index int64 0 4.08k | text stringlengths 34 4.9k β | url stringclasses 38
values |
|---|---|---|
49 | Figure 53: Slide the Sliding Rack Tray Into the Rack Shelf
Step 8 The chassis is now installed in the sliding rack tray, which is installed in the rack shelf. RepeatSteps 1 through 8 to install
a second chassis. Use the second sliding rack tray and remaining three M3 x 7-mm screws to install a second chassis to
the sli... | https://www.cisco.com/c/en/us/td/docs/security/firepower/1010/hw/guide/hw-install-1010.pdf |
50 | You can now attach your power supply cord.
What to do next
Install the cables according to your default software configuration as described in the Cisco Firepower 1010
Getting Started Guide.
Cisco Firepower 1010 Series Hardware Installation Guide
47
Mount the Chassis
Rack-Mount the Chassis with the 150-W Power Supply | https://www.cisco.com/c/en/us/td/docs/security/firepower/1010/hw/guide/hw-install-1010.pdf |
51 | Cisco Firepower 1010 Series Hardware Installation Guide
48
Mount the Chassis
Rack-Mount the Chassis with the 150-W Power Supply | https://www.cisco.com/c/en/us/td/docs/security/firepower/1010/hw/guide/hw-install-1010.pdf |
52 | CHAPTER 4
Connect to the Console Port
β’ Connect to the Console Port with Microsoft Windows, on page 49
β’ Connect to the Console Port with Mac OS X, on page 51
β’ Connect to the Console Port with Linux, on page 51
Connect to the Console Port with Microsoft Windows
You must install a USB device driver the first time a Mic... | https://www.cisco.com/c/en/us/td/docs/security/firepower/1010/hw/guide/hw-install-1010.pdf |
53 | Figure 55: Console Port Connection
1 USB Mini B console port 2 USB Mini B to USB Type A console cable
3 USB Type A β
Step 4 Connect the end of the cable with the DB-9 connector (or USB Type A) to the terminal or PC. If your terminal or PC has
a console port that does not accommodate a DB-9 connector, you must provide a... | https://www.cisco.com/c/en/us/td/docs/security/firepower/1010/hw/guide/hw-install-1010.pdf |
54 | β’ no parity
β’ 1 stop bit
β’ no flow control
Connect to the Console Port with Mac OS X
Follow these steps to connect a Mac OS X system USB port to the console using the built-in OS X Terminal
utility, or alternatively you can use a separate terminal emulator application.
Procedure
Step 1 Use the Finder to go to Applicati... | https://www.cisco.com/c/en/us/td/docs/security/firepower/1010/hw/guide/hw-install-1010.pdf |
55 | crw-r--r-- 1 root root 188, 0 Jan 14 18:02 ttyACM0
root@usb-suse /dev#
Step 4 Connect to the USB port with the following command followed by the chassis USB port speed
Example:
root@usb-suse /dev# screen /dev/ttyACM0 9600
Step 5 To disconnect the Linux USB console from the Terminal window, enter Ctrl-a followed by : th... | https://www.cisco.com/c/en/us/td/docs/security/firepower/1010/hw/guide/hw-install-1010.pdf |
56 | CHAPTER 5
Installation, Maintenance, and Upgrade
β’ Install the FIPS Opacity Shield , on page 53
Install the FIPS Opacity Shield
Because theFIPSopacity shield coversthe serial number on the chassis, the CO should copy the serial number
and store it in a secure place. The serial number is needed when you call Cisco TAC. ... | https://www.cisco.com/c/en/us/td/docs/security/firepower/1010/hw/guide/hw-install-1010.pdf |
57 | The TELs are made of a special thin gauge vinyl with self-adhesive backing.
Once the CO attachesthem on the chassis, any attempt to open the chassis damages
the TELs or the chassis cover. Because the TELs have nonrepeated serial numbers,
the CO can inspect them for damage and compare them against the applied serial
num... | https://www.cisco.com/c/en/us/td/docs/security/firepower/1010/hw/guide/hw-install-1010.pdf |
58 | Figure 57: Install Screws on the Bottom of the FIPS Cover
1 FIPS opacity shield 2 Three M3 x 66 mm Phillips screws
Step 5 Before you attach the TELs, clean the chassis and FIPS cover of any grease, dirt, or oil with alcohol-based cleaning
pads.
Step 6 Attach four of the TELs, three on the bottom of the chassis over the... | https://www.cisco.com/c/en/us/td/docs/security/firepower/1010/hw/guide/hw-install-1010.pdf |
59 | Figure 58: TELS Placement on the Rear Panel and Bottom of the FIPS Cover
TEL 2 on the bottom left of the FIPS cover over the
screw
1 TEL 1 on the rear panel of the chassis 2
TEL 4 on the bottom right of the FIPS cover over the
screw
TEL 3 on the bottom center of the FIPS cover over 4
the screw
3
Step 7 Reinstall the ch... | https://www.cisco.com/c/en/us/td/docs/security/firepower/1010/hw/guide/hw-install-1010.pdf |
60 | β’ See the fips enable command in the Cisco ASA Series Command Reference, A-H Commands for the ASA
procedure to enable FIPS mode.
What to do next
See the Cisco Firepower 1010 Getting Started Guide for further configuration information.
Cisco Firepower 1010 Series Hardware Installation Guide
57
Installation, Maintenance,... | https://www.cisco.com/c/en/us/td/docs/security/firepower/1010/hw/guide/hw-install-1010.pdf |
61 | Cisco Firepower 1010 Series Hardware Installation Guide
58
Installation, Maintenance, and Upgrade
Install the FIPS Opacity Shield | https://www.cisco.com/c/en/us/td/docs/security/firepower/1010/hw/guide/hw-install-1010.pdf |
0 | Cisco Secure Firewall Threat Defense Upgrade Guide for Management
Center, Version 7.4.1β7.4.x
First Published: 2023-12-13
Last Modified: 2024-09-04
Americas Headquarters
Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134-1706
USA
http://www.cisco.com
Tel: 408 526-4000
800 553-NETS (6387)
Fax: 408 527-0883 | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/740/upgrade-management-center-741.pdf |
1 | THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS,
INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND,
EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APP... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/740/upgrade-management-center-741.pdf |
2 | CONTENTS
CHAPTER 1 Planning Your Upgrade 1
Is This Guide for You? 1
Compatibility 1
Upgrade Guidelines 2
Software Upgrade Guidelines 2
Upgrade Guidelines for the Firepower 4100/9300 Chassis 2
Upgrade Path 2
Upgrade Order for Threat Defense with Chassis Upgrade and High Availability/Clusters 4
Upgrade Packages 5
Managin... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/740/upgrade-management-center-741.pdf |
3 | Upgrade Threat Defense 21
Threat Defense Upgrade Options 24
Upgrade Threat Defense in Unattended Mode 25
Upgrade Older ASA FirePOWER and NGIPSv Devices 26
CHAPTER 4 Upgrade the Secure Firewall 3100 or Firepower 4100/9300 Chassis 29
Upgrade the Secure Firewall 3100 Chassis 29
Upgrade FXOS on the Firepower 4100/9300 with... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/740/upgrade-management-center-741.pdf |
4 | Unresponsive and Failed Management Center Upgrades 65
Unresponsive and Failed Threat Defense Upgrades 65
Traffic Flow and Inspection 67
Traffic Flow and Inspection for Threat Defense Upgrades 67
Traffic Flow and Inspection for Chassis Upgrades 69
Traffic Flow and Inspection when Deploying Configurations 69
Time and Dis... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/740/upgrade-management-center-741.pdf |
5 | Cisco Secure Firewall Threat Defense Upgrade Guide for Management Center, Version 7.4.1β7.4.x
vi
Contents | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/740/upgrade-management-center-741.pdf |
6 | CHAPTER 1
Planning Your Upgrade
Use this guide to plan and complete threat defense and management center upgrades. Upgrades can be major
(A.x), maintenance (A.x.y), or patch (A.x.y.z) releases. We also may provide hotfixes, which are minor updates
that address particular, urgent issues.
β’ Is This Guide for You?, on pag... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/740/upgrade-management-center-741.pdf |
7 | Upgrade Guidelines
See the release notes for release-specific upgrade warnings and guidelines, and for information on features
and bugs with upgrade impact. For general information on time/disk space requirements and on system
behavior during upgrade, see Troubleshooting and Reference, on page 63.
Software Upgrade Guid... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/740/upgrade-management-center-741.pdf |
8 | then the chassis, then devices again. Or, perform a full reimage. In high availability or clustered deployments,
upgrade one chassis at a time.
Supported Direct Upgrades
This table shows the supported direct upgrades for management center and threat defense software. Note that
although you can upgrade directly to major... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/740/upgrade-management-center-741.pdf |
9 | Upgrade Order for Threat Defense with Chassis Upgrade and High
Availability/Clusters
When a chassis upgrade is required in high availability or clustered deployments, upgrade one chassis at a
time.
Table 2: Chassis Upgrade Order for the Firepower 4100/9300 with Management Center
Threat Defense Deployment Upgrade Order
... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/740/upgrade-management-center-741.pdf |
10 | Threat Defense Deployment Upgrade Order
Upgrade both chassis before you upgrade threat defense.
1. Upgrade chassis. With the chassis upgrade wizard, you have three
options:
β’ Parallel upgrade: Not recommended for high availability.
β’ Serial upgrade: Automatically fail over when the active unit
goes down. We recommend y... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/740/upgrade-management-center-741.pdf |
11 | To... Do This...
Click the Ellipsis (β¦) next to the package or package version you want to delete
and select Delete.
This deletes the packages (or the pointer to the package) from the management
center. It does not delete packages from any devices where you already copied
them.For management centers in high availabilit... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/740/upgrade-management-center-741.pdf |
12 | Requirements When to Use
You meet disk space and bandwidth requirements,
but either the management center cannot access the
Cisco Support & Download site, or you are applying
a hotfix.
See: Upgrade Packages on Cisco.com, on page 10
Cisco β Your Computer β Management Center
β Devices
Adequate disk space on the managemen... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/740/upgrade-management-center-741.pdf |
13 | Field Description
For secure web servers (HTTPS), the server's digital certificate (PEM format).
Copy and paste the entire block of text, including the BEGIN CERTIFICATE
and END CERTIFICATE lines. You should be able to obtain the certificate from
the server's administrator. You may also be able to use your browser, or ... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/740/upgrade-management-center-741.pdf |
14 | Step 4 Copy the package from any device that hasthe package you need, by specifying the IPaddress and path you just discovered.
sync-from-peer ip_address package_path
After you confirm that you want to copy the package, the system displays a sync status UUID that you can use to monitor
this transfer.
Step 5 Monitor tra... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/740/upgrade-management-center-741.pdf |
15 | Repeat this step for each chassis you want to clean up.
Step 6 Back in the chassis upgrade wizard, click Reset to reset the workflow.
Upgrade Packages on Cisco.com
Manually download upgrade packages from Cisco when the system cannot access the Cisco Support &
Download site, or when you cannot direct-download for anothe... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/740/upgrade-management-center-741.pdf |
16 | Platform Package Notes
Threat defense virtual Cisco_FTD_Upgrade-Version-build.sh.REL.tar β
ISA 3000 with FTD Cisco_FTD_Upgrade-Version-build.sh.REL.tar β
Chassis Packages for the Secure Firewall 3100
For theSecureFirewall 3100 in multi-instance mode, the threat defense and chassis upgradesshare a package.
Chassis Packa... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/740/upgrade-management-center-741.pdf |
17 | insufficient bandwidth can extend upgrade time or even cause the upgrade to time out. See Guidelines for
Downloading Data from theFirepower Managemen t Center to Managed Devices(Troubleshooting TechNote).
Configuration and Deployment Checks
Configurations
Make sure you have made any required pre-upgrade configuration c... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/740/upgrade-management-center-741.pdf |
18 | Table 10: Backups
Backup Guide
CiscoSecureFirewall Management Center Administration Guide: Backup/Restore
We recommend you back up configurations and events.
Management center
CiscoSecureFirewall Management Center Administration Guide: Backup/Restore
Note that backup is not supported in all cases, for example, for thre... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/740/upgrade-management-center-741.pdf |
19 | Cisco Secure Firewall Threat Defense Upgrade Guide for Management Center, Version 7.4.1β7.4.x
14
Planning Your Upgrade
Software Upgrade Readiness Checks | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/740/upgrade-management-center-741.pdf |
20 | CHAPTER 2
Upgrade Management Center
β’ Upgrade the Management Center: Standalone, on page 15
β’ Upgrade the Management Center: High Availability, on page 17
Upgrade the Management Center: Standalone
Use this procedure to upgrade a standalone management center. As you proceed, the system displays basic
information about t... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/740/upgrade-management-center-741.pdf |
21 | Step 1 On the management center, choose System ( ) > Product Upgrades.
Step 2 Get the upgrade package.
The Product Upgrades page lists all upgrade packages that apply to your current deployment, with suggested releases
specially marked. In most cases, you can just click Download next to the upgrade package or version y... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/740/upgrade-management-center-741.pdf |
22 | Upgrade the Management Center: High Availability
Use this procedure to upgrade high availability management centers. As you proceed, the system displays
basic information about the upgrade, as well as the current upgrade-related status.
Neither your workflow nor upgrade packages are synchronized between high availabili... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/740/upgrade-management-center-741.pdf |
23 | Prepare to upgrade.
Step 1 On the standby peer, choose System ( ) > Product Upgrades.
Step 2 Get the upgrade package.
The Product Upgrades page lists all upgrade packages that apply to your current deployment, with suggested releases
specially marked. In most cases, you can just click Download next to the upgrade packa... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/740/upgrade-management-center-741.pdf |
24 | Step 11 Repeat Steps 8-10 on the other peer.
Resume synchronization and complete post-upgrade tasks.
Step 12 On the original active peer (the one you just upgraded), resume high availability synchronization.
Remember that for major and maintenance upgrades, synchronization should automatically resume. For patches and
h... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/740/upgrade-management-center-741.pdf |
25 | Cisco Secure Firewall Threat Defense Upgrade Guide for Management Center, Version 7.4.1β7.4.x
20
Upgrade Management Center
Upgrade the Management Center: High Availability | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/740/upgrade-management-center-741.pdf |
26 | CHAPTER 3
Upgrade Threat Defense
β’ Upgrade Threat Defense, on page 21
β’ Upgrade Older ASA FirePOWER and NGIPSv Devices, on page 26
Upgrade Threat Defense
Use this procedure to upgrade threat defense. As you proceed, the system displays basic information about
your selected devices, as well as the current upgrade-relate... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/740/upgrade-management-center-741.pdf |
27 | β’ Check configurations, tasks, and overall deployment health: Configuration and Deployment Checks, on
page 12
β’ Perform backups: Backups, on page 12
β’ Upgrade chassis, if required: Upgrade the Secure Firewall 3100 or Firepower 4100/9300 Chassis, on
page 29
Step 1 On the management center, choose System ( ) > Product Up... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/740/upgrade-management-center-741.pdf |
28 | Compatibility and other quick prechecks are automatic. For example, the system alerts you immediately if you need
to deploy configurations. Other checks take more time. To begin these, click Run Readiness Check.
Do not deploy changes to, manually reboot, or shut down a device while running readiness checks. Although yo... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/740/upgrade-management-center-741.pdf |
29 | Before you deploy, you may want to review the changes made by the upgrade (as well as any changes you have made
since upgrade). Choose Deploy > Advanced Deploy,select the devices you just upgraded, and click Pending Changes
Reports. After the reports finish generating, you can download them from the Tasks tab on the Me... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/740/upgrade-management-center-741.pdf |
30 | Option When to Disable Details
With upgrades to Version 7.2β7.6, eligible devices will
upgrade from Snort 2 to Snort 3 when you deploy
configurations.
With upgrades to Version 7.3+, you cannot disable this
option. Although you can switch individual devices back,
Snort 2 will be deprecated in a future release and we str... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/740/upgrade-management-center-741.pdf |
31 | To... Do This
In the threat defense upgrade wizard, choose Unattended Mode > Stop.
You can pause and restart unattended mode during the copy and checks phases.
However, pausing unattended mode does not stop tasks in progress. Copies and
checks that have started will run to completion. Note that you must pause
unattende... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/740/upgrade-management-center-741.pdf |
32 | Step 1 On the management center, choose System ( ) > Product Upgrades.
Step 2 Get the device upgrade packages onto the management center.
The Product Upgrades page lists all upgrade packages that apply to your current deployment, with suggested releases
specially marked. In most cases, you can just click Download next ... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/740/upgrade-management-center-741.pdf |
33 | Cisco Secure Firewall Threat Defense Upgrade Guide for Management Center, Version 7.4.1β7.4.x
28
Upgrade Threat Defense
Upgrade Older ASA FirePOWER and NGIPSv Devices | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/740/upgrade-management-center-741.pdf |
34 | CHAPTER 4
Upgrade the Secure Firewall 3100 or Firepower
4100/9300 Chassis
Some devices may require a chassis upgrade (FXOS and firmware) before you upgrade the software:
β’ Secure Firewall 3100 in multi-instance mode: Any upgrade can require a chassis upgrade. Although you
upgrade the chassis and threat defense separate... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/740/upgrade-management-center-741.pdf |
35 | Do not make or deploy configuration changes to the chassis or threat defense instances during the upgrade.
Even if the system appears inactive, do not manually reboot or shut down. In most cases, do not restart an
upgrade in progress. You could place the system in an unusable state and require a reimage. Chassis may
re... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/740/upgrade-management-center-741.pdf |
36 | You can use the device links on the Device Selection pane to toggle the Device Details pane between selected chassis,
remaining upgrade candidates, ineligible chassis (with reasons why), chassis that need the upgrade package, and so on.
You can add and remove chassis from your selection, or click Reset to clear your ch... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/740/upgrade-management-center-741.pdf |
37 | What to do next
β’ (Optional) Clear the wizard by clicking Clear Upgrade Information. Until you do this, the page continues
to display details about the upgrade you just performed. After you clear the wizard, use the Upgrade tab
on the Device Management page to see last-upgrade information for chassis.
β’ Back up again: ... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/740/upgrade-management-center-741.pdf |
38 | The system will first verify the software package that you want to install. It will inform you of any incompatibility between
currently installed applications and the specifiedFXOSplatform software package. It will also warn you that any existing
sessions will be terminated and that the system will need to be rebooted ... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/740/upgrade-management-center-741.pdf |
39 | Upgrade FXOS on an FTD Inter-chassis Cluster Using Firepower Chassis
Manager
If you have Firepower 9300 or Firepower 4100 series security appliances that have FTD logical devices
configured as an inter-chassis cluster, use the following procedure to update the FXOS platform bundle on
your Firepower 9300 or Firepower 41... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/740/upgrade-management-center-741.pdf |
40 | The system will first verify the software package that you want to install. It will inform you of any incompatibility
between currently installed applications and the specified FXOS platform software package. It will also warn you that
any existing sessions will be terminated and that the system will need to be reboote... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/740/upgrade-management-center-741.pdf |
41 | FP9300-A /ssa # show app-instance
App Name Slot ID Admin State Oper State Running Version Startup Version Profile Name
Cluster State Cluster Role
---------- ---------- ----------- ---------------- --------------- --------------- ------------
--------------- ------------
ftd 1 Enabled Online 6.2.2.81 6.2.2.81 In
Cluster... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/740/upgrade-management-center-741.pdf |
42 | Step 4 After the new platform bundle image hassuccessfully uploaded, click Upgrade for theFXOSplatform bundle to which
you want to upgrade.
The system will first verify the software package that you want to install. It will inform you of any incompatibility
between currently installed applications and the specified FXO... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/740/upgrade-management-center-741.pdf |
43 | d) Click Yes to immediately make the standby device the active device in the high availability pair.
Step 9 Connect to Firepower Chassis Manager on the Firepower security appliance that contains the new standby Firepower
Threat Defense logical device:
Step 10 In Firepower Chassis Manager, choose System > Updates.
The A... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/740/upgrade-management-center-741.pdf |
44 | Step 15 After all components have successfully upgraded, enter the following commands to verify the status of the security
modules/security engine and any installed applications:
a) Enter top.
b) Enter scope ssa.
c) Enter show slot.
d) Verify that the Admin State is Ok and the Oper State is Online for the security engi... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/740/upgrade-management-center-741.pdf |
45 | Step 1 Connect to the FXOS CLI.
Step 2 Download the new platform bundle image to the Firepower 4100/9300 chassis:
a) Enter firmware mode:
Firepower-chassis-a # scope firmware
b) Download the FXOS platform bundle software image:
Firepower-chassis-a /firmware # download image URL
Specify the URL for the file being import... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/740/upgrade-management-center-741.pdf |
46 | Step 6 The system will first verify the software package that you want to install. It will inform you of any incompatibility between
currently installed applications and the specifiedFXOSplatform software package. It will also warn you that any existing
sessions will be terminated and that the system will need to be re... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/740/upgrade-management-center-741.pdf |
47 | Upgrade FXOS on an FTD Inter-chassis Cluster Using the FXOS CLI
If you haveFirepower 9300 orFirepower 4100 seriessecurity appliances withFTD logical devices configured
as an inter-chassis cluster, use the following procedure to update theFXOSplatform bundle on yourFirepower
9300 or Firepower 4100 series security applia... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/740/upgrade-management-center-741.pdf |
48 | β’ ftp://username@hostname/path/image_name
β’ scp://username@hostname/path/image_name
β’ sftp://username@hostname/path/image_name
β’ tftp://hostname:port-num/path/image_name
d) To monitor the download process:
Firepower-chassis-a /firmware # scope download-task image_name
Firepower-chassis-a /firmware/download-task # show ... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/740/upgrade-management-center-741.pdf |
49 | c) Wait for all components (FPRM, Fabric Interconnect, and Chassis) to show Upgrade-Status: Ready.
After the FPRM component is upgraded, the system will reboot and then continue upgrading the other
components.
Note
d) Enter top.
e) Enter scope ssa.
f) Enter show slot.
g) Verify that the Admin State is Ok and the Oper S... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/740/upgrade-management-center-741.pdf |
50 | Step 10 Set one of the security modules on Chassis #2 as control.
After setting one of the security modules on Chassis #2 to control, Chassis #1 no longer contains the control unit and
can now be upgraded.
Step 11 Repeat Steps 1-9 for all other Chassis in the cluster.
Step 12 To return the control role to Chassis #1, s... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/740/upgrade-management-center-741.pdf |
51 | Firepower-chassis-a /firmware/download-task # show detail
Example:
The following example copies an image using the SCP protocol:
Firepower-chassis-a # scope firmware
Firepower-chassis-a /firmware # download image scp://user@192.168.1.1/images/fxos-k9.2.3.1.58.SPA
Firepower-chassis-a /firmware # scope download-task fxos... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/740/upgrade-management-center-741.pdf |
52 | Fabric Interconnect A:
Package-Vers: 2.3(1.58)
Upgrade-Status: Ready
Chassis 1:
Server 1:
Package-Vers: 2.3(1.58)
Upgrade-Status: Ready
Server 2:
Package-Vers: 2.3(1.58)
Upgrade-Status: Ready
FP9300-A /system #
Step 9 After all components have successfully upgraded, enter the following commands to verify the status of ... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/740/upgrade-management-center-741.pdf |
53 | Firepower-chassis-a /firmware/download-task # show detail
Example:
The following example copies an image using the SCP protocol:
Firepower-chassis-a # scope firmware
Firepower-chassis-a /firmware # download image scp://user@192.168.1.1/images/fxos-k9.2.3.1.58.SPA
Firepower-chassis-a /firmware # scope download-task fxos... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/740/upgrade-management-center-741.pdf |
54 | Fabric Interconnect A:
Package-Vers: 2.3(1.58)
Upgrade-Status: Ready
Chassis 1:
Server 1:
Package-Vers: 2.3(1.58)
Upgrade-Status: Ready
Server 2:
Package-Vers: 2.3(1.58)
Upgrade-Status: Ready
FP9300-A /system #
Step 19 After all components have successfully upgraded, enter the following commands to verify the status of... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/740/upgrade-management-center-741.pdf |
55 | Cisco Secure Firewall Threat Defense Upgrade Guide for Management Center, Version 7.4.1β7.4.x
50
Upgrade the Secure Firewall 3100 or Firepower 4100/9300 Chassis
Upgrade Firmware on the Firepower 4100/9300 | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/740/upgrade-management-center-741.pdf |
56 | CHAPTER 5
Revert or Uninstall
If an upgrade or patch succeeds but the system does not function to your expectations, you may be able to
revert or uninstall.
β’ Revert vs Uninstall, on page 51
β’ Revert Threat Defense Upgrades, on page 52
β’ Uninstall Threat Defense and Management Center Patches, on page 55
Revert vs Unins... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/740/upgrade-management-center-741.pdf |
57 | 1. Upgrade threat defense from Version 7.2.0 β 7.2.5.
2. Patch from Version 7.2.5 β 7.2.5.2.
3. You can now either:
β’ Uninstall the patch to go back to Version 7.2.5.
This removes the patch only.
β’ Revert the upgrade to go back to Version 7.2.0.
This removes the patch and the maintenance release.
Revert Threat Defense ... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/740/upgrade-management-center-741.pdf |
58 | Table 14: Scenarios Preventing Revert
Scenario Solution
None.
The revert snapshot is saved on the management center and the
device for thirty days, after which it is automatically deleted and
you can no longer revert. You can manually delete the snapshot
from either appliance to save disk space, but this removes your
a... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/740/upgrade-management-center-741.pdf |
59 | General device settings, routing, interfaces, inline sets, DHCP, SNMP β anything you configure on the
Devices > Device Management page.
β’ Objects used by your device-specific configurations.
These include access list, AS path, key chain, interface, network, port, route map, and SLA monitor
objects. If you edited these ... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/740/upgrade-management-center-741.pdf |
60 | Step 2 Next to the device you want to revert, click More ( ) and select Revert Upgrade.
With the exception of high availability pairs and clusters, you cannot select multiple devices to revert.
Step 3 Confirm that you want to revert and reboot.
Interruptions to traffic flow and inspection during revert depend on interf... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/740/upgrade-management-center-741.pdf |
61 | Uninstalling from High Availability Management Centers
Minimize disruption by uninstalling from one management center at a time. Wait until the patch has fully
uninstalled from one unit before you move on to the next.
Table 15: Uninstall Order for Management Center High Availability
ManagementCenter Uninstall Order
Con... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/740/upgrade-management-center-741.pdf |
62 | Table 16: Scenarios Preventing or Restricting Uninstall
Scenario Solution
Uninstalling a patch applies only to the software. After uninstalling a patch that
updates the operating system or other components not reversed by the uninstall,
you may be unable to deploy configuration changes, or you may experience other
inco... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/740/upgrade-management-center-741.pdf |
63 | Do not make or deploy configuration changes during uninstall. Even if the system appears inactive, do not
manually reboot, shut down, or restart an uninstall in progress. You could place the system in an unusable
state and require a reimage. If you encounter issues with the uninstall, including a failed uninstall or
un... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/740/upgrade-management-center-741.pdf |
64 | sudo install_update.pl --detach /var/sf/updates/uninstaller_name
The system does not ask you to confirm. Entering this command starts the uninstall, which includes a device
reboot. Interruptions in traffic flow and inspection during an uninstall are the same as the interruptions that occur
during an upgrade. Make sure ... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/740/upgrade-management-center-741.pdf |
65 | β’ Revisit the Planning Your Upgrade, on page 1 chapter. In general, prepare for uninstalling a patch in
the same way you prepared for installing it.
β’ If uninstalling will put the management center at a lower patch level than its managed devices, uninstall
patches from the devices first.
Step 1 Deploy to managed device... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/740/upgrade-management-center-741.pdf |
66 | β’ If uninstalling will put the management centers at a lower patch level than their managed devices, uninstall
patches from the devices first.
Step 1 On the active management center, deploy to managed devices whose configurations are out of date.
Deploying before you uninstall reduces the chance of failure.
Step 2 On t... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/740/upgrade-management-center-741.pdf |
67 | Cisco Secure Firewall Threat Defense Upgrade Guide for Management Center, Version 7.4.1β7.4.x
62
Revert or Uninstall
Uninstall a Management Center Patch: High Availability | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/740/upgrade-management-center-741.pdf |
68 | CHAPTER 6
Troubleshooting and Reference
β’ Troubleshooting Upgrade Packages, on page 63
β’ Troubleshooting Threat Defense Upgrade, on page 64
β’ Unresponsive and Failed Management Center Upgrades, on page 65
β’ Unresponsive and Failed Threat Defense Upgrades, on page 65
β’ Traffic Flow and Inspection, on page 67
β’ Time and ... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/740/upgrade-management-center-741.pdf |
69 | Troubleshooting Threat Defense Upgrade
Table 18: Troubleshooting Threat Defense Upgrade
Issue Solution
Either of:
β’ You still need the upgrade package.
β’ You do not have anything that can be upgraded to that version right now.
Upgrade button missing
for my target version.
If you accessed the wizard directly from Device... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/740/upgrade-management-center-741.pdf |
70 | Issue Solution
This often happens when there is limited bandwidth between the management
center and its devices.
You can try one of:
β’ Configure devices to get upgrade packages directly from an internal web
server.
To do this, delete the upgrade package from the management center (optional
but saves disk space), then r... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/740/upgrade-management-center-741.pdf |
71 | Table 19: Unresponsive and Failed Threat Defense Upgrades
Issue Solution
Devices can stop passing traffic during the upgrade or if the upgrade fails. Before you upgrade,
make sure traffic from your location does not have to traverse the device itself to access the device's
management interface.
You should also able to ... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/740/upgrade-management-center-741.pdf |
72 | Issue Solution
You can resume an upgrade on the upgrade status pop-up, accessible from the Upgrade tab on the
Device Management page.
If you continue to have issues, contact Cisco TAC.
I want to retry (resume) a failed
upgrade.
Part of the upgrade processis choosing what happensif it fails. Thisis done with the Automat... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/740/upgrade-management-center-741.pdf |
73 | Interface Configuration Traffic Behavior
Passed without inspection until you either
disable hardware bypass, or set it back to
standby mode.
Inline set, hardware bypassforce-enabled:
Bypass: Force
IPS-only interfaces
Dropped during the upgrade, while the
device is in maintenance mode. Then,
passed without inspection wh... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/740/upgrade-management-center-741.pdf |
74 | Traffic Flow and Inspection for Chassis Upgrades
UpgradingFXOSreboots the chassis.ForFXOSupgrades to Version 2.14.1+ that include firmware upgrades,
the device reboots twiceβonce for FXOS and once for the firmware. This includes Version 7.4.1+ chassis
upgrades for the Secure Firewall 3100 in multi-instance mode.
Even i... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/740/upgrade-management-center-741.pdf |
75 | Table 22: Traffic Flow and Inspection: Deploying Configuration Changes
Interface Configuration Traffic Behavior
Routed or switched including Dropped.
EtherChannel, redundant, subinterfaces.
Switched interfaces are also known as
bridge group or transparent interfaces.
Firewall interfaces
Passed without inspection.
A few... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/740/upgrade-management-center-741.pdf |
76 | Consideration Details
In a high availability or clustered configuration, devices upgrade one at a time
to preserve continuity of operations, with each device operating in maintenance
mode while it upgrades. Upgrading a device pair or entire cluster, therefore, takes
longer than upgrading a standalone device.
High avail... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/740/upgrade-management-center-741.pdf |
77 | Minimum Details
Threat
Defense
Minimum
Management
Center
Feature
Upgrade impact. Upgrade can delete the IP package.
In Version 7.4.2+ the IP Package Download geolocation option is disabled
by default after being enabled by default in Versions 7.4.0β7.4.1. This option
governs whether the system downloads an extra IP pac... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/740/upgrade-management-center-741.pdf |
78 | Minimum Details
Threat
Defense
Minimum
Management
Center
Feature
You can automatically generate reports on configuration changes after major
and maintenance management center upgrades. This helps you understand the
changes you are about to deploy. After the system generates the reports, you
can download them from the T... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/740/upgrade-management-center-741.pdf |
79 | Table 28: Version 7.3.0 Features
Minimum Details
Threat
Defense
Minimum
Management
Center
Feature
Deprecated Features
Although upgrading to Version 7.3.0 is supported, the upgrade will remove
critical features, fixes, and enhancements that may be included in your current
version. Instead, upgrade to Version 7.4.1+.
Fro... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/740/upgrade-management-center-741.pdf |
80 | Minimum Details
Threat
Defense
Minimum
Management
Center
Feature
Upgrade impact. All eligible devices upgrade to Snort 3 when you deploy.
When you upgrade threat defense to Version 7.3+, you can no longer disable
the Upgrade Snort 2 to Snort 3 option.
After the software upgrade, all eligible devices will upgrade from S... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/740/upgrade-management-center-741.pdf |
81 | Minimum Details
Threat
Defense
Minimum
Management
Center
Feature
Reimage Impact.
In Version 7.3, we combined the threat defense install and upgrade package
for the Secure Firewall 3100, as follows:
β’ Version 7.1β7.2 install package: cisco-ftd-fp3k.version.SPA
β’ Version 7.1β7.2 upgrade package:
Cisco_FTD_SSP_FP3K_Upgrad... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/740/upgrade-management-center-741.pdf |
82 | Minimum Details
Threat
Defense
Minimum
Management
Center
Feature
The initialsetup on the management centerschedules a weekly task to download
the latest available software updates, which now includesthe latest vulnerability
database (VDB). We recommend you review this weekly task and adjust if
necessary. Optionally, sc... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/740/upgrade-management-center-741.pdf |
83 | Minimum Details
Threat
Defense
Minimum
Management
Center
Feature
A new upgrade page makes it easier to choose, download, manage, and apply
upgrades to your entire deployment. This includes the management center,
threat defense devices, and any older NGIPSv/ASA FirePOWER devices. The
page lists all upgrade packages that... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/740/upgrade-management-center-741.pdf |
84 | Minimum Details
Threat
Defense
Minimum
Management
Center
Feature
The management center now notifies you when a new suggested release is
available. If you don't want to upgrade right now, you can have the system
remind you later, or defer reminders until the next suggested release. The new
upgrade page also indicates su... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/740/upgrade-management-center-741.pdf |
85 | Minimum Details
Threat
Defense
Minimum
Management
Center
Feature
The threat defense upgrade wizard now supports unattended upgrades, using
a new Unattended Mode menu. You just need to select the target version and
the devices you want to upgrade,specify a few upgrade options, and step away.
You can even log out or clos... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/740/upgrade-management-center-741.pdf |
86 | Minimum Details
Threat
Defense
Minimum
Management
Center
Feature
Content Updates
Upgrade impact. Scheduled download tasks stop retrieving maintenance
releases.
The Download Latest Update scheduled task no longer downloads maintenance
releases; now it only downloadsthe latest applicable patches and VDB updates.
To direc... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/740/upgrade-management-center-741.pdf |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.