FMC Features in Version 6.7
Feature |
Details |
||
---|---|---|---|
Platform |
|||
FMCv and FTDv for OCI and GCP. |
We introduced FMCv and FTDv for:
|
||
High availability support on FMCv for VMware. |
FMCv for VMware now supports high availability. You use the FMCv web interface to establish HA, just as you would on hardware models. In an FTD deployment, you need two identically licensed FMCv's, as well as one FTD entitlement for each managed device. For example, to manage 10 FTD devices with an FMCv10 HA pair, you need two FMCv10 entitlements and 10 FTD entitlements. If you are managing Classic devices only (7000/8000 series, NGIPSv, ASA FirePOWER), you do not need FMCv entitlements. Note that this feature is not supported on FMCv 2 for VMware—that is, an FMCv licensed to manage only two devices. Supported platforms: FMCv 10, 25, and 300 for VMware |
||
Auto Scale improvements for FTDv for AWS. |
Version 6.7.0 includes the following Auto Scale improvements for FTDv for AWS:
Supported platforms: FTDv for AWS |
||
Auto Scale improvements for FTDv for Azure. |
The FTDv for Azure Auto Scale solution now includes support for scaling metrics based on CPU and memory (RAM), not just CPU. Supported platforms: FTDv for Azure |
||
Firepower Threat Defense: Device Management |
|||
Manage FTD on a data interface. |
You can now configure FMC management of the FTD on a data interface instead of using the dedicated management interface. This feature is useful for remote deployment when you want to manage the FTD at a branch office from an FMC at headquarters and need to manage the FTD on the outside interface. If the FTD receives a public IP address using DHCP, then you can optionally configure Dynamic DNS (DDNS) for the interface using the web type update method. DDNS ensures the FMC can reach the FTD at its Fully-Qualified Domain Name (FQDN) if the FTD's IP address changes.
New/modified pages:
New/modified FTD CLI commands: configure network management-data-interface , configure policy rollback Supported platforms: FTD |
||
Update the FMC IP address on the FTD. |
If you change the FMC IP address, you can now use the FTD CLI to update the device. New/modified FTD CLI commands: configure manager edit Supported platforms: FTD |
||
Synchronization between the FTD operational link state and the physical link state for the Firepower 4100/9300. |
The Firepower 4100/9300 chassis can now synchronize the FTD operational link state with the physical link state for data interfaces. Currently, interfaces will be in an Up state as long as the FXOS admin state is up and the physical link state is up. The FTD application interface admin state is not considered. Without synchronization from FTD, data interfaces can be in an Up state physically before the FTD application has completely come online, for example, or can stay Up for a period of time after you initiate an FTD shutdown. For inline sets, this state mismatch can result in dropped packets because external routers may start sending traffic to the FTD before the FTD can handle it. This feature is disabled by default, and can be enabled per logical device in FXOS.
New/modified Firepower Chassis Manager pages: Logical Devices > Enable Link State New/modified FXOS commands: set link-state-sync enabled , show interface expand detail Supported platforms: Firepower 4100/9300 |
||
Firepower 1100/2100 series SFP interfaces now support disabling auto-negotiation. |
Upgrade impact. You can now configure a Firepower 1100/2100 series SFP interface to disable flow control and link status negotiation. Previously, when you set an SFP interface speed (1000 or 10000 Mbps) on these devices, flow control and link status negotiation was automatically enabled. You could not disable it. Now, you can select No Negotiate to disable flow control and link status negotiation. This also sets the speed to 1000 Mbps, regardless of whether you are configuring a 1 GB SFP or 10 GB SFP+ interface. You cannot disable negotation at 10000 Mbps. New/modified pages: Devices > Device Management > Interfaces > edit interface > Hardware Configuration > Speed Supported platforms: Firepower 1100/2100 series |
||
Firepower Threat Defense: Clustering |
|||
New cluster management functionality on the FMC. |
You can now use the FMC to perform the following cluster management tasks, where previously you had to use the CLI:
New/modified pages:
Supported platforms: Firepower 4100/9300 |
||
Faster cluster deployment. |
Cluster deployment now completes faster. Also, for most deployment failures, it fails more quickly. Supported platforms: Firepower 4100/9300 |
||
Changes to PAT address allocation in clustering. |
Upgrade impact. The way PAT addresses are distributed to the members of a cluster is changed. Previously, addresses were distributed to the members of the cluster, so your PAT pool would need a minimum of one address per cluster member. Now, the control instead divides each PAT pool address into equal-sized port blocks and distributes them across cluster members. Each member has port blocks for the same PAT addresses. Thus, you can reduce the size of the PAT pool, even to as few as one IP address, depending on the amount of connections you typically need to PAT. Port blocks are allocated in 512-port blocks from the 1024-65535 range. You can optionally include the reserved ports, 1-1023, in this block allocation when you configure PAT pool rules. For example, in a 4-node cluster, each node gets 32 blocks with which it will be able to handle 16384 connections per PAT pool IP address compared to a single node handling all 65535 connections per PAT pool IP address. As part of this change, PAT pools for all systems, whether standalone or operating in a cluster, now use a flat port range of 1024–65535. Previously, you could use a flat range by enabling the Flat Port Range option in a PAT pool rule (Pat Pool tab in an FTD NAT rule). The Flat Port Range option is now ignored: the PAT pool is now always flat. You can optionally select the Include Reserved Ports option to include the 1–1023 port range within the PAT pool. Note that if you configure port block allocation (the Block Allocation PAT pool option), your block allocation size is used rather than the default 512-port block. In addition, you cannot configure extended PAT for a PAT pool for systems in a cluster. This change takes effect automatically. You do not need to do anything before or after upgrade. Supported platforms: FTD |
||
Firepower Threat Defense: Encryption and VPN |
|||
AnyConnect module support for RA VPN. |
FTD RA VPN now supports AnyConnect modules. As part of your RA VPN group policy, you can now configure a variety of optional modules to be downloaded and installed when a user downloads the Cisco AnyConnect VPN client. These modules can provide services such as web security, malware protection, off-network roaming protection, and so on. You must associate each module with a profile containing your custom configurations, created in the AnyConnect Profile Editor and uploaded to the FMC as an AnyConnect File object. New/modified pages:
Supported platforms: FTD |
||
AnyConnect management VPN tunnels for RA VPN. |
FTD RA VPN now supports an AnyConnect management VPN tunnel that allows VPN connectivity to endpoints when the corporate endpoints are powered on, not just when a VPN connection is established by the end user. This feature helps administrators perform patch management on out-of-the-office endpoints, especially devices that are infrequently connected by the user, via VPN, to the office network. Endpoint operating system login scripts which require corporate network connectivity also benefit. Supported platforms: FTD |
||
Single sign-on for RA VPN. |
FTD RA VPN now supports single sign-on (SSO) for remote access VPN users configured at a SAML 2.0-compliant identity provider (IdP). New/modified pages:
Supported platforms: FTD |
||
LDAP authorization for RA VPN. |
FTD RA VPN now supports LDAP authorization using LDAP attribute maps. An LDAP attribute map equates attributes that exist in the Active Directory (AD) or LDAP server with Cisco attribute names. Then, when the AD or LDAP server returns authentication to the FTD device during remote access VPN connection establishment, the FTD device can use the information to adjust how the AnyConnect client completes the connection. Supported platforms: FTD |
||
Virtual Tunnel Interface (VTI) and route-based site-to-site VPN. |
FTD site-to-site VPN now supports a logical interface called Virtual Tunnel Interface (VTI). As an alternative to policy-based VPN, a VPN tunnel can be created between peers with Virtual Tunnel Interfaces configured. This supports route-based VPN with IPsec profiles attached to the end of each tunnel. This allows dynamic or static routes to be used. Using VTI does away with the requirement of configuring static crypto map access lists and mapping them to interfaces. Traffic is encrypted using static route or BGP. You can create a routed security zone, add VTI interfaces to it, and define access control rules for the decrypted traffic control over the VTI tunnel. VTI-based VPNs can be created between:
New/modified pages: Supported platforms: FTD |
||
Dynamic RRI support for site-to-site VPN. |
FTD site-to-site VPN now supports Dynamic Reverse Route Injection (RRI) supported with IKEv2-based static crypto maps in site-to-site VPN deployments. This allowed static routes to be automatically inserted into the routing process for networks and hosts protected by a remote tunnel endpoint. New/modified pages: We added the Enable Dynamic Reverse Route Injection advanced option when adding an endpoint to a site-to-site VPN topology. Supported platforms: FTD |
||
Enhancements to manual certificate enrollment. |
You can now obtain signed CA certificates and identity certificates from a CA authority independently of each other. We made the following changes to PKI certificate enrollment objects, which store enrollment parameters for creating Certificate Signing Requests (CSRs) and obtaining identity certificates:
New/modified pages: Objects > Object Management > PKI > Cert Enrollment > Add Cert Enrollment > CA Information > Enrollment Type > Manual Supported platforms: FTD |
||
Enhancements to FTD certificate management. |
We made the following enhancements to FTD certificate management:
New/modified pages:
Supported platforms: FTD |
||
Access Control: URL Filtering, Application Control, and Security Intelligence |
|||
URL filtering and application control on traffic encrypted with TLS 1.3 (TLS Server Identity Discovery). |
You can now perform URL filtering and application control on traffic encrypted with TLS 1.3, by using information from the server certificate. You do not have decrypt the traffic for this feature to work.
New/modified pages: We added a TLS Server Identity Discovery warning and option to the access control policy's Advanced tab. New/modified FTD CLI commands: We added the B flag to the output of the show conn detail command. On a TLS 1.3-encrypted connection, this flag indicates that we used the server certificate for application and URL detection. Supported platforms: FTD |
||
URL filtering on traffic to websites with unknown reputation. |
You can now perform URL filtering for websites that have an unknown reputation. New/modified pages: We added an Apply to unknown reputation check box to the access control, QoS, and SSL rule editors. Supported platforms: FMC |
||
DNS filtering enhances URL filtering. |
Beta. DNS filtering enhances URL filtering by determining the category and reputation of requested domains earlier in the transaction, including in encrypted traffic—but without decrypting the traffic. You enable DNS filtering per access control policy, where it applies to all category/reputation URL rules in that policy.
New/modified pages: We added the Enable reputation enforcement on DNS traffic option to the access control policy's Advanced tab, under General Settings. Supported platforms: FMC |
||
Shorter update frequencies for Security Intelligence feeds. |
The FMC can now update Security Intelligence data every 5 or 15 minutes. Previously, the shortest update frequency was 30 minutes. If you configure one of these shorter frequencies on a custom feed, you must also configure the system to use an md5 checksum to determine whether the feed has updates to download. New/modified pages: We added new options to Objects > Object Management > Security Intelligence > Network Lists and Feeds > edit feed > Update Frequency Supported platforms: FMC |
||
Access Control: User Control |
|||
pxGrid 2.0 with ISE/ISE-PIC. |
Upgrade impact. Use pxGrid 2.0 when you connect the FMC to an ISE/ISE-PIC identity source. If you are still using pxGrid 1.0, switch now. That version is deprecated. For use with pxGrid 2.0, Version 6.7.0 introduces the Cisco ISE Adaptive Network Control (ANC) remediation, which applies or clears ISE-configured ANC policies involved in a correlation policy violation. If you used the Cisco ISE Endpoint Protection Services (EPS) remediation with pxGrid 1.0, configure and use the ANC remediation with pxGrid 2.0. ISE remediations will not launch if you are using the 'wrong' pxGrid. The ISE Connection Status Monitor health module alerts you to mismatches. For detailed compatibility information for all supported Firepower versions, including integrated products, see the Cisco Firepower Compatibility Guide. New/modified pages:
Supported platforms: FMC |
||
Realm sequences. |
You can now group realms into ordered realm sequences. Add a realm sequence to an identity rule in the same way as you add a single realm. When applying the identity rule to network traffic, the system searches the Active Directory domains in the order specified. You cannot create realm sequences for LDAP realms. New/modified pages: System > Integration > Realm Sequences Supported platforms: FMC |
||
ISE subnet filtering. |
Especially useful on lower-memory devices, you can now use the CLI to exclude subnets from receiving user-to-IP and Security Group Tag (SGT)-to-IP mappings from ISE. The Snort Identity Memory Usage health module alerts when memory usage exceeds a certain level, which by default is 80%. New device CLI command: configure identity-subnet-filter { add | remove} Supported platforms: FMC-managed devices |
||
Access Control: Intrusion and Malware Prevention |
|||
Improved preclassification of files for dynamic analysis. |
Upgrade impact. The system can now decide not to submit a suspected malware file for dynamic analysis, based on the static analysis results (for example, a file with no dynamic elements). After you upgrade, in the Captured Files table, these files will have a Dynamic Analysis Status of Rejected for Analysis. Supported platforms: FMC |
||
S7Commplus preprocessor. |
The new S7Commplus preprocessor supports the widely accepted S7 industrial protocol. You can use it to apply corresponding intrusion and preprocessor rules, drop malicious traffic, and generate intrusion events. New/modified pages:
Supported platforms: all FTD devices, including ISA 3000 |
||
Custom intrusion rule import warns when rules collide. |
The FMC now warns you of rule collisions when you import custom (local) intrusion rules. Previously, the FMC would silently skip the rules that cause collisions—with the exception of Version 6.6.0.1, where a rule import with collisions would fail entirely. On the Rule Updates page, if a rule import had collisions, a warning icon is displayed in the Status column. For more information, hover your pointer over the warning icon and read the tooltip. Note that a collision occurs when you try to import an intrusion rule that has the same SID/revision number as an existing rule. You should always make sure that updated versions of custom rules have new revision numbers. We recommend you read the best practices for importing local intrusion rules in the FMC configuration guide. New/modified pages: We added a warning icon to .Supported platforms: FMC |
||
Access Control: TLS/SSL Decryption |
|||
ClientHello modification for Decrypt - Known Key TLS/SSL rules. |
Upgrade impact. If you configure TLS/SSL decryption, when a managed device receives a ClientHello message, the system now attempts to match the message to TLS/SSL rules that have the Decrypt - Known Key action. Previously, the system only matched ClientHello messages to Decrypt - Resign rules. The match relies on data from the ClientHello message and from cached server certificate data. If the message matches, the device modifies the ClientHello message in specific ways; see the ClientHello Message Handling topic in the FMC configuration guide. This behavior change occurs automatically after upgrade. If you use Decrypt - Known Key TLS/SSL rules, make sure that encrypted traffic is being handled as expected.Supported platforms: Any device |
||
Event Logging and Analysis |
|||
Remote data storage and cross-launch with an on-prem Stealthwatch solution. |
You can now store large volumes of Firepower event data off-FMC, using an on-premises Stealthwatch solution: Cisco Security Analytics and Logging (On Premises). When viewing events in FMC, you can quickly cross-launch to view events in your remote data storage location. The FMC uses syslog to send connection, Security Intelligence, intrusion, file, and malware events.
Supported platforms: FMC |
||
Quickly add Stealthwatch contextual cross-launch resources. |
A new page on the FMC allows you to quickly add contextual cross-launch resources for your Stealthwatch appliance. After you add Stealthwatch resources, you manage them on the general contextual cross-launch page. This is where you continue to manually create and manage non-Stealthwatch cross-launch resources. New/modified pages:
Supported platform: FMC |
||
New cross-launch options field types. |
You can now cross-launch into an external resource using the following additional types of event data:
New/modified pages:
Supported platforms: FMC |
||
National Vulnerability Database (NVD) replaces Bugtraq. |
Upgrade impact. Bugtraq vulnerability data is no longer available. Most vulnerability data now comes from the NVD. To support this change, we made the following changes:
If you export vulnerability data, make sure any integrations are working as expected after the upgrade. Supported platforms: FMC |
||
Upgrade |
|||
Pre-upgrade compatibility check. |
Upgrade impact. In FMC deployments, Firepower appliances must now pass pre-upgrade compatibility checks before you can run more complex readiness checks or attempt to upgrade. This check catches issues that will cause your upgrade to fail—but we now catch them earlier and block you from proceeding. The checks are as follows:
When you select an upgrade package to install, the FMC displays compatibility check results for all eligible appliances. The new Readiness Check page also displays this information. You cannot upgrade until you fix the issues indicated. New/modified pages:
Supported platforms: FMC, FTD |
||
Improved readiness checks. |
Upgrade impact. Readiness checks assess a Firepower appliance's preparedness for a software upgrade. These checks include database integrity, file system integrity, configuration integrity, disk space, and so on. After you upgrade the FMC to Version 6.7.0, you will see the following improvements to FTD upgrade readiness checks:
Note that these improvements are supported for FTD upgrades from Version 6.3.0+, as long as the FMC is running Version 6.7.0+. New/modified pages:
Supported platforms: FTD |
||
Improved FTD upgrade status reporting and cancel/retry options. |
Upgrade impact. You can now view the status of device upgrades and readiness checks in progress on the Device Management page, as well as a 7-day history of upgrade success/failures. The Message Center also provides enhanced status and error messages. A new Upgrade Status pop-up, accessible from both Device Management and the Message Center with a single click, shows detailed upgrade information, including percentage/time remaining, specific upgrade stage, success/failure data, upgrade logs, and so on. Also on this pop-up, you can manually cancel failed or in-progress upgrades (Cancel Upgrade), or retry failed upgrades (Retry Upgrade). Canceling an upgrade reverts the device to its pre-upgrade state.
New/modified pages:
New FTD CLI commands:
Supported platforms: FTD |
||
Upgrades postpone scheduled tasks. |
Upgrade impact. FMC upgrades now postpone scheduled tasks. Any task scheduled to begin during the upgrade will begin five minutes after the post-upgrade reboot.
Note that this feature is supported for all upgrades from a supported version. This includes Version 6.4.0.10 and later patches, Version 6.6.3 and later maintenance releases, and Version 6.7.0+. This feature is not supported for upgrades to a supported version from an unsupported version. Supported platforms: FMC |
||
Upgrades remove PCAP files to save disk space. |
Upgrade impact. To upgrade a Firepower appliance, you must have enough free disk space or the upgrade fails. Upgrades now remove locally stored PCAP files. Supported platforms: Any |
||
Deployment and Policy Management |
|||
Configuration rollback. |
Beta. You can now "roll back" configurations on an FTD device, replacing them with the previously deployed configurations.
New/modified pages: Deploy > Deployment History > Rollback column and icons. Supported platforms: FTD |
||
Deploy intrusion and file policies independently of access control policies. |
You can now select and deploy intrusion and file policies independently of access control policies, unless there are dependent changes. New/modified pages: Deploy > Deployment Supported platforms: FMC |
||
Search access control rule comments. |
You can now search within access control rules comments. New/modified pages: In the access control policy editor, we added the Comments field to the Search Rules drop-down dialog. Supported platforms: FMC |
||
Search and filter FTD NAT rules. |
You can now search for rules in an FTD NAT policy to help you find rules based on IP addresses, ports, object names, and so forth. Search results include partial matches. Searching on criteria filters the rule table so only matching rules are displayed. New/modified pages: We added a search field above the rule table when you edit an FTD NAT policy. Supported platforms: FTD |
||
Copy and move rules between access control and prefilter policies. |
You can copy access control rules from one access control policy to another. You can also move rules between an access control policy and its associated prefilter policy. New/modified pages: In the access control and prefilter policy editors, we added Copy and Move options to each rule's right-click menu. Supported platforms: FMC |
||
Bulk object import. |
You can now bulk-import network, port, URL, VLAN tag, and distinguished name objects onto the FMC, using a comma-separated-values (CSV) file. For restrictions and specific formatting instructions, see the Reusable Objects chapter of the FMC configuration guide. New/modified pages: Objects > Object Management > choose an object type > Add [Object Type] > Import Object Supported platforms: FMC |
||
Interface object optimization for access control and prefilter policies. |
You can now enable interface object optimization on specific FTD devices. During deployment, interface groups and security zones used in the access control and prefilter policies generate separate rules for each source/destination interface pair. If you enable interface object optimization, the system will instead deploy a single rule per access control/prefilter rule, which can simplify the device configuration and improve deployment performance. Interface object optimization is disabled by default. If you enable it, you should also enable Object Group Search—which now applies to interface objects in addition to network objects—to reduce memory usage on the device. New/modified pages: > Interface Object Optimization check box sectionSupported platforms: FTD |
||
Administration and Troubleshooting |
|||
FMC single sign-on. |
The FMC now supports single sign-on (SSO) for external users configured at any third-party SAML 2.0-compliant identity provider (IdP). You can map user or group roles from the IdP to FMC user roles. New/modified pages: Supported platforms: FMC |
||
FMC logout delay. |
When you log out of the FMC, there is an automatic five-second delay and countdown. You can click Log Out again to log out immediately. Supported platforms: FMC |
||
Backup and restore for FTD container instances. |
You can now use the FMC to back up and restore Version 6.7.0+ FTD container instances. Supported platforms: Firepower 4100/9300 |
||
Health monitoring enhancements. |
We enhanced health monitoring as follows:
Supported platforms: FMC |
||
Health module updates. |
We replaced the CPU Usage health module with four new modules:
We added the following health modules to track memory use:
We added the following health modules to track statistics:
Supported platforms: FMC |
||
Search Message Center. |
You can now filter the current view in the Message Center. New/modified pages: We added a Filter icon and field to the Message Center, under the Show Notifications slider. Supported platforms: FMC |
||
Usability and Performance |
|||
Dusk theme. |
Beta. The FMC web interface defaults to the Light theme, but you can also choose a new Dusk theme.
New/modified pages: User Preferences, from the drop-down list under your username Supported platforms: FMC |
||
Search FMC menus. |
You can now search the FMC menus. New/modified pages: We added a Search icon and field to the FMC menu bar, to the left of the Deploy menu. Supported platforms: FMC |
||
FMC REST API |
|||
FMC REST API. |
We added the following FMC REST API services/operations to support new and existing features. Authorization services:
Health services:
Deployment services:
Device services:
Integration services:
Policy services:
Update services:
Supported platforms: FMC |
||
Deprecated Features |
|||
End of support: ASA 5525-X, 5545-X, and 5555-X devices with Firepower software. |
You cannot run Version 6.7+ on the ASA 5525-X, 5545-X, and 5555-X. |
||
Deprecated: Cisco Firepower User Agent software and identity source. |
Prevents FMC upgrade. You cannot upgrade an FMC with user agent configurations to Version 6.7+. Version 6.6 is the last release to support the Cisco Firepower User Agent software as an identity source. You should switch to Cisco Identity Services Engine/Passive Identity Connector (ISE/ISE-PIC). To convert your license, contact Sales. For more information, see the End-of-Life and End-of-Support for the Cisco Firepower User Agent announcement and the Firepower User Identity: Migrating from User Agent to Identity Services Engine TechNote. Deprecated FTD CLI commands: configure user agent |
||
Deprecated: Cisco ISE Endpoint Protection Services (EPS) remediation. |
ISE remediations can stop working. The Cisco ISE Endpoint Protection Services (EPS) remediation does not work with pxGrid 2.0. Configure and use the new Cisco ISE Adaptive Network Control (ANC) remediation instead. ISE remediations will not launch if you are using the 'wrong' pxGrid to connect the FMC to an ISE/ISE-PIC identity source. The ISE Connection Status Monitor health module alerts you to mismatches. |
||
Deprecated: Less secure Diffie-Hellman groups, and encryption and hash algorithms. |
Prevents FMC upgrade. You may not be able to upgrade an FMC if you use any of the following FTD features:
If you are still using these features in IKE proposals or IPsec policies, change and verify your VPN configuration before you upgrade. |
||
Deprecated: Appliance Configuration Resource Utilization heath module (temporary). |
Possible post-upgrade errors in the health monitor. Version 6.7 partially and temporarily deprecates support for the Appliance Configuration Resource Utilization health module, which was introduced in Version 6.6.3 and is supported in all later 6.6.x releases. Version 6.7 support is as follows:
Full support returns in Version 7.0, where the module is renamed to Configuration Memory Allocation. |
||
Deprecated: Other health modules (permanent). |
Version 6.7 deprecates the following health modules:
|
||
Deprecated: Walkthroughs with the Classic theme. |
Version 6.7 discontinues FMC walkthroughs (how-tos) for the Classic theme. You can switch themes in your user preferences. |
||
Deprecated: Bugtraq |
Version 6.7 removes database fields and options for Bugtraq. Bugtraq vulnerability data is no longer available. Most vulnerability data now comes from the National Vulnerability Database (NVD). If you export vulnerability data, make sure any integrations are working as expected after the upgrade. |
||
Deprecated: Microsoft Internet Explorer |
We no longer test Firepower web interfaces using Microsoft Internet Explorer. We recommend you switch to Google Chrome, Mozilla Firefox, or Microsoft Edge. |
||
Deprecated: Geolocation details. |
In May 2022 we split the GeoDB into two packages: a country code package that maps IP addresses to countries/continents, and an IP package that contains additional contextual data associated with routable IP addresses. The contextual data in the IP package can include additional location details, as well as connection information such as ISP, connection type, proxy type, domain name, and so on. The new country code package has the same file name as the old all-in-one package: Cisco_GEODB_Update-date-build. This allows deployments running Version 7.1 and earlier to continue to obtain GeoDB updates. If you manually download GeoDB updates—for example, in an air-gapped deployment—make sure you get the country code package and not the IP package.
|