Fxos2120 RN
Fxos2120 RN
2.12
First Published: 2022-06-07
Last Modified: 2023-12-06
This document contains release information for Cisco Firepower eXtensible Operating System (FXOS) 2.12.0.
Use these Release Notes as a supplement with the other documents listed in the documentation roadmap:
• http://www.cisco.com/go/firepower9300-docs
• http://www.cisco.com/go/firepower4100-docs
Note The online versions of the user documentation are occasionally updated after the initial release. As a result,
the information contained in the documentation on Cisco.com supersedes any information contained in the
context-sensitive help included with the product.
Introduction
The Cisco security appliance is a next-generation platform for network and content security solutions. The
security appliance is part of the Cisco Application Centric Infrastructure (ACI) Security Solution and provides
an agile, open, secure platform that is built for scalability, consistent control, and simplified management.
The security appliance provides the following features:
• Modular chassis-based security system—Provides high performance, flexible input/output configurations,
and scalability.
• Chassis Manager—Graphical user interface provides a streamlined, visual representation of the current
chassis status and allows for simplified configuration of chassis features.
• FXOS CLI—Provides command-based interface for configuring features, monitoring chassis status, and
accessing advanced troubleshooting features.
• FXOS REST API—Allows users to programmatically configure and manage their chassis.
What's New
Feature Description
QOS CLIs You can now use the Show interface ethernet <slot> <port> match statistics
CLI to track the intermediate drops happening on the TCAM
You can now police the traffic queues using the Show interface ethernet <slot>
<port> policer statistics police CLI to prevent the exorbitant traffic rates going
through strict priority queues
You can now control the traffic rates using the show queuing interface ethernet
<slot> <port> CLI during congestion to prevent loss of data packets
Switch packet path You can now debug switch packet path issue for the Secure Firewall 3100 devices
ASA and FTD SNMP You can now configure the Admin Instance drop-down menu for SNMP
Unification unification of ASA and FTD devices.
Software Download
You can download software images for FXOS and supported applications from one of the following URLs:
• Firepower 9300 — https://software.cisco.com/download/type.html?mdfid=286287252
• Firepower 4100 — https://software.cisco.com/download/navigator.html?mdfid=286305164
For information about the applications that are supported on a specific version of FXOS, see the Cisco FXOS
Compatibility guide at this URL:
https://www.cisco.com/c/en/us/td/docs/security/firepower/fxos/compatibility/fxos-compatibility.html
Important Notes
• In FXOS 2.4(1) or later, if you are using an IPSec secure channel in FIPS mode, the IPSec peer entity
must support RFC 7427.
• When you configure Radware DefensePro (vDP) in a service chain on a currently running threat defense
application on a Firepower 4110 or 4120 device, the installation fails with a fault alarm. As a workaround,
stop the threat defense application instance before installing the Radware DefensePro application.
Note This issue and workaround apply to all supported releases of Radware DefensePro
service chaining with threat defense on Firepower 4110 and 4120 devices.
• Firmware Upgrade—We recommend upgrading your Firepower 4100/9300 security appliance with the
latest firmware. For information about how to install a firmware update and the fixes included in each
update, see
https://www.cisco.com/c/en/us/td/docs/security/firepower/fxos/firmware-upgrade/fxos-firmware-upgrade.html.
• When you upgrade a network or security module, certain faults are generated and then cleared
automatically. These include a “hot swap not supported” fault or a “module removed when in online
state” fault. If you have followed the appropriate procedures, as described in the Cisco Firepower 9300
Hardware Installation Guide or Cisco Firepower 4100 Series Hardware Installation Guide, the fault(s)
are cleared automatically and no additional action is required.
System Requirements
• You can access the chassis manager using the following browsers:
• Mozilla Firefox—Version 42 and later
• Google Chrome—Version 47 and later
• Microsoft Internet Explorer—Version 11 and later
We tested FXOS 2.12.0 using Mozilla Firefox version 42, Google Chrome version 47, and Internet
Explorer version 11. Other versions of these browsers are expected to work. However, if you experience
any browser-related issues, we suggest you use one of the tested versions.
Upgrade Instructions
You can upgrade your Firepower 9300 or Firepower 4100 series security appliance directly to FXOS 2.12.0
if it is currently running FXOS version 2.2(2) or later. Before you upgrade your Firepower 9300 or Firepower
4100 series security appliance to FXOS 2.12.0, first upgrade to FXOS 2.2(2), or verify that you are currently
running FXOS 2.2(2).
For upgrade instructions, see the Cisco Firepower 4100/9300 Upgrade Guide.
Installation Notes
• An upgrade to FXOS 2.12.0 can take up to 45 minutes. Plan your upgrade activity accordingly.
• If you are upgrading a Firepower 9300 or Firepower 4100 series security appliance that is running a
standalone logical device or if you are upgrading a Firepower 9300 security appliance that is running an
intra-chassis cluster, traffic does not traverse through the device while it is upgrading.
• If you are upgrading a Firepower 9300 or a Firepower 4100 series security appliance that is part of an
inter-chassis cluster, traffic does not traverse through the device being upgraded while it is upgrading.
However, the other devices in the cluster continue to pass traffic.
• Downgrade of FXOS images is not officially supported. The only Cisco-supported method of downgrading
an image version of FXOS is to perform a complete re-image of the device.
Note You must have a Cisco.com account to log in and access the Cisco Bug Search Tool. If you do not have one,
you can Cisco.com.
For more information about the Cisco Bug Search Tool, see the Bug Search Tool Help & FAQ.
CSCvy83696 ENH: FPR 4100/9300 bcm_usd process logs to support possible RCA
CSCvx76651 ENH: Prevent CCL IP addressing on the 169.254.x.x subnet on cluster creation
CSCvz01271 Need show command to see the details of transceiver of FXOS mgmt port via CLI
CSCvz94217 App-instance startup version is ignored and set to running-version after copy config
CSCvz72467 Cisco FXOS and NX-OS Software Cisco Discovery Protocol Service Denial of Service
CSCwa55772 FPR 4100 saw an unexpected reload with reason "Reset triggered due to HA policy
of Reset"
CSCvu76180 Serviceability Request - Add error message that FXOS firmware is not fully activated
CSCvy83657 FXOS process core pruned/deleted from system files (no validation)
CSCvz50201 FXOS may display fault F1256 about missing local disk 0
CSCvy48764 SSH access with public key authentication requires user password
CSCvz01285 Need show command to see the details of FPGA version on Firepower devices
CSCvz94740 FXOS traceback and reload due Service "ascii-cfg" sent SIGABRT for not setting
heartbeat.
CSCvz91266 FXOS A crafted request uri-path can cause mod_proxy to forward the request to an
origin server...
CSCvx04995 Fault F0736 should not be generated due to unreacheable default gateway
CSCwb15170 RM 1120 Port state going down, speed is 100/10 and duplex full/Half, speed and
duplexmismatchpresent
CSCwb73356 nvram logs consistently written every 2 seconds causing high disk utilization
CSCvy99348 Shutdown command reboots instead of shutting the FP1k device down.
CSCwb90940 Data interfaces are not coming up on KP device after deploying 9.18.0.114 image
CSCwb62059 Unable to login on FTD using external authentication after upgrade from
7.0.1--->7.2.-1947
CSCwb70030 MIO: No blade reboot during CATERR if fault severity is non-Severe or CATERR
sensor is different
CSCwc41590 Upgrade fail & App Instance fail to start with err "CSP_OP_ERROR. CSP signature
verification error."
CSCvz74356 FDM 1010 device management interface not reflecting the correct status
CSCwa99171 Chassis and application sets the time to Jan 1, 2010 after reboot
CSCwb83756 TPK netmod OIR fills log with error messages until complete
CSCwb41361 WR8, LTS18 and LTS21 commit id update in CCM layer (seq 26)
CSCwb25246 ASAv SSH session getting terminated with ospf network command using Azure /
Azure Stack hub
CSCwb97486 FPR3100: 25G optic may show link up on some 1/10G capable only fiber ports
CSCwb27099 FXOS: Third-party interop between Ciena Waveserver with firepower chassis.
CSCwb01633 FXOS misses logs to diagnose root cause of module show-tech file generation failure
CSCwb12465 FIPS self-tests must be run when CC mode is enabled - files are missing
CSCwb95787 FPR1010 - No ARP on switchport VLAN interface after portmanager DIED event
CSCwb85516 Update the entity mib with new EPM details for WA-B/TPK
CSCwb89065 Warn when TPK borough/temple fpga versions are below minimum
CSCwc37196 FPR3100: 8x1G copper netmod may incorrectly report obsolete firmware on boot
CSCwb02689 FXOS should check reference clock stratum instead of NTP server's local clock stratum
CSCwb40662 ENH: FCM should include option for modifying the interface 'link debounce time'
CSCwc30692 TPK 3140 Maryland: %ERROR% - Switch device not found! during reboot
CSCwc08676 WR6, WR8, LTS18 and LTS21 commit id update in CCM layer (Seq 32)
CSCwc25207 WR6, WR8, LTS18 and LTS21 commit id update in CCM layer (Seq 33)
CSCwc46569 WR8, LTS18 and LTS21 commit id update in CCM layer (Seq 34)
CSCwc60907 WR6, WR8, LTS18 and LTS21 commit id update in CCM layer (Seq 35)
CSCwc69036 In TPK 3110, baseline boot from rommon failed as "unable to unlock or revert SED"
CSCwc83037 WR6, WR8, LTS18 and LTS21 commit id update in CCM layer (Seq 36)
CSCwb83166 Upgrade to CiscoSSL FOM 7.3sp and CiscoSSL 1.1.1o.7.3sp.143-fips in SSP MIO
CSCwc03393 Lina traceback and core file size is beyond 40G and compression fails on FTD
CSCwc08374 Azure ASA NIC MAC address for Gigeth 0/1 and 0/2 become out of order when adding
interfaces
CSCvz19364 FXOS does not send any syslog messages when the duplex changes to "Half Duplex"
CSCwb21037 FCM smart license error when smart licensing reports synced
CSCwb80108 FP2100/FP1000: Built-in RJ45 ports randomly not coming up after portmanager restart
events
CSCwb95383 KP FDM-HA is in suspended state with no failover after reverting from 7.3 to 7.1
CSCwc25523 Registering the device for Telemetry is failing in DEV images due to missing security
certificates
CSCwc51827 Getting portmanager Died Error after installing 7.3.x build on wm1010
CSCwc75061 FMC allows shell access for user name with "." but external authentication will fail
CSCwd09546 WA: portmanager sfp OIR routine uses insufficient table for module debounce
CSCvz42084 Update msmtp driver to fix FMC SMTP email send failures
CSCvz44638 FXOS changes for CSCvy86319 - Data are not getting destroy after formatting disk0
on ISA3K
CSCwb57524 FTD upgrade fails - not enough disk space from old FXOS bundles in distributables
partition
CSCwb88090 FXOS:after fxos config import new port-channel creation causing existing port-channel
flap
CSCwb94980 TPK: SFP insertion events are missed for base fiber ports including mgmt port.
CSCwc08683 The interface's LED remains green blinking when the optical fiber is unplugged on
FPR1150
CSCwc60463 FXOS is not rotating log messages files for partition opt_cisco_platform_logs
CSCwc94062 [FTDv/Kenton/ISA3k - FXOS] Add sshd monitor capability to restart sshd in case it
fails.
CSCvz77202 RMU read stale entries on the int ctrl link between x86 Denverton CPU and Marvel
88E6390X switch
CSCwb77818 Telemetry stays in enabled state even after SL is deregistered from CLI
CSCwc76849 link state propagation stops working when performing full chassis reboot
CSCwc26489 ENH - Setting the zmqio sched policy and priority for MIO heartbeat channel
CSCwc82169 FPR4100/9300 Blade discovery may hang due to internal communication failure with
blade adapter
CSCwd31427 FMC allowing explicit format version of EC parameters with syslog over TLS in CC
mode
CSCwd34662 LTS18 and LTS21 commit id update in CCM layer (seq 39)
CSCwb89257 Remote user login via SSH access with password authentication method fails after
FXOS upgrade
CSCwc87441 for system processes limit the CPUs used to the number of system CPUs
CSCwd06758 No input validation for logical device DNS servers in bootstrap configuration on chassis
manager
CSCwd45904 Livecore does not return proper error code when there is no space
CSCwd47481 WR6, WR8, LTS18 and LTS21 commit id update in CCM layer (Seq 40)
CSCwd65327 WR6, WR8, LTS18 and LTS21 commit id update in CCM layer (Seq 41)
CSCwc96726 R2130 use the Wind River CIS_LTS21_R2130 OS branch for the 7.3.0 Beta2 release.
CSCwc83495 Add abort in switch_driver to crash portmanager in case udbs are corrupted
CSCwd58188 Inline-pair's state could not able to auto recover from hardware-bypass to standby
mode.
CSCwd68346 ASA MIO-blade heartbeat failure due to kernel crash, leads to MEZZ core
CSCwd72680 FXOS: FP2100 FTW timeout triggered by high CPU usage during FTD Access Control
Policy deploy.
CSCwd89349 WR6, WR8, LTS18 and LTS21 commit id update in CCM layer (seq 42)
CSCwd95415 The Standby device going in failed state due to snort heartbeat failure
CSCwe14619 The standby device going in failed state due to snort heartbeat failure( Precommit
Build Failure)
CSCwe20714 7.4.0-1603 WA/TPK-HA Traffic doesn't work for non static mac address interface
CSCwe32394 ssp abort/reload: terminate called after throwing an instance of 'Stb::bad_alloc' from
overload.cpp
CSCvx71936 FXOS: Fault "The password encryption key has not been set." displayed on FPR1000
and FPR2100 devices
CSCwc12719 Modify tech-support to capture additional debug info (show portmanager switch vlans)
CSCwd12978 WA-B: ASA show env command displays PSU information incorrectly
CSCwd53448 FPR3100: 4x40 network module LEDs do not blink with traffic
CSCwd56462 LLDP:Neighbors not getting discovered on the first breakout port without deleting the
lldp config
CSCwd68159 LLDP::Removing a member port from the port channel completely removes the lldp
neighbors
CSCwd95063 npu accel - nam_client ipc_recv_timeouts - effects FXOS npu-accel local-mgmt, lina
stats calls
CSCwe22302 Partition "/opt/cisco/config" gets full due to wtmp file not getting logrotated
CSCwe33910 sr_build.log has the same three messages repeated every minute
CSCwe48918 LTS18 CCM Sequence number 44 to update the libjitterentropy to version 3.4.1
CSCwe59989 Workaround to fix build breakage introduced by Wind River CCM commit
CSCwe63794 Reduce fault severity level for RAID degrade due to disk is still in spare state
CSCwb88729 FTD - %FTD-3-199015: port-manager: Error: DOM Block Read failure, port X, st =
X log false/positive
CSCwd99813 Supervisor does not reboot unresponsive module/blade due to CATERR with minor
severity sensor ID 50
CSCwe33130 Supervisor does not reboot unresponsive module/blade due to IERR with minor severity
sensor ID 79
CSCwb40008 Sometimes device goes for reboot, when powering on of alperton netmod in 4100
device
CSCwc79216 Update Broadcom SDK patch for field alert notification for Trident2
CSCwe19968 Enhance to log FTW kicking delay and compensate the delay for kicking
CSCwe59809 WR6, WR8, LTS18 and LTS21 commit id update in CCM layer (seq 45)
CSCwc49180 Statsclient hap reset and boot loop after enabling SNMP unification in 92.13
Identifier Headline
CSCwd34288 FP1000 - During boot process in LINA mode, broadcasts leaked between interfaces
resulting in storm.
CSCwd94183 Blade not coming up after FXOS update support on multi-instance due to ssp_ntp.log
log rotation prob.
CSCwe30867 Workaround to set hwclock from ntp logs on low end platforms.
CSCwe88600 vFTD sshd silent crash, possibly due to probes in Azure with LB.
CSCwe93802 WR6, LTS18 and LTS21 commit id update in CCM layer (Seq 46).
CSCwf08515 FPR3100: ASA/FTD High traffic impact on all data interfaces with high counter of
"demux drops".
CSCwf014729 Need to use CiscoSSL with FOM 7.3 for Intel Builds.
Identifier Headline
CSCwf17858 node is leaving TPK cluster due to interface health check failure.
CSCwc76419 Unnecessary FAN error logs needs to be removed from thermal file.
CSCwd67101 FPR1150 : Exec format error seen and the device hung until reload when erase secure
all is executed.
CSCwe50993 SNMP on SFR module goes down and won't come back up.
CSCwf16278 TPK 2.12 MGMT Port not able to ping gateway after application installation.
CSCwf22483 SSH to Chassis allows a 3-way handshake for IPs that are not allowed by the config.
CSCwf18647 Brentwood and Maryland squelch settings modification missing from _X netmod
variants.
CSCwc12716 modify tech-support to capture additional debug info (control link register details).
CSCwd34920 ENH: Need to preserve topout.log to contain data of last 5 days minimum.
CSCwe45653 ENH: FXOS need to track Security Module for Disk quota exceeded related issue.
CSCwe79517 ENH: TPK show portmanager counters to dump counters for default drop rules.
CSCwb06934 Include output of 'show slot expand detail' command in FPR3100 tech_support_brief
file
CSCwf57856 FXOS Traceback and reload caused by leak on MTS buffer queue
CSCwh22888 FXOS: Remove enforcement of blades going into degraded state after multiple DIMM
correctable errors
CSCwb71519 ENH: F1661 More details on failure reason and log location
CSCwa65801 "show ntp all" logs are not clear enough and lead to uncertainty and confusion
CSCwe81841 FXOS needs to provide a command that will display the total power on hours of
chassis/blade
CSCwf36066 WM/TPK/WA "FTD only": Packet drops observed after removing PC member from
Port-channel
CSCwh54477 The FMC is showing "The password encryption key has not been set" alert for a
Firepower 1100/2100 and Secure Firewall 3100 series devices
CSCwc48701 Secure Firewall 3100 MI: ftd instance failed to come online after chassis reboot
CSCwf44354 JENT: Expand JENT library support to CiscoSSL for all FXOS targets
CSCwf55654 Secure Firewall 3100/4200 - Incorrect 'Management1/1' interface status on Lina &
FTD
CSCwh09113 FPR1010 in HA failed to send or receive to GARP/ARP with error "edsa_rcv: out_drop"
CSCwf35500 FXOS/SSP: System should provide better visibility of DIMM Correctable error events
CSCwf88124 Switch ports in Trunk mode do not pass vlan traffic after power loss
Related Documentation
For additional information on the Firepower 9300 or 4100 series security appliance and FXOS, see Navigating
the Cisco FXOS Documentation.
Online Resources
Cisco provides online resources to download documentation, software, and tools, to query bugs, and to open
service requests. Use these resources to install and configure FXOS software and to troubleshoot and resolve
technical issues.
• Cisco Support & Download site: https://www.cisco.com/c/en/us/support/index.html
• Cisco Bug Search Tool: https://tools.cisco.com/bugsearch/
• Cisco Notification Service: https://www.cisco.com/cisco/support/notifications.html
Access to most tools on the Cisco Support & Download site requires a Cisco.com user ID and password.
Contact Cisco
If you cannot resolve an issue using the online resources listed above, contact Cisco TAC:
• Email Cisco TAC: [email protected]
• Call Cisco TAC (North America): 1.408.526.7209 or 1.800.553.2447
• Call Cisco TAC (worldwide): Cisco Worldwide Support Contacts