SOURCEFIRE 3D SYSTEM RELEASE NOTES

Similar documents
SOURCEFIRE 3D SYSTEM RELEASE NOTES

SOURCEFIRE 3D SYSTEM RELEASE NOTES

SOURCEFIRE 3D SYSTEM RELEASE NOTES

SOURCEFIRE 3D SYSTEM RELEASE NOTES

SOURCEFIRE 3D SYSTEM RELEASE NOTES

SOURCEFIRE 3D SYSTEM RELEASE NOTES

SOURCEFIRE 3D SYSTEM RELEASE NOTES

SOURCEFIRE 3D SYSTEM RELEASE NOTES

SOURCEFIRE 3D SYSTEM RELEASE NOTES

SOURCEFIRE 3D SYSTEM RELEASE NOTES

Before You Update: Important Notes

SOURCEFIRE 3D SYSTEM RELEASE NOTES

Updating to Version 6.2.2

Firepower Management Center High Availability

Pass4sure q. Cisco Securing Cisco Networks with Sourcefire IPS

Upgrade the ASA FirePOWER Module

System Software Updates

System Configuration. The following topics explain how to configure system configuration settings on Firepower Management Centers and managed devices:

Device Management Basics

Device Management Basics

vcenter Server Appliance Configuration Modified on 17 APR 2018 VMware vsphere 6.7 VMware ESXi 6.7 vcenter Server 6.7

The following topics describe how to manage various policies on the Firepower Management Center:

Device Management Basics

Configuring High Availability (HA)

Connection Logging. Introduction to Connection Logging

Connection Logging. About Connection Logging

Host Identity Sources

User Identity Sources

Realms and Identity Policies

Application Detection

FireSIGHT Virtual Installation Guide

WatchGuard Dimension v2.1.1 Update 3 Release Notes

VMware Identity Manager Connector Installation and Configuration (Legacy Mode)

User Identity Sources

McAfee Network Security Platform

Barracuda Link Balancer

Network Discovery Policies

Network Security Platform 8.1

Cisco Expressway Cluster Creation and Maintenance

vcloud Director User's Guide

Barracuda Firewall Release Notes 6.6.X

Intrusion Detection and Prevention IDP 4.1r4 Release Notes

vcloud Director User's Guide

CA Agile Central Installation Guide On-Premises release

Monitoring the Device

Platform Settings for Classic Devices

Cisco TelePresence VCS Cluster Creation and Maintenance

Licensing the Firepower System

vcenter Server Appliance Configuration Update 1 Modified on 04 OCT 2017 VMware vsphere 6.5 VMware ESXi 6.5 vcenter Server 6.5

SonicOS Enhanced Release Notes

Intrusion Detection and Prevention Release Notes

Setting Up the Sensor

Branch Repeater :51:35 UTC Citrix Systems, Inc. All rights reserved. Terms of Use Trademarks Privacy Statement

CounterACT 7.0. Quick Installation Guide for a Single Virtual CounterACT Appliance

McAfee Network Security Platform 8.3

CA Agile Central Administrator Guide. CA Agile Central On-Premises

Managing CX Devices in Multiple Device Mode

The following topics describe how to use dashboards in the Firepower System:

ForeScout CounterACT. Single CounterACT Appliance. Quick Installation Guide. Version 8.0

VMware vcenter AppSpeed Installation and Upgrade Guide AppSpeed 1.2

Initial Configuration Steps of FireSIGHT Systems

Deployment of FireSIGHT Management Center on VMware ESXi

Overview. ACE Appliance Device Manager Overview CHAPTER

McAfee Network Security Platform 8.3

Installing and Configuring vcloud Connector

Configuring Cisco TelePresence Manager

Installing Cisco CMX in a VMware Virtual Machine

Getting Started with Access Control Policies

Identity Firewall. About the Identity Firewall

Configuration Import and Export

Setting Up the Server

Privileged Remote Access Failover Configuration

DEPLOYMENT GUIDE DEPLOYING F5 WITH ORACLE ACCESS MANAGER

Release Notes Version 7.8

Licensing the Firepower System

Security, Internet Access, and Communication Ports

The following topics explain how to get started configuring Firepower Threat Defense. Table 1: Firepower Device Manager Supported Models

Next Generation Firewall

Management Console User s Guide (AST 2500 Chipset)

Security, Internet Access, and Communication Ports

Classic Device Management Basics

Network Security Platform 8.1

Network Security Platform 8.1

Security, Internet Access, and Communication Ports

Viewing System Status, page 404. Backing Up and Restoring a Configuration, page 416. Managing Certificates for Authentication, page 418

Release Notes for Cisco IronPort AsyncOS 7.7 for Security Management

Forescout. Quick Installation Guide. Single Appliance. Version 8.1

Troubleshooting Cisco APIC-EM Single and Multi-Host

IPMI Configuration Guide

Access Control Using Intrusion and File Policies

McAfee Next Generation Firewall 5.9.1

Value Added Services (VAS) Traffic Forwarding

Failover Configuration Bomgar Privileged Access

GSS Administration and Troubleshooting

The following topics describe how to use backup and restore features in the Firepower System:

Key Features... 2 Known Issues... 3 Resolved Issues... 5 Upgrading SonicOS Enhanced Image Procedures... 6 Related Technical Documentation...

McAfee Network Security Platform 8.3

McAfee Network Security Platform 8.3

Identity Policies. Identity Policy Overview. Establishing User Identity through Active Authentication

Cisco Prime Collaboration Deployment

Transcription:

SOURCEFIRE 3D SYSTEM RELEASE NOTES Version 5.3.0.8 Original Publication: May 2, 2016 These release notes are valid for Version 5.3.0.8 of the Sourcefire 3D System. Even if you are familiar with the update process, make sure you thoroughly read and understand these release notes, which describe supported platforms, new and changed features and functionality, known and resolved issues, and product and web browser compatibility. They also contain detailed information on prerequisites, warnings, and specific installation and uninstallation instructions for the following appliances: Series 2 and Series 3 managed devices (the 3D500, 3D1000, 3D2000, 3D2100, 3D2500, 3D3500, 3D4500, 3D6500, 3D7010, 3D7020, 3D7030, 3D7110, 3D7115, 3D7120, 3D7125, 3D8120, 3D8130, 3D8140, 3D8250, 3D8260, 3D8270, 3D8290, 3D8350, 3D8360, 3D8370, 3D8390, and the AMP7150) NOTE! This update is not supported or managed devices or Sourcefire Software for X-Series. TIP! For detailed information on the Sourcefire 3D System, refer to the online help or download the Sourcefire 3D System User Guide from the Support Site. To update appliances running at least Version 5.3 of the Sourcefire 3D System to Version 5.3.0.8, see the procedures outlined in Updating Your Appliances on page 7. Version 5.3.0.8 Sourcefire 3D System Release Notes 1

New and Updated Features and Functionality For more information, see the following sections: New and Updated Features and Functionality on page 2 Updates to Sourcefire Documentation on page 2 Before You Begin: Important Update and Compatibility Notes on page 3 Updating Your Appliances on page 7 Uninstalling the Update on page 12 Resolved Issues on page 16 Known Issues on page 27 Features Introduced in Previous Versions on page 39 For Assistance on page 46 New and Updated Features and Functionality This section of the release notes summarizes the new and updated features and functionality included in Version 5.3.0.8 of the Sourcefire 3D System. For detailed information, see the Sourcefire 3D System User Guide, Installation Guide, Virtual Installation Guide, and Sourcefire Software for X-Series Installation and Configuration Guide. Updates to Sourcefire Documentation The documentation provided for Version 5.3.0.8 includes the following errors: Version 5.3.0.8 Sourcefire 3D System Release Notes 2

Before You Begin: Important Update and Compatibility Notes If you apply an access control policy with the default action set to Network Discovery that contains an access control rule configured to Block ICMPv6 traffic to an 800 Series, the system does not generate events when traffic is blocked when it should.the FireSIGHT System User Guide does not state the following guidelines to help simplify access control rules, improve performance, and reduce extraneous memory usage: When constructing a rule, use as few individual elements in your conditions as possible. For example, in network conditions, use IP address blocks rather than individual IP addresses. In port conditions, use port ranges. Use application filters and URL categories and reputations to perform application control and URL filtering, and LDAP user groups to perform user control. IMPORTANT! Combining elements into objects that you then use in access control rule conditions does not improve performance. For example, using a network object that contains 50 individual IP addresses gives you only an organizational - not a performance - benefit over including those IP addresses in the condition individually. Restrict rules by security zones whenever possible. If a device s interfaces are not in one of the zones in a zone-restricted rule, the rule does not affect performance on that device. Do not overconfigure rules. If one condition is enough to match the traffic you want to handle, do not use two. (CSCuv65842) The FireSIGHT System User Guide incorrectly states that You can use Lights-Out Management (LOM) on the default (eth0) management interface on a Serial Over LAN (SOL) connection to remotely monitor or manage Series 3 appliances without logging into the management interface of the appliance when you cannot. (CSCuu17674) The FireSIGHT System User Guide does not reflect that you can now choose whether to inspect traffic during policy apply. Inspecting traffic during policy apply on a heavily loaded system may have an impact on network throughput and latency. If this side effect is not ideal for your network setup and connectivity is more important than inspection, unchecking this box will disable inspection temporarily during policy apply and ensure that no packets are dropped during the procedure. After policy apply is successful inspection will resume as normal. (144574/CSCze95159, 144571/CSCze95210) Before You Begin: Important Update and Compatibility Notes Before you begin the update process for Version 5.3.0.8, you should familiarize yourself with the behavior of the system during and after the update process, as Version 5.3.0.8 Sourcefire 3D System Release Notes 3

Before You Begin: Important Update and Compatibility Notes well as with any compatibility issues or required pre- or post-update configuration changes. WARNING! Sourcefire strongly recommends you perform the update in a maintenance window or at a time when the interruption will have the least impact on your deployment. For more information, see the following sections: Configuration and Event Backup Guidelines on page 4 Traffic Flow and Inspection During the Update on page 4 Product Compatibility on page 5 Configuration and Event Backup Guidelines Before you begin the update, Sourcefire strongly recommends that you back up current event and configuration data to an external location. This data is not backed up as part of the update process. Use the Defense Center to back up event and configuration data for itself and the devices it manages. For more information on the backup and restore feature, see the Sourcefire 3D System User Guide. IMPORTANT! The Defense Center purges locally stored backups from previous updates. To retain archived backups, store the backups externally. Traffic Flow and Inspection During the Update The update process (and any uninstallation of the update) reboots managed devices. Depending on how your devices are configured and deployed, the following capabilities are affected: traffic inspection, including application awareness and control, URL filtering, Security Intelligence, intrusion detection and prevention, and connection logging traffic flow, including switching, routing, NAT, VPN, and related functionality link state Note that when you update clustered devices, the system performs the update one device at a time to avoid traffic interruption. Traffic Inspection and Link State In an inline deployment, your managed devices (depending on model) can affect traffic flow via application control, user control, URL filtering, Security Intelligence, and intrusion prevention, as well as switching, routing, NAT, and Version 5.3.0.8 Sourcefire 3D System Release Notes 4

. Before You Begin: Important Update and Compatibility Notes Network Traffic Interruption VPN. In a passive deployment, you can perform intrusion detection and collect discovery data without affecting network traffic flow. For more information on appliance capabilities, see the Sourcefire 3D System Installation Guide. The following table provides details on how traffic flow, inspection, and link state are affected during the update, depending on your deployment. Note that regardless of how you configured any inline sets, switching, routing, NAT, and VPN are not performed during the update process. DEPLOYMENT Inline with configurable bypass (Configurable bypass option enabled for inline sets) Inline Passive NETWORK TRAFFIC INTERRUPTED? Network traffic is interrupted at two points during the update: At the beginning of the update process, traffic is briefly interrupted while link goes down and up (flaps) and the network card switches into hardware bypass. Traffic is not inspected during hardware bypass. After the update finishes, traffic is again briefly interrupted while link flaps and the network card switches out of bypass. After the endpoints reconnect and reestablish link with the sensor interfaces, traffic is inspected again. IMPORTANT! The configurable bypass option is not supported on virtual devices, Sourcefire Software for X-Series, non-bypass NetMods on 8000 Series devices, or SFP transceivers on 71xx Family devices. Network traffic is blocked throughout the update. Network traffic is not interrupted, but also is not inspected during the update. Switching and Routing Managed devices do not perform switching, routing, NAT, VPN, or related functions during the update. If you configured your devices to perform only switching and routing, network traffic is blocked throughout the update. Product Compatibility You must use at least Version 5.3.0 of the Defense Center to manage devices running Version 5.3.0.8. Defense Centers running Version 5.3.0.8 can manage physical devices and virtual devices running Version 5.3 or greater. Version 5.3.0.8 Sourcefire 3D System Release Notes 5

Before You Begin: Important Update and Compatibility Notes Version Requirements for Management APPLIANCE physical and virtual managed devices MINIMUM VERSION TO BE MANAGED BY A DEFENSE CENTER RUNNING VERSION 5.3.1.7 Version 5.3 of the FireSIGHT System NOTE! This update is not supported or managed devices or Sourcefire Software for X-Series. Web Browser Compatibility Version 5.3.0.8 of the web interface for the Sourcefire 3D System has been tested on the browsers listed in the following table. IMPORTANT! If you use the Microsoft Internet Explorer 11 browser, you must disable the Including local directory path when uploading files to server option in your Internet Explorer settings via Tools > Internet Options > Security > Custom level. Web Browser Compatibility BROWSER Chrome 49 Firefox 45 Microsoft Internet Explorer 9, 10, and 11 REQUIRED ENABLED OPTIONS AND SETTINGS JavaScript, cookies JavaScript, cookies, Secure Sockets Layer (SSL) v3 JavaScript, cookies, Secure Sockets Layer (SSL) v3, 128-bit encryption, Active scripting security setting, Compatibility View, set Check for newer versions of stored pages to Automatically Screen Resolution Compatibility Sourcefire recommends selecting a screen resolution that is at least 1280 pixels wide. The user interface is compatible with lower resolutions, but a higher resolution optimizes the display. Version 5.3.0.8 Sourcefire 3D System Release Notes 6

Updating Your Appliances Updating Your Appliances To update appliances running at least Version 5.3 of the Sourcefire 3D System to Version 5.3.0.8, see the procedures outlined below. The following sections help you to prepare for and install the Version 5.3.0.8 update: Planning the Update on page 7 Updating Managed Devices and on page 10 WARNING! Do not reboot or shut down your appliances during the update until you see the login prompt. The system may appear inactive during the pre-checks portion of the update; this is expected behavior and does not require you to reboot or shut down your appliances. Planning the Update Before you begin the update, you must thoroughly read and understand these release notes, especially Before You Begin: Important Update and Compatibility Notes on page 3. To ensure a smooth update process, you must also read the following sections. Sourcefire 3D System Version Requirements To update to Version 5.3.0.8, an appliance must be running at least Version 5.3. If you are running an earlier version, you can obtain updates from the Support Site. Note that although this release does not contain an update for Defense Centers, Sourcefire strongly recommends that you use them to update the devices they manage. A Defense Center must be running at least Version 5.3.1 to update its managed devices to Version 5.3.0.8. The closer your appliances current version to the release versions (Version 5.3.0.8), the less time the update takes. Operating System Requirements You can host 64-bit virtual Sourcefire virtual devices on the following hosting environments: VMware vsphere Hypervisor/VMware ESXi 5.0 VMware vsphere Hypervisor/VMware ESXi 5.1 VMware vcloud Director 5.1 For more information, see the Sourcefire 3D System Virtual Installation Guide. Version 5.3.0.8 Sourcefire 3D System Release Notes 7

Updating Your Appliances Time and Disk Space Requirements The following table provides disk space and time guidelines for the Version 5.3.0.8 update. Note that when you use the Defense Center to update a managed device, the Defense Center requires additional disk space on its /Volume partition. Do not restart the update or reboot your appliance at any time during the update process. Sourcefire provides time estimates as a guide, but actual update times vary depending on the appliance model, deployment, and configuration. Note that the system may appear inactive during the pre-checks portion of the update and after rebooting; this is expected behavior. TIP! The reboot portion of the update includes a database check. If errors are found during the database check, the update requires additional time to complete. System daemons that interact with the database do not run during the database check and repair. Time and Disk Space Requirements If you encounter issues with the progress of your update, contact Support. APPLIANCE SPACE ON / SPACE ON /VOLUME SPACE ON /VOLUME ON MANAGER TIME Series 2 managed devices 94 MB 8972 MB 1391 MB 96 minutes Series 3 managed devices 350 MB 16840 MB 2112 MB 24 minutes virtual managed devices 319 MB 8835 MB 1236 MB hardware dependent Configuration and Event Backup Guidelines Before you begin the update, Sourcefire strongly recommends that you back up current event and configuration data to an external location. This data is not backed up as part of the update process. You can use the Defense Center to back up event and configuration data for itself and the devices it manages. For more information on the backup and restore feature, see the Sourcefire 3D System User Guide. When to Perform the Update Because the update process may affect traffic inspection, traffic flow, and link state, Sourcefire strongly recommends you perform the update in a maintenance window or at a time when the interruption will have the least impact on your deployment. Version 5.3.0.8 Sourcefire 3D System Release Notes 8

Updating Your Appliances Installation Method Use the Defense Center s web interface to perform the update. Update the Defense Center first, then use it to update the devices it manages. Order of Installation Update your Defense Centers before updating the devices they manage. Defense Center must be running at least Version 5.3.0.1 Installing the Update on Clustered Devices When you install an update on clustered devices, the system performs the update on the devices one at a time. When the update starts, the system first applies it to the secondary device, which goes into maintenance mode until any necessary processes restart and the device is processing traffic again. The system then applies the update to the primary device, which follows the same process. Installing the Update on Stacked Devices When you install an update on stacked devices, the system performs the updates simultaneously. Each device resumes normal operation when the update completes. Note that: If the primary device completes the update before all of the secondary devices, the stack operates in a limited, mixed-version state until all devices have completed the update. If the primary device completes the update after all of the secondary devices, the stack resumes normal operation when the update completes on the primary device. After the Installation After you perform the update on the managed devices, you must reapply device configuration and access control policies. Applying an access control policy may cause a short pause in traffic flow and processing, and may also cause a few packets to pass uninspected. For more information, see the Sourcefire 3D System User Guide. Version 5.3.0.8 Sourcefire 3D System Release Notes 9

Updating Your Appliances There are several additional post-update steps you should take to ensure that your deployment is performing properly. These include: verifying that the update succeeded making sure that all appliances in your deployment are communicating successfully updating your intrusion rules and vulnerability database (VDB), if necessary updating your vulnerability database (VDB) to at least Version 220 or later making any required configuration changes based on the information in Updates to Sourcefire Documentation on page 2 The next sections include detailed instructions not only on performing the update, but also on completing any post-update steps. Make sure you complete all of the listed tasks. Updating Managed Devices and After you update your Defense Centers to Version 5.3.0.1, use them to update the devices they manage. A Defense Center must be running at least Version 5.3.0.1 to update its managed devices to 5.3.0.8. Because they do not have a web interface, you must use the Defense Center to update virtual managed devices. Updating managed devices is a two-step process. First, download the update from the Support Site and upload it to the managing Defense Center. Next, install the software. You can update multiple devices at once, but only if they use the same update file. For the Version 5.3.0.8 update, all devices reboot. Depending on how your devices are configured and deployed, the update process may also affect traffic flow and link state. For more information, see Traffic Flow and Inspection During the Update on page 4. WARNING! Before you update a managed device, use its managing Defense Center to reapply the appropriate access control policy to the managed device. Otherwise, the managed device update may fail. WARNING! Do not reboot or shut down your appliances during the update until after you see the login prompt. The system may appear inactive during the pre-checks portion of the update; this is expected behavior and does not require you to reboot or shut down your appliances. Version 5.3.0.8 Sourcefire 3D System Release Notes 10

Updating Your Appliances To update managed devices: 1. Read these release notes and complete any required pre-update tasks. For more information, see Before You Begin: Important Update and Compatibility Notes on page 3 and Planning the Update on page 7. 2. Download the update from the Support Site: for Series 2 managed devices: Sourcefire_3D_Device_Patch-5.3.0.8-15.sh for Series 3 managed devices: Sourcefire_3D_Device_S3_Patch-5.3.0.8-15.sh for virtual managed devices: Sourcefire_3D_Device_Virtual64_VMware_Patch-5.3.0.8-15.sh IMPORTANT! Download the update directly from the Support Site. If you transfer an update file by email, it may become corrupted. 3. Upload the update to the Defense Center by selecting System > Updates, then clicking Upload Update on the Product Updates tab. Browse to the update and click Upload. The update is uploaded to the Defense Center. 4. Make sure that the appliances in your deployment are successfully communicating and that there are no issues reported by the health monitor. 5. Click the install icon next to the update you are installing. The Install Update page appears. 6. Select the devices where you want to install the update. If you are updating a stacked pair, selecting one member of the pair automatically selects the other. You must update members of a stacked pair together. 7. Click Install. Confirm that you want to install the update and reboot the devices. The update process begins. You can monitor the update's progress in the Defense Center s task queue (System > Monitoring > Task Status). Note that managed devices may reboot twice during the update; this is expected behavior. WARNING! If you encounter issues with the update (for example, if the task queue indicates that the update has failed or if a manual refresh of the task queue shows no progress for several minutes), do not restart the update. Instead, contact Support. Version 5.3.0.8 Sourcefire 3D System Release Notes 11

Uninstalling the Update 8. Select Devices > Device Management and confirm that the devices you updated have the correct software version: Version 5.3.0.8. 9. Verify that the appliances in your deployment are successfully communicating and that there are no issues reported by the health monitor. 10. Reapply device configurations to all managed devices. TIP! To reactivate a grayed-out Apply button, edit any interface in the device configuration, then click Save without making changes. 11. Reapply access control policies to all managed devices. Applying an access control policy may cause a short pause in traffic flow and processing, and may also cause a few packets to pass uninspected. For more information, see the Sourcefire 3D System User Guide. Uninstalling the Update The following sections help you uninstall the Version 5.3.0.8 update from your appliances: Planning the Uninstallation on page 12 Uninstalling the Update from a Managed Device on page 14 Uninstalling the Update from a Virtual Managed Device on page 15 Planning the Uninstallation Before you uninstall the update, you must thoroughly read and understand the following sections. Uninstallation Method You must uninstall updates locally. You cannot use a Defense Center to uninstall the update from a managed device. For all physical appliances, uninstall the update using the local web interface. Because virtual managed devices do not have a web interface, you must use the bash shell to uninstall the update. Order of Uninstallation Uninstall the update in the reverse order that you installed it. That is, first uninstall the update from managed devices, then from Defense Centers. Version 5.3.0.8 Sourcefire 3D System Release Notes 12

Uninstalling the Update Uninstalling the Update from Clustered or Paired Appliances Clustered devices in high availability pairs must run the same version of the Sourcefire 3D System. Although the uninstallation process triggers an automatic failover, appliances in mismatched pairs or clusters do not share configuration information, nor do they install or uninstall updates as part of their synchronization. If you need to uninstall an update from redundant appliances, plan to perform the uninstallations in immediate succession. To ensure continuity of operations, uninstall the update from clustered devices one at a time. First, uninstall the update from the secondary appliance. Wait until the uninstallation process completes, then immediately uninstall the update from the primary appliance. WARNING! If the uninstallation process on a clustered device fails, do not restart the uninstall or change configurations on its peer. Instead, contact Support. Uninstalling the Update from Stacked Devices All devices in a stack must run the same version of the Sourcefire 3D System. Uninstalling the update from any of the stacked devices causes the devices in that stack to enter a limited, mixed-version state. To minimize impact on your deployment, Sourcefire recommends that you uninstall an update from stacked devices simultaneously. The stack resumes normal operation when the uninstallation completes on all devices in the stack. Uninstalling the Update from Devices Deployed Inline Managed devices do not perform traffic inspection, switching, routing, or related functions while the update is being uninstalled. Depending on how your devices are configured and deployed, the uninstallation process may also affect traffic flow and link state. For more information, see Traffic Flow and Inspection During the Update on page 4. After the Uninstallation After you uninstall the update, there are several steps you should take to ensure that your deployment is performing properly. These include verifying that the uninstall succeeded and that all appliances in your deployment are communicating successfully. The next sections include detailed instructions not only on performing the update, but also on completing any post-update steps. Make sure you complete all of the listed tasks. Version 5.3.0.8 Sourcefire 3D System Release Notes 13

Uninstalling the Update Uninstalling the Update from a Managed Device The following procedure explains how to use the local web interface to uninstall the Version 5.3.0.8 update from managed devices. You cannot use a Defense Center to uninstall the update from a virtual managed device. Uninstalling the Version 5.3.0.8 update results in a device running Version 5.3.0.7. For information on uninstalling a previous version, refer to the release notes for that version. Uninstalling the Version 5.3.0.8 update reboots the device. Managed devices do not perform traffic inspection, switching, routing, or related functions during the update. Depending on how your devices are configured and deployed, the update process may also affect traffic flow and link state. For more information, see Traffic Flow and Inspection During the Update on page 4. To uninstall the update: 1. Read and understand Planning the Uninstallation on page 12. 2. On the managing Defense Center, make sure that the appliances in your deployment are successfully communicating and that there are no issues reported by the health monitor. 3. On the managed device, view the task queue (System > Monitoring > Task Status) to make sure that there are no tasks in progress. Tasks that are running when the uninstallation begins are stopped, become failed tasks, and cannot be resumed; you must manually delete them from the task queue after the uninstallation completes. The task queue automatically refreshes every 10 seconds. You must wait until any long-running tasks are complete before you begin the uninstallation. 4. Select System > Updates. The Product Updates tab appears. Version 5.3.0.8 Sourcefire 3D System Release Notes 14

Uninstalling the Update 5. Click the install icon next to the uninstaller that matches the update you want to remove, then confirm that you want to uninstall the update and reboot the device. The uninstallation process begins. You can monitor the uninstallation progress in the task queue (System > Monitoring > Task Status). WARNING! Do not use the web interface to perform any other tasks until the uninstallation has completed and the device reboots. Before the uninstallation completes, the web interface may become unavailable and the device may log you out. This is expected behavior; log in again to view the task queue. If the uninstallation is still running, do not use the web interface until the uninstallation has completed. If you encounter issues with the uninstallation (for example, if the task queue indicates that the update has failed or if a manual refresh of the task queue shows no progress for several minutes), do not restart the uninstallation. Instead, contact Support. 6. After the uninstallation finishes, clear your browser cache and force a reload of the browser. Otherwise, the user interface may exhibit unexpected behavior. 7. Log in to the device. 8. Select Help > About and confirm that the software version is listed correctly: Version 5.3.0.7. 9. On the managing Defense Center, verify that the appliances in your deployment are successfully communicating and that there are no issues reported by the health monitor. Uninstalling the Update from a Virtual Managed Device The following procedure explains how to uninstall the Version 5.3.0.8 update from virtual managed devices. You cannot use a Defense Center to uninstall the update from a managed device. Uninstalling the Version 5.3.0.8 update results in a device running Version 5.3.0.7. For information on uninstalling a previous version, refer to the release notes for that version. Uninstalling the Version 5.3.0.8 update reboots the device. Virtual managed devices do not perform traffic inspection or related functions during the update. Depending on how your devices are configured and deployed, the update process may also affect traffic flow. For more information, see Traffic Flow and Inspection During the Update on page 4. To uninstall the update: 1. Read and understand Planning the Uninstallation on page 12. 2. Log into the device as admin, via SSH or through the virtual console. Version 5.3.0.8 Sourcefire 3D System Release Notes 15

Resolved Issues 3. At the CLI prompt, type expert to access the bash shell. 4. At the bash shell prompt, type sudo su -. 5. Type the admin password to continue the process with root privileges. 6. At the prompt, enter the following on a single line: install_update.pl /var/sf/updates/sourcefire_3d_ Device_Virtual64_VMware_Patch_Uninstaller-5.3.0.8-15.sh The uninstallation process begins. WARNING! If you encounter issues with the uninstallation, do not restart the uninstallation. Instead, contact Support. 7. After the uninstallation finishes, log into the managing Defense Center and select Devices > Device Management. Confirm that the device where you uninstalled the update has the correct software version: Version 5.3.0.7. 8. Verify that the appliances in your deployment are successfully communicating and that there are no issues reported by the health monitor. Resolved Issues To view defects addressed in Version 5.3.0.2 or later refer to the previous caveat tracking system. The following resolved issues are reported in Version 5.3.0.8: Security Issue Addressed an unauthenticated, arbitrary execution allowing unauthenticated attackers to affect the HTTPS connection during a rule update from support.sourcefire.com, as described in CVE-2015-6357. Security Issue Addressed a vulnerability in the third-party product Linux that allowed an authenticated user to cause Denial of Service, as described in CVE-2015-5364. Security Issue Addressed an arbitrary HTTP header injection vulnerability allowing unauthenticated, remote attackers to exploit managed devices as described in CVE-2016-1345. Issues Resolved in Previous Updates You can track defects resolved in this release using the Cisco Bug Search Tool (https://tools.cisco.com/bugsearch/). A Cisco account is required. To view defects addressed in older versions, refer to the legacy caveat tracking system. Because you can update your appliances from Version 5.3 to Version 5.3.0.8, this update also includes the changes from Version 5.3. Previously resolved issues are listed by version. Version 5.3.0.8 Sourcefire 3D System Release Notes 16

Resolved Issues Version 5.3.0.7: Security Issue Addressed multiple vulnerabilities in SSLv3 that allowed external attacks on client connections, as described in CVE-2014-8275 and CVE-2015-0204. Security Issue Addressed multiple vulnerability issues in Linux, NTP, and other third parties, as described in CVE-2011-2699, CVE-2011-4131, CVE-2012-3400, CVE-2013-1944, CVE-2013-4545, CVE-2014-0139, and CVE-2014-9296. Security Issue Addressed an arbitrary script injection vulnerability allowing unauthenticated, remote attackers to exploit GNU C library DNS resolution functionality, as described in CVE-2013-7423. Resolved an issue where running sudo ips_profile system support run-rule-profiling shell command on a device running at least Version 5.3 that is registered to a Defense Center running at least Version 5.4 caused the rule profiled script to fail. (CSCuu02211) Resolved an issue where the managed device experienced preprocessor failure. (CSCuu86214) Version 5.3.0.6: Security Issue Addressed multiple vulnerability issues in Linux, as described in CVE-2011-1927. Security Issue Addressed a vulnerability in HTTP connection handling that allowed users to be redirected to malicious websites, as described in CVE-2015-0706. Improved URL blocking and URL filtering. (144198/CSCze94590) Resolved an issue where the system displayed the incorrect memory usage on the System Load dashboard widget. (144593/CSCze94840, CSCuu19742) Resolved an issue where the passive interfaces on 7000 Series devices reported an incorrect egress security zone. (144624/CSCze95206) Resolved an issue where, if your system restarted after a VDB install and the Inspect Traffic During Policy Apply option in your access control policy was unchecked, your system experienced loss of network connectivity. (CSCut08225) Resolved an issue where, if you created a passive zone on a 8000 Series device and issued the show fastpath-rules CLI command, the system incorrectly reported fastpath rules as inactive. (CSCut32479) Resolved an issue where the system did not display some web application information in a host profile when only a subset of the networks were monitored. (CSCut36536) Resolved an issue where, if your 8000 Series device included a nsmb module, the system experienced issues and generated disk space errors. (CSCuu06130) Version 5.3.0.8 Sourcefire 3D System Release Notes 17

Resolved Issues Version 5.3.0.5: Security Issue Addressed multiple cross-site scripting (XSS) vulnerabilities. (CSCus07858, CSCus07875) Security Issue Addressed multiple vulnerabilities in SSLv3 that allowed external attacks on client connections, as described in CVE-2014-3569, CVE-2014-3570, CVE-2014-3572, CVE-2015-0204, CVE-2015-0286, CVE-2015-0287, CVE-2015-0289, CVE-2015-0292, CVE-2015-0293. If you enable bypass on inline sets on your Series 3 device, you may lose connectivity for up to 25 seconds during device reboot. (CSCur64678) Resolved an issue where the system does not recognize which IP address is the primary address and does not establish an Open Shortest Path First (OSPF) connection if you configured the router interface of your clustered Series 3 managed devices to both a private IP address and a Cisco Redundancy Protocol (SFRP) IP address. (CSCur86355) Version 5.3.0.4: Security Issue Addressed an arbitrary script injection vulnerability allowing unauthenticated, remote attackers to exploit GNU C library. The fix is addressed in CVE-2015-0235. Resolved an issue where the Defense Center or managed device generated High Unmanaged Disk Usage health alerts. (145221/CSCze95877) Resolved an issue where, if the system experienced lost connection to the sensing interface of a registered Series 2 device, the device stopped processing traffic and the system generated a health alert.(cscur46982) Resolved an issue where latency may occur on devices with non-passive interfaces during Snort restart. (CSCus13247) Improved data processing between high availability peers. (CSCus79643) Improved SFDataCorrelator capabilities. (CSCut23688) Version 5.3.0.3: Security Issue Addressed an arbitrary injection vulnerability allowing unauthenticated, remote attackers to execute commands via Bash to address CVE-2014-6271 and CVE-2014-7169. (144862/CSCze95477, 144941/CSCze95479, 144948/CSCze96159) Resolved an issue where, if you edited any of the applied intrusion policies, the system marked all intrusion policies as out-of-date. (134066, 140135/CSCze91908) Improved responsiveness of link state propagation. (137773/CSCze90606) Resolved an issue where the documentation did not reflect that, if you registered a cluster, stack, or clustered stack of devices to a Defense Center, you had to manually reapply the device configuration. (141624/CSCze93129, 142412/CSCze92735) Version 5.3.0.8 Sourcefire 3D System Release Notes 18

Resolved Issues Resolved a rare issue where, when your system triggered an alert on the first data packet of a TCP session from a server, the alert failed to specify the egress interface. (141817/CSCze93047) Improved the stability of the SMB and DCE/RPC preprocessor. (142199/CSCze93232) Resolved an issue where, if you edited an access control policy and policy apply failed, the policy changes from the attempted policy apply were not restored to the previously applied policy. (142908/CSCze93586) Resolved an issue where, if a user named admin is not established during the first initialization of the baseboard management controller of a managed device, the system did not let you change the default password and you could not log into the device. (143053/CSCze94371) Improved and accelerated policy apply. (143318/CSCze93668) Resolved an issue where, if the system generated intrusion events matching a rule with a GID other than 1 or 3, alerts sent to your syslog server contained incorrect messages. (143465/CSCze95013) Resolved an issue where the host profile incorrectly displayed multiple IP addresses for a single managed device. (143470/CSCze94629) Resolved an issue where, if you configured a 3D71xx or 3D70xx managed device with passive interfaces, connection events generated on those interfaces may have reported incorrect egress zone information. (143532/CSCze94988) You can now reapply device configuration after editing the list of security zones of a cluster, stack or clustered stack of devices from the Object Management page by selecting the green apply icon for device changes on the Device Management page (Devices > Device Management). (143535/CSCze94906) Resolved an issue where, if you disabled any access control rules containing either an intrusion policy or a variable set different from any enabled rules and the access control policy s default action, policy apply failed and the system experienced issues. (143809/CSCze94944) Improved diskmanager cleanup during report generation. (143900/CSCze94192) Resolved an issue where, in some cases, if you applied an access control policy to your Defense Center, policy apply failed and caused system issues. (143974/CSCze95108) Improved reliability of URL reputation and device detection capabilities. (144169/CSCze94611) Resolved an issue where, in some cases, if you created an intrusion policy with the FTP preprocessor enabled, the system incorrectly identified traffic matching rules referencing the FTP preprocessor as FTP files even if they were not. (144315/CSCze94630) Version 5.3.0.8 Sourcefire 3D System Release Notes 19

Resolved Issues Version 5.3.0.2 Security Issue Addressed multiple cross-site scripting (XSS) vulnerabilities. Security Issue Addressed multiple cross-site request forgery (CSRF) vulnerabilities. Security Issue Addressed multiple injection vulnerabilities, including HTML and command line injections. Security Issue Addressed multiple vulnerability issues in curl, Linux, MySQL, strongswan, and Wireshark, including those described in CVE-2013-1944, CVE-2013-2237, CVE-2013-3783, CVE-2013-2338, CVE-2013-5718, CVE-2013-5719, CVE-2013-5720, CVE-2013-5721, and CVE-2013-5722. Resolved an issue where the system delayed the generation of end-of-connection events for packets transmitted via a protocol other than TCP or UDP. (131526/CSCze89194) Resolved an issue where, in some cases, the intrusion event packet view displayed a rule message that did not match the rule that generated the event. (138011/CSCze90972) Resolved an issue where you could not import an intrusion rule that referenced a custom variable. (138077/CSCze90689) Resolved an issue where, if the system dropped the connection between the Defense Center and its managed device while completing a backup, the managed device failed to send the finished backup files to the Defense Center, and the Task Status page (System > Monitoring > Task Status) reported that the backup was still in progress. (138102/CSCze90708) Resolved an issue where connection events logged to an external syslog or SNMP trap server had incorrect URL Reputation values. (138504/CSCze91066, 139466/CSCze91510) Resolved an issue where, in rare cases, the system displayed incorrect, extremely high packet counts in the dashboard and event views for Series 3 managed devices. (138608/CSCze91081) Improved the stability of clustered state sharing on 3D8250 and 3D8350 managed devices. (139141/CSCze91387) Resolved an issue where, if you enabled telnet on a Cisco IOS Null Route remediation module and configured the username for the Cisco IOS instance to enable by default on the Cisco IOS router, Cisco IOS Null route remediation failed on the Defense Center. (139387/CSCze91484) Resolved an issue where, if one of your network variables in a variable set excluded :: or ::0 addresses and you referenced the variable set in an access control policy, applying your access control (or an intrusion policy referenced by your access control policy) failed. (139406/CSCze91378) Improved the stability of Snort when a nightly intrusion event performance statistics rotation occurred at the same time as an intrusion policy apply. (139958/CSCze91909) Version 5.3.0.8 Sourcefire 3D System Release Notes 20

Resolved Issues Resolved an issue where, when creating a network address translation (NAT) policy on a 70xx Family managed device and positioning a dynamic NAT rule specifying a destination port range before a second dynamic NAT rule specifying a destination port included in the first range, the system did not match traffic against the second dynamic rule if the traffic did not match the first dynamic rule. (140216/CSCze91789, 140307) Resolved an issue where, if you deleted a managed device from a Defense Center, then added a different device, then reapplied an access control policy with an intrusion policy associated with the default action, the system indicated that the intrusion policy was out of date on more devices than the Defense Center managed. (140525/CSCze92023) Resolved an issue where, in some cases, you could not create new scheduled tasks on managed devices. (140557/CSCze92065) Resolved an issue where managing 100 or more managed devices with a single Defense Center caused system issues. (140566/CSCze92086) Resolved an issue where, if you added a device stack to a group of devices and edited the applied access control policy, the system removed all targeted devices from the policy, prevented you from adding new devices, and corrupted the policy name. (140605/CSCze92048) Resolved an issue where, in rare cases, applying a single health policy to 100 or more managed devices caused system issues. (140976/CSCze92387) Resolved an issue where the system experienced a memory issue if estreamer retrieved a large number of file events. (141075/CSCze92527) Resolved an issue where, if you created an access control or intrusion rule that blocked traffic, then applied the access control or intrusion policy to a virtual managed device that used an inline interface set, you experienced a disruption in traffic until you restarted the appliance. (141111/CSCze92684) Resolved an issue where querying the external database to access packet data from intrusion events on a Defense Center returned incorrect data. (141144/CSCze92564) Resolved an issue where creating a saved search that used a VLAN tag object caused the system to save the search with the value 0 in the field where you used the VLAN tag object. (141195/CSCze92623) Resolved an issue where, in some cases, syslog alerts sent as intrusion event notifications contained incorrect intrusion rule classification data. (141212/CSCze92570, 141215/CSCze92540, 141219/CSCze92633) Resolved an issue where adaptive profiles failed if you used a network variable as your Networks value when configuring adaptive profiles. (141224/CSCze92604) Resolved an issue where, if you created a custom workflow with a large number of pages, the time window in the top right portion of the page obscured the link to the final pages of the workflow. (141335/CSCze92830) Version 5.3.0.8 Sourcefire 3D System Release Notes 21

Resolved Issues Resolved an issue where, in some cases, FireSIGHT rule recommendations attempted to activate a preprocessor rule that was already active, causing system problems. (141439/CSCze92747) Resolved an issue where, in rare cases, if you added multiple passive interfaces to a security zone, then referenced the security zone in a managed device configuration, the configuration apply failed and the system experienced a disruption in detection. (141624/CSCze93129, 141627/CSCze92961) Resolved an issue where, if one or more detection resources were unresponsive on a managed device, installing an update of the vulnerability database (VDB) caused system issues. (141757/CSCze93059) Improved efficiency and memory management of the disk manager. (141795/CSCze92912) Improved the stability of Snort when inspecting traffic transmitted via Real Time Streaming Protocol (RTSP). (141815/CSCze93105) Resolved an issue where completing a large number of access control policy applies caused the system to experience a memory issue and generate multiple High unmanaged disk usage health alerts. (141830/CSCze92990) Resolved an issue where, in some cases, revisions to the network address translation (NAT) policy caused system problems. (142003/CSCze93329) Resolved an issue where, in rare cases, Series 3 devices experienced delays during device shutdown. (142033/CSCze93287) Version 5.3.0.1 Resolved an issue where, in rare cases, configuring an intrusion policy that contained local intrusion rules in a layer that was shared with another intrusion policy caused intrusion policy exports to fail. (132312) Resolved an issue where, in rare cases, Snort stopped processing packets if any of your intrusion rules contained the Sensitive Data (sdf) rule classification. (132600) Resolved an issue where, in rare cases, Snort drained system resources if you created and applied an access control policy with rules that specified an unusually large range of ports and contained other rule conditions that would cause the Defense Center to send them to the device in expanded form. (132998) Resolved an issue where the Security Intelligence page of your access control policy did not display more than 100 available security zones. (133418) Version 5.3.0.8 Sourcefire 3D System Release Notes 22

Resolved Issues Resolved an issue where configuring a proxy server to authenticate with a user name and Message Digest 5 (MD5) password encryption caused communication issues with the Defense Center. (133727, 135041) Resolved an issue where you could not use the command line interface (CLI) to register a managed device to a pair of Defense Centers in a high availability configuration. (133825) Resolved a memory issue on managed devices where the system omitted data from Intrusion Event Performance graphs. (133944) Resolved an issue where the system generated an abnormally high count for the Total Packets Received Snort real-time statistic. (134036) Resolved an issue where, in rare cases, the system generated an extraneous Module Disk Usage: Frequent drain of Connection Events health alert. (134355) Resolved an issue where the system did not mark your access control policy out-of-date after you applied a new version of the vulnerability database (VDB) if your access control policy contained application detectors related to the FireSight Detector Updates identified in the VDB advisory notice. (134458) Resolved an issue where, in some cases, scheduled geolocation updates failed if Greenwich Mean Time (GMT, also known as UTC) was not your local timezone. (134742) Security Issue Resolved multiple cross-site scripting (XSS) vulnerabilities in application detection, access control, and correlation rule management. (135011, 135629, 135632) Improved the stability of Snort when access control rules included URL conditions. (135071, 136833) Resolved an issue where, if your managed device originated at Version 5.1.1.x and you updated it to Version 5.2.x and then to Version 5.3, the system generated extraneous health alerts for high unmanaged disk usage. (135689) Resolved an issue where, if you updated an appliance from Version 5.2.x to Version 5.3 and later created a backup, you could not restore the backup on Defense Centers that were reimaged to Version 5.3. (135869) Resolved an issue where the system displayed multiple unique hosts that shared an IP address as a single host with multiple actual MAC addresses in the host profile. (135956, 135992) Resolved an issue where the system restricted access to the User Management page (System > Local > User Management) on physical managed devices. (136079) Version 5.3.0.8 Sourcefire 3D System Release Notes 23

Resolved Issues Security Issue Eliminated an XSS vulnerability (CVE-2014-2012) in the intrusion rule editor pages that could allow an attacker to access and disclose information, imitate user actions and requests, or execute arbitrary JavaScript. Special thanks to Liad Mizrachi Check Point Security Research Team for reporting this issue. (136542) Security Issue Eliminated a cross-site request forgery (CSRF) vulnerability (CVE-2014-2011) in the User Configuration page that could allow an attacker to add or edit user accounts. Special thanks to Liad Mizrachi Check Point Security Research Team for reporting this issue. (136911) Security Issue Eliminated a CSRF vulnerability (CVE-2014-2028) in the User Management page that could allow an attacker to activate, deactivate, edit, or delete user accounts. Special thanks to Liad Mizrachi Check Point Security Research Team for reporting this issue. (136914) Resolved an issue where the system provided incorrect speed data for fiber interfaces with speeds of 4GB and faster. (137484) Security Issue Eliminated an XSS vulnerability (CVE-2014-2275) in the Scheduling page, the Health Monitor page, and the event viewers that could allow an attacker to access and disclose information, imitate user actions and requests, or execute arbitrary JavaScript. Special thanks to Adi Volkovitz Check Point Security Research Team for reporting this issue. (137850, 137853, 137856) Resolved an issue where, after you disconnected and reconnected the fiber interfaces on a Series 3 managed device, the system did not reestablish the network connection. (138099) Version 5.3 Improved the performance and stability of VPN. (116996, 119698, 123636) Resolved an issue where modifying the device configuration on a clustered stack and immediately applying the changes caused the apply to fail and the system to display an error message in the task status queue. (121625) Resolved an issue where, in some cases, installing a new intrusion rule update caused custom intrusion rule classifications referenced by correlation rules to revert to predefined classifications. (122163) Resolved an issue where, in some cases, network discovery policies did not function as expected if you applied two or more network discovery rules constrained by the same zones and networks that were configured to discover a different combination of hosts, users, and applications. (122853) Resolved an issue where LDAP authentication could fail if the DNS entries in your network environment for your LDAP server's hostname and IP address did not match. (123447) Resolved an issue where updates of the Sourcefire 3D System required upwards of three hours on Series 3 appliances. (124148) Resolved an issue where, in some cases, you could not edit a device group if it contained an inactive managed device. (124286) Version 5.3.0.8 Sourcefire 3D System Release Notes 24