5.3.2.2 Release Notes

Overview

Extreme Security Threat Protection firmware version 5.3.2.2 is a firmware update for the XGS IPS network protection platform.

Fixed Defects

  • 80786 - Embedded knowledge center contains unnecessary note for configuring IP address on protection interface pair for SSL decryption.
  • 80776 - Security event SSL_Malformed_Certificate is triggered by outgoing SSL traffic on internal Network Protection appliance due to Outbound SSL inspection being enabled on external Network Protection appliance.
  • 80593 - Changing the admin password using the CLI prints cleartext password in the system log.
  • 80196 - Can not change speed/duplex on management interface M.1 through advanced tuning parameter with latest BMC firmware. For more information, see technote #1964988.
  • 80171 - LMI login warning banner does not contain an OK button as acknowledgement.
  • 80145 - Packet processing daemon crashes in ISNP 5.3.2.1 when traffic matches a domain certificate object used in a Network Access Policy rule and there are at least 10 Network Access Policy rules enabled.
  • 80136 - In the SiteProtector Management policy, the proxy password in the Agent Manager configuration is stored in plain text.
  • 80095 - The appliance fails to block IPv6 unspecified address '::' when used in Network Access Policy rules.
  • 79803 - If the Enable X-Force Protection Level Blocking option on the IPS Object general Configuration tab is disabled, installing a new XPU causes events to be blocked.
  • 79723 - GLGUP1002E system event indicates a failed upgrade attempt is incorrectly logged after changing the active partition to an earlier firmware and accessing the Available Updates page in the LMI.
  • 79664 - Hardware Diagnostics should be disabled on Extreme Security Threat Protection for VMware.
  • 79662 - The Appliance SSL Certificate used by the LMI is renewed 1 day prior to expiration.
  • 78614 - Open signature rules cannot be used to detect outbound SSL traffic. This requires XPU 36.020, released February 2016.
  • 77677 - The USB device detection event GLGHW9001I does not contain USB manufacturer and product information.
  • 81528 - When compiling the Network Access rule set, the packet processing daemon crashes with signal 11 if at least 10 Network Access Policy rules are enabled and at least one contains a schedule object.

Changed Features

Due to the DROWN OpenSSL TLS vulnerability (CVE-2016-0800), SSLv2 was removed from the Outbound SSL inspection supported protocols.

Known Issues

This release contains no known issues at this time.