ProxySG-7391 Release Notes
ProxySG-7391 Release Notes
x Release Notes
July 15, 2022
SGOS 7.x Release Notes
Table of Contents
SGOS Release Index and Maintenance Streams..............................................................................5
SGOS 7.3.9.1 GA.................................................................................................................................. 6
Features in SGOS 7.3.9.1................................................................................................................................................ 7
Fixes in SGOS 7.3.9.1.................................................................................................................................................... 10
SGOS 7.3.8.2 PR.................................................................................................................................13
Fixes in SGOS 7.3.8.2.................................................................................................................................................... 15
SGOS 7.3.8.1 GA................................................................................................................................ 16
Features in SGOS 7.3.8.1.............................................................................................................................................. 18
Fixes in SGOS 7.3.8.1.................................................................................................................................................... 21
SGOS 7.3.7.1 GA................................................................................................................................ 25
Features in SGOS 7.3.7.1.............................................................................................................................................. 27
Fixes in SGOS 7.3.7.1.................................................................................................................................................... 28
SGOS 7.3.6.4 PR.................................................................................................................................33
Fixes in SGOS 7.3.6.4.................................................................................................................................................... 34
SGOS 7.3.6.3 PR.................................................................................................................................36
Fixes in SGOS 7.3.6.3.................................................................................................................................................... 37
SGOS 7.3.6.1 GA................................................................................................................................ 39
Features in SGOS 7.3.6.1.............................................................................................................................................. 40
Fixes in SGOS 7.3.6.1.................................................................................................................................................... 42
SGOS 7.3.5.2 PR.................................................................................................................................45
Features in SGOS 7.3.5.2.............................................................................................................................................. 46
Fixes in SGOS 7.3.5.2...................................................................................................................................................46
SGOS 7.3.5.1 GA................................................................................................................................ 48
Features in SGOS 7.3.5.1.............................................................................................................................................. 49
Fixes in SGOS 7.3.5.1...................................................................................................................................................52
SGOS 7.3.4.1 GA................................................................................................................................ 55
Features in SGOS 7.3.4.1.............................................................................................................................................. 56
Fixes in SGOS 7.3.4.1...................................................................................................................................................62
SGOS 7.3.3.3 PR.................................................................................................................................66
Fixes in SGOS 7.3.3.3...................................................................................................................................................67
SGOS 7.3.3.2 PR.................................................................................................................................68
Fixes in SGOS 7.3.3.2.................................................................................................................................................... 69
SGOS 7.3.3.1 GA.................................................................................................................................71
Features in SGOS 7.3.3.1.............................................................................................................................................. 72
2
SGOS 7.x Release Notes
3
SGOS 7.x Release Notes
4
SGOS 7.x Release Notes
5
SGOS 7.x Release Notes
SGOS 7.3.9.1 GA
Release Information
• Release Date: July 13, 2022
• Build Number: 275996
Supported Platforms
• ProxySG hardware appliances: S200, S400, S500
• Standard/Advanced Reverse Proxy hardware appliances: S200, S400, S410, S500
• High-performance Gen2 virtual appliances: SG-VA, ARP-VA, SRP-VA
• Gen3 ProxySG virtual appliances for GCP and ISG Enterprise VA deployments: ISG-Proxy-VA-100, ISG-Proxy-VA-200
• Integrated Secure Gateway hardware appliances: SSP-S210, SSP-S410
See Hardware Appliances and ProxySG Tech Docs for platform documentation.
Compatible With
• BCAAA: 6.1
• Integrated Secure Gateway: 2.1 and later
• HSM Agent: 2.0 and later
• ProxySG Admin Console: 1.1.1 and later
• Reporter: 11.x
• Management Center: 2.2.2.3 and later
NOTE
The new ProxySG Admin Console (SGAC) requires Management Center 2.4.x or later.
• Content Analysis: 2.4.x, 3.0.x, and 3.1.x
• SSL Visibility: 4.2.x, 4.3.x. 4.4.x, 4.5.x, and 5.x
• Web Isolation: 1.10 and later
Third-Party Compatibility
• For supported Java, operating system, and browser versions, refer to KB Article 169081.
• For information on Java 11 support, refer to KB Article 173228.
6
SGOS 7.x Release Notes
<ssl>
client.connection.negotiated_cipher=(EXP-RC4-MD5,EXP-RC2-CBC-MD5,EXP-DES-CBC-SHA) force_deny
<ssl>
server.connection.negotiated_cipher=(EXP-RC4-MD5,EXP-RC2-CBC-MD5,EXP-DES-CBC-SHA) force_deny
• Upon upgrading to 7.3.x, malware scanning is replaced with Symantec Access Security Policy and Content Security
Policy. For information, see Using Policy Services in the ProxySG administration documentation.
• When upgrading to version 7.3.2 and later, the HTTPS console's cipher suites configuration is preserved. In addition,
the following TLS 1.3 high-strength cipher suites are enabled by default:
– tls_aes_256_gcm_sha384
– tls_chacha20_poly1305_sha256
– tls_aes_128_gcm_sha256
– tls_aes_128_ccm_8-sha256
– tls_aes_128_ccm_sha256
• The following are the supported upgrade/downgrade paths for this release:
– Upgrade to 7.3.x from an earlier version 7.x or from version 6.7.4.4 or later.
– Downgrade from 7.3.x to to an earlier version 7.x or to version 6.7.4.4 or later.
NOTE
If upgrading from version 6.7.4.2 or earlier, an interim upgrade to version 6.7.4.3 might be required. To
determine whether you can upgrade directly to version 6.7.4.4, refer to KB Article 18536.
See SGOS Upgrade/Downgrade documentation for the supported upgrade/downgrade paths for this release.
NOTE
In a future release of 7.x, support for WebFilter (BCWF) will be removed.
Limitations
• See Limitations in SGOS 7.x for a description of limitations in this release.
Known Issues
• See Known Issues in SGOS 7.x for a list of all issues that Symantec is aware of in SGOS 7.x.
7
SGOS 7.x Release Notes
More information:
• ZTP Deployment Guide
New Integrated Secure Gateway ProxySG Virtual Appliance Package for Microsoft Hyper-V
A new ProxySG virtual appliance package for the Integrated Secure Gateway (ISG) license is available to download from
the Broadcom Support Portal and to deploy on Microsoft Hyper-V.
More information:
• ISG ProxySG VA on Hyper-V Deployment Guide
New Integrated Secure Gateway ProxySG Virtual Appliance Package for KVM
A new ProxySG virtual appliance package for the Integrated Secure Gateway (ISG) license is available to download from
the Broadcom Support Portal and to deploy on Linux Kernel-based Virtual Machine (KVM).
More information:
• ISG ProxySG VA on KVM Deployment Guide
NOTE
To configure bridging on the ISG, refer to ISG documentation:
8
SGOS 7.x Release Notes
https://techdocs.broadcom.com/us/en/symantec-security-software/web-and-network-security/integrated-secure-
gateway/2-4.html
Web Visual Policy Manager Warns of Duplicate User Objects in Migrated Policy
The legacy VPM allows case-sensitive User object names, such as Bkent, bkent, and bKent. The Web VPM does not
allow case-sensitive User object names; for example, if a User object named BKent already exists, you cannot create a
User object named bKent. As a result, when you use the Web VPM to edit policy that was created in the legacy VPM, the
Web VPM considers any existing User objects whose names differ only in letter case to be duplicates.
Starting in this release, the Web VPM displays a warning when you click Edit to change an existing User object to another
object that has a duplicate.
To support this feature, the Web VPM allows you to filter the objects in the following areas:
• The All Objects dialog (Operations > View All Objects).
• The Set <object_type> Object dialog.
To filter objects, select Filter By and select one of the following options:
• None: (Default) No filter; the dialog displays all applicable objects.
• Duplicates: The dialog displays duplicate objects.
• Unused: The dialog displays objects that are configured but not included in any policy rules or objects.
NOTE
In a future release, the Web VPM will facilitate resolving duplicate objects without affecting policy operation.
To receive updates about this feature, subscribe to KB244059 and refer to the SGOS Release Notes for future
releases.
More information:
• Web VPM warns "User already exists" but I can't edit the user (KB244059)
• Web Visual Policy Manager documentation
Supported modifiers are exact , prefix , regex , substring , and suffix . Refer to the CPL documentation for more
information on the modifiers and how to use them in policy.
You can still test whether the current transaction is for any health check, or for a specific health check, using
health_check={yes|no} .
9
SGOS 7.x Release Notes
More information:
• Content Policy Language Reference
For example, the command # (config service-info) periodic sr-number sr_number is now changed to #
(config service-info) periodic case-number case_number .
More information:
• ProxySG Administration
• ProxySG Admin Console
• Command Line Interface Reference
ID Issue
SG-29738 Fixes an issue where Kafka access logging had high memory usage.
Table 2: Authentication
ID Issue
SG-26327 Fixes an issue where authenticating from a SAML realm without client redirects to a SAML realm with client
redirects failed with a configuration error.
SG-31652 Fixes an issue where an error incorrectly indicated that SAML assertions were not encrypted. This issue
occurred only when Require encryption was enabled in SAML realm configuration.
SG-31984 Fixes an issue where SAML stopped working with Chromium-based browsers (Chrome, Edge, Chromium, etc.)
due to blank (space) characters between the cookie parameters.
SG-31405 Fixes an issue where changing a member realm within a sequence realm after installing authentication policy
resulted in an authentication error.
SG-31006 Fixes an issue where a page fault occurred in PG_POLICY_HTTP and the event log contained LDAP
authentication errors.
SG-31809 Fixes an issue where a page fault occurred in PG_CFG_PROPRIETOR in process: "IWA Onbox Domain Trust
Refresher".
SG-32045 Fixes realm configuration issues that occurred after deleting policy that referenced a sequence realm with a
Windows SSO member realm.
10
SGOS 7.x Release Notes
ID Issue
SG-30851 Fixes an issue where, when the appliance replied to DNS queries with the correct IP address and TTL=0.
ID Issue
SG-31525 Fixes an issue where the appliance stopped responding when the appliance processed an ICAP RESPMOD with
a header value greater than 8kB.
ID Issue
SG-31698 Fixes an issue where the appliance experienced a restart in process "stack-bnd-2:0-rxq-0" in "libstack.exe.so".
ID Issue
SG-30905 Fixes an issue where policy could not be installed using the legacy VPM when policy included Notify User
objects.
ID Issue
SG-30723 Fixes an issue where ROP_GET_PER_USER_LONG_TERM_IDS request parsing failed due to the GUID value
being read incorrectly.
ID Issue
SG-31076 Fixes an issue where reverse proxy traffic had latency of 5-15 seconds. This issue occurred with session-
cache-clientmap enabled and HTTP configuration set to http no persistent server . The issue
was caused by unnecessary checks during cache insertion and removal that degraded performance under heavy
load.
Table 9: SNMP
ID Issue
SG-30952 Fixes an issue where event logs showed SNMP errors "Getting ipV4 vlan information for <interface> failed".
11
SGOS 7.x Release Notes
ID Issue
SG-31624 Fixes an issue where the appliance experienced a page fault in PG-SSH and process "admin@ssh".
ID Issue
SG-31420 Fixes an issue where enabling IP forwarding (IPv4/IPv6) disabled the stack's LRO (Large Receive Offload) for all
flows (whether they were forwarded or not), preventing some performance gains provided by LRO.
SG-20236 Fixes an issue where the appliance experienced a restart due to a socket allocation failure.
SG-31640 Fixes an issue where the appliance experienced a restart because a cached packet was for a terminated
connection (in TIME_WAIT), causing the appliance to lose track of the listening socket to which a SYN needed to
be sent.
SG-31670 Fixes an issue where the appliance experienced a restart and prompted you to select an image to load after the
reboot.
SG-31513 Fixes an issue where the appliance experienced a page fault due to a corrupted heap.
SG-31175 Fixes an issue where the appliance experienced a page fault in PG_TCPIP in process: "stack-ip-forward".
SG-31804 Fixes an issue where the passthru interface was configured for spanning tree participation (STP) even though
the interface was disabled.
SG-29829 Fixes an issue where the appliance experienced a page fault in PG_TCPIP in process: "cookie-monster" in
"libstack.exe.so".
12
SGOS 7.x Release Notes
SGOS 7.3.8.2 PR
Release Information
• Release Date: June 7, 2022
• Build Number: 274167
IMPORTANT
This patch release (PR) includes a critical fix and replaces SGOS 7.3.8.1 released on May 11, 2022. If you are
running version 7.3.8.1, upgrade to version 7.3.8.2 to apply the fix. See Fixes in SGOS 7.3.8.2 for information.
Supported Platforms
• ProxySG hardware appliances: S200, S400, S500
• Standard/Advanced Reverse Proxy hardware appliances: S200, S400, S410, S500
• High-performance Gen2 virtual appliances: SG-VA, ARP-VA, SRP-VA
• Gen3 ProxySG virtual appliances for GCP and ISG Enterprise VA deployments: ISG-Proxy-VA-100, ISG-Proxy-VA-200
• Integrated Secure Gateway hardware appliances: SSP-S210, SSP-S410
See Hardware Appliances and ProxySG Tech Docs for platform documentation.
Compatible With
• BCAAA: 6.1
• Integrated Secure Gateway: 2.1 and later
• HSM Agent: 2.0 and later
• ProxySG Admin Console: 1.1.1 and later
• Reporter: 11.x
• Management Center: 2.2.2.3 and later
NOTE
The new ProxySG Admin Console (SGAC) requires Management Center 2.4.x or later.
• Content Analysis: 2.4.x, 3.0.x, and 3.1.x
• SSL Visibility: 4.2.x, 4.3.x. 4.4.x, 4.5.x, and 5.x
• Web Isolation: 1.10 and later
Third-Party Compatibility
• For supported Java, operating system, and browser versions, refer to KB Article 169081.
• For information on Java 11 support, refer to KB Article 173228.
13
SGOS 7.x Release Notes
disable FIPS mode, and attempt the upgrade again. If you upgrade to 7.3.x without disabling FIPS mode, your
appliance will not function as expected.
• If you are downgrading from ProxySG 7.3.x to a version earlier than 7.2.0.1, ensure that after you downgrade your
policy includes CPL that protects against low strength ciphers (RC4, CBC, DES, and 3DES). These ciphers were
deprecated in 7.2.0.1 and any policy that references them is no longer necessary. For appliances running versions
earlier than 7.2.0.1, use the following CPL:
<ssl>
client.connection.negotiated_cipher=(EXP-RC4-MD5,EXP-RC2-CBC-MD5,EXP-DES-CBC-SHA) force_deny
<ssl>
server.connection.negotiated_cipher=(EXP-RC4-MD5,EXP-RC2-CBC-MD5,EXP-DES-CBC-SHA) force_deny
• Upon upgrading to 7.3.x, malware scanning is replaced with Symantec Access Security Policy and Content Security
Policy. For information, see Using Policy Services in the ProxySG administration documentation.
• When upgrading to version 7.3.2 and later, the HTTPS console's cipher suites configuration is preserved. In addition,
the following TLS 1.3 high-strength cipher suites are enabled by default:
– tls_aes_256_gcm_sha384
– tls_chacha20_poly1305_sha256
– tls_aes_128_gcm_sha256
– tls_aes_128_ccm_8-sha256
– tls_aes_128_ccm_sha256
• The following are the supported upgrade/downgrade paths for this release:
– Upgrade to 7.3.x from an earlier version 7.x or from version 6.7.4.4 or later.
– Downgrade from 7.3.x to to an earlier version 7.x or to version 6.7.4.4 or later.
NOTE
If upgrading from version 6.7.4.2 or earlier, an interim upgrade to version 6.7.4.3 might be required. To
determine whether you can upgrade directly to version 6.7.4.4, refer to KB Article 18536.
See SGOS Upgrade/Downgrade documentation for the supported upgrade/downgrade paths for this release.
NOTE
In a future release of 7.x, support for WebFilter (BCWF) will be removed.
Limitations
• See Limitations in SGOS 7.x for a description of limitations in this release.
Known Issues
• See Known Issues in SGOS 7.x for a list of all issues that Symantec is aware of in SGOS 7.x.
14
SGOS 7.x Release Notes
ID Issue
SG-31689 Fixes an issue where kernel lock changes caused the appliance stop responding.
15
SGOS 7.x Release Notes
SGOS 7.3.8.1 GA
Release Information
• Release Date: May 11, 2022
• Build Number: 273000
IMPORTANT
This release is no longer available for download. To apply the changes and fixes from this release, upgrade to
SGOS 7.3.8.2, which includes a critical fix. See Fixes in SGOS 7.3.8.2 for information.
Supported Platforms
• ProxySG hardware appliances: S200, S400, S500
• Standard/Advanced Reverse Proxy hardware appliances: S200, S400, S410, S500
• High-performance Gen2 virtual appliances: SG-VA, ARP-VA, SRP-VA
• Gen3 ProxySG virtual appliances for GCP and ISG Enterprise VA deployments: ISG-Proxy-VA-100, ISG-Proxy-VA-200
• Integrated Secure Gateway hardware appliances: SSP-S210, SSP-S410
See Hardware Appliances and ProxySG Tech Docs for platform documentation.
Compatible With
• BCAAA: 6.1
• Integrated Secure Gateway: 2.1 and later
• HSM Agent: 2.0 and later
• ProxySG Admin Console: 1.1.1 and later
• Reporter: 10.1.x, and 10.2.x
• Management Center: 2.2.2.3 and later
NOTE
The new ProxySG Admin Console (SGAC) requires Management Center 2.4.x or later.
• Content Analysis: 2.4.x, 3.0.x, and 3.1.x
• SSL Visibility: 4.2.x, 4.3.x. 4.4.x, 4.5.x, and 5.x
• Web Isolation: 1.10 and later
Third-Party Compatibility
• For supported Java, operating system, and browser versions, refer to KB Article 169081.
• For information on Java 11 support, refer to KB Article 173228.
16
SGOS 7.x Release Notes
disable FIPS mode, and attempt the upgrade again. If you upgrade to 7.3.x without disabling FIPS mode, your
appliance will not function as expected.
• If you are downgrading from ProxySG 7.3.x to a version earlier than 7.2.0.1, ensure that after you downgrade your
policy includes CPL that protects against low strength ciphers (RC4, CBC, DES, and 3DES). These ciphers were
deprecated in 7.2.0.1 and any policy that references them is no longer necessary. For appliances running versions
earlier than 7.2.0.1, use the following CPL:
<ssl>
client.connection.negotiated_cipher=(EXP-RC4-MD5,EXP-RC2-CBC-MD5,EXP-DES-CBC-SHA) force_deny
<ssl>
server.connection.negotiated_cipher=(EXP-RC4-MD5,EXP-RC2-CBC-MD5,EXP-DES-CBC-SHA) force_deny
• Upon upgrading to 7.3.x, malware scanning is replaced with Symantec Access Security Policy and Content Security
Policy. For information, see Using Policy Services in the ProxySG administration documentation.
• When upgrading to version 7.3.2 and later, the HTTPS console's cipher suites configuration is preserved. In addition,
the following TLS 1.3 high-strength cipher suites are enabled by default:
– tls_aes_256_gcm_sha384
– tls_chacha20_poly1305_sha256
– tls_aes_128_gcm_sha256
– tls_aes_128_ccm_8-sha256
– tls_aes_128_ccm_sha256
• The following are the supported upgrade/downgrade paths for this release:
– Upgrade to 7.3.x from an earlier version 7.x or from version 6.7.4.4 or later.
– Downgrade from 7.3.x to to an earlier version 7.x or to version 6.7.4.4 or later.
NOTE
If upgrading from version 6.7.4.2 or earlier, an interim upgrade to version 6.7.4.3 might be required. To
determine whether you can upgrade directly to version 6.7.4.4, refer to KB Article 18536.
See SGOS Upgrade/Downgrade documentation for the supported upgrade/downgrade paths for this release.
NOTE
In a future release of 7.x, support for WebFilter (BCWF) will be removed.
Limitations
• See Limitations in SGOS 7.x for a description of limitations in this release.
Known Issues
• See Known Issues in SGOS 7.x for a list of all issues that Symantec is aware of in SGOS 7.x.
17
SGOS 7.x Release Notes
Set the minimum version and maximum version of the SSL/TLS protocol to use for server connections:
# (config ssl) proxy server-ssl-version-range <minimum_version> <maximum_version>
To control the SSL/TLS versions used for specific transactions instead of using the global command, add the
following Action VPM objects to policy:
• Set Client Min Max SSL Version
• Set Server Min Max SSL Version
Alternatively, use the CPL properties associated with these VPM objects:
• client.connection.min_ssl_version()
• client.connection.max_ssl_version()
• server.connection.min_ssl_version()
• server.connection.max_ssl_version()
Prior to this release, the SSL/TLS version used for intercepted SSL connections was the highest version supported by the
appliance, the client, and the server. This behavior is the same as using the preserve option, which is the default setting.
More information:
• ProxySG Admin Console
• Command Line Interface Reference
• Web Visual Policy Manager Reference
• Content Policy Language Reference
• Security Best Practices
18
SGOS 7.x Release Notes
You can also set a "critical" flag for these attributes to indicate that OpenSSL must enforce using the attribute for your
security needs. Refer to the Command Line Interface for more information.
More information:
• Command Line Interface Reference
• ProxySG Admin Console
19
SGOS 7.x Release Notes
20
SGOS 7.x Release Notes
More information:
• Content Policy Language Reference
ID Issue
SG-23434 Fixes an issue where the appliance stopped responding when running an access logging script from
Management Center.
SG-30186 Fixes an issue where the s-action access log field returned "-" instead of information from the transaction.
SG-30522 Fixes an issue where the appliance stopped responding in process "cfg.proprietor" in "libtransactions.exe.so"
at .text+0x3135c0.
SG-29190 Fixes an issue where the appliance stopped responding when access logs included *-supplier-country
fields or policy included references to supplier country.
21
SGOS 7.x Release Notes
ID Issue
SG-31084 Fixes an issue where terminating active sessions (using #active-sessions proxied-sessions
terminate ) caused the appliance to stop responding.
ID Issue
SG-29479 Fixes an issue where CPU utilization was 100% under heavy LDAP load.
SG-31219 Fixes an issue where changing policy that included a sequence realm caused the appliance to stop responding.
SG-30269 Fixes an issue where the "Access Denied" exception page did not display information about the transaction
when users clicked the more link.
SG-31171 Fixes an issue where policy failed to install after a sequence realm had an authorization error.
SG-30293 Fixes an issue where changing the SAML IDP caused an "invalid certificate" error and required an appliance
reboot to refresh the certificate cache.
SG-30783 Fixes an issue where the appliance rebooted when attempting to apply policy changes. This issue occurred after
an IWA realm was removed.
SG-30844 Fixes an issue where attempting to upgrade version 7.2.5.1 to 7.3.7.1 failed. When this issue occured, but the
appliance rebooted with version 7.2.5.1 running.
SG-31292 Fixes an issue where the appliance stopped responding after deleting realms after attempting to install policy
with bad syntax.
ID Issue
SG-30692 Fixes an issue where the show config CLI output did not indicate whether automatic refresh bandwidth for
caching was enabled (for example, using #(config caching)refresh bandwidth automatic ).
SG-30948 Fixes an issue where the appliance stopped responding in process group PG_ACCESS_LOG, process:
"sshc.worker" in "" at .text+0x0.
SG-30917 Fixes an issue where #show output displayed some archive-config settings incorrectly, without quotation
marks.
ID Issue
SG-30953 Fixes an issue where an appliance with a ZTP payload could not be registered to a device group in Management
Center.
SG-23203 Fixes an issue where the appliance stopped responding due to a hardware exception in
process "STORVSC" in "storvsc.exe".
ID Issue
SG-31007 Fixes an issue where the appliance stopped responding with a hardware exception
in process group "PG_DNS"Process: "DNS Proxy Administrator" in "libdnsproxy.exe.so".
22
SGOS 7.x Release Notes
ID Issue
SG-30813 Fixes an issue where PCAPs with filters captured traffic only in one direction. This issue occurred on ProxySG
applications on the SSP platform.
ID Issue
SG-26322 Fixes an issue where the appliance stopped responding with a software exception in process group "PG_HTTP"
process: "HTTP SW 20B1CD01A40 for 30C2D661A40" in "".
SG-29480 Fixes an issue where the appliance did not send an "HTTP/1.1" ALPN extension in the server hello message
back to the client when the server used HTTP/2.
SG-29969 Fixes an issue where the appliance stopped responding when trying to allocate memory when mapping HTTP/2
to HTTP/1 headers.
ID Issue
SG-29643 Fixes an issue where a SWG VA that could not communicate with the license validation server had a grace
period of 3.5 days instead of 7 days.
ID Issue
ID Issue
SG-30307 Fixes an issue where some users intermittently could not send messages with attachments from Outlook 2021.
SG-30245 Fixes an issue where messages from which the proxy blocked and removed attachments were not sent.
SG-30807, Fixes an issue where dragging and dropping a file from email to a delegate calendar sometimes resulted in file
SG-31250 corruption.
ID Issue
SG-31038 Fixes an issue where the Management Console could not be accessed after Chrome was updated to version 10.
23
SGOS 7.x Release Notes
ID Issue
SG-30288 Fixes an issue where the appliance performed DNS queries even when policy included a restrict dns rule.
SG-30564 Fixes an issue where logs did not indicate that a local database containing an error was downloaded. When
this issue occurred, the download status did not reflect the latest download status immediately, and the Local
Database communication status metric was Critical.
SG-30206 Fixes an issue where the appliance experienced a hardware exception in
process group "PG_POLICY"Process: "SSLW 10D7510DC00" in "libc.so".
SG-30360 Fixes an issue where a variable's default value was not used when the variable was used in a substitution.
ID Issue
ID Issue
SG-30706 Fixes an issue where high memory caused TCP connections to drop.
SG-29909 Fixes an issue where SSL connections requiring server certificate emulation timed out when the server certificate
cache was full.
SG-26714 Fixes an issue where client.certificate.requested= lookups failed.
ID Issue
SG-30509 Fixes an issue where upgrading the appliance from version 7.2.x to a later 7.2.x or 7.3.x failed while
performing #restart upgrade.
SG-30896 Fixes an issue where the appliance stopped responding when adding default gateways.
SG-29589 Fixes an issue where the appliance stopped responding in process: "cookie-monster" in "libstack.exe.so" at .text
+0x42d3e1.
ID Issue
SG-30750 Fixes an issue where a line break in the Comment cell creates an unknown tag that fails to install.
This release also includes VPM fixes. See Web Visual Policy Manager Fixes in SGOS 7.x.
24
SGOS 7.x Release Notes
SGOS 7.3.7.1 GA
Release Information
• Release Date: February 24, 2022
• Build Number: 271019
Supported Platforms
• ProxySG hardware appliances: S200, S400, S500
• Standard/Advanced Reverse Proxy hardware appliances: S200, S400, S410, S500
• High-performance Gen2 virtual appliances: SG-VA, ARP-VA, SRP-VA
• Gen3 Proxy SG virtual appliances for GCP and ISG Enterprise VA deployments: ISG-Proxy-VA-100, ISG-Proxy-
VA-200
• Integrated Secure Gateway hardware appliances: SSP-S210, SSP-S410
See Hardware Appliances and ProxySG Tech Docs for platform documentation.
Compatible With
• BCAAA: 6.1
• Integrated Secure Gateway: 2.1 and later
• HSM Agent: 2.0 and later
• ProxySG Admin Console: 1.1.1 and later
• Reporter: 10.1.x, and 10.2.x
• Management Center: 2.2.2.3 and later
NOTE
The new ProxySG Admin Console (SGAC) requires Management Center 2.4.x or later.
• Content Analysis: 2.4.x, 3.0.x, and 3.1.x
• SSL Visibility: 4.2.x, 4.3.x. 4.4.x, 4.5.x, and 5.x
• Web Isolation: 1.10 and later
Third-Party Compatibility
• For supported Java, operating system, and browser versions, refer to KB Article 169081.
• For information on Java 11 support, refer to KB Article 173228.
25
SGOS 7.x Release Notes
disable FIPS mode, and attempt the upgrade again. If you upgrade to 7.3.x without disabling FIPS mode, your
appliance will not function as expected.
• If you are downgrading from ProxySG 7.3.x to a version earlier than 7.2.0.1, ensure that after you downgrade your
policy includes CPL that protects against low strength ciphers (RC4, CBC, DES, and 3DES). These ciphers were
deprecated in 7.2.0.1 and any policy that references them is no longer necessary. For appliances running versions
earlier than 7.2.0.1, use the following CPL:
<ssl>
client.connection.negotiated_cipher=(EXP-RC4-MD5,EXP-RC2-CBC-MD5,EXP-DES-CBC-SHA) force_deny
<ssl>
server.connection.negotiated_cipher=(EXP-RC4-MD5,EXP-RC2-CBC-MD5,EXP-DES-CBC-SHA) force_deny
• When upgrading to 7.3.x, your malware scanning configuration is not preserved. After upgrading, reconfigure
your malware scanning. For information, see the SGOS Administration Guide and ProxySG Web Visual Policy
Manager Reference .
• When upgrading to version 7.3.2 and later, the HTTPS console's cipher suites configuration is preserved. In addition,
the following TLS 1.3 high-strength cipher suites are enabled by default:
– tls_aes_256_gcm_sha384
– tls_chacha20_poly1305_sha256
– tls_aes_128_gcm_sha256
– tls_aes_128_ccm_8-sha256
– tls_aes_128_ccm_sha256
• The following are the supported upgrade/downgrade paths for this release:
– Upgrade to 7.3.x from an earlier version 7.x or from version 6.7.4.4 or later.
– Downgrade from 7.3.x to to an earlier version 7.x or to version 6.7.4.4 or later.
NOTE
If upgrading from version 6.7.4.2 or earlier, an interim upgrade to version 6.7.4.3 might be required. To
determine whether you can upgrade directly to version 6.7.4.4, refer to KB Article 18536.
See SGOS Upgrade/Downgrade documentation for the supported upgrade/downgrade paths for this release.
NOTE
In a future release of 7.x, support for WebFilter (BCWF) will be removed.
Limitations
• See Limitations in SGOS 7.x for a description of limitations in this release.
Known Issues
• See Known Issues in SGOS 7.x for a list of all issues that Symantec is aware of in SGOS 7.x.
26
SGOS 7.x Release Notes
27
SGOS 7.x Release Notes
ID Issue
SG-28439 Fixes an issue where the appliance experienced a restart following disk re-initialization due to an error in the
access log copying process.
SG-29685 Fixes an issue where access logging used significantly more memory than required.
ID Issue
SG-26170 Fixes an issue where RADIUS authentication stopped working after upgrading to version 7.3.2.1.
SG-29329 Fixes an issue where SNMP walk failed because the appliance attempted to retrieve authentication statistics
from a server that was unavailable, instead of retrieving them from a cache.
SG-25285 Fixes an issue where SAML authentication stopped working with Chromium-based browsers (such as Chrome,
Edge, and Chromium) in versions after SGOS 6.7.5.6 due to blank characters (spaces) between the cookie
parameters.
ID Issue
SG-29744 Fixes an issue where the appliance experienced a page fault due to insufficient Syslog worker stack size.
ID Issue
SG-29957 Fixes an issue where server.certificate.hostname= matched only the first entry under a certificate's
subjectAlternativeName . Now, all available server certificate hostnames are checked and matched.
28
SGOS 7.x Release Notes
ID Issue
SG-28533 Fixes an issue where the appliance experienced restarts when EDNS was enabled and DNS lookup was
performed for an IP address.
SG-28266 Fixes an issue where the appliance did not honor the configured DNS server preference after a primary or
alternate server went offline and then came back online.
SG-32131 Fixes an issue where performing# test dns resulted in an "Unknown error response(203)" when EDNS was
enabled.
ID Issue
SG-28504 Fixes an issue in reverse proxy during the processing of HTTP requests to prevent HTTP request smuggling /
HTTP desync attacks.
SG-29322 Fixes an issue where Firefox showed an alert on the Host Affinity cookie because the appliance did not set up all
of the required cookie attributes.
SG-28248 Fixes an issue where the appliance experienced a restart when policy included a log_message() action
referring to an HTTP header substitution string.
SG-29187 Fixes an issue where the appliance experienced a restart when multiple H2 workers tried to use the same socket
during an HTTP/2 upgrade.
SG-30148 Fixes an issue where the downstream SNI header was not applied on an upstream connection when the HTTP
Connect message contained a dotted IP address. This issue occurred when a transparent downstream Squid
proxy connected upstream to an explicit ProxySG appliance.
ID Issue
SG-29402 Fixes an issue where the appliance experienced a restart due to an insufficient front panel worker stack size.
ID Issu
SG-30196 Fixes an issue where Outlook 2012 file attachments were not sent to Content Analysis.
SG-28606 Fixes an issue where the MAPI debug log displayed the error:
Rop response parser failed to parse RopId = ROP_QUERY_ROWS with value
ERROR_CODE_PARSE_ERROR.
This issue occurred in Outlook 2016 with caching disabled.
ID Issue
SG-27100 Fixes an issue where Excel files on Dropbox could not be previewed when policy included the Notify User
action.
SG-30085 Fixes an issue where the link to Symantec Site Review on exception pages was broken in some cases.
29
SGOS 7.x Release Notes
ID Issue
SG-29657 Fixes an issue where installing policy that contained a large number of categories resulted in multiple "Unknown
category" warnings.
SG-28593 Fixes an issue where long lines in exceptions files were parsed incorrectly, preventing some elements from
displaying in exception pages.
SG-28416 Fixes an issue where installing policy fails with a warning "Unreachable rule, conditions will be matched by a
preceding rule" when policy contains different IP addresses in a category definition.
ID Issue
SG-28694 Fixes an issue where the load trust-package command output showed an incorrect creation time,
suggesting that the trust package was not the latest version.
SG-29650 Fixes an issue where the show configuration command output did not display the trust-package
auto-update or auto-update-interval configuration settings.
ID Issue
SG-29688 Fixes an issue where PDM statistics were inaccurate because the PG process memory usage reported on linear
memory instead of physical memory.
ID Issue
ID Issue
SG-29358 Fixes an issue where the appliance experienced a restart when attempting to complete an SSL handshake via a
closed socket.
SG-28624 Fixes an issue where the browser returned an exception because the latest Chrome and Firefox extensions were
not included in the known extensions list.
SG-28622 Fixes an issue where server certificates were not validated as specified in policy when the appliance
encountered unrecognized extensions.
ID Issue
SG-29406 Fixes an issue where disk space issues caused the appliance to stop responding. This issue occurred when
ICAP scanned large objects.
30
SGOS 7.x Release Notes
ID Issue
SG-28822 Fixes an issue where the connection pair of a transparent IPv6 session via SSLV reused the same TCP source
port if the Reflect Client IP option was enabled, resulting in session timeouts.
SG-29607 Fixes an issue where download failures occurred due to an insufficient number of TCP re-assembly objects for
the number of connections.
SG-28561 Fixes an issue where the user could not filter active sessions with IPv6 address.
SG-28638 Fixes an issue where the appliance experienced a restart due to asynchronous requests in progress during a
SOCKS timeout.
SG-28909 Fixes a rare race condition when a TCP connection was cleaning up that could lead to a restart.
SG-28841 Fixes an issue where the appliance experienced a restart due to invalid memory pointers.
SG-28822 Fixes an issue where the connection pair of a transparent IPv6 session via SSLV reused the same TCP source
port if reflect-client-ip was enabled.
SG-28994 Fixes an issue where port reuse caused latency and dropped internet connections. This issue occurred in a
transparent proxy environment with reflect-client-ip enabled.
SG-29217 Fixes an issue where the appliance experienced a restart because the limit on the number of canceled timers
was reached.
SG-29824 Fixes an issue where running the pcap start coreimage bytes command caused the appliance to
stop responding.
SG-29051 Fixes an issue where the appliance experienced high memory consumption in TCP/IP, causing internet sessions
to stop until until the appliance restarted. This issue occurred with bandwidth management enabled.
SG-28444 Fixes a timer issue that caused the appliance to experience high CPU usage and a restart.
SG-30132 Fixes an issue where some TCP connections were incorrectly kept open instead of closing or being reused.
SG-29737 Fixes a potential race condition where TCP persistence timer reuse led to a restart.
ID Issue
SG-29178 Fixes an issue where every URL lookup returned an 'unavailable; unlicensed' status after clearing category
mappings and synonyms and reloading the Blue Coat content filtering database.
SG-28860 Fixes an issue where the Threat Risk Levels database was stuck in a 'loading' status even after an appliance
restart.
SG-28565 Fixes an issue where the appliance sent too many SNMP messages for content filtering database changes.
ID Issue
SG-28924 Fixes an issue where the third-party libxml component required updating to resolve critical vulnerabilities
(CVE-2018-9251, CVE-2018-14567, CVE-2018-14404, CVE-2021-3541). This open-source component is used
to parse untrusted XML content in WAF and for XML/SAML authentication realms.
SG-28926 Fixes an issue where the third-party ICU (International Components for Unicode) library required updating to
resolve critical vulnerabilities. This open-source component consists of C/C++ and Java libraries for Unicode
support, software internationalization, and software globalization.
31
SGOS 7.x Release Notes
ID Issue
SG-28299 Fixes an issue where the third-party libxml component required updating to resolve critical vulnerabilities
(CVE-2018-9251, CVE-2018-14567, CVE-2018-14404, CVE-2021-3541). This open-source component is used
to parse untrusted XML content in WAF and for XML/SAML authentication realms.
32
SGOS 7.x Release Notes
SGOS 7.3.6.4 PR
Release Information
• Release Date: December 15, 2021
• Build Number: 269365
Supported Platforms
• ProxySG hardware appliances: S200, S400, S410, S500
• Standard/Advanced Reverse Proxy hardware appliances: S200, S400, S410, S500
• High-performance Gen2 virtual appliances: SG-VA, ARP-VA, SRP-VA
• 3 Gen Proxy SG virtual appliances for GCP and ISG Enterprise VA deployments: ISG-Proxy-VA-100, ISG-Proxy-
VA-200
See Hardware Appliances and ProxySG Tech Docs for platform documentation.
Compatible With
• BCAAA: 6.1
• Integrated Secure Gateway: 2.1 and later
• HSM Agent: 2.0 and later
• ProxySG Admin Console: 1.1.1 and later
• Reporter: 10.1.x, and 10.2.x
• Management Center: 2.2.2.3 and later
NOTE
The new ProxySG Admin Console (SGAC) requires Management Center 2.4.x or later.
• Content Analysis: 2.4.x, 3.0.x, and 3.1.x
• SSL Visibility: 4.2.x, 4.3.x. 4.4.x, 4.5.x, and 5.x
• Web Isolation: 1.10 and later
Third-Party Compatibility
• For supported Java, operating system, and browser versions, refer to KB Article 169081.
• For information on Java 11 support, refer to KB Article 173228.
33
SGOS 7.x Release Notes
deprecated in 7.2.0.1 and any policy that references them is no longer necessary. For appliances running versions
earlier than 7.2.0.1, use the following CPL:
<ssl>
client.connection.negotiated_cipher=(EXP-RC4-MD5,EXP-RC2-CBC-MD5,EXP-DES-CBC-SHA) force_deny
<ssl>
server.connection.negotiated_cipher=(EXP-RC4-MD5,EXP-RC2-CBC-MD5,EXP-DES-CBC-SHA) force_deny
• When upgrading to 7.3.x, your malware scanning configuration is not preserved. After upgrading, reconfigure
your malware scanning. For information, see the SGOS Administration Guide and ProxySG Web Visual Policy
Manager Reference .
• When upgrading to version 7.3.2 and later, the HTTPS console's cipher suites configuration is preserved. In addition,
the following TLS 1.3 high-strength cipher suites are enabled by default:
– tls_aes_256_gcm_sha384
– tls_chacha20_poly1305_sha256
– tls_aes_128_gcm_sha256
– tls_aes_128_ccm_8-sha256
– tls_aes_128_ccm_sha256
• The following are the supported upgrade/downgrade paths for this release:
– Upgrade to 7.3.x from an earlier version 7.x or from version 6.7.4.4 or later.
– Downgrade from 7.3.x to to an earlier version 7.x or to version 6.7.4.4 or later.
NOTE
If upgrading from version 6.7.4.2 or earlier, an interim upgrade to version 6.7.4.3 might be required. To
determine whether you can upgrade directly to version 6.7.4.4, refer to KB Article 18536.
See SGOS Upgrade/Downgrade documentation for the supported upgrade/downgrade paths for this release.
NOTE
In a future release of 7.x, support for WebFilter (BCWF) will be removed.
Limitations
• See Limitations in SGOS 7.x for a description of limitations in this release.
Known Issues
• See Known Issues in SGOS 7.x for a list of all issues that Symantec is aware of in SGOS 7.x.
34
SGOS 7.x Release Notes
ID Issue
SG-29088 Fixes an issue where ProxySG 7.3.6.1 and higher configurations transparently intercepting traffic with
reflect-client-IP enabled stopped initiating or responding to new connections. These configurations
consequently required a scheduled SG reboot before the maximum number of available connections was
reached.
35
SGOS 7.x Release Notes
SGOS 7.3.6.3 PR
Release Information
• Release Date: December 13, 2021
• Build Number: 268974
Supported Platforms
• ProxySG hardware appliances: S200, S400, S410, S500
• Standard/Advanced Reverse Proxy hardware appliances: S200, S400, S410, S500
• High-performance Gen2 virtual appliances: SG-VA, ARP-VA, SRP-VA
• 3 Gen Proxy SG virtual appliances for GCP and ISG Enterprise VA deployments: ISG-Proxy-VA-100, ISG-Proxy-
VA-200
See Hardware Appliances and ProxySG Tech Docs for platform documentation.
Compatible With
• BCAAA: 6.1
• Integrated Secure Gateway: 2.1 and later
• HSM Agent: 2.0 and later
• ProxySG Admin Console: 1.1.1 and later
• Reporter: 10.1.x, and 10.2.x
• Management Center: 2.2.2.3 and later
NOTE
The new ProxySG Admin Console (SGAC) requires Management Center 2.4.x or later.
• Content Analysis: 2.4.x, 3.0.x, and 3.1.x
• SSL Visibility: 4.2.x, 4.3.x. 4.4.x, 4.5.x, and 5.x
• Web Isolation: 1.10 and later
Third-Party Compatibility
• For supported Java, operating system, and browser versions, refer to KB Article 169081.
• For information on Java 11 support, refer to KB Article 173228.
36
SGOS 7.x Release Notes
deprecated in 7.2.0.1 and any policy that references them is no longer necessary. For appliances running versions
earlier than 7.2.0.1, use the following CPL:
<ssl>
client.connection.negotiated_cipher=(EXP-RC4-MD5,EXP-RC2-CBC-MD5,EXP-DES-CBC-SHA) force_deny
<ssl>
server.connection.negotiated_cipher=(EXP-RC4-MD5,EXP-RC2-CBC-MD5,EXP-DES-CBC-SHA) force_deny
• When upgrading to 7.3.x, your malware scanning configuration is not preserved. After upgrading, reconfigure
your malware scanning. For information, see the SGOS Administration Guide and ProxySG Web Visual Policy
Manager Reference .
• When upgrading to version 7.3.2 and later, the HTTPS console's cipher suites configuration is preserved. In addition,
the following TLS 1.3 high-strength cipher suites are enabled by default:
– tls_aes_256_gcm_sha384
– tls_chacha20_poly1305_sha256
– tls_aes_128_gcm_sha256
– tls_aes_128_ccm_8-sha256
– tls_aes_128_ccm_sha256
• The following are the supported upgrade/downgrade paths for this release:
– Upgrade to 7.3.x from an earlier version 7.x or from version 6.7.4.4 or later.
– Downgrade from 7.3.x to to an earlier version 7.x or to version 6.7.4.4 or later.
NOTE
If upgrading from version 6.7.4.2 or earlier, an interim upgrade to version 6.7.4.3 might be required. To
determine whether you can upgrade directly to version 6.7.4.4, refer to KB Article 18536.
See SGOS Upgrade/Downgrade documentation for the supported upgrade/downgrade paths for this release.
NOTE
In a future release of 7.x, support for WebFilter (BCWF) will be removed.
Limitations
• See Limitations in SGOS 7.x for a description of limitations in this release.
Known Issues
• See Known Issues in SGOS 7.x for a list of all issues that Symantec is aware of in SGOS 7.x.
37
SGOS 7.x Release Notes
ID Issue
SG-29292 Fixes an issue where SSL performance dropped. This issue occurred when SSL interception policy was
installed.
38
SGOS 7.x Release Notes
SGOS 7.3.6.1 GA
Release Information
• Release Date: October 7, 2021
• Build Number: 266990
Supported Platforms
• ProxySG hardware appliances: S200, S400, S410, S500
• Standard/Advanced Reverse Proxy hardware appliances: S200, S400, S410, S500
• High-performance Gen2 virtual appliances: SG-VA, ARP-VA, SRP-VA
• 3 Gen Proxy SG virtual appliances for GCP and ISG Enterprise VA deployments: ISG-Proxy-VA-100, ISG-Proxy-
VA-200
See Hardware Appliances and ProxySG Tech Docs for platform documentation.
Compatible With
• BCAAA: 6.1
• Integrated Secure Gateway: 2.1 and later
• HSM Agent: 2.0 and later
• ProxySG Admin Console: 1.1.1 and later
• Reporter: 9.5.x, 10.1.x, and 10.2.x
• Management Center: 2.2.2.3 and later
NOTE
The new ProxySG Admin Console (SGAC) requires Management Center 2.4.x or later.
• Content Analysis: 2.4.x, 3.0.x, and 3.1.x
• SSL Visibility: 4.2.x, 4.3.x. 4.4.x, 4.5.x, and 5.x
• Web Isolation: 1.10 and later
Third-Party Compatibility
• For supported Java, operating system, and browser versions, refer to KB Article 169081.
• For information on Java 11 support, refer to KB Article 173228.
39
SGOS 7.x Release Notes
deprecated in 7.2.0.1 and any policy that references them is no longer necessary. For appliances running versions
earlier than 7.2.0.1, use the following CPL:
<ssl>
client.connection.negotiated_cipher=(EXP-RC4-MD5,EXP-RC2-CBC-MD5,EXP-DES-CBC-SHA) force_deny
<ssl>
server.connection.negotiated_cipher=(EXP-RC4-MD5,EXP-RC2-CBC-MD5,EXP-DES-CBC-SHA) force_deny
• When upgrading to 7.3.x, your malware scanning configuration is not preserved. After upgrading, reconfigure
your malware scanning. For information, see the SGOS Administration Guide and ProxySG Web Visual Policy
Manager Reference .
• When upgrading to version 7.3.2 and later, the HTTPS console's cipher suites configuration is preserved. In addition,
the following TLS 1.3 high-strength cipher suites are enabled by default:
– tls_aes_256_gcm_sha384
– tls_chacha20_poly1305_sha256
– tls_aes_128_gcm_sha256
– tls_aes_128_ccm_8-sha256
– tls_aes_128_ccm_sha256
• The following are the supported upgrade/downgrade paths for this release:
– Upgrade to 7.3.x from an earlier version 7.x or from version 6.7.4.4 or later.
– Downgrade from 7.3.x to to an earlier version 7.x or to version 6.7.4.4 or later.
NOTE
If upgrading from version 6.7.4.2 or earlier, an interim upgrade to version 6.7.4.3 might be required. To
determine whether you can upgrade directly to version 6.7.4.4, refer to KB Article 18536.
See SGOS Upgrade/Downgrade documentation for the supported upgrade/downgrade paths for this release.
NOTE
In a future release of 7.x, support for WebFilter (BCWF) will be removed.
Limitations
• See Limitations in SGOS 7.x for a description of limitations in this release.
Known Issues
• See Known Issues in SGOS 7.x for a list of all issues that Symantec is aware of in SGOS 7.x.
40
SGOS 7.x Release Notes
• Manage HTTP, HTTPS, SSH, SNMP, and Telnet services for administrative access to the ProxySG appliance.
• Configure SOCKS gateways and gateway groups for forwarding.
• Manage the appliance's SSL client profile.
• Offload processing of SSL/TLS traffic to a configured SSLV device.
• Add existing Online Certificate Status Protocol (OCSP) OCSP responders to perform real-time certificate revocation
checks and send responses to the appliance.
In addition, forwarding host lists have been renamed to forwarding groups.
More information:
• SGOS Administration (Admin Console Edition)
41
SGOS 7.x Release Notes
ID Issue
SG-28486 Fixes an issue where the upgrade process had an uncaught exception because an invalid hostname was saved
in the registry.
ID Issue
SG-25971 Fixes an issue where the whoami response header (X-WSS-CLIENT-INFO-2-RESPONSE) was not being
returned from the proxy unless SAML authentication was used. This caused WSSA to use a cached username
when switching to/from SAML authentication.
SG-28600 Fixes an issue where the appliance restarted when an object representing authentication state was sometimes
NULL and was handled incorrectly.
ID Issue
SG-17287 Fixes an issue where the ProxySG appliance was restarting because DNS/Stack allocations that were close to a
multiple of the page size were causing a page fault.
ID Issue
SG-28355 Fixes an issue where new ProxySG appliances that were not yet licensed could not be added to Management
Center using ZTP.
ID Issue
SG-28013 Fixes an issue where the appliance stopped responding with a hardware exception in process group: "PG_
POLICY" and process "HTTP CW 10F37D70A40" in "libcfssl.exe.so" at .text+0x2af117.
SG-28181 Fixes an issue where proxy exception pages were not loading when SSLv offload and HTTP/2 were enabled.
42
SGOS 7.x Release Notes
ID Issue
SG-28553 Fixes an issue where setting http2.client.max_concurrent_streams(1) did not allow any streams
through because the concurrent stream count was incremented too early.
SG-28708 Fixes an issue where ip_country_uid_map was not initialized properly if parallel connections are enabled.
SG-28290 Fixes an issue where the appliance experienced high memory usage due to some HTTP/2 processes.
ID Issue
SG-28065 Fixes an issue where the central policy file download interval constantly increased.
ID Issue
SG-28324 Fixes an issue where the certificate in a keying could not be changed through the Management Console if the
keyring was referenced elsewhere. Now, the Import button in a keyring is always available.
ID Issue
SG-25958 Fixes an issue where sending Outlook mail did not work unless MAPI handoff was disabled on the appliance (or
HTTPS interception of office 365 servers were not enabled). This issue occurred after an upgrade to Outlook
2016.
ID Issue
SG-28376 Fixes an issue where larger base64-encoded images using <style> tags did not display in exception pages.
SG-28353 Fixes an issue where, after authenticating and getting the group policy site location, refreshing the browser
caused the location ID to change to the default of 0 .
ID Issue
SG-28264 Fixes an issue where the SNMP OID tcpCurrEstab reported a larger number than the number in /TCP/
Connections .
ID Issue
SG-27138 Fixes an issue where specifying the CCL using the client.certificate.validate.ccl() property
did not work in reverse proxy mode.
43
SGOS 7.x Release Notes
ID Issue
SG-28279 Fixes an issue where an ADN deployment had a potential memory leak in SSL and Cryptography.
ID Issue
SG-26282 Fixes an issue where high memory usage in TCP/IP led to general connectivity issues and event log errors. This
issue occurred with IPv6 traffic and when bandwidth management was enabled.
SG-28111 Fixes an issue where additional interfaces defined in the ARM template for ProxySG on Azure were not
displayed when issuing the >show interface all command output on the VM.
SG-28434 Fixes an issue where there was a memory leak when Jumbo frames were enabled, which were not accounted
for when cleaning up reference count objects.
SG-28528, Fixes an issue where the appliance experienced frequent unforced restarts in the PG_TCPIP process.
SG-28723
44
SGOS 7.x Release Notes
SGOS 7.3.5.2 PR
Release Information
• Release Date: September 7, 2021
• Build Number: 265904
Supported Platforms
• ProxySG hardware appliances: S200, S400, S410, S500
• Standard/Advanced Reverse Proxy hardware appliances: S200, S400, S410, S500
• High-performance Gen2 virtual appliances: SG-VA, ARP-VA, SRP-VA
See Hardware Appliances and ProxySG Tech Docs for platform documentation.
Compatible With
• BCAAA: 6.1
• Integrated Secure Gateway: 2.1 and later
• HSM Agent: 2.0 and later
• ProxySG Admin Console: 1.1.1 and later
• Reporter: 9.5.x, 10.1.x, and 10.2.x
• Management Center: 2.2.2.3 and later
NOTE
The new ProxySG Admin Console (SGAC) requires Management Center 2.4.x or later.
• Content Analysis: 2.4.x, 3.0.x, and 3.1.x
• SSL Visibility: 4.2.x, 4.3.x. 4.4.x, 4.5.x, and 5.x
• Web Isolation: 1.10 and later
Third-Party Compatibility
• For supported Java, operating system, and browser versions, refer to KB Article 169081.
• For information on Java 11 support, refer to KB Article 173228.
45
SGOS 7.x Release Notes
server.connection.negotiated_cipher=(EXP-RC4-MD5,EXP-RC2-CBC-MD5,EXP-DES-CBC-SHA) force_deny
• When upgrading to 7.3.x, your malware scanning configuration is not preserved. After upgrading, reconfigure
your malware scanning. For information, see the SGOS Administration Guide and ProxySG Web Visual Policy
Manager Reference .
• When upgrading to version 7.3.2 and later, the HTTPS console's cipher suites configuration is preserved. In addition,
the following TLS 1.3 high-strength cipher suites are enabled by default:
– tls_aes_256_gcm_sha384
– tls_chacha20_poly1305_sha256
– tls_aes_128_gcm_sha256
– tls_aes_128_ccm_8-sha256
– tls_aes_128_ccm_sha256
• The following are the supported upgrade/downgrade paths for this release:
– Upgrade to 7.3.x from an earlier version 7.x or from version 6.7.4.4 or later.
– Downgrade from 7.3.x to to an earlier version 7.x or to version 6.7.4.4 or later.
NOTE
If upgrading from version 6.7.4.2 or earlier, an interim upgrade to version 6.7.4.3 might be required. To
determine whether you can upgrade directly to version 6.7.4.4, refer to KB Article 18536.
See SGOS Upgrade/Downgrade documentation for the supported upgrade/downgrade paths for this release.
NOTE
In a future release of 7.x, support for WebFilter (BCWF) will be removed.
Limitations
• See Limitations in SGOS 7.x for a description of limitations in this release.
Known Issues
• See Known Issues in SGOS 7.x for a list of all issues that Symantec is aware of in SGOS 7.x.
46
SGOS 7.x Release Notes
For Web Visual Policy Manager fixes, see Web Visual Policy Manager Fixes in SGOS 7.x.
ID Issue
SG-28388 Fixes an issue where the appliance experienced a restart when upgrading server connections to HTTP/2.
47
SGOS 7.x Release Notes
SGOS 7.3.5.1 GA
Release Information
• Release Date: August 25, 2021
• Build Number: 265431
Supported Platforms
• ProxySG hardware appliances: S200, S400, S410, S500
• Standard/Advanced Reverse Proxy hardware appliances: S200, S400, S410, S500
• High-performance Gen2 virtual appliances: SG-VA, ARP-VA, SRP-VA
See Hardware Appliances and ProxySG Tech Docs for platform documentation.
Compatible With
• BCAAA: 6.1
• Integrated Secure Gateway: 2.1 and later
• HSM Agent: 2.0 and later
• ProxySG Admin Console: 1.1.1 and later
• Reporter: 9.5.x, 10.1.x, and 10.2.x
• Management Center: 2.2.2.3 and later
NOTE
The new ProxySG Admin Console (SGAC) requires Management Center 2.4.x or later.
• Content Analysis: 2.4.x, 3.0.x, and 3.1.x
• SSL Visibility: 4.2.x, 4.3.x. 4.4.x, 4.5.x, and 5.x
• Web Isolation: 1.10 and later
Third-Party Compatibility
• For supported Java, operating system, and browser versions, refer to KB Article 169081.
• For information on Java 11 support, refer to KB Article 173228.
48
SGOS 7.x Release Notes
server.connection.negotiated_cipher=(EXP-RC4-MD5,EXP-RC2-CBC-MD5,EXP-DES-CBC-SHA) force_deny
• When upgrading to 7.3.x, your malware scanning configuration is not preserved. After upgrading, reconfigure your
malware scanning. For information, see the SGOS Administration Guide and ProxySG Web Visual Policy Manager
Reference .
• When upgrading to version 7.3.2 and later, the HTTPS console's cipher suites configuration is preserved. In addition,
the following TLS 1.3 high-strength cipher suites are enabled by default:
– tls_aes_256_gcm_sha384
– tls_chacha20_poly1305_sha256
– tls_aes_128_gcm_sha256
– tls_aes_128_ccm_8-sha256
– tls_aes_128_ccm_sha256
• The following are the supported upgrade/downgrade paths for this release:
– Upgrade to 7.3.x from an earlier version 7.x or from version 6.7.4.4 or later.
– Downgrade from 7.3.x to to an earlier version 7.x or to version 6.7.4.4 or later.
NOTE
If upgrading from version 6.7.4.2 or earlier, an interim upgrade to version 6.7.4.3 might be required. To
determine whether you can upgrade directly to version 6.7.4.4, refer to KB Article 18536.
See SGOS Upgrade/Downgrade documentation for the supported upgrade/downgrade paths for this release.
NOTE
In a future release of 7.x, support for WebFilter (BCWF) will be removed.
Limitations
• See Limitations in SGOS 7.x for a description of limitations in this release.
Known Issues
• See Known Issues in SGOS 7.x for a list of all issues that Symantec is aware of in SGOS 7.x.
ISG-Proxy-VA-100 ISG-Proxy-VA-200
Virtual CPUs Virtual Memory (GB) Connection Count
Storage (GB) Storage (GB)
6 24 2x100 1x200 37,500
6 40 4x100 2x200 62,500
49
SGOS 7.x Release Notes
ISG-Proxy-VA-100 ISG-Proxy-VA-200
Virtual CPUs Virtual Memory (GB) Connection Count
Storage (GB) Storage (GB)
6 48 4x100 2x200 75,000
10 40 4x100 2x200 62,500
10 80 4x100 2x200 125,000
10 96 4x100 2x200 150,000
12 48 4x100 2x200 75,000
12 96 4x100 2x200 150,000
12 128 4x100 2x200 200,000
14 64 4x100 2x200 100,000
14 112 4x100 2x200 175,000
14 144 8x100 4x200 225,000
20 96 4x100 2x200 150,000
20 144 N/A 4x200 225,000
20 192 N/A 6x200 300,000
24 112 4x100 2x200 175,000
28 128 8x100 4x200 200,000
28 192 N/A 6x200 300,000
28 288 N/A 8x200 450,000
32 80 8x100 2x200 125,000
32 160 N/A 4x200 250,000
32 256 N/A 8x200 400,000
32 320 N/A 8x200 500,000
More information:
• SGOS on GCP Configuration Guide
• ISG Enterprise VA Guide
50
SGOS 7.x Release Notes
51
SGOS 7.x Release Notes
HTTP/2 Hardening
Improvements to HTTP/2 connections have been made to increase security and efficiency of HTTP/2 connections by
reducing additional upstream connections.
ID Issue
SG-27258 Fixes an issue with the help text for the # (config local-user-list local_user_list
user_name) password-grace ? command. Now the help text prompts for the number of days to be
supplied.
SG-27378 Fixes an issue where users could not join or rejoin a domain if the username contained a dollar sign ($)
character.
SG-27405 Fixes an issue where details for group-async were not available for the #show configuration and
#(config windows-domains)view commands.
SG-27851 Fixes an issue where users that belonged to a user group of a parent domain were not able to authenticate.
ID Issue
SG-27367 Fixes an issue where the appliance experienced a restart when the DNS proxy incorrectly copied from or to a
null pointer.
ID Issue
SG-25111 Fixes an issue where supplier.country policy did not match for tunneled HTTPS connections when
protocol detection was disabled.
SG-26987 Fixes an issue where content-length headers had incorrect values when server-side HTTP requests were
translated to HTTP/2.
SG-27922 Fixes an issue where connections would break for some WebFTP clients.
ID Issue
SG-27919 Fixes an issue where appliances that could not download the application database on the first attempt would
wait until the next scheduled download time, which might not have been for several hours. Now the appliance re-
attempts the download more frequently until a connection is established and then returns to the usual frequency
for downloading.
52
SGOS 7.x Release Notes
ID Issue
SG-27772 Fixes an issue where after 49 days, appliances running any version including and between SGOS 7.3.1.1 to
7.3.4.1 experienced high CPU utilization, and traffic being refused and hung up.
ID Issue
SG-26626 Fixes an issue where the appliance experienced a restart when the hostname was assigned "null" during
address resolution.
SG-27924 Fixes an issue where HTTP connections that were terminated by a timed termination caused a delay in
exception pages from displaying. Now the fields for the timed termination are copied to the SSL proxy to prevent
delays.
SG-28067 Fixes an issue where the appliance experienced a restart when the EDNS handler did not recognize the end of
the source buffer.
ID Issue
SG-27616 Fixes an issue where policy that contained server.connection.client_issuer_keyring() did not
work as expected in a reverse proxy deployment.
SG-28105 Fixes an issue where the appliance experienced a restart during an SSL session.
ID Issue
SG-23268 Fixes an issue where a memory leak occurred when SSLV offloading was enabled.
SG-26999 Fixes an issue where the appliance experienced high memory usage during SSL handshakes.
ID Issue
SG-25055 Fixes an issue where the appliance experienced a restart due to outstanding TCP timers.
SG-26136 Fixes an issue where the interfaces showed the speed and duplex as unknown in the SysInfo for virtual
appliances.
NOTE: After talking with Khaled and Peter, they've asked to hold off on reporting this one until they can
communicate what we found and fixed to the customer who reported it as it may have been an attack or
pentesters who are aware of this vulnerability now and are wanting to know how we react.
SG-27025 Fixes an issue where ARP strict matching was not functioning as expected.
SG-27375 Fixes an issue where the appliance experienced a restart when the database was updated.
SG-27677 Fixes an issue where the appliance returned the error "DNS Resolver Response: Unknown error response(202)"
for a DNS-forwarding group that was associated with the default routing domain.
SG-27681 Fixes an issue where entries in the ARP table were incorrectly shown as expired when accessed via CLI or
Management console.
53
SGOS 7.x Release Notes
ID Issue
SG-27756 Fixes an issue where the statistics counter for ARP strict matching continued to increase when Management
Console URLs were accessed in a bridge configuration.
SG-27807 Fixes an issue where DNS flags were not set correctly for AAAA requests, causing the appliance to not retry with
A requests after receiving invalid AAAA responses.
SG-27947 Fixes an issue where appliances configured in a bridge could not be pinged after a restart.
SG-28005 Fixes an issue where default gateways or static routes in routing domains were pointing to the incorrect
interface.
SG-28102 Fixes an issue where the appliance experienced a crash when a high number of HTTP connections were
established.
54
SGOS 7.x Release Notes
SGOS 7.3.4.1 GA
Release Information
• Release Date: July 14, 2021
• Build Number: 264353
Supported Platforms
• ProxySG hardware appliances: S200, S400, S410, S500
• Standard/Advanced Reverse Proxy hardware appliances: S200, S400, S410, S500
• High-performance Gen2 virtual appliances: SG-VA, ARP-VA, SRP-VA
See Hardware Appliances and ProxySG Tech Docs for platform documentation.
Compatible With
• BCAAA: 6.1
• Integrated Secure Gateway: 2.1 and later
• HSM Agent: 2.0 and later
• ProxySG Admin Console: 1.1.1 and later
• Reporter: 9.5.x, 10.1.x, and 10.2.x
• Management Center: 2.2.2.3 and later
NOTE
The new ProxySG Admin Console (SGAC) requires Management Center 2.4.x or later.
• Content Analysis: 2.4.x, 3.0.x, and 3.1.x
• SSL Visibility: 4.2.x, 4.3.x. 4.4.x, 4.5.x, and 5.x
• Web Isolation: 1.10 and later
Third-Party Compatibility
• For supported Java, operating system, and browser versions, refer to KB Article 169081.
• For information on Java 11 support, refer to KB Article 173228.
55
SGOS 7.x Release Notes
server.connection.negotiated_cipher=(EXP-RC4-MD5,EXP-RC2-CBC-MD5,EXP-DES-CBC-SHA) force_deny
• When upgrading to 7.3.x, your malware scanning configuration is not preserved. After upgrading, reconfigure your
malware scanning. For information, see the SGOS Administration Guide and ProxySG Web Visual Policy Manager
Reference .
• When upgrading to version 7.3.2 and later, the HTTPS console's cipher suites configuration is preserved. In addition,
the following TLS 1.3 high-strength cipher suites are enabled by default:
– tls_aes_256_gcm_sha384
– tls_chacha20_poly1305_sha256
– tls_aes_128_gcm_sha256
– tls_aes_128_ccm_8-sha256
– tls_aes_128_ccm_sha256
• The following are the supported upgrade/downgrade paths for this release:
– Upgrade to 7.3.x from an earlier version 7.x or from version 6.7.4.4 or later.
– Downgrade from 7.3.x to to an earlier version 7.x or to version 6.7.4.4 or later.
NOTE
If upgrading from version 6.7.4.2 or earlier, an interim upgrade to version 6.7.4.3 might be required. To
determine whether you can upgrade directly to version 6.7.4.4, refer to KB Article 18536.
See SGOS Upgrade/Downgrade documentation for the supported upgrade/downgrade paths for this release.
NOTE
In a future release of 7.x, support for WebFilter (BCWF) will be removed.
Limitations
• See Limitations in SGOS 7.x for a description of limitations in this release.
Known Issues
• See Known Issues in SGOS 7.x for a list of all issues that Symantec is aware of in SGOS 7.x.
56
SGOS 7.x Release Notes
• You can configure a UDP Tunnel proxy service. See the "UDP Proxy Enhancements" section below.
• A new MS Teams proxy service is available in Proxy Services (Configuration > Services). See the "UDP Proxy
Enhancements" section below.
• As of version 7.3.2, proxy service listeners now support two more default actions:
– drop: Silently drops matching incoming packets.
– reject: Responds to the sender indicating that the packet was rejected.
• You can now send the following header information in ICAP requests. Configure an ICAP service (Administration >
ICAP > ICAP Services):
– X-SYMC-Groups
– X-SYMC-User-Email-Address
• Global policy tracing is now available under Administration > Service Information > Policy Tracing.
• You can enable policy coverage (Configuration > Policy > Policy Options).
• You can enable or disable parallel DNS lookups using RFC8305 (Happy Eyeballs algorithm). See the "Support for
Parallel Connections" section below.
• A Troubleshooting report, which summarizes the current statuses of packet capture and policy tracing, has been added
to the Dashboards view.
• You can configure virtual IP addresses and failover groups (Configuration > Network > Advanced).
• The Administration > Upgrade page has been renamed to Administration > Systems > Software System Images.
57
SGOS 7.x Release Notes
server_url=udp-tunnel://<ip_address>
More Information:
• Content Policy Language Reference
58
SGOS 7.x Release Notes
<proxy> client.protocol=socks
socks.authenticate(testrealm) socks.authenticate.mode(proxy-ip)
More information:
• Content Policy Language Reference
• KB Article 166657
Additional headers are sent in ICAP requests with the existing commands:
• #(config icap service_name)send authenticated-groups includes the X-SYMC-Groups header.
• #(config icap service_name)send authenticated-users includes the X-SYMC-Users and X-SYMC-
User-Email-Address headers.
ICAP server and ICAP service information in access logs
The following access log fields have been added to help identify ICAP servers and services:
• cs-icap-host
• cs-icap-ip
• cs-icap-service
• rs-icap-host
• rs-icap-ip
• rs-icap-service
More Information:
• Command Line Interface Reference
• ProxySG Log Fields and Substitutions
This release introduces new policy conditions that you can use in CPL to trigger ICAP notifications based on content in
ICAP-scanned requests and responses.
Use the conditions to specify the service that identified the threat in the scanned request or response:
• request.icap.threat_source=
• request.icap.threat_source.exists=
• response.icap.threat_source=
• response.icap.threat_source.exists=
Use the conditions to specify an identifier of the threat detected in the scanned request or response:
59
SGOS 7.x Release Notes
• request.icap.threat_id=
• request.icap.threat_id.exists=
• response.icap.threat_id=
• response.icap.threat_id.exists=
Use the conditions to specify details detected in the scanned request or response:
• request.icap.threat_details=
• request.icap.threat_details.exists=
• response.icap.threat_details=
• response.icap.threat_details.exists=
Use the conditions to specify whether or not a threat was detected in the scanned request or response:
• request.icap.threat_detected=
• response.icap.threat_detected=
Use these conditions instead of virus_detected= , which is now deprecated.
Deprecations
Refer to the Upgrade/Downgrade Guide for a list of all policy, log fields, and substitutions that are deprecated with the
introduction of this new policy.
HTTP Enhancements
This release includes the following HTTP enhancements:
Cached HTTP/1.1 Session Timeout for HTTP/2 Client Sessions
For an HTTP/2 client session, the cached server-side HTTP/1.1 connections expire and are removed from cache if
they exceed the threshold specified in the existing # (config) http persistent-timeout client seconds
setting. Connections that are closed on the server side are removed from cache regardless of the timeout setting..
New HTTP/2 Connection and Stream Counts in the Heartbeat Report
New counters have been added to the heartbeat report for HTTP/2 connections and streams.
You can specify receive-only to respond to inbound ECN notifications, or send-receive to request outbound and
receive inbound ECN notifications. By default, ECN is disabled.
More Information:
• Command Line Interface Reference
60
SGOS 7.x Release Notes
CAUTION
Before disabling the Web Isolation service, you must first uninstall any existing Web Isolation policy. Disabling
the service before removing the policy will return exception pages for traffic matching the isolation policy rules.
To re-enable the service, use the CLI:
#(config isolation)enable
Make sure that the Web Isolation service is enabled before configuring Web Isolation policy; otherwise, policy compilation
warnings occur, such as "Warning: 'isolate' Isolation service is disabled; it must be enabled in order to use the isolate
action using the CLI isolation->enable command".
The output of the #show isolation and #(config)isolation view commands display the status of the service.
More Information:
• KB 201609
Specify how long an account can be inactive before it is locked out. Accepted values are between 0 and 365. The default
is 0, which disables the setting (there is no inactivity period).
You can use the existing # (config local-user-list local_user_list user_name) enable command to
reset the inactivity-lockout period for an expired password.
# (config local-user-list local_user_list) max-password-age number_of_days
Specify the maximum age of a password. Accepted values are between 0 and 365. The default is 0, which disables the
setting (there is no maximum age).
# (config local-user-list local_user_list user_name) password-grace number_of_days
Provide the user with a grace period in which they can change their expired password. Accepted values are from 1 to 5.
More Information:
• Command Line Interface Reference
61
SGOS 7.x Release Notes
ID Issue
SG-26885 Fixes an issue where Kafka uploads failed if a cluster had a large amount of nodes.
ID Issue
SGAC-2841 Fixes an issue where selections for sending service information (Administration > Service Information > Send
Information) were not displayed.
SGAC-2764 Fixes an issue where the Instant Save function did not work when entering Kerberos credentials in an IWA realm
configuration.
SGAC-2763 Fixes an issue where updated values in the Timeout request after field were not saved in an IWA realm
configuration.
SGAC-2702 Fixes an issue where disabling the Prefix IDP cookies setting in a SAML realm did not take effect after saving
the configuration.
SGAC-2702 Fixes an issue where showing Advanced Settings in an IWA realm displayed console errors.
SGAC-2693 Fixes an issue where the console erroneously reported conflicting proxy service listeners on the appliance.
62
SGOS 7.x Release Notes
ID Issue
SG-26727 Fixes an issue where the appliance stopped responding during LDAP realm destruction while attempting to clean
up a cached network socket used for LDAP searches.
SG-26994 Fixes an issue where the appliance was unresponsive due to incorrectly prioritizing certain processes.
ID Issue
SG-25897 Fixes an issue where sometimes a kex protocol error would occur when running CLI commands.
ID Issue
SG-26843 Fixes an issue where ZTP did not successfully set up an appliance.
ID Issue
SG-25261 Fixes an issue where the appliance experienced a restart when attempting to free a pointer it had already freed.
ID Issue
SG-25858 Fixes an issue where the Policy Services Communication Status was in a critical state after upgrading an
appliance with the MACH5 license to version 7.3.x. Previously, Policy Services was disabled by default for some
license types; now, it is enabled and available for all license types.
ID Issue
SG-26832 Fixes an issue where web isolation forwarding did not work if the appliance was upgraded from version 6.7.x to
7.3.2.
SG-25593 Fixes an issue where protocol detection didn't detect HTTP/2 when a server response was received before the
client connection. When this issue occurred, the log displayed "Cannot detect server speakfirst protocol".
ID Issue
SG-25602 Fixes an issue where Secure Web Gateway virtual appliances running on Microsoft Azure platforms stopped
responding.
63
SGOS 7.x Release Notes
ID Issue
SG-26413 Fixes an issue where policy coverage reports showed inaccurate 'true' counts for unconditional rules in
scheduled layers (such as timed denials and access logging).
SG-25137 Fixes an issue where the appliance could not rewrite URLs that had empty HTML comments preceding them.
ID Issue
SG-25580 Fixes an issue where SOCKS requests failed due to not being matched to the IP surrogate credential. This fix
requires using the new socks.authenticate.mode() , policy action, as described in Features in SGOS
7.3.4.1.
ID Issue
SG-23430 Fixes an issue where the appliance experienced high memory usage. This issue occurred in reverse proxy
mode with #(config service_name)attribute forward-client-cert enabled and Certificate
Policies extensions in use.
ID Issue
SG-25640 Fixes an issue where the appliance became unresponsive when loading a trust package.
SG-25818 Fixes an issue where the appliance experienced a restart when attempting to install HSM configuration.
ID Issue
SG-26111 Fixes an issue where users experienced slow loading pages or pages not loading due to high memory utilization
in TCP/IP.
SG-10571 Fixes an issue where the appliance dropped fragmented IPv6 NDP packets.
SG-26509 Fixes an issue where the ProxySG applications restarted frequently due to encrypted tap sessions not closing
correctly.
SG-25552 Fixes an issue where IPv6 UDP did not track destination addresses correctly.
SG-27101 Fixes an issue where the appliance stopped responding due to a bypassed connection with fragmented packets,
which had no TCP header.
SG-27115 Fixes an issue where adding NICs to a virtual appliance running on VMware ESXi changed the order of NICs.
SG-25955 Fixes an issue where the appliance experienced a restart due to the appliance marking the mbuf with a weak
INP.
SG-26308 Fixes an issue where the FreeBSD DHCP vulnerability described in CVE-2021-7461 could cause the appliance
to stop responding.
64
SGOS 7.x Release Notes
ID Issue
SG-25947 Fixes an issue where the appliance experienced a restart when the appliance had a large number of items in the
queue for the stack-ip-forward worker.
ID Issue
SG-25492 Fixes an issue where purging the databases of Intelligence Service subscription services changes the
previously-configured download method.
ID Issue
65
SGOS 7.x Release Notes
SGOS 7.3.3.3 PR
Release Information
• Release Date: June 28, 2021
• Build Number: 263824
Supported Platforms
• ProxySG hardware appliances: S200, S400, S410, S500
• Standard/Advanced Reverse Proxy hardware appliances: S200, S400, S410, S500
• High-performance Gen2 virtual appliances: SG-VA, ARP-VA, SRP-VA
See Hardware Appliances and ProxySG Tech Docs for platform documentation.
Compatible With
• BCAAA: 6.1
• Integrated Secure Gateway: 2.1 and later
• HSM Agent: 2.0 and later
• ProxySG Admin Console: 1.1.1 and later
• Reporter: 9.5.x, 10.1.x, and 10.2.x
• Management Center: 2.2.2.3 and later
NOTE
The new ProxySG Admin Console (SGAC) requires Management Center 2.4.x or later.
• ProxyAV: 3.5.x
• Content Analysis: 2.3.x, and 3.0.x
• ProxyClient: 3.4.x
• Unified Agent: 4.7.x and 4.8.x
ATTENTION
Support for Client Manager, ProxyClient, and Unified Agent will be removed in a future release.
• SSL Visibility: 4.2.x, 4.3.x. 4.4.x, 4.5.x, and 5.x
• Web Isolation: 1.10 and later
Third-Party Compatibility
• For supported Java, operating system, and browser versions, refer to KB Article 169081.
• For information on Java 11 support, refer to KB Article 173228.
66
SGOS 7.x Release Notes
deprecated in 7.2.0.1 and any policy that references them is no longer necessary. For appliances running versions
earlier than 7.2.0.1, use the following CPL:
<ssl>
client.connection.negotiated_cipher=(EXP-RC4-MD5,EXP-RC2-CBC-MD5,EXP-DES-CBC-SHA) force_deny
<ssl>
server.connection.negotiated_cipher=(EXP-RC4-MD5,EXP-RC2-CBC-MD5,EXP-DES-CBC-SHA) force_deny
• When upgrading to 7.3.x, your malware scanning configuration is not preserved. After upgrading, reconfigure your
malware scanning. For information, see the SGOS Administration Guide and ProxySG Web Visual Policy Manager
Reference .
• When upgrading to version 7.3.2 and later, the HTTPS console's cipher suites configuration is preserved. In addition,
the following TLS 1.3 high-strength cipher suites are enabled by default:
– tls_aes_256_gcm_sha384
– tls_chacha20_poly1305_sha256
– tls_aes_128_gcm_sha256
– tls_aes_128_ccm_8-sha256
– tls_aes_128_ccm_sha256
• The following are the supported upgrade/downgrade paths for this release:
– Upgrade to 7.3.x from an earlier version 7.x or from version 6.7.4.4 or later.
– Downgrade from 7.3.x to to an earlier version 7.x or to version 6.7.4.4 or later.
NOTE
If upgrading from version 6.7.4.2 or earlier, an interim upgrade to version 6.7.4.3 might be required. To
determine whether you can upgrade directly to version 6.7.4.4, refer to KB Article 18536.
See SGOS Upgrade/Downgrade documentation for the supported upgrade/downgrade paths for this release.
NOTE
In a future release of 7.x, support for WebFilter (BCWF) will be removed.
Limitations
• See Limitations in SGOS 7.x for a description of limitations in this release.
Known Issues
• See Known Issues in SGOS 7.x for a list of all issues that Symantec is aware of in SGOS 7.x.
67
SGOS 7.x Release Notes
SGOS 7.3.3.2 PR
Release Information
• Release Date: May 20, 2021
• Build Number: 262454
Supported Platforms
• ProxySG hardware appliances: S200, S400, S410, S500
• Standard/Advanced Reverse Proxy hardware appliances: S200, S400, S410, S500
• High-performance Gen2 virtual appliances: SG-VA, ARP-VA, SRP-VA
See Hardware Appliances and ProxySG Tech Docs for platform documentation.
Compatible With
• BCAAA: 6.1
• Integrated Secure Gateway: 2.1 and later
• HSM Agent: 2.0 and later
• ProxySG Admin Console: 1.1.1 and later
• Reporter: 9.5.x, 10.1.x, and 10.2.x
• Management Center: 2.2.2.3 and later
NOTE
The new ProxySG Admin Console (SGAC) requires Management Center 2.4.x or later.
• ProxyAV: 3.5.x
• Content Analysis: 2.3.x, and 3.0.x
• ProxyClient: 3.4.x
• Unified Agent: 4.7.x and 4.8.x
ATTENTION
Support for Client Manager, ProxyClient, and Unified Agent will be removed in a future release.
• SSL Visibility: 4.2.x, 4.3.x. 4.4.x, 4.5.x, and 5.x
• Web Isolation: 1.10 and later
Third-Party Compatibility
• For supported Java, operating system, and browser versions, refer to KB Article 169081.
• For information on Java 11 support, refer to KB Article 173228.
68
SGOS 7.x Release Notes
FIPS mode, and attempt the upgrade again. If you upgrade to 7.3.x without disabling FIPS mode, your appliance will
not function as expected.
• If you are downgrading from ProxySG 7.3.x to a version earlier than 7.2.0.1, ensure that after you downgrade your
policy includes CPL that protects against low strength ciphers (RC4, CBC, DES, and 3DES). These ciphers were
deprecated in 7.2.0.1 and any policy that references them is no longer necessary. For appliances running versions
earlier than 7.2.0.1, use the following CPL:
<ssl>
client.connection.negotiated_cipher=(EXP-RC4-MD5,EXP-RC2-CBC-MD5,EXP-DES-CBC-SHA) force_deny
<ssl>
server.connection.negotiated_cipher=(EXP-RC4-MD5,EXP-RC2-CBC-MD5,EXP-DES-CBC-SHA) force_deny
• When upgrading to 7.3.x, your malware scanning configuration is not preserved. After upgrading, reconfigure your
malware scanning. For information, see the SGOS Administration Guide and ProxySG Web Visual Policy Manager
Reference .
• When upgrading to version 7.3.2 and later, the HTTPS console's cipher suites configuration is preserved. In addition,
the following TLS 1.3 high-strength cipher suites are enabled by default:
– tls_aes_256_gcm_sha384
– tls_chacha20_poly1305_sha256
– tls_aes_128_gcm_sha256
– tls_aes_128_ccm_8-sha256
– tls_aes_128_ccm_sha256
• The following are the supported upgrade/downgrade paths for this release:
– Upgrade to 7.3.x from an earlier version 7.x or from version 6.7.4.4 or later.
– Downgrade from 7.3.x to to an earlier version 7.x or to version 6.7.4.4 or later.
NOTE
If upgrading from version 6.7.4.2 or earlier, an interim upgrade to version 6.7.4.3 might be required. To
determine whether you can upgrade directly to version 6.7.4.4, refer to KB Article 18536.
See SGOS Upgrade/Downgrade documentation for the supported upgrade/downgrade paths for this release.
NOTE
In a future release of 7.x, support for WebFilter (BCWF) will be removed.
Limitations
• See Limitations in SGOS 7.x for a description of limitations in this release.
Known Issues
• See Known Issues in SGOS 7.x for a list of all issues that Symantec is aware of in SGOS 7.x.
69
SGOS 7.x Release Notes
For Web Visual Policy Manager fixes, see Web Visual Policy Manager Fixes in SGOS 7.x.
ID Issue
SG-25328 Fixes an issue where the appliance would experience a restart when the appliance parsed all PSK
extensions regardless of the maximum TLS version for the client.
70
SGOS 7.x Release Notes
SGOS 7.3.3.1 GA
Release Information
• Release Date: April 28, 2021
• Build Number: 261578
Supported Platforms
• ProxySG hardware appliances: S200, S400, S410, S500
• Standard/Advanced Reverse Proxy hardware appliances: S200, S400, S410, S500
• High-performance Gen2 virtual appliances: SG-VA, ARP-VA, SRP-VA
See Hardware Appliances and ProxySG Tech Docs for platform documentation.
Compatible With
• BCAAA: 6.1
• Integrated Secure Gateway: 2.1 and later
• HSM Agent: 2.0 and later
• ProxySG Admin Console: 1.1.1 and later
• Reporter: 9.5.x, 10.1.x, and 10.2.x
• Management Center: 2.2.2.3 and later
NOTE
The new ProxySG Admin Console (SGAC) requires Management Center 2.4.x or later.
• ProxyAV: 3.5.x
• Content Analysis: 2.3.x, and 3.0.x
• ProxyClient: 3.4.x
• Unified Agent: 4.7.x and 4.8.x
ATTENTION
Support for Client Manager, ProxyClient, and Unified Agent will be removed in a future release.
• SSL Visibility: 4.2.x, 4.3.x. 4.4.x, 4.5.x, and 5.x
• Web Isolation: 1.10 and later
Third-Party Compatibility
• For supported Java, operating system, and browser versions, refer to KB Article 169081.
• For information on Java 11 support, refer to KB Article 173228.
71
SGOS 7.x Release Notes
deprecated in 7.2.0.1 and any policy that references them is no longer necessary. For appliances running versions
earlier than 7.2.0.1, use the following CPL:
<ssl>
client.connection.negotiated_cipher=(EXP-RC4-MD5,EXP-RC2-CBC-MD5,EXP-DES-CBC-SHA) force_deny
<ssl>
server.connection.negotiated_cipher=(EXP-RC4-MD5,EXP-RC2-CBC-MD5,EXP-DES-CBC-SHA) force_deny
• When upgrading to 7.3.x, your malware scanning configuration is not preserved. After upgrading, reconfigure your
malware scanning. For information, see the SGOS Administration Guide and ProxySG Web Visual Policy Manager
Reference .
• When upgrading to version 7.3.2 and later, the HTTPS console's cipher suites configuration is preserved. In addition,
the following TLS 1.3 high-strength cipher suites are enabled by default:
– tls_aes_256_gcm_sha384
– tls_chacha20_poly1305_sha256
– tls_aes_128_gcm_sha256
– tls_aes_128_ccm_8-sha256
– tls_aes_128_ccm_sha256
• The following are the supported upgrade/downgrade paths for this release:
– Upgrade to 7.3.x from an earlier version 7.x or from version 6.7.4.4 or later.
– Downgrade from 7.3.x to to an earlier version 7.x or to version 6.7.4.4 or later.
NOTE
If upgrading from version 6.7.4.2 or earlier, an interim upgrade to version 6.7.4.3 might be required. To
determine whether you can upgrade directly to version 6.7.4.4, refer to KB Article 18536.
See SGOS Upgrade/Downgrade documentation for the supported upgrade/downgrade paths for this release.
NOTE
In a future release of 7.x, support for WebFilter (BCWF) will be removed.
Limitations
• See Limitations in SGOS 7.x for a description of limitations in this release.
Known Issues
• See Known Issues in SGOS 7.x for a list of all issues that Symantec is aware of in SGOS 7.x.
72
SGOS 7.x Release Notes
Policy Optimizations
Hashed Conditions in Executable Policy
A new command has been added to enable or disable policy hash optimizations:
# (config) policy optimize-hash
The command applies to theurl.domain= and server_url.domain= conditions. When enabled, lists of
url.domain= , and server_url.domain= conditions, and various subnet and substitution conditions are transformed
into a hashed condition in executable policy.
The following command was introduced in version 7.3.1:
# (config) policy optimize-tautology
When enabled, conditions that are determined to be constantly true or constantly false at compilation time are not
evaluated (they still appear in executable policy).
Policy Compilation Improvement
Compilation of policy that includes many user= conditions is improved. The policy compiler now optimizes user=
conditions into groups of case-sensitive and case-insensitive realms. A minimum of five qualifying conditions is required
for optimization into a group.
NOTE
Conditions that have variable criteria, such as substitutions rather than strings, are not optimized.
For more information, refer to the Command Line Interface Reference documentation.
73
SGOS 7.x Release Notes
. When you use the icon to refresh the CPL, the VPM notifies you of the change with a message, "Successfully
refreshed generated CPL."
• All policy rule menu options now have icons:
ID Issue
SG-25675 Fixes an issue where an existing access log facility could not be deleted.
ID Issue
SG-25138 Fixes an issue where the appliance stopped responding after writing some <admin> layer policy.
SG-25860 Fixes an issue where the appliance had a hardware exception when the XML authentication realm contained a
parsing issue.
ID Issue
SG-25363 Addresses potential denial of service attacks when there was a high number of simultaneous URL-based
searches in /CE/Listing_Form.
ID Issue
SG-25564 Fixes an issue where attempting to view Advanced URLs results in an "Encrypted token has expired" message.
This issue occurred when logging in to the console with a non-local admin user.
ID Issue
SG-23967 Fixes an issue where the appliance stopped responding when starting up in standalone mode.
74
SGOS 7.x Release Notes
ID Issue
SG-22988 Fixes an issue where requests including both the Content-Length and Transfer-Encoding headers were
forwarded to the OCS. Now, the Transfer-Encoding: identity header is removed from such requests before being
forwarded.
SG-25957 Fixes an issue where users cannot access alldata.com after an upgrade to version 7.3.
SG-25953 Fixes an issue where the appliance had a software exception when policy included
ssl.forward_proxy(yes) and a deferred transaction was denied.
SG-25612 Fixes an issue where protocol detection failed to detect HTTPS with TLS 1.3 post handshake messages, and the
HTTP logs contained "Cannot detect server speakfirst protocol" messages.
ID Issue
SG-19774 Fixes an issue where "Request timed out" errors were incorrectly reported when ICAP connections were closed
on the server side. Now, the ICAP error states "Failed due to dropped connection".
ID Issue
SG-19721 Fixes an issue where the appliance stopped responding when there was a high number of HTTP/S connections
on the appliance.
ID Issue
SG-25199 Fixes an issue where the Management Console exited with an error message, "SSL protocol negotiation failed.
Logging out from Management Console".
ID Issue
SG-25255 Fixes an issue where the Management Console exited with an error message, "SSL protocol negotiation failed.
Logging out from Management Console".
SG-25472 Fixes an issue where a define condition did not match if it included more than four user= conditions.
ID Issue
SG-25442 Fixes an issue where existing forwarding host names could not be edited to exceed 64 characters.
75
SGOS 7.x Release Notes
ID Issue
SG-25924 Fixes an issue where the appliance stopped responding after deleting an SSL keyring.
ID Issue
SG-13361 Fixes an issue where authentication sessions persisted across browser sessions. Now, users are prompted to
authenticate each new browser session.
SG-25006 Fixes an issue where users received an "EXCEPTION(tcp_error): Request could not be handled" message when
a site required a client certificate.
SG-25594 Fixes an issue where some SSL tunnel transactions are allowed although they are denied in policy. This issue
occurred if protocol detection for SIPS was enabled and policy included deny actions based on response.
ID Issue
SG-24139 Fixes an issue where outgoing connections intermittently went to an incorrect interface.
SG-23835 Fixes an issue where users experienced slow browsing due to a large number of failed DNS lookups on the
appliance.
SG-26046 Fixes an issue where the serial console showed error message "Apply__DNS_fwd() ERRO DNS fibnum = 0"
when the appliance booted up. The issue occurred because DNS forwarding group names were truncated if they
were 16 characters or more in length.
ID Issue
SG-25892 Fixes an issue where user requests were denied due to a content_filter_denied exception that matched in
error. This issue occurred after an upgrade from version 7.2.3.
SG-25752 Fixes an issue where application attributes policy was not enforced. This occurred when application classification
or access logging was disabled.
76
SGOS 7.x Release Notes
SGOS 7.3.2.1 GA
Release Information
• Release Date: March 3, 2021
• Build Number: 259959
Supported Platforms
• ProxySG hardware appliances: S200, S400, S410, S500
• Standard/Advanced Reverse Proxy hardware appliances: S200, S400, S410, S500
• High-performance Gen2 virtual appliances: SG-VA, ARP-VA, SRP-VA
See Hardware Appliances and ProxySG Tech Docs for platform documentation.
Compatible With
• BCAAA: 6.1
• Integrated Secure Gateway: 2.1 and later
• HSM Agent: 2.0 and later
• ProxySG Admin Console: 1.1.1 and later
• Reporter: 9.5.x, 10.1.x, and 10.2.x
• Management Center: 2.2.2.3 and later
NOTE
The new ProxySG Admin Console (SGAC) requires Management Center 2.4.x or later.
• ProxyAV: 3.5.x
• Content Analysis: 2.3.x, and 3.0.x
• ProxyClient: 3.4.x
• Unified Agent: 4.7.x and 4.8.x
ATTENTION
Support for Client Manager, ProxyClient, and Unified Agent will be removed in a future release.
• SSL Visibility: 4.2.x, 4.3.x. 4.4.x, 4.5.x, and 5.x
• Web Isolation: 1.10 and later
Third-Party Compatibility
• For supported Java, operating system, and browser versions, refer to KB Article 169081.
• For information on Java 11 support, refer to KB Article 173228.
77
SGOS 7.x Release Notes
deprecated in 7.2.0.1 and any policy that references them is no longer necessary. For appliances running versions
earlier than 7.2.0.1, use the following CPL:
<ssl>
client.connection.negotiated_cipher=(EXP-RC4-MD5,EXP-RC2-CBC-MD5,EXP-DES-CBC-SHA) force_deny
<ssl>
server.connection.negotiated_cipher=(EXP-RC4-MD5,EXP-RC2-CBC-MD5,EXP-DES-CBC-SHA) force_deny
• When upgrading to 7.3.x, your malware scanning configuration is not preserved. After upgrading, reconfigure your
malware scanning. For information, see the SGOS Administration Guide and ProxySG Web Visual Policy Manager
Reference .
• When upgrading to version 7.3.2, the HTTPS console's cipher suites configuration is preserved. In addition, the
following TLS 1.3 high-strength cipher suites are enabled by default:
– tls_aes_256_gcm_sha384
– tls_chacha20_poly1305_sha256
– tls_aes_128_gcm_sha256
– tls_aes_128_ccm_8-sha256
– tls_aes_128_ccm_sha256
• The following are the supported upgrade/downgrade paths for this release:
– Upgrade to 7.3.x from an earlier version 7.x or from version 6.7.4.4 or later. If upgrading from version 6.7.4.2 or
earlier, an interim upgrade to version 6.7.4.3 might be required. To determine whether you can upgrade directly to
version 6.7.4.4, refer to KB Article 18536.
– Downgrade from 7.3.x to to an earlier version 7.x or to version 6.7.4.4 or later.
See SGOS Upgrade/Downgrade documentation for the supported upgrade/downgrade paths for this release.
NOTE
In a future release of 7.x, support for WebFilter (BCWF) will be removed.
Limitations
• See Limitations in SGOS 7.x for a description of limitations in this release.
Known Issues
• See Known Issues in SGOS 7.x for a list of all issues that Symantec is aware of in SGOS 7.x.
78
SGOS 7.x Release Notes
79
SGOS 7.x Release Notes
You can add listeners to the UDP proxy service and set listener actions to bypass, drop, or reject.
Full information:
• Command Line Interface Reference
80
SGOS 7.x Release Notes
Full information:
• Web Visual Policy Manager Reference
81
SGOS 7.x Release Notes
82
SGOS 7.x Release Notes
Troubleshooting Improvements
• HTTP/2 connection and stream counters have been added to the heartbeat report.
• Port numbers are now available in the policy trace output.
• Kerberos 5 replay attack error messages in the event log now include the client IP address.
83
SGOS 7.x Release Notes
ID Issue
SG-22694 Fixes an issue where the appliance restarted due to multiple log upload threads attempting to simultaneously
initialize the SSL cryptographic parameters.
SG-18288 Fixes an issue where access logs using a custom log format could not be uploaded via Kafka client to the broker.
SG-24708 Fixes an issue where the HTTP transaction timing fields (x-cs-rp-https-handshake-time, x-cs-https-
handshaketime, and x-sr-https-handshake-time) in the access log generated a "-" or a "0" in log output
regardless of the latency from the client or server.
ID Issue
SGAC-2591 Fixes an issue where the console did not reflect changes to the User Overflow Action option in General Proxy
Settings.
SGAC-2577 Fixes an issue where offline download could not be configured for the geolocation database.
SGAC-2574 Fixes an issue where net 10.10.10.10/24 could not be saved as a packet capture filter expression.
SGAC-2446 Fixes an issue where disabled fields in the Admin Console did not appear to be disabled. Disabled fields now
look disabled, consistent with behavior in the Management Console.
SGAC-2306 Fixes issues with Windows Domain configuration:
• The console no longer incorrectly indicates that there are no changes to be saved.
• When joining a domain, the console now shows the operation is in progress.
ID Issue
84
SGOS 7.x Release Notes
ID Issue
SG-23589 Fixes an issue where the appliance restarted due to the appliance not re-evaluating entries in the hash table.
ID Issue
SG-4624 Fixes an issue where the s-action access log field was sometimes not populated.
ID Issue
SG-22815 Fixes a timing issue where the appliance stopped responding when modifying an access log facility.
SG-23269 Fixes an issue where a restart occurred in a forward proxy deployment that included HSMs.
ID Issue
SG-18817 Fixes an issue where the browser did not display full exception details when the default policy was set to deny
and the TCP Tunnel service had protocol detection enabled.
SG-20969 Addresses an issue where the appliance experienced a restart in the HTTP process when reading a response
from ICAP.
SG-23441 Fixes an issue where some webpages would not render correctly when an SSL Visibility appliance was
decrypting traffic.
SG-14408 Fixes an issue where Websocket tunnels inflated some HTTP transaction time statistics.
SG-22779 Addresses an issue where the appliance experienced a restart after receiving an invalid request when using
HTTP/2 and SSLV offload.
SG-23197 Addresses an issue where the appliance experienced a restart when there were multiple concurrent HTTP/2
requests and the web server closed the connection.
SG-23178 Fixes an issue where the limit set in http2.client.max_concurrent_streams() did not apply
immediately to new HTTP/2 connections.
SG-20158 Fixes an issue where certain ICAP threads were not terminated and caused memory leaks.
SG-24969 Fixes an issue where browsing to facebook.com returned error 502: Content Encoding Error.
SG-22988 Fixes an issue where requests including both the Content-Length and Transfer-Encoding headers were
forwarded to the OCS. Now, the Transfer-Encoding: identity header is removed from such requests before being
forwarded.
ID Issue
SG-23811 Fixes an issue where the response time for health checks was longer than expected when the appliance was
sending Content Analysis traffic to the ICAP broker.
85
SGOS 7.x Release Notes
ID Issue
SG-24442 Fixes an issue where upgrading from version 6.7.4 to 7.2 did not preserve the previous non-default HTTPS
console ciphers configuration or enable TLS 1.3 by default. This issue occurred if non-default SSL protocols
were selected for the HTTPS console. If the appliance was never upgraded to 7.2.x or 7.3.x previously,
upgrading to this release will preserve the previous ciphers selection and enable TLS 1.3 by default. To apply
the fix if the appliance was previously upgraded to 7.2.x or 7.3.x, you must remove the existing SGOS 7.x
configuration before upgrading. Issue the #remove-sgos7-config command, restart the appliance, and
then install this release.
ID Issue
SG-21976 Fixes an issue where ProxySG instances running on Hyper-V and Azure experienced a 20% reduction in traffic
throughput. The issue occurred after changes were made to the Hyper-V paravirtual network driver in version
7.2.2.
ID Issue
SG-21244 Fixes an issue where exception pages rendered incorrectly when they were larger than 8000 bytes.
SG-24326 Fixes an issue where accessing the /dme/configuration advanced URL caused the license key auto-update
feature to be enabled when it was originally set to disabled.
SG-24288 Fixes an issue where authenticating traffic via NTLM with BCAAA did not work.
ID Issue
SG-23369 Fixes an issue where forwarding groups did not balance the load equally when members of the group were in a
failure state.
ID Issue
SG-24065 Fixes an issue where the appliance incorrectly listed the DHE-DSS-DES-CBC3-SHA cipher strength as High
instead of Medium.
SG-24931 Fixes an issue where revoked intermediate certificates were added to the cached intermediate certificate list.
SG-24947 Addresses an issue where the appliance experienced a restart when multiple SSL connections are opened. The
issue occurred due to changes made for SSL session ticket support in version 7.3.1.
86
SGOS 7.x Release Notes
ID Issue
SG-22312 Fixes an issue where a memory leak occurred when MS-TURN traffic was detected.
SG-23828 Fixes an issue where the appliance experienced a memory leak when handling HTTPS reverse proxy traffic with
forward-client-cert enabled.
SG-2311 Fixes an issue where cached intermediate CA certificates caused certificate expiration errors even when
the certificate expiration date was updated. Now, the certificate with an updated expiration date replaces the
certificate in the cache.
SG-23380 Fixes an issue where server.certificate.validate.ccl() did not apply to SSL tunnel transactions.
SG-23117 Fixes an issue where handshake failure occurred when using Java applications. This issue occurred if TSL 1.3
was enabled and protocol detection was disabled on the appliance.
ID Issue
SG-24546 Addresses an issue where a restart occurred when Routing Information Protocol (RIP) was in use.
SG-24706 Addresses an issue here a restart occurred when a packet capture was initiated from the ProxySG Admin
Console that included a very large filter expression.
SG-24034 Fixes an issue where the appliance did not indicate that WCCP did not start after a reboot. Now, when WCCP
does not start after a reboot, error messages are logged in the debug log.
SG-24810 Fixes an issue where the appliance experienced a restart when an HTTP/2 transaction could not be completed
due to a null socket.
SG-24291 Fixes a number of implementation issues in dynamic bypass and asymmetric bypass that might have led to a
restart.
ID Issue
SG-24231 Fixes an issue where the appliance experienced a restart when testing a URL category in the format of an email
address (for example, "/ContentFilter/TestUrl/[email protected]").
SG-23245 Fixes an issue where a requested URL matched policy for "None" category even though the URL was
categorized in the local database.
SG-20587 Fixes an issue where categorization timing information was not displayed correctly in the access log.
87
SGOS 7.x Release Notes
SGOS 7.3.1.1 GA
Release Information
• Release Date: November 12, 2020
• Build Number: 256495
NOTE
SGOS is cumulative. SGOS 7.3.1.1 is based on the SGOS 7.2.3.1 release. In addition, this release includes all
features and fixes that were included in the 6.7.5.7 release.
Supported Platforms
• ProxySG hardware appliances: S200, S400, S410, S500
• Standard/Advanced Reverse Proxy hardware appliances: S200, S400, S410, S500
• High-performance Gen2 virtual appliances: SG-VA, ARP-VA, SRP-VA
See Hardware Appliances and ProxySG Tech Docs for platform documentation.
Compatible With
• BCAAA: 6.1
• Integrated Secure Gateway: 2.1 and later
• HSM Agent: 2.0 and later
• ProxySG Admin Console: 1.1.1 and later
• Reporter: 9.5.x, 10.1.x, and 10.2.x
• Management Center: 2.2.2.3 and later
NOTE
The new ProxySG Admin Console (SGAC) requires Management Center 2.4.x or later.
• ProxyAV: 3.5.x
• Content Analysis: 2.3.x, and 3.0.x
• ProxyClient: 3.4.x
• Unified Agent: 4.7.x and 4.8.x
ATTENTION
Support for Client Manager, ProxyClient, and Unified Agent will be removed in a future release.
• SSL Visibility: 4.2.x, 4.3.x. 4.4.x, 4.5.x, and 5.x
• Web Isolation: 1.10 and later
Third-Party Compatibility
• For supported Java, operating system, and browser versions, refer to KB Article 169081.
• For information on Java 11 support, refer to KB Article 173228.
88
SGOS 7.x Release Notes
disable FIPS mode, and attempt the upgrade again. If you upgrade to 7.3.1.1 without disabling FIPS mode, your
appliance will not function as expected.
• If you are downgrading from ProxySG 7.3.1.1 to a version earlier than 7.2.0.1, ensure that after you downgrade your
policy includes CPL that protects against low strength ciphers (RC4, CBC, DES, and 3DES). These ciphers were
deprecated in 7.2.0.1 and any policy that references them is no longer necessary. For appliances running versions
earlier than 7.2.0.1, use the following CPL:
<ssl>
client.connection.negotiated_cipher=(EXP-RC4-MD5,EXP-RC2-CBC-MD5,EXP-DES-CBC-SHA) force_deny
<ssl>
server.connection.negotiated_cipher=(EXP-RC4-MD5,EXP-RC2-CBC-MD5,EXP-DES-CBC-SHA) force_deny
• When upgrading to 7.3.1.1, your malware scanning configuration is not preserved. After upgrading, reconfigure your
malware scanning. For information, see the SGOS Administration Guide and ProxySG Web Visual Policy Manager
Reference .
• The following are the supported upgrade/downgrade paths for this release:
– Upgrade to 7.3.1.1 from an earlier version 7.x or from version 6.7.4.4 or later. If upgrading from version 6.7.4.2 or
earlier, an interim upgrade to version 6.7.4.3 might be required. To determine whether you can upgrade directly to
version 6.7.4.4, refer to KB Article 18536.
– Downgrade from 7.3.1.1 to to an earlier version 7.x or to version 6.7.4.4 or later.
See SGOS Upgrade/Downgrade documentation for the supported upgrade/downgrade paths for this release.
NOTE
In a future release of 7.x, support for WebFilter (BCWF) will be removed.
Limitations
• See Limitations in SGOS 7.x for a description of limitations in this release.
Known Issues
• See Known Issues in SGOS 7.x for a list of all issues that Symantec is aware of in SGOS 7.x.
89
SGOS 7.x Release Notes
in SGOS 7.3.x, you can easily configure the ProxySG appliance to send HTTP and HTTPS requests to Symantec Web
Isolation.
You can configure the appliance with your existing dedicated cloud or on-premises isolation service. This requires
configuration through the command line interface (CLI) and Visual Policy Manager (VPM) or content policy language
(CPL) policy.
NOTE
In the future, the Symantec cloud Web Isolation service will also be available for customers who do not have a
dedicated web isolation service.
More information:
• KB article for configuration instructions: https://knowledge.broadcom.com/external/article/201609
• Content Policy Language Reference
• Command Line Interface Reference
• Web Visual Policy Manager Reference
90
SGOS 7.x Release Notes
If policy contains layers or sections with the same name, installing policy results in the message: "Warning: Coverage
may not be consistent across policy versions: duplicate layer/section label". Assign unique labels to layers and sections to
easily identify policy rules and ensure the continuity of cumulative policy coverage statistics.
If a policy layer contains rules with identical conditions, installing policy results in the message for the subsequent rule(s):
"Warning: Unreachable rule, conditions will be matched by a preceding rule". Make sure that rule conditions are unique,
so that policy coverage does not record duplicate statistics.
More Information:
• Content Policy Language Reference
• Web Visual Policy Manager Reference and Legacy Visual Policy Manager Reference
More Information:
• Content Policy Language Reference
91
SGOS 7.x Release Notes
...
end
More Information:
• Content Policy Language Reference
In the Management Console, the SSL Session ID host affinity method in forwarding host and SOCKS gateway
configurations is changed to SSL Session.
If you downgrade SGOS , hosts and gateways created or modified to use SSL session will use SSL session ID.
92
SGOS 7.x Release Notes
NOTE
This feature is available in forward proxy mode.
More Information:
• ProxySG Log Fields and Substitutions
93
SGOS 7.x Release Notes
• SkyUI is disabled by default in version 7.3.x. You can re-enable this management interface, but be aware that it is
potentially vulnerable to security issues. For best security, do not enable SkyUI.
• Managing ProxyClient and Unified Agent is deprecated. You can enable these features, but the Management Console
and the CLI indicate that support for these remote clients will be removed in a future release.
• In the Web VPM, the Protocol Methods service object no longer includes the Instant Messaging protocol and
methods. IM policies were removed in a previous release.
• IPv6 site-local addresses are no longer supported in ProxySG configurations.
• Network adapters associated with unsupported platforms (such as SG300, SG600, SG900, and SG9000) are no
longer supported.
94
SGOS 7.x Release Notes
ID Issue
SG-22479 Fixes an issue where users experienced a redirect loop when using Chrome. This issue occurred because
Chrome refused authentication cookies for not having Secure and SameSite=none properties.
ID Issue
SG-20625 Fixes an issue where client machines lost connectivity to file shares after waking from sleep mode.
ID Issue
SG-4912, SG-19528 Fixes an issue where ProxySG advanced URLs used less-secure HTTP GET methods.
ID Issue
SG-22935 Fixes an issue where the appliance sent diagnostic reports to Symantec if the appliance was reinitialized.
ID Issue
SG-22116 Addresses an issue where the appliance experienced a restart in PG_HEALTH_CHECKS process: "HC
Watchdog" in "" at .text+0x0 SWE : 0x3a0004.
ID Issue
SG-18485 Addresses an issue where the system stopped responding in process "HTTP CW 15C1CFADA40" in
"libmemory.so".
ID Issue
SG-19149 Fixes an issue where patience pages took long to load when uploading a file for ICAP scanning. The issue
occurred if the filename contained an ampersand character (&).
95
SGOS 7.x Release Notes
ID Issue
SG-23360 Fixes an issue where creating a C16XS model on the Integrated Secure Gateway resulted in "Warning:
Nonstandard memory configuration detected."
ID Issue
SG-22606 Addresses an issue where the appliance stopped responding in process group: "PG_CFSSL" and process:
"SSLW 21BB8E14F90" in "libc.so" at .text+0x168cd.
ID Issue
SG-11173 Fixes an issue where the event log displayed "failed to copy keyring" and "failed to copy certificate file"
errors after an upgrade from version 6.7.x to version 7.x.
SG-23060 Addresses an issue where the appliance stopped responding in process group: "PG_SSL_HNDSHK" and
process: "HTTP CW 10EC3699A40" in "libcfssl.exe.so" at .text+0x39f1cc.
ID Issue
SG-4154 Fixes an issue where a restart occurred due to a high volume of IPv6 network traffic.
SG-11975 Fixes an issue where the appliance was vulnerable to a LAND attack.
SG-21102 Fixes an issue where the final TCP reset (RST) used a different interface from the rest of the TCP
conversation.
SG-18904 Fixes an issue where running the #(config)ipv6 auto-linklocal disable command did not
remove the auto link-local IPv6 address.
SG-21747 Fixes an issue where an IPv6 address could not be added using the #(config connection-
forwarding)add command.
SG-22295 Fixes an issue where the Secure Web Gateway V100 platform experienced a memory leak due to an
interface reinitializing repeatedly.
SG-20003 Fixes an issue where configuring failover with two ProxySG appliances with IPv6 addresses resulted in
both appliances to be master.
SG-22879 Fixes an issue where configured routing tables on the appliance were not preserved after upgrading from
version 6.7.5.6 to a later 6.7.x or 7.x.
SG-4156 Addresses an issue where the system stopped responding in process group: "PG_TCPIP" and process:
"stack-bnd-1:0-rxq-0" in "libstack.exe.so" at .text+0x50657a.
SG-13300 Fixes an issue where policy traces contained an incorrect interface number when return-to-sender (RTS)
was disabled and policy specified the interface in the client.interface= condition.
96
SGOS 7.x Release Notes
ID Issue
SG-20740 Fixes an issue where VPM policy did not detect when multi-tenant landlord mode was enabled. When this
issue occurred, some related policy gestures such as Tenant ID were unavailable. This issue was also fixed
in the Web VPM.
97
SGOS 7.x Release Notes
SGOS 7.2.8.1 GA
Release Information
• Release Date: August 4, 2021
• Build Number: 264841
Supported Platforms
• ProxySG hardware appliances: S200, S400, S410, S500
• Standard/Advanced Reverse Proxy hardware appliances: S200, S400, S410, S500
• High-performance Gen2 virtual appliances: SG-VA, ARP-VA, SRP-VA
See Hardware Appliances and ProxySG Tech Docs for platform documentation.
Compatible With
• BCAAA: 6.1
• Integrated Secure Gateway: 2.1 and later
• HSM Agent: 2.0 and later
• ProxySG Admin Console: 1.1.1 and later
• Reporter: 9.5.x, 10.1.x, and 10.2.x
• Management Center: 2.2.2.3 and later
NOTE
The new ProxySG Admin Console (SGAC) requires Management Center 2.4.x or later.
• ProxyAV: 3.5.x
• Content Analysis: 2.3.x, and 3.0.x
• ProxyClient: 3.4.x
• Unified Agent: 4.7.x and 4.8.x
ATTENTION
Support for Client Manager, ProxyClient, and Unified Agent will be removed in a future release.
• SSL Visibility: 4.2.x, 4.3.x. 4.4.x, 4.5.x, and 5.x
• Web Isolation: 1.10 and later
Third-Party Compatibility
• For supported Java, operating system, and browser versions, refer to KB Article 169081.
• For information on Java 11 support, refer to KB Article 173228.
98
SGOS 7.x Release Notes
deprecated in 7.2.0.1 and any policy that references them is no longer necessary. For appliances running versions
earlier than 7.2.0.1, use the following CPL:
<ssl>
client.connection.negotiated_cipher=(EXP-RC4-MD5,EXP-RC2-CBC-MD5,EXP-DES-CBC-SHA) force_deny
<ssl>
server.connection.negotiated_cipher=(EXP-RC4-MD5,EXP-RC2-CBC-MD5,EXP-DES-CBC-SHA) force_deny
• When upgrading to 7.2.x, your malware scanning configuration is not preserved. After upgrading, reconfigure your
malware scanning. For information, see the SGOS Administration Guide and ProxySG Web Visual Policy Manager
Reference .
• The following are the supported upgrade/downgrade paths for this release:
– Upgrade to 7.2.x from an earlier version 7.x or from version 6.7.4.4 or later.
– Downgrade from 7.2.x to to an earlier version 7.x or to version 6.7.4.4 or later.
NOTE
If upgrading from version 6.7.4.2 or earlier, an interim upgrade to version 6.7.4.3 might be required. To
determine whether you can upgrade directly to version 6.7.4.4, refer to KB Article 18536.
See SGOS Upgrade/Downgrade documentation for the supported upgrade/downgrade paths for this release.
NOTE
In a future release of 7.x, support for WebFilter (BCWF) will be removed.
Limitations
• See Limitations in SGOS 7.x for a description of limitations in this release.
Known Issues
• See Known Issues in SGOS 7.x for a list of all issues that Symantec is aware of in SGOS 7.x.
99
SGOS 7.x Release Notes
ISG-Proxy-VA-100 ISG-Proxy-VA-200
Virtual CPUs Virtual Memory (GB) Connection Count
Storage (GB) Storage (GB)
6 24 2x100 1x200 37,500
6 40 4x100 2x200 62,500
6 48 4x100 2x200 75,000
10 40 4x100 2x200 62,500
10 80 4x100 2x200 125,000
10 96 4x100 2x200 150,000
12 48 4x100 2x200 75,000
12 96 4x100 2x200 150,000
12 128 4x100 2x200 200,000
14 64 4x100 2x200 100,000
14 112 4x100 2x200 175,000
14 144 8x100 4x200 225,000
20 96 4x100 2x200 150,000
20 144 N/A 4x200 225,000
20 192 N/A 6x200 300,000
24 112 4x100 2x200 175,000
28 128 8x100 4x200 200,000
28 192 N/A 6x200 300,000
28 288 N/A 8x200 450,000
32 80 8x100 2x200 125,000
32 160 N/A 4x200 250,000
32 256 N/A 8x200 400,000
32 320 N/A 8x200 500,000
More information:
• SGOS on GCP Configuration Guide
• ISG Enterprise VA Guide
100
SGOS 7.x Release Notes
101
SGOS 7.x Release Notes
<proxy> client.protocol=socks
socks.authenticate(testrealm) socks.authenticate.mode(proxy-ip)
More information:
• Content Policy Language Reference
• KB Article 166657
ID Issue
SG-27063 Fixes an issue where show advanced-url /accesslog/tail was taking a long time to respond
because the buffers for TE_Transaction::Generate_random_ipv6_address() were too small.
SG-26885 Fixes an issue where Kafka uploads for sites with a large amount of nodes would not succeed due to the size of
the upload exceeding the maximum for the recoverable heap.
ID Issue
SG-27405 Fixes an issue where details for group-async were not available for the #show configuration and
#(config windows-domains)view commands.
SG-27378 Fixes an issue where users could not join or rejoin a domain if the username contained a dollar sign ($)
character.
SG-26994 Fixes an issue where the appliance was unresponsive due to incorrectly prioritizing certain processes.
102
SGOS 7.x Release Notes
ID Issue
SG-25640 Fixes an issue where the appliance became unresponsive when loading a trust package.
SG-26843 Fixes an issue where sometimes ZTP would not successfully set up an appliance due to ZTP attempting to parse
the JSON object as part of the jobTargetData.
ID Issue
SG-27367 Fixes an issue where the appliance experienced a restart when the DNS proxy incorrectly copied from or to a
null pointer.
SG-25261 Fixes an issue where the appliance experienced a restart when attempting to free a pointer it had already freed.
ID Issue
SG-25111 Fixes an issue where supplier.country policy did not match for tunneled HTTPS connections when
protocol detection was disabled.
SG-25593 Fixes an issue where protocol detection didn't detect HTTP/2 when a server response was received before the
client connection. When this issue occurred, the log displayed "Cannot detect server speakfirst protocol".
ID Issue
SG-26626 Fixes an issue where the appliance experienced a restart when the hostname was assigned "null" during
address resolution.
ID Issue
SG-25580 Fixes an issue where SOCKS requests failed due to not being matched to the IP surrogate credential. This fix
requires using the new socks.authenticate.mode() policy action, as described in Features in SGOS
7.2.8.1.
ID Issue
SG-23430 Fixes an issue where the appliance experienced high memory usage. This issue occurred in reverse proxy
mode with #(config service_name)attribute forward-client-cert enabled and Certificate
Policies extensions in use.
SG-26999 Fixes an issue where the appliance experienced high memory usage during SSL handshakes.
103
SGOS 7.x Release Notes
ID Issue
SG-25640 Fixes an issue where the appliance became unresponsive when loading a trust package.
SG-25818 Fixes an issue where the appliance experienced a restart when attempting to install HSM configuration.
ID Issue
SG-27807 Fixes an issue where DNS flags were not set correctly for AAAA requests, causing the appliance to not retry with
A requests after receiving invalid AAAA responses.
SG-27115 Fixes an issue where adding NICs to a virtual appliance running on VMware ESXi changed the order of NICs.
SG-25955 Fixes an issue where the appliance experienced a restart due to the appliance marking the mbuf with a weak
INP.
SG-27375 Fixes an issue where the appliance experienced a restart when the database was updated.
SG-27677 Fixes an issue where the appliance returned the error "DNS Resolver Response: Unknown error response (202)"
for a DNS-forwarding group that was associated with the default routing domain.
SG-26136 Fixes an issue where the interfaces showed the speed and duplex as unknown in the SysInfo for virtual
appliances.
ID Issue
SG-27893 Fixes an issue where the warning message when attempting to configure an NTP server that is not present
included a leading "%" used for error messages.
ID Issue
SG-25137 Fixes an issue where the appliance could not rewrite URLs that had empty HTML comments preceding them.
ID Issue
104
SGOS 7.x Release Notes
SGOS 7.2.7.2 PR
Release Information
• Release Date: June 28, 2021
• Build Number: 263784
Supported Platforms
• ProxySG hardware appliances: S200, S400, S410, S500
• Standard/Advanced Reverse Proxy hardware appliances: S200, S400, S410, S500
• High-performance Gen2 virtual appliances: SG-VA, ARP-VA, SRP-VA
See Hardware Appliances and ProxySG Tech Docs for platform documentation.
Compatible With
• BCAAA: 6.1
• Integrated Secure Gateway: 2.1.x and later
• HSM Agent: 2.0 and later
• ProxySG Admin Console: 1.1.1 and later
• Reporter: 9.5.x, 10.1.x, and 10.2.x
• Management Center: 2.2.2.3 and later
NOTE
The new ProxySG Admin Console (SGAC) requires Management Center 2.4.x or later.
• ProxyAV: 3.5.x
• Content Analysis: 2.3.x, and 3.0.x
• ProxyClient: 3.4.x
• Unified Agent: 4.7.x and 4.8.x
• SSL Visibility: 4.2.x, 4.3.x. 4.4.x, 4.5.x, and 5.x
• Web Isolation: 1.10 and later
Third-Party Compatibility
• For supported Java, operating system, and browser versions, refer to KB Article 169081.
• For information on Java 11 support, refer to KB Article 173228.
105
SGOS 7.x Release Notes
<ssl>
client.connection.negotiated_cipher=(EXP-RC4-MD5,EXP-RC2-CBC-MD5,EXP-DES-CBC-SHA) force_deny
<ssl>
server.connection.negotiated_cipher=(EXP-RC4-MD5,EXP-RC2-CBC-MD5,EXP-DES-CBC-SHA) force_deny
• When upgrading to 7.2.1.1, your malware scanning configuration is not preserved. After upgrading, reconfigure your
malware scanning. For information, see the SGOS Administration Guide and ProxySG Web Visual Policy Manager
Reference .
• The following are the supported upgrade/downgrade paths for this release:
– Upgrade to 7.2.x from an earlier version 7.x or from version 6.7.4.4 or later.
– Downgrade from 7.2.x to to an earlier version 7.x or to version 6.7.4.4 or later.
NOTE
If upgrading from version 6.7.4.2 or earlier, an interim upgrade to version 6.7.4.3 might be required. To
determine whether you can upgrade directly to version 6.7.4.4, refer to KB Article 18536.
See SGOS Upgrade/Downgrade documentation for the supported upgrade/downgrade paths for this release.
NOTE
In a future release of 7.x, support for WebFilter (BCWF) will be removed.
Limitations
• See Limitations in SGOS 7.x for a description of limitations in this release.
Known Issues
• See Known Issues in SGOS 7.x for a list of all issues that Symantec is aware of in SGOS 7.x.
106
SGOS 7.x Release Notes
SGOS 7.2.7.1 GA
Release Information
• Release Date: May 26, 2021
• Build Number: 262380
NOTE
SGOS is cumulative. SGOS 7.2.7.1 is based on the SGOS 7.2.6.1 release. In addition, this release includes all
features and fixes that were included in the 6.7.5.11 release.
Supported Platforms
• ProxySG hardware appliances: S200, S400, S410, S500
• Standard/Advanced Reverse Proxy hardware appliances: S200, S400, S410, S500
• High-performance Gen2 virtual appliances: SG-VA, ARP-VA, SRP-VA
See Hardware Appliances and ProxySG Tech Docs for platform documentation.
Compatible With
• BCAAA: 6.1
• Integrated Secure Gateway: 2.1.x and later
• HSM Agent: 2.0 and later
• ProxySG Admin Console: 1.1.1 and later
• Reporter: 9.5.x, 10.1.x, and 10.2.x
• Management Center: 2.2.2.3 and later
NOTE
The new ProxySG Admin Console (SGAC) requires Management Center 2.4.x or later.
• ProxyAV: 3.5.x
• Content Analysis: 2.3.x, and 3.0.x
• ProxyClient: 3.4.x
• Unified Agent: 4.7.x and 4.8.x
• SSL Visibility: 4.2.x, 4.3.x. 4.4.x, 4.5.x, and 5.x
• Web Isolation: 1.10 and later
Third-Party Compatibility
• For supported Java, operating system, and browser versions, refer to KB Article 169081.
• For information on Java 11 support, refer to KB Article 173228.
107
SGOS 7.x Release Notes
disable FIPS mode, and attempt the upgrade again. If you upgrade to 7.2.1.1 without disabling FIPS mode, your
appliance will not function as expected.
• If you are downgrading from ProxySG 7.2.1.1 to a version earlier than 7.2.0.1, ensure that after you downgrade your
policy includes CPL that protects against low strength ciphers (RC4, CBC, DES, and 3DES). These ciphers were
deprecated in 7.2.0.1 and any policy that references them is no longer necessary. For appliances running versions
earlier than 7.2.0.1, use the following CPL:
<ssl>
client.connection.negotiated_cipher=(EXP-RC4-MD5,EXP-RC2-CBC-MD5,EXP-DES-CBC-SHA) force_deny
<ssl>
server.connection.negotiated_cipher=(EXP-RC4-MD5,EXP-RC2-CBC-MD5,EXP-DES-CBC-SHA) force_deny
• When upgrading to 7.2.1.1, your malware scanning configuration is not preserved. After upgrading, reconfigure your
malware scanning. For information, see the SGOS Administration Guide and ProxySG Web Visual Policy Manager
Reference .
• The following are the supported upgrade/downgrade paths for this release:
– Upgrade to 7.2.x from an earlier version 7.x or from version 6.7.4.4 or later.
– Downgrade from 7.2.x to to an earlier version 7.x or to version 6.7.4.4 or later.
NOTE
If upgrading from version 6.7.4.2 or earlier, an interim upgrade to version 6.7.4.3 might be required. To
determine whether you can upgrade directly to version 6.7.4.4, refer to KB Article 18536.
See SGOS Upgrade/Downgrade documentation for the supported upgrade/downgrade paths for this release.
NOTE
In a future release of 7.x, support for WebFilter (BCWF) will be removed.
Limitations
• See Limitations in SGOS 7.x for a description of limitations in this release.
Known Issues
• See Known Issues in SGOS 7.x for a list of all issues that Symantec is aware of in SGOS 7.x.
108
SGOS 7.x Release Notes
AWS 8
Azure 8
GCP 8
Hyper-V 8
KVM 16
VMware 10
Xen 8
(SG-26185)
See the Content Policy Language Reference for more information. (SG-25615)
ID Issue
SG-25675 Fixes an issue where an existing access log facility could not be deleted.
ID Issue
SG-25860 Fixes an issue where the appliance had a hardware exception when the XML authentication realm contained a
parsing issue.
ID Issue
SG-26539 Fixes an issue where some CLI commands returned a kex protocol error message.
109
SGOS 7.x Release Notes
ID Issue
SG-25953 Fixes an issue where the appliance had a software exception when policy included
ssl.forward_proxy(yes) and a deferred transaction was denied.
SG-25957 Fixes an issue where users cannot access alldata.com after an upgrade.
ID Issue
SG-19774 Fixes an issue where "Request timed out" errors were incorrectly reported when ICAP connections were closed
on the server side. Now, the ICAP error states "Failed due to dropped connection".
SG-26130 Fixes an issue where the ProxySG appliance performed additional scanning when Content Analysis sends an
ISTag value of "0" in the ICAP response.
ID Issue
SG-19721 Fixes an issue where the appliance stopped responding when there was a high number of HTTP/S connections
on the appliance.
ID Issue
SG-25615 Fixes an issue where users could not connect to chat.google.com. The policy property
http.response.response_data.prevent_inspection_delay(yes|no) has been added to
resolve this issue.
ID Issue
SG-25924 Fixes an issue where the appliance stopped responding after deleting an SSL keyring.
ID Issue
SG-26046 Fixes an issue where the serial console showed error message "Apply__DNS_fwd() ERRO DNS fibnum = 0"
when the appliance booted up. The issue occurred because DNS forwarding group names were truncated if they
were 16 characters or more in length.
SG-23835 Fixes an issue where users experienced slow browsing due to a large number of failed DNS lookups on the
appliance.
SG-26308 Fixes an issue where the FreeBSD DHCP vulnerability described in CVE-2021-7461 could cause the appliance
to stop responding.
110
SGOS 7.x Release Notes
ID Issue
SG-26127 Fixes an issue where the SQL injection engine incorrectly blocked some Chrome headers.
111
SGOS 7.x Release Notes
SGOS 7.2.6.1 GA
Release Information
• Release Date: April 13, 2021
• Build Number: 260877
NOTE
SGOS is cumulative. SGOS 7.2.6.1 is based on the SGOS 7.2.5.1 release. In addition, this release includes all
features and fixes that were included in the 6.7.5.10 release.
Supported Platforms
• ProxySG hardware appliances: S200, S400, S410, S500
• Standard/Advanced Reverse Proxy hardware appliances: S200, S400, S410, S500
• High-performance Gen2 virtual appliances: SG-VA, ARP-VA, SRP-VA
See Hardware Appliances and ProxySG Tech Docs for platform documentation.
Compatible With
• BCAAA: 6.1
• Integrated Secure Gateway: 2.1.x and later
• HSM Agent: 2.0 and later
• ProxySG Admin Console: 1.1.1 and later
• Reporter: 9.5.x, 10.1.x, and 10.2.x
• Management Center: 2.2.2.3 and later
NOTE
The new ProxySG Admin Console (SGAC) requires Management Center 2.4.x or later.
• ProxyAV: 3.5.x
• Content Analysis: 2.3.x, and 3.0.x
• ProxyClient: 3.4.x
• Unified Agent: 4.7.x and 4.8.x
• SSL Visibility: 4.2.x, 4.3.x. 4.4.x, 4.5.x, and 5.x
• Web Isolation: 1.10 and later
Third-Party Compatibility
• For supported Java, operating system, and browser versions, refer to KB Article 169081.
• For information on Java 11 support, refer to KB Article 173228.
112
SGOS 7.x Release Notes
disable FIPS mode, and attempt the upgrade again. If you upgrade to 7.2.1.1 without disabling FIPS mode, your
appliance will not function as expected.
• If you are downgrading from ProxySG 7.2.1.1 to a version earlier than 7.2.0.1, ensure that after you downgrade your
policy includes CPL that protects against low strength ciphers (RC4, CBC, DES, and 3DES). These ciphers were
deprecated in 7.2.0.1 and any policy that references them is no longer necessary. For appliances running versions
earlier than 7.2.0.1, use the following CPL:
<ssl>
client.connection.negotiated_cipher=(EXP-RC4-MD5,EXP-RC2-CBC-MD5,EXP-DES-CBC-SHA) force_deny
<ssl>
server.connection.negotiated_cipher=(EXP-RC4-MD5,EXP-RC2-CBC-MD5,EXP-DES-CBC-SHA) force_deny
• When upgrading to 7.2.1.1, your malware scanning configuration is not preserved. After upgrading, reconfigure your
malware scanning. For information, see the SGOS Administration Guide and ProxySG Web Visual Policy Manager
Reference .
• The following are the supported upgrade/downgrade paths for this release:
– Upgrade to 7.2.x from an earlier version 7.x or from version 6.7.4.4 or later.
– Downgrade from 7.2.x to to an earlier version 7.x or to version 6.7.4.4 or later.
NOTE
If upgrading from version 6.7.4.2 or earlier, an interim upgrade to version 6.7.4.3 might be required. To
determine whether you can upgrade directly to version 6.7.4.4, refer to KB Article 18536.
See SGOS Upgrade/Downgrade documentation for the supported upgrade/downgrade paths for this release.
NOTE
In a future release of 7.x, support for WebFilter (BCWF) will be removed.
Limitations
• See Limitations in SGOS 7.x for a description of limitations in this release.
Known Issues
• See Known Issues in SGOS 7.x for a list of all issues that Symantec is aware of in SGOS 7.x.
113
SGOS 7.x Release Notes
114
SGOS 7.x Release Notes
. When you use the icon to refresh the CPL, the VPM notifies you of the change with a message, "Successfully
refreshed generated CPL."
• All policy rule menu options now have icons:
ID Issue
SG-18496 Fixes an issue where SAML authentication without client redirects did not work.
ID Issue
SG-25363 Addresses potential denial of service attacks when there was a high number of simultaneous URL-based
searches in /CE/Listing_Form.
ID Issue
SG-25564 Fixes an issue where attempting to view Advanced URLs results in an "Encrypted token has expired" message.
This issue occurred when logging in to the console with a non-local admin user.
ID Issue
SG-25035 Fixes an issue where a ZTP-deployed appliance stopped responding when a routers option was not specified in
the DHCP data source.
ID Issue
SG-24969 Fixes an issue where users received error 502 "Content Encoding Error" when going to Facebook.
SG-22988 Fixes an issue where requests including both the Content-Length and Transfer-Encoding headers were
forwarded to the OCS. Now, the Transfer-Encoding: identity header is removed from such requests before being
forwarded.
115
SGOS 7.x Release Notes
ID Issue
SG-24442 Fixes an issue where upgrading from version 6.7.4 to 7.2 did not preserve the previous non-default HTTPS
console ciphers configuration or enable TLS 1.3 by default. This issue occurred if non-default SSL protocols
were selected for the HTTPS console. If the appliance was never upgraded to 7.2.x or 7.3.x previously,
upgrading to this release will preserve the previous ciphers selection and enable TLS 1.3 by default. To apply
the fix if the appliance was previously upgraded to 7.2.x or 7.3.x, you must remove the existing SGOS 7.x
configuration before upgrading. Issue the #remove-sgos7-config command, restart the appliance, and
then install this release.
SG-25199 Fixes an issue where the Management Console exited with an error message, "SSL protocol negotiation failed.
Logging out from Management Console".
ID Issue
SG-25255 Fixes an issue where authentication exceptions or force_deny caused ssl.tunnel transactions to bypass rules
in <forward> layers.
ID Issue
SG-25442 Fixes an issue where existing forwarding host names could not be edited to exceed more than 64 characters.
ID Issue
SG-24931 Fixes an issue where revoked intermediate certificates were added to the cached intermediate certificate list.
ID Issue
SG-13361 Fixes an issue where authenticated sessions persisted across browser sessions.
SG-25594 Fixes an issue where some SSL transactions were unexpectedly not denied. This issue occurred when policy
included denials based on the response and SIPS protocol detection was enabled.
SG-25006 Fixes an issue where users received an "EXCEPTION(tcp_error): Request could not be handled" message when
a site required a client certificate. This issue occurred when upgrading to version 7.2.
SG-25545 Fixes an issue where a site could not be accessed if protocol detection or TLS 1.3 was enabled.
ID Issue
SG-24139 Fixes an issue where outgoing connections intermittently went to an incorrect interface.
116
SGOS 7.x Release Notes
SGOS 7.2.5.1 GA
Release Information
• Release Date: February 4, 2021
• Build Number: 259008
NOTE
SGOS is cumulative. SGOS 7.2.5.1 is based on the SGOS 7.2.4.1 release. In addition, this release includes all
features and fixes that were included in the 6.7.5.9 release.
Supported Platforms
• ProxySG hardware appliances: S200, S400, S410, S500
• Standard/Advanced Reverse Proxy hardware appliances: S200, S400, S410, S500
• High-performance Gen2 virtual appliances: SG-VA, ARP-VA, SRP-VA
See Hardware Appliances and ProxySG Tech Docs for platform documentation.
Compatible With
• BCAAA: 6.1
• Integrated Secure Gateway: 2.1.x and later
• HSM Agent: 2.0 and later
• ProxySG Admin Console: 1.1.1 and later
• Reporter: 9.5.x, 10.1.x, and 10.2.x
• Management Center: 2.2.2.3 and later
NOTE
The new ProxySG Admin Console (SGAC) requires Management Center 2.4.x or later.
• ProxyAV: 3.5.x
• Content Analysis: 2.3.x, and 3.0.x
• ProxyClient: 3.4.x
• Unified Agent: 4.7.x and 4.8.x
• SSL Visibility: 4.2.x, 4.3.x. 4.4.x, 4.5.x, and 5.x
• Web Isolation: 1.10 and later
Third-Party Compatibility
• For supported Java, operating system, and browser versions, refer to KB Article 169081.
• For information on Java 11 support, refer to KB Article 173228.
117
SGOS 7.x Release Notes
disable FIPS mode, and attempt the upgrade again. If you upgrade to 7.2.1.1 without disabling FIPS mode, your
appliance will not function as expected.
• If you are downgrading from ProxySG 7.2.1.1 to a version earlier than 7.2.0.1, ensure that after you downgrade your
policy includes CPL that protects against low strength ciphers (RC4, CBC, DES, and 3DES). These ciphers were
deprecated in 7.2.0.1 and any policy that references them is no longer necessary. For appliances running versions
earlier than 7.2.0.1, use the following CPL:
<ssl>
client.connection.negotiated_cipher=(EXP-RC4-MD5,EXP-RC2-CBC-MD5,EXP-DES-CBC-SHA) force_deny
<ssl>
server.connection.negotiated_cipher=(EXP-RC4-MD5,EXP-RC2-CBC-MD5,EXP-DES-CBC-SHA) force_deny
• When upgrading to 7.2.1.1, your malware scanning configuration is not preserved. After upgrading, reconfigure your
malware scanning. For information, see the SGOS Administration Guide and ProxySG Web Visual Policy Manager
Reference .
• The following are the supported upgrade/downgrade paths for this release:
– Upgrade to 7.2.x from an earlier version 7.x or from version 6.7.4.4 or later. If upgrading from version 6.7.4.2 or
earlier, an interim upgrade to version 6.7.4.3 might be required. To determine whether you can upgrade directly to
version 6.7.4.4, refer to KB Article 18536.
– Downgrade from 7.2.x to to an earlier version 7.x or to version 6.7.4.4 or later.
See SGOS Upgrade/Downgrade documentation for the supported upgrade/downgrade paths for this release.
NOTE
In a future release of 7.x, support for WebFilter (BCWF) will be removed.
Limitations
• See Limitations in SGOS 7.x for a description of limitations in this release.
Known Issues
• See Known Issues in SGOS 7.x for a list of all issues that Symantec is aware of in SGOS 7.x.
118
SGOS 7.x Release Notes
details, and provide the payload to the appliance. Additionally, if you are using Management Center to manage your
ProxySG appliances, ZTP can automatically register the ProxySG appliance with Management Center.
NOTE
ZTP can only be performed on an appliance that is in a factory-reset state.
ZTP is available for all physical S-series appliances and the following virtual platforms:
• AWS
• Azure
• Cisco Cloud Services Platform
• ESXi
• KVM
• Microsoft Hyper-V
NOTE
ZTP is not currently available for ProxySG applications running on Integrated Secure Gateway.
119
SGOS 7.x Release Notes
Full information:
• ProxySG Web Visual Policy Manager Reference
120
SGOS 7.x Release Notes
ID Issue
SG-22694 Fixes an issue where the appliance restarted due to multiple log upload threads attempting to simultaneously
initialize the SSL cryptographic parameters.
SG-24708 Fixes an issue where the HTTP transaction timing fields (x-cs-rp-https-handshake-time, x-cs-https-handshake-
time, and x-sr-https-handshake-time) in the access log generate a "-" or a "0" in log output regardless of the
latency coming from the client or server.
ID Issue
SG-23880 Fixes an issue where the appliance restarted after memory was released for an invalid memory pointer.
SG-23983 Fixes an issue where the appliance experience high CPU and memory consumption due to memory
fragmentation.
ID Issue
SG-4624 Fixes an issue where the s-action access log field was sometimes not populated when ICAP REQMOD mirroring
was enabled.
ID Issue
SG-20158 Fixes an issue where certain ICAP threads were not terminated and caused memory leaks when ICAP
REQMOD mirroring was enabled.
ID Issue
SG-23811 Fixes an issue where the response time for health checks was longer than expected when the appliance was
sending Content Analysis traffic to the ICAP broker.
ID Issue
SG-22312 Fixes an issue where a memory leak occurred due to processing MS-TURN traffic, which is a protocol used by
Skype for Business.
121
SGOS 7.x Release Notes
ID Issue
SG-21244 Fixes an issue where exception pages that were greater than 8080 bytes did not display in the browser.
SG-24288 Fixes an issue where authenticating traffic via NTLM with BCAAA did not work in 7.2.4.1.
SG-24326 Fixes an issue where accessing the /dme/configuration advanced URL caused the license key auto-update
feature to be enabled when it was originally set to disabled.
ID Issue
SG-2311 Fixes an issue where a new intermediate CA certificate that had the same subject name as a expired or revoked
CA certificate could not replace the current expired or revoked CA certificate.
SG-23828 Fixes an issue where the appliance experienced a memory leak when handling HTTPS reverse proxy traffic with
forward-client-cert enabled.
ID Issue
SG-24706 Fixes an issue where the ProxySG Admin Console experienced a restart because the PCAP stack was not large
enough to handle all the filter expressions.
SG-24065 Fixes an issue where the appliance listed the strength for the dhe-dss-des-cbc3-sha cipher as "high" when
OpenSSL classifies the cipher as "medium" strength.
ID Issue
SG-24034 Fixes an issue where the appliance did not notify users that WCCP did not start after a reboot. Now when WCCP
does not start after a reboot, error messages are logged in the debug log.
SG-24810 Fixes an issue where the appliance experienced a restart when an HTTP/2 transaction could not be completed
due to a null socket.
ID Issue
SG-24231 Fixes an issue where the appliance experienced a restart when testing the category of a URL in the format of an
email address (for example, "/ContentFilter/TestUrl/[email protected]").
122
SGOS 7.x Release Notes
SGOS 7.2.4.1 GA
Release Information
• Release Date: December 10, 2020
• Build Number: 257580
NOTE
SGOS is cumulative. SGOS 7.2.4.1 is based on the SGOS 7.2.3.1 release. In addition, this release includes all
features and fixes that were included in the 6.7.5.8 release.
Supported Platforms
• ProxySG hardware appliances: S200, S400, S410, S500
• Standard/Advanced Reverse Proxy hardware appliances: S200, S400, S410, S500
• High-performance Gen2 virtual appliances: SG-VA, ARP-VA, SRP-VA
See Hardware Appliances and ProxySG Tech Docs for platform documentation.
Compatible With
• BCAAA: 6.1
• Integrated Secure Gateway: 2.1.x and later
• HSM Agent: 2.0 and later
• ProxySG Admin Console: 1.1.1 and later
• Reporter: 9.5.x, 10.1.x, and 10.2.x
• Management Center: 2.2.2.3 and later
NOTE
The new ProxySG Admin Console (SGAC) requires Management Center 2.4.x or later.
• ProxyAV: 3.5.x
• Content Analysis: 2.3.x, and 3.0.x
• ProxyClient: 3.4.x
• Unified Agent: 4.7.x and 4.8.x
• SSL Visibility: 4.2.x, 4.3.x. 4.4.x, 4.5.x, and 5.x
• Web Isolation: 1.10 and later
Third-Party Compatibility
• For supported Java, operating system, and browser versions, refer to KB Article 169081.
• For information on Java 11 support, refer to KB Article 173228.
123
SGOS 7.x Release Notes
disable FIPS mode, and attempt the upgrade again. If you upgrade to 7.2.1.1 without disabling FIPS mode, your
appliance will not function as expected.
• If you are downgrading from ProxySG 7.2.1.1 to a version earlier than 7.2.0.1, ensure that after you downgrade your
policy includes CPL that protects against low strength ciphers (RC4, CBC, DES, and 3DES). These ciphers were
deprecated in 7.2.0.1 and any policy that references them is no longer necessary. For appliances running versions
earlier than 7.2.0.1, use the following CPL:
<ssl>
client.connection.negotiated_cipher=(EXP-RC4-MD5,EXP-RC2-CBC-MD5,EXP-DES-CBC-SHA) force_deny
<ssl>
server.connection.negotiated_cipher=(EXP-RC4-MD5,EXP-RC2-CBC-MD5,EXP-DES-CBC-SHA) force_deny
• When upgrading to 7.2.1.1, your malware scanning configuration is not preserved. After upgrading, reconfigure your
malware scanning. For information, see the SGOS Administration Guide and ProxySG Web Visual Policy Manager
Reference .
• The following are the supported upgrade/downgrade paths for this release:
– Upgrade to 7.2.x from an earlier version 7.x or from version 6.7.4.4 or later. If upgrading from version 6.7.4.2 or
earlier, an interim upgrade to version 6.7.4.3 might be required. To determine whether you can upgrade directly to
version 6.7.4.4, refer to KB Article 18536.
– Downgrade from 7.2.x to to an earlier version 7.x or to version 6.7.4.4 or later.
See SGOS Upgrade/Downgrade documentation for the supported upgrade/downgrade paths for this release.
NOTE
In a future release of 7.x, support for WebFilter (BCWF) will be removed.
Limitations
• See Limitations in SGOS 7.x for a description of limitations in this release.
Known Issues
• See Known Issues in SGOS 7.x for a list of all issues that Symantec is aware of in SGOS 7.x.
Authenticated NTP
You can now specify NTP servers that support authentication where the time messages will be authenticated using
symmetric-key encryption. After you obtain a key ID, unique encryption key, and key type from the NTP server authority,
you can add the information to the ProxySG appliance. Currently, the appliance supports SHA1 key type.
124
SGOS 7.x Release Notes
125
SGOS 7.x Release Notes
Full information:
• Content Policy Language Reference
126
SGOS 7.x Release Notes
• x-client-dnslookup-time : Total time taken (in ms) to perform the client DNS lookup.
• x-server-dnslookup-time : Total time taken (in ms) to perform the server DNS lookup.
ID Issue
SG-18288 Fixes an issue where access logs using a custom log format could not be uploaded via Kafka client to the broker.
ID Issue
SG-23666 Fixes an issue where the Web Visual Policy Manager did not prompt users to sign in again after the session
expired.
SG-23644 Fixes an issue by adding the IP address of the client to the event log message when the appliance receives a
Krb5 replay error.
SG-22754 Fixes an issue where users received "Appliance Error (configuration_error). Your request could not be processed
because of a configuration error. 'User has been logged out.'" This issue occurred when surrogate credentials
expired with SAML authentication.
SG-21796 Addresses an issue where the appliance experienced a page fault (error code 0x4) within process
"libauthenticator.exe.so" (0x40015).
SG-23208 Fixes an issue where the appliance experienced high memory usage in HTTP policy evaluation.
SG-22479 Fixes an issue where users experienced a redirect loop when using Chrome. This issue occurred because
Chrome refused authentication cookies for not having Secure and SameSite=none properties.
SG-23878 Addresses an issue where authenticated users were allowed to access the HTTPS-Console service even
though Management Console login banner (Notice and Consent Banner) policy was configured in the VPM. This
occurred if CPL policy layers were not ordered correctly.
ID Issue
SG-23589 Fixes a race condition where opening up a cached object sometimes resulted in the appliance to stop
responding.
127
SGOS 7.x Release Notes
ID Issue
SG-20625 Fixes an issue where client machines lost connectivity to file shares after waking from sleep mode.
ID Issue
ID Issue
SG-22935 Fixes an issue where the appliance sent diagnostic reports to Symantec if the appliance was reinitialized.
Reinitialization is not an issue and does not require reports.
ID Issue
SG-22815 Fixes a timing issue where the appliance would stop responding when modifying an access log in configuration.
SG-22116 Addresses an issue where the appliance experienced a restart in PG_HEALTH_CHECKS process: "HC
Watchdog" in "" at .text+0x0 SWE : 0x3a0004.
ID Issue
SG-22779 Fixes an issue where the appliance experienced a restart after receiving an invalid request when using HTTP/2
and SSLV offload.
SG-23197 Fixes an issue where the appliance experienced a restart when there were multiple concurrent HTTP/2 requests
and the web server closed the connection.
SG-23441 Fixes an issue where some webpages would not render correctly when an SSL Visibility appliance was
decrypting traffic.
SG-20969 Addresses an issue where the appliance experienced a page fault in process group "PG_HTTP" and process
"HTTP SW 109E777BA40 for 108F240BA40" in "libc.so" at .text+0x16b8c.
SG-20587 Fixes an issue where the policy trace and access log did not show categorization information. This issue
occurred when a tenant matched policy rules after the categorization occurred.
SG-14408 Fixes an issue where Websocket tunnels inflated some HTTP transaction time statistics.
ID Issue
SG-19149 Fixes an issue where patience pages took long to load when uploading a file for ICAP scanning. The issue
occurred if the filename contained an ampersand character (&).
128
SGOS 7.x Release Notes
ID Issue
SG-22879 Fixes an issue where configured routing tables on the appliance were not preserved after upgrading from version
6.7.5.6 to a later 6.7.x or 7.x.
ID Issue
SG-23360 Fixes an issue where adding a C16XS model to Integrated Secure Gateway resulted in "Warning: Non-standard
memory configuration detected."
ID Issue
SG-21976 Fixes an issue where ProxySG instances running on Hyper-V and Azure experienced a reduction in
performance due to batch processing being enabled.
ID Issue
SG-23369 Fixes an issue where forwarding groups did not balance the load equally when members of the group were in a
failure state.
ID Issue
SG-23117 Fixes an issue where the appliance could not establish outbound connections using TLS 1.3 for Java
applications.
SG-23380 Fixes an issue where server.certificate.validate.cclpolicy did not apply to tunneled SSL
transactions.
SG-22606 Addresses an issue where the appliance stopped responding in process group: "PG_CFSSL" and process:
"SSLW 21BB8E14F90" in "libc.so" at .text+0x168cd.
ID Issue
SG-23060 Fixes an issue where the appliance experienced a restart after upgrading in SGOS 7.2.2.1 when tunnel-on-
protocol-error was enabled and a set of cascading SSL errors occurs.
ID Issue
SG-22295 Addresses an issue where the Secure Web Gateway V100 platform experienced a restart in process group:
"PG_OBJECT_STORE" and process: "CEA Cache Administrator" in "" at .text+0x0.
129
SGOS 7.x Release Notes
ID Issue
SG-23245 Fixes an issue where a requested URL matched policy for "None" category even though the URL was
categorized in the local database.
130
SGOS 7.x Release Notes
SGOS 7.2.3.2 PR
Release Information
• Release Date: November 11, 2020
• Build Number: 256747
Supported Platforms
• ProxySG hardware appliances: S200, S400, S410, S500
• Standard/Advanced Reverse Proxy hardware appliances: S200, S400, S410, S500
• High-performance Gen2 virtual appliances: SG-VA, ARP-VA, SRP-VA
See Hardware Appliances and ProxySG Tech Docs for platform documentation.
Compatible With
• BCAAA: 6.1
• Integrated Secure Gateway: 2.1.x and later
• HSM Agent: 2.0 and later
• ProxySG Admin Console: 1.1.1 and later
• Reporter: 9.5.x, 10.1.x, and 10.2.x
• Management Center: 2.2.2.3 and later
NOTE
The new ProxySG Admin Console (SGAC) requires Management Center 2.4.x or later.
• ProxyAV: 3.5.x
• Content Analysis: 2.3.x, and 3.0.x
• ProxyClient: 3.4.x
• Unified Agent: 4.7.x and 4.8.x
• SSL Visibility: 4.2.x, 4.3.x. 4.4.x, 4.5.x, and 5.x
• Web Isolation: 1.10 and later
Third-Party Compatibility
• For supported Java, operating system, and browser versions, refer to KB Article 169081.
• For information on Java 11 support, refer to KB Article 173228.
131
SGOS 7.x Release Notes
<ssl>
client.connection.negotiated_cipher=(EXP-RC4-MD5,EXP-RC2-CBC-MD5,EXP-DES-CBC-SHA) force_deny
<ssl>
server.connection.negotiated_cipher=(EXP-RC4-MD5,EXP-RC2-CBC-MD5,EXP-DES-CBC-SHA) force_deny
• When upgrading to 7.2.1.1, your malware scanning configuration is not preserved. After upgrading, reconfigure your
malware scanning. For information, see the SGOS Administration Guide and ProxySG Web Visual Policy Manager
Reference .
• The following are the supported upgrade/downgrade paths for this release:
– Upgrade to 7.2.1.1 from version 6.7.4.3 and later 6.7.x releases, or another version 7.x.
– Downgrade from 7.2.1.1 to version 6.7.4.3 and later 6.7.x releases, or another version of 7.x.
NOTE
If upgrading from SGOS 6.7.4.2 or earlier, you might have to upgrade to version 6.7.4.3 as an interim step
before upgrading to this release. For more information, refer to KB Article 18536
See SGOS Upgrade/Downgrade documentation for the supported upgrade/downgrade paths for this release.
NOTE
In a future release of 7.x, support for WebFilter (BCWF) will be removed.
Limitations
• See Limitations in SGOS 7.x for a description of limitations in this release.
Known Issues
• See Known Issues in SGOS 7.x for a list of all issues that Symantec is aware of in SGOS 7.x.
ID Issue
SG-22202 Addresses an issue where instances launched from the AWS Marketplace failed to complete bootstrapping
and were unable to boot up. This issue affected only newly-created instances and instances where
a #restore-defaults factory-defaults was issued in version 7.x. Version 6.7.x was
unaffected.
132
SGOS 7.x Release Notes
ID Issue
SG-21726 Fixes an issue where HSM health check entries were missing after updating the HSM configuration.
SG-23269 Addresses an issue where the appliance stopped responding in process group: "PG_HEALTH_CHECKS"
and process: "HC Watchdog" in "" at .text+0x0.
SG-23525 Addresses an issue where the appliance stopped responding in process group: "PG_HEALTH_CHECKS"
and process: "HC Worker hsm.lunasp1p-nc" in "libcfssl.exe.so" at .text+0x3276fd.
ID Issue
SG-13787 Fixes an issue where new HSM health checks were lost after a restart. This issue occurred when the HSM
names contained upper-case letters.
If you add an HSM whose name contains upper-case letters, the name is converted to lower-case. To
configure or refer to the HSM in the CLI, you must use the lower-case name. For example, if you add an
HSM called EastHSM1, the name is converted to easthsm1. To edit the HSM, specify the lower-case name
as in #(config)edit hsm easthsm1 . You can verify HSM names using the #show ssl hsm
command
Note that this fix applies to newly-created HSMs only. Any existing HSMs whose names contain upper-case
letters will continue to have failed health checks.
SG-23630 Addresses an issue where the appliance stopped responding in process group: "PG_SSL_KEY2K" and
process: "** NO NAME **" in "libcfssl.exe.so" at .text+0x2fc493.
133
SGOS 7.x Release Notes
SGOS 7.2.3.1 GA
Release Information
• Release Date: September 28, 2020
• Build Number: 254850
NOTE
SGOS is cumulative. SGOS 7.2.3.1 is based on the SGOS 7.2.2.1 release. In addition, this release includes all
features and fixes that were included in the 6.7.5.7 release.
Supported Platforms
• ProxySG hardware appliances: S200, S400, S410, S500
• Standard/Advanced Reverse Proxy hardware appliances: S200, S400, S410, S500
• High-performance Gen2 virtual appliances: SG-VA, ARP-VA, SRP-VA
See Hardware Appliances and ProxySG Tech Docs for platform documentation.
Compatible With
• BCAAA: 6.1
• Integrated Secure Gateway: 2.1.x and later
• HSM Agent: 2.0 and later
• ProxySG Admin Console: 1.1.1 and later
• Reporter: 9.5.x, 10.1.x, and 10.2.x
• Management Center: 2.2.2.3 and later
NOTE
The new ProxySG Admin Console (SGAC) requires Management Center 2.4.x or later.
• ProxyAV: 3.5.x
• Content Analysis: 2.3.x, and 3.0.x
• ProxyClient: 3.4.x
• Unified Agent: 4.7.x and 4.8.x
• SSL Visibility: 4.2.x, 4.3.x. 4.4.x, 4.5.x, and 5.x
• Web Isolation: 1.10 and later
Third-Party Compatibility
• For supported Java, operating system, and browser versions, refer to KB Article 169081.
• For information on Java 11 support, refer to KB Article 173228.
134
SGOS 7.x Release Notes
deprecated in 7.2.0.1 and any policy that references them is no longer necessary. For appliances running versions
earlier than 7.2.0.1, use the following CPL:
<ssl>
client.connection.negotiated_cipher=(EXP-RC4-MD5,EXP-RC2-CBC-MD5,EXP-DES-CBC-SHA) force_deny
<ssl>
server.connection.negotiated_cipher=(EXP-RC4-MD5,EXP-RC2-CBC-MD5,EXP-DES-CBC-SHA) force_deny
• When upgrading to 7.2.1.1, your malware scanning configuration is not preserved. After upgrading, reconfigure your
malware scanning. For information, see the SGOS Administration Guide and ProxySG Web Visual Policy Manager
Reference .
• The following are the supported upgrade/downgrade paths for this release:
– Upgrade to 7.2.1.1 from version 6.7.4.3 and later 6.7.x releases, or another version 7.x.
– Downgrade from 7.2.1.1 to version 6.7.4.3 and later 6.7.x releases, or another version of 7.x.
NOTE
If upgrading from SGOS 6.7.4.2 or earlier, you might have to upgrade to version 6.7.4.3 as an interim step
before upgrading to this release. For more information, refer to KB Article 18536
See SGOS Upgrade/Downgrade documentation for the supported upgrade/downgrade paths for this release.
NOTE
In a future release of 7.x, support for WebFilter (BCWF) will be removed.
Limitations
• See Limitations in SGOS 7.x for a description of limitations in this release.
Known Issues
• See Known Issues in SGOS 7.x for a list of all issues that Symantec is aware of in SGOS 7.x.
135
SGOS 7.x Release Notes
ID Issue
SG-21506 Fixes an issue where the s-action and sc-filter-result fields returned incorrect values when a
connection was blocked.
ID Issue
SG-13697 Fixes an issue where users intermittently received a “Failure to authenticate a tunneled SSL request” error.
This issue occurred in explicit deployments.
SG-21605 Fixes an issue where CAPTCHA validator configuration failed with an error message, "Redirect URL
<URL> suffix is not found in generated list."
SG-22524 Fixes an issue where a SAML attribute that is no longer referenced in a SAML realm cannot be deleted.
SG-21196 Fixes an issue where the appliance failed to join an Active Directory (AD) domain. This issue occurred
when the appliance used AD site information from different forests.
SG-20114 Fixes an issue where the appliance stopped responding after LDAP server connections were incorrectly
determined to be pending.
ID Issue
SG-22439 Addresses an unexpected restart in SWE: 0x0 HWE: 0x40018 PFLA: 0x0 in PG_OBJECT_STORE
Process: "CEA Cache Administrator" in "" at .text+0x0.
ID Issue
SG-16671 Fixes an issue where changes to the drtr.rating_service health check did not persist after issuing
the #restart regular command.
136
SGOS 7.x Release Notes
ID Issue
SG-4886 Fixes an issue where chunked encoded responses with invalid data were handled incorrectly.
SG-20669 Addresses an issue where the appliance stops responding in context "PG_HTTP Process: "HTTP SW
21301F91A40 for 115F4961A40" in "libhttp.exe.so". This issue occurred on the SG-S500 platform.
ID Issue
SG-21741 Fixes an issue where selecting a keyring in SSL proxy service configuration in the Management Console
returned the message "Keyring <name> not found". This issue occurred when the keyring name included
spaces.
SG-19397 Fixes an issue where clicking the Documentation and Support links in the Management Console
displayed incorrect web pages.
ID Issue
ID Issue
SG-21637 Fixes an issue where WebPulse requests sometimes returned an "unavailable" status.
ID Issue
SG-11869 Fixes an issue where the SNMP response from the appliance returned a value of 5 bytes for
DeviceDiskTimeStamp; SNMP Manager accepts only 4 bytes.
SG-20949 Fixes an issue where using smilint on BLUECOAT-SG-AUTHENTICATION-MIB.txt resulted in numerous
error messages.
ID Issue
137
SGOS 7.x Release Notes
ID Issue
SG-20688 Fixes an issue where ProxySG certificate validation failed incorrectly. This issue occurred when the
server certificate's chain of trust was rooted to an expired issuer certificate authority (CA), but was also
cross-signed to a valid trusted CA. Now, when the primary certificate chain has an expired issuer CA, the
alternate chain is validated if it is not expired.
ID Issue
SG-18062 Fixes an issue where frequent policy installations resulted in high memory consumption.
SG-22396 Addresses an issue where the appliance stopped responding in process group "PG_SSL_HNDSHK"
Process: "HTTP SW 30F72E24A40 for 40D8A6E8A40" in "kernel.exe" at .text+0x1336fbc.
SG-17320 Fixes an issue where memory leaks occurred when running RWT scripts with SSLV offload enabled.
SG-22173 Fixes an issue where users received HTTP error 400 because client SSL certificates were not sent in
forward proxy mode.
ID Issue
ID Issue
SG-12989 Fixes an issue where the CLI was unresponsive after issuing the #clear-arp CLI command. This issue
occurred if routing domains were configured.
SG-20553 Addresses an issue where the appliance stopped responding in process group: "PG_TCPIP" Process:
"CLI_Worker_2" in "libstack.exe.so" at .text+0x42da71.
SG-21850 Fixes an issue where memory usage was high due to too many packets in the netisr queue.
SG-21879 Fixes an issue where a network interface was unstable during peak hours.
ID Issue
SG-19054 Fixes an issue where thresholds for CPU throttling set via #(config content-filter)cpu-
throttle disk <low> <high> did not persist after a reboot.
138
SGOS 7.x Release Notes
SGOS 7.2.2.1 GA
Release Information
• Release Date: August 17, 2020
• Build Number: 253750
NOTE
SGOS is cumulative. SGOS 7.2.2.1 is based on the SGOS 7.2.1.1 release. In addition, this release includes all
features and fixes that were included in the 6.7.5.6 release.
Supported Platforms
• ProxySG hardware appliances: S200, S410, S500
• Standard/Advanced Reverse Proxy hardware appliances: S200, S400, S500
• High-performance Gen2 virtual appliances: SG-VA, ARP-VA, SRP-VA
See Hardware Appliances and ProxySG Tech Docs for platform documentation.
Compatible With
• BCAAA: 6.1
• Integrated Secure Gateway: 2.1.x and later
• HSM Agent: 2.0 and later
• ProxySG Admin Console: 1.1.1 and later
• Reporter: 9.5.x, 10.1.x, and 10.2.x
• Management Center: 2.2.2.3 and later
NOTE
The new ProxySG Admin Console (SGAC) requires Management Center 2.4.x or later.
• ProxyAV: 3.5.x
• Content Analysis: 2.3.x, and 3.0.x
• ProxyClient: 3.4.x
• Unified Agent: 4.7.x and 4.8.x
• SSL Visibility: 4.2.x, 4.3.x. 4.4.x, 4.5.x, and 5.x
• Web Isolation: 1.10 and later
Third-Party Compatibility
• For supported Java, operating system, and browser versions, refer to KB Article 169081.
• For information on Java 11 support, refer to KB Article 173228.
139
SGOS 7.x Release Notes
See SGOS Upgrade/Downgrade documentation details the supported upgrade/downgrade paths for this release.
NOTE
In a future release of 7.x, support for WebFilter (BCWF) will be removed.
Limitations
• See Limitations in SGOS 7.x for a description of limitations in this release.
Known Issues
• See Known Issues in SGOS 7.x for a list of all issues that Symantec is aware of in SGOS 7.x.
140
SGOS 7.x Release Notes
More information:
• Command Line Interface Reference
141
SGOS 7.x Release Notes
ID Issue
ID Issue
SG-18357 Fixes an issue where authentication was impacted by Google Chrome's option for SameSite secure cookie
settings being enabled by default.
SG-12666 Fixes an issue where appliance experienced CAC performance issues.
SG-8116 Fixes an issue where "undefined" appears instead of "admin" in the logout URL of the Management
Console.
SG-18417 Fixes an issue where the appliance experienced a page-fault restart in process "likewise
Lwbase_EventThread" in "liblikewise.exe.so" at .text+0x5311a8.
SG-19013 Fixes an issue where the appliance could not join the active directory in GCP because its hostname was
too long.
SG-20312 Fixes an issue where the CAPTCHA form was not displayed when using CAPTCHA authentication.
ID Issue
BCAAA-7 Fixes an issue where a security change in Windows Server 2019 prevented Windows SSO from receiving
authenticated users from domain controllers. When this issue occurred, the BCAAA log displayed the
message "Cannot query domain controller <IP_address>; status=5:0x5:Access is denied". This fix
requires additional configuration steps; refer to KB article 194792 for instructions.
ID Issue
SG-20885 Addresses an issue where the appliance stopped responding in Process group: "PG_OBJECT_STORE"
Process: "CEA Cache Administrator".
142
SGOS 7.x Release Notes
ID Issue
SG-21358 Fixes an issue whereshow xml-config concise output was inconsistent with previous versions of
SGOS.
SG-18306 Fixes an issue where the appliance did not log a message in the event log when the command #(config
ssh-console)delete client-key client_key_name was issued.
SG-17715 Fixes an issue where the character "?" was removed from data that the appliance imported.
ID Issue
ID Issue
SG-21465 Addresses exceptions in DNS health checks in a SWG VA on Microsoft Azure deployment.
ID Issue
SG-14656, SG-20825 Fixes an issue where HTTPS health check connections to servers with multiple virtual hosts failed. When
this issue occurred, the server returned a certificate containing a different CN from the one specified in
configuration.
ID Issue
SG-20933 Addresses an issue where the appliance stopped responding with HE 0xE (page fault) in process H2 CCH-
* in libc.so.
SG-18526 Fixes an issue where the appliance sometimes experienced a restart when request.icap_mirror(yes) was
triggered in policy under some circumstances.
SG-20412 Fixes an issue introduced in version 6.7.5.3 where large amounts of IPv4 ARP traffic sometimes caused
the appliance to restart. This issue was not likely to occur in deployments with fewer appliances on the
same network.
ID Issue
SG-18900 Fixes an issue where the appliance's performance was affected by the monitoring and logging for long-
running ICAP REQMOD transactions.
SG-18842 Fixes an issue where the Event Log did not capture the duration of deferred ICAP RESPMOD transactions
in the log details.
143
SGOS 7.x Release Notes
ID Issue
SG-21332 Fixes an issue where Secure Web Gateway virtual appliances running on Hyper-V or Microsoft Azure
platforms with multiple network interfaces stopped processing on one or more interfaces, causing the VA to
stop responding.
This fix introduces an issue where the VA experiences lower throughput and performance (up to 10%)
compared to other virtualization environments.
SG-21298 Addresses an issue where the appliance stopped responding in process Group:"" Process:"kernel.exe".
ID Issue
SG-15223 Fixes an issue where MAPI handoff broke during the export of large uncached attachments to the PST file
from the Online Archive folder.
ID Issue
SG-17978 Fixes an issue where the browser address bar showed an incorrect URL after successful LDAP
authentication.
SG-18066 Fixes an issue where quota policy failed to compile on a new installation of version 7.2.1.1.
SG-13680 Fixes an issue where certain websites were incorrectly denied due to domain fronting detection CPL.
SG-19826 Fixes an issue where the appliance attempted to contact servers when policy contained deny or
access_server(no) CPL in a Web Request layer.
SG-19540 Fixes an issue where the appliance experienced a restart when returning an exception page.
SG-22028 Addresses an issue where the appliance stopped responding in Process: "CLI_Worker_0" in "kernel.exe"
at .text+0x12d6564.
ID Issue
SG-20565 Addresses an issue where the appliance stopped responding in PG_HEALTH_CHECKS in Process "HC
Watchdog" in "" at .text+0x0.
ID Issue
SG-20925 Fixes an issue where the BLUECOAT-SG-PROXY-MIB contained an invalid date. Download the latest MIB
files from the Broadcom download portal.
144
SGOS 7.x Release Notes
ID Issue
SG-18193 Fixes an issue where the HTTP CONNECT hostname was not rewritten according to rewrite() policy
when proxy forwarding was enabled.
SG-21147 Fixes an issue where the SNI hostname was not rewritten according to rewrite() policy in the initial
proxied connection.
SG-21748 Fixes an issue where the appliance does not request a client certificate for TLS 1.3 in reverse proxy mode
although the HTTPS service is configured to forward the client certificate.
SG-17104 Addresses an issue where the appliance stopped responding in PG: "PG_SSL_HNDSHK": Process:
"SSLW 10B8E433FB0" in "libshared_dll.exe.so" at .text+0x2273ce.
SG-20873 Fixes an issue where uninitialized memory could cause the appliance to stop responding.
SG-18971 Fixes an issue where SSL Proxy transactions were restarted when tunneled.
SG-19324 Fixes an issue where an HTTP memory leak would occur when traffic was intercepted on a policy
exception.
SG-18241 Fixes an issue where expired trust package certificates were used instead of valid certificates.
SG-16627 Fixes an issue where the appliance experienced a restart in process group "PG_SSL_HNDSHK" in process
"cag.subscription" in "kernel.exe" at ".text+0x131e8ba"
SG-19710 Fixes an issue where ssl.forward_proxy(no) and ssl.forward_proxy(on_exception)
policy was not applied to TLS 1.3 tunneled sessions.
SG-18824 Fixes an issue introduced in 6.7.5.2 where the appliance experienced a restart when a forwarding rule was
configured for tunneled SSL traffic.
SG-19040 Fixes an issue where the negotiated-cipher fields in the access log show "unknown" for tunneled TLS 1.3
connections.
SG-19728 Fixes an issue where guest authentication was unexpectedly applied, causing users to be denied access to
sites.
SG-17859 Fixes an issue where the appliance unexpectedly reached a force_deny verdict in policy evaluation due
to missing HTTP request attributes.
SG-19727 Fixes an issue where the forwarding rules were ignored when a verdict was reached in an ssl.tunnel
transaction.
SG-19407 Fixes an issue where the appliance did not close connections with a TCP RESET that received force_deny
and force_exception verdicts.
SG-18488 Fixes an issue where appliance forwarded some but not all CH bytes and could not tunnel on error for
SSLv2 traffic.
ID Issue
SG-20787 Fixes an issue where TLS 1.3 did not work in reverse proxy when a keylist was specified.
SG-20736 Fixes an issue where users received HTTP error 403 with multi-tenant policy installed. The policy worked
as expected in version 6.7.5.3, but not in version 7.2.x.
SG-19003 Fixes an issue where Tunneled TLS 1.2 SSL connections failed with an SSL failed error message.
SG-19215 Fixes an issue where the appliance displayed an error message that keylists an keyrings names cannot be
identical, but saved configurations that contained identical names.
SG-9186 Fixes an issue where WebPulse service health checks failed after setting a default OSCP responder.
145
SGOS 7.x Release Notes
ID Issue
SG-18246 Fixes an issue introduced in version 6.7.4.9 where server connections were not reused in an HTTPS
reverse proxy deployment.
SG-17567 Fixes an issue where memory usage per connection increased significantly when the appliance reached
the maximum number of HTTPS connections via SSL tunnel and detect protocol was enabled.
ID Issue
SG-18207 Fixes an issue where offloading to an SSL Visibility appliance was not working.
ID Issue
SG-20407 Fixes an issue where the appliance sent TCP window update packets to the client via an incorrect
interface.
SG-17255 Fixes an issue where updating the WCCP home router in the Management Console would cause the
current WCCP group to disappear from the Management Console.
SG-17191 Fixes an issue where the appliance experienced a restart in process group "PG_TCPIP" in process
"WCCP_Admin" in "libstack.exe.so".
SG-18438 Fixes an issue where the appliance experienced a restart in process group "PG_TCPIP" in process "SSLW
13CE432FFB0" in "libstack.exe.so" at ".text+0x579d5b".
SG-18876 Fixes an issue where the appliance experienced a restart in process group "PG_TCPIP" in process "stack-
admin" in "libstack.exe.so" at ".text+0x5471ee".
SG-9432 Fixes an issue where the appliance's boot up was delayed or could not be completed if offline DNS servers
appeared in the list of servers before online servers in the primary group or alternate groups if all primary
DNS servers were offline.
SG-19941 Fixes an issue where the appliance experienced a restart when removing a non-configured IPv6 address
from the VLAN.
SG-18333 Fixes an issue where the final TCP reset (RST) uses a different interface from the rest of the TCP
conversation.
SG-19960 Addresses an issue where the appliance experienced a restart in process group: "PG_TCPIP" Process:
"CLI_Worker_0" in "libstack.exe.so" at .text+0x435ed7.
SG-20486 Addresses an issue where the appliance experienced a restart in process "SSLW 80F319F0FA0" in
"libstack.exe.so" at .text+0x4f1e1a.
SG-18519 Fixes an issue where responses to SNMP polls were sent to the default routing domain interface even
though SNMP traffic was configured for a different routing domain.
ID Issue
SG-19940 Fixes an issue where TCP-Tunneling/tunnel-stats did not display IPv6 server address.
SG-9860 Fixes an issue where a large number of idle TCP tunnel connections and a high rate of policy reloading
caused a large increase in memory consumption.
146
SGOS 7.x Release Notes
ID Issue
SG-20277 Fixes an issue where clicking Install Policy multiple times cleared all VPM policy, despite a message
indicating that installation was in progress.
147
SGOS 7.x Release Notes
SGOS 7.2.1.1 GA
Release Information
• Release Date: May 29, 2020
• Build Number: 250985
NOTE
SGOS is cumulative. SGOS 7.2.1.1 is based on the SGOS 6.7.5.2 release. In addition, this release includes all
features and fixes that were included in the 7.1.1.1 and 7.2.0.1 releases.
Supported Platforms
• ProxySG hardware appliances: S200, S400, S500
• Standard/Advanced Reverse Proxy hardware appliances: S200, S400, S500
• High-performance Gen2 virtual appliances: SG-VA, ARP-VA, SRP-VA
See Hardware Appliances and ProxySG Tech Docs for platform documentation.
Compatible With
• BCAAA: 6.1
• HSM Agent: 2.0 and later
• ProxySG Admin Console: 1.1.1 and later
• Reporter: 9.5.x, 10.1.x, and 10.2.x
• Management Center: 2.2.2.3 and later
NOTE
The new ProxySG Admin Console (SGAC) requires Management Center 2.4.x or later.
• ProxyAV: 3.5.x
• Content Analysis: 2.3.x, and 3.0.x
• ProxyClient: 3.4.x
• Unified Agent: 4.7.x and 4.8.x
• SSL Visibility: 4.2.x, 4.3.x. 4.4.x, 4.5.x, and 5.x
• Web Isolation: 1.10 and later
Third-Party Compatibility
• For supported Java, operating system, and browser versions, refer to KB Article 169081.
• For information on Java 11 support, refer to KB Article 173228.
148
SGOS 7.x Release Notes
deprecated in 7.2.0.1 and any policy that references them is no longer necessary. For appliances running versions
earlier than 7.2.0.1, use the following CPL:
<ssl>
client.connection.negotiated_cipher=(EXP-RC4-MD5,EXP-RC2-CBC-MD5,EXP-DES-CBC-SHA) force_deny
<ssl>
server.connection.negotiated_cipher=(EXP-RC4-MD5,EXP-RC2-CBC-MD5,EXP-DES-CBC-SHA) force_deny
• The following are the supported upgrade/downgrade paths for this release:
– Upgrade to 7.2.1.1 from version 6.7.4.3 and later 6.7.x releases, or another version 7.x.
– Downgrade from 7.2.1.1 to version 6.7.4.3 and later 6.7.x releases, or another version of 7.x.
NOTE
If upgrading from SGOS 6.7.4.2 or earlier, you might have to upgrade to version 6.7.4.3 as an interim step
before upgrading to this release. For more information, refer to KB Article 18536
See SGOS Upgrade/Downgrade documentation for the supported upgrade/downgrade paths for this release.
NOTE
In a future release of 7.x, support for WebFilter (BCWF) will be removed.
Limitations
• See Limitations in SGOS 7.x for a description of limitations in this release.
Known Issues
• See Known Issues in SGOS 7.x for a list of all issues that Symantec is aware of in SGOS 7.x.
149
SGOS 7.x Release Notes
Admin Console focuses on replacing the most commonly utilized configuration and workflow steps, with additional
releases to follow.
The ProxySG Admin Console is not associated with SGOS releases; thus, you can access new workflows and
configurations without having to change your SGOS version.
To access the Admin Console, you require Symantec Management Center version 2.4 or later. Download Management
Center from the Broadcom Support site.
More information:
• About the ProxySG Admin Console
• SGOS Administration (Admin Console Edition)
• Management Center 2.4 Configuration and Management Guide
150
SGOS 7.x Release Notes
• An entitled appliance must have an active and valid support maintenance contract.
• An entitled virtual appliance must be under an active subscription or extension (that is, the subscription term is valid
and has not reached its termination end date).
• The subscription is enabled by default and no additional purchase is required to use the policy; however, for optimum
coverage, the Policy Services subscription should be enabled to keep the policy up to date. To keep the subscription
active, make sure that your Symantec support contract or subscription term is valid.
NOTE
Content Security Policy has superseded Malware Scanning from version 6.7.x, but Symantec Web Security
Service (WSS) is not yet updated with Content Security Policy rules. In the interim, deployments using Content
Security Policy on the appliance with Universal Policy enforcement will continue to use the previous threat
protection policy. Content Security Policy levels are mapped to WSS security levels; refer to the SGOS Upgrade/
Downgrade documentation for details.
Access Security Policy
Enable this policy to block malicious transactions. Refer to https://knowledge.broadcom.com/external/article/174668 for
details.
Content Security Policy
Enable this policy to secure content scanning. Refer to https://knowledge.broadcom.com/external/article/174669 for
details.
More information:
• SGOS Administration Guide - Using Policy Services
• ProxySG Web Visual Policy Manager Reference
• SGOS Security Best Practices
• SGOS Upgrade/Downgrade Guide - Behavior Changes Applicable to SGOS 7.1.x Upgrade/Downgrade
• Integrating Content Analysis 3.0 with Other Symantec Products: ProxySG and Malware Analysis
151
SGOS 7.x Release Notes
• TLS_AES_256_GCM_SHA384
• TLS_CHACHA20_POLY1305_SHA256
• TLS_AES_128_GCM_SHA256
• TLS_AES_128_CCM_8_SHA256
• TLS_AES_128_CCM_SHA256
In addition, 40- and 56-bit ciphers, and Export and Low strength ciphers have been removed.
Refer to https://knowledge.broadcom.com/external/article/170130 for a list of all cipher suites shipped with the appliance.
NOTE
TLS 1.3 is not supported in ADN mode. When ADN is enabled, TLS 1.3 client connections are downgraded to
TLS 1.2.
Impact on FIPS Mode
This release is based on OpenSSL 1.1.1, which supports TLS 1.3 but does not support FIPS 140-2. As a result, this
release is not FIPS-capable. See Limitations in SGOS 7.x and the SGOS Upgrade/Downgrade documentation for more
information.
More information:
• SGOS Administration Guide
• Command Line Interface Reference
• Content Policy Language Reference
• Web Visual Policy Manager Reference
• Legacy Visual Policy Manager Reference
HTTP/2 Support
The SGOS appliance now supports the HTTP/2 protocol. HTTP/2 offers improved performance due to its compression
of HTTP headers, and multiplexing multiple requests and responses over a single connection. The feature is enabled by
default, without the need for additional configuration or policy, and includes the following:
You can change these default settings by configuring settings and policy.
Configuring HTTP/2 Settings and Policy
To configure HTTP/2 on the appliance, use the new #(config) http2 commands. Refer to the Command Line
Interface Reference for details.
The following policy objects and gestures have been added or updated for this feature.
152
SGOS 7.x Release Notes
New static Action objects: New property: Specifies whether the proxy
• Accept HTTP/2 Client- http2.client.accept(yes|no) accepts HTTP/2 on the
Side Connections client-side connection.
• Do Not Accept Default behavior is yes.
HTTP/2 Client-Side
Connections
New Action object: New property: Specifies the maximum
Set HTTP/2 Client Max http2.client.max_concurrent_streams(streams) number of concurrent
Concurrent Streams HTTP/2 streams that
the client may initiate
on the current client
connection. Default
maximum is 15.
New Action object: New property: Specifies whether the proxy
Request HTTP/2 On http2.server.request(yes|no|preserve) requests HTTP/2 on the
Server-Side server-side connection.
Set object to Yes, No, or Default behavior is preserve
Preserve Client-Side
Setting
N/A Condition supports new parameter: Tests if the client used
http.request.version=2 HTTP/2 to make the request
to the appliance.
N/A Condition supports new parameter: Tests if the origin content
http.response.version=2 server used HTTP/2 to
deliver the response to the
appliance.
153
SGOS 7.x Release Notes
The following access log fields have been added to support this feature:
cs-http-connect-categoriescs-http-connect-categoriescs-http-connect-categories-bluecoatcs-http-connect-
categories-external cs-http-connect-categories-local cs-http-connect-categories-policy cs-http-connect-
categories-providercs-http-connect-categories-qualifiedcs-http-connect-category
More information:
• Content Policy Language Reference
• ProxySG Log Fields and CPL Substitutions Reference
This condition tests the content filter categories associated with the hostname in the Origin request header.
request.header.Origin.url.risk_level={status|risk_level1[,risk_level2,...]}
This condition tests the Threat Risk Level associated with the hostname in the Origin request header.
More information:
• Content Policy Language Reference
154
SGOS 7.x Release Notes
More information:
• Command Line Interface Reference
More information:
• SNMP Critical Resource Monitoring Guide
More information:
• Command Line Interface Reference
Authenticated NTP
Commands have been added to support adding authenticated NTP servers to the appliance:
#(config) ntp encrypted-server {domain_name|IP_address} key_id key_type encrypted_key
155
SGOS 7.x Release Notes
More information:
• Command Line Interface Reference
SSH Enhancements
SSHv2 Host Key Pairs for the SSH Console
This release supports additional, selectable algorithms for creating SSHv2 host key pairs for the SSH console:
• RSA with 2048, 3072, or 4096 bit size
• ECDSA with nistp256, nistp384, or nistp52 curve
• Ed25519
To manage the SSHv2 host key pairs, select Configuration > Authentication >SSH Inbound Connections > SSH Host
Keys.
In the CLI, use the #(config ssh-server) create host-keypair command. Refer to the Command Line
Interface Reference for new arguments for this command.
NOTE
Before a backup and restore of the appliance, you can securely display the host keys by issuing the show config
command. The settings specified by #(config) security private-key-display determine whether or
not host keys are included in the output and whether they are output in encrypted form.
SSH and SSH KEX Host Key Algorithms for the SSH Console
This release supports SSH and SSH KEX algorithms for the SSH console. The following subcommands were added:
#(config ssh-server)hostkey-algs {add | remove | reset | set | view}#(config ssh-server)kex-algs {add | remove
| reset | set | view}
More information:
• Command Line Interface Reference
• SGOS Administration Guide - Configuring Management Services
More information:
• Command Line Interface Reference
• SGOS Administration Guide - Backing Up the Configuration
where:
• upload_hour is the daily upload time
• minutes is the interval at which to upload archives
156
SGOS 7.x Release Notes
More information:
• Command Line Interface Reference
More information:
• Command Line Interface Reference
where:
• no: Disable tap of client-side or server-side traffic.
• interface: Specify the interface for tapped content on the client side or server side. The form isadapter:interface.
NOTE
Encrypted tap does not support server-side HTTP/2 traffic.
In addition, new Enable Client Tap and Enable Server Tap action objects have been added to the legacy Visual Policy
Manager.
More information:
• Content Policy Language Reference
• Legacy Visual Policy Manager Reference
157
SGOS 7.x Release Notes
– diagnostic.stop(pcap)
– random=
– transaction.field.name=
– transaction.type=
Use the define policy macro and refer to it in other policy rules that need examining or troubleshooting, as follows:
; define policy to trace requests to sample_domain.com
; where time taken to process request is 3000 ms or more
define diagnostic policy slow_traffic
<diagnostic> trace.request(yes)
url.domain=sample_domain.com transaction.field.time-taken=3000..
end
More information:
• Content Policy Language Reference
In addition, variables can be tested in layers other than the ones in which they were set.
More information:
• Content Policy Language Reference
You can view policy profiling statistics via the Management Console URLs Policy/Profiling/Statistics and Policy/Profiling/
Results, or via the show config CLI command.
More information:
• Content Policy Language Reference
New CPL Diagnostics Probe and CLI to Upload Diagnostics to Syslog Host
You can collect diagnostics (policy traces, debug logs) with the new CPL define probe and view the details at the
advanced URL page at https://IP_address:port/Diagnostic/Trace.
You can also upload diagnostics reports to a Syslog host using the CLI. TCP and TLS protocols are supported.
158
SGOS 7.x Release Notes
NOTE
You can only specify one hostname or IP address. For example, if you set the syslog tcp hostname and then
set the syslog tls hostname, the TCP hostname is removed and the TLS hostname set.
# (config diagnostics) syslog tcp {hostname | IP_address} [port]
# (config diagnostics) syslog tls {hostname | IP_address} [port] [ssl_device_profile]
More information:
• SGOS Administration Guide
• Content Policy Language Reference
• Command Line Interface Reference
The bcreporterwarp_v1 log format includes two new fields that are populated when a constraint violation occurs:
• the x-bluecoat-waf-attack-family field shows Constraint Violation
• the x-bluecoat-waf-block-details or x-bluecoat-waf-monitor-details field shows details with the
following syntax:
"{""detection"":""constraint"",""part"":""{name|query_arg_name|query_arg|
arg_name|arg|cookie_name|cookie|post_arg_name|post_arg|header_name|header|
path}"",""line"":""constraint_set_defn_cpl_line"",""data"":""matched_data""}"
More information:
• Content Policy Language Reference
where:
159
SGOS 7.x Release Notes
where:
• category is an IP reputation category, including user-defined categories. User-defined categories are specified as
user_defined.category
• value is the confidence level for the specified reputation category or categories
• none means that any database entries for the specified reputation category or categories are suppressed and not
access-logged
You can add the following fields to the bcreporterwarp_v1 log format:
• x-bluecoat-client-address-reputation - Logs the client IP address reputation
• x-bluecoat-client-effective-address-reputation - Logs the effective client IP address reputation
The log shows transaction details in the following format:
[{""reputation"":""spam"",""confidence"":9}]
More information:
• SGOS Administration Guide
• Content Policy Language Reference
More information:
• Command Line Interface Reference
160
SGOS 7.x Release Notes
To ensure that policy performs as intended, edit all instances of the renamed attribute and re-apply policy by the specified
date. You can verify the current name of the attribute by clicking View Attributes List (Configuration > Application
Classification > Attributes > Attributes).
Renamed Category Name Support
(Intelligence Services data source only) If a policy rule includes a category that has been renamed in the currently
downloaded database, policy warnings occur when you try to install policy through CPL or the VPM. The following is an
example of the warning:
Deprecation warning: 'old_category'; 'old_category' has been replaced by 'new_category' due to Category name
updated and will no longer be accepted after Sat, 11 Jul 2020 00:00:00 UTC. Please switch to the new name
before then.
To ensure that policy performs as intended, edit all instances of the renamed category and re-apply policy by the specified
date.
You can verify the current name of the category by clicking View categories ( Configuration > Content Filtering >
General) and checking Blue Coat categories.
Default TCP Window Size Increase
The default TCP window size has been increased from to 256k bytes to 1 MB.
To view the current TCP window size, issue the CLI command:
> show tcp-ip
161
SGOS 7.x Release Notes
162
SGOS 7.x Release Notes
ID Issue
SG-17671 Fixes an issue where HTTP/2 requests might have been handled incorrectly if the HTTP/2 pseudo header
fields were split across HEADERS and CONTINUATION frames. When the issue occurred, the proxy sent
a GOAWAY frame and terminated the client HTTP/2 connection.
SG-17265 Fixes an issue where a missed policy condition triggered a diagnostics probe trace and log update.
SG-17062 Fixes an issue where YouTube pages did not load sidebar content.
SG-16206 Fixes an issue where the HTTP proxy did not capture the debug logs based on a tenant's probe condition.
This occurred when tenancy was not determined yet (RCP, SEP-CIA) and the decision from policy was
cached.
SG-12971 Fixes slow HTTP performance. This issue occurred when a forwarding group was configured to use
Accelerator-Cookie host affinity.
SG-14789 Fixes potential HTTP/2 denial of service vulnerabilities.
SG-13027 Fixes an issue where server-side HTTP/2 connections were not reused when using HTTP/2 in reverse
proxy deployments.
SG-15704 Fixes an issue where the appliance did not upgrade new connections to HTTP/2 when ADN was enabled.
ID Issue
SG-15003 Fixes an issue where the Management Console did not display Syslog host entries when a port number
was specified.
163
SGOS 7.x Release Notes
ID Issue
SG-17333 Fixes an issue where the appliance experienced a memory leak in SSL and Cryptography.
ID Issue
SG-17634 Addresses an issue where the appliance stopped responding when certain diagnostic policy was installed.
CC-419 Fixes an issue where Content Security Policy exemptions (using the Set Content Security Scanning VPM
object, set to Exempt From Content Security) were not supported in Symantec Web Security Service.
SG-12593 Fixes an issue where requests with "none" category and Threat Risk Level 5 were not blocked, but the
access log incorrectly stated they were blocked. This issue occurred when the Access Security Policy layer
was configured with Strong protection level.
SG-12845 Fixes multiple issues (including response code 500 and authentication errors) that occurred in
a multitenant deployment with IWA Direct authentication, where landlord policy included the
tenant.request_url() property.
ID Issue
SG-13054 Fixes an issue where the SensorCode values defined in BLUECOAT-SG-SENSOR-MIB did not support the
S450 and S550 platforms.
ID Issue
SG-4574 Fixes an issue where whitespaces in field values were not ignored when adding a keyring through the CLI.
This issue did not occur when creating keyrings through the Management Console.
SG-9716 Fixes incorrect access log values for the x-cs-sessionid and x-rs-sessionid fields.
ID Issue
SG-3988 Fixes an issue where the client-side-negotiated-cipher access field was incorrectly
populated.
ID Issue
SG-12469 Fixes errors in TCP congestion control logic that led to sub-optimal performance. Performance on
congested networks has been increased.
164
SGOS 7.x Release Notes
SGOS 7.2.0.1 EA
Release Information
• Release Date: January 21, 2020
• Build Number: 246815
NOTE
This is an Early Availability (EA) release with new/advanced functionality. Previously, Symantec released new
features in Limited Availability (LA) releases to specific customers to access new functionality. This meant
other customers were not able to access these new capabilities until the release was General Availability
(GA). With Early Availability releases, all customers under valid support entitlement can gain access to this
new functionality. Customers running this release should be considered early adopters with access to new
and advanced functionality. Early Availability releases are supported like any other current release. Once the
Early Availability release achieves broader adoption, it will transition to GA status.
Supported Platforms
• ProxySG hardware appliances: S200, S400, S500
• Standard/Advanced Reverse Proxy hardware appliances: S200, S400, S500
• High-performance Gen2 virtual appliances: SG-VA, ARP-VA, SRP-VA
See Hardware Appliances and ProxySG Tech Docs for platform documentation.
Compatible With
• BCAAA: 6.1
• ProxySG Admin Console: 1.1.1 and later
• Reporter: 9.5.x, 10.1.x, and 10.2.x
• Management Center: 2.2.2.3 and later
• ProxyAV: 3.4.x
• Content Analysis: 2.3.x, and 3.0.x
• ProxyClient: 3.4.x
• Unified Agent: 4.7.x and 4.8.x
• SSL Visibility: 4.2.x, 4.3.x. 4.4.x, 4.5.x, and 5.x
• Web Isolation: 1.10 and later
Third-Party Compatibility
• For supported Java, operating system, and browser versions, refer to KB Article 169081.
• For information on Java 11 support, refer to KB Article 173228
165
SGOS 7.x Release Notes
references them is no longer necessary. For appliances running SGOS that is earlier than 7.2.0.1, use the following
CPL:
<ssl>
client.connection.negotiated_cipher=(EXP-RC4-MD5,EXP-RC2-CBC-MD5,EXP-DES-CBC-SHA) force_deny
<ssl>
server.connection.negotiated_cipher=(EXP-RC4-MD5,EXP-RC2-CBC-MD5,EXP-DES-CBC-SHA) force_deny
• The following are the supported upgrade/downgrade paths for this release:
– Upgrade to 7.2.0.1 from version 6.7.4.3 and later 6.7.x releases, or another version 7.x.
– Downgrade from 7.2.0.1 to version 6.7.4.3 and later 6.7.x releases, or another version of 7.x.
NOTE
If upgrading from SGOS 6.7.4.2 or earlier, you might have to upgrade to version 6.7.4.3 as an interim step
before upgrading to this release. For more information, refer to KB Article 18536
See SGOS Upgrade/Downgrade documentation details the supported upgrade/downgrade paths for this release.
NOTE
In a future release of 7.x, support for WebFilter (BCWF) will be removed.
Limitations
• See Limitations in SGOS 7.x for a description of limitations in this release.
Known Issues
• See Known Issues in SGOS 7.x for a list of all issues that Symantec is aware of in SGOS 7.x.
166
SGOS 7.x Release Notes
in the Management Console and the CLI command #(config application-classification) data-source
{web-filter | intelligence-services} have been removed.
NOTE
The appliance can restore a configuration archive that includes WebFilter as a data source, but it issues a
deprecation warning.
If you are running a new installation of SGOS 7.2.x, you will only have the option to purchase Intelligence Services for
content filtering. functionality.
If you are upgrading to SGOS 7.2.0,1 and were using WebFilter as the data source previously, there will be no change
to your existing content filtering
• SSLv2 is no longer supported on the appliance. Options for SSLv2 have been removed from the Management Console
and the CLI.
• The following ciphers are no longer available:
– 40- and 56-bit ciphers
– Export and low strength ciphers:
• DHE-DSS-DES-CBC-SHA
• DES-CBC3-MD5
• RC2-CBC-MD5
• DES-CBC-SHA
• DES-CBC-MD5
• EXP-DES-CBC-SHA
• EXP-RC4-MD5
• EXP-RC2-CBC-MD5
• EXP-DHE-DSS-DES-CBC-SHA
NOTE
If your policy contains reference to the deprecated low strength ciphers, recommends removing the
references. If the references are not removed, policy will compile and a warning message will be issued.
For information on supported ciphers, refer to https://knowledge.broadcom.com/external/article/170130/cipher-
suites-shipped-with-the-proxysg-a.html.
ID Issue
SG-13027 Fixes an issue where server-side HTTP/2 connections were not reused in HTTP/2 in reverse proxy
deployments.
SG-15704 Fixes an issue where the appliance did not upgrade new connections to HTTP/2 when ADN was
enabled.
ID Issue
SG-17333 Fixes an issue where the appliance experienced a memory leak in SSL and Cryptography.
167
SGOS 7.x Release Notes
ID Issue
CC-419 Fixes an issue where Content Security Policy exemptions (using the Set Content Security
Scanning VPM object, set to Exempt From Content Security) were not supported in Symantec
Web Security Service.
SG-12593 Fixes an issue where requests with "none" category and Threat Risk Level 5 were not blocked
when the Access Security Policy layer was configured with Strong protection level.
ID Issue
SG-4574 Fixes an issue where whitespaces in field values were not ignored when adding a keyring through
the CLI.
ID Issue
SG-3988 Fixes an issue where client-side negotiated-cipher fields were populated incorrectly in the access log
for the SSL reverse proxy service when GCM or SHA384 ciphers were used.
ID Issue
SG-12976 Fixes an issue where SGOS on AWS deployments experienced increased HTTP request/response
latency when ICAP scanning was enabled.
168
SGOS 7.x Release Notes
SGOS 7.1.1.1 EA
Release Information
• Release Date: July 9, 2019
• Build Number: 239238
NOTE
This is an Early Availability (EA) release with new/advanced functionality. Previously, Symantec released new
features in Limited Availability (LA) releases to specific customers to access new functionality. This meant
other customers were not able to access these new capabilities until the release was General Availability
(GA). With Early Availability releases, all customers under valid support entitlement can gain access to this
new functionality. Customers running this release should be considered early adopters with access to new
and advanced functionality. Early Availability releases are supported like any other current release. Once the
Early Availability release achieves broader adoption, it will transition to GA status.
Supported Platforms
• ProxySG hardware appliances: S200, S400, S500
• Standard/Advanced Reverse Proxy hardware appliances: S200, S400, S500
• High-performance Gen2 virtual appliances: SG-VA, ARP-VA, SRP-VA
See Hardware Appliances for platform documentation.
Compatible With
• BCAAA: 5.5 and 6.1
• ProxySG Admin Console: 1.1.1 and later
• Reporter: 9.5.x, 10.1.x, and 10.2.x
• Management Center: 2.2.2.3 and later
• ProxyAV: 3.4.x
• Content Analysis: 1.3.x, 2.1.x, 2.2.x, and 2.3.x
• ProxyClient: 3.4.x
• Unified Agent: 4.7.x and 4.8.x
• SSL Visibility: 4.2.x, 4.3.x. 4.4.x, 4.5.x, and 5.x
• Web Isolation: 1.10 and later
Third-Party Compatibility
• For supported Java, operating system, and browser versions, refer to KB Article 169081.
• For information on Java 11 support, refer to KB Article 173228
169
SGOS 7.x Release Notes
Limitations
• See Limitations in SGOS 7.x for a description of limitations in this release.
Known Issues
• See Known Issues in SGOS 7.x for a list of all issues that Symantec is aware of in SGOS 7.x.
170
SGOS 7.x Release Notes
171
SGOS 7.x Release Notes
172
SGOS 7.x Release Notes
SAs are published as security vulnerabilities are discovered and fixed. To see SAs that apply to the version of SGOS you
are running, including ones published after this release, go to:
https://support.broadcom.com/security-advisory/security-advisories-list.html
ID Issue
SG-28356 Fixes an issue where the web VPM page did not load. When this issue occurred, policy loaded in the
legacy VPM.
SG-28393 Fixes an issue where the Comment cell and tooltips did not display long comments correctly.
SG-28590 Fixes an issue where saving policy changes after saving previous changes did not automatically refresh the
Generated CPL. This issue occurred when launching the VPM from Management Center.
SG-28100 Fixes an issue where Excel files could not be previewed on Dropbox when policy included a Notify User
object.
ID Issue
SG-28521 Fixes an issue where attempting to install web VPM policy that included multiple objects of the same type
did not save all instances of the object. This issue occurred if the object names were not changed from
their defaults.
ID Issue
SG-27169 Fixes an issue where the policy enforcement was not correctly applied due to the Application Group
incorrectly referencing an object.
ID Issue
SG-25201 Fixes an issue where the Combined Time Object could not be added.
SG-24881, SG-23553 Fixes an issue where adding a User source object resulted in a "Cannot read property 'getAttribute' of
undefined Retrieving base DN" error. The issue occurred if the LDAP realm was configured without a Base
DN.
SG-20718 Fixes an issue where editing an IP address list in an object (such as Send DNS Response) immediately
returned an inaccurate "IP address already exists" error.
SG-23981 Fixes an issue where authenticated users were allowed to access the HTTPS-Console service even though
Management Console login banner (Notice and Consent Banner) policy was configured in the web VPM.
This occurred if CPL policy layers were not ordered correctly.
SG-21338 Fixes an issue where comparing generated CPL with deployed CPL incorrectly indicated differences
between the two policies.
SG-23229 Fixes an issue where configured HSM keyrings were not available in the web VPM.
173
SGOS 7.x Release Notes
ID Issue
SG-21638 Fixes an issue where the Allow user to override read-only option in theWeb Isolation object was not
indented. It is now indented to indicate that it requires the preceding Read-only, prevent user from
entering data option to be selected.
ID Issue
SG-15678 Fixes an issue where checkboxes in VPM objects such as Combined Source were editable in read-only mode.
SG-21623 Fixes an issue where the Operations menu option incorrectly read Enable Enforcement Domains when
enforcement domains were enabled. The menu option now says Disable Enforcement Domains when the
feature is enabled.
SG-20679 Fixes an issue where adding a DNS Request Threat Risk Level object resulted in an error, "Please ensure that
you have enabled Threat Risk Levels" even though the Threat Risk Levels service was enabled.
SG-21942 Fixes an issue where adding a User object with an LDAP realm selected prepended "cn=" to the Full Name field.
SG-15678 Fixes an issue where checkboxes in VPM objects such as Combined Source were editable in read-only mode.
SG-20679 Fixes an issue where adding a DNS Request Threat Risk Level object resulted in an error, "Please ensure that
you have enabled Threat Risk Levels" even though the Threat Risk Levels service was enabled.
SG-15678 Fixes an issue where checkboxes in VPM objects such as Combined Source were editable in read-only mode.
SG-21326 Fixes an issue where the UI incorrectly displayed "Enable Enforcement Domains" when the enforcement
domains were already enabled.
SG-21942 Fixes an issue where adding a User object with an LDAP realm selected prepended "cn=" to the Full Name field.
ID Issue
SG-20727 Fixes an issue where the Substitution Variables list in the SNMP and Email track objects displayed
variables incorrectly due to font size.
SG-22513 Fixes an issue where the SSL Server Name source object did not generate the correct CPL when set to
Exact Match.
SG-20740 Fixes an issue where VPM policy did not detect when multi-tenant landlord mode was enabled. When this
issue occurred, some related policy gestures such as Tenant ID were unavailable. This issue was also fixed
in the legacy VPM.
SG-20656 Fixes an issue where the Request URL Category destination object within a Combined Object did not
allow you to press Enter to insert newlines.
ID Issue
SG-25201 Fixes an issue where the Combined Time Object could not be added.
SG-24881, SG-23553 Fixes an issue where adding a User source object resulted in a "Cannot read property 'getAttribute' of
undefined Retrieving base DN" error. The issue occurred if the LDAP realm was configured without a Base
DN.
SG-20718 Fixes an issue where editing an IP address list in an object (such as Send DNS Response) immediately
returned an inaccurate "IP address already exists" error.
174
SGOS 7.x Release Notes
ID Issue
SG-23981 Fixes an issue where authenticated users were allowed to access the HTTPS-Console service even though
Management Console login banner (Notice and Consent Banner) policy was configured in the web VPM.
This occurred if CPL policy layers were not ordered correctly.
SG-21338 Fixes an issue where comparing generated CPL with deployed CPL incorrectly indicated differences
between the two policies.
SG-23229 Fixes an issue where configured HSM keyrings were not available in the web VPM.
SG-21638 Fixes an issue where the Allow user to override read-only option in theWeb Isolation object was not
indented. It is now indented to indicate that it requires the preceding Read-only, prevent user from
entering data option to be selected.
ID Issue
SG-15678 Fixes an issue where checkboxes in VPM objects such as Combined Source were editable in read-only
mode.
SG-20679 Fixes an issue where adding a DNS Request Threat Risk Level object resulted in an error, "Please
ensure that you have enabled Threat Risk Levels" even though the Threat Risk Levels service was
enabled.
SG-21326 Fixes an issue where the UI incorrectly displayed "Enable Enforcement Domains" when the enforcement
domains were already enabled.
ID Issue
SG-21942 Fixes an issue where adding a User object with an LDAP realm selected prepended "cn=" to the Full Name
field.
ID Issue
SG-18804 Fixes an issue where user and groups objects were missing in the list of configured realms in the Web
VPM.
ID Issue
SG-12971 Fixes an issue where the web VPM and legacy VPM each showed different options in the Enable
SSL Interception action object.
SG-16999 Fixes an issue where the font size in layer guard rule comments did not match the font size in standard rule
comments.
SG-16332 Fixes an issue where Perform Request Analysis and Perform Response Analysis action objects
included an Add button even though ICAP services cannot be added through the VPM.
SG-15367 Fixes an issue where the comment entered for a layer guard rule does not appear in the generated CPL.
SG-16593 Fixes an issue where installing policy including combined objects sometimes resulted in the "Visual Policy
Manager seems slow to start" message.
175
SGOS 7.x Release Notes
ID Issue
SG-15956 Fixes an issue where a "Duplicate condition type detected" error occurred when installing Encrypted Tap
policy.
SG-15841 Fixes an issue where an incorrect subnet mask was generated when entering subnet /26 in the Client IP
object.
SG-15815 Fixes an issue where the Request Header source object was not available in the Forwarding layer, and
Request Header objects in combined source objects created in the legacy Java VPM did not appear in the
web VPM.
SG-14023 Fixes an issue where url.category= conditions were duplicated when installing policy.
SG-11986 Fixes an issue where server.connection.encrypted_tap() did not have a corresponding
VPM object. The Enable Encrypted TAP action object now has options for enabling and disabling server
encrypted tap; refer to the Web Visual Policy Manager Reference.
SG-13520 Fixes an issue where the VPM prompted read-only users to keep or remove categories when viewing a
category object that contained categories not in the content filter database.
ID Issue Fixed In
SGAC-2842 Issue: When adding an interface in a Web Cache Service Group, the first value
in the dropdown list appears to be selected even though it is not selected. This
issue occurs when using Safari.
Workaround: To select the first interface in the list, select another interface and
then select the first interface again.
ID Issue Fixed In
SG-20312 In SGOS 7.2.1.1, CAPTCHA forms are not displayed when the appliance Fixes in SGOS 7.2.2.1
invokes CAPTCHA validators in policy. If you are currently using CAPTCHA
validators in policy, do not upgrade to 7.2.1.1. If you are installing 7.2.1.1, do not
write policy that uses CAPTCHA validators.
176
SGOS 7.x Release Notes
ID Issue Fixed In
SG-23745 A memory leak occurs when there is an SSH host key mismatch between the Fixes in SGOS 7.3.2.1
appliance and Management Center (for example, if the SSH host keypair is
deleted and recreated after the appliance is added to Management Center).
ID Issue Fixed In
SG-4624 When ICAP REQMOD mirroring is enabled for the FTP proxy, the s-action Fixes in SGOS 7.3.2.1
access log field is occasionally not populated.
SG-13013 Encrypted Tap does not contain any FTP data for intercepted FTPS
connections.
SG-30438 CPU usage may be increased by 3% due to HTTP performance. For more
information, see KB article 235104.
SG-28290 When server-side persistence is disabled either by policy or by ProxySG Fixes in SGOS 7.3.6.1
configuration, the appliance does not release memory for HTTP/2
connections. Not releasing memory can result in high memory usage and may
eventually require a restart to correct.
Workaround: Either enable HTTP-server persistence or disable the server-side
HTTP/2 proxy with the policy property http2.server.request(no) .
SG-15704 When ADN is enabled, the appliance does not upgrade new connections Fixes in SGOS 7.2.0.1
to HTTP/2; however, if ADN is enabled when there are existing HTTP/2
connections open, the existing HTTP/2 connections could break or cause
crashes.
SG-15679 For HTTP/2 connections, the active session is associated with individual
streams in the connection and ends when the stream is released, which causes
idle HTTP/2 connection to not display in the Active Sessions.
ID Issue Fixed In
SG-21332 Secure Web Gateway virtual appliances running on Hyper-V or Microsoft Azure Fixes in SGOS 7.2.2.1
platforms sometimes experience lower throughput and performance (up to 10%)
compared to other virtualization environments.
177
SGOS 7.x Release Notes
ID Issue Fixed In
SG-24288 In 7.2.4.1, authenticating traffic via NTLM with BCAAA does not work. Fixes in SGOS 7.3.2.1
Fixes in SGOS 7.2.5.1
SG-17978 If you are using LDAP authentication and have installed policy to display a Fixes in SGOS 7.2.2.1
redirect link, the redirect link does not display the correct URL in the address
bar.
SG-18066 After installing 7.2.1.1, if you previously didn't use policy quota and had it Fixes in SGOS 7.2.2.1
disabled in configuration, and then attempted to enable it and install time quota
policy via either the Legacy VPM or Web VPM, policy does not compile and
the CPL displays the error message "Error: Variable Linker Error: variable not
defined: 'variable.time_quota_limit(5)'". A similar error occurs when attempting
to install volume quota policy.
Workaround: Downgrade to the latest version of 6.7.x, enable policy quota,
and then upgrade to 7.2.1.1.
CC-419 Content Security Policy exemptions (using the Set Content Security Scanning Fixes in SGOS 7.2.0.1
VPM object, set to Exempt From Content Security) are not supported in
Symantec Web Security Service. Do not use this setting in policy rules when
using Universal Policy enforcement.
SG-12593 When the Access Security Policy layer is configured with Strong protection Fixes in SGOS 7.2.0.1
level, requests with "none" category and Threat Risk Level 5 are not blocked,
but the access log incorrectly states they are blocked.
SG-4058 When policy includes multiple forms of county names (such as short names,
ISO codes, and full names), IP addresses in geographical regions are allowed
or denied as intended, but policy traces show regions with an incorrect verdict.
For example, consider the following CPL:
<proxy>
supplier.allowed_countries[uS, US, "Us", Ca, "United States"]
(deny)
This policy results in denials of IP addresses in Canada and the United States,
but a policy trace shows that "United States" is denied whereas "uS" is allowed.
Workaround: Do not use multiple formats for country names in policy. Use a
consistent format for all instances of country names, as follows:
<proxy>
supplier.allowed_countries["United States", Canada] (deny)
SG-4129 Policy performance is adversely affected when policy includes a large number
of categories assigned to a single URL.
SG-28416 Poor hash algorithm causes false match and incoherent warnings on specific
policy rules.
ID Issue Fixed In
SG-23770 Upgrading from version 7.2.x to 7.3.x with an existing web isolation policy Fixes in SGOS 7.3.2.1
causes web isolation to stop working, with web pages that should be isolated
displaying a "No connectivity to the proxy server" message.
178
SGOS 7.x Release Notes
ID Issue Fixed In
SG-23187 When upgrading from 6.7.x to 7.2.x, health checks for existing HSMs are lost.
This issue occurs when the HSM names contain upper-case letters.
SG-13014 FTPS uploads using Filezilla fail with error code 1048576. This issue occurs
when OCSP stapling is enabled on the appliance.
SG-4230 In STunnel and Bypass modes, the x-cs-session-id and x-cs-
server-certificate-key-size access log fields are not populated.
SG-3605 The appliance stops responding when the CRL distribution point host name field
( Configuration > Proxy Settings > SSL Proxy) includes special characters.
SG-4323 In some cases, the appliance creates a certificate with the OCS IP address in
the SAN DNS Name field when providing the client with a server-side TCP error
message.
SG-4373 On a resumed connection, the x-cs-server-certificate-key-size
access log field always displays RSA[1024].
SG-4574 When adding a keyring through the CLI, whitespaces in field values are Fixes in SGOS 7.2.0.1
not ignored. This issue does not occur when creating keyrings through the Fixes in SGOS 7.2.1.1
Management Console.
ID Issue Fixed In
SG-28279 For ADN deployments, the appliance sometimes experiences high memory
usage when processing SSL traffic.
SG-17567 If the appliance reaches the maximum number of HTTPS connections via SSL Fixes in SGOS 7.2.2.1
tunnel and detect protocol is enabled, memory usage per connection increases
significantly.
SG-4598 Setting the Client Certificate Validation CCL or Server Certificate Validation
CCL object in the SSL Intercept Layer in the VPM results in the error "Invalid
action for <ssl-intercept> layer", and policy does not compile.
Workaround: These gestures have been moved to the <ssl> layer. Write the
policy in CPL instead, as follows:
<ssl>
server.certificate.validate.ccl(CertList)
SG-11173 When upgrading from SGOS 6.7.x, the event log displays errors about Fixes in SGOS 7.3.1.1
HSM keyrings and external certificates. These messages are inaccurate, and
there are no issues with the HSM keyring or external certificate.
SG-4583 Loading signed configuration files on the ProxySG virtual appliance fails with an
error:
% Attempt to load configuration failed: signature
verification failed: The message did not match the
PKCS7 signature.
SG-3988 In the access log for the SSL reverse proxy service, client-side Fixes in SGOS 7.2.0.1
negotiated-cipher fields are populated incorrectly when GCM or
SHA384 ciphers are used.
179
SGOS 7.x Release Notes
ID Issue Fixed In
SG-4612 When SSLV is enabled, SSL access log fields report SSLV cipher values
instead of ProxySG values. This issue occurs when certain cipher enforcement
conditions exist in policy. For example, instead of displaying AES256-SHA a
field shows RSA-AES256-CBC-SHA .
SG-4482 In SSLV offload mode, the x-cs-session-id access log field displays
incorrect session ID values and the x-cs-server-certificate-key-
size field always returns RSA[1024] for key size.
ID Issue Fixed In
ID Issue Fixed In
ID Issue Fixed In
SG-28393 When web VPM is launched outside Management Center, long comments Version 7.3.8.1
content is no longer replaced with ellipsis (...) and tooltip location is off.
SG-29819 Selecting the "Enable SSL interception with automatic protocol detection" option
in the SSL Interception VPM object generates a non-working policy.
FIPS Mode
This release is based on OpenSSL 1.1.1, which does not support FIPS 140-2. As a result, this release is not FIPS-
capable. Attempting to use the # fips-mode enable command results in the message:
% Current system image is not FIPS capable.
% Cannot enter FIPS mode. See attributes in "show installed-systems".
180
SGOS 7.x Release Notes
Importing CA Certificates
The Management Console allows you to import a CA certificate with an empty name. Make sure that all imported CA
certificates have names. (SG-10474)
TLS
TLS 1.3 connections over ADN will be downgraded to TLS 1.2.
Installation
See Install a Device Admin Console in Management Center documentation.
Features
The organization of the SGAC closely mirrors that of the original Java Management Console. Each page of the
Management Console can be thought of as a separate feature configured in SGAC. Refer to the following sections for
more information:
• Features in SGOS 7.2.1.1
• Features in SGOS 7.2.2.1
• Features in SGOS 7.3.1.1
• Features in SGOS 7.3.2.1
• Features in SGOS 7.3.4.1
• Features in SGOS 7.3.6.1
Supported Dependencies
SGAC requires the following components to run correctly:
181
SGOS 7.x Release Notes
Documentation
Document Description
SGOS Upgrade/Downgrade Steps for upgrading or downgrading SGOS. Also covers behavior
changes and policy deprecations.
SGOS Administration Guide Detailed information for configuring and managing the appliance.
Command Line Interface Reference Commands available in the appliance CLI and how to use them to
perform configuration and management tasks.
ProxySG Web Visual Policy Manager Reference How to create and implement policy in the appliance's web-
based Visual Policy Manager, including layer interactions, object
descriptions, and advanced tasks.
Legacy Visual Policy Manager Reference How to create and implement policy in the appliance's legacy
Visual Policy Manager.
Content Policy Language Reference CPL gestures available for writing the policy by which the
appliance evaluates web requests.
Required Ports, Protocols, and Services for Symantec Enterprise Basic configurations, and some commonly used options, for ports
Security Products and protocols.
ProxySG Security Best Practices Best-effort security considerations for your deployment.
Hardware documents Quick start guides, safety guides, and other hardware
documentation. Refer to these release notes for supported
platforms.
Appliance online help (Help button) Access online help from within the Management Console or
Admin Console; however, note that documentation posted on
MyBroadcom supersedes online help.
Provide Feedback
• Send any questions or comments about documentation: [email protected]
• For Customer Care requests, go to: https://www.broadcom.com/company/contact-us/feedback-and-comments
182
SGOS 7.x Release Notes
183