<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Firepower 7.1 Released in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/firepower-7-1-released/m-p/4516408#M1085678</link>
    <description>&lt;P&gt;I too noticed performance improvements by changing from Snort2 to Snort3. Preliminary tests I did with 7.0 on a small 1010 appliance gave about a 33% raw network speed difference with unmodified “Security over Connectivity” IPS policies. On a 350Mbps up/down link, full 350Mbps on Snort3 vs ~230Mbps on Snort2.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;However Snort3 does block things randomly and out of the blue, whereas Snort2 does not - even while both are set to “detect”, and not “protect”. Seen it breaking server side tasks such as DNS XFER, SMTP STARTTLS sessions, and client access such as to Apple’s AppStore app - with or without an IPS policy set on the matching AC policy. It seemed less often on 7.0.1, but they are still plaguing me every now and then. Fastpath doesn't help, nor changing IPS or AC policies: I have to either bypass the firewall (wrong) or to downgrade to Snort2 and back to Snort3: somehow this keeps things working for another while.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So I’m on a difficult position now: to have random outages or to lose bandwidth.&lt;/P&gt;</description>
    <pubDate>Fri, 10 Dec 2021 14:37:10 GMT</pubDate>
    <dc:creator>HQuest</dc:creator>
    <dc:date>2021-12-10T14:37:10Z</dc:date>
    <item>
      <title>Firepower 7.1 Released</title>
      <link>https://community.cisco.com/t5/network-security/firepower-7-1-released/m-p/4511956#M1085497</link>
      <description>&lt;P&gt;In case you missed it, Firepower 7.1 was released on 1 December:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/firepower/710/relnotes/firepower-release-notes-710/features.html" target="_blank" rel="noopener"&gt;https://www.cisco.com/c/en/us/td/docs/security/firepower/710/relnotes/firepower-release-notes-710/features.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://software.cisco.com/download/home/286259687/type/286271056/release/7.1.0" target="_blank" rel="noopener"&gt;https://software.cisco.com/download/home/286259687/type/286271056/release/7.1.0&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;We are still waiting on the Gold Star for release 7.0.1. Hopefully that will come soon!&lt;/P&gt;</description>
      <pubDate>Thu, 02 Dec 2021 14:51:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-7-1-released/m-p/4511956#M1085497</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2021-12-02T14:51:31Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower 7.1 Released</title>
      <link>https://community.cisco.com/t5/network-security/firepower-7-1-released/m-p/4512411#M1085511</link>
      <description>&lt;P&gt;I take the chance to ask for a suggestion about upgrading:&lt;/P&gt;&lt;P&gt;I need to upgrade a deployment soon in order to leverage saml support for anyconnect (azure mfa integration) and data interface management.&lt;/P&gt;&lt;P&gt;I was oriented toward 6.7 since it's more mature than 7.0.1, even if it's a short term release, do you agree about that, or do you think that 7.0.1, even if it's not gold star yet, worth the upgrade?&lt;/P&gt;</description>
      <pubDate>Fri, 03 Dec 2021 07:05:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-7-1-released/m-p/4512411#M1085511</guid>
      <dc:creator>Massimo Baschieri</dc:creator>
      <dc:date>2021-12-03T07:05:11Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower 7.1 Released</title>
      <link>https://community.cisco.com/t5/network-security/firepower-7-1-released/m-p/4512475#M1085513</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/290657"&gt;@Massimo Baschieri&lt;/a&gt; I would recommend 7.0.1 over any release of 6.7 at this time.&lt;/P&gt;</description>
      <pubDate>Fri, 03 Dec 2021 08:50:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-7-1-released/m-p/4512475#M1085513</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2021-12-03T08:50:47Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower 7.1 Released</title>
      <link>https://community.cisco.com/t5/network-security/firepower-7-1-released/m-p/4512894#M1085538</link>
      <description>&lt;P&gt;Thanks for the advice Marvin, are you saying that because of you own experience or you have some positive feedbacks from cisco tac?&lt;/P&gt;&lt;P&gt;Do you have any idea when 7.0.1 will become gold star?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 03 Dec 2021 19:18:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-7-1-released/m-p/4512894#M1085538</guid>
      <dc:creator>Massimo Baschieri</dc:creator>
      <dc:date>2021-12-03T19:18:16Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower 7.1 Released</title>
      <link>https://community.cisco.com/t5/network-security/firepower-7-1-released/m-p/4513048#M1085541</link>
      <description>&lt;P&gt;My recommendation is based on both having deployed about 20 production Firepower 7.0.1 firewalls to date (1010s, 2100 and 4100 series as well as FMC both on hardware and software platforms) as well as having positive (albeit informal) conversations with both TAC and other Cisco staff.&lt;/P&gt;
&lt;P&gt;The ones I've deployed include locally-managed (FDM only), CDO-managed and FMC-managed.&lt;/P&gt;
&lt;P&gt;We hope to see Gold Star status for 7.0.1 this month (December 2021) but it's pending internal Cisco approval still.&lt;/P&gt;</description>
      <pubDate>Sat, 04 Dec 2021 02:37:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-7-1-released/m-p/4513048#M1085541</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2021-12-04T02:37:02Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower 7.1 Released</title>
      <link>https://community.cisco.com/t5/network-security/firepower-7-1-released/m-p/4513069#M1085542</link>
      <description>&lt;P&gt;My deployment is quite complex, about 50 devices, FPR1Ks, 2Ks, ASA5516s, even ASA5545s&lt;/P&gt;&lt;P&gt;Did you also move to snort 3 on those deployments?&lt;/P&gt;</description>
      <pubDate>Sat, 04 Dec 2021 06:57:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-7-1-released/m-p/4513069#M1085542</guid>
      <dc:creator>Massimo Baschieri</dc:creator>
      <dc:date>2021-12-04T06:57:48Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower 7.1 Released</title>
      <link>https://community.cisco.com/t5/network-security/firepower-7-1-released/m-p/4513383#M1085555</link>
      <description>&lt;P&gt;The upgrades I changed to Snort 3. The greenfield 7.0.1 ones are also using Snort 3. My primary motivation for that is the improved performance.&lt;/P&gt;</description>
      <pubDate>Sun, 05 Dec 2021 14:14:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-7-1-released/m-p/4513383#M1085555</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2021-12-05T14:14:50Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower 7.1 Released</title>
      <link>https://community.cisco.com/t5/network-security/firepower-7-1-released/m-p/4514691#M1085592</link>
      <description>&lt;P&gt;Marvin, I had serious issues with 7.0 at my customers (7.0.1 too). I was on the beta team for 7.0 and 7.1 and beat the hell out of them but the issues I had with 7.0 at my customers &amp;nbsp;were serious and I never saw that coming and never had those issues in beta testing&lt;/P&gt;&lt;P&gt;7.1 is superior to any previous code (6.6, 6.7, 7.0)&lt;/P&gt;&lt;P&gt;I recommend 7.1, the features are unparalleled to 7.0 even&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;</description>
      <pubDate>Tue, 07 Dec 2021 17:30:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-7-1-released/m-p/4514691#M1085592</guid>
      <dc:creator>toddlammle</dc:creator>
      <dc:date>2021-12-07T17:30:29Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower 7.1 Released</title>
      <link>https://community.cisco.com/t5/network-security/firepower-7-1-released/m-p/4514826#M1085598</link>
      <description>&lt;P&gt;7.1 on FTD has issues as well, like you cant create VTIs properly, unless you have 7.1 on FMC but still 7.0.x on FTD.&lt;/P&gt;&lt;P&gt;I would wait couple more weeks and upgrade to a stable release.&lt;/P&gt;</description>
      <pubDate>Tue, 07 Dec 2021 22:32:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-7-1-released/m-p/4514826#M1085598</guid>
      <dc:creator>BmfL</dc:creator>
      <dc:date>2021-12-07T22:32:13Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower 7.1 Released</title>
      <link>https://community.cisco.com/t5/network-security/firepower-7-1-released/m-p/4515049#M1085604</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/326046"&gt;@Marvin Rhoads&lt;/a&gt;&amp;nbsp;but also to the others:&lt;/P&gt;&lt;P&gt;I take the chance you mentioned it, do you have a good experience on CDO?&lt;/P&gt;&lt;P&gt;Is it reliable as much as FMC is?&lt;/P&gt;&lt;P&gt;What are the features you miss the most about FMC?&lt;/P&gt;&lt;P&gt;Is identity working fine with CDO?&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;</description>
      <pubDate>Wed, 08 Dec 2021 09:40:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-7-1-released/m-p/4515049#M1085604</guid>
      <dc:creator>Massimo Baschieri</dc:creator>
      <dc:date>2021-12-08T09:40:16Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower 7.1 Released</title>
      <link>https://community.cisco.com/t5/network-security/firepower-7-1-released/m-p/4515149#M1085606</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/290657"&gt;@Massimo Baschieri&lt;/a&gt; CDO generally works as advertised. It is not a 1-1 replacement for FMC just like FDM is not. I kind of think of it as Meraki MX vs. Cisco ASA or FTD. As long as you don't need the advanced features (of FMC), CDO is an attractive choice.&lt;/P&gt;
&lt;P&gt;Identity works fine but I had to do the setup from FDM first and then CDO (and the Secure Analytics and Logging or SAL along with Stealthwatch Cloud / Secure Cloud Analytics) consumes it OK.&lt;/P&gt;
&lt;P&gt;I had done a whitepaper on that about 2 years ago. In case you missed it here's a link:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://community.cisco.com/t5/security-documents/whitepaper-firepower-threat-defense-cloud-management-with/ta-p/3991368" target="_blank"&gt;https://community.cisco.com/t5/security-documents/whitepaper-firepower-threat-defense-cloud-management-with/ta-p/3991368&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 08 Dec 2021 12:32:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-7-1-released/m-p/4515149#M1085606</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2021-12-08T12:32:15Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower 7.1 Released</title>
      <link>https://community.cisco.com/t5/network-security/firepower-7-1-released/m-p/4516106#M1085667</link>
      <description>&lt;P&gt;It seems Cisco was faster than you expected, 7.0.1 became gold star today!!!&lt;/P&gt;&lt;P&gt;Now I've no doubt on the release to upgrade to.&lt;/P&gt;</description>
      <pubDate>Thu, 09 Dec 2021 16:15:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-7-1-released/m-p/4516106#M1085667</guid>
      <dc:creator>Massimo Baschieri</dc:creator>
      <dc:date>2021-12-09T16:15:22Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower 7.1 Released</title>
      <link>https://community.cisco.com/t5/network-security/firepower-7-1-released/m-p/4516110#M1085669</link>
      <description>&lt;P&gt;Nice document Marvin, since I have no experience at all on FDM and CDO, can you please provide me a quick list of the features I'm about to loose moving from FMC to FMM/CDO?&lt;/P&gt;&lt;P&gt;Thanks,&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 09 Dec 2021 16:17:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-7-1-released/m-p/4516110#M1085669</guid>
      <dc:creator>Massimo Baschieri</dc:creator>
      <dc:date>2021-12-09T16:17:45Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower 7.1 Released</title>
      <link>https://community.cisco.com/t5/network-security/firepower-7-1-released/m-p/4516153#M1085675</link>
      <description>&lt;P&gt;There are quite a few things FDM cannot do that FMC can. Just weigh the respective configuration guides - 856 pages for FDM 7.0 vs. 3192 pages for FMC.&lt;/P&gt;
&lt;P&gt;All the basics are there, just not some advanced features and the ability to manage multiple firewalls from one console, share objects, store events etc.&lt;/P&gt;</description>
      <pubDate>Thu, 09 Dec 2021 17:26:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-7-1-released/m-p/4516153#M1085675</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2021-12-09T17:26:41Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower 7.1 Released</title>
      <link>https://community.cisco.com/t5/network-security/firepower-7-1-released/m-p/4516408#M1085678</link>
      <description>&lt;P&gt;I too noticed performance improvements by changing from Snort2 to Snort3. Preliminary tests I did with 7.0 on a small 1010 appliance gave about a 33% raw network speed difference with unmodified “Security over Connectivity” IPS policies. On a 350Mbps up/down link, full 350Mbps on Snort3 vs ~230Mbps on Snort2.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;However Snort3 does block things randomly and out of the blue, whereas Snort2 does not - even while both are set to “detect”, and not “protect”. Seen it breaking server side tasks such as DNS XFER, SMTP STARTTLS sessions, and client access such as to Apple’s AppStore app - with or without an IPS policy set on the matching AC policy. It seemed less often on 7.0.1, but they are still plaguing me every now and then. Fastpath doesn't help, nor changing IPS or AC policies: I have to either bypass the firewall (wrong) or to downgrade to Snort2 and back to Snort3: somehow this keeps things working for another while.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So I’m on a difficult position now: to have random outages or to lose bandwidth.&lt;/P&gt;</description>
      <pubDate>Fri, 10 Dec 2021 14:37:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-7-1-released/m-p/4516408#M1085678</guid>
      <dc:creator>HQuest</dc:creator>
      <dc:date>2021-12-10T14:37:10Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower 7.1 Released</title>
      <link>https://community.cisco.com/t5/network-security/firepower-7-1-released/m-p/4517136#M1085700</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/34902"&gt;@marvin&lt;/a&gt;&lt;/P&gt;&lt;P&gt;Here a list of the most important features (to me) I found missing in CDO:&lt;/P&gt;&lt;P&gt;security intelligence / TID&lt;/P&gt;&lt;P&gt;url/app reputation/advanced classification&lt;/P&gt;&lt;P&gt;advanced settings in access policies&lt;/P&gt;&lt;P&gt;active authentication&lt;/P&gt;&lt;P&gt;ssl inspection&lt;/P&gt;&lt;P&gt;prefilter&lt;/P&gt;&lt;P&gt;centralized logging without SAL&lt;/P&gt;&lt;P&gt;Others?&lt;/P&gt;&lt;P&gt;Maybe some of them are available directly on device through FDM, better than nothing, but not a good approach&lt;/P&gt;&lt;P&gt;Do you agree?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 11 Dec 2021 07:25:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-7-1-released/m-p/4517136#M1085700</guid>
      <dc:creator>Massimo Baschieri</dc:creator>
      <dc:date>2021-12-11T07:25:08Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower 7.1 Released</title>
      <link>https://community.cisco.com/t5/network-security/firepower-7-1-released/m-p/4517180#M1085703</link>
      <description>&lt;P&gt;That's a good list &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/290657"&gt;@Massimo Baschieri&lt;/a&gt; . I would add that CDO can use Identity Policy but it needs to be configured first in FDM.&lt;/P&gt;
&lt;P&gt;Also note that CDO is frequently updated as they follow an Agile development lifecycle. So be sure to check their What's New page for updates.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://docs.defenseorchestrator.com/Welcome_to_Cisco_Defense_Orchestrator/0005_What's_New_for_Cisco_Defense_Orchestrator" target="_blank"&gt;https://docs.defenseorchestrator.com/Welcome_to_Cisco_Defense_Orchestrator/0005_What's_New_for_Cisco_Defense_Orchestrator&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 11 Dec 2021 14:39:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-7-1-released/m-p/4517180#M1085703</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2021-12-11T14:39:16Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower 7.1 Released</title>
      <link>https://community.cisco.com/t5/network-security/firepower-7-1-released/m-p/4517215#M1085706</link>
      <description>I tell my clients to stay on S2 until they know how to look at the IPS network analysis in Snort3 and tune the process. You need to tune your IPS whether it’s snort 2 or 3, but in situation it seems that s3 needs more tuning the s2 for now. Also, from what you’re saying in your posts, it looks like you have preprocessor events that need to be tuned&lt;BR /&gt;You are using cisco base polies without tuning and getting unpredictable results, which is predictable.&lt;BR /&gt;If you haven’t learned to tune snort, then stay on snort 2 for now. Once s3 is tuned, the performance is much better.&lt;BR /&gt;Todd Lammle&lt;BR /&gt;</description>
      <pubDate>Sat, 11 Dec 2021 17:36:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-7-1-released/m-p/4517215#M1085706</guid>
      <dc:creator>toddlammle</dc:creator>
      <dc:date>2021-12-11T17:36:58Z</dc:date>
    </item>
  </channel>
</rss>

