index int64 0 4.08k | text stringlengths 34 4.9k ⌀ | url stringclasses 38
values |
|---|---|---|
87 | Table 30: Version 7.2.0 Features
Feature Details
Threat Defense Upgrade
Instead of copying upgrade packages to each device from the management center or
internal web server, you can use the threat defense CLI to copy upgrade packages
between devices ("peer to peer sync"). This secure and reliable resource-sharing goes
... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/740/upgrade-management-center-741.pdf |
88 | Feature Details
You can now revert threat defense upgrades from the device CLI if communications
between the management center and device are disrupted. Note that in high
availability/scalability deployments, revert is more successful when all units are reverted
simultaneously. When reverting with the CLI, open session... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/740/upgrade-management-center-741.pdf |
89 | Feature Details
You can now revert major and maintenance upgrades to FTD. Reverting returns the
software to its state just before the last upgrade, also called a snapshot. If you revert an
upgrade after installing a patch, you revert the patch as well as the major and/or
maintenance upgrade.
If you think you might need... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/740/upgrade-management-center-741.pdf |
90 | Feature Details
A new device upgrade page (Devices > Device Upgrade) on the FMC provides an
easy-to-follow wizard for upgrading Version 6.4+ FTD devices. It walks you through
important pre-upgrade stages, including selecting devices to upgrade, copying the
upgrade package to the devices, and compatibility and readiness... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/740/upgrade-management-center-741.pdf |
91 | Table 33: Version 6.7.0 Features
Feature Details
Threat Defense Upgrade
Upgrades now remove locally stored PCAP files. To upgrade, you must have enough
free disk space or the upgrade fails.
Upgrades remove PCAP files to save disk
space.
You can now view the status of FTD device upgrades and readiness checks in progress... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/740/upgrade-management-center-741.pdf |
92 | Feature Details
The FMC now warns you of rule collisions when you import custom (local) intrusion
rules. Previously, the system would silently skip the rules that cause collisions—with
the exception of Version 6.6.0.1, where a rule import with collisions would fail entirely.
On the Rule Updates page, if a rule import h... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/740/upgrade-management-center-741.pdf |
93 | Feature Details
When you set up a new or reimaged FMC, the system automatically schedules:
• A weekly task to download software updatesfor theFMC and its managed devices.
• Weekly updates for the GeoDB.
The tasks are scheduled in UTC, which means that when they occur locally depends on
the date and your specific locati... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/740/upgrade-management-center-741.pdf |
94 | Feature Details
So the system can verify that you are using the correct update files, Version 6.4+ uses
signed updates for intrusion rules (SRU), the vulnerability database (VDB), and the
geolocation database (GeoDB). Earlier versions continue to use unsigned updates.
Unless you manually download updates from the Cisco... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/740/upgrade-management-center-741.pdf |
95 | Cisco Secure Firewall Threat Defense Upgrade Guide for Management Center, Version 7.4.1–7.4.x
90
Troubleshooting and Reference
Upgrade Feature History | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/740/upgrade-management-center-741.pdf |
0 | Cisco Secure Firewall Threat Defense Upgrade Guide for Management
Center, Version 7.6.x
First Published: 2024-09-16
Last Modified: 2024-10-15
Americas Headquarters
Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134-1706
USA
http://www.cisco.com
Tel: 408 526-4000
800 553-NETS (6387)
Fax: 408 527-0883 | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/760/upgrade-management-center-760.pdf |
1 | THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS,
INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND,
EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APP... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/760/upgrade-management-center-760.pdf |
2 | CONTENTS
CHAPTER 1 Planning Your Upgrade 1
Is This Guide for You? 1
Compatibility 1
Upgrade Guidelines 2
Software Upgrade Guidelines 2
Upgrade Guidelines for the Firepower 4100/9300 Chassis 2
Upgrade Path 2
Upgrade Order for Threat Defense with Chassis Upgrade and High Availability/Clusters 4
Upgrade Packages 5
Managin... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/760/upgrade-management-center-760.pdf |
3 | Threat Defense Upgrade Options 22
Upgrade Threat Defense in Unattended Mode 23
CHAPTER 4 Upgrade the Secure Firewall 3100/4200 or Firepower 4100/9300 Chassis 25
Upgrade the Secure Firewall 3100/4200 Chassis 25
Upgrade FXOS on the Firepower 4100/9300 with Chassis Manager 28
UpgradeFXOSforStandaloneFTD Logical Devices or... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/760/upgrade-management-center-760.pdf |
4 | Traffic Flow and Inspection 63
Traffic Flow and Inspection for Threat Defense Upgrades 63
Traffic Flow and Inspection for Chassis Upgrades 65
Traffic Flow and Inspection when Deploying Configurations 65
Time and Disk Space 66
Upgrade Feature History 67
Cisco Secure Firewall Threat Defense Upgrade Guide for Management C... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/760/upgrade-management-center-760.pdf |
5 | Cisco Secure Firewall Threat Defense Upgrade Guide for Management Center, Version 7.6.x
vi
Contents | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/760/upgrade-management-center-760.pdf |
6 | CHAPTER 1
Planning Your Upgrade
Use this guide to plan and complete threat defense and management center upgrades. Upgrades can be major
(A.x), maintenance (A.x.y), or patch (A.x.y.z) releases. We also may provide hotfixes, which are minor updates
that address particular, urgent issues.
• Is This Guide for You?, on pag... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/760/upgrade-management-center-760.pdf |
7 | Upgrade Guidelines
See the release notes for release-specific upgrade warnings and guidelines, and for information on features
and bugs with upgrade impact. For general information on time/disk space requirements and on system
behavior during upgrade, see Troubleshooting and Reference, on page 59.
Software Upgrade Guid... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/760/upgrade-management-center-760.pdf |
8 | then the chassis, then devices again. Or, perform a full reimage. In high availability or clustered deployments,
upgrade one chassis at a time.
Supported Direct Upgrades
This table shows the supported direct upgrades for management center and threat defense software. Note that
although you can upgrade directly to major... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/760/upgrade-management-center-760.pdf |
9 | Upgrade Order for Threat Defense with Chassis Upgrade and High
Availability/Clusters
When a chassis upgrade is required in high availability or clustered deployments, upgrade one chassis at a
time.
Table 2: Chassis Upgrade Order for the Firepower 4100/9300 with Management Center
Threat Defense Deployment Upgrade Order
... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/760/upgrade-management-center-760.pdf |
10 | Threat Defense Deployment Upgrade Order
Upgrade both chassis before you upgrade threat defense.
1. Upgrade chassis. With the chassis upgrade wizard, you have three
options:
• Parallel upgrade: Not recommended for high availability.
• Serial upgrade: Automatically fail over when the active unit
goes down. We recommend y... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/760/upgrade-management-center-760.pdf |
11 | To... Do This...
Click Add Upgrade Package at the bottom right of the page, then Specify
Remote Location.
See Copying Upgrade Packages to Devices from an Internal Server, on page 7.
Configure threat defense
devices to get upgrade
packagesfrom an internal
server.
Click the Ellipsis (…) next to the package or package ver... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/760/upgrade-management-center-760.pdf |
12 | Requirements When to Use
You meet disk space and bandwidth requirements,
but either the management center cannot access the
Cisco Support & Download site, or you are applying
a hotfix.
See: Upgrade Packages on Cisco.com, on page 9
Cisco → Your Computer → Management Center
→ Devices
Adequate disk space on the management... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/760/upgrade-management-center-760.pdf |
13 | Deleting Chassis Upgrade Packages from the Secure Firewall 3100/4200
For the Secure Firewall 3100/4200 in multi-instance mode, chassis upgrade packages are stored outside any
application instances. This allows you to upgrade the chassis while also making the threat defense upgrade
accessible to all instances. However, ... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/760/upgrade-management-center-760.pdf |
14 | Upgrade Packages on Cisco.com
Manually download upgrade packages from Cisco when the system cannot access the Cisco Support &
Download site, or when you cannot direct-download for another reason; for example, for hotfixes. You must
also manually obtain upgrade packages if you plan to configure devices to get them from ... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/760/upgrade-management-center-760.pdf |
15 | Chassis Packages for the Secure Firewall 3100/4200
For the Secure Firewall 3100/4200 in multi-instance mode, the threat defense and chassis upgrades share a
package.
Chassis Packages for the Firepower 4100/9300
To find the correct FXOS package, select or search for your device model and browse to the Firepower
Extensib... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/760/upgrade-management-center-760.pdf |
16 | Configuration and Deployment Checks
Configurations
Make sure you have made any required pre-upgrade configuration changes, and are prepared to make required
post-upgrade configuration changes. Resolve any change management workflows. Deploy configuration
changes. Note that you will need to deploy again after upgrade, w... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/760/upgrade-management-center-760.pdf |
17 | Backup Guide
CiscoSecureFirewall Management Center Administration Guide: Backup/Restore
Note that backup is not supported in all cases, for example, for threat defense
virtual in the public cloud. But if you can back up, you should.
Threat defense
Cisco Secure Firewall Management Center Device Configuration Guide:
Mult... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/760/upgrade-management-center-760.pdf |
18 | CHAPTER 2
Upgrade Management Center
• Upgrade the Management Center: Standalone, on page 13
• Upgrade the Management Center: High Availability, on page 15
Upgrade the Management Center: Standalone
Use this procedure to upgrade a standalone management center. As you proceed, the system displays basic
information about t... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/760/upgrade-management-center-760.pdf |
19 | Procedure
Step 1 On the management center, choose System ( ) > Product Upgrades.
Step 2 Get the upgrade package.
The Product Upgrades page lists all upgrade packages that apply to your current deployment, with suggested releases
specially marked. In most cases, you can just click Download next to the upgrade package or... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/760/upgrade-management-center-760.pdf |
20 | Upgrade the Management Center: High Availability
Use this procedure to upgrade high availability management centers. As you proceed, the system displays
basic information about the upgrade, as well as the current upgrade-related status.
First, upgrade the standby. In most cases the system automatically pauses synchroni... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/760/upgrade-management-center-760.pdf |
21 | Procedure
Prepare to upgrade.
Step 1 On the standby peer, choose System ( ) > Product Upgrades.
Step 2 Get the upgrade package.
The Product Upgrades page lists all upgrade packages that apply to your current deployment, with suggested releases
specially marked. In most cases, you can just click Download next to the upg... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/760/upgrade-management-center-760.pdf |
22 | If the system does not notify you of the upgrade's success when you log in, choose Help ( ) > About to display
current software version information.
Step 9 Repeat the previous steps on the active peer.
The upgrade package should already be there, and all checks should have passed. You can quickly click through those
ta... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/760/upgrade-management-center-760.pdf |
23 | Cisco Secure Firewall Threat Defense Upgrade Guide for Management Center, Version 7.6.x
18
Upgrade Management Center
Upgrade the Management Center: High Availability | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/760/upgrade-management-center-760.pdf |
24 | CHAPTER 3
Upgrade Threat Defense
• Upgrade Threat Defense, on page 19
Upgrade Threat Defense
Use this procedure to upgrade threat defense. As you proceed, the system displays basic information about
your selected devices, as well as the current upgrade-related status. This includes any reasons why you cannot
upgrade. I... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/760/upgrade-management-center-760.pdf |
25 | • Check configurations, tasks, and overall deployment health: Configuration and Deployment Checks, on
page 11
• Perform backups: Backups, on page 11
• Upgrade chassis, if required: Upgrade the Secure Firewall 3100/4200 or Firepower 4100/9300 Chassis,
on page 25
Procedure
Step 1 On the management center, choose System (... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/760/upgrade-management-center-760.pdf |
26 | Step 6 Click Next to run compatibility and readiness checks.
Compatibility and other quick prechecks are automatic. For example, the system alerts you immediately if you need
to deploy configurations. Other checks take more time. To begin these, click Run Readiness Check.
Do not deploy changes to, manually reboot, or s... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/760/upgrade-management-center-760.pdf |
27 | Step 13 Complete any required post-upgrade configuration changes.
Step 14 Redeploy configurations to the devices you just upgraded.
Before you deploy, you may want to review the changes made by the upgrade (as well as any changes you have made
since upgrade):
• If you have not cleared your workflow, you can return to t... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/760/upgrade-management-center-760.pdf |
28 | Option When to Disable Details
With upgrades to Version 7.2–7.6, eligible devices will
upgrade from Snort 2 to Snort 3 when you deploy
configurations.
With upgrades to Version 7.3+, you cannot disable this
option. Although you can switch individual devices back,
Snort 2 will be deprecated in a future release and we str... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/760/upgrade-management-center-760.pdf |
29 | To... Do This
In the threat defense upgrade wizard, choose Unattended Mode > Stop.
You can pause and restart unattended mode during the copy and checks phases.
However, pausing unattended mode does not stop tasks in progress. Copies and
checks that have started will run to completion. Note that you must pause
unattende... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/760/upgrade-management-center-760.pdf |
30 | CHAPTER 4
Upgrade the Secure Firewall 3100/4200 or
Firepower 4100/9300 Chassis
Some devices may require a chassis upgrade (FXOS and firmware) before you upgrade the software:
• SecureFirewall 3100/4200 in multi-instance mode: Any upgrade can require a chassis upgrade. Although
you upgrade the chassis and threat defense... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/760/upgrade-management-center-760.pdf |
31 | Do not make or deploy configuration changes to the chassis or threat defense instances during the upgrade.
Even if the system appears inactive, do not manually reboot or shut down. In most cases, do not restart an
upgrade in progress. You could place the system in an unusable state and require a reimage. Chassis may
re... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/760/upgrade-management-center-760.pdf |
32 | In the Device Details pane, select the chassis you want to upgrade and click Add to Selection.
You can use the device links on the Device Selection pane to toggle the Device Details pane between selected chassis,
remaining upgrade candidates, ineligible chassis (with reasons why), chassis that need the upgrade package,... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/760/upgrade-management-center-760.pdf |
33 | Step 12 (Optional) In high availability deployments, examine device roles.
Depending on how you performed the upgrade, high availability instances may have switched roles. Keeping in mind
that any subsequent threat defense upgrade will also switch device roles, make any desired changes.
What to do next
• (Optional) Cle... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/760/upgrade-management-center-760.pdf |
34 | Step 2 Upload the new platform bundle image:
a) Click Upload Image to open the Upload Image dialog box.
b) Click Choose File to navigate to and select the image that you want to upload.
c) Click Upload.
The selected image is uploaded to the Firepower 4100/9300 chassis.
d) For certain software images you will be present... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/760/upgrade-management-center-760.pdf |
35 | e) Enter show app-instance.
f) Verify that the Oper State is Online for any logical devices installed on the chassis.
Upgrade FXOS on an FTD Inter-chassis Cluster Using Firepower Chassis
Manager
If you have Firepower 9300 or Firepower 4100 series security appliances that have FTD logical devices
configured as an inter-... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/760/upgrade-management-center-760.pdf |
36 | a) Click Upload Image to open the Upload Image dialog box.
b) Click Choose File to navigate to and select the image that you want to upload.
c) Click Upload.
The selected image is uploaded to the Firepower 4100/9300 chassis.
d) For certain software images you will be presented with an end-user license agreement after u... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/760/upgrade-management-center-760.pdf |
37 | FP9300-A /system # top
FP9300-A# scope ssa
FP9300-A /ssa # show slot
Slot:
Slot ID Log Level Admin State Oper State
---------- --------- ------------ ----------
1 Info Ok Online
2 Info Ok Online
3 Info Ok Not Available
FP9300-A /ssa #
FP9300-A /ssa # show app-instance
App Name Slot ID Admin State Oper State Running Ver... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/760/upgrade-management-center-760.pdf |
38 | Step 2 In Firepower Chassis Manager, choose System > Updates.
The Available Updates page shows a list of theFXOSplatform bundle images and application images that are available
on the chassis.
Step 3 Upload the new platform bundle image:
a) Click Upload Image to open the Upload Image dialog box.
b) Click Choose File to... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/760/upgrade-management-center-760.pdf |
39 | c) Enter show slot.
d) Verify that the Admin State is Ok and the Oper State is Online for the security engine on a Firepower 4100 series
appliance or for any security modules installed on a Firepower 9300 appliance.
e) Enter show app-instance.
f) Verify that the Oper State is Online for any logical devices installed on... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/760/upgrade-management-center-760.pdf |
40 | Fabric Interconnect A:
Package-Vers: 2.3(1.58)
Upgrade-Status: Ready
Chassis 1:
Server 1:
Package-Vers: 2.3(1.58)
Upgrade-Status: Ready
Server 2:
Package-Vers: 2.3(1.58)
Upgrade-Status: Ready
Step 15 After all components have successfully upgraded, enter the following commands to verify the status of the security
modul... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/760/upgrade-management-center-760.pdf |
41 | Before you begin
Before beginning your upgrade, make sure that you have already done the following:
• Download the FXOS platform bundle software package to which you are upgrading.
• Back up your FXOS and FTD configurations.
• Collect the following information that you will need to download the software image to the Fi... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/760/upgrade-management-center-760.pdf |
42 | State: Downloading
Current Task: downloading image fxos-k9.2.3.1.58.SPA from
192.168.1.1(FSM-STAGE:sam:dme:FirmwareDownloaderDownload:Local)
Step 3 If necessary, return to firmware mode:
Firepower-chassis-a /firmware/download-task # up
Step 4 Enter auto-install mode:
Firepower-chassis-a /firmware # scope auto-install
S... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/760/upgrade-management-center-760.pdf |
43 | Step 9 After all components have successfully upgraded, enter the following commands to verify the status of the security
modules/security engine and any installed applications:
a) Enter top.
b) Enter scope ssa.
c) Enter show slot.
d) Verify that the Admin State is Ok and the Oper State is Online for the security engin... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/760/upgrade-management-center-760.pdf |
44 | g) For any security modules installed on a Firepower 9300 appliance or for the security engine on a Firepower 4100
series appliance, verify that the FXOS version is correct:
scope server 1/slot_id, where slot_id is 1 for a Firepower 4100 series security engine.
show version.
Step 3 Download the new platform bundle imag... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/760/upgrade-management-center-760.pdf |
45 | Firepower-chassis /firmware/auto-install # install platform platform-vers version_number
version_number is the version number of the FXOS platform bundle you are installing—for example, 2.3(1.58).
Step 7 The system will first verify the software package that you want to install. It will inform you of any incompatibilit... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/760/upgrade-management-center-760.pdf |
46 | 1 Info Ok Online
2 Info Ok Online
3 Info Ok Not Available
FP9300-A /ssa #
FP9300-A /ssa # show app-instance
App Name Slot ID Admin State Oper State Running Version Startup Version Profile Name
Cluster State Cluster Role
---------- ---------- ----------- ---------------- --------------- --------------- ------------
----... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/760/upgrade-management-center-760.pdf |
47 | a) Enter firmware mode:
Firepower-chassis-a # scope firmware
b) Download the FXOS platform bundle software image:
Firepower-chassis-a /firmware # download image URL
Specify the URL for the file being imported using one of the following syntax:
• ftp://username@hostname/path/image_name
• scp://username@hostname/path/ima... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/760/upgrade-management-center-760.pdf |
48 | Step 7 Enter yes to confirm that you want to proceed with installation, or enter no to cancel the installation.
The system unpacks the bundle and upgrades/reloads the components.
Step 8 To monitor the upgrade process:
a) Enter scope system.
b) Enter show firmware monitor.
c) Wait for all components (FPRM, Fabric Interc... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/760/upgrade-management-center-760.pdf |
49 | Firepower-chassis-a # scope firmware
b) Download the FXOS platform bundle software image:
Firepower-chassis-a /firmware # download image URL
Specify the URL for the file being imported using one of the following syntax:
• ftp://username@hostname/path/image_name
• scp://username@hostname/path/image_name
• sftp://usernam... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/760/upgrade-management-center-760.pdf |
50 | The system unpacks the bundle and upgrades/reloads the components.
Step 18 To monitor the upgrade process:
a) Enter scope system.
b) Enter show firmware monitor.
c) Wait for all components (FPRM, Fabric Interconnect, and Chassis) to show Upgrade-Status: Ready.
After the FPRM component is upgraded, the system will reboo... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/760/upgrade-management-center-760.pdf |
51 | Upgrade Firmware on the Firepower 4100/9300
Chassis upgrades to FXOS 2.14.1+ (the companion release to threat defense 7.4) include firmware. If you are
upgrading older devices, see Cisco Firepower 4100/9300 FXOS Firmware Upgrade Guide.
Cisco Secure Firewall Threat Defense Upgrade Guide for Management Center, Version 7.... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/760/upgrade-management-center-760.pdf |
52 | CHAPTER 5
Revert or Uninstall
If an upgrade or patch succeeds but the system does not function to your expectations, you may be able to
revert or uninstall.
• Revert vs Uninstall, on page 47
• Revert Threat Defense Upgrades, on page 48
• Uninstall Threat Defense and Management Center Patches, on page 51
Revert vs Unins... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/760/upgrade-management-center-760.pdf |
53 | 1. Upgrade threat defense from Version 7.2.0 → 7.2.5.
2. Patch from Version 7.2.5 → 7.2.5.2.
3. You can now either:
• Uninstall the patch to go back to Version 7.2.5.
This removes the patch only.
• Revert the upgrade to go back to Version 7.2.0.
This removes the patch and the maintenance release.
Revert Threat Defense ... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/760/upgrade-management-center-760.pdf |
54 | Table 14: Scenarios Preventing Revert
Scenario Solution
None.
The revert snapshot is saved on the management center and the
device for thirty days, after which it is automatically deleted and
you can no longer revert. You can manually delete the snapshot
from either appliance to save disk space, but this removes your
a... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/760/upgrade-management-center-760.pdf |
55 | General device settings, routing, interfaces, inline sets, DHCP, SNMP — anything you configure on the
Devices > Device Management page.
• Objects used by your device-specific configurations.
These include access list, AS path, key chain, interface, network, port, route map, and SLA monitor
objects. If you edited these ... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/760/upgrade-management-center-760.pdf |
56 | Procedure
Step 1 Choose Devices > Device Management.
Step 2 Next to the device you want to revert, click More ( ) and select Revert Upgrade.
With the exception of high availability pairs and clusters, you cannot select multiple devices to revert.
Step 3 Confirm that you want to revert and reboot.
Interruptions to traff... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/760/upgrade-management-center-760.pdf |
57 | Uninstalling from High Availability Management Centers
Minimize disruption by uninstalling from one management center at a time. Wait until the patch has fully
uninstalled from one unit before you move on to the next.
Table 15: Uninstall Order for Management Center High Availability
ManagementCenter Uninstall Order
Con... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/760/upgrade-management-center-760.pdf |
58 | Table 16: Scenarios Preventing or Restricting Uninstall
Scenario Solution
Uninstalling a patch applies only to the software. After uninstalling a patch that
updates the operating system or other components not reversed by the uninstall,
you may be unable to deploy configuration changes, or you may experience other
inco... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/760/upgrade-management-center-760.pdf |
59 | Do not make or deploy configuration changes during uninstall. Even if the system appears inactive, do not
manually reboot, shut down, or restart an uninstall in progress. You could place the system in an unusable
state and require a reimage. If you encounter issues with the uninstall, including a failed uninstall or
un... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/760/upgrade-management-center-760.pdf |
60 | Step 5 Run the uninstall command, entering your password when prompted.
sudo install_update.pl --detach /var/sf/updates/uninstaller_name
The system does not ask you to confirm. Entering this command starts the uninstall, which includes a device
reboot. Interruptions in traffic flow and inspection during an uninstall ar... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/760/upgrade-management-center-760.pdf |
61 | • Revisit the Planning Your Upgrade, on page 1 chapter. In general, prepare for uninstalling a patch in
the same way you prepared for installing it.
• If uninstalling will put the management center at a lower patch level than its managed devices, uninstall
patches from the devices first.
Procedure
Step 1 Deploy to mana... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/760/upgrade-management-center-760.pdf |
62 | • Revisit the Planning Your Upgrade, on page 1 chapter. In general, prepare for uninstalling a patch in
the same way you prepared for installing it.
• If uninstalling will put the management centers at a lower patch level than their managed devices, uninstall
patches from the devices first.
Procedure
Step 1 On the acti... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/760/upgrade-management-center-760.pdf |
63 | Cisco Secure Firewall Threat Defense Upgrade Guide for Management Center, Version 7.6.x
58
Revert or Uninstall
Uninstall a Management Center Patch: High Availability | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/760/upgrade-management-center-760.pdf |
64 | CHAPTER 6
Troubleshooting and Reference
• Troubleshooting Upgrade Packages, on page 59
• Troubleshooting Threat Defense Upgrade, on page 60
• Unresponsive and Failed Management Center Upgrades, on page 61
• Unresponsive and Failed Threat Defense Upgrades, on page 61
• Traffic Flow and Inspection, on page 63
• Time and ... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/760/upgrade-management-center-760.pdf |
65 | Issue Solution
If the peer management center does not have internet access or the download fails for any other
reason, you can:
• Start the upgrade anyway. The upgrade wizard has options to retry the download, or sync the
file between the peers.
• Log into the peer and manually upload the upgrade package.
I downloaded ... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/760/upgrade-management-center-760.pdf |
66 | Issue Solution
This often happens when there is limited bandwidth between the management
center and its devices.
You can configure devices to get upgrade packages directly from an internal web
server. Delete the upgrade package from the management center (optional but
saves disk space), then re-add the upgrade package ... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/760/upgrade-management-center-760.pdf |
67 | Issue Solution
If device upgrade status has stopped updating on the management center but there is no report of
upgrade failure, you can try canceling the upgrade; see below. If you cannot cancel or canceling
does not work, contact Cisco TAC.
Tip: You can monitor upgrade logs on the device itself using expert mode and ... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/760/upgrade-management-center-760.pdf |
68 | Issue Solution
Part of the upgrade processis choosing what happensif it fails. Thisis done with the Automatically
cancel on upgrade failure... (auto-cancel) option:
• Auto-cancel enabled (default): If upgrade fails, the upgrade cancels and the device automatically
reverts to its pre-upgrade state. This returns you to n... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/760/upgrade-management-center-760.pdf |
69 | Interface Configuration Traffic Behavior
Passed without inspection until you either
disable hardware bypass, or set it back to
standby mode.
Inline set, hardware bypassforce-enabled:
Bypass: Force
IPS-only interfaces
Dropped during the upgrade, while the
device is in maintenance mode. Then,
passed without inspection wh... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/760/upgrade-management-center-760.pdf |
70 | Traffic Flow and Inspection for Chassis Upgrades
UpgradingFXOSreboots the chassis.ForFXOSupgrades to Version 2.14.1+ that include firmware upgrades,
the device reboots twice—once for FXOS and once for the firmware. This includes Version 7.4.1+ chassis
upgrades for the Secure Firewall 3100/4200 in multi-instance mode.
E... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/760/upgrade-management-center-760.pdf |
71 | Table 22: Traffic Flow and Inspection: Deploying Configuration Changes
Interface Configuration Traffic Behavior
Routed or switched including Dropped.
EtherChannel, redundant, subinterfaces.
Switched interfaces are also known as
bridge group or transparent interfaces.
Firewall interfaces
Passed without inspection.
A few... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/760/upgrade-management-center-760.pdf |
72 | Consideration Details
In a high availability or clustered configuration, devices upgrade one at a time
to preserve continuity of operations, with each device operating in maintenance
mode while it upgrades. Upgrading a device pair or entire cluster, therefore, takes
longer than upgrading a standalone device.
High avail... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/760/upgrade-management-center-760.pdf |
73 | Minimum Details
Threat
Defense
Minimum
Management
Center
Feature
You can now generate and download post-upgrade configuration change reports
from the threat defense and chassis upgrade wizards, as long as you have not
cleared your upgrade workflow.
Previously, you used the Advanced Deploy screens to generate the report... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/760/upgrade-management-center-760.pdf |
74 | Minimum Details
Threat
Defense
Minimum
Management
Center
Feature
Upgrading high availability management centers is now easier:
• You no longer have to manually copy the upgrade package to both peers.
Depending on your setup, you can have each peer get the package from
the support site, or you can copy the package betwe... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/760/upgrade-management-center-760.pdf |
75 | Minimum Details
Threat
Defense
Minimum
Management
Center
Feature
For theSecureFirewall 3100 in multi-instance mode, you upgrade the operating
system and the firmware (chassis upgrade) separately from the container
instances (threat defense upgrade).
New/modified screens:
• Upgrade the chassis: Devices > Chassis Upgrade... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/760/upgrade-management-center-760.pdf |
76 | Minimum Details
Threat
Defense
Minimum
Management
Center
Feature
Although upgrading to Version 7.4.0 is supported, the upgrade will remove
critical features, fixes, and enhancements that may be included in your current
version. Instead, upgrade to Version 7.4.1+.
From Version 7.2.6+, upgrading temporarily removes these... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/760/upgrade-management-center-760.pdf |
77 | Minimum Details
Threat
Defense
Minimum
Management
Center
Feature
Although upgrading to Version 7.3.0 is supported, the upgrade will remove
critical features, fixes, and enhancements that may be included in your current
version. Instead, upgrade to Version 7.4.1+.
From Version 7.2.6+, upgrading temporarily removes these... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/760/upgrade-management-center-760.pdf |
78 | Minimum Details
Threat
Defense
Minimum
Management
Center
Feature
Upgrade impact. All eligible devices upgrade to Snort 3 when you deploy.
When you upgrade threat defense to Version 7.3+, you can no longer disable
the Upgrade Snort 2 to Snort 3 option.
After the software upgrade, all eligible devices will upgrade from S... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/760/upgrade-management-center-760.pdf |
79 | Minimum Details
Threat
Defense
Minimum
Management
Center
Feature
Reimage Impact.
In Version 7.3, we combined the threat defense install and upgrade package
for the Secure Firewall 3100, as follows:
• Version 7.1–7.2 install package: cisco-ftd-fp3k.version.SPA
• Version 7.1–7.2 upgrade package:
Cisco_FTD_SSP_FP3K_Upgrad... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/760/upgrade-management-center-760.pdf |
80 | Minimum Details
Threat
Defense
Minimum
Management
Center
Feature
The initialsetup on the management centerschedules a weekly task to download
the latest available software updates, which now includesthe latest vulnerability
database (VDB). We recommend you review this weekly task and adjust if
necessary. Optionally, sc... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/760/upgrade-management-center-760.pdf |
81 | Minimum Details
Threat
Defense
Minimum
Management
Center
Feature
A new upgrade page makes it easier to choose, download, manage, and apply
upgrades to your entire deployment. This includes the management center,
threat defense devices, and any older NGIPSv/ASA FirePOWER devices. The
page lists all upgrade packages that... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/760/upgrade-management-center-760.pdf |
82 | Minimum Details
Threat
Defense
Minimum
Management
Center
Feature
The management center now notifies you when a new suggested release is
available. If you don't want to upgrade right now, you can have the system
remind you later, or defer reminders until the next suggested release. The new
upgrade page also indicates su... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/760/upgrade-management-center-760.pdf |
83 | Minimum Details
Threat
Defense
Minimum
Management
Center
Feature
The threat defense upgrade wizard now supports unattended upgrades, using
a new Unattended Mode menu. You just need to select the target version and
the devices you want to upgrade,specify a few upgrade options, and step away.
You can even log out or clos... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/760/upgrade-management-center-760.pdf |
84 | Minimum Details
Threat
Defense
Minimum
Management
Center
Feature
Content Updates
Upgrade impact. Scheduled download tasks stop retrieving maintenance
releases.
The Download Latest Update scheduled task no longer downloads maintenance
releases; now it only downloadsthe latest applicable patches and VDB updates.
To direc... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/760/upgrade-management-center-760.pdf |
85 | Feature Details
When you use a Version 7.2+ management center to upgrade threat defense to Version
7.2+, you can now choose whether to Upgrade Snort 2 to Snort 3.
After the software upgrade, eligible devices upgrade from Snort 2 to Snort 3 when you
deploy configurations.For devices that are ineligible because they use ... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/760/upgrade-management-center-760.pdf |
86 | Feature Details
You can now revert major and maintenance upgrades to FTD. Reverting returns the
software to its state just before the last upgrade, also called a snapshot. If you revert an
upgrade after installing a patch, you revert the patch as well as the major and/or
maintenance upgrade.
If you think you might need... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/760/upgrade-management-center-760.pdf |
87 | Feature Details
A new device upgrade page (Devices > Device Upgrade) on the FMC provides an
easy-to-follow wizard for upgrading Version 6.4+ FTD devices. It walks you through
important pre-upgrade stages, including selecting devices to upgrade, copying the
upgrade package to the devices, and compatibility and readiness... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/760/upgrade-management-center-760.pdf |
88 | Feature Details
The FTD upgrade wizard lifts the following restrictions:
• Simultaneous device upgrades.
The number of devices you can upgrade at once is now limited by your management
network bandwidth—not the system's ability to manage simultaneous upgrades.
Previously, we recommended against upgrading more than five... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/760/upgrade-management-center-760.pdf |
89 | Feature Details
You can now view the status of FTD device upgrades and readiness checks in progress
on the Device Management page, as well as a 7-day history of upgrade success/failures.
The Message Center also provides enhanced status and error messages.
A new Upgrade Status pop-up, accessible from both Device Managem... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/760/upgrade-management-center-760.pdf |
90 | Table 34: Version 6.6.0 Features
Feature Details
Threat Defense Upgrade
FTD devices can now get upgrade packages from your own internal web server, rather
than from the FMC. This is especially useful if you have limited bandwidth between
the FMC and its devices. It also saves space on the FMC.
This feature is supported... | https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/management-center/760/upgrade-management-center-760.pdf |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.