Cisco Announces NGFW 2020 Fall Release FTD 6.7 | ASA 9.15.1 | FXOS 2.9
FTD 6.7, ASA 9.15.1, and FXOS 2.9 is now live on CCO |
What makes FTD 6.7/ASA 9.15.1/FXOS 2.9 a release to be proud of? A continued focus on quality and predictability.
Cisco delivered 104 features across 24 initiatives, addressing technical debt while staying true to our five core investment areas: Ease of Use and Deployment, Unified Policy and Threat Visibility, World Class Security and Control, Deploy Everywhere, and Bring Customers to the Next Era.
New Features in Firepower Management Center/Version 6.7.0
The following table lists the new features available in Firepower Version 6.7.0 when configured using a Firepower Management Center.
Feature |
Description |
||
---|---|---|---|
Hardware and Virtual Hardware |
|||
Oracle Cloud Infrastructure (OCI) virtual deployments |
We introduced FMCv and FTDv for Oracle Cloud Infrastructure. |
||
Google Cloud Platform (GCP) virtual deployments |
We introduced FMCv and FTDv for Google Cloud Platform. |
||
High availability support on FMCv for VMware |
FMCv and FMCv 300 for VMware now support high availability. FMCv HA pairs can manage physical and virtual FTD devices, but not Classic (NGIPS) devices. You configure FMCv HA just as you would on hardware models. However, note that an FMCv requires a Firepower Management Center Virtual (MCv) license entitlement for each device that it manages. In an FMCv HA pair, both units require these entitlements. For example, to manage 5 FTD devices with an FMCv HA pair, you need 10 MCv entitlements and 5 FTD entitlements. The “extra” entitlements are released if you break HA. Supported platforms: FMCv and FMCv 300 for VMware |
||
Auto Scale improvements for FTDv for AWS |
Version 6.7.0 includes the following Auto Scale improvements for FTDv for AWS:
Supported platforms: FTDv for AWS |
||
Auto Scale improvements for FTDv for Azure |
The FTDv for Azure Auto Scale solution now includes support for scaling metrics based on CPU and memory (RAM), not just CPU. Supported platforms: FTDv for Azure |
||
Firepower Threat Defense: Device Management |
|||
Manage FTD on a data interface |
You can now configure FMC management of the FTD on a data interface instead of using the dedicated management interface. This feature is useful for remote deployment when you want to manage the FTD at a branch office from an FMC at headquarters and need to manage the FTD on the outside interface. If the FTD receives a public IP address using DHCP, then you can optionally configure Dynamic DNS (DDNS) for the interface using the web type update method. DDNS ensures the FMC can reach the FTD at its Fully-Qualified Domain Name (FQDN) if the FTD’s IP address changes.
New/modified screens:
New/modified FTD CLI commands: configure network management-data-interface , configure policy rollback Supported platforms: FTD |
||
Update the FMC IP address on the FTD |
If you change the FMC IP address, you can now use the FTD CLI to update the device. New/modified FTD CLI commands: configure manager edit Supported platforms: FTD |
||
Synchronization between the FTD operational link state and the physical link state for the Firepower 4100/9300 |
The Firepower 4100/9300 chassis can now synchronize the FTD operational link state with the physical link state for data interfaces. Currently, interfaces will be in an Up state as long as the FXOS admin state is up and the physical link state is up. The FTD application interface admin state is not considered. Without synchronization from FTD, data interfaces can be in an Up state physically before the FTD application has completely come online, for example, or can stay Up for a period of time after you initiate an FTD shutdown. For inline sets, this state mismatch can result in dropped packets because external routers may start sending traffic to the FTD before the FTD can handle it. This feature is disabled by default, and can be enabled per logical device in FXOS.
New/modified Firepower Chassis Manager screens: Logical Devices > Enable Link State New/modified FXOS commands: set link-state-sync enabled , show interface expand detail Supported platforms: Firepower 4100/9300 |
||
Firepower 1100/2100 series SFP interfaces now support disabling auto-negotiation |
You can now configure a Firepower 1100/2100 series SFP interface to disable auto-negotiation. For 10 GB interfaces, you can configure the speed down to 1 GB without auto-negotiation; you cannot disable auto-negotiation for an interface with the speed set to 10 GB. New/modified screens: edit interfaceSupported platforms: Firepower 1100/2100 series |
||
Firepower Threat Defense: Clustering |
|||
New cluster management functionality on the FMC |
You can now use the FMC to perform the following cluster management tasks, where previously you had to use the CLI:
New/modified screens:
Supported platforms: Firepower 4100/9300 |
||
Faster cluster deployment |
Cluster deployment now completes faster. Also, for most deployment failures, it fails more quickly. Supported platforms: Firepower 4100/9300 |
||
Changes to PAT address allocation in clustering. The PAT pool Flat Port Range option is now enabled by default and it is not configurable. |
Upgrade impact. The way PAT addresses are distributed to the members of a cluster is changed. Previously, addresses were distributed to the members of the cluster, so your PAT pool would need a minimum of one address per cluster member. Now, the control instead divides each PAT pool address into equal-sized port blocks and distributes them across cluster members. Each member has port blocks for the same PAT addresses. Thus, you can reduce the size of the PAT pool, even to as few as one IP address, depending on the amount of connections you typically need to PAT. Port blocks are allocated in 512-port blocks from the 1024-65535 range. You can optionally include the reserved ports, 1-1023, in this block allocation when you configure PAT pool rules. For example, in a 4-node cluster, each node gets 32 blocks with which it will be able to handle 16384 connections per PAT pool IP address compared to a single node handling all 65535 connections per PAT pool IP address. As part of this change, PAT pools for all systems, whether standalone or operating in a cluster, now use a flat port range of 1024–65535. Previously, you could use a flat range by enabling the Flat Port Rangeoption in a PAT pool rule (Pat Pool tab in an FTD NAT rule). The Flat Port Range option is now ignored: the PAT pool is now always flat. You can optionally select the Include Reserved Ports option to include the 1–1023 port range within the PAT pool. Note that if you configure port block allocation (the Block Allocation PAT pool option), your block allocation size is used rather than the default 512-port block. In addition, you cannot configure extended PAT for a PAT pool for systems in a cluster. This change takes effect automatically. You do not need to do anything before or after upgrade. Supported platforms: FTD |
||
Firepower Threat Defense: Encryption and VPN |
|||
AnyConnect module support for RA VPN |
FTD RA VPN now supports AnyConnect modules. As part of your RA VPN group policy, you can now configure a variety of optional modules to be downloaded and installed when a user downloads the Cisco AnyConnect VPN client. These modules can provide services such as web security, malware protection, off-network roaming protection, and so on. You must associate each module with a profile containing your custom configurations, created in the AnyConnect Profile Editor and uploaded to the FMC as an AnyConnect File object. New/modified screens:
Supported platforms: FTD |
||
AnyConnect management VPN tunnels for RA VPN |
FTD RA VPN now supports an AnyConnect management VPN tunnel that allows VPN connectivity to endpoints when the corporate endpoints are powered on, not just when a VPN connection is established by the end user. This feature helps administrators perform patch management on out-of-the-office endpoints, especially devices that are infrequently connected by the user, via VPN, to the office network. Endpoint operating system login scripts which require corporate network connectivity also benefit. Supported platforms: FTD |
||
Single sign-on for RA VPN |
FTD RA VPN now supports single sign-on (SSO) for remote access VPN users configured at a SAML 2.0-compliant identity provider (IdP). New/modified screens:
Supported platforms: FTD |
||
LDAP authorization for RA VPN |
FTD RA VPN now supports LDAP authorization using LDAP attribute maps. An LDAP attribute map equates attributes that exist in the Active Directory (AD) or LDAP server with Cisco attribute names. Then, when the AD or LDAP server returns authentication to the FTD device during remote access VPN connection establishment, the FTD device can use the information to adjust how the AnyConnect client completes the connection. Supported platforms: FTD |
||
Virtual Tunnel Interface (VTI) and route-based site-to-site VPN |
FTD site-to-site VPN now supports a logical interface called Virtual Tunnel Interface (VTI). As an alternative to policy-based VPN, a VPN tunnel can be created between peers with Virtual Tunnel Interfaces configured. This supports route-based VPN with IPsec profiles attached to the end of each tunnel. This allows dynamic or static routes to be used. Using VTI does away with the requirement of configuring static crypto map access lists and mapping them to interfaces. Traffic is encrypted using static route or BGP. You can create a routed security zone, add VTI interfaces to it, and define access control rules for the decrypted traffic control over the VTI tunnel. VTI-based VPNs can be created between:
New/modified screens: Supported platforms: FTD |
||
Dynamic RRI support for site-to-site VPN |
FTD site-to-site VPN now supports Dynamic Reverse Route Injection (RRI) supported with IKEv2-based static crypto maps in site-to-site VPN deployments. This allowed static routes to be automatically inserted into the routing process for networks and hosts protected by a remote tunnel endpoint. New/modified screens: We added the Enable Dynamic Reverse Route Injection advanced option when adding an endpoint to a site-to-site VPN topology. Supported platforms: FTD |
||
Enhancements to manual certificate enrollment |
You can now obtain signed CA certificates and identity certificates from a CA authority independently of each other. We made the following changes to PKI certificate enrollment objects, which store enrollment parameters for creating Certificate Signing Requests (CSRs) and obtaining identity certificates:
New/modified screens: Objects > Object Management > PKI > Cert Enrollment > Add Cert Enrollment > CA Information > Enrollment Type > Manual Supported platforms: FTD |
||
Enhancements to FTD certificate management |
We made the following enhancements to FTD certificate management:
New/modified screens:
Supported platforms: FTD |
||
Access Control: URL Filtering, Application Control, and Security Intelligence |
|||
URL filtering and application control on traffic encrypted with TLS 1.3 (TLS Server Identity Discovery) |
You can now perform URL filtering and application control on traffic encrypted with TLS 1.3, by using information from the server certificate. You do not have decrypt the traffic for this feature to work.
New/modified screens: We added a TLS Server Identity Discoverywarning and option to the access control policy’s Advanced tab. New/modified FTD CLI commands: We added the B flag to the output of the show conn detail command. On a TLS 1.3-encrypted connection, this flag indicates that we used the server certificate for application and URL detection. Supported platforms: FTD |
||
URL filtering on traffic to websites with unknown reputation |
You can now perform URL filtering for websites that have an unknown reputation. New/modified screens: We added an Apply to unknown reputationcheck box to the access control, QoS, and SSL rule editors. Supported platforms: FMC |
||
DNS filtering enhances URL filtering |
Beta. DNS filtering enhances URL filtering by determining the category and reputation of requested domains earlier in the transaction, including in encrypted traffic—but without decrypting the traffic. You enable DNS filtering per access control policy, where it applies to all category/reputation URL rules in that policy.
New/modified screens: We added the Enable reputation enforcement on DNS traffic option to the access control policy’s Advanced tab, under General Settings. Supported platforms: FMC |
||
Shorter update frequencies for Security Intelligence feeds |
The FMC can now update Security Intelligence data every 5 or 15 minutes. Previously, the shortest update frequency was 30 minutes. If you configure one of these shorter frequencies on a custom feed, you must also configure the system to use an md5 checksum to determine whether the feed has updates to download. New/modified screens: We added new options to Objects > Object Management > Security Intelligence > Network Lists and Feeds > edit feed > Update Frequency Supported platforms: FMC |
||
Access Control: User Control |
|||
pxGrid 2.0 with ISE/ISE-PIC |
Upgrade impact. Use pxGrid 2.0 when you connect the FMC to an ISE/ISE-PIC identity source. If you are still using pxGrid 1.0, switch now. That version is deprecated. For use with pxGrid 2.0, Version 6.7.0 introduces the Cisco ISE Adaptive Network Control (ANC) remediation, which applies or clears ISE-configured ANC policies involved in a correlation policy violation. If you used the Cisco ISE Endpoint Protection Services (EPS) remediation with pxGrid 1.0, configure and use the ANC remediation with pxGrid 2.0. ISE remediations will not launch if you are using the ‘wrong’ pxGrid. The ISE Connection Status Monitor health module alerts you to mismatches. For detailed compatibility information for all supported Firepower versions, including integrated products, see the Cisco Firepower Compatibility Guide. New/modified screens:
Supported platforms: FMC |
||
Realm sequences |
You can now group realms into ordered realm sequences. Add a realm sequence to an identity rule in the same way as you add a single realm. When applying the identity rule to network traffic, the system searches the Active Directory domains in the order specified. You cannot create realm sequences for LDAP realms. New/modified screens: System > Integration > Realm Sequences Supported platforms: FMC |
||
ISE subnet filtering |
Especially useful on lower-memory devices, you can now use the CLI to exclude subnets from receiving user-to-IP and Security Group Tag (SGT)-to-IP mappings from ISE. The Snort Identity Memory Usage health module alerts when memory usage exceeds a certain level, which by default is 80%. New device CLI command: configure identity-subnet-filter { add | remove} Supported platforms: FMC-managed devices |
||
Access Control: Intrusion and Malware Prevention |
|||
Improved preclassification of files for dynamic analysis |
Upgrade impact. The system can now decide not to submit a suspected malware file for dynamic analysis, based on the static analysis results (for example, a file with no dynamic elements). After you upgrade, in the Captured Files table, these files will have a Dynamic Analysis Status of Rejected for Analysis. Supported platforms: FMC |
||
S7Commplus preprocessor |
The new S7Commplus preprocessor supports the widely accepted S7 industrial protocol. You can use it to apply corresponding intrusion and preprocessor rules, drop malicious traffic, and generate intrusion events. New/modified screens:
Supported platforms: all FTD devices, including ISA 3000 |
||
Custom intrusion rule import warns when rules collide |
The FMC now warns you of rule collisions when you import custom (local) intrusion rules. Previously, the FMC would silently skip the rules that cause collisions—with the exception of Version 6.6.0.1, where a rule import with collisions would fail entirely. On the Rule Updates page, if a rule import had collisions, a warning icon is displayed in the Status column. For more information, hover your pointer over the warning icon and read the tooltip. Note that a collision occurs when you try to import an intrusion rule that has the same SID/revision number as an existing rule. You should always make sure that updated versions of custom rules have new revision numbers. We recommend you read the best practices for importing local intrusion rules in the Firepower Management Center Configuration Guide. New/modified screens: We added a warning icon to .Supported platforms: FMC |
||
Access Control: TLS/SSL Decryption |
|||
ClientHello modification for Decrypt – Known Key TLS/SSL rules |
Upgrade impact. If you configure TLS/SSL decryption, when a managed device receives a ClientHello message, the system now attempts to match the message to TLS/SSL rules that have the Decrypt – Known Key action. Previously, the system only matched ClientHello messages to Decrypt – Resign rules. The match relies on data from the ClientHello message and from cached server certificate data. If the message matches, the device modifies the ClientHello message in specific ways; see the ClientHello Message Handling topic in the Firepower Management Center Configuration Guide. This behavior change occurs automatically after upgrade. If you use Decrypt – Known Key TLS/SSL rules, make sure that encrypted traffic is being handled as expected. Supported platforms: Any device |
||
Event Logging and Analysis |
|||
Remote data storage and cross-launch with an on-prem Stealthwatch solution |
You can now store large volumes of Firepower event data off-FMC, using an on-premises Stealthwatch solution: Cisco Security Analytics and Logging (On Premises). When viewing events in FMC, you can quickly cross-launch to view events in your remote data storage location. The FMC uses syslog to send connection, Security Intelligence, intrusion, file, and malware events.
Supported platforms: FMC |
||
Quickly add Stealthwatch contextual cross-launch resources |
A new page on the FMC allows you to quickly add contextual cross-launch resources for your Stealthwatch appliance. After you add Stealthwatch resources, you manage them on the general contextual cross-launch page. This is where you continue to manually create and manage non-Stealthwatch cross-launch resources. New/modified screens:
Supported platform: FMC |
||
New cross-launch options field types |
You can now cross-launch into an external resource using the following additional types of event data:
New/modified screens:
Supported platforms: FMC |
||
National Vulnerability Database (NVD) replaces Bugtraq |
Upgrade impact. Bugtraq vulnerability data is no longer available. Most vulnerability data now comes from the NVD. To support this change, we made the following changes:
If you export vulnerability data, make sure any integrations are working as expected after the upgrade. Supported platforms: FMC |
||
Upgrade |
|||
Pre-upgrade compatibility check |
Upgrade impact. In FMC deployments, Firepower appliances must now pass pre-upgrade compatibility checks before you can run more complex readiness checks or attempt to upgrade. This check catches issues that will cause your upgrade to fail—but we now catch them earlier and block you from proceeding. The checks are as follows:
When you select an upgrade package to install, the FMC displays compatibility check results for all eligible appliances. The new Readiness Check page also displays this information. You cannot upgrade until you fix the issues indicated. New/modified screens:
Supported platforms: FMC, FTD |
||
Improved readiness checks |
Upgrade impact. Readiness checks assess a Firepower appliance’s preparedness for a software upgrade. These checks include database integrity, file system integrity, configuration integrity, disk space, and so on. After you upgrade the FMC to Version 6.7.0, you will see the following improvements to FTD upgrade readiness checks:
Note that these improvements are supported for FTD upgrades from Version 6.3.0+, as long as the FMC is running Version 6.7.0+. New/modified screens:
Supported platforms: FTD |
||
Improved FTD upgrade status reporting and cancel/retry options |
Upgrade impact. You can now view the status of device upgrades and readiness checks in progress on the Device Management page, as well as a 7-day history of upgrade success/failures. The Message Center also provides enhanced status and error messages. A new Upgrade Status pop-up, accessible from both Device Management and the Message Center with a single click, shows detailed upgrade information, including percentage/time remaining, specific upgrade stage, success/failure data, upgrade logs, and so on. Also on this pop-up, you can manually cancel failed or in-progress upgrades (Cancel Upgrade), or retry failed upgrades (Retry Upgrade). Canceling an upgrade reverts the device to its pre-upgrade state.
New/modified screens:
New FTD CLI commands:
Supported platforms: FTD |
||
Upgrades postpone scheduled tasks |
Upgrade impact. FMC upgrades now postpone scheduled tasks. Any task scheduled to begin during the upgrade will begin five minutes after the post-upgrade reboot.
Note that this feature is supported for all upgrades from a supported version. As of November 2020 this includes Version 6.4.0.10 and later patches, and Version 6.7.0+. This feature is not supported for upgrades to a supported version from an unsupported version. Supported platforms: FMC |
||
Upgrades remove PCAP files to save disk space |
Upgrade impact. To upgrade a Firepower appliance, you must have enough free disk space or the upgrade fails. Upgrades now remove locally stored PCAP files. Supported platforms: Any |
||
Deployment and Policy Management |
|||
Configuration rollback |
Beta. You can now “roll back” configurations on an FTD device, replacing them with the previously deployed configurations.
New/modified pages: Deploy > Deployment History > Rollback column and icons. Supported platforms: FTD |
||
Deploy intrusion and file policies independently of access control policies |
You can now select and deploy intrusion and file policies independently of access control policies, unless there are dependent changes. New/modified screens: Deploy > Deployment Supported platforms: FMC |
||
Search access control rule comments |
You can now search within access control rules comments. New/modified screens: In the access control policy editor, we added the Comments field to the Search Rules drop-down dialog. Supported platforms: FMC |
||
Search and filter FTD NAT rules |
You can now search for rules in an FTD NAT policy to help you find rules based on IP addresses, ports, object names, and so forth. Search results include partial matches. Searching on criteria filters the rule table so only matching rules are displayed. New/modified screens: We added a search field above the rule table when you edit an FTD NAT policy. Supported platforms: FTD |
||
Copy and move rules between access control and prefilter policies |
You can copy access control rules from one access control policy to another. You can also move rules between an access control policy and its associated prefilter policy. New/modified pages: In the access control and prefilter policy editors, we added Copy and Move options to each rule’s right-click menu. Supported platforms: FMC |
||
Bulk object import |
You can now bulk-import network, port, URL, VLAN tag, and distinguished name objects onto the FMC, using a comma-separated-values (CSV) file. For restrictions and specific formatting instructions, see the Reusable Objects chapter of the Firepower Management Center Configuration Guide. New/modified screens: Objects > Object Management > choose an object type > Add [Object Type] > Import Object Supported platforms: FMC |
||
Interface object optimization for access control and prefilter policies |
You can now enable interface object optimization on specific FTD devices. During deployment, interface groups and security zones used in the access control and prefilter policies generate separate rules for each source/destination interface pair. If you enable interface object optimization, the system will instead deploy a single rule per access control/prefilter rule, which can simplify the device configuration and improve deployment performance. Interface object optimization is disabled by default. If you enable it, you should also enable Object Group Search—which now applies to interface objects in addition to network objects—to reduce memory usage on the device. New/modified screens: > Interface Object Optimization check box sectionSupported platforms: FTD |
||
Administration and Troubleshooting |
|||
FMC single sign-on |
The FMC now supports single sign-on (SSO) for external users configured at any third-party SAML 2.0-compliant identity provider (IdP). You can map user or group roles from the IdP to FMC user roles. New/modified screens: Supported platforms: FMC |
||
FMC logout delay |
When you log out of the FMC, there is an automatic five-second delay and countdown. You can click Log Out again to log out immediately. Supported platforms: FMC |
||
Health monitoring enhancements |
We enhanced health monitoring as follows:
Supported platforms: FMC |
||
Health module updates |
We replaced the CPU Usage health module with four new modules:
We added the following health modules to track memory use:
We added the following health modules to track statistics:
Supported platforms: FMC |
||
Search Message Center |
You can now filter the current view in the Message Center. New/modified pages: We added a Filter icon and field to the Message Center, under the Show Notifications slider. Supported platforms: FMC |
||
Usability and Performance |
|||
Dusk theme |
Beta. The FMC web interface defaults to the Light theme, but you can also choose a new Dusk theme.
New/modified screens: User Preferences, from the drop-down list under your username Supported platforms: FMC |
||
Search FMC menus |
You can now search the FMC menus. New/modified pages: We added a Search icon and field to the FMC menu bar, to the left of the Deploy menu. Supported platforms: FMC |
||
Firepower Management Center REST API |
|||
New REST API services |
We added the following FMC REST API services/operations to support new and existing features. Authorization services:
Health services:
Deployment services:
Device services:
Integration services:
Policy services:
Update services:
Supported platforms: FMC |
New Features in Firepower Device Manager/FTD Version 6.7.0
Released: November 2, 2020
The following table lists the new features available in FTD 6.7.0 when configured using Firepower Device Manager.
Very cool this deployment rollback and also the EIGRP without the need of the FlexConfig
So there are some really great features with 6.7, one which is deployment rollback. However, the EIGRP configuration without flexconfig is only in FDM right now and now FMC…
Thanks for posting!
Todd
“…EIGRP configuration without flexconfig is only in FDM right now and now FMC…”
You ment “not in FMC”?
Are there any info on EEM in web config, and not just in FlexConfig?
Best regards,
Marko
Correct,
not in FMC
I don’t have any info on EEM in web config
Todd
Dear Todd,
since snort 3 is multithreaded should we expect any performance gain?
have you already tried and have you seen any differences?
Sicerely,
Luca
Hi Luca, thank you for writing. I didn’t get a chance to work on Snort3 yet, but I will in Dec and will be writing up some documentation. The FMC won’t support it till 7.0 code, but the FDM supports it now.
Is there an expected impact migrating an IPS policy from snort2.x to snort3.x ?
Hi Giovanni!
I didn’t get to test Snort 3 yet, so I don’t know. Its not available in the FMC at this point, only FDM, but I’ll get to that next month and write a blog on what I find
Anyone running 6.7 yet in production?
Jonathan, I am sure there are, but none of my customers are, which is mostly my choice. It has great features, but I always have my customers wait till .1 code
Hi!
I have a couple of remote offices with NATed IP on the outside interface, this means i cannot directly connect to firewall and not be able to manage the FTDs on the outside interface. With 6.7 they released mgmt possibility on the data interface with a dhcp ip.. but in this case this is not possible.
Im quite worried of opening up access to my FMC (ie NAT 443 to FMC) to allow remote management of these FTDs. Then i will open up possible logins/bruteforce and bad stuff .. Is this a really good solution? :)
Erik, the data is encrypted with 443 by default, so I am not sure that would be an issue. However, I have not had time to test and work on that feature yet. I’ll hopefully get to it soon
Hi Todd
I deployed ftd 2110 version 6.7 in my organization. After few day I see snort memory dataplane is 90%. I restarted the appliance and for 2 days everything is ok but again after two day now I see again. Do you have any idea what is problem?
Hello, thank you fir posting
You’ll need to open a tac call and tell them what happened
Let me know what they find!
Todd
Hi Todd,
How many AnyConnect license required FTD in HA (active/standby) mode. One is enough or we need go with separate license for each?
you need licenses for all, but FTD allows for standby licenses now.