index
int64
0
4.08k
text
stringlengths
34
4.9k
βŒ€
url
stringclasses
38 values
49
Figure 53: Slide the Sliding Rack Tray Into the Rack Shelf Step 8 The chassis is now installed in the sliding rack tray, which is installed in the rack shelf. RepeatSteps 1 through 8 to install a second chassis. Use the second sliding rack tray and remaining three M3 x 7-mm screws to install a second chassis to the sli...
https://www.cisco.com/c/en/us/td/docs/security/firepower/1010/hw/guide/hw-install-1010.pdf
50
You can now attach your power supply cord. What to do next Install the cables according to your default software configuration as described in the Cisco Firepower 1010 Getting Started Guide. Cisco Firepower 1010 Series Hardware Installation Guide 47 Mount the Chassis Rack-Mount the Chassis with the 150-W Power Supply
https://www.cisco.com/c/en/us/td/docs/security/firepower/1010/hw/guide/hw-install-1010.pdf
51
Cisco Firepower 1010 Series Hardware Installation Guide 48 Mount the Chassis Rack-Mount the Chassis with the 150-W Power Supply
https://www.cisco.com/c/en/us/td/docs/security/firepower/1010/hw/guide/hw-install-1010.pdf
52
CHAPTER 4 Connect to the Console Port β€’ Connect to the Console Port with Microsoft Windows, on page 49 β€’ Connect to the Console Port with Mac OS X, on page 51 β€’ Connect to the Console Port with Linux, on page 51 Connect to the Console Port with Microsoft Windows You must install a USB device driver the first time a Mic...
https://www.cisco.com/c/en/us/td/docs/security/firepower/1010/hw/guide/hw-install-1010.pdf
53
Figure 55: Console Port Connection 1 USB Mini B console port 2 USB Mini B to USB Type A console cable 3 USB Type A β€” Step 4 Connect the end of the cable with the DB-9 connector (or USB Type A) to the terminal or PC. If your terminal or PC has a console port that does not accommodate a DB-9 connector, you must provide a...
https://www.cisco.com/c/en/us/td/docs/security/firepower/1010/hw/guide/hw-install-1010.pdf
54
β€’ no parity β€’ 1 stop bit β€’ no flow control Connect to the Console Port with Mac OS X Follow these steps to connect a Mac OS X system USB port to the console using the built-in OS X Terminal utility, or alternatively you can use a separate terminal emulator application. Procedure Step 1 Use the Finder to go to Applicati...
https://www.cisco.com/c/en/us/td/docs/security/firepower/1010/hw/guide/hw-install-1010.pdf
55
crw-r--r-- 1 root root 188, 0 Jan 14 18:02 ttyACM0 root@usb-suse /dev# Step 4 Connect to the USB port with the following command followed by the chassis USB port speed Example: root@usb-suse /dev# screen /dev/ttyACM0 9600 Step 5 To disconnect the Linux USB console from the Terminal window, enter Ctrl-a followed by : th...
https://www.cisco.com/c/en/us/td/docs/security/firepower/1010/hw/guide/hw-install-1010.pdf
56
CHAPTER 5 Installation, Maintenance, and Upgrade β€’ Install the FIPS Opacity Shield , on page 53 Install the FIPS Opacity Shield Because theFIPSopacity shield coversthe serial number on the chassis, the CO should copy the serial number and store it in a secure place. The serial number is needed when you call Cisco TAC. ...
https://www.cisco.com/c/en/us/td/docs/security/firepower/1010/hw/guide/hw-install-1010.pdf
57
The TELs are made of a special thin gauge vinyl with self-adhesive backing. Once the CO attachesthem on the chassis, any attempt to open the chassis damages the TELs or the chassis cover. Because the TELs have nonrepeated serial numbers, the CO can inspect them for damage and compare them against the applied serial num...
https://www.cisco.com/c/en/us/td/docs/security/firepower/1010/hw/guide/hw-install-1010.pdf
58
Figure 57: Install Screws on the Bottom of the FIPS Cover 1 FIPS opacity shield 2 Three M3 x 66 mm Phillips screws Step 5 Before you attach the TELs, clean the chassis and FIPS cover of any grease, dirt, or oil with alcohol-based cleaning pads. Step 6 Attach four of the TELs, three on the bottom of the chassis over the...
https://www.cisco.com/c/en/us/td/docs/security/firepower/1010/hw/guide/hw-install-1010.pdf
59
Figure 58: TELS Placement on the Rear Panel and Bottom of the FIPS Cover TEL 2 on the bottom left of the FIPS cover over the screw 1 TEL 1 on the rear panel of the chassis 2 TEL 4 on the bottom right of the FIPS cover over the screw TEL 3 on the bottom center of the FIPS cover over 4 the screw 3 Step 7 Reinstall the ch...
https://www.cisco.com/c/en/us/td/docs/security/firepower/1010/hw/guide/hw-install-1010.pdf
60
β€’ See the fips enable command in the Cisco ASA Series Command Reference, A-H Commands for the ASA procedure to enable FIPS mode. What to do next See the Cisco Firepower 1010 Getting Started Guide for further configuration information. Cisco Firepower 1010 Series Hardware Installation Guide 57 Installation, Maintenance,...
https://www.cisco.com/c/en/us/td/docs/security/firepower/1010/hw/guide/hw-install-1010.pdf
61
Cisco Firepower 1010 Series Hardware Installation Guide 58 Installation, Maintenance, and Upgrade Install the FIPS Opacity Shield
https://www.cisco.com/c/en/us/td/docs/security/firepower/1010/hw/guide/hw-install-1010.pdf
0
Cisco Secure Firewall Threat Defense Upgrade Guide for Management Center, Version 7.4.1–7.4.x First Published: 2023-12-13 Last Modified: 2024-09-04 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/740/upgrade-management-center-741.pdf
1
THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APP...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/740/upgrade-management-center-741.pdf
2
CONTENTS CHAPTER 1 Planning Your Upgrade 1 Is This Guide for You? 1 Compatibility 1 Upgrade Guidelines 2 Software Upgrade Guidelines 2 Upgrade Guidelines for the Firepower 4100/9300 Chassis 2 Upgrade Path 2 Upgrade Order for Threat Defense with Chassis Upgrade and High Availability/Clusters 4 Upgrade Packages 5 Managin...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/740/upgrade-management-center-741.pdf
3
Upgrade Threat Defense 21 Threat Defense Upgrade Options 24 Upgrade Threat Defense in Unattended Mode 25 Upgrade Older ASA FirePOWER and NGIPSv Devices 26 CHAPTER 4 Upgrade the Secure Firewall 3100 or Firepower 4100/9300 Chassis 29 Upgrade the Secure Firewall 3100 Chassis 29 Upgrade FXOS on the Firepower 4100/9300 with...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/740/upgrade-management-center-741.pdf
4
Unresponsive and Failed Management Center Upgrades 65 Unresponsive and Failed Threat Defense Upgrades 65 Traffic Flow and Inspection 67 Traffic Flow and Inspection for Threat Defense Upgrades 67 Traffic Flow and Inspection for Chassis Upgrades 69 Traffic Flow and Inspection when Deploying Configurations 69 Time and Dis...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/740/upgrade-management-center-741.pdf
5
Cisco Secure Firewall Threat Defense Upgrade Guide for Management Center, Version 7.4.1–7.4.x vi Contents
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/740/upgrade-management-center-741.pdf
6
CHAPTER 1 Planning Your Upgrade Use this guide to plan and complete threat defense and management center upgrades. Upgrades can be major (A.x), maintenance (A.x.y), or patch (A.x.y.z) releases. We also may provide hotfixes, which are minor updates that address particular, urgent issues. β€’ Is This Guide for You?, on pag...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/740/upgrade-management-center-741.pdf
7
Upgrade Guidelines See the release notes for release-specific upgrade warnings and guidelines, and for information on features and bugs with upgrade impact. For general information on time/disk space requirements and on system behavior during upgrade, see Troubleshooting and Reference, on page 63. Software Upgrade Guid...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/740/upgrade-management-center-741.pdf
8
then the chassis, then devices again. Or, perform a full reimage. In high availability or clustered deployments, upgrade one chassis at a time. Supported Direct Upgrades This table shows the supported direct upgrades for management center and threat defense software. Note that although you can upgrade directly to major...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/740/upgrade-management-center-741.pdf
9
Upgrade Order for Threat Defense with Chassis Upgrade and High Availability/Clusters When a chassis upgrade is required in high availability or clustered deployments, upgrade one chassis at a time. Table 2: Chassis Upgrade Order for the Firepower 4100/9300 with Management Center Threat Defense Deployment Upgrade Order ...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/740/upgrade-management-center-741.pdf
10
Threat Defense Deployment Upgrade Order Upgrade both chassis before you upgrade threat defense. 1. Upgrade chassis. With the chassis upgrade wizard, you have three options: β€’ Parallel upgrade: Not recommended for high availability. β€’ Serial upgrade: Automatically fail over when the active unit goes down. We recommend y...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/740/upgrade-management-center-741.pdf
11
To... Do This... Click the Ellipsis (…) next to the package or package version you want to delete and select Delete. This deletes the packages (or the pointer to the package) from the management center. It does not delete packages from any devices where you already copied them.For management centers in high availabilit...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/740/upgrade-management-center-741.pdf
12
Requirements When to Use You meet disk space and bandwidth requirements, but either the management center cannot access the Cisco Support & Download site, or you are applying a hotfix. See: Upgrade Packages on Cisco.com, on page 10 Cisco β†’ Your Computer β†’ Management Center β†’ Devices Adequate disk space on the managemen...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/740/upgrade-management-center-741.pdf
13
Field Description For secure web servers (HTTPS), the server's digital certificate (PEM format). Copy and paste the entire block of text, including the BEGIN CERTIFICATE and END CERTIFICATE lines. You should be able to obtain the certificate from the server's administrator. You may also be able to use your browser, or ...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/740/upgrade-management-center-741.pdf
14
Step 4 Copy the package from any device that hasthe package you need, by specifying the IPaddress and path you just discovered. sync-from-peer ip_address package_path After you confirm that you want to copy the package, the system displays a sync status UUID that you can use to monitor this transfer. Step 5 Monitor tra...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/740/upgrade-management-center-741.pdf
15
Repeat this step for each chassis you want to clean up. Step 6 Back in the chassis upgrade wizard, click Reset to reset the workflow. Upgrade Packages on Cisco.com Manually download upgrade packages from Cisco when the system cannot access the Cisco Support & Download site, or when you cannot direct-download for anothe...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/740/upgrade-management-center-741.pdf
16
Platform Package Notes Threat defense virtual Cisco_FTD_Upgrade-Version-build.sh.REL.tar β€” ISA 3000 with FTD Cisco_FTD_Upgrade-Version-build.sh.REL.tar β€” Chassis Packages for the Secure Firewall 3100 For theSecureFirewall 3100 in multi-instance mode, the threat defense and chassis upgradesshare a package. Chassis Packa...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/740/upgrade-management-center-741.pdf
17
insufficient bandwidth can extend upgrade time or even cause the upgrade to time out. See Guidelines for Downloading Data from theFirepower Managemen t Center to Managed Devices(Troubleshooting TechNote). Configuration and Deployment Checks Configurations Make sure you have made any required pre-upgrade configuration c...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/740/upgrade-management-center-741.pdf
18
Table 10: Backups Backup Guide CiscoSecureFirewall Management Center Administration Guide: Backup/Restore We recommend you back up configurations and events. Management center CiscoSecureFirewall Management Center Administration Guide: Backup/Restore Note that backup is not supported in all cases, for example, for thre...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/740/upgrade-management-center-741.pdf
19
Cisco Secure Firewall Threat Defense Upgrade Guide for Management Center, Version 7.4.1–7.4.x 14 Planning Your Upgrade Software Upgrade Readiness Checks
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/740/upgrade-management-center-741.pdf
20
CHAPTER 2 Upgrade Management Center β€’ Upgrade the Management Center: Standalone, on page 15 β€’ Upgrade the Management Center: High Availability, on page 17 Upgrade the Management Center: Standalone Use this procedure to upgrade a standalone management center. As you proceed, the system displays basic information about t...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/740/upgrade-management-center-741.pdf
21
Step 1 On the management center, choose System ( ) > Product Upgrades. Step 2 Get the upgrade package. The Product Upgrades page lists all upgrade packages that apply to your current deployment, with suggested releases specially marked. In most cases, you can just click Download next to the upgrade package or version y...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/740/upgrade-management-center-741.pdf
22
Upgrade the Management Center: High Availability Use this procedure to upgrade high availability management centers. As you proceed, the system displays basic information about the upgrade, as well as the current upgrade-related status. Neither your workflow nor upgrade packages are synchronized between high availabili...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/740/upgrade-management-center-741.pdf
23
Prepare to upgrade. Step 1 On the standby peer, choose System ( ) > Product Upgrades. Step 2 Get the upgrade package. The Product Upgrades page lists all upgrade packages that apply to your current deployment, with suggested releases specially marked. In most cases, you can just click Download next to the upgrade packa...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/740/upgrade-management-center-741.pdf
24
Step 11 Repeat Steps 8-10 on the other peer. Resume synchronization and complete post-upgrade tasks. Step 12 On the original active peer (the one you just upgraded), resume high availability synchronization. Remember that for major and maintenance upgrades, synchronization should automatically resume. For patches and h...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/740/upgrade-management-center-741.pdf
25
Cisco Secure Firewall Threat Defense Upgrade Guide for Management Center, Version 7.4.1–7.4.x 20 Upgrade Management Center Upgrade the Management Center: High Availability
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/740/upgrade-management-center-741.pdf
26
CHAPTER 3 Upgrade Threat Defense β€’ Upgrade Threat Defense, on page 21 β€’ Upgrade Older ASA FirePOWER and NGIPSv Devices, on page 26 Upgrade Threat Defense Use this procedure to upgrade threat defense. As you proceed, the system displays basic information about your selected devices, as well as the current upgrade-relate...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/740/upgrade-management-center-741.pdf
27
β€’ Check configurations, tasks, and overall deployment health: Configuration and Deployment Checks, on page 12 β€’ Perform backups: Backups, on page 12 β€’ Upgrade chassis, if required: Upgrade the Secure Firewall 3100 or Firepower 4100/9300 Chassis, on page 29 Step 1 On the management center, choose System ( ) > Product Up...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/740/upgrade-management-center-741.pdf
28
Compatibility and other quick prechecks are automatic. For example, the system alerts you immediately if you need to deploy configurations. Other checks take more time. To begin these, click Run Readiness Check. Do not deploy changes to, manually reboot, or shut down a device while running readiness checks. Although yo...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/740/upgrade-management-center-741.pdf
29
Before you deploy, you may want to review the changes made by the upgrade (as well as any changes you have made since upgrade). Choose Deploy > Advanced Deploy,select the devices you just upgraded, and click Pending Changes Reports. After the reports finish generating, you can download them from the Tasks tab on the Me...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/740/upgrade-management-center-741.pdf
30
Option When to Disable Details With upgrades to Version 7.2–7.6, eligible devices will upgrade from Snort 2 to Snort 3 when you deploy configurations. With upgrades to Version 7.3+, you cannot disable this option. Although you can switch individual devices back, Snort 2 will be deprecated in a future release and we str...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/740/upgrade-management-center-741.pdf
31
To... Do This In the threat defense upgrade wizard, choose Unattended Mode > Stop. You can pause and restart unattended mode during the copy and checks phases. However, pausing unattended mode does not stop tasks in progress. Copies and checks that have started will run to completion. Note that you must pause unattende...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/740/upgrade-management-center-741.pdf
32
Step 1 On the management center, choose System ( ) > Product Upgrades. Step 2 Get the device upgrade packages onto the management center. The Product Upgrades page lists all upgrade packages that apply to your current deployment, with suggested releases specially marked. In most cases, you can just click Download next ...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/740/upgrade-management-center-741.pdf
33
Cisco Secure Firewall Threat Defense Upgrade Guide for Management Center, Version 7.4.1–7.4.x 28 Upgrade Threat Defense Upgrade Older ASA FirePOWER and NGIPSv Devices
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/740/upgrade-management-center-741.pdf
34
CHAPTER 4 Upgrade the Secure Firewall 3100 or Firepower 4100/9300 Chassis Some devices may require a chassis upgrade (FXOS and firmware) before you upgrade the software: β€’ Secure Firewall 3100 in multi-instance mode: Any upgrade can require a chassis upgrade. Although you upgrade the chassis and threat defense separate...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/740/upgrade-management-center-741.pdf
35
Do not make or deploy configuration changes to the chassis or threat defense instances during the upgrade. Even if the system appears inactive, do not manually reboot or shut down. In most cases, do not restart an upgrade in progress. You could place the system in an unusable state and require a reimage. Chassis may re...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/740/upgrade-management-center-741.pdf
36
You can use the device links on the Device Selection pane to toggle the Device Details pane between selected chassis, remaining upgrade candidates, ineligible chassis (with reasons why), chassis that need the upgrade package, and so on. You can add and remove chassis from your selection, or click Reset to clear your ch...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/740/upgrade-management-center-741.pdf
37
What to do next β€’ (Optional) Clear the wizard by clicking Clear Upgrade Information. Until you do this, the page continues to display details about the upgrade you just performed. After you clear the wizard, use the Upgrade tab on the Device Management page to see last-upgrade information for chassis. β€’ Back up again: ...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/740/upgrade-management-center-741.pdf
38
The system will first verify the software package that you want to install. It will inform you of any incompatibility between currently installed applications and the specifiedFXOSplatform software package. It will also warn you that any existing sessions will be terminated and that the system will need to be rebooted ...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/740/upgrade-management-center-741.pdf
39
Upgrade FXOS on an FTD Inter-chassis Cluster Using Firepower Chassis Manager If you have Firepower 9300 or Firepower 4100 series security appliances that have FTD logical devices configured as an inter-chassis cluster, use the following procedure to update the FXOS platform bundle on your Firepower 9300 or Firepower 41...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/740/upgrade-management-center-741.pdf
40
The system will first verify the software package that you want to install. It will inform you of any incompatibility between currently installed applications and the specified FXOS platform software package. It will also warn you that any existing sessions will be terminated and that the system will need to be reboote...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/740/upgrade-management-center-741.pdf
41
FP9300-A /ssa # show app-instance App Name Slot ID Admin State Oper State Running Version Startup Version Profile Name Cluster State Cluster Role ---------- ---------- ----------- ---------------- --------------- --------------- ------------ --------------- ------------ ftd 1 Enabled Online 6.2.2.81 6.2.2.81 In Cluster...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/740/upgrade-management-center-741.pdf
42
Step 4 After the new platform bundle image hassuccessfully uploaded, click Upgrade for theFXOSplatform bundle to which you want to upgrade. The system will first verify the software package that you want to install. It will inform you of any incompatibility between currently installed applications and the specified FXO...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/740/upgrade-management-center-741.pdf
43
d) Click Yes to immediately make the standby device the active device in the high availability pair. Step 9 Connect to Firepower Chassis Manager on the Firepower security appliance that contains the new standby Firepower Threat Defense logical device: Step 10 In Firepower Chassis Manager, choose System > Updates. The A...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/740/upgrade-management-center-741.pdf
44
Step 15 After all components have successfully upgraded, enter the following commands to verify the status of the security modules/security engine and any installed applications: a) Enter top. b) Enter scope ssa. c) Enter show slot. d) Verify that the Admin State is Ok and the Oper State is Online for the security engi...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/740/upgrade-management-center-741.pdf
45
Step 1 Connect to the FXOS CLI. Step 2 Download the new platform bundle image to the Firepower 4100/9300 chassis: a) Enter firmware mode: Firepower-chassis-a # scope firmware b) Download the FXOS platform bundle software image: Firepower-chassis-a /firmware # download image URL Specify the URL for the file being import...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/740/upgrade-management-center-741.pdf
46
Step 6 The system will first verify the software package that you want to install. It will inform you of any incompatibility between currently installed applications and the specifiedFXOSplatform software package. It will also warn you that any existing sessions will be terminated and that the system will need to be re...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/740/upgrade-management-center-741.pdf
47
Upgrade FXOS on an FTD Inter-chassis Cluster Using the FXOS CLI If you haveFirepower 9300 orFirepower 4100 seriessecurity appliances withFTD logical devices configured as an inter-chassis cluster, use the following procedure to update theFXOSplatform bundle on yourFirepower 9300 or Firepower 4100 series security applia...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/740/upgrade-management-center-741.pdf
48
β€’ ftp://username@hostname/path/image_name β€’ scp://username@hostname/path/image_name β€’ sftp://username@hostname/path/image_name β€’ tftp://hostname:port-num/path/image_name d) To monitor the download process: Firepower-chassis-a /firmware # scope download-task image_name Firepower-chassis-a /firmware/download-task # show ...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/740/upgrade-management-center-741.pdf
49
c) Wait for all components (FPRM, Fabric Interconnect, and Chassis) to show Upgrade-Status: Ready. After the FPRM component is upgraded, the system will reboot and then continue upgrading the other components. Note d) Enter top. e) Enter scope ssa. f) Enter show slot. g) Verify that the Admin State is Ok and the Oper S...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/740/upgrade-management-center-741.pdf
50
Step 10 Set one of the security modules on Chassis #2 as control. After setting one of the security modules on Chassis #2 to control, Chassis #1 no longer contains the control unit and can now be upgraded. Step 11 Repeat Steps 1-9 for all other Chassis in the cluster. Step 12 To return the control role to Chassis #1, s...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/740/upgrade-management-center-741.pdf
51
Firepower-chassis-a /firmware/download-task # show detail Example: The following example copies an image using the SCP protocol: Firepower-chassis-a # scope firmware Firepower-chassis-a /firmware # download image scp://user@192.168.1.1/images/fxos-k9.2.3.1.58.SPA Firepower-chassis-a /firmware # scope download-task fxos...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/740/upgrade-management-center-741.pdf
52
Fabric Interconnect A: Package-Vers: 2.3(1.58) Upgrade-Status: Ready Chassis 1: Server 1: Package-Vers: 2.3(1.58) Upgrade-Status: Ready Server 2: Package-Vers: 2.3(1.58) Upgrade-Status: Ready FP9300-A /system # Step 9 After all components have successfully upgraded, enter the following commands to verify the status of ...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/740/upgrade-management-center-741.pdf
53
Firepower-chassis-a /firmware/download-task # show detail Example: The following example copies an image using the SCP protocol: Firepower-chassis-a # scope firmware Firepower-chassis-a /firmware # download image scp://user@192.168.1.1/images/fxos-k9.2.3.1.58.SPA Firepower-chassis-a /firmware # scope download-task fxos...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/740/upgrade-management-center-741.pdf
54
Fabric Interconnect A: Package-Vers: 2.3(1.58) Upgrade-Status: Ready Chassis 1: Server 1: Package-Vers: 2.3(1.58) Upgrade-Status: Ready Server 2: Package-Vers: 2.3(1.58) Upgrade-Status: Ready FP9300-A /system # Step 19 After all components have successfully upgraded, enter the following commands to verify the status of...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/740/upgrade-management-center-741.pdf
55
Cisco Secure Firewall Threat Defense Upgrade Guide for Management Center, Version 7.4.1–7.4.x 50 Upgrade the Secure Firewall 3100 or Firepower 4100/9300 Chassis Upgrade Firmware on the Firepower 4100/9300
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/740/upgrade-management-center-741.pdf
56
CHAPTER 5 Revert or Uninstall If an upgrade or patch succeeds but the system does not function to your expectations, you may be able to revert or uninstall. β€’ Revert vs Uninstall, on page 51 β€’ Revert Threat Defense Upgrades, on page 52 β€’ Uninstall Threat Defense and Management Center Patches, on page 55 Revert vs Unins...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/740/upgrade-management-center-741.pdf
57
1. Upgrade threat defense from Version 7.2.0 β†’ 7.2.5. 2. Patch from Version 7.2.5 β†’ 7.2.5.2. 3. You can now either: β€’ Uninstall the patch to go back to Version 7.2.5. This removes the patch only. β€’ Revert the upgrade to go back to Version 7.2.0. This removes the patch and the maintenance release. Revert Threat Defense ...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/740/upgrade-management-center-741.pdf
58
Table 14: Scenarios Preventing Revert Scenario Solution None. The revert snapshot is saved on the management center and the device for thirty days, after which it is automatically deleted and you can no longer revert. You can manually delete the snapshot from either appliance to save disk space, but this removes your a...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/740/upgrade-management-center-741.pdf
59
General device settings, routing, interfaces, inline sets, DHCP, SNMP β€” anything you configure on the Devices > Device Management page. β€’ Objects used by your device-specific configurations. These include access list, AS path, key chain, interface, network, port, route map, and SLA monitor objects. If you edited these ...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/740/upgrade-management-center-741.pdf
60
Step 2 Next to the device you want to revert, click More ( ) and select Revert Upgrade. With the exception of high availability pairs and clusters, you cannot select multiple devices to revert. Step 3 Confirm that you want to revert and reboot. Interruptions to traffic flow and inspection during revert depend on interf...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/740/upgrade-management-center-741.pdf
61
Uninstalling from High Availability Management Centers Minimize disruption by uninstalling from one management center at a time. Wait until the patch has fully uninstalled from one unit before you move on to the next. Table 15: Uninstall Order for Management Center High Availability ManagementCenter Uninstall Order Con...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/740/upgrade-management-center-741.pdf
62
Table 16: Scenarios Preventing or Restricting Uninstall Scenario Solution Uninstalling a patch applies only to the software. After uninstalling a patch that updates the operating system or other components not reversed by the uninstall, you may be unable to deploy configuration changes, or you may experience other inco...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/740/upgrade-management-center-741.pdf
63
Do not make or deploy configuration changes during uninstall. Even if the system appears inactive, do not manually reboot, shut down, or restart an uninstall in progress. You could place the system in an unusable state and require a reimage. If you encounter issues with the uninstall, including a failed uninstall or un...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/740/upgrade-management-center-741.pdf
64
sudo install_update.pl --detach /var/sf/updates/uninstaller_name The system does not ask you to confirm. Entering this command starts the uninstall, which includes a device reboot. Interruptions in traffic flow and inspection during an uninstall are the same as the interruptions that occur during an upgrade. Make sure ...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/740/upgrade-management-center-741.pdf
65
β€’ Revisit the Planning Your Upgrade, on page 1 chapter. In general, prepare for uninstalling a patch in the same way you prepared for installing it. β€’ If uninstalling will put the management center at a lower patch level than its managed devices, uninstall patches from the devices first. Step 1 Deploy to managed device...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/740/upgrade-management-center-741.pdf
66
β€’ If uninstalling will put the management centers at a lower patch level than their managed devices, uninstall patches from the devices first. Step 1 On the active management center, deploy to managed devices whose configurations are out of date. Deploying before you uninstall reduces the chance of failure. Step 2 On t...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/740/upgrade-management-center-741.pdf
67
Cisco Secure Firewall Threat Defense Upgrade Guide for Management Center, Version 7.4.1–7.4.x 62 Revert or Uninstall Uninstall a Management Center Patch: High Availability
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/740/upgrade-management-center-741.pdf
68
CHAPTER 6 Troubleshooting and Reference β€’ Troubleshooting Upgrade Packages, on page 63 β€’ Troubleshooting Threat Defense Upgrade, on page 64 β€’ Unresponsive and Failed Management Center Upgrades, on page 65 β€’ Unresponsive and Failed Threat Defense Upgrades, on page 65 β€’ Traffic Flow and Inspection, on page 67 β€’ Time and ...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/740/upgrade-management-center-741.pdf
69
Troubleshooting Threat Defense Upgrade Table 18: Troubleshooting Threat Defense Upgrade Issue Solution Either of: β€’ You still need the upgrade package. β€’ You do not have anything that can be upgraded to that version right now. Upgrade button missing for my target version. If you accessed the wizard directly from Device...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/740/upgrade-management-center-741.pdf
70
Issue Solution This often happens when there is limited bandwidth between the management center and its devices. You can try one of: β€’ Configure devices to get upgrade packages directly from an internal web server. To do this, delete the upgrade package from the management center (optional but saves disk space), then r...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/740/upgrade-management-center-741.pdf
71
Table 19: Unresponsive and Failed Threat Defense Upgrades Issue Solution Devices can stop passing traffic during the upgrade or if the upgrade fails. Before you upgrade, make sure traffic from your location does not have to traverse the device itself to access the device's management interface. You should also able to ...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/740/upgrade-management-center-741.pdf
72
Issue Solution You can resume an upgrade on the upgrade status pop-up, accessible from the Upgrade tab on the Device Management page. If you continue to have issues, contact Cisco TAC. I want to retry (resume) a failed upgrade. Part of the upgrade processis choosing what happensif it fails. Thisis done with the Automat...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/740/upgrade-management-center-741.pdf
73
Interface Configuration Traffic Behavior Passed without inspection until you either disable hardware bypass, or set it back to standby mode. Inline set, hardware bypassforce-enabled: Bypass: Force IPS-only interfaces Dropped during the upgrade, while the device is in maintenance mode. Then, passed without inspection wh...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/740/upgrade-management-center-741.pdf
74
Traffic Flow and Inspection for Chassis Upgrades UpgradingFXOSreboots the chassis.ForFXOSupgrades to Version 2.14.1+ that include firmware upgrades, the device reboots twiceβ€”once for FXOS and once for the firmware. This includes Version 7.4.1+ chassis upgrades for the Secure Firewall 3100 in multi-instance mode. Even i...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/740/upgrade-management-center-741.pdf
75
Table 22: Traffic Flow and Inspection: Deploying Configuration Changes Interface Configuration Traffic Behavior Routed or switched including Dropped. EtherChannel, redundant, subinterfaces. Switched interfaces are also known as bridge group or transparent interfaces. Firewall interfaces Passed without inspection. A few...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/740/upgrade-management-center-741.pdf
76
Consideration Details In a high availability or clustered configuration, devices upgrade one at a time to preserve continuity of operations, with each device operating in maintenance mode while it upgrades. Upgrading a device pair or entire cluster, therefore, takes longer than upgrading a standalone device. High avail...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/740/upgrade-management-center-741.pdf
77
Minimum Details Threat Defense Minimum Management Center Feature Upgrade impact. Upgrade can delete the IP package. In Version 7.4.2+ the IP Package Download geolocation option is disabled by default after being enabled by default in Versions 7.4.0–7.4.1. This option governs whether the system downloads an extra IP pac...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/740/upgrade-management-center-741.pdf
78
Minimum Details Threat Defense Minimum Management Center Feature You can automatically generate reports on configuration changes after major and maintenance management center upgrades. This helps you understand the changes you are about to deploy. After the system generates the reports, you can download them from the T...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/740/upgrade-management-center-741.pdf
79
Table 28: Version 7.3.0 Features Minimum Details Threat Defense Minimum Management Center Feature Deprecated Features Although upgrading to Version 7.3.0 is supported, the upgrade will remove critical features, fixes, and enhancements that may be included in your current version. Instead, upgrade to Version 7.4.1+. Fro...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/740/upgrade-management-center-741.pdf
80
Minimum Details Threat Defense Minimum Management Center Feature Upgrade impact. All eligible devices upgrade to Snort 3 when you deploy. When you upgrade threat defense to Version 7.3+, you can no longer disable the Upgrade Snort 2 to Snort 3 option. After the software upgrade, all eligible devices will upgrade from S...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/740/upgrade-management-center-741.pdf
81
Minimum Details Threat Defense Minimum Management Center Feature Reimage Impact. In Version 7.3, we combined the threat defense install and upgrade package for the Secure Firewall 3100, as follows: β€’ Version 7.1–7.2 install package: cisco-ftd-fp3k.version.SPA β€’ Version 7.1–7.2 upgrade package: Cisco_FTD_SSP_FP3K_Upgrad...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/740/upgrade-management-center-741.pdf
82
Minimum Details Threat Defense Minimum Management Center Feature The initialsetup on the management centerschedules a weekly task to download the latest available software updates, which now includesthe latest vulnerability database (VDB). We recommend you review this weekly task and adjust if necessary. Optionally, sc...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/740/upgrade-management-center-741.pdf
83
Minimum Details Threat Defense Minimum Management Center Feature A new upgrade page makes it easier to choose, download, manage, and apply upgrades to your entire deployment. This includes the management center, threat defense devices, and any older NGIPSv/ASA FirePOWER devices. The page lists all upgrade packages that...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/740/upgrade-management-center-741.pdf
84
Minimum Details Threat Defense Minimum Management Center Feature The management center now notifies you when a new suggested release is available. If you don't want to upgrade right now, you can have the system remind you later, or defer reminders until the next suggested release. The new upgrade page also indicates su...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/740/upgrade-management-center-741.pdf
85
Minimum Details Threat Defense Minimum Management Center Feature The threat defense upgrade wizard now supports unattended upgrades, using a new Unattended Mode menu. You just need to select the target version and the devices you want to upgrade,specify a few upgrade options, and step away. You can even log out or clos...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/740/upgrade-management-center-741.pdf
86
Minimum Details Threat Defense Minimum Management Center Feature Content Updates Upgrade impact. Scheduled download tasks stop retrieving maintenance releases. The Download Latest Update scheduled task no longer downloads maintenance releases; now it only downloadsthe latest applicable patches and VDB updates. To direc...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/740/upgrade-management-center-741.pdf