New Features and Changed Information

New Features and Changed Information for Release 3.6.1.36

Feature

Description

Inventory

Inventory upload: A new Merge Option is available under Inventory Upload.

External Orchestrator

Infoblox External orchestrator: You can now choose between different types of DNS record (A-record, AAAA-record, network-record and/or host-record.)

Support for Kubernetes inventory

Support for Kubernetes inventory in ADM clustering and Scope suggestion.

VDI deployments

A new --goldenImage flag for installation script and MSI installer now allows agent installation on Windows Golden Virtual Machine, so that agents will run on replicated VMs once the hostname changes. (Agent software will never run on the golden VM, even when VM boots for maintenance or upgrades).

New Features and Changed Information for Release 3.6.1.21

Feature

Description

Micro-segmentation support for container workloads

Micro-segmentation support for container workloads deployed through Red Hat OpenShift 4.x is now available.

OpenShift 4.x leverages CRI-O as the default container runtime for Kubernetes. CRI-O is supported, and no additional changes in the existing enforcement workflow are required for running in such environments. Worker node operating systems can be either RHEL or CentOS versions that are officially supported by OpenShift 4.x.

This release supports Red Hat OpenShift versions up to 4.9 for external orchestrator integration.

It also adds support for Red Hat Enterprise Core OS versions up to 4.9.

New Features and Changed Information for Release 3.6.1.17

No new software features in this patch release.

New Features and Changed Information for Release 3.6.1.5

To support the analysis and various use cases within the Cisco Secure Workload platform, consistent telemetry (flow data) is required from across the environment. Cisco Secure Workload collects rich telemetry using software agents and other methods to support both existing and new installations in data center infrastructures. This release supports the following telemetry sources:

  • Secure Workload agents installed on virtual machine and bare-metal servers

  • DaemonSets running on container host operating systems

  • ERSPAN connectors that can generate Cisco Secure Workload telemetry from mirrored packets

  • Telemetry ingestion from ADCs (Application Delivery Controllers) F5 and Citrix

  • NetFlow connectors that can generate Cisco Secure Workload telemetry based on NetFlow v9 or IPFIX records

  • ASA connector for collection of NSEL (NetFlow Secure Event Logging) telemetry

  • AWS connector for flow telemetry data generated using VPC flow log configurations

In addition, this release supports ingesting endpoint device posture, context and telemetry through integrations with:

  • Cisco AnyConnect installed on endpoint devices such as laptops, desktops, and smartphones

  • Cisco ISE (Identity Services Engine)

  • Secure Workload agents also act as a policy enforcement point for application segmentation. Using this approach, the Cisco Secure Workload platform enables consistent micro-segmentation across public, private, and on-premises deployments.

Agents enforce policy using native operating system capabilities, thereby eliminating the need for the agent to be in the data path and providing a fail-safe option. Additional product documentation is listed in the “Related Documentation” section

Feature

Description

AWS Connector

A new cloud connector for AWS (Beta feature) adds support for ingesting flow telemetry, cloud workload tag/label ingest for both EC2 instances and EKS pod/service workloads and policy enforcement using AWS security groups (for EC2 workloads only) without the need to install software agents on the cloud hosts.

This new cloud connector streamlines the management of the connection by consolidating the functionality previously provided through various means and does so without requiring an external appliance.

  • Migrated Amazon Web Services (AWS) Elastic Kubernetes Services (EKS) micro-segmentation features from External Orchestrator to the AWS Connector.

  • Added Azure AKS External Orchestrator support. This feature can be selected while adding Kubernetes as an external orchestrator.

  • Administrator must provide the Azure tenant ID and client credentials.

Note

 

Agent software is still needed to provide pod-level flow telemetry data and pod-level policy enforcement.

Micro-segmentation support for container workloads

Micro-segmentation support for container workloads deployed through Red Hat OpenShift 4.x is now available.

OpenShift 4.x leverages CRI-O as the default container runtime for Kubernetes. CRI-O is supported, and no additional changes in the existing enforcement workflow are required for running in such environments. Worker node operating systems can be either RHEL or CentOS versions that are officially supported by OpenShift 4.x.

This release supports up to Red Hat OpenShift version 4.6.

This release adds support to Red Hat CoreOS as worker node operating system.

Policy Templates

Policy Templates have been added to help you get started with common configurations.

PIV/CAC

Integration with PIV/CAC identity verification is now supported.

Hardware clusters

The Cisco Secure Workload hardware clusters can now be configured with IPv6 for external network connectivity during deployment or upgrading to version 3.6.1.5.

For limitations, requirements, and instructions, please see the Upgrade Guide or the Hardware Deployment Guide as applicable.

Windows workloads

Added support for service/application/user-based policy enforcement for Windows workloads.

Support for policy discovery based on Kubernetes pod and service flows.

Note

 

Support for policy enablement is restricted to scope-to-scope policy generation.

Software agents health

Software Agents Health page now shows anomalies for memory and CPU usage levels and agent running state.

Conversation mode Flow Analysis Fidelity now report 4-tuple conversations L4 port whenever the conversation’s initiator can be determined.

For detailed compatibility information, please refer to Platform Information on Cisco.com.

Caveats

This section contains lists of resolved and open bugs and known behaviors.

The resolved and open bugs for this release are accessible through the Cisco Bug Search Tool. This web-based tool provides you with access to the Cisco bug tracking system, which maintains information about bugs and vulnerabilities in this product and other Cisco hardware and software products.


Note


You must have a Cisco.com account to log in and access the Cisco Bug Search Tool. If you do not have one, you can https://www.cisco.com/c/en/us/about/help/login-account-help.html.


For more information about the Cisco Bug Search Tool, see the Bug Search Tool Help & FAQ.

Known Behaviors

Refer to the known behaviors for Cisco Secure Workload software releases 3.6.x.

Release

Known behaviour

3.6.1.47

Same as the known behaviors in 3.6.1.5

3.6.1.36

Same as the known behaviors in 3.6.1.5

3.6.1.21

Same as the known behaviors in 3.6.1.5

3.6.1.17

Same as the known behaviors in 3.6.1.5

3.6.1.5

  • Before upgrading to 3.6.1.5 on a cluster with "Strong SSL Ciphers for Agent Connections" enabled, please contact TAC. (See CSCwa19256.)

  • Conversations setting for the Flow Analysis Fidelity configuration in Agent Config Profile is not supported for Universal Visibility Agents

  • Secure workload UI displays incorrect AWS connector workflow, when a new connector is enabled right after creation of a new rootscope. (CSCvz43857)

  • Policy Stream Data Tap is no longer in Alpha even through there’s an Alpha label displayed in the Data Taps Admin page

  • Data Export tap is no longer supported in 3.6 even though the Data Taps Admin still shows the feature.

  • Cross-Account (VPC and S3 buckets belonging to different accounts) collection of flow logs is not supported in this release.

  • AWS inventory profile page displays enforcement enabled as disabled, even when segmentation is enabled on connector.

Caveats for Release 3.6.1.52

The following table lists the caveats in this release.

Click a bug ID to access Cisco’s Bug Search Tool to see additional information about that bug.

Resolved Bugs

Identifier

Headline

CSCwc72280

Data Not Rendering in Tetration UI if User is Using IP Virtualization to Obtain Network Information.

CSCwd00625

Labels associated to a host IP will be replicated to all other IPs reported by this host.

CSCwd80353

Provider port 0 found for tcp flows.

CSCwb65874

Disk Space starvation on datanodes due to incorrect regular expression in forensic rules.

Open Caveats

The following table lists the open caveats in this release. Click a bug ID to access Cisco’s Bug Search Tool to see additional information about that bug.

Table 8. Open Caveats

Identifier

Headline

CSCwa11427

Conversation Mode: 39RU cluster may not support 50k sensors when enforcement is enabled.

CSCvz95023

FMC-CSW orchestrator: CSW pushes ipv6 hop by hop if protocol is set to any.

CSCvz99865

AWS Flow Logs: Policies Analysis with AWS Flow logs doesn’t work.

Caveats for Release 3.6.1.47

The following table lists the caveats in this release.

Click a bug ID to access Cisco’s Bug Search Tool to see additional information about that bug.

Resolved Bugs

Identifier

Headline

CSCwc02772

Secure workload internal cluster orchestrator local dns may fail in very rare cases.

CSCwc14819

DNS external orchestrator - not able to get metadata - kafka producer error - message was too large.

CSCwb76311

Windows agent installer powershell script does not provide option to install agent in custom path.

CSCwc79283

Agent on RHEL hosts would repeatedly appear in Agent Restarted anomaly.

CSCwc77006

CSW 3.7 Upgrade may fail due to rsync version < 3.1.2 on orchestrators.

CSCwc17237

Disabling network visibility also disables process/package visibility.

CSCwb21235

namenode switchover script may fail to wait for namenode to start

CSCwc68679

Disabling the Forensic feature does not stop logging events into audit logs.

CSCwc23159

RHEL 8.x enforcement agents don't display in Upgrade tab.

CSCwc29903

Agent installer script with user label update caveat.

CSCwb80090

Clock Drift Observed on Windows Server 2008 R2 with Cisco Secure Workload Agent.

CSCwc59065

Enforcement Agent may restart when processing a policy with specific IPv6 ranges.

CSCwb94594

Unable to perform a massive CSW agent deployment for their workloads.

CSCwc31985

Error decoding netflow datasets received from ACI with EOF errors.

CSCwc32016

Netflow sensor dropping received netflow data.

CSCwc31977

Constant errors in decoding netflow packets from Netflow Connector.

CSCwb72418

Policy Template import does not change Analyze Latest Policies button.

CSCvy31758

[North Star] Add Requirement to Import Working SSH Keys Before Upgrade.

CSCvy04774

Feature Enhancement - Match Condition Support for All Label Types

Open Bugs

Identifier

Headline

CSCvz95962

Conversation Mode: Short lived non TCP flows in conversation mode can have client server flipped

CSCvz99865

policy analysis in child scopes for aws flow logs will not work

CSCwa11427

Conversation Mode: 39RU cluster may not support 50k sensors when enforcement is enabled.

CSCvz95023

Conversation Mode: 39RU cluster may not support 50k sensors when enforcement is enabled.

Caveats for Release 3.6.1.36

The following table lists the caveats in this release.

Click a bug ID to access Cisco’s Bug Search Tool to see additional information about that bug.

Resolved Bugs

Identifier

Headline

CSCwb25813

Secure Workload enforcement agent may incorrectly summarize IPv6 subnets

CSCwb39558

Services for AgentContainers and HelmCharts failing after patch upgrade.

CSCwb21235

namenode switchover script may fail to wait for namenode to start

CSCwb86649

ERSPAN sensor running in server with 40Gbps links, only receives 100Kpps

CSCwb83818

Enforcement agent depends on Windows Firewall Service when enforcement mode is WFP

CSCvz57161

EHN: Tet Agent installation should provides information the agent type details during installation

CSCwb27430

Document minimum required roles for SNOW integration

CSCvz32417

ENH - NPCAP version upgrade to latest 1.5

CSCwb25637

DNS external orchestrator failing on zone transfer

CSCwa64962

Federation/DBR: Unable to determine status of sensor migration from source cluster

CSCwb71970

Site DNS resolvers config change may fail

CSCwb11295

http proxy enable in 3.6 without port breaks appserver iptables template

CSCwa17868

ISE connector unable to process multiple memberOf attributes when integrated with LDAP

CSCwb92959

Log rotation broken for noisy.log on appserver virtual machines

CSCwb01213

Tetration incompatible with Rocky Linux 8

CSCvz95962

Conversation Mode: Short lived non TCP flows in conversation mode can have client server flipped

Open Bugs

CSCwb80090

Clock Drift Observed on Windows Server 2008 R2 with Cisco Secure Workload Agent

CSCvz99865

policy analysis in child scopes for aws flow logs will not work

CSCwa11427

Conversation Mode: 39RU cluster may not support 50k sensors when enforcement is enabled.

CSCwb97537

License Count Inaccurate

CSCvz95023

FMC-CSW orchestrator: CSW pushes ipv6 hop by hop if protocol is set to any

Caveats for Release 3.6.1.21

The following table lists the caveats in this release.

Click a bug ID to access Cisco’s Bug Search Tool to see additional information about that bug.

Resolved Bugs

Bug ID

Description

CSCwa91086

Reflect the NIC Teaming version compatibility matrix in Sensor Deployment documentation.

Open Bugs

Identifier

Headline

CSCwb86649

ERSPAN sensor running in server with 40Gbps links, only receives 100Kpps.

CSCwb83818

Enforcement agent depends on Windows Firewall Service when enforcement mode is WFP.

CSCwa64962

Federation/DBR: Unable to determine status of sensor migration from source cluster.

CSCwb80090

Clock Drift Observed on Windows Server 2008 R2 with Cisco Secure Workload Agent.

CSCvz99865

policy analysis in child scopes for aws flow logs will not work.

CSCvz95962

Conversation Mode: Short lived non TCP flows in conversation mode can have client server flipped.

CSCwa11427

Conversation Mode: 39RU cluster may not support 50k sensors when enforcement is enabled.

CSCvz95023

FMC-CSW orchestrator: CSW pushes ipv6 hop by hop if protocol is set to any.

Caveats for Release 3.6.1.17

The following table lists the caveats in this release.

Click a bug ID to access Cisco’s Bug Search Tool to see additional information about that bug.

Resolved Bugs

Identifier

Headline

CSCvz80415

Tetration Vulnerabilities Site, Output Issues

CSCwa90905

F5 external orchestrator improperly handles services marked with all protocols

CSCvu75902

Agent fails to register when using a vmware VDI instant clone (Windows10 w/ enforcement)

CSCvz64463

Tetration SSH keys not synced between Primary and secondary sites for cluster in federation

CSCwa00954

ADM generates polices with provider port set as 0 in conversation mode

CSCvy09204

Describe the differences between Strong Ciphers Enabled option set True or False.

CSCvx63434

ENH: Tetration Agent support for Windows Storage Server 2012R2/ Storage Server 2016

CSCwa91167

ADM Job Failing after upgrade to 3.6.1.5 for Workspaces using Provided service requests

CSCwa48895

FabricPath is not displayed correctly in scenario with two ACI fabric connected to Tetration Cluster

CSCwa55880

Error opening Workload profile page of Sensors with locale name contianing non utf-8 characters

CSCvz38485

ENH : Deep Visibility Sensor to regularly poll windows registry update Tetration with new UBR

CSCwa15075

Agent upgrade on RHEL 8.2 VM's is failing with Reason: No PGP signature

CSCvz86846

Enforcement Agent stats for CPU overhead metric on workload profile page are reported incorrectly

CSCwa91045

Windows agent shows inactive after upgrade to 3.6.1.5 while using proxy with internal only DNS

CSCwa00947

ADM generates policies for un-established TCP flows when agents are in conversation mode

CSCwa19256

Error - Upgrade to 3.6.1.5 failed with site_enable_strong_ciphers_sensor_vip undefined

CSCwa07367

3.6(1.5) agent installation script cannot install 3.5(1.x) agent packages on Windows host

CSCvk23529

Reflect the NIC Teaming version compatibility matrix in Sensor Deployment documentation

CSCvx62775

Add Tetration agent support for Windows 10 Enterprise LTSC

CSCvz76583

ADM failing after 4 hours when admFlowDb batches are too large.

CSCwa23206

After reconfiguring listening port of ingest connector, the connector gets in inactive state.

CSCvv46629

Need alerts when new workloads are seen for the first time

Open Bugs

Identifier

Headline

CSCwb86649

ERSPAN sensor running in server with 40Gbps links, only receives 100Kpps

CSCwb83818

Enforcement agent depends on Windows Firewall Service when enforcement mode is WFP

CSCwa91086

Flow Learned Inventories build up from uni-dir flows in Conversation mode

CSCwa64962

Federation/DBR: Unable to determine status of sensor migration from source cluster

CSCwb80090

Clock Drift Observed on Windows Server 2008 R2 with Cisco Secure Workload Agent

CSCvz99865

policy analysis in child scopes for aws flow logs will not work

CSCvz95962

Conversation Mode: Short lived non TCP flows in conversation mode can have client server flipped

CSCwa11427

Conversation Mode: 39RU cluster may not support 50k sensors when enforcement is enabled.

CSCvz95023

FMC-CSW orchestrator: CSW pushes ipv6 hop by hop if protocol is set to any.

Caveats for Release 3.6.1.5

The following table lists the caveats in this release.

Click a bug ID to access Cisco’s Bug Search Tool to see additional information about that bug.

Resolved Bugs

Identifier

Headline

CSCvz57109

Inbound WFP filters can block subsequent ports in some policies in older Windows releases

CSCvy59198

Tetration agent upgrade may fail npcap installation on Windows

CSCvx75320

ERSPAN appliance reflecting as "PENDING REGISTRATION"

CSCvy73310

Enforcement agent keeps re-deploying firewall rules intermittently to Windows Systems

CSCvy99946

ERSPAN agents not upgrading after 3.5.x

CSCvz08788

Old LDAP attribute is still visible in Flow Search After deleting from Ldap conf for the anyconnect

CSCvx88167

Agent installer scripts from LDAP/ AD accounts with auto role mapping fail after user is logged out.

CSCvz72734

Linux Enforcement agent fails to program firewall rules due to issue with iptables version 1.8.4

CSCvw06912

ENH: Add an alert for CPU quota exceeded in Enforcement Alert types.

CSCvy04287

NET Vulnerabilities wrongly queried, eventually causing the FP in Tetration for Server 2008 R2

CSCvz45848

CVEs are detected post latest data pack installation

CSCvy45431

Windows Agent Install: error: Older version of Tetration agent cannot be removed

CSCvz49507

ISE Integration causing stale annotations for EAP chaining and IP address change cases

Open Bugs

The following table lists the open bugs in this release.

Click a bug ID to access Cisco’s Bug Search Tool to see additional information about that bug.

Identifier

Headline

CSCwb86649

ERSPAN sensor running in server with 40Gbps links, only receives 100Kpps

CSCwb83818

Enforcement agent depends on Windows Firewall Service when enforcement mode is WFP

CSCvz86846

Enforcement Agent stats for CPU overhead metric on workload profile page are reported incorrectly

CSCwb80090

Clock Drift Observed on Windows Server 2008 R2 with Cisco Secure Workload Agent

CSCvz99865

policy analysis in child scopes for aws flow logs will not work

CSCwa23206

After reconfiguring listening port of ingest connector, the connector gets in inactive state.

CSCwa00954

ADM generates polices with provider port set as 0 in conversation mode

CSCwa19256

Error - Upgrade to 3.6.1.5 failed with site_enable_strong_ciphers_sensor_vip undefined

CSCvz95962

Conversation Mode: Short lived non TCP flows in conversation mode can have client server flipped

CSCwa00947

ADM generates policies for un-established TCP flows when agents are in conversation mode

CSCwa07367

3.6(1.5) agent installation script cannot install 3.5(1.x) agent packages on Windows host

CSCwa11427

Conversation Mode: 39RU cluster may not support 50k sensors when enforcement is enabled.

CSCvz95023

FMC-CSW orchestrator: CSW pushes ipv6 hop by hop if protocol is set to any.

Related Documentation

The Cisco Secure Workload documentation can be accessed from these websites:

Table 9. Installation Documentation

Document

Description

Cisco Secure Workload Cluster Deployment Guide

Describes the physical configuration, site preparation, and cabling of a single- and dual-rack installation for Cisco Secure Workload (39-RU) platform and Cisco Secure Workload M (8-RU).

Cisco Tetration (Secure Workload) M5 Cluster Hardware Deployment Guide

Cisco Secure Workload Virtual Deployment Guide

Describes the deployment of Cisco Secure Workload virtual appliances (formerly known as Tetration-V).

Cisco Secure Workload Virtual (Tetration-V) Deployment Guide

Cisco Secure Workload Upgrade Guide

Cisco Secure Workload Upgrade Guide

Note

 

As a best practice, it’s always recommended to patch a cluster to the latest available patch version before performing a major version upgrade.

Latest Threat Data Sources

Cisco Secure Workload

If you cannot resolve an issue using the online resources listed above, contact Cisco TAC:

Contact Cisco

If you cannot resolve an issue using the online resources listed above, contact Cisco TAC: