We had several problems with this in our CSA deployment...We actually had to open a case with Cisco to get it taken care of.
The only things I can reccomend if you have it is to look over details of the event where it sets the rootkit to Untrusted. See if you can locate any patterns in the details. Also, you can look into using an Exception rule if you know your system is safe already.
In our case, we had done a fresh install and the computer had never connected to the network, so we knew it was. However, the event in question was , so we had to locate a pattern in one of the String fields, which we put into the "Included code patterns" field of a Kernel protection rule.
Login to the FXOS chassis manager.
Direct your browser to https://hostname/, and log-in using the user-name and password.
Go to Help > About and check the current version:
Check the current version availa...
We have configured the outside and inside Interface with official ipv6 adresses, set a default route on outside Interface to our router, we also have definied a rule , which also gets hits, to permit tcp from inside Interface to any6.
In Syslog I also se...