Stonesoft Next Generation Firewall Release Notes 6.1.2 Revision B Stonesoft Next Generation Firewall 6.1.2 | Release Notes Contents • About this release on page 2 • Lifecycle model on page 2 • System requirements on page 3 • Build version on page 6 • Compatibility on page 7 • New features on page 7 • Enhancements on page 9 • Resolved issues on page 10 • Installation instructions on page 11 • Known issues on page 12 • Find product documentation on page 13 About this release This document contains important information about this release of Stonesoft Next Generation Firewall (Stonesoft NGFW); formerly known as McAfee® Next Generation Firewall. We strongly recommend that you read the entire document. Lifecycle model This release of Stonesoft NGFW is a Feature Stream (FS) version. Support for Feature Stream versions is discontinued when a new major version of Stonesoft NGFW is available. We recommend using the most recent Long-Term Support (LTS) version if you do not need any features from a later Feature Stream version. For more information about the Stonesoft NGFW lifecycle policy, see Knowledge Base article 10192. 2 Stonesoft Next Generation Firewall 6.1.2 | Release Notes System requirements Make sure that you meet these basic hardware and software requirements. Stonesoft NGFW appliances We strongly recommend using a pre-installed Stonesoft NGFW appliance as the hardware solution for new Stonesoft NGFW installations. Note: Some features in this release are not available for all appliance models. See Knowledge Base article 9743 for up-to-date appliance-specific software compatibility information. Two Stonesoft NGFW engine images are available: • x86-64 — A 64-bit image that includes the Local Manager. • x86-64-small — A 64-bit image that does not include the Local Manager. Note: If you do not use the Local Manager, we recommend that you use the x86-64-small image. Some appliance models support only the x86-64-small image. The following table shows whether you can use an appliance model in the Firewall/VPN (FW), IPS, or Layer 2 Firewall (L2FW) role, and the image that is supported. Appliance model Roles Images FW-315 FW The image that does not include the Local Manager is supported 320X (MIL-320) FW Both images are supported IPS-1205 IPS, L2FW Both images are supported FWL321 FW The image that does not include the Local Manager is supported NGF321 FW, IPS, L2FW Both images are supported FWL325 FW The image that does not include the Local Manager is supported NGF325 FW, IPS, L2FW Both images are supported 110 FW The image that does not include the Local Manager is supported 115 FW The image that does not include the Local Manager is supported 1035 FW, IPS, L2FW Both images are supported 1065 FW, IPS, L2FW Both images are supported 1301 FW, IPS, L2FW Both images are supported 1302 FW, IPS, L2FW Both images are supported 1401 FW, IPS, L2FW Both images are supported 1402 FW, IPS, L2FW Both images are supported 3201 FW, IPS, L2FW Both images are supported 3 Stonesoft Next Generation Firewall 6.1.2 | Release Notes Appliance model Roles Images 3202 FW, IPS, L2FW Both images are supported 3205 FW, IPS, L2FW Both images are supported 3206 FW, IPS, L2FW Both images are supported 3207 FW, IPS, L2FW Both images are supported 3301 FW, IPS, L2FW Both images are supported 3305 FW, IPS, L2FW Both images are supported 5201 FW, IPS, L2FW Both images are supported 5205 FW, IPS, L2FW Both images are supported 5206 FW, IPS, L2FW Both images are supported Sidewinder S-series appliances These Sidewinder appliance models can be re-imaged to run Stonesoft NGFW software. Appliance model Roles Images S-1104 FW Both images are supported S-2008 FW Both images are supported S-3008 FW Both images are supported S-4016 FW Both images are supported S-5032 FW Both images are supported S-6032 FW Both images are supported Certified Intel platforms We have certified specific Intel-based platforms for Stonesoft NGFW. The tested platforms can be found at https://support.forcepoint.com under the Stonesoft Next Generation Firewall product. We strongly recommend using certified hardware or a pre-installed Stonesoft NGFW appliance as the hardware solution for new Stonesoft NGFW installations. If it is not possible to use a certified platform, Stonesoft NGFW can also run on standard Intel-based hardware that fulfills the hardware requirements. Basic hardware requirements You can install Stonesoft NGFW on standard hardware with these basic requirements. • (Recommended for new deployments) Intel® Xeon®-based hardware from the E5-16xx product family or higher 4 Stonesoft Next Generation Firewall 6.1.2 | Release Notes Note: Legacy deployments with Intel® Core™2 are supported. • IDE hard disk and CD drive Note: IDE RAID controllers are not supported. • Memory: • 4 GB RAM minimum for x86-64-small installation • 8 GB RAM minimum for x86-64 installation • VGA-compatible display and keyboard • One or more certified network interfaces for the Firewall/VPN role • Two or more certified network interfaces for IPS with IDS configuration • Three or more certified network interfaces for Inline IPS or Layer 2 Firewall For information about certified network interfaces, see Knowledge Base article 9721. Master Engine requirements Master Engines have specific hardware requirements. • Each Master Engine must run on a separate physical device. For more details, see the Stonesoft Next Generation Firewall Installation Guide. • All Virtual Security Engines hosted by a Master Engine or Master Engine cluster must have the same role and the same Failure Mode (fail-open or fail-close). • Master Engines can allocate VLANs or interfaces to Virtual Security Engines. If the Failure Mode of the Virtual IPS engines or Virtual Layer 2 Firewalls is Normal (fail-close) and you want to allocate VLANs to several engines, you must use the Master Engine cluster in standby mode. • Cabling requirements for Master Engine clusters that host Virtual IPS engines or Layer 2 Firewalls: • Failure Mode Bypass (fail-open) requires IPS serial cluster cabling. • Failure Mode Normal (fail-close) requires Layer 2 Firewall cluster cabling. For more information about cabling, see the Stonesoft Next Generation Firewall Installation Guide. Virtual appliance node requirements You can install Stonesoft NGFW on virtual appliances with these hardware requirements. Also be aware of some limitations. • (Recommended for new deployments) Intel® Xeon®-based hardware from the E5-16xx product family or higher Note: Legacy deployments with Intel® Core™2 are supported. • One of the following hypervisors: • VMware ESXi 5.5 and 6.0 • KVM (KVM is tested as shipped with Red Hat Enterprise Linux Server 7.1 and 7.2) • 8 GB virtual disk • 4 GB RAM minimum 5 Stonesoft Next Generation Firewall 6.1.2 | Release Notes • A minimum of one virtual network interface for the Firewall/VPN role, three for IPS or Layer 2 Firewall roles When Stonesoft NGFW is run as a virtual appliance node in the Firewall/VPN role, these limitations apply: • Only Packet Dispatching CVI mode is supported. • Only standby clustering mode is supported. • Heartbeat requires a dedicated non-VLAN-tagged interface. When Stonesoft NGFW is run as a virtual appliance node in the IPS or Layer 2 Firewall role, clustering is not supported. Build version Stonesoft Next Generation Firewall 6.1.2 build version is 17037. Product binary checksums Use the checksums to make sure that the installation files downloaded correctly. • sg_engine_6.1.2.17037_x86-64.iso SHA1SUM: 4d1ea0fdcf756071f395b8a23460bff9a93caeb5 SHA256SUM: 378fe2e299671a818902387742101d1f2cb468b33a99a4d84b22dffd7e60276a SHA512SUM: 37385842ab0aa4facf87afe8a61022dd 216268fce724d7746e8b1b5d64df0b4a 1e98437ac69fceb9ba3f33564de979be fb09c457c9d3f98c04956ecc0604a939 • sg_engine_6.1.2.17037_x86-64.zip SHA1SUM: 74ae10bcaf2b6c107df9d30341e5846ac1e87dc5 SHA256SUM: 46cd1e2abf0af068e42df1325bed42f406132eb52c49868ee01b068f239f1472 SHA512SUM: 981b42d1dd1835bf35d5c4d629cdadd8 996f6ca7bbdbdde1bfaaf4d8d4809731 fc8f90ecdf0e2e12f8fa94768c823cb9 ef98e204f7fcbaa2d7130463b743b49e • sg_engine_6.1.2.17037_x86-64-small.iso SHA1SUM: b298584946b8afee5cb4851f1b3e8c9a5da49fa5 SHA256SUM: 2dc25e237eb5f18ae6b63349267702798dc8633a5bb66811bc6f784c96160997 SHA512SUM: c11a407ee20b398fdb76cae15e13d6da 3ff78db6e0e7286bc20b4a641d58b9b3 77c7cf6b945c135c2b7e341311f0e160 ec7d8b10b54a9fc3c4e1e847f85bf648 6 Stonesoft Next Generation Firewall 6.1.2 | Release Notes • sg_engine_6.1.2.17037_x86-64-small.zip SHA1SUM: cf11a38ca3626ed98e7992d2b4bc8a9a869f049d SHA256SUM: deefd4b6d07eacf95e7b697871a0e9a9bceee6526603b74a60f0dd63ee9dac20 SHA512SUM: 0050a7eb2cae5a417552ac5b90b6a0a0 e6502c8f4e3b02f2a60d38d5cb10b8ed c1ae57829f17766e7e014c4c5211b179 848d0a88a86e9efd3e9303e29726d27c Compatibility Stonesoft NGFW 6.1 is compatible with the following component versions. • Stonesoft® Management Center (SMC) 6.1 or later • Dynamic Update 810 or later • Stonesoft® VPN Client for Windows 6.0.0 or later • Stonesoft® VPN Client for Mac OS X 2.0.0 or later • Stonesoft® VPN Client for Android 2.0.0 or later • Server Pool Monitoring Agent 4.0.0 or later • McAfee® Logon Collector 2.2 and 3.0 • McAfee® Advanced Threat Defense 3.6 • McAfee® Endpoint Intelligence Agent (McAfee EIA) 2.5 New features This release of the product includes these new features. For more information and configuration instructions, see the Stonesoft Next Generation Firewall Product Guide and the Stonesoft Next Generation Firewall Installation Guide. Geo-protection and IP address categorization You can now configure geo-protection to allow or block traffic. There are predefined Country elements that represent IP addresses registered in specific countries. You can use Country elements to filter traffic in Access rules based on the source or destination country, or entire continents. They can also be used in NAT rules, Inspection rules, and File Filtering rules. You can use predefined IP address lists to control access to known good or bad IP addresses. You can either use the predefined IP address lists or create new IP address lists. You can also import IP address lists through the SMC API to the SMC. For more information, see the Stonesoft SMC API Reference Guide. 7 Stonesoft Next Generation Firewall 6.1.2 | Release Notes Integration of Sidewinder Proxies On Sidewinder firewalls, proxies provide high assurance protocol validation. On Stonesoft NGFW, Sidewinder Proxies enable some of the proxy features that are available on Sidewinder. In Stonesoft NGFW version 6.1, the following Sidewinder Proxies are supported: HTTP, SSH, TCP, and UDP. You can use Sidewinder Proxies on Stonesoft NGFW to enforce protocol validation and to restrict the allowed parameters for each protocol. Sidewinder Proxies are primarily intended for users in high assurance environments, such as government or financial institutions. In environments that limit access to external networks or access between networks with different security requirements, you can use Sidewinder Proxies for data loss protection. Changes in category-based URL filtering Category-based web filtering now uses URL categories provided by Forcepoint™ ThreatSeeker® Intelligence Cloud. There are new types of elements for configuring URL filtering: • URL Category elements are Network Application elements that represent the categories for category-based URL filtering. • URL Category Group elements contain several related URL Categories. • URL List elements are Network Application elements that allow you to manually define lists of URLs that you want to allow or block. The way that category-based URL filtering is applied to traffic has changed. You can now use URL Categories, URL Category Groups, and URL Lists in the Service cell of Access rules to configure URL filtering. It is no longer possible to configure URL filtering using Situation elements in the Inspection Policy. Note: These changes affect all existing users of category-based URL filtering. Legacy URL Situation elements can no longer be used in policies for Stonesoft NGFW version 6.1 or higher. If rules in your policy contain legacy URL Situation elements, you must replace them with URL Category elements. Browser-based wizard for configuring NGFW appliances As an alternative to using the command-line version of the NGFW Initial Configuration Wizard (sg-reconfigure) to configure an NGFW appliance, you can now use an initial configuration wizard in a web browser. Redirection of web traffic to TRITON AP-WEB Cloud TRITON® AP-WEB Cloud is a cloud-based web security proxy service. Stonesoft NGFW can now redirect web traffic to the TRITON® AP-WEB Cloud for inspection. Stonesoft NGFW redirects web traffic to the TRITON AP-WEB Cloud using a predefined policy-based VPN. The traffic is inspected in the TRITON AP-WEB Cloud and transparently forwarded to the destination. Note: To use TRITON AP-WEB Cloud to inspect web traffic, you must have a subscription to the TRITON AP-WEB Cloud service. In addition to an IPv4 or IPv6 address, you can now use a fully qualified domain name (FQDN) as a dynamic contact address of an external VPN gateway. Connecting through a VPN to a dynamic FQDN endpoint allows TRITON AP-WEB Cloud to offer addresses from the geographically closest service point. 8 Stonesoft Next Generation Firewall 6.1.2 | Release Notes The TRITON AP-WEB Cloud service requires the endpoint to use a MAC address as a unique identifier. You can now define VPN-specific exceptions to the IKE Phase-1 ID for endpoints on VPN Gateways. Exceptions are useful in cases where an external VPN gateway requires specific information in the IKE phase-1 value. For more information and configuration instructions, see Knowledge Base article 10582. Enhancements This release of the product includes these enhancements. Enhancements in Stonesoft NGFW version 6.1.0 Enhancement Description Simplified service configuration and You can now allow access to intranet services in the SSL VPN Portal with customization improvements in SSL a freeform URL. It is no longer necessary to configure each SSL VPN VPN Portal Portal service separately. End users can access the services by typing the URL directly in the SSL VPN Portal. You can now also modify the look-and-feel of the SSL VPN Portal and create a custom theme with company colors and logos for the SSL VPN Portal in the Management Client. Fully qualified domain names as contact addresses in external VPN gateways In addition to an IPv4 or IPv6 address, you can now use a fully qualified domain name (FQDN) as a dynamic contact address of an external VPN gateway. VPN-specific exceptions for IKE Phase-1 ID You can now define VPN-specific exceptions to the IKE Phase-1 ID for endpoints on VPN Gateways. Exceptions are useful in cases where an external VPN gateway requires specific information in the IKE phase-1 value. Improved throughput for antimalware inspection The throughput of anti-malware inspection has been significantly improved. Improved scaling of inspection for Virtual Security Engines Inspection now scales up better with multiple Virtual Security Engines. Improved TCP handling in the inspection module TCP protocol handling in the inspection module has been enhanced for performance and compatibility. Support for Tunnel Interfaces and unnumbered interfaces for OSPF Support for Tunnel Interfaces and unnumbered interfaces for OSPF has been added. Enhanced botnet detection Botnet detection has been enhanced. SSH server key fingerprints shown on engine console when the engine starts up If SSH is enabled, SSH server key fingerprints are shown on the local console when the NGFW engine starts up. 9 Stonesoft Next Generation Firewall 6.1.2 | Release Notes Enhancements in Stonesoft NGFW version 6.1.1 Enhancement Description Improved logging for File Filtering Logging for File Filtering has been improved significantly. For example, all File Filtering Situations are now logged under File Filtering in the Facility column of the Logs view. Improved evasion detection for HTTP traffic Deep inspection is now better able to detect evasions in HTTP traffic. Optimized policy refresh for Virtual Security Engines Refreshing a policy that includes inspection for a large number of Virtual Security Engines is now faster. Enhancements in Stonesoft NGFW version 6.1.2 Enhancement Description Improved TLS inspection The performance of TLS inspection on larger NGFW appliances has been improved. Resolved issues These issues are resolved in this release of the product. For a list of issues fixed in earlier releases, see the Release Notes for the specific release. Description Role Issue number User information provided by McAfee Endpoint Intelligence Agent (EIA) overrides user information from user authentication, such as authentication using the Stonesoft VPN Client or Browser-Based User Authentication. FW NGFW-352 When you select ANY in the Service (Port) cell of a Service Definition, the inspection process might restart when some types of traffic are inspected. FW, IPS, L2FW NGFW-1854 If SYN flood protection is configured and source translation NAT is applied to the connection, reset packets are not correctly sent to the server when a TCP connection times out. FW NGFW-2264 On engines that have a large number of Physical Interfaces or VLAN Interfaces, Aggregated Link Interfaces might not work correctly. FW NGFW-2340 If DHCP requests or replies contain too much group information, the DHCP relay service cannot handle the request. The DHCP relay service stops working. FW NGFW-2387 The engine might restart when VoIP connections are processed using the SIP Protocol Agent. FW, IPS, L2FW NGFW-2509 DHCP relay might stop working when you modify an interface that has DHCP relay enabled. FW When users access websites through a proxy, URL categorization does not work. FW, IPS, L2FW NGFW-2721 NGFW-2675 10 Stonesoft Next Generation Firewall 6.1.2 | Release Notes Description Role Issue number Policy installation might fail when anti-spam is configured for the engine. FW NGFW-2773 On some larger NGFW appliance models, the inspection process might use FW, IPS, L2FW NGFW-2793 too much memory. This issue can cause latency and load peaks. HTTPS websites may get incorrect additional URL categories returned when web filtering is based on SNI. FW, IPS, L2FW NGFW-3010 If IPv6 NAT is configured for a firewall node, the node does not respond to neighbor solicitation messages after the node reboots, or after there is a state change in the cluster. FW The OpenSSL library has been updated to address CVE-2016-7056, CVE-2016-8610, and CVE-2017-3731. There are no known attack vectors for these vulnerabilities in Stonesoft Next Generation Firewall (Stonesoft NGFW). FW, IPS, L2FW NGFW-3315 NGFW-3049 Installation instructions Use these high-level steps to install SMC and the Stonesoft NGFW engines. For detailed information, see the Stonesoft Next Generation Firewall Installation Guide. All guides are available for download at https://support.forcepoint.com. Note: The sgadmin user is reserved for SMC use on Linux, so it must not exist before SMC is installed for the first time. Steps 1) Install the Management Server, the Log Servers, and optionally the Web Portal Servers. 2) Import the licenses for all components. You can generate licenses at https://stonesoftlicenses.forcepoint.com. 3) Configure the Firewall, IPS, or Layer 2 Firewall elements with the Management Client using the Configuration view. 4) To generate initial configurations for the engines, right-click each Firewall, IPS, or Layer 2 Firewall element, then select Configuration > Save Initial Configuration. Make a note of the one-time password. 5) Make the initial connection from the engines to the Management Server, then enter the one-time password. 6) Create and upload a policy on the engines using the Management Client. 11 Stonesoft Next Generation Firewall 6.1.2 | Release Notes Upgrade instructions Take the following into consideration before upgrading licenses, engines, and clusters. • Upgrading to version 6.1 is only supported from version 5.10 or later. If you have an earlier version, first upgrade to version 5.10. • Stonesoft NGFW version 6.1 requires an updated license. The license upgrade can be requested at https://stonesoftlicenses.forcepoint.com. Install the new license using the Management Client before upgrading the software. If communication between the SMC and the license server is enabled and the maintenance contract is valid, the license is updated automatically. • To upgrade the engine, use the remote upgrade feature or reboot from the installation CD and follow the instructions. For detailed instructions, see the Stonesoft Next Generation Firewall Installation Guide. • Changes to category-based URL filtering in Forcepoint NGFW version 6.1 affect all existing users of categorybased URL filtering. Legacy URL Situation elements can no longer be used in policies for Forcepoint NGFW version 6.1 or later. If rules in your policy contain legacy URL Situation elements, you must replace them with URL Category elements. See the Forcepoint Next Generation Firewall Product Guide for detailed instructions. • The way that routes defined in the Management Client are handled by Quagga has changed. In Forcepoint NGFW version 6.0 and earlier, static routes that you defined in the Management Client were considered kernel routes in Quagga. When redistributing these to dynamic routing protocols, you could use the "redistribute kernel" command. Starting from Forcepoint NGFW version 6.1.0, static routes that you define in the Management Client are considered static routes in Quagga. This change affects, for example, redistributing routes that you define in the Management Client to the dynamic routing protocols. Configuring static routes using vtysh in Quagga is no longer supported. Use the Management Client to configure static routing. Known issues For a list of known issues in this product release, see Knowledge Base article 10571. Known limitations This release of the product includes these known limitations. Limitation Description Inspection in asymmetrically routed networks In asymmetrically routed networks, using the stream-modifying features (TLS Inspection, URL filtering, and file filtering) can make connections stall. Inline Interface disconnect The disconnect mode for Inline Interfaces is not supported on IPS virtual mode in the IPS role appliances, IPS software installations, IPS appliance models other than IPS-6xxx, or modular appliance models that have bypass interface modules. For information about feature-specific limitations, see the Stonesoft Next Generation Firewall Product Guide. 12 Stonesoft Next Generation Firewall 6.1.2 | Release Notes Find product documentation On the Forcepoint support website, you can find information about a released product, including product documentation, technical articles, and more. You can get additional information and support for your product on the Forcepoint support website at https://support.forcepoint.com. There, you can access product documentation, Knowledge Base articles, downloads, cases, and contact information. Product documentation Every Forcepoint product has a comprehensive set of documentation. • Stonesoft Next Generation Firewall Product Guide • Stonesoft Next Generation Firewall online Help Note: By default, the online Help is used from the Forcepoint help server. If you want to use the online Help from a local machine (for example, an intranet server or your own computer), see Knowledge Base article 10097. • Stonesoft Next Generation Firewall Installation Guide Other available documents include: • Stonesoft Next Generation Firewall Hardware Guide for your model • Stonesoft Next Generation Firewall Quick Start Guide • Stonesoft SMC API Reference Guide • Stonesoft VPN Client User Guide for Windows or Mac • Stonesoft VPN Client Product Guide 13 © 2017 Forcepoint Forcepoint and the FORCEPOINT logo are trademarks of Forcepoint. Raytheon is a registered trademark of Raytheon Company. All other trademarks used in this document are the property of their respective owners.
© Copyright 2026 Paperzz