SOURCEFIRE 3D SYSTEM RELEASE NOTES Version 4.10.3.7 Original Publication: January 30, 2014 Last Updated: March 13, 2014 These release notes are valid for Version 4.10.3.7 of the following platforms in the Sourcefire 3D System: • Series 2 sensors (the 3D500, 3D1000, 3D2000, 3D2100, 3D2500, 3D3500, 3D4500, 3D6500, and the 3D9900) • Series 2 Defense Centers or Master Defense Centers (the DC500, DC1000, and the DC3000) • Series 3 sensors (the 3D7010, 3D7020, 3D7030, 3D7110, 3D7120, 3D8120, 3D8130, 3D8140, 3D8250, 3D8260, 3D8270, and the 3D8290) • Series 3 Defense Centers or Master Defense Centers (the DC750, DC1500, and the DC3500) • 64-bit Virtual Defense Centers and Virtual 3D Sensors • 3D Sensor Software for Crossbeam Systems X-Series Platform (XOS Versions 9.5.1 and later, 9.6.2 and later, and 9.7.0 and later) Even if you are familiar with the update process, make sure you thoroughly read and understand the release notes, which describe supported platforms and functionality, known and resolved issues, and product and web browser compatibility. They also contain detailed information on prerequisites, warnings, and specific installation and uninstallation instructions. For more information, see the following sections: Version 4.10.3.7 • Updates to Sourcefire Documentation on page 2 • Changed Functionality on page 2 • Important Update and Compatibility Notes on page 3 • Product and Web Browser Compatibility on page 5 • Issues Resolved in Version 4.10.3.7 on page 6 Sourcefire 3D System Release Notes 1 Updates to Sourcefire Documentation • Updating Existing Appliances and Software Sensors on page 21 • Uninstalling the Update on page 33 • Known Issues on page 40 • Features Introduced in Previous Versions on page 43 • For Assistance on page 50 Updates to Sourcefire Documentation In Version 4.10.3.7, the following documents were updated to reflect the addition of new features and changed functionality and to address reported documentation issues: • Sourcefire 3D System User Guide and Online Help • Sourcefire 3D System 3D Sensor Installation Guide • Sourcefire 3D System Defense Center Installation Guide • Sourcefire 3D System Virtual Defense Center and 3D Sensor Installation Guide You can download all updated documentation from the Sourcefire Support site. Changed Functionality The following list describes changed features and functionality: • Version 4.10.3.7 When configuring high availability, you designate one Defense Center as the primary Defense Center and one as the secondary. When appliances switch from active to inactive (and vice versa), they now retain their original primary and secondary designations. Sourcefire 3D System Release Notes 2 Important Update and Compatibility Notes Important Update and Compatibility Notes The following sections list important points you must keep in mind before you begin the update process, as well as any possible consequences or compatibility issues you may encounter during or after the update process: • Before You Begin on page 3 • Virtual Appliance Operating Environments on page 5 Before You Begin Before you begin the update process for Version 4.10.3.7, you should keep the following important points in mind: • Sourcefire strongly recommends that you back up event and configuration data to a local computer before you perform the update; this data is not backed up as part of the update process. For information on the backup and restore feature, including the types of backups that are supported for your appliance, see the Sourcefire 3D System User Guide. Version 4.10.3.7 • Do not install the Version 4.10.3.7 update on appliances with a STIG hotfix installed; it renders the web interface unusable. Uninstall the STIG hotfix before proceeding with the update. To reinstall the STIG hotfix (build 15 or later) after completing the Version 4.10.3.7 update, see the Sourcefire 3D System STIG Hotfix Release Notes for Version 4.10.3.7. • Sourcefire does not support updating appliances with more than one hard drive. You must remove additional hard drives before beginning the update. • Note that Version 4.10.x of the Sourcefire 3D System is not supported on the APM-8600 or the single-CPU APM-8650 with XOS 9.6.5, 9.6.6, 9.6.7, and 9.7.0. Sourcefire 3D System Release Notes 3 Important Update and Compatibility Notes • The Version 4.10.3.7 update includes a full upgrade of the MySQL database. WARNING! Disruptions in the update during the database upgrade could leave the Sourcefire 3D System in an unusable state that may require you to restore the appliance to factory defaults. Note, however, that error messages may appear in the update interface during the database upgrade. These errors are expected and you can safely ignore them. Error messages may appear in the update interface during the database upgrade. These errors are expected and you can safely ignore them. • When you install or uninstall this update on 3D Sensors, the interface set type on the sensing interfaces determines how and when traffic inspection, link state, and traffic flow are affected. How network traffic is interrupted depends on whether the sensor’s interface sets are configured as inline, inline with fail open, or passive. The following table describes the possible outcomes: Interface Set Type Network Traffic Interrupted? Passive Network traffic is not interrupted, but also is not inspected during the update. Inline Network traffic is blocked throughout the update. Inline with fail open Network traffic is interrupted at two points during the update. At the beginning of the update process, traffic is briefly interrupted while link goes down and up (flaps) and the network card switches into hardware bypass. Traffic is not inspected during hardware bypass. After the update finishes, traffic is again briefly interrupted while link flaps and the network card switches out of bypass. After the endpoints reconnect and reestablish link with the sensor interfaces, traffic is inspected again. In scenarios where traffic will be interrupted, Sourcefire recommends that you either remove affected 3D Sensors from their inline placement, or plan the update for a maintenance window or other time when the interruption will have the least impact on your deployment. Version 4.10.3.7 Sourcefire 3D System Release Notes 4 Product and Web Browser Compatibility Virtual Appliance Operating Environments Sourcefire packages Virtual appliances for three hosting environments: • vSphere version 4.1 or 5.0 from VMware • Xen Hypervisor 3.3.2 or 3.4.2 distribution from Xen.org with Ubuntu 8.04 Long Term Support (LTS) or CentOS 5.5 Dom0 (server version recommended) • RHEV version 3.0 using RHEL 6.2 (64-bit) as the supported hypervisor base For more information on Virtual appliances, including hardware compatibility, packaging, deployment considerations, and configuration, see the Sourcefire 3D System Virtual Defense Center and 3D Sensor Installation Guide. Product and Web Browser Compatibility You must use Version 4.10.3 or later of the Defense Center to manage Version 4.10.3.7 sensors. You must use Version 4.10.3 or later of the Master Defense Center to manage Version 4.10.3.7 of the Defense Center, including the Virtual Defense Center. Version 4.10.3.7 of the Master Defense Center and Defense Center (including the Virtual Defense Center) can also manage the appliances listed in the following table. Version 4.10.3.7 Version 4.10.3.7 of the... Can manage these versions... Of the... Master Defense Center 4.9.x and 4.10.x Defense Center Defense Center 4.10.x 3D Sensor — 7000 Series and 8000 Series Defense Center 4.9.x and 4.10.x 3D Sensor — 3D9900 Defense Center 4.9.x 3D Sensor — 3Dx800 Defense Center 4.9.x and 4.10.x other 3D Sensors Defense Center 4.9.x and 4.10.x 3D Sensor Software for Crossbeam X-Series Defense Center 4.9.x RNA on Red Hat Linux Sourcefire 3D System Release Notes 5 Issues Resolved in Version 4.10.3.7 Version 4.10.3.7 of the web interface for the Sourcefire 3D System has been tested on the browsers listed in the following table. Browser Required Enabled Options and Settings Firefox 26 JavaScript, cookies, Secure Sockets Layer (SSL) v3 Microsoft Internet Explorer 9.0 JavaScript, cookies, Secure Sockets Layer (SSL) v3, 128-bit encryption, Active scripting security setting, Compatibility View, set Check for newer versions of stored pages to Automatically Microsoft Internet Explorer 10.0 JavaScript, cookies, Secure Sockets Layer (SSL) v3, 128-bit encryption, Active scripting security setting, Compatibility View, set Check for newer versions of stored pages to Automatically Issues Resolved in Version 4.10.3.7 The following issues are resolved in Version 4.10.3.7: Version 4.10.3.7 • Resolved an issue where widgets on the Status Dashboard page failed to populate with data after many failed logins to the web interface. (115970) • The system now uses Coordinated Universal Time (UTC) to generate time stamps on audit log entries. (126038) • Resolved an issue where you could not generate troubleshoot files for 3D Sensor Software running Version 4.10.3.4 or later. (126368) • Resolved an issue where, in rare cases, the system did not populate the intrusion event packet view with data due to a memory issue. (126619) • Security Issue Updated OpenSSH to version 6.6 to eliminate the CVE-2010-5107 vulnerability on Sourcefire appliances. (126988, 135945) • Resolved an issue where editing your network settings (Operations > System Settings > Network) caused the system to reset your Network Time Protocol (NTP) settings. (127577) • Resolved an issue where, if you altered the default time window on a health module alert graph, the displayed data did not reflect the custom time window. (127652) • Resolved an issue where you could not log in to an appliance via the command line interface (CLI) if your LDAP username contained a capitalized character. (128098) • Resolved an issue where third-party queries to the database returned incorrect data. (128210) • Resolved an issue where, in some cases, configuring SNMP in a system policy and applying the policy to a sensor caused memory problems. (128586) Sourcefire 3D System Release Notes 6 Issues Resolved in Version 4.10.3.7 • Resolved an issue where Defense Centers experienced communication issues with their sensors. (128801) • Resolved an issue where excluding specific Original Client IP addresses from an intrusion event search improperly constrained the data. (131106) • Resolved an issue where, in some cases, the system generated incorrect intrusion event timestamps. (131830) Issues Resolved in Previous Updates Because you can update some of your appliances from Version 4.10.0 to Version 4.10.3.7, this update also includes the changes in updates from Version 4.10.0 through Version 4.10.3.6. The issues that were resolved in each are listed by version. 4.10.3.6 • Security Issue Eliminated a vulnerability that could allow a remote attacker to execute unauthorized IPMI commands if Lights-Out Management was enabled on a Series 3 appliance. For more information, log in to the Customer Center and access the KB article at https://na8.salesforce.com/articles/Informational/000002045. (130978) • Security Issue Resolved an issue where the Sourcefire 3D System web server had the potential to execute system commands as root. Special thanks to Detmar Liesen and Christian Rahmen at Information und Technik Nordrhein-Westfalen (IT.NRW) for reporting this issue. (131737) • Security Issue Eliminated a vulnerability that could allow an attacker to execute linux commands via the filter search field on the System Log page. For more information, log in to the Customer Center and access the KB article at https://na8.salesforce.com/articles/Informational/000002058. (131738) 4.10.3.5 Version 4.10.3.7 • Resolved an issue where SNMP alert messages longer than 255 characters caused SNMP trap logging to fail. (100057) • Resolved an issue where, on Defense Centers in a high availability configuration, changes to traffic profile names did not save. (100686) • Resolved an issue where SMTP data caused user identity error messages to display in the system log (Operations > Monitoring > Syslog). (101932) • Resolved an issue where you could not switch the roles of a high availability pair of Defense Centers registered to a Master Defense Center. (102286) • Resolved an issue where an outdated IP address appeared on the primary Defense Center’s Sensors page after you changed the IP address of a sensor managed by Defense Centers in a high availability configuration. (103781) • Resolved an issue where you could not export a system policy if the default user role was a custom user role. (108088) Sourcefire 3D System Release Notes 7 Issues Resolved in Version 4.10.3.7 Version 4.10.3.7 • Resolved an issue where, in rare cases, appliances that automatically update downloaded redundant or non-applicable patches. (108436) • The Defense Center now uses fully qualified domain names to send all email notifications from the system policy. (111038) • Resolved an issue where generated reports displaying SEU import log data improperly constrained the data if you selected a time range. (116201) • Resolved an issue where, after using a high availability pair of Defense Centers to import an intrusion policy to a Defense Center, the secondary Defense Center synced incorrectly. (117839) • Improved the performance of the Sourcefire Data Correlator. (118131) • Resolved an issue where, in some cases, jumbo frames on a Crossbeam sensor running XOS Version 9.6.5 overwhelmed the system and dropped packets. You must update to Crossbeam XOS Version 9.6.7 to take advantage of this fix. (118313, 122835) • Resolved an issue where, in rare cases, the xvnim driver incorrectly released buffers, causing the system to drop packets and lose connectivity. (118572) • LDAP usernames can now contain tildes (~), periods (.), and dollar signs ($). (118830) • Resolved an issue where, in rare cases, 3D9900 sensors required additional rebooting after a reboot in order to resume traffic. (118856) • Security Issue Resolved an issue where, in some cases, the system did not process user identity data or host input updates and logged error messages to the Defense Center system log. (119550) • Resolved a database externalization issue where, in some cases, users could not access the database. (119602) • Resolved an issue where, after shutting down a Defense Center in a high availability pair, intrusion events that occurred during the restart logged only on the primary Defense Center. (120086) • Resolved an issue where, in some cases, the Intrusion Events widget displayed data incorrectly. (120136) • Resolved an issue where 3D71xx fiber interface passive mode link lights did not illuminate when connected to an endpoint. (120470) • Resolved an issue where, after updating to Version 4.10.3.4, eStreamer requests with the Version 1 metadata request flag set did not return intrusion policy metadata. (120807) • Resolved an issue where, if a Master Defense Center managed a high availability pair of Defense Centers, the system did not apply the intrusion policy to all sensors during a scheduled or automated policy apply. (121437) • Resolved an issue where, in some cases, the system incorrectly displayed intrusion events after completing the Version 4.10.3.4 update. (121748) • Improved the memory usage stability of the Sourcefire Data Correlator. (122149) Sourcefire 3D System Release Notes 8 Issues Resolved in Version 4.10.3.7 • Resolved an issue with the Crossbeam software sensor pruner configuration that, in some cases, decreased sensor performance. (122446) • Resolved an issue where, in some cases, completing an update or uninstall to Version 4.10.3.4 of the Sourcefire 3D System required up to 3 hours to complete on a 3D7110 or 3D7120 sensor. (123754) 4.10.3.4 Version 4.10.3.7 • The system now prevents you from importing intrusion rules with a list of destination ports that is longer than 64 characters. (107148) • Resolved an issue where, in some cases, intrusion rule actions set from the packet view or context menu were set in the wrong intrusion policy. (108551) • Resolved an issue where, in some cases, newly created RNA detectors incorrectly detected patterns when evaluating packet captures. (108756) • Resolved an issue where unknown web browsers were incorrectly identified as SSH. (109528) • Resolved an issue where, in some cases, Custom Analysis dashboard widgets failed to load. (109584) • Improved reliability of the Sourcefire Data Correlator. (110869) • Resolved an issue where, in some cases, health blacklist data on the secondary Defense Center of a high availability pair failed to synchronize with the data on the primary Defense Center. (110870) • Resolved an issue where viewing intrusion event graphs with a large time range could hide samples that occurred during times with sparse data. (110990) • Resolved an issue where, in some cases, graphs did not appear in PDF reports that took over 30 minutes to generate. (110997) • In the web interface, detection engine and interface set list pages are now compatible with Internet Explorer 10. (111186) • Resolved an issue where, in some cases, compliance rules generated events during inactive periods. (111309) • Resolved an issue where, in some cases, RNA event logging sent unsolicited updates to ArcSight clients. (111373) • Resolved an issue where, in some cases, compliance policies that included the Default White List compliance rule did not generate compliance events. (111645) • MySQL was updated on appliances to address CVE vulnerabilities. (111738) • Resolved issues with the documentation. (111942) • Resolved an issue where physical appliances experienced system problems after running continuously for a minimum of 208 days. (112556) • Resolved an issue where, in some cases, the packet view failed to display and caused excessive system memory usage. (113458) • Improved reliability of communications between Sourcefire appliances. (113665) Sourcefire 3D System Release Notes 9 Issues Resolved in Version 4.10.3.7 • Updated the Perl package on appliances to address CVE vulnerabilities. (113929, 113930) • Resolved an issue where, when you removed the Save as Private designation from a saved search, the search did not become available for users with read-only permissions. (113967) • Passwords for Cisco remediations can now contain special characters. (114090) • Resolved an issue where, in some cases, VLAN and network filtered intrusion policies failed to apply from the Master Defense Center. (114292) • Improved the task queue’s reliability when displaying system tasks. (114744) • Resolved an issue that, in some cases, caused RNA detection policy apply to fail. (114879) • Resolved an issue where, in some cases, custom compliance policies could contain self-referencing rules. (115125) • Resolved an issue where setting warning threshold values on a health module to 1 or 2 could trigger inaccurate health alerts. (115126) • Resolved an issue where, in some cases, menu options throughout the system failed to update. (115135) • Resolved an issue where, in some cases, dashboard widgets did not display intrusion events correctly. (115524) • Resolved an issue where you could not edit compliance policies or rules after deleting a sensor whose detection engines were referenced by a compliance rule. (115660) • Resolved an issue where, in some cases, compliance rules could not reference detection engines on stacked sensors. (116145) • The show-network-modules command line interface command now functions correctly on 7000 Series and 8000 Series sensors. (117962) 4.10.3.3 No issues were resolved in Version 4.10.3.3. 4.10.3.2 The following issues were resolved in Version 4.10.3.2: Version 4.10.3.7 • Resolved several issues affecting the 40G network module (NetMod) on 3D8250 sensors. (111315, 112439) • Resolved an issue that, in some cases, prevented log rotation from occurring. (112010) Sourcefire 3D System Release Notes 10 Issues Resolved in Version 4.10.3.7 4.10.3.1 The following issue was resolved in Version 4.10.3.1: • Resolved an issue where after you installed a new SEU on an appliance, the Modified By column on that appliance's Intrusion Policy page sometimes showed an incorrect user as the user who applied the update. (100468) 4.10.3 The following issues were resolved in Version 4.10.3: Version 4.10.3.7 • Improved performance of the system integrity check utility. (92756, 92759, 92762) • Resolved an issue where RNA processes did not appear in the processes list on the Statistics page (Operations > Monitoring > Statistics). (92928) • Resolved several issues with the documentation. (95438, 98628, 104029, 104680, 104748, 105420, 106185, 106268, 106537, 107138, 107290, 107590, 108066, 108921, 109049) • Bookmarked RNA searches that are constrained by Confidence now load correctly. (96937) • Resolved an issue where, after you changed the system time zone, the syslog incorrectly reported dates one year earlier. (97586) • Resolved an issue that caused invalid RNA policy recommendations to appear. (98498) • Resolved an issue where, when you saved changes to a scheduled task created in a previous year, the original year was incorrectly changed to the current year. (98568) • Resolved an issue where, when you exported a dashboard from a Defense Center to a Master Defense Center or a 3D Sensor, widgets unavailable because they were unsupported on the new appliance could incorrectly appear with the “You are not authorized to view this widget” error message. (98944) • Resolved an issue where setting an odd-numbered maximum frame size on inline interface sets of 8000 Series sensors could cause link loss. You can no longer set this value to an odd number. (99452) • Resolved an issue where you could not simultaneously apply intrusion policies from a Master Defense Center to multiple 3D Sensors if the sensors' managing Defense Centers required SEU updates. (100143) • Resolved an issue where an externally authenticated RADIUS or LDAP user with the username admin conflicted with the local admin user. The Sourcefire 3D System no longer supports the username admin for externally authenticated users. (100677) • Resolved an issue where, in some cases, the Defense Center task status page reported a successful VDB installation after a failed VDB update on a managed sensor. (100776) Sourcefire 3D System Release Notes 11 Issues Resolved in Version 4.10.3.7 Version 4.10.3.7 • Resolved an issue where scheduled “install latest update” tasks that completed successfully did not generate correct task status messages in the system log. (101406) • Improved performance of dashboard widgets that perform queries constrained on user data. (101459) • Hotfix updates no longer appear in the Product Updates dashboard widget under Latest Product Updates. (101526) • Improved reliability of the Sourcefire Data Correlator. (101692, 103038) • Improved system performance of database tables and RNA event database queries. (101851, 103954) • Resolved an issue where, in some cases, enabled compliance rules caused system problems with the Sourcefire Data Correlator. (102788) • Resolved an issue where some fields in generated PDF-format reports appeared in HTML format. (103439) • Resolved an issue on the Defense Center where clicking Run All Modules in the health monitor could cause an error page to appear. (103503) • Resolved an issue on some 8000 Series sensors that caused health alerts to report power supply loss when no problem existed. (105552) • Resolved an issue on appliances sending email where the SMTP mail process would hang indefinitely if certain errors occurred. The process now correctly times out in case of error. (105714) • Resolved an issue where IPS performance graphs of blocked packets reported incorrect data. (105802) • Resolved an issue with the Sourcefire Data Correlator where multiple packets associated with the same event that had identical event ID, sensor ID, event seconds, packet seconds, and packet nanoseconds data were incorrectly dropped as duplicates. (106117) • Resolved an issue where synchronization tasks (such as those relating to high availability, clustered, and stacked configurations) did not run after system upgrades. (106327) • Resolved an issue where, when you rolled back the secondary Defense Center in a high availability pair to the same software version as the primary Defense Center (the primary having been rolled back earlier), variable definitions on the primary Defense Center were overwritten. (106559) • Security Issue Removed a possibility of injecting arbitrary HTML in the event viewer. (CVSS Base Score: 3.3) • Security Issue Removed possibilities of redirection away from the host user interface. (107407, 107409) (CVSS Base Scores: 3.3) • External database queries that contain numeric functions no longer cause problems with Crystal Reports. (107779) Sourcefire 3D System Release Notes 12 Issues Resolved in Version 4.10.3.7 4.10.2.7 The following issues were resolved in Version 4.10.2.7: • Resolved an issue with the Sourcefire Data Correlator that could, in rare cases, cause it to stop responding. (106960) • Security Issue Resolved a cross-site scripting vulnerability (XSS) in the intrusion event packet view when the Log URI option is enabled for the HTTP inspect preprocessor. This option is not enabled by default. (107245) 4.10.2.6 The following issues were resolved in Version 4.10.2.6: • Master Defense Centers now correctly display information about detection engines and interface sets for 3D Sensors that have been moved between the Master Defense Center’s managed Defense Centers. (103493) • Resolved an issue where you could not apply policies to 3D8260 sensors in a stacked configuration from a Master Defense Center. (103879) • Resolved an issue where memory use of the Sourcefire Data Correlator gradually increased, eventually requiring a restart of the Data Correlator. (104261) 4.10.2.5 The following issues were resolved in Version 4.10.2.5: Version 4.10.3.7 • You can now use an access control list (Operations > System Settings > Database) to filter access to ports that you use for external database access. (95577) • Resolved an issue that caused a delay of several minutes when a RADIUS-authenticated admin user accessed a Defense Center via SSH. (96920) • You can now successfully activate a compliance policy with custom rules that fire on specific intrusion event rule messages. (98609) • When you use a Master Defense Center to manage Defense Centers in a high availability configuration, the Defense Centers now appear in the Operations > Appliances list regardless of changes to their primary/secondary status. (98708) • When you configure RADIUS authentication, you can now use non-sequential ports for authentication and accounting. For more information, see the Sourcefire 3D System User Guide. (98820) • Security Issue Upgraded MySQL version to 5.1.61 to address multiple vulnerabilities. (99528, 103105) • If it has sufficient memory (4GB), you can now deploy up to 6 detection engines on a Virtual 3D Sensor. (99781) • Improved system performance of Defense Centers that receive large amounts of RNA or RUA events. (100025, 100027, 100028) • Resolved an issue where Defense Center backups could stall in the “Verifying Backup” stage. (100030) Sourcefire 3D System Release Notes 13 Issues Resolved in Version 4.10.3.7 • Resolved an issue where external database access queries could fail due to non-unique internal query IDs. (100597) • On Virtual 3D Sensors, 7000 Series sensors, and 8000 Series sensors, resolved an issue where users with Configuration-level access to the command line interface could not log into the web interface. (100683) • Resolved an issue where performance graphs of blocked packets (Operations > Monitoring > Performance) displayed no data. (101802) • On the Master Defense Center, resolved an issue where, when you moved a managed 3D Sensor from one high availability Defense Center pair to another, its detection engine information could be inaccurate. (101943) • The default threshold for automatic application bypass is increased to 3000ms (previously 750ms). (102280) • Decreased latency on 7000 Series sensors that run two or more detection engines. (102620) • Resolved an issue where dashboard widgets that displayed IP addresses or host names failed to load when DNS lookup of hosts failed. (102797) • The detection engine variables page (Operations > Configuration > Detection Engines > Variables) now loads correctly. (102951) • Resolved several issues with the documentation. (102971) 4.10.2.4 The following issues were resolved in Version 4.10.2.4: Version 4.10.3.7 • Resolved an issue where, when restoring a backup that you created with remote storage enabled, the restore would fail if remote storage was not enabled at the time of the restore. (90143) • Resolved an issue where authentication objects using group access could lose configuration information when you upgraded from Version 4.9.1 to Version 4.10.1. (90560) • Resolved an issue where RNA detection policies could fail to reapply after a previous failed policy apply. (92430) • Compliance rules based on flow events that use the Total Bytes condition now trigger successfully. (93608) • Resolved an issue where, in some cases, NetFlow configuration was not received by 3D Sensors, causing NetFlow monitoring to fail. (93658) • Automatic SEU import tasks on a Defense Center in a high availability pair are no longer propagated to the peer appliance. SEU installations are already automatically synchronized by the high availability synchronization process. (93797) • Resolved an issue where, in some cases, the Memory Usage health module could alert even when sufficient memory was available. (94039) • Improved accuracy of intrusion event rate graphs in the Custom Analysis dashboard widget. (94335) Sourcefire 3D System Release Notes 14 Issues Resolved in Version 4.10.3.7 Version 4.10.3.7 • Resolved an issue where, if remote storage was enabled, intrusion event email alerts were sent as MIME-encoded email attachments instead of plain text. (95862) • The Interface Traffic dashboard widget now correctly reports rates of received and transmitted traffic. Previously, a scaling issue could cause one traffic rate to display as zero when the values for Rx and Tx differed by orders of magnitude. (95887) • Resolved an issue where data in the HTTP URI field of HTML-format event reports was not HTML-encoded. (95993) • Decreased the amount of available disk space required on the Defense Center to download packets to a local computer from the intrusion event packet view. (96351) • Resolved an issue where drilling down on specific intrusion events in a workflow would result in no events displaying. (96992) • If a scheduled update task fails to run, a message detailing the specific reason for failure is now displayed. (97028) • Resolved an issue where you could not connect to an appliance using SSH after a system policy apply. (97081) • Resolved an issue where removing a 7000 Series sensor's power cable caused the Serial over LAN connection on the appliance to drop. (97550) • Resolved an issue where uploading Sourcefire Rule Updates (intended only for Version 5.0 and above of the Sourcefire 3D System) to an appliance running an earlier Sourcefire software version caused the Update page to stop working. You can no longer upload Rule Updates to incompatible appliances. (98240) • You can now successfully generate 2048-bit HTTPS certificates from the web interface. (98416) • Improved synchronization of intrusion rule classifications between paired Defense Centers in a high availability configuration. (98522) • Improved performance of the Sourcefire Data Correlator. (98626) • Resolved an issue that caused incomplete display of HTML packet data in PDF-format event reports. (98854) • The system now correctly sends email notifications for intrusion events that are pruned from the database. (99059) • Improved query engine support for Crystal Reports. (99209) • Resolved an issue where, when the Send Audit Log to Syslog option was enabled on an appliance (under Audit Log Settings in the system policy), malformed UDP packets were sent to the syslog server in addition to the syslog packets. (99302) • RNA flows generated from NetFlow data and the RNA network map now display the TOS and interface values from NetFlow. (99632) • Resolved an issue where enabling Adaptive Profiling could prevent Snort from starting. (100003) • Resolved an issue where 3D9900 sensors could eventually stop passing traffic. (100055) Sourcefire 3D System Release Notes 15 Issues Resolved in Version 4.10.3.7 • Resolved an issue where vulnerability database information did not sync correctly between paired Defense Centers in a high availability configuration. (100213) • Resolved an issue where the RNA process on 3D Sensors could cause excessive memory use on the sensor. (101035) 4.10.2.3 The following issues were resolved in Version 4.10.2.3: • Security Issue Resolved an issue where unauthenticated users could download configuration information stored in the web server document root from the web interface. (101302) (CVSS Base Score: 4.7) • Security Issue Resolved an issue where unauthenticated users could download arbitrary files that are readable by the www user. (101306) (CVSS Base Score: 6.7) • Resolved an issue with ack.cgi by removing it from the system. (101308) (CVSS Base Score: 2.8) • Security Issue Resolved an issue on the Defense Center that granted excess database permissions to hosts where you installed RUA agents. (101309) (CVSS BASE Score: 7.0) • Security Issue Resolved a cross-site scripting vulnerability in the dashboard. (101310) (CVSS Base Score: 2.8) 4.10.2.2 The following issues were resolved in Version 4.10.2.2: Version 4.10.3.7 • Improved efficiency of the Custom Analysis dashboard widget. (94581) • Resolved an issue where you could not edit the permissions of externally authenticated users on 8000 Series sensors. (95610) • On 3D Sensors, the audit log now shows the full commands that users execute in the command line interface. (95981) • Resolved an issue where 3D8140 and 3D8250 sensors could incorrectly report loss of power supply. (96069) • Improved RNA stability. (96564) • Resolved an issue where, on 3D7110, 3D7120, 3D8120 and 3D8130 sensors, PEP rules that you configured as Drop w/Reset could still allow IP traffic to pass through. (96668) • Resolved an issue where, after upgrading a Defense Center to Version 4.10.2 or Version 4.10.2.1, it was not possible to view HTTPS certificates or create new certificate signing requests. (96783) • Improved reliability of automatic update downloading. (97291) • Resolved an issue where backups with events could fail on a Defense Center that was processing a high number of flows per second. (97307) • Resolved an issue where, when the system SSH daemon was manually disabled, it would not reactivate after a system policy apply. (97369) Sourcefire 3D System Release Notes 16 Issues Resolved in Version 4.10.3.7 • You can now manually configure the MTU for management interfaces in the web interface. (97416) • Resolved an issue where Master Defense Centers did not properly receive impact level 5 events. (97851) • Resolved an issue where, in some cases, 3D9900 sensors did not pass or process traffic. (97967) • Resolved an issue that could cause data gaps to appear in sensor performance graphs. (98001) • VDB installations including or following SEU 74 will no longer cause backups with events to fail (when the VDB is installed during or after upgrading to Version 4.10). (98427) • Resolved an issue where enabling TAP mode on a 3D8250 sensor would cause all VLAN traffic to be dropped. (98921, 99086) 4.10.2.1 The following issue was resolved in Version 4.10.2.1: • Resolved an issue where, in some cases, changes to system settings (such as device registration or the enabling/disabling of eStreamer) could fail to take effect. (97548) • The Hardware Alarms health module now runs correctly on all 7000 Series and 8000 Series sensors. (97637, 97778) 4.10.2 The following issues were resolved in Version 4.10.2: Version 4.10.3.7 • Resolved an issue where LDAP shell authentication would fail if the total combined length of the base filter and shell filter was greater than 512 characters. (89552) • The Defense Center no longer sends health monitor alert emails for a blacklisted sensor. (90006) • Resolved an issue so that RADIUS login authentication objects can use ports other than 1812. (90061) • Resolved an issue where, in high availability environments, health monitor alert emails were sent every five minutes regardless of the value that you set in Threshold Timeout. (90506) • Improved the reliability of health monitoring for 3D9900 sensors. (90847) • Resolved an issue where, in rare cases, the SFDataCorrelator process would not shut down properly when it was stopped or restarted, thereby preventing events from being sent to the Defense Center. (91099) • External database schema verification queries generated from Crystal Reports now work correctly on Virtual Defense Centers. (91406) • Resolved an issue where you could not use SNMP to poll sensing interfaces on an 8000 Series sensor. (92213) • Compliance rules that specify intrusion events with a value of would have dropped now function properly. (92484) Sourcefire 3D System Release Notes 17 Issues Resolved in Version 4.10.3.7 • Resolved an issue where, in rare cases, interfaces in a passive interface set on the 3D9900 and 8000 Series sensors could retransmit traffic. (94372) • Resolved an issue where RNA could pass invalid information to the adaptive profiles feature. (95040). 4.10.1.4 The following issues were resolved in Version 4.10.1.4: • Resolved a cross-site scripting issue on the system policy creation page. (92758) • Improved the quality of recommendations based on services by the RNA Recommended Rules feature. (93657) 4.10.1.3 The following issues were resolved in Version 4.10.1.3: Version 4.10.3.7 • Resolved an issue where using special characters in the descriptions of compliance policies, detection engines, and interface sets could cause errors. (88014, 88019) • Resolved an issue where IPS email alerting did not function correctly when the default frequency was changed on appliances with a web interface. (89206) • Resolved an issue where port-based user-defined custom service detectors could be overridden by RNA’s service identification in some cases. (89220) • Resolved an issue where, in some cases, 8000 Series sensors would incorrectly report very large numbers of dropped packets. (90433, 90584) • Resolved several issues with the documentation. (89793, 90026) • Resolved an issue where secondary sensors in a stack would generate health events for nonexistent interface sets. (89826) • The Analysis & Reporting > Custom Workflow menu option now properly appears on all applicable sensors. (88851) • Resolved an issue where Custom Analysis dashboard widgets based on the Flow Summary table did not accurately display information if Aggregate was set to Traffic (KB/s). (89038) • Resolved an issue where tasks that you scheduled to run hourly at specific time intervals would not obey the Start Time setting. (89845) Sourcefire 3D System Release Notes 18 Issues Resolved in Version 4.10.3.7 4.10.1.2 The following issue was resolved in Version 4.10.1.2: • Resolved an issue where, in some cases, RNA could abnormally use up to 100% of CPU resources and cause problems with traffic inspection. (89606) 4.10.1.1 The following issues were resolved in Version 4.10.1.1: Version 4.10.3.7 • Resolved an issue where running the update-keyfob.sh script in Version 4.10.0 would result in an error. (87500) • The packet view of intrusion events now indicates IPv4 addresses that contain IPv6 encapsulated security payloads. (87527) • PEP Analyze rules applied to passive interface sets no longer prevent inspection of matching traffic. (87533) • Resolved an issue where, when your Sourcefire 3D System was configured for Server Message Block (SMB) remote storage, you would not receive any emailed reports (such as event or comparison reports) from your system. (87615) • The syslog displayed in the web interface now displays the correct time when the time zone is set to Europe/Lisbon (GMT +1). (87701) • Resolved several issues with the documentation. (87825, 87838,88521, 88647, 88617) • Resolved an issue where, in rare cases, dashboard widgets would not load for Intrusion Event Analyst (Read Only) users. (87862) • Resolved an issue where, when both IPv4 and IPv6 were enabled on the management interface of a 3D Sensor, any failure to obtain an IPv6 address would cause errors with IPv4 connections. (87945) • The Authentication Profiles menu in the system policy now correctly displays check box values in Internet Explorer 8. (87992) • Resolved an issue where installing VDB 64 would cause abnormally fewer RNA recommendations in the intrusion policy. (88029) • Event backup to remote SMB storage now works correctly. (88065) • Resolved an issue where emailed reports (such as event or comparison reports) would not honor the From address defined in the system policy unless authentication was configured. (88113) • Resolved an issue where the IDS Event Processor would send duplicate events to the Defense Center while an intrusion policy was applied to the IPS detection engine. (88409) Sourcefire 3D System Release Notes 19 Issues Resolved in Version 4.10.3.7 4.10.1 The following issues were resolved in Version 4.10.1: Version 4.10.3.7 • Resolved an issue where using wildcard characters (such as $ and *) when searching for intrusion events in the SnortID field would yield unexpected results. The system now notifies you when you include an invalid character in your search. (83908) • Resolved an issue where entering an extremely large number of values when searching for intrusion events would produce an error. There is now a maximum of 8000 characters per search. (83909) • The web interface now correctly indicates whether a compliance policy is active, even in cases where activating the policy has failed. (84059) • The Combine Flows for Out-of-Network Responders RNA setting combines flow summaries that involve a host on your monitored network and one or more hosts not on your monitored network. The Defense Center displays external instead of an IP address for the aggregated external hosts in the flow summary. Previously, if the networks to monitor in your RNA detection policy were set to Auto-detect, external hosts’ IP addresses would appear individually and internal IP addresses would appear as external. These IP addresses now appear correctly. (84471) • Improved the accuracy of IPS performance graphs of percent packets dropped. (84478) • You can now automatically reapply an intrusion policy to a high availability peer after a scheduled SEU import on the other peer. (84496) • Resolved an issue where creating Nmap remediations with both the Fast Port Scan and Port Ranges and Scan Order options would cause an error. The Fast Port Scan and Port Ranges and Scan Order options are mutually exclusive; it is now impossible to select both options when you create an Nmap remediation. (85145) • You can now base any type of event report on a custom workflow. (85319) • Resolved an issue where you could not use aliased columns in ORDER BY and GROUP BY functions when querying the Defense Center database using the database access feature. (85965) • Resolved an issue where the Network Interface system settings page was unavailable on the Master Defense Center. (86073) • Resolved an issue where the links to email Sourcefire Support and to access the Sourcefire Support site from the Operations > Help page did not function correctly. (86075, 86078) • Resolved an issue where DC750, DC1500, and DC3500 Defense Centers would not successfully execute Cisco PIX Shun remediations. (86080) • Separating a stacked pair of sensors no longer causes problems with their managing Master Defense Center. (86345) • Resolved an issue where Custom Analysis dashboard widgets that displayed data from the Flow Summary Data table would not load if constrained by a payload type search using payload type. (86368) Sourcefire 3D System Release Notes 20 Updating Existing Appliances and Software Sensors • Resolved an issue where appliances upgraded directly from Version 4.9.1.7 to Version 4.10 did not respond to ICMP (ping) requests if the management interface on the appliance was not eth0. (86402) • Resolved an issue where multiple intrusion policy sync jobs could be pending in the action queue at one time. (86992) • Resolved an issue where LDAP authentication could fail if the server was configured to expect spaces in the CN field. (87002) • Resolved an issue where compliance rules that searched for nonexistent strings in intrusion rule messages could not be edited after they were initially saved. (87131) Updating Existing Appliances and Software Sensors The following sections help you prepare for and install the Version 4.10.3.7 update on your existing appliances: • Planning for the Update on page 21 • Updating a Defense Center or Master Defense Center on page 24 • Updating Managed 3D Sensors on page 27 • Updating Unmanaged 3D Sensors on page 29 • Using the Shell to Update an Appliance on page 32 Planning for the Update This section outlines how to plan for and perform the Version 4.10.3.7 update for the Sourcefire 3D System. To update your Sourcefire 3D System appliances: 1. Read these release notes. Even if you are familiar with the update process, make sure you thoroughly read and understand the release notes, which describe supported platforms, new features and functionality, known and resolved issues, and product and web browser compatibility. They also contain detailed information on prerequisites, warnings, and specific installation and uninstallation instructions. 2. Make sure your appliances (including software sensors) are running the correct version of the Sourcefire 3D System. To update to Version 4.10.3.7, your appliances must be running at least Version 4.10.0. Note that 3D71xx sensors must be running at least Version 4.10.2, and 3D70xx sensors must be running at least Version 4.10.3. To push and install the update, and to manage a Version 4.10.3.7 3D Sensor, your Defense Center must be running at least Version 4.10.3. If you are running an earlier version, you can obtain updates from the Sourcefire Support Site. Version 4.10.3.7 Sourcefire 3D System Release Notes 21 Updating Existing Appliances and Software Sensors 3. Make sure the computers or appliances where you installed software sensors are running the correct versions of their operating systems. For 3D Sensor Software for Crossbeam X-Series, the X-Series Platform must be running XOS Version 9.5.1 or later, 9.6.2 or later, or 9.7.0 or later. If you are using an earlier version of the operating system, contact Blue Coat Support. Note that Version 4.10.x of the Sourcefire 3D System is not supported on the APM-8600 or the single-CPU APM-8650 with XOS 9.6.5, 9.6.6 and 9.7.0. 4. Back up current event and configuration data to an external location. Sourcefire strongly recommends that you back up current event and configuration data to an external location. This data is not backed up as part of the update process. For more information on the backup and restore feature, including the types of backups that are supported for your appliance, see the Sourcefire 3D System User Guide. 5. Make sure you have enough free disk space and allow enough time for the update. The following table provides guidelines for the disk space and time required for the Version 4.10.3.7 update. Appliance/Sensor Software Disk Space on / Disk Space on /Volume Reboot? Estimated Time Physical Series 3 Defense Centers 109MB 8223MBplus twice the size of the largest database table (up to 4GB) Yes 31 minutesplus 30 mins for each 10 million events Other physical and virtual Defense Centers 81MB 8154MB plus twice the size of the largest database table (up to 4GB) Yes 35 minutesplus 30 mins for each 10 million events Master Defense Centers 81MB 8154MB plus twice the size of the largest database table (up to 4GB) Yes 35 minutes plus 30 mins for each 10 million events Physical Series 3 non-Geryon 3D Sensors 119MB 15422MB plus twice the size of the largest database table (up to 4GB) Yes 58 minutes plus 30 mins for each 10 million events Physical Series 3 Geryon 3D Sensors 66MB 14046MB plus twice the size of the largest database table (up to 4GB) Yes 43 minutes plus 30 mins for each 10 million events Version 4.10.3.7 Sourcefire 3D System Release Notes 22 Updating Existing Appliances and Software Sensors Appliance/Sensor Software Disk Space on / Disk Space on /Volume Reboot? Estimated Time Physical 3D9900 3D Sensors 76MB 9926MB plus twice the size of the largest database table (up to 4GB) Yes 45 minutes plus 30 mins for each 10 million events Other physical and virtual 3D Sensors 79MB 8994MB plus twice the size of the largest database table (up to 4GB) Yes 35 minutes plus 45 mins for each 10 million events 3D Sensor Software for Crossbeam X-Series 5286MB on / and 1MB on /mnt/aplocaldisk Yes 36 minutes When you update a managed sensor to Version 4.10.3.7, your Defense Center must be running at least Version 4.10.3. In addition, the update requires additional disk space on the Defense Center’s /Volume partition. The following table provides guidelines for the required disk space. 6. Managed Sensor/Software Additional Disk Space on Defense Center Series 3 3D Sensors 1.5GB 3D9900 3D Sensors 986MB Other Series 2 and all virtual 3D Sensors 928MB 3D Sensor Software for Crossbeam X-Series 739MB Update your Master Defense Centers. Always update Master Defense Centers first; see Updating a Defense Center or Master Defense Center on page 24. 7. Update your Defense Centers. After you update any Master Defense Centers in your deployment, you can update the Defense Centers they manage. For more information, see Updating a Defense Center or Master Defense Center on page 24. Note that when you begin to update one Defense Center in a high availability pair, the other Defense Center in the pair becomes the primary, if it is not already. In addition, the paired Defense Centers stop sharing configuration information; paired Defense Centers do not receive software updates as part of the regular synchronization process. To ensure continuity of operations, do not update paired Defense Centers at the same time. First, complete the update procedure for one of the Defense Centers, then update the second Defense Center. Version 4.10.3.7 Sourcefire 3D System Release Notes 23 Updating Existing Appliances and Software Sensors 8. Update your managed 3D Sensors. After you update the Master Defense Centers and Defense Centers in your deployment, you can update your managed sensors (including software sensors). Sourcefire strongly recommends that you use your Defense Centers to update the sensors they manage; see Updating Managed 3D Sensors on page 27. Updating the Sourcefire Software for Crossbeam Systems X-Series reloads the affected VAPs. If your Sourcefire Software for Crossbeam Systems X-Series is deployed inline and you are using multi-member VAP groups, Sourcefire recommends that you update the VAPs one at a time. This allows the other VAPs in the group to inspect network traffic while the VAP that is being updated reloads. If you are using single-VAP VAP groups in an inline deployment, reloading the VAP causes an interruption in network traffic. Make sure you plan the update for a maintenance window or other time when it will have the least impact on your deployment. Note that you must update members of a stacked sensor pair at the same time; you cannot manage policies on a stacked pair unless both sensors in the pair are running the same version of the Sourcefire 3D System. For the Version 4.10.3.7 update, all 3D Sensors automatically reboot. See Important Update and Compatibility Notes on page 3 for information about interruptions in network traffic and traffic inspection. 9. Update your unmanaged 3D Sensors. See Updating Unmanaged 3D Sensors on page 29. For the Version 4.10.3.7 update, all 3D Sensors automatically reboot. See Important Update and Compatibility Notes on page 3 for information about interruptions in network traffic and traffic inspection. Updating a Defense Center or Master Defense Center Use the procedure in this section to update your Defense Centers and Master Defense Centers, including Virtual Defense Centers. If your deployment includes Master Defense Centers, you must update them before you update the Defense Centers that they manage. Note that when you begin to update one Defense Center in a high availability pair, the other Defense Center in the pair becomes the primary, if it is not already. In addition, the paired Defense Centers stop sharing configuration information; paired Defense Centers do not receive software updates as part of the regular synchronization process. To ensure continuity of operations, do not update paired Version 4.10.3.7 Sourcefire 3D System Release Notes 24 Updating Existing Appliances and Software Sensors Defense Centers at the same time. First, complete the update procedure for one of the Defense Centers, then update the second Defense Center. WARNING! Do not install the Version 4.10.3.7 update on appliances with a STIG hotfix installed; it renders the web interface unusable. Uninstall the STIG hotfix before proceeding with the update. To reinstall the STIG hotfix (build 15 or later) after completing the Version 4.10.3.7 update, see the Sourcefire 3D System STIG Hotfix Release Notes for Version 4.10.3.7. WARNING! Do not reboot or shut down your appliances during the update until after you see the login prompt. The system may appear inactive during the pre-checks portion of the update; this is expected behavior and does not require you to reboot or shut down your appliances. You can monitor the update’s progress in the Defense Center’s task queue (System > Monitoring > Task Status). To update the Defense Center or Master Defense Center: 1. Read these release notes and complete any required pre-update tasks. For more information, see Important Update and Compatibility Notes on page 3 and Planning for the Update on page 21. 2. Download the appropriate update from the Sourcefire Support Site: • for Series 3 Defense Centers: Sourcefire_3D_Defense_Center_S3_Patch-4.10.3.7-18.sh • for other Defense Centers and Master Defense Centers: Sourcefire_3D_DC_Patch-4.10.3.7-18.sh IMPORTANT! Download the update directly from the Sourcefire Support Site. If you transfer an update file by email, it may become corrupted. 3. Make sure that the appliances in your deployment are successfully communicating and that there are no issues being reported by the health monitor. 4. Select Operations > Monitoring > Task Status to view the task queue and make sure that there are no jobs in process. Tasks that are running when the update begins are stopped and cannot be resumed; you must manually delete them from the task queue after the update completes. The task queue automatically refreshes every 10 seconds. You must wait until any long-running tasks are complete before you begin the update. 5. Select Operations > Update. The Update page appears. Version 4.10.3.7 Sourcefire 3D System Release Notes 25 Updating Existing Appliances and Software Sensors 6. Click Upload Update to browse to the update you downloaded, then click Upload. The update is uploaded to the Defense Center. The Update page shows the type of update you just uploaded, its version number, the date and time it was generated, and whether a reboot is required as part of the update. For the Version 4.10.3.7 update, Defense Centers reboot. 7. Click Install next to the update you just uploaded. The Install Update page appears. 8. Under Selected Update, select the Defense Center and click Install. 9. Confirm that you want to install the update and reboot the Defense Center. The update process begins. You can monitor the update's progress in the task queue (Operations > Monitoring > Task Status). WARNING! Do not use the web interface to perform any other tasks until the update has completed and the Defense Center reboots. Before the update completes, the web interface may become unavailable and the Defense Center may log you out. This is expected behavior; log in again to view the task queue. If the update is still running, do not use the web interface until the update has completed. If you encounter issues with the update (for example, if the task queue indicates that the update has failed or if a manual refresh of the task queue shows no progress), do not restart the update. Instead, contact Sourcefire Support. 10. After the update finishes, clear your browser cache and force a reload of the browser. Otherwise, the user interface may exhibit unexpected behavior. 11. Log into the Defense Center. 12. Select Operations > Help > About and confirm that the software version is listed correctly: Version 4.10.3.7. Also note the versions of the SEU and VDB on the Defense Center; you will need this information later. 13. Verify that all managed sensors are successfully communicating with the Defense Center. 14. If the SEU available on the Sourcefire Support Site is newer than the SEU on your Defense Center, Sourcefire strongly recommends that you import the newer SEU. Note that after you import the SEU, applying an intrusion policy from the Defense Center to a detection engine on a managed sensor does not install the SEU on the sensor. However, applying the policy provides the detection engine with any new rules or other features that you enable in the policy even though the new rules or other features you enable are not accessible from the sensor’s web interface. For information on importing the SEU, see the Sourcefire 3D System User Guide. Version 4.10.3.7 Sourcefire 3D System Release Notes 26 Updating Existing Appliances and Software Sensors 15. Reapply intrusion policies to the IPS detection engines on your managed 3D Sensors. Unless you enabled the Inspect Traffic During Policy Apply option when you created your IPS detection engines (this option is supported on many sensor models), applying an intrusion policy causes IPS detection engines to restart. This may cause a short pause in processing and, for most detection engines with inline interface sets, may cause a few packets to pass through the sensor uninspected. 16. If your deployment includes RADIUS-based external user authentication and uses custom user roles, you must reapply your system policy to the Defense Center and any sensors it manages. 17. If the VDB available on the Sourcefire Support Site is newer than the VDB on your Defense Center, Sourcefire strongly recommends that you install the latest VDB on the Defense Center and on the 3D Sensors with RNA that it manages. For information on installing the latest VDB, see the Sourcefire 3D System User Guide. Updating Managed 3D Sensors After you update your Defense Centers to Version 4.10.3.7, Sourcefire strongly recommends that you use them to update the sensors they manage. Because they do not have a web interface, you must use the Defense Center to update 3D Sensor Software for Crossbeam X-Series and Virtual 3D Sensors. Updating managed sensors is a two-step process. First, download the update from the Sourcefire Support Site and upload it to the managing Defense Center. Next, install the software. You can update multiple 3D Sensors at once, but only if they use the same update file. For the Version 4.10.3.7 update, all 3D Sensors automatically reboot. See Important Update and Compatibility Notes on page 3 for information about interruptions in network traffic and traffic inspection. If your 3D Sensor Software for Crossbeam X-Series is deployed inline and you are using multi-member VAP groups, Sourcefire recommends that you update the VAPs one at a time. This allows the other VAPs in the group to inspect network traffic while the VAP that is being updated reloads. If you are using single-VAP VAP groups in an inline deployment, reloading the VAP causes an interruption in Version 4.10.3.7 Sourcefire 3D System Release Notes 27 Updating Existing Appliances and Software Sensors network traffic. Make sure you plan the update for a maintenance window or other time when it will have the least impact on your deployment. WARNING! Do not install the Version 4.10.3.7 update on appliances with a STIG hotfix installed; it renders the web interface unusable. Uninstall the STIG hotfix before proceeding with the update. To reinstall the STIG hotfix (build 15 or later) after completing the Version 4.10.3.7 update, see the Sourcefire 3D System STIG Hotfix Release Notes for Version 4.10.3.7. WARNING! Do not reboot or shut down your appliances during the update until after you see the login prompt. The system may appear inactive during the pre-checks portion of the update; this is expected behavior and does not require you to reboot or shut down your appliances. You can monitor the update’s progress in the Defense Center’s task queue (System > Monitoring > Task Status). To update managed 3D Sensors: 1. Read these release notes and complete any required pre-update tasks. For more information, see Important Update and Compatibility Notes on page 3 and Planning for the Update on page 21. 2. Update the Sourcefire software on the sensors’ managing Defense Center as described in Updating a Defense Center or Master Defense Center on page 24. 3. Download the appropriate update from the Sourcefire Support Site: • for Series 3 3D Sensors: Sourcefire_3D_Sensor_S3_Patch-4.10.3.7-18.sh • for 3D9900 3D Sensors: Sourcefire_3D_Sensor_9900_Patch-4.10.3.7-18.sh • for other 3D Sensors and Virtual 3D Sensors: Sourcefire_3D_Sensor_Patch-4.10.3.7-18.sh • for Sourcefire 3D Sensor Software for Crossbeam X-Series: Sourcefire_3D_XOS_Sensor_Patch-4.10.3.7-18.sh IMPORTANT! Download the update directly from the Support Site. If you transfer an update file by email, it may become corrupted. 4. Make sure that the appliances in your deployment are successfully communicating and that there are no issues being reported by the health monitor. 5. On the managing Defense Center, select Operations > Update. The Update page appears. Version 4.10.3.7 Sourcefire 3D System Release Notes 28 Updating Existing Appliances and Software Sensors 6. Click Upload Update to browse to the update you downloaded, then click Upload. The update is uploaded to the Defense Center. The Update page shows the type of update you just uploaded, its version number, the date and time it was generated, and whether a reboot is required as part of the update. 7. Click Install next to the update you are installing. The Install Update page appears. 8. Select the sensors where you want to install the update, then click Install. If you are updating a stacked pair, selecting one member of the pair automatically selects the other. You must update members of a stacked pair together; you cannot manage policies on a stacked pair unless both sensors in the pair are running the same version of the Sourcefire 3D System. 9. Confirm that you want to install the update and reboot the 3D Sensors. The update process begins. You can monitor the update's progress in the Defense Center’s task queue (Operations > Monitoring > Task Status). For Sourcefire 3D Sensor Software for Crossbeam deployed inline, traffic is interrupted while VAPs reload. WARNING! If you encounter issues with the update (for example, if the task queue indicates that the update has failed or if a manual refresh of the task queue shows no progress), do not restart the update. Instead, contact Support. 10. On the Defense Center, select Operations > Sensors and confirm that the sensors you updated have the correct version listed: Version 4.10.3.7. 11. Verify that the sensors you updated are successfully communicating with the Defense Center. 12. Reapply intrusion policies to the IPS detection engines on your managed 3D Sensors. Unless you enabled the Inspect Traffic During Policy Apply option when you created your IPS detection engines (this option is supported on many sensor models), applying an intrusion policy causes IPS detection engines to restart. This may cause a short pause in processing and, for most detection engines with inline interface sets, may cause a few packets to pass through the sensor uninspected. 13. If your deployment includes RADIUS-based external user authentication, you must reapply your system policy to your sensors. Updating Unmanaged 3D Sensors Use the procedure in this section to update unmanaged 3D Sensors only; Sourcefire strongly recommends that you update managed 3D Sensors using their managing Defense Centers. For more information, see Updating Managed 3D Sensors on page 27. Version 4.10.3.7 Sourcefire 3D System Release Notes 29 Updating Existing Appliances and Software Sensors For the Version 4.10.3.7 update, all 3D Sensors automatically reboot. See Important Update and Compatibility Notes on page 3 for information about interruptions in network traffic and traffic inspection. WARNING! Do not install the Version 4.10.3.7 update on appliances with a STIG hotfix installed; it renders the web interface unusable. Uninstall the STIG hotfix before proceeding with the update. To reinstall the STIG hotfix (build 15 or later) after completing the Version 4.10.3.7 update, see the Sourcefire 3D System STIG Hotfix Release Notes for Version 4.10.3.7. WARNING! Do not reboot or shut down your appliances during the update until after you see the login prompt. The system may appear inactive during the pre-checks portion of the update; this is expected behavior and does not require you to reboot or shut down your appliances. You can monitor the update’s progress in the Defense Center’s task queue (System > Monitoring > Task Status). To update an unmanaged 3D Sensor: 1. Read these release notes and complete any required pre-update tasks. For more information, see Important Update and Compatibility Notes on page 3 and Planning for the Update on page 21. 2. Download the appropriate update from the Sourcefire Support Site: • for Series 3 3D Sensors: Sourcefire_3D_Sensor_S3_Patch-4.10.3.7-18.sh • for 3D9900 3D Sensors: Sourcefire_3D_Sensor_9900_Patch-4.10.3.7-18.sh • for other 3D Sensors: Sourcefire_3D_Sensor_Patch-4.10.3.7-18.sh IMPORTANT! Download the update directly from the Sourcefire Support Site. If you transfer an update file by email, it may become corrupted. 3. Select Operations > Monitoring > Task Status to view the task queue and make sure that there are no jobs in process. Tasks that are running when the update begins are stopped and cannot be resumed; you must manually delete them from the task queue after the update completes. The task queue automatically refreshes every 10 seconds. You must wait until any long-running tasks are complete before you begin the update. 4. Select Operations > Update. The Update page appears. Version 4.10.3.7 Sourcefire 3D System Release Notes 30 Updating Existing Appliances and Software Sensors 5. Click Upload Update to browse to the update you downloaded, then click Upload. The update is uploaded to the 3D Sensor. The Update page shows the type of update you just uploaded, its version number, the date and time it was generated, and whether a reboot is required as part of the update. 6. Click Install next to the update you just uploaded. 7. Confirm that you want to install the update and reboot the 3D Sensor. The update process begins. You can monitor the update's progress in the task queue (Operations > Monitoring > Task Status). WARNING! Do not use the web interface to perform any other tasks until the update has completed and the 3D Sensor reboots. Before the update completes, the web interface may become unavailable and the 3D Sensor may log you out. This is expected behavior; log in again to view the task queue. If the update is still running, do not use the web interface until the update has completed. If you encounter issues with the update (for example, if the task queue indicates that the update has failed or if a manual refresh of the task queue shows no progress), do not restart the update. Instead, contact Sourcefire Support. 8. After the update finishes, clear your browser cache and force a reload of the browser. Otherwise, the user interface may exhibit unexpected behavior. 9. Log into the 3D Sensor. 10. Select Operations > Help > About and confirm that the software version is listed correctly: Version 4.10.3.7. Also note the version of the SEU on the 3D Sensor; you will need this information for the next step. 11. If the SEU available on the Sourcefire Support Site is newer than the SEU on your 3D Sensor, Sourcefire strongly recommends that you import the newer SEU. For information on importing the SEU, see the Sourcefire 3D System User Guide. 12. Reapply intrusion policies to your IPS detection engines. Unless you enabled the Inspect Traffic During Policy Apply option when you created your IPS detection engines (this option is supported on many sensor models), applying an intrusion policy causes IPS detection engines to restart. This may cause a short pause in processing and, for most detection engines with inline interface sets, may cause a few packets to pass through the sensor uninspected. Version 4.10.3.7 Sourcefire 3D System Release Notes 31 Updating Existing Appliances and Software Sensors Using the Shell to Update an Appliance Although Sourcefire strongly recommends that you use the web interface on your appliance to perform updates, there may be rare situations where you need to install the update from the bash shell. IMPORTANT! Do not use the shell to update Sourcefire 3D Sensor Software for Crossbeam. Instead, use the managing Defense Center as described in Updating Managed 3D Sensors on page 27. WARNING! Do not install the Version 4.10.3.7 update on appliances with a STIG hotfix installed; it renders the web interface unusable. Uninstall the STIG hotfix before proceeding with the update. To reinstall the STIG hotfix (build 15 or later) after completing the Version 4.10.3.7 update, see the Sourcefire 3D System STIG Hotfix Release Notes for Version 4.10.3.7. WARNING! Do not reboot or shut down your appliances during the update until after the appliance reboots automatically. The system may appear inactive during the pre-checks portion of the update; this is expected behavior and does not require you to reboot or shut down your appliances. For the Version 4.10.3.7 update, all appliances automatically reboot. If you are updating a 3D Sensor, see Important Update and Compatibility Notes on page 3 for information about interruptions in network traffic and traffic inspection. To install the update via the shell: 1. Read these release notes and complete any required pre-update tasks. For more information, see Important Update and Compatibility Notes on page 3 and Planning for the Update on page 21. 2. Download the appropriate update from the Sourcefire Support Site: • for Series 3 Defense Centers: Sourcefire_3D_Defense_Center_S3_Patch-4.10.3.7-18.sh • for other Defense Centers and Master Defense Centers: Sourcefire_3D_DC_Patch-4.10.3.7-18.sh • for Series 3 3D Sensors: Sourcefire_3D_Sensor_S3_Patch-4.10.3.7-18.sh • for 3D9900 3D Sensors: Sourcefire_3D_Sensor_9900_Patch-4.10.3.7-18.sh • for other 3D Sensors and Virtual 3D Sensors: Sourcefire_3D_Sensor_Patch-4.10.3.7-18.sh IMPORTANT! Download the update directly from the Sourcefire Support Site. If you transfer an update file by email, it may become corrupted. Version 4.10.3.7 Sourcefire 3D System Release Notes 32 Uninstalling the Update 3. Log into the appliance’s shell using an account with Administrator privileges. For virtual appliances, log in using the virtual console in the VMware vSphere Client. Note that on a Series 3 or virtual managed device, you must type expert to display the shell prompt. 4. At the prompt, run the update as the root user, providing your password when prompted: sudo install_update.pl /var/sf/updates/update_name where update_name is the file name of the update you downloaded earlier. The update process begins. When the update is complete, the appliance reboots. 5. Monitor the update and complete any post-update steps as listed in: • Updating a Defense Center or Master Defense Center on page 24 • Updating Managed 3D Sensors on page 27 • Updating Unmanaged 3D Sensors on page 29 Uninstalling the Update The following sections help you uninstall the Version 4.10.3.7 update from your appliances: • Important Uninstallation Notes on page 33 • Uninstalling the Update from 3D Sensors on page 35 • Uninstalling the Update from Virtual 3D Sensors on page 36 • Uninstalling the Update from Crossbeam Systems X-Series on page 36 • Uninstalling the Update from Defense Centers on page 37 • Uninstalling the Update from Master Defense Centers on page 38 IMPORTANT! Before you uninstall the update for any reason, make sure you read and understand Important Uninstallation Notes on page 33. Important Uninstallation Notes There are several points you must keep in mind when uninstalling the update, as described below. Uninstallation Methods For most appliances (Defense Centers and Master Defense Centers, including Virtual Defense Centers, as well as most 3D Sensor models), you must uninstall the update using the local web interface. For sensors that do not have a web interface (Virtual 3D Sensors and Sourcefire 3D Sensor Software for Crossbeam), you must use the command line interface (CLI) to uninstall the update. Version 4.10.3.7 Sourcefire 3D System Release Notes 33 Uninstalling the Update You cannot use a Defense Center to uninstall the update from a managed 3D Sensor, nor can you use a Master Defense Center to uninstall the update from a managed Defense Center. Order of Uninstallation Uninstall the update in the reverse order that you installed it. That is, first uninstall the update from any unmanaged 3D Sensors, then managed 3D Sensors (including software sensors), then Defense Centers, and finally Master Defense Centers. Note that if you uninstall the update from the Master Defense Center before the Defense Center, you must reapply the update to the Master Defense Center, uninstall the update from the Defense Center, then uninstall the update from the Master Defense Center. You must uninstall updates from members of a stacked sensor pair at the same time; you cannot manage policies on a stacked pair unless both sensors in the pair are running the same version of the Sourcefire 3D System. Special Note: Uninstalling the Update from Paired Defense Centers When you begin to uninstall the update from one Defense Center in a high availability pair, the other Defense Center in the pair becomes the primary, if it is not already. In addition, the paired Defense Centers stop sharing configuration information; paired Defense Centers do not uninstall software updates as part of the regular synchronization process. To ensure continuity of operations, do not uninstall the update from paired Defense Centers at the same time. First, complete the uninstallation procedure for one of the Defense Centers, then uninstall the update from the second Defense Center. Special Note: Uninstalling the Update from 3D Sensors Deployed Inline If your 3D Sensor uses IPS detection engines with inline interface sets and the sensor does not have a fail-open network card, or if you are uninstalling the update from a Virtual 3D Sensor deployed inline, traffic is interrupted as described in Important Update and Compatibility Notes on page 3. Special Note: Uninstalling the Update from Crossbeam Systems X-Series Uninstalling the Version 4.10.3.7 update of the 3D Sensor Software reloads the affected VAP. If your 3D Sensor Software is deployed inline and you are using multi-member VAP groups, Sourcefire recommends that after you uninstall the update from a VAP, you allow that VAP to reload before you uninstall the update from additional VAPs. This allows the other VAPs in the group to inspect network traffic while the affected VAP reloads. If you are using single-VAP VAP groups in an inline deployment, reloading the VAP causes an interruption in network traffic. Make sure to plan the uninstallation for a maintenance window or other time when it will have the least impact on your deployment. Special Note: Uninstalling the Update and Online Help Note that uninstalling the Version 4.10.3.7 update does not revert the online help to its previous version. If the version of your online help does not match that of Version 4.10.3.7 Sourcefire 3D System Release Notes 34 Uninstalling the Update your Sourcefire 3D System, your online help may contain documentation for unavailable features and may have problems with context sensitivity and link functionality. Uninstalling the Update from 3D Sensors The following procedure explains how to use the local web interface to uninstall the Version 4.10.3.7 update from 3D Sensors, regardless of whether the sensors are managed or unmanaged. You cannot use a Defense Center to uninstall the update from a managed 3D Sensor. Uninstalling the Version 4.10.3.7 update results in a 3D Sensor running Version 4.10.3.6. For information on uninstalling a previous version, refer to the release notes for that version. To uninstall the update: 1. Read and understand Important Uninstallation Notes on page 33. 2. Select Operations > Monitoring > Task Status to view the task queue and make sure that there are no jobs in process. Tasks that are running when the uninstallation begins are stopped and cannot be resumed; you must manually delete them from the task queue after the uninstallation completes. The task queue automatically refreshes every 10 seconds. You must wait until any long-running tasks are complete before you begin the uninstallation. 3. Select Operations > Update. The Update page appears. 4. Click Install next to the uninstaller that matches the update you want to remove. 5. Confirm that you want to uninstall the update and reboot the 3D Sensor. The update is removed and the sensor reboots. You can monitor the uninstallation progress in the task queue (Operations > Monitoring > Task Status). Note that some traffic may pass through inline interface sets uninspected while the sensor reboots, as explained in Important Update and Compatibility Notes on page 3. WARNING! Do not use the web interface to perform any other tasks until the uninstallation has completed and the sensor reboots. Before the update completes, the web interface may become unavailable and the sensor may log you out. This is expected behavior; log in again to view the task queue. If the uninstallation is still running, do not use the web interface until the uninstallation has completed. If you encounter issues with the uninstallation (for example, if the task queue indicates that the uninstallation has failed or if a manual refresh of the task queue shows no progress), do not restart the uninstallation. Instead, contact Sourcefire Support. Version 4.10.3.7 Sourcefire 3D System Release Notes 35 Uninstalling the Update 6. After the uninstallation finishes, clear your browser cache and force a reload of the browser. Otherwise, the user interface may exhibit unexpected behavior. 7. Log into the 3D Sensor. 8. Select Operations > Help > About and confirm that the software version is listed correctly: Version 4.10.3.6. 9. If you uninstalled the update from a managed sensor, make sure the sensor is successfully communicating with the Defense Center. Uninstalling the Update from Virtual 3D Sensors Use the following procedure to uninstall the Version 4.10.3.7 update from Virtual 3D Sensors. You cannot use a Defense Center to uninstall the update. Uninstalling the Version 4.10.3.7 update results in a Virtual 3D Sensor running Version 4.10.3.6. For information on uninstalling a previous version, refer to the release notes for that version. To uninstall the update: 1. Read and understand Important Uninstallation Notes on page 33. 2. Log into the appliance’s shell using an account with Administrator privileges. For virtual appliances, log in using the virtual console in the VMware vSphere Client. Note that on a Series 3 or virtual managed device, you must type expert to display the shell prompt. 3. At the prompt, run the update as the root user, providing your password when prompted: sudo install_update.pl /var/sf/updates/update_name where update_name is the file name of the update you downloaded earlier. The update process begins. When the update is complete, the appliance reboots.If the sensor is deployed inline, this causes an interruption in network traffic. The update is removed. 4. To disconnect from the 3D Sensor, type exit and press Enter. 5. On the managing Defense Center, select Operations > Sensors and confirm that the sensor where you uninstalled the update has the correct version listed: Version 4.10.3.6. 6. Verify that the sensor is successfully communicating with the Defense Center. Uninstalling the Update from Crossbeam Systems X-Series Use the following procedure to uninstall the Version 4.10.3.7 update from the 3D Sensor Software for Crossbeam Systems X-Series. You cannot use a Defense Center to uninstall the update. Version 4.10.3.7 Sourcefire 3D System Release Notes 36 Uninstalling the Update Uninstalling the update results in the 3D Sensor Software running Version 4.10.3.6. For information on uninstalling a previous version, refer to the release notes for that version. To uninstall the update: 1. Read and understand Important Uninstallation Notes on page 33. 2. Log into a VAP where you want to uninstall the update. For example, to log into the first VAP in the intrusion VAP group: CBS# unix su [root@machine admin]# rsh intrusion_1 3. At the prompt, run the following command to configure your session environment to run Sourcefire scripts: source /opt/sf/profile 4. At the prompt, type the following on a single line and press Enter: install_update.pl /var/sf/updates/ Sourcefire_3D_XOS_Sensor_Patch_Uninstaller4.10.3.7-18.sh The update is removed and the VAP reloads. If your Sourcefire Software for Crossbeam is deployed inline, traffic to that VAP is interrupted while the VAP reloads. Note, however, that if there are other VAPs in the VAP group, traffic is load balanced among the other VAPs. 5. On the managing Defense Center, select Operations > Sensors and confirm that the software sensor where you uninstalled the update has the correct version listed: Version 4.10.3.5. 6. Verify that the software sensor is successfully communicating with the Defense Center. 7. Repeat steps 1 through 6 for each VAP in the VAP group. Uninstalling the Update from Defense Centers Use the following procedure to uninstall the Version 4.10.3.7 update from your Defense Centers and Virtual Defense Centers. Uninstalling the Version 4.10.3.7 update results in a Defense Center running Version 4.10.3.6. For information on uninstalling a previous version, refer to the release notes for that version. To uninstall the update: Version 4.10.3.7 1. Read and understand Important Uninstallation Notes on page 33. 2. Make sure that the appliances in your deployment are successfully communicating and that there are no issues being reported by the health monitor. Sourcefire 3D System Release Notes 37 Uninstalling the Update 3. Select Operations > Monitoring > Task Status to view the task queue and make sure that there are no jobs in process. Tasks that are running when the uninstallation begins are stopped and cannot be resumed; you must manually delete them from the task queue after the uninstallation completes. The task queue automatically refreshes every 10 seconds. You must wait until any long-running tasks are complete before you begin the uninstallation. 4. Select Operations > Update. The Update page appears. 5. Click Install next to the uninstaller that matches the update you want to remove. The Install Update page appears. 6. Under Selected Update, select the Defense Center and click Install. 7. Confirm that you want to uninstall the update and reboot the Defense Center. The update is removed and the Defense Center reboots. You can monitor the uninstallation progress in the task queue (Operations > Monitoring > Task Status). WARNING! Do not use the web interface to perform any other tasks until the uninstallation has completed and the Defense Center reboots. Before the update completes, the web interface may become unavailable and the Defense Center may log you out. This is expected behavior; log in again to view the task queue. If the uninstallation is still running, do not use the web interface until the uninstallation has completed. If you encounter issues with the uninstallation (for example, if the task queue indicates that the uninstallation has failed or if a manual refresh of the task queue shows no progress), do not restart the uninstallation. Instead, contact Sourcefire Support. 8. After the uninstallation finishes, clear your browser cache and force a reload of the browser. Otherwise, the user interface may exhibit unexpected behavior. 9. Log into the Defense Center. 10. Select Operations > Help > About and confirm that the software version is listed correctly: Version 4.10.3.6. 11. Verify that all managed sensors are successfully communicating with the Defense Center. Uninstalling the Update from Master Defense Centers Use the following procedure to uninstall the Version 4.10.3.7 update from your Master Defense Centers. Uninstalling the Version 4.10.3.7 update results in a Master Defense Center running Version 4.10.3.6. For information on uninstalling a previous version, refer to the release notes for that version. Version 4.10.3.7 Sourcefire 3D System Release Notes 38 Uninstalling the Update To uninstall the update: 1. Read and understand Important Uninstallation Notes on page 33. 2. Make sure that the appliances in your deployment are successfully communicating and that there are no issues being reported by the health monitor. 3. Select Operations > Monitoring > Task Status to view the task queue and make sure that there are no jobs in process. Tasks that are running when the uninstallation begins are stopped and cannot be resumed; you must manually delete them from the task queue after the uninstallation completes. The task queue automatically refreshes every 10 seconds. You must wait until any long-running tasks are complete before you begin the uninstallation. 4. Select Operations > Update. The Update page appears. 5. Click Install next to the uninstaller that matches the update you want to remove. The Install Update page appears. 6. Under Selected Update, select the Master Defense Center and click Install. 7. Confirm that you want to uninstall the update and reboot the Master Defense Center. The update is removed and the Master Defense Center reboots. You can monitor the uninstallation progress in the task queue (Operations > Monitoring > Task Status). WARNING! Do not use the web interface to perform any other tasks until the uninstallation has completed and the Master Defense Center reboots. Before the update completes, the web interface may become unavailable and the Master Defense Center may log you out. This is expected behavior; log in again to view the task queue. If the uninstallation is still running, do not use the web interface until the uninstallation has completed. If you encounter issues with the uninstallation (for example, if the task queue indicates that the uninstallation has failed or if a manual refresh of the task queue shows no progress), do not restart the uninstallation. Instead, contact Sourcefire Support. 8. After the uninstallation finishes, clear your browser cache and force a reload of the browser. Otherwise, the user interface may exhibit unexpected behavior. 9. Log into the Master Defense Center. 10. Select Operations > Help > About and confirm that the software version is listed correctly: Version 4.10.3.6. 11. Verify that all managed Defense Centers are successfully communicating with the Master Defense Center. Version 4.10.3.7 Sourcefire 3D System Release Notes 39 Known Issues Known Issues No new known issues are reported in Version 4.10.3.7. • In some cases after completing a scheduled intrusion rule update import and subsequent intrusion policy reapply, Defense Centers in a high availability configuration may incorrectly show intrusion policies as out-of-date. (126670, 126820) • Remote storage connections using Server Message Block (SMB) fail if the shared directory in the Share field contains a space character. (134997) Known Issues Discovered in Previous Releases The following is a list of known issues that were discovered in previous releases of the Sourcefire 3D System: Version 4.10.3.7 • Performing an operation that consumes excessive memory on an appliance (for example, generating a report based on a search query that returns millions of events) may cause other operations on the appliance to fail. (57114) • Impact flags for intrusion events generated using imported or local rules that you created on a Master Defense Center may appear incorrectly on managed Defense Centers. (75570) • If your Nmap scan target contains a large number of hosts, the scan may take an extended period of time. As a workaround, scan fewer hosts at a time. (75999) • The web interface does not accurately report the number of packets dropped by a Virtual 3D Sensor. (76157) • The Intrusion Policy page incorrectly indicates that the currently applied intrusion policy is out of date on the detection engine where you applied it if you commit the policy without changing it. (76729) • An intrusion policy is reapplied without prompting you for confirmation if you refresh the Policy Information page after applying the policy. The workaround is to select Policy & Response > IPS > Intrusion Policy instead of using your web browser to refresh the page. (76840) • To ensure that Virtual 3D Sensors can see VLAN traffic, you must modify the promiscuous port group so that the VLAN ID is set to 4095. (76862) • Evaluating complex compliance rules that trigger on events that occur frequently may degrade the performance of the Defense Center. (79099) • You cannot import a custom workflow onto an appliance if it has the same name as an existing workflow on the appliance. Similarly, you cannot import a custom table if one of its associated workflows has the same name as an existing workflow on the appliance. (80878) • On an 8000 Series sensor, enabling the Allow reconfiguration of network settings option on the Network page of the system settings unnecessarily causes a temporary loss of link for the sensor’s management interface when you click Save. (85008) Sourcefire 3D System Release Notes 40 Known Issues • If network traffic overloads a 7000 Series or 8000 Series sensor that has tap mode enabled on its inline interface sets, you may experience issues with latency or packets arriving out of order. (86755) • On 8000 Series sensors, traffic running on UDP port 319 is dropped, rather than forwarded, in inline deployments. (90129) • In some cases, the CPU usage health module may report artificially high CPU usage for the 3D6500 sensor. Instead, you can use the IPS Performance Statistics Graphs to report packets dropped by the Snort process. Note that this procedure requires a user role with either Admin or Maintenance privileges. See the following procedure for information on how to generate this type of graph. (91146) To generate the graph: 1. Select Operations > Monitoring > Performance > IPS. 2. From the Select Device list, select the detection engines whose data you want to view. 3. From the Select Graph(s) list, select Percent Packets Dropped. 4. From the Select Time Range list, select the time range you would like to use for the graph. You can choose from last hour, last day, last week, or last month. 5. Click Graph. The graph appears, displaying the percentage of packets that were uninspected by the Snort process over the time period you specified. Version 4.10.3.7 • Non-primary 3D Sensors in a stacked configuration display errors in /var/log/messages from the module TimeSeries. You can safely ignore these errors. (91763) • In some cases, if the currently applied intrusion policy has been applied and deleted several times, the policy does not appear on the Detection Engines page (Operations > Detection Engines). As a workaround, reapply the policy. (92885) • When you connect a 7000 Series sensor to a network switch that has Spanning Tree Protocol enabled, the sensor has no Serial Over LAN connectivity. As a workaround, disable Spanning Tree on the affected ports. (97015) • Clicking Stop in the RHEV Manager does not properly shut down virtual appliances. Instead, use the web interface or the bash shell on the Virtual Defense Center, or the CLI on the Virtual 3D Sensor. As a last resort, you can use the RHEV Manager to power off a virtual appliance and release its resources. (97319) • PEP IPv4 Fast Path Rules do not fast path GRE (Generic Routing Encapsulation) traffic. (99296) • You cannot set rule actions for the current intrusion policy in the intrusion event packet view. (99522) • In some cases, if you apply an intrusion policy to a large group of detection engines, the Intrusion Policy page does not display accurate policy apply results. (99817) Sourcefire 3D System Release Notes 41 Known Issues • After you manually change the system time on a 3D Sensor, you must reapply its intrusion policy or restart the sensor. Otherwise, intrusion events generated by that device do not reflect the new time setting. (99831) • When you click a dashboard widget link to view events in the event viewer, the right-click context menu options for disabling an event’s corresponding rule may error. As a workaround, use another link path to the event viewer. (100773) • Detection engine names do not support the number sign character (#). Do not use this character in detection engine names. (101749) • When you create a report profile (Analysis & Reporting > Report Profiles) for RNA Services, RNA Hosts, Host Attributes, Client Applications, or White List Violations, a time constraint appears. This constraint has no effect. (101952) • When you query an 8000 Series sensor via SNMP, CPU statistics that reflect system load or traffic throughput are inaccurately high. (102397) • The ipmitool commands chassis power off and chassis power cycle do not function on 3D7010, 3D7020, or 3D7030 3D Sensors. To restart these sensors using remote IPMI, enter the following command: ipmitool -I lanplus -H <bmc-ip-address> -U <username> -P <password> chassis power reset where the italicized segments represent the data relevant to your configuration. (104159) • You cannot configure email alerts with To or From addresses that include apostrophes. (107561) • If you use the web interface to grant Lights-Out Management (LOM) privileges to an existing user, that user cannot access LOM with their password. You must manually enable the password from the command line with the following command: ipmitool user set password <user_id> <password> where <user_id> and <password> represent the relevant user ID and associated password, respectively. (108418) Version 4.10.3.7 • On the Master Defense Center, the secondary Defense Center in a high availability configuration may not appear on the Appliances page (Operations > Appliances) when you sort by Group or Manager. (108496) • On 3D7010, 3D7020, and 3D7030 sensors, the Interface Sets page (Operations > Configuration > Interface Sets) does not display a correct LED color for 10/100Mbps links. (110525) • When you change a sensor’s bandwidth capacity, the system may not immediately display the new bandwidth. It should appear within 10 minutes of your change. (111333) Sourcefire 3D System Release Notes 42 Features Introduced in Previous Versions • If you use a Serial Over LAN (SOL) connection to restore a 3D7010, 3D7020, or 3D7030 3D Sensor to factory settings, and a Lights-Out Management (LOM) user is logged in when you begin the restore, the LOM user is not deleted or disconnected. As a workaround, disconnect your SOL connection after the restore process verifies the file image and indicates that you should push Enter to reboot. (For most appliances, this takes approximately 40 minutes.) The LOM user is then deleted correctly. (113824) • If you create an inline interface set with both copper and fiber interfaces, the system may block you from enabling link state propagation. (118138) • If you use a Defense Center running Version 4.10.3.4 or later to manage a sensor running Version 4.10.3.3 or earlier, the system will not populate the Intrusion Policy column in the intrusion event viewer. To view data in this column, update your sensors to Version 4.10.3.4 or later. (125208) • In some cases, reports may not generate if you upload a logo file with a particularly long filename or high resolution to the report template. (121878) Features Introduced in Previous Versions The following is a list of new features added in previous versions of the Sourcefire 3D System. Note that functionality described in previous versions may be superseded by other new functionality or updated through resolved issues. 4.10.3.x • There were no new features introduced in Version 4.10.3.6. • Version 4.10.3.5 introduced the ability to select Defense Center-only (DC-only) permissions when creating user roles on a Master Defense Center. Features associated with DC-only permissions are viewed and configured only from a Defense Center; they do not display if the user logs into a Master Defense Center. • Version 4.10.3.4 added a column in the table view of intrusion events for the name of the intrusion policy associated with each event. This information is also available through eStreamer. • Version 4.10.3.2 added support for the 3D7010, 3D7020, and 3D7030 3D Sensors. These three sensor models are 1U appliances, and are delivered with eight 1GB copper interfaces, each with bypass capability. Note that these sensors do not support stacking. • Version 4.10.3.1 introduced support for the 40G network module (NetMod) on 3D8250 3D Sensors that have a 40G switch. 4.10.3 As of Version 4.10.3, you can configure remote access to the system console (via VGA, physical serial port, or Serial Over LAN) from the appliance interface (Operations > System Settings > Console Configuration). Version 4.10.3.7 Sourcefire 3D System Release Notes 43 Features Introduced in Previous Versions 4.10.2.x There were no new features introduced in Versions 4.10.2.7 through 4.10.2.1. 4.10.2 Version 4.10.2 of the Sourcefire 3D System introduced four new Series 3 3D Sensor models: the 3D7110, 3D7120, 3D8120, and 3D8130. Note that these sensors do not support stacking. In Version 4.10.2 and later, detection resources on Series 3 sensors use dynamic load balancing, which considers CPU load when distributing traffic to available CPUs. This reduces the risk of CPU core overload. 4.10.1.x • There were no new features introduced in Versions 4.10.1.5 and 4.10.1.4. • As of Version 4.10.1.3, users of 3D8250 appliances can add up to three secondary sensors to a stacked sensor configuration, for a total of four stacked sensors. Some terminology related to multiple-appliance arrangements was changed: • Prior to Version 4.10.1.3, the arrangement of two Defense Centers in a primary/secondary pair was called clustering. It became high availability. • Prior to Version 4.10.1.3, the roles of managing and managed devices were called master/slave in many contexts. They became primary/secondary. • There were no new features introduced in Version 4.10.1.2. • In Version 4.10.1.1, the Clustering and High Availability feature names were changed. Clustering became stacking; high availability became clustering. Reflecting this change, the command line interface command show clustering became show stacking. 4.10.1 The following features were introduced in Version 4.10.1. Custom User Role Management Custom user role management allows you to create and assign new user roles with customized permissions, in addition to the Sourcefire predefined roles. Custom User Role Escalation You can give custom user roles the permission, with a password, to temporarily gain the privileges of another, targeted user role in addition to those of the base role. This allows you to easily substitute one user for another during an absence, or to more closely track the use of advanced user privileges. Version 4.10.3.7 Sourcefire 3D System Release Notes 44 Features Introduced in Previous Versions Policy Comparison You can compare health, PEP, RNA detection, and system policies in addition to the existing intrusion policy comparison feature. You can also generate comparison reports for all of these policy types. Both the policy comparison view and the policy comparison report now appear in a more streamlined form, and you can now specifically select the active policy when making a comparison. Change Reconciliation Change Reconciliation allows you to closely track changes to your system, both with daily change reconciliation reports and in the audit log. When a user makes a change to any part of the Sourcefire 3D System, information relating to the change (time, nature of changes, username, and IP address) is saved to the audit log, where you can view it in detail. Miscellaneous Changes and Deprecations In Version 4.10.1, the Restricted Event Analyst and Restricted Event Analyst (Read Only) user roles were removed. All users with those roles were converted to custom user roles with permissions that are identical to those of their previous Restricted role. These custom roles have the same names as their associated user accounts so that a user account called Sample_Analyst will have a custom user role called Sample_Analyst after the update. 4.10 The following features were introduced in Version 4.10. New Defense Center Models Three new Defense Center models, all Series 3 appliances, were introduced with Version 4.10: the DC750, DC1500, and DC3500. Along with the features supported by earlier-model Defense Centers, these appliances support a feature called Lights-Out Management, which allows you to use a Serial Over LAN (SOL) connection to remotely monitor or manage the appliance, as well as perform limited tasks, such as viewing the chassis serial number, monitoring conditions such as fan speed and temperature, and restarting the appliance. Additionally, Version 4.10 Defense Centers no longer require product licenses. Feature licenses are still required. New 3D Sensor Models Two new 3D Sensor models were introduced with Version 4.10: the 3D8140 and 3D8250, also called 8000 Series sensors. Version 4.10.3.7 Sourcefire 3D System Release Notes 45 Features Introduced in Previous Versions Along with the features supported by earlier-model 3D Sensors, the 8000 Series sensors also support: • PEP • clustering • automatic detection resource allocation for optimal performance, which uses an intelligent resource algorithm that takes into consideration such factors as aggregate link bandwidth of all interfaces in the interface set, type of detection engine, and type of interface set Note, however, that the 8000 Series sensors have a limited web interface. You must manage and license them with a Defense Center. Intrusion Detection and Prevention Features Version 4.10 introduced a number of new features and improvements to help you manage your IPS deployment more efficiently and effectively. Original Client IP For intrusion events, Version 4.10 added the ability to view the original client IP address that is extracted from the X-Forwarded-For (XFF) or True-Client-IP HTTP headers. To display a value for this field, you must enable the HTTP Inspect preprocessor Extract Original Client IP Address option. Inline Result For intrusion events, the Inline Result field added a new value: would have dropped. This value indicates that IPS would have dropped the packet in an inline deployment if you had enabled the Drop when Inline intrusion policy option. Reviewed Intrusion Events by User For intrusion events, the ability to determine who (by user name) reviewed each reviewed intrusion event. RNA Features Version 4.10 introduced a number of new features and improvements to help you manage your RNA deployment more efficiently and effectively. Support for User-Defined Service Detectors on Standard Ports Version 4.10 introduced the ability to create and activate user-defined port-based service detectors on ports used by Sourcefire-provided internal detectors. This allows you to override some of Sourcefire’s service detection capabilities. Support for Payload and Add-on Application Detectors in the VDB Sourcefire uses the vulnerability database (VDB) update mechanism to provide you with updated application and payload detectors. You can group, activate, and deactivate add-on application detectors according to the needs of your organization, using the RNA Detectors page (Policy & Response > RNA > RNA Detectors). Version 4.10.3.7 Sourcefire 3D System Release Notes 46 Features Introduced in Previous Versions New Application and Service Detectors There were many new operating system, service, application, and payload detectors added for Version 4.10. Version 4.10 also included new application types to help categorize the new application detectors. In addition, old application types were consolidated. As an example of application type consolidation, in previous versions of the Sourcefire 3D System, each instant messaging application had its own application type. In Version 4.10, these applications were categorized under a single “instant messenger” application type. Third-Party Vulnerabilities If your organization has the resources to write scripts or create command line import files to import network map data from third-party applications, you gained the ability to use the host input feature to import third-party vulnerability data to augment RNA’s vulnerability data. You can view and work with third-party vulnerabilities in workflows (Analysis & Reporting > RNA > Third-Party Vulnerabilities) or in the host profiles of hosts with associated third-party vulnerabilities. Improved RNA Subnet Detection Interface The web interface for RNA subnet detection was updated to enhance usability. Nmap Improvements Version 4.10 included support for Nmap v5.21, which offers better performance and also includes richer service signatures, more scanning options for host discovery, and advanced timing options. PEP As of Version 4.10, IPv4 and IPv6 packet filters are called fast path rules. You can filter traffic by any protocol using either PEP rules or fast path rules. In addition, you can customize initiator and responder settings in IPv6 PEP rules. Finally, you can set a detection engine-specific action to process traffic that is detected by different detection engine types differently. The Version 4.10 update process also created two PEP rules to replace each PEP rule that previously used the Bi-Directional option. PEP is supported on the 3D9900 and on 8000 Series sensors. System Management Features Version 4.10 introduced a number of new features and improvements to help you manage your Sourcefire 3D System deployment more efficiently and effectively. Database Access The database access feature allows you to query intrusion, network discovery, user identity, compliance, vulnerability, and some system-level database tables on either a Master Defense Center or Defense Center, using a third-party client that supports JDBC SSL connections. Version 4.10.3.7 Sourcefire 3D System Release Notes 47 Features Introduced in Previous Versions You can use an industry-standard reporting tool such as Actuate BIRT, JasperSoft iReport, or Crystal Reports to interactively design and submit queries. You can also configure a standalone Java application to query Sourcefire data under program control. Command Line Interface As a security enhancement, Version 4.10 deprecated the root user account. You can, however, enable a feature called “expert mode,” which allows you to access a shell where you can use sudo to perform tasks that require root privileges. Note that you can also disable expert mode. On 8000 Series sensors and virtual appliances, a command line interface with a controlled set of commands and options became available. There are several CLI modes with various permissions levels that you can configure on a per-user basis. The Version 4.10 update process also changed the shell-access password for the admin account to the password for the Version 4.9.x root account. For Virtual appliances, the update process also replaced shell access with the CLI for the admin user as well as for any externally authenticated shell users. Security Improvements • Version 4.10 added the ability to use the system settings to configure your appliances to use an authenticated web proxy when downloading updates and rules. • You can use the system settings to replace the default SSL (Secure Sockets Layer) certificate that you can use to initiate encrypted communications between your web browser and a standalone-capable appliance. This allows you to use a custom certificate signed by a globally known certificate authority (CA). • Version 4.10 added support for encryption on the connection between your appliance and the mail relay host (configured in the system policy). • Version 4.10 added support for encryption on the Defense Center-LDAP server connection used by RUA, as well as the connection between RUA agents and the Defense Center. SNMP Polling Support Version 4.10 added the ability to use the system policy to enable Simple Network Management Protocol (SNMP) polling of an appliance, and thereby obtain access to the appliance’s standard management information base (MIB). Simplified LDAP Configuration As of Version 4.10, the Defense Center helps you create LDAP authentication objects by automatically filling in default settings based on the type of LDAP server you are using. Improved Troubleshooting Options Version 4.10 added the ability to customize the troubleshooting data that the health monitor reports, which reduces the size of any troubleshooting files that you send to Sourcefire Support. Version 4.10.3.7 Sourcefire 3D System Release Notes 48 Features Introduced in Previous Versions New Host Input API Functions The Host Input API added two new functions: AddScanResult, which adds scan results from a third-party vulnerability scanner and maps each vulnerability to a BugTraq or CVE ID, and DeleteScanResult, which deletes those results. You view and work with third-party vulnerabilities in the Defense Center’s web interface, as well as query them using the database access feature. Improvements in the Major Update Process As of Version 4.10, when a Defense Center is used to update the Sourcefire 3D System or the VDB on managed sensors, you no longer have to push the update to the sensors before you install it. Note, however, that scheduling updates still requires that you schedule the push and update tasks in succession. Miscellaneous Changes and Deprecations Version 4.10.3.7 • As of Version 4.10, users who want to continue sending responses out from the management interface when packets trigger intrusion rules using the resp keyword on a Version 4.9.x 3D3800 or 3D5800 sensor in tap mode must include the command line config response: device ip in a custom USER_CONF detection engine variable. • As of Version 4.10, the Defense Center lists up to 100 services per host. To improve performance once that limit is reached, new service information from any active or passive source is discarded until you delete a service from the host or a service times out. When you upgrade to Version 4.10, if a host is associated with more than 100 running services, the service list for that host is pruned to 100. • Some detected application types were consolidated. If you have existing compliance rules, searches, or other configurations that rely on an obsolete application type, you must manually edit that configuration. • Some detected service names changed to accurately reflect RFCs and other official documentation. Existing compliance rules are unaffected because they rely on internal identification numbers for services, but you may need to update saved searches that use the old service names. • A new Process Status health module replaced the Data Correlator Process, Defense Center Status, eStreamer Status, IPS Process, and RNA Process modules. However, in the background, the Defense Center retains any custom settings that you configured for the legacy modules. If you apply a health policy with Process Status enabled to an appliance running a version earlier than 4.10, the legacy modules with your custom settings are enabled and those modules report health status events for that appliance in place of the Process Status module. • Version 4.10 removed support for Series 1 appliances and 3Dx800 sensors. Similarly, there is no Version 4.10 release for RNA on Red Hat Linux. You can, however, use a Version 4.10 Defense Center to manage Version 4.9x of those appliances. Sourcefire 3D System Release Notes 49 For Assistance • As of Version 4.10, the Sourcefire 3D System no longer contains built-in support for using the Nessus scanner to perform active scans. • Version 4.10 also eliminated the need for the management virtual network, as the Sourcefire 3D System no longer supports Version 4.10 Defense Centers managing sensors running versions earlier than Version 4.9. For Assistance If you are a new customer, thank you for choosing Sourcefire. Please visit https://support.sourcefire.com/ to download the Sourcefire Support Welcome Kit, a document to help you get started with Sourcefire Support and set up your Customer Center account. If you have any questions or require assistance with the Sourcefire Defense Center, 3D Sensor, or any of the software sensors, please contact Sourcefire Support: • Visit the Sourcefire Support Site at https://support.sourcefire.com/. • Email Sourcefire Support at [email protected]. • Call Sourcefire Support at 410.423.1901 or 1.800.917.4134. If you have any questions or require assistance with the Crossbeam Systems X-Series Platform, please visit the Blue Coat Support Site at: https://www.bluecoat.com/support/contactsupport/ Thank you for using Sourcefire products. Legal Notices Cisco, the Cisco logo, Sourcefire, the Sourcefire logo, Snort, the Snort and Pig logo, and certain other trademarks and logos are trademarks or registered trademarks of Cisco and/or its affiliates in the United States and other countries. To view a list of Cisco trademarks, go to this URL: www.cisco.com/go/trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. The legal notices, disclaimers, terms of use, and other information contained herein (the "terms") apply only to the information discussed in this documentation (the "Documentation") and your use of it. These terms do not apply to or govern the use of websites controlled by Cisco or its subsidiaries (collectively, "Cisco") or any Sourcefire-provided or Cisco-provided products. Sourcefire and Cisco products are available for purchase and subject to a separate license agreement and/or terms of use containing very different terms and conditions. The copyright in the Documentation is owned by Cisco and is protected by copyright and other intellectual property laws of the United States and other countries. You may use, print out, save on a retrieval system, and otherwise copy and distribute the Documentation solely for non-commercial use, provided that you (i) do not modify the Documentation in any way and (ii) always include Cisco’s Version 4.10.3.7 Sourcefire 3D System Release Notes 50 For Assistance copyright, trademark, and other proprietary notices, as well as a link to, or print out of, the full contents of this page and its terms. No part of the Documentation may be used in a compilation or otherwise incorporated into another work or with or into any other documentation or user manuals, or be used to create derivative works, without the express prior written permission of Cisco. Cisco reserves the right to change the terms at any time, and your continued use of the Documentation shall be deemed an acceptance of those terms. © 2004 - 2014 Cisco and/or its affiliates. All rights reserved. Disclaimers THE DOCUMENTATION AND ANY INFORMATION AVAILABLE FROM IT MAY INCLUDE INACCURACIES OR TYPOGRAPHICAL ERRORS. CISCO MAY CHANGE THE DOCUMENTATION FROM TIME TO TIME. CISCO MAKES NO REPRESENTATIONS OR WARRANTIES ABOUT THE ACCURACY OR SUITABILITY OF ANY CISCO-CONTROLLED WEBSITE, THE DOCUMENTATION AND/OR ANY PRODUCT INFORMATION. CISCO-CONTROLLED WEBSITES, THE DOCUMENTATION AND ALL PRODUCT INFORMATION ARE PROVIDED "AS IS" AND CISCO DISCLAIMS ANY AND ALL EXPRESS AND IMPLIED WARRANTIES, INCLUDING BUT NOT LIMITED TO WARRANTIES OF TITLE AND THE IMPLIED WARRANTIES OF MERCHANTABILITY AND/OR FITNESS FOR A PARTICULAR PURPOSE. IN NO EVENT SHALL CISCO BE LIABLE TO YOU FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, PUNITIVE, OR CONSEQUENTIAL DAMAGES (INCLUDING BUT NOT LIMITED TO PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES, LOSS OF DATA, LOSS OF PROFITS, AND/OR BUSINESS INTERRUPTIONS), ARISING OUT OF OR IN ANY WAY RELATED TO CISCO-CONTROLLED WEBSITES OR THE DOCUMENTATION, NO MATTER HOW CAUSED AND/OR WHETHER BASED ON CONTRACT, STRICT LIABILITY, NEGLIGENCE OR OTHER TORTUOUS ACTIVITY, OR ANY OTHER THEORY OF LIABILITY, EVEN IF CISCO IS ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. BECAUSE SOME STATES/JURISDICTIONS DO NOT ALLOW THE EXCLUSION OR LIMITATION OF LIABILITY FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES, THE ABOVE LIMITATIONS MAY NOT APPLY TO YOU. Version 4.10.3.7 Sourcefire 3D System Release Notes 51
© Copyright 2024 ExpyDoc