On This Page
R22-1 Aurora PHF4.1.0 Release Notes
Resolved Issues from Previous Releases
Tufin Orchestration Suite (TOS) R22-1 Aurora PHF4.1.0 includes all resolved issues listed for this release, as well as all resolved issues from the previous releases listed below.
All Resolved Issues |
|
|
---|---|---|
This release |
|
|
R21-3 PHF2.1.0 |
||
R21-2 PHF2.0.0 |
||
R21-1 PHF1.1.0 |
Installing/Upgrading TOS Aurora
There are three options for installing or upgrading TOS Aurora:
-
New installation: Installing TOS Aurora on a new environment.
For more information, see Clean Install procedures
-
Aurora to Aurora upgrade: Upgrading an older version of TOS Aurora to a newer version of TOS Aurora.
For more information, see Upgrade From TOS Aurora
-
Classic to Aurora upgrade: Upgrading TOS Classic to TOS Aurora.
For more information, see Upgrade TOS Classic to TOS Aurora.
Before You Install R22-1 or Upgrade
Services network
The physical address of the TOS Aurora servers
Your primary VIP, Syslog VIP or external load balancer IP
Any other subnets communicating with TOS or with TOS nodes
To enable SNMP v2 walk and get queries, after the installation/upgrade, run the following CLI command on the initial data node as a user with root privileges
tos config set -p snmp.inboundMonitoringEnabled=true -s monitor-tower
To resolve this, you can:
Ensure that a valid license is attached to all managed firewalls.
Disable the unlicensed firewalls
Remove the unlicensed firewalls from SecureTrack monitoring.
Upgrade Paths and Compatibility
To view the supported upgrade paths for TOS Aurora, see:
Always review the TOS Release History prior to installing an upgrade. Make sure to read the additional notes in the Release Notes for each version in your upgrade path.
TufinOS Compatibility
Tufin Orchestration Suite R22-1 Aurora requires TufinOS 3.70 and above. If you are running TufinOS 3.70, we strongly recommend upgrading to at least TufinOS 3.71 as it contains important security fixes. However, it is always best to use the latest version of TufinOS available.
Deprecated Features
The following features are no longer available in these releases of TOS Aurora:
Feature |
Removed from New Installations |
Removed When Upgrading |
Announcement Date |
---|---|---|---|
Adding new TOP plugins (existing plugins in TOS will continue to work). |
R25-1 |
R25-2 |
March 2024 |
Extended Dynamic List (EDL) management via SecureApp |
R24-1 |
R24-2 |
November 2023 |
TLS 1.0/1.1 (email and LDAP communications). Transport Layer Security (TLS) 1.0 and 1.1 were deprecated by the IETF in June 2018, due to security issues. For most services TLS 1.2 is now mandatory. |
R23-2 |
R23-2 |
December 2022 |
Policy Analysis Report (replaced by Policy Analysis Report in STRE) |
R21-3 | R22-2 | June 2021 |
Risk Charts (replaced by Dashboard) | R21-3 | R22-2 |
June 2021 |
Compliance Policies (replaced by Unified Security Policy) | R21-3 | R22-2 | June 2021 |
Regulations Audit Browser (replaced by Unified Security Policy and SecureTrack Reporting Essentials) |
R21-3 |
R22-2 |
June 2021 |
Rule Documentation Report (replaced by Rule Viewer) | R21-3 | R22-1 | June 2021 |
Security Risk Report (replaced by Unified Security Policy and SecureTrack Reporting Essentials) | R22-1 | R22-2 |
June 2021 |
Expired Rules Report (replaced by Rule Viewer, SecureTrack Reporting Essentials Rule Analytics report, and the Rule Lifecycle Management App). |
R22-1 |
R22-2 |
June 2021 |
Integration with Puppet Labs | R19-3 | R19-3 | August 2021 |
Viewing Cisco ACI Applications in SecureApp | R19-3 | R19-3 | August 2021 |
Firewall OS Monitoring (available only where used continuously since upgrade from TOS Classic) | R22-1 | R22-1 | March 2022 |
For a list of features that will be deprecated in future releases, see End of Support and Deprecated Features
Deprecated Devices/Vendors
The following devices/vendors are no longer available in these releases of TOS Aurora:
Device/Vendor |
Removed from New Installations |
Removed from New Installations and TOS Upgrades |
---|---|---|
R22-1 Aurora PHF4.1.0 Release Notes | R23-2 | |
R22-1 Aurora PHF4.1.0 Release Notes | R23-1 | |
R22-1 Aurora PHF4.1.0 Release Notes | R23-1 | |
R22-1 Aurora PHF4.1.0 Release Notes | R22-1 | |
R22-1 Aurora PHF4.1.0 Release Notes | R19-3 | R22-1 - Not removed, but retrieving revisions is no longer supported |
R22-1 Aurora PHF4.1.0 Release Notes | R19-3 | R22-1 - Not removed, but retrieving revisions is no longer supported |
Additional Information
- Starting from R22-1 PHF3.0.0, there is a new bulk API that allows the deletion of a management device and all its managed devices.
-
Starting from R22-1 PHF2.0.0, for Cisco ASA devices, in order to prevent unnecessary ticket dependencies, Designer creates groups using the timestamp as the suffix of the group name. For example:
-
NetworkGroup_1657713531
-
-
SecureChange verifies that devices are suitably licensed for both SecureChange and Provisioning during ticket handling.
Unlicensed devices may cause unplanned interruptions when performing SecureChange operations.
We strongly recommend checking that all devices used in the system are fully licensed prior to upgrading, as unlicensed devices may cause unplanned interruptions when performing SecureChange operations.
To review the status of all your licenses, see Viewing License Status .
For a summary of how to work with SecureChange licenses, see Installing SecureChange Licenses and Licensing SecureChange.
For more information about licensing, contact your Tufin partner or email us at [email protected].
-
Tufin Orchestration Suite enforces maximum session duration settings for SecureTrack and SecureChange, including for the REST APIs.
-
To ensure that SecureChange and SecureApp have full functionality, the dedicated account used to define integration with SecureTrack (SecureChange/SecureApp > Settings > General > SecureTrack) should have Super Admin permissions configured in SecureTrack.
-
For Check Point R80 devices, a new revision is automatically retrieved when you upgrade, and therefore Compare Revisions may show changes for all the existing network objects.
Before you upgrade, make sure you have a recent (from ≤ 3 months) Check Point Jumbo Hotfix version installed on your device. See the relevant Check Point Support Center article for more information on how to verify which Jumbo Hotfix version is installed.
-
Microsoft Internet Explorer (IE): Internet Explorer will reached its "end of life" (EOL) in R20-2. TOS supports Microsoft Edge version 80.0.x (and above) and continues to support Chrome version 80.0.x (and above) and Firefox version 73.0.1 (and above).
-
SAML Login Authentication and Google Chrome browsers: Google recently introduced a change to their SameSite cookie policy that enhances browser security. As a result of this change, users will be unable to log in to SecureTrack using SAML authentication on old browsers. SAML authentication is supported only for browser versions starting from:
-
Chrome: versions 79 and 80.
-
Firefox: version 72
We strongly recommend upgrading the browsers to these versions. For more information on the SameSite cookie policy change, see the following posts:
-
If you want to change back to the previous naming convention, in stconf set the Designer_ASA_Index_Group_Name flag as True.
For more information, see Changing The Naming Convention of Cisco ASA Group Names Created by Designer