Go to the table of contents Go to the previous page Go to the next page View or print as PDF
New in X-Series v8.2.0
60222 | Release Notes | X-Series Appliances | 29-April-2016
*
*
*
*
*
*
*
Introducing Forcepoint™
In January, 2016, Raytheon | Websense became Forcepoint LLC.
In this release all TRITON graphical user interfaces have a new look and feel. The colors and logos, as well as the logon screen and most toolbars, have been updated to reflect the Forcepoint brand.
These changes do not affect product functionality.
Over time, branding will be extended to other areas, such as the Help system, as well as to external content, such as the Knowledge Base.
Upgrade to 8.2.0 from 8.x and 7.8.x
Existing deployments can easily upgrade from any version of 8.1.x, 8.0.x, and 7.8.x. Follow the procedures described in the X-Series upgrade instructions. The procedure includes preparing and using a local filestore. This is a more efficient process because the upgrade patch files are downloaded from the Forcepoint patch file download server only once.
Express upgrade served from a local filestore
In version 8.0.0, a simpler, more efficient upgrade method, called express upgrade, was introduced. With express upgrade, when the CLI load patch command is run, in addition to listing all of the available individual module patches, the process inventories modules and versions on the appliance and offers an express upgrade option in which load patch both downloads all of the patches needed to upgrade to the latest version, and installs those patches in the correct order, thereby upgrading the appliance to the latest version in a single step.
Beginning with version 8.1.0, you can prepare a local filestore to offer the express upgrade option. This can be a big help because there are often many blades to upgrade and the time needed to download patches from a local filestore is usually much less than downloading them from the Websense patch file server. The Appliance controller module (APP) must be at version 8.1.0 to use this feature.
To support express upgrade from a local filestore, all of the individual patches that may be needed to upgrade a blade to the latest version must be placed in the filestore. Without these, load patch may not offer an express upgrade package that upgrades all of the appliance modules. Follow the detailed procedure described in the X-Series upgrade guide.
TRITON APX
Those upgrading from v7.8.4 and earlier need to know that version 8.0 introduced a new, simplified product naming and grouping of the TRITON product line.
Existing product functionality is unchanged.
Appliance product names are unchanged.
Browsers supported with TRITON management consoles
All deployments include a TRITON Manager. TRITON AP-WEB deployments include the Content Gateway manager. These managers can be used with the following browsers.
*
*
*
*
*
TRITON self-signed certificate
When you connect to any TRITON management console—TRITON Manager, and Content Gateway Manager—you are presented with a self-signed digital certificate. The certificate names Websense, Inc., as the Organization (O). This will change to Forcepoint LLC in a future release.
Because browsers do not recognize Websense, Inc., as a known Certificate Authority, a certificate error is displayed the first time you launch a TRITON management console from a new browser. To avoid seeing this error, install or permanently accept the certificate in the browser. After the security certificate is accepted, the manager logon page is displayed.
Security enhancements
This release addresses the following Common Vulnerabilities and Exposures:
*
OpenSSL libraries were updated to resolve the following vulnerabilities:
CVE-2015-1788
CVE-2015-1789
CVE-2015-1790
CVE-2015-1791
CVE-2015-1792
CVE-2014-8176
*
OpenLDAP libraries were updated to resolve the following vulnerability:
CVE-2013-4449
CVE-2012-3411
*
PAM (Pluggable Authentication Modules)
PAM libraries were updated to resolve the following vulnerabilities:
CVE-2011-3148
CVE-2011-3149
*
libgcrypt libraries were updated to resolve the following vulnerability:
CVE-2013-4242
*
util-linux-ng libraries were updated to resolve the following vulnerability:
CVE-2013-0157
*
glibc libraries were updated to resolve the following vulnerability:
CVE-2015-7547
*
libxml2 libraries were updated to resolve the following vulnerability:
CVE-2013-0338

Go to the table of contents Go to the previous page Go to the next page View or print as PDF
Copyright 2016 Forcepoint LLC. All rights reserved.