index
int64
0
4.08k
text
stringlengths
34
4.9k
url
stringclasses
38 values
87
Table 30: Version 7.2.0 Features Feature Details Threat Defense Upgrade Instead of copying upgrade packages to each device from the management center or internal web server, you can use the threat defense CLI to copy upgrade packages between devices ("peer to peer sync"). This secure and reliable resource-sharing goes ...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/740/upgrade-management-center-741.pdf
88
Feature Details You can now revert threat defense upgrades from the device CLI if communications between the management center and device are disrupted. Note that in high availability/scalability deployments, revert is more successful when all units are reverted simultaneously. When reverting with the CLI, open session...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/740/upgrade-management-center-741.pdf
89
Feature Details You can now revert major and maintenance upgrades to FTD. Reverting returns the software to its state just before the last upgrade, also called a snapshot. If you revert an upgrade after installing a patch, you revert the patch as well as the major and/or maintenance upgrade. If you think you might need...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/740/upgrade-management-center-741.pdf
90
Feature Details A new device upgrade page (Devices > Device Upgrade) on the FMC provides an easy-to-follow wizard for upgrading Version 6.4+ FTD devices. It walks you through important pre-upgrade stages, including selecting devices to upgrade, copying the upgrade package to the devices, and compatibility and readiness...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/740/upgrade-management-center-741.pdf
91
Table 33: Version 6.7.0 Features Feature Details Threat Defense Upgrade Upgrades now remove locally stored PCAP files. To upgrade, you must have enough free disk space or the upgrade fails. Upgrades remove PCAP files to save disk space. You can now view the status of FTD device upgrades and readiness checks in progress...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/740/upgrade-management-center-741.pdf
92
Feature Details The FMC now warns you of rule collisions when you import custom (local) intrusion rules. Previously, the system would silently skip the rules that cause collisions—with the exception of Version 6.6.0.1, where a rule import with collisions would fail entirely. On the Rule Updates page, if a rule import h...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/740/upgrade-management-center-741.pdf
93
Feature Details When you set up a new or reimaged FMC, the system automatically schedules: • A weekly task to download software updatesfor theFMC and its managed devices. • Weekly updates for the GeoDB. The tasks are scheduled in UTC, which means that when they occur locally depends on the date and your specific locati...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/740/upgrade-management-center-741.pdf
94
Feature Details So the system can verify that you are using the correct update files, Version 6.4+ uses signed updates for intrusion rules (SRU), the vulnerability database (VDB), and the geolocation database (GeoDB). Earlier versions continue to use unsigned updates. Unless you manually download updates from the Cisco...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/740/upgrade-management-center-741.pdf
95
Cisco Secure Firewall Threat Defense Upgrade Guide for Management Center, Version 7.4.1–7.4.x 90 Troubleshooting and Reference Upgrade Feature History
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/740/upgrade-management-center-741.pdf
0
Cisco Secure Firewall Threat Defense Upgrade Guide for Management Center, Version 7.6.x First Published: 2024-09-16 Last Modified: 2024-10-15 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/760/upgrade-management-center-760.pdf
1
THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APP...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/760/upgrade-management-center-760.pdf
2
CONTENTS CHAPTER 1 Planning Your Upgrade 1 Is This Guide for You? 1 Compatibility 1 Upgrade Guidelines 2 Software Upgrade Guidelines 2 Upgrade Guidelines for the Firepower 4100/9300 Chassis 2 Upgrade Path 2 Upgrade Order for Threat Defense with Chassis Upgrade and High Availability/Clusters 4 Upgrade Packages 5 Managin...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/760/upgrade-management-center-760.pdf
3
Threat Defense Upgrade Options 22 Upgrade Threat Defense in Unattended Mode 23 CHAPTER 4 Upgrade the Secure Firewall 3100/4200 or Firepower 4100/9300 Chassis 25 Upgrade the Secure Firewall 3100/4200 Chassis 25 Upgrade FXOS on the Firepower 4100/9300 with Chassis Manager 28 UpgradeFXOSforStandaloneFTD Logical Devices or...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/760/upgrade-management-center-760.pdf
4
Traffic Flow and Inspection 63 Traffic Flow and Inspection for Threat Defense Upgrades 63 Traffic Flow and Inspection for Chassis Upgrades 65 Traffic Flow and Inspection when Deploying Configurations 65 Time and Disk Space 66 Upgrade Feature History 67 Cisco Secure Firewall Threat Defense Upgrade Guide for Management C...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/760/upgrade-management-center-760.pdf
5
Cisco Secure Firewall Threat Defense Upgrade Guide for Management Center, Version 7.6.x vi Contents
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/760/upgrade-management-center-760.pdf
6
CHAPTER 1 Planning Your Upgrade Use this guide to plan and complete threat defense and management center upgrades. Upgrades can be major (A.x), maintenance (A.x.y), or patch (A.x.y.z) releases. We also may provide hotfixes, which are minor updates that address particular, urgent issues. • Is This Guide for You?, on pag...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/760/upgrade-management-center-760.pdf
7
Upgrade Guidelines See the release notes for release-specific upgrade warnings and guidelines, and for information on features and bugs with upgrade impact. For general information on time/disk space requirements and on system behavior during upgrade, see Troubleshooting and Reference, on page 59. Software Upgrade Guid...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/760/upgrade-management-center-760.pdf
8
then the chassis, then devices again. Or, perform a full reimage. In high availability or clustered deployments, upgrade one chassis at a time. Supported Direct Upgrades This table shows the supported direct upgrades for management center and threat defense software. Note that although you can upgrade directly to major...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/760/upgrade-management-center-760.pdf
9
Upgrade Order for Threat Defense with Chassis Upgrade and High Availability/Clusters When a chassis upgrade is required in high availability or clustered deployments, upgrade one chassis at a time. Table 2: Chassis Upgrade Order for the Firepower 4100/9300 with Management Center Threat Defense Deployment Upgrade Order ...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/760/upgrade-management-center-760.pdf
10
Threat Defense Deployment Upgrade Order Upgrade both chassis before you upgrade threat defense. 1. Upgrade chassis. With the chassis upgrade wizard, you have three options: • Parallel upgrade: Not recommended for high availability. • Serial upgrade: Automatically fail over when the active unit goes down. We recommend y...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/760/upgrade-management-center-760.pdf
11
To... Do This... Click Add Upgrade Package at the bottom right of the page, then Specify Remote Location. See Copying Upgrade Packages to Devices from an Internal Server, on page 7. Configure threat defense devices to get upgrade packagesfrom an internal server. Click the Ellipsis (…) next to the package or package ver...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/760/upgrade-management-center-760.pdf
12
Requirements When to Use You meet disk space and bandwidth requirements, but either the management center cannot access the Cisco Support & Download site, or you are applying a hotfix. See: Upgrade Packages on Cisco.com, on page 9 Cisco → Your Computer → Management Center → Devices Adequate disk space on the management...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/760/upgrade-management-center-760.pdf
13
Deleting Chassis Upgrade Packages from the Secure Firewall 3100/4200 For the Secure Firewall 3100/4200 in multi-instance mode, chassis upgrade packages are stored outside any application instances. This allows you to upgrade the chassis while also making the threat defense upgrade accessible to all instances. However, ...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/760/upgrade-management-center-760.pdf
14
Upgrade Packages on Cisco.com Manually download upgrade packages from Cisco when the system cannot access the Cisco Support & Download site, or when you cannot direct-download for another reason; for example, for hotfixes. You must also manually obtain upgrade packages if you plan to configure devices to get them from ...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/760/upgrade-management-center-760.pdf
15
Chassis Packages for the Secure Firewall 3100/4200 For the Secure Firewall 3100/4200 in multi-instance mode, the threat defense and chassis upgrades share a package. Chassis Packages for the Firepower 4100/9300 To find the correct FXOS package, select or search for your device model and browse to the Firepower Extensib...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/760/upgrade-management-center-760.pdf
16
Configuration and Deployment Checks Configurations Make sure you have made any required pre-upgrade configuration changes, and are prepared to make required post-upgrade configuration changes. Resolve any change management workflows. Deploy configuration changes. Note that you will need to deploy again after upgrade, w...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/760/upgrade-management-center-760.pdf
17
Backup Guide CiscoSecureFirewall Management Center Administration Guide: Backup/Restore Note that backup is not supported in all cases, for example, for threat defense virtual in the public cloud. But if you can back up, you should. Threat defense Cisco Secure Firewall Management Center Device Configuration Guide: Mult...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/760/upgrade-management-center-760.pdf
18
CHAPTER 2 Upgrade Management Center • Upgrade the Management Center: Standalone, on page 13 • Upgrade the Management Center: High Availability, on page 15 Upgrade the Management Center: Standalone Use this procedure to upgrade a standalone management center. As you proceed, the system displays basic information about t...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/760/upgrade-management-center-760.pdf
19
Procedure Step 1 On the management center, choose System ( ) > Product Upgrades. Step 2 Get the upgrade package. The Product Upgrades page lists all upgrade packages that apply to your current deployment, with suggested releases specially marked. In most cases, you can just click Download next to the upgrade package or...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/760/upgrade-management-center-760.pdf
20
Upgrade the Management Center: High Availability Use this procedure to upgrade high availability management centers. As you proceed, the system displays basic information about the upgrade, as well as the current upgrade-related status. First, upgrade the standby. In most cases the system automatically pauses synchroni...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/760/upgrade-management-center-760.pdf
21
Procedure Prepare to upgrade. Step 1 On the standby peer, choose System ( ) > Product Upgrades. Step 2 Get the upgrade package. The Product Upgrades page lists all upgrade packages that apply to your current deployment, with suggested releases specially marked. In most cases, you can just click Download next to the upg...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/760/upgrade-management-center-760.pdf
22
If the system does not notify you of the upgrade's success when you log in, choose Help ( ) > About to display current software version information. Step 9 Repeat the previous steps on the active peer. The upgrade package should already be there, and all checks should have passed. You can quickly click through those ta...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/760/upgrade-management-center-760.pdf
23
Cisco Secure Firewall Threat Defense Upgrade Guide for Management Center, Version 7.6.x 18 Upgrade Management Center Upgrade the Management Center: High Availability
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/760/upgrade-management-center-760.pdf
24
CHAPTER 3 Upgrade Threat Defense • Upgrade Threat Defense, on page 19 Upgrade Threat Defense Use this procedure to upgrade threat defense. As you proceed, the system displays basic information about your selected devices, as well as the current upgrade-related status. This includes any reasons why you cannot upgrade. I...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/760/upgrade-management-center-760.pdf
25
• Check configurations, tasks, and overall deployment health: Configuration and Deployment Checks, on page 11 • Perform backups: Backups, on page 11 • Upgrade chassis, if required: Upgrade the Secure Firewall 3100/4200 or Firepower 4100/9300 Chassis, on page 25 Procedure Step 1 On the management center, choose System (...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/760/upgrade-management-center-760.pdf
26
Step 6 Click Next to run compatibility and readiness checks. Compatibility and other quick prechecks are automatic. For example, the system alerts you immediately if you need to deploy configurations. Other checks take more time. To begin these, click Run Readiness Check. Do not deploy changes to, manually reboot, or s...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/760/upgrade-management-center-760.pdf
27
Step 13 Complete any required post-upgrade configuration changes. Step 14 Redeploy configurations to the devices you just upgraded. Before you deploy, you may want to review the changes made by the upgrade (as well as any changes you have made since upgrade): • If you have not cleared your workflow, you can return to t...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/760/upgrade-management-center-760.pdf
28
Option When to Disable Details With upgrades to Version 7.2–7.6, eligible devices will upgrade from Snort 2 to Snort 3 when you deploy configurations. With upgrades to Version 7.3+, you cannot disable this option. Although you can switch individual devices back, Snort 2 will be deprecated in a future release and we str...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/760/upgrade-management-center-760.pdf
29
To... Do This In the threat defense upgrade wizard, choose Unattended Mode > Stop. You can pause and restart unattended mode during the copy and checks phases. However, pausing unattended mode does not stop tasks in progress. Copies and checks that have started will run to completion. Note that you must pause unattende...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/760/upgrade-management-center-760.pdf
30
CHAPTER 4 Upgrade the Secure Firewall 3100/4200 or Firepower 4100/9300 Chassis Some devices may require a chassis upgrade (FXOS and firmware) before you upgrade the software: • SecureFirewall 3100/4200 in multi-instance mode: Any upgrade can require a chassis upgrade. Although you upgrade the chassis and threat defense...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/760/upgrade-management-center-760.pdf
31
Do not make or deploy configuration changes to the chassis or threat defense instances during the upgrade. Even if the system appears inactive, do not manually reboot or shut down. In most cases, do not restart an upgrade in progress. You could place the system in an unusable state and require a reimage. Chassis may re...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/760/upgrade-management-center-760.pdf
32
In the Device Details pane, select the chassis you want to upgrade and click Add to Selection. You can use the device links on the Device Selection pane to toggle the Device Details pane between selected chassis, remaining upgrade candidates, ineligible chassis (with reasons why), chassis that need the upgrade package,...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/760/upgrade-management-center-760.pdf
33
Step 12 (Optional) In high availability deployments, examine device roles. Depending on how you performed the upgrade, high availability instances may have switched roles. Keeping in mind that any subsequent threat defense upgrade will also switch device roles, make any desired changes. What to do next • (Optional) Cle...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/760/upgrade-management-center-760.pdf
34
Step 2 Upload the new platform bundle image: a) Click Upload Image to open the Upload Image dialog box. b) Click Choose File to navigate to and select the image that you want to upload. c) Click Upload. The selected image is uploaded to the Firepower 4100/9300 chassis. d) For certain software images you will be present...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/760/upgrade-management-center-760.pdf
35
e) Enter show app-instance. f) Verify that the Oper State is Online for any logical devices installed on the chassis. Upgrade FXOS on an FTD Inter-chassis Cluster Using Firepower Chassis Manager If you have Firepower 9300 or Firepower 4100 series security appliances that have FTD logical devices configured as an inter-...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/760/upgrade-management-center-760.pdf
36
a) Click Upload Image to open the Upload Image dialog box. b) Click Choose File to navigate to and select the image that you want to upload. c) Click Upload. The selected image is uploaded to the Firepower 4100/9300 chassis. d) For certain software images you will be presented with an end-user license agreement after u...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/760/upgrade-management-center-760.pdf
37
FP9300-A /system # top FP9300-A# scope ssa FP9300-A /ssa # show slot Slot: Slot ID Log Level Admin State Oper State ---------- --------- ------------ ---------- 1 Info Ok Online 2 Info Ok Online 3 Info Ok Not Available FP9300-A /ssa # FP9300-A /ssa # show app-instance App Name Slot ID Admin State Oper State Running Ver...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/760/upgrade-management-center-760.pdf
38
Step 2 In Firepower Chassis Manager, choose System > Updates. The Available Updates page shows a list of theFXOSplatform bundle images and application images that are available on the chassis. Step 3 Upload the new platform bundle image: a) Click Upload Image to open the Upload Image dialog box. b) Click Choose File to...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/760/upgrade-management-center-760.pdf
39
c) Enter show slot. d) Verify that the Admin State is Ok and the Oper State is Online for the security engine on a Firepower 4100 series appliance or for any security modules installed on a Firepower 9300 appliance. e) Enter show app-instance. f) Verify that the Oper State is Online for any logical devices installed on...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/760/upgrade-management-center-760.pdf
40
Fabric Interconnect A: Package-Vers: 2.3(1.58) Upgrade-Status: Ready Chassis 1: Server 1: Package-Vers: 2.3(1.58) Upgrade-Status: Ready Server 2: Package-Vers: 2.3(1.58) Upgrade-Status: Ready Step 15 After all components have successfully upgraded, enter the following commands to verify the status of the security modul...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/760/upgrade-management-center-760.pdf
41
Before you begin Before beginning your upgrade, make sure that you have already done the following: • Download the FXOS platform bundle software package to which you are upgrading. • Back up your FXOS and FTD configurations. • Collect the following information that you will need to download the software image to the Fi...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/760/upgrade-management-center-760.pdf
42
State: Downloading Current Task: downloading image fxos-k9.2.3.1.58.SPA from 192.168.1.1(FSM-STAGE:sam:dme:FirmwareDownloaderDownload:Local) Step 3 If necessary, return to firmware mode: Firepower-chassis-a /firmware/download-task # up Step 4 Enter auto-install mode: Firepower-chassis-a /firmware # scope auto-install S...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/760/upgrade-management-center-760.pdf
43
Step 9 After all components have successfully upgraded, enter the following commands to verify the status of the security modules/security engine and any installed applications: a) Enter top. b) Enter scope ssa. c) Enter show slot. d) Verify that the Admin State is Ok and the Oper State is Online for the security engin...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/760/upgrade-management-center-760.pdf
44
g) For any security modules installed on a Firepower 9300 appliance or for the security engine on a Firepower 4100 series appliance, verify that the FXOS version is correct: scope server 1/slot_id, where slot_id is 1 for a Firepower 4100 series security engine. show version. Step 3 Download the new platform bundle imag...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/760/upgrade-management-center-760.pdf
45
Firepower-chassis /firmware/auto-install # install platform platform-vers version_number version_number is the version number of the FXOS platform bundle you are installing—for example, 2.3(1.58). Step 7 The system will first verify the software package that you want to install. It will inform you of any incompatibilit...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/760/upgrade-management-center-760.pdf
46
1 Info Ok Online 2 Info Ok Online 3 Info Ok Not Available FP9300-A /ssa # FP9300-A /ssa # show app-instance App Name Slot ID Admin State Oper State Running Version Startup Version Profile Name Cluster State Cluster Role ---------- ---------- ----------- ---------------- --------------- --------------- ------------ ----...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/760/upgrade-management-center-760.pdf
47
a) Enter firmware mode: Firepower-chassis-a # scope firmware b) Download the FXOS platform bundle software image: Firepower-chassis-a /firmware # download image URL Specify the URL for the file being imported using one of the following syntax: • ftp://username@hostname/path/image_name • scp://username@hostname/path/ima...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/760/upgrade-management-center-760.pdf
48
Step 7 Enter yes to confirm that you want to proceed with installation, or enter no to cancel the installation. The system unpacks the bundle and upgrades/reloads the components. Step 8 To monitor the upgrade process: a) Enter scope system. b) Enter show firmware monitor. c) Wait for all components (FPRM, Fabric Interc...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/760/upgrade-management-center-760.pdf
49
Firepower-chassis-a # scope firmware b) Download the FXOS platform bundle software image: Firepower-chassis-a /firmware # download image URL Specify the URL for the file being imported using one of the following syntax: • ftp://username@hostname/path/image_name • scp://username@hostname/path/image_name • sftp://usernam...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/760/upgrade-management-center-760.pdf
50
The system unpacks the bundle and upgrades/reloads the components. Step 18 To monitor the upgrade process: a) Enter scope system. b) Enter show firmware monitor. c) Wait for all components (FPRM, Fabric Interconnect, and Chassis) to show Upgrade-Status: Ready. After the FPRM component is upgraded, the system will reboo...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/760/upgrade-management-center-760.pdf
51
Upgrade Firmware on the Firepower 4100/9300 Chassis upgrades to FXOS 2.14.1+ (the companion release to threat defense 7.4) include firmware. If you are upgrading older devices, see Cisco Firepower 4100/9300 FXOS Firmware Upgrade Guide. Cisco Secure Firewall Threat Defense Upgrade Guide for Management Center, Version 7....
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/760/upgrade-management-center-760.pdf
52
CHAPTER 5 Revert or Uninstall If an upgrade or patch succeeds but the system does not function to your expectations, you may be able to revert or uninstall. • Revert vs Uninstall, on page 47 • Revert Threat Defense Upgrades, on page 48 • Uninstall Threat Defense and Management Center Patches, on page 51 Revert vs Unins...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/760/upgrade-management-center-760.pdf
53
1. Upgrade threat defense from Version 7.2.0 → 7.2.5. 2. Patch from Version 7.2.5 → 7.2.5.2. 3. You can now either: • Uninstall the patch to go back to Version 7.2.5. This removes the patch only. • Revert the upgrade to go back to Version 7.2.0. This removes the patch and the maintenance release. Revert Threat Defense ...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/760/upgrade-management-center-760.pdf
54
Table 14: Scenarios Preventing Revert Scenario Solution None. The revert snapshot is saved on the management center and the device for thirty days, after which it is automatically deleted and you can no longer revert. You can manually delete the snapshot from either appliance to save disk space, but this removes your a...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/760/upgrade-management-center-760.pdf
55
General device settings, routing, interfaces, inline sets, DHCP, SNMP — anything you configure on the Devices > Device Management page. • Objects used by your device-specific configurations. These include access list, AS path, key chain, interface, network, port, route map, and SLA monitor objects. If you edited these ...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/760/upgrade-management-center-760.pdf
56
Procedure Step 1 Choose Devices > Device Management. Step 2 Next to the device you want to revert, click More ( ) and select Revert Upgrade. With the exception of high availability pairs and clusters, you cannot select multiple devices to revert. Step 3 Confirm that you want to revert and reboot. Interruptions to traff...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/760/upgrade-management-center-760.pdf
57
Uninstalling from High Availability Management Centers Minimize disruption by uninstalling from one management center at a time. Wait until the patch has fully uninstalled from one unit before you move on to the next. Table 15: Uninstall Order for Management Center High Availability ManagementCenter Uninstall Order Con...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/760/upgrade-management-center-760.pdf
58
Table 16: Scenarios Preventing or Restricting Uninstall Scenario Solution Uninstalling a patch applies only to the software. After uninstalling a patch that updates the operating system or other components not reversed by the uninstall, you may be unable to deploy configuration changes, or you may experience other inco...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/760/upgrade-management-center-760.pdf
59
Do not make or deploy configuration changes during uninstall. Even if the system appears inactive, do not manually reboot, shut down, or restart an uninstall in progress. You could place the system in an unusable state and require a reimage. If you encounter issues with the uninstall, including a failed uninstall or un...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/760/upgrade-management-center-760.pdf
60
Step 5 Run the uninstall command, entering your password when prompted. sudo install_update.pl --detach /var/sf/updates/uninstaller_name The system does not ask you to confirm. Entering this command starts the uninstall, which includes a device reboot. Interruptions in traffic flow and inspection during an uninstall ar...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/760/upgrade-management-center-760.pdf
61
• Revisit the Planning Your Upgrade, on page 1 chapter. In general, prepare for uninstalling a patch in the same way you prepared for installing it. • If uninstalling will put the management center at a lower patch level than its managed devices, uninstall patches from the devices first. Procedure Step 1 Deploy to mana...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/760/upgrade-management-center-760.pdf
62
• Revisit the Planning Your Upgrade, on page 1 chapter. In general, prepare for uninstalling a patch in the same way you prepared for installing it. • If uninstalling will put the management centers at a lower patch level than their managed devices, uninstall patches from the devices first. Procedure Step 1 On the acti...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/760/upgrade-management-center-760.pdf
63
Cisco Secure Firewall Threat Defense Upgrade Guide for Management Center, Version 7.6.x 58 Revert or Uninstall Uninstall a Management Center Patch: High Availability
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/760/upgrade-management-center-760.pdf
64
CHAPTER 6 Troubleshooting and Reference • Troubleshooting Upgrade Packages, on page 59 • Troubleshooting Threat Defense Upgrade, on page 60 • Unresponsive and Failed Management Center Upgrades, on page 61 • Unresponsive and Failed Threat Defense Upgrades, on page 61 • Traffic Flow and Inspection, on page 63 • Time and ...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/760/upgrade-management-center-760.pdf
65
Issue Solution If the peer management center does not have internet access or the download fails for any other reason, you can: • Start the upgrade anyway. The upgrade wizard has options to retry the download, or sync the file between the peers. • Log into the peer and manually upload the upgrade package. I downloaded ...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/760/upgrade-management-center-760.pdf
66
Issue Solution This often happens when there is limited bandwidth between the management center and its devices. You can configure devices to get upgrade packages directly from an internal web server. Delete the upgrade package from the management center (optional but saves disk space), then re-add the upgrade package ...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/760/upgrade-management-center-760.pdf
67
Issue Solution If device upgrade status has stopped updating on the management center but there is no report of upgrade failure, you can try canceling the upgrade; see below. If you cannot cancel or canceling does not work, contact Cisco TAC. Tip: You can monitor upgrade logs on the device itself using expert mode and ...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/760/upgrade-management-center-760.pdf
68
Issue Solution Part of the upgrade processis choosing what happensif it fails. Thisis done with the Automatically cancel on upgrade failure... (auto-cancel) option: • Auto-cancel enabled (default): If upgrade fails, the upgrade cancels and the device automatically reverts to its pre-upgrade state. This returns you to n...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/760/upgrade-management-center-760.pdf
69
Interface Configuration Traffic Behavior Passed without inspection until you either disable hardware bypass, or set it back to standby mode. Inline set, hardware bypassforce-enabled: Bypass: Force IPS-only interfaces Dropped during the upgrade, while the device is in maintenance mode. Then, passed without inspection wh...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/760/upgrade-management-center-760.pdf
70
Traffic Flow and Inspection for Chassis Upgrades UpgradingFXOSreboots the chassis.ForFXOSupgrades to Version 2.14.1+ that include firmware upgrades, the device reboots twice—once for FXOS and once for the firmware. This includes Version 7.4.1+ chassis upgrades for the Secure Firewall 3100/4200 in multi-instance mode. E...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/760/upgrade-management-center-760.pdf
71
Table 22: Traffic Flow and Inspection: Deploying Configuration Changes Interface Configuration Traffic Behavior Routed or switched including Dropped. EtherChannel, redundant, subinterfaces. Switched interfaces are also known as bridge group or transparent interfaces. Firewall interfaces Passed without inspection. A few...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/760/upgrade-management-center-760.pdf
72
Consideration Details In a high availability or clustered configuration, devices upgrade one at a time to preserve continuity of operations, with each device operating in maintenance mode while it upgrades. Upgrading a device pair or entire cluster, therefore, takes longer than upgrading a standalone device. High avail...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/760/upgrade-management-center-760.pdf
73
Minimum Details Threat Defense Minimum Management Center Feature You can now generate and download post-upgrade configuration change reports from the threat defense and chassis upgrade wizards, as long as you have not cleared your upgrade workflow. Previously, you used the Advanced Deploy screens to generate the report...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/760/upgrade-management-center-760.pdf
74
Minimum Details Threat Defense Minimum Management Center Feature Upgrading high availability management centers is now easier: • You no longer have to manually copy the upgrade package to both peers. Depending on your setup, you can have each peer get the package from the support site, or you can copy the package betwe...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/760/upgrade-management-center-760.pdf
75
Minimum Details Threat Defense Minimum Management Center Feature For theSecureFirewall 3100 in multi-instance mode, you upgrade the operating system and the firmware (chassis upgrade) separately from the container instances (threat defense upgrade). New/modified screens: • Upgrade the chassis: Devices > Chassis Upgrade...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/760/upgrade-management-center-760.pdf
76
Minimum Details Threat Defense Minimum Management Center Feature Although upgrading to Version 7.4.0 is supported, the upgrade will remove critical features, fixes, and enhancements that may be included in your current version. Instead, upgrade to Version 7.4.1+. From Version 7.2.6+, upgrading temporarily removes these...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/760/upgrade-management-center-760.pdf
77
Minimum Details Threat Defense Minimum Management Center Feature Although upgrading to Version 7.3.0 is supported, the upgrade will remove critical features, fixes, and enhancements that may be included in your current version. Instead, upgrade to Version 7.4.1+. From Version 7.2.6+, upgrading temporarily removes these...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/760/upgrade-management-center-760.pdf
78
Minimum Details Threat Defense Minimum Management Center Feature Upgrade impact. All eligible devices upgrade to Snort 3 when you deploy. When you upgrade threat defense to Version 7.3+, you can no longer disable the Upgrade Snort 2 to Snort 3 option. After the software upgrade, all eligible devices will upgrade from S...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/760/upgrade-management-center-760.pdf
79
Minimum Details Threat Defense Minimum Management Center Feature Reimage Impact. In Version 7.3, we combined the threat defense install and upgrade package for the Secure Firewall 3100, as follows: • Version 7.1–7.2 install package: cisco-ftd-fp3k.version.SPA • Version 7.1–7.2 upgrade package: Cisco_FTD_SSP_FP3K_Upgrad...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/760/upgrade-management-center-760.pdf
80
Minimum Details Threat Defense Minimum Management Center Feature The initialsetup on the management centerschedules a weekly task to download the latest available software updates, which now includesthe latest vulnerability database (VDB). We recommend you review this weekly task and adjust if necessary. Optionally, sc...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/760/upgrade-management-center-760.pdf
81
Minimum Details Threat Defense Minimum Management Center Feature A new upgrade page makes it easier to choose, download, manage, and apply upgrades to your entire deployment. This includes the management center, threat defense devices, and any older NGIPSv/ASA FirePOWER devices. The page lists all upgrade packages that...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/760/upgrade-management-center-760.pdf
82
Minimum Details Threat Defense Minimum Management Center Feature The management center now notifies you when a new suggested release is available. If you don't want to upgrade right now, you can have the system remind you later, or defer reminders until the next suggested release. The new upgrade page also indicates su...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/760/upgrade-management-center-760.pdf
83
Minimum Details Threat Defense Minimum Management Center Feature The threat defense upgrade wizard now supports unattended upgrades, using a new Unattended Mode menu. You just need to select the target version and the devices you want to upgrade,specify a few upgrade options, and step away. You can even log out or clos...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/760/upgrade-management-center-760.pdf
84
Minimum Details Threat Defense Minimum Management Center Feature Content Updates Upgrade impact. Scheduled download tasks stop retrieving maintenance releases. The Download Latest Update scheduled task no longer downloads maintenance releases; now it only downloadsthe latest applicable patches and VDB updates. To direc...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/760/upgrade-management-center-760.pdf
85
Feature Details When you use a Version 7.2+ management center to upgrade threat defense to Version 7.2+, you can now choose whether to Upgrade Snort 2 to Snort 3. After the software upgrade, eligible devices upgrade from Snort 2 to Snort 3 when you deploy configurations.For devices that are ineligible because they use ...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/760/upgrade-management-center-760.pdf
86
Feature Details You can now revert major and maintenance upgrades to FTD. Reverting returns the software to its state just before the last upgrade, also called a snapshot. If you revert an upgrade after installing a patch, you revert the patch as well as the major and/or maintenance upgrade. If you think you might need...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/760/upgrade-management-center-760.pdf
87
Feature Details A new device upgrade page (Devices > Device Upgrade) on the FMC provides an easy-to-follow wizard for upgrading Version 6.4+ FTD devices. It walks you through important pre-upgrade stages, including selecting devices to upgrade, copying the upgrade package to the devices, and compatibility and readiness...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/760/upgrade-management-center-760.pdf
88
Feature Details The FTD upgrade wizard lifts the following restrictions: • Simultaneous device upgrades. The number of devices you can upgrade at once is now limited by your management network bandwidth—not the system's ability to manage simultaneous upgrades. Previously, we recommended against upgrading more than five...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/760/upgrade-management-center-760.pdf
89
Feature Details You can now view the status of FTD device upgrades and readiness checks in progress on the Device Management page, as well as a 7-day history of upgrade success/failures. The Message Center also provides enhanced status and error messages. A new Upgrade Status pop-up, accessible from both Device Managem...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/760/upgrade-management-center-760.pdf
90
Table 34: Version 6.6.0 Features Feature Details Threat Defense Upgrade FTD devices can now get upgrade packages from your own internal web server, rather than from the FMC. This is especially useful if you have limited bandwidth between the FMC and its devices. It also saves space on the FMC. This feature is supported...
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/760/upgrade-management-center-760.pdf