Upgrade the ASA FirePOWER Module

Similar documents
Updating to Version 6.2.2

Before You Update: Important Notes

System Software Updates

SOURCEFIRE 3D SYSTEM RELEASE NOTES

Traffic Flow, Inspection, and Device Behavior During Upgrade

SOURCEFIRE 3D SYSTEM RELEASE NOTES

Firepower Management Center High Availability

SOURCEFIRE 3D SYSTEM RELEASE NOTES

SOURCEFIRE 3D SYSTEM RELEASE NOTES

SOURCEFIRE 3D SYSTEM RELEASE NOTES

Task Scheduling. Introduction to Task Scheduling. Configuring a Recurring Task

SOURCEFIRE 3D SYSTEM RELEASE NOTES

SOURCEFIRE 3D SYSTEM RELEASE NOTES

SOURCEFIRE 3D SYSTEM RELEASE NOTES

SOURCEFIRE 3D SYSTEM RELEASE NOTES

Classic Device Management Basics

SOURCEFIRE 3D SYSTEM RELEASE NOTES

Device Management Basics

SOURCEFIRE 3D SYSTEM RELEASE NOTES

Device Management Basics

Image Management. About Image Management

The following topics describe how to manage various policies on the Firepower Management Center:

Upgrade ASA and ASDM Cisco ASA Firewall

The following topics describe how to use backup and restore features in the Firepower System:

Install and Configure the TS Agent

Monitoring WAAS Using WAAS Central Manager. Monitoring WAAS Network Health. Using the WAAS Dashboard CHAPTER

Device Management Basics

Upgrading NIOS Software

Initial Configuration Steps of FireSIGHT Systems

Install and Configure the TS Agent

User Identity Sources

SOURCEFIRE 3D SYSTEM RELEASE NOTES

Backup and Restore Introduction

Licenses: Product Authorization Key Licensing

The following topics explain how to get started configuring Firepower Threat Defense. Table 1: Firepower Device Manager Supported Models

Host Identity Sources

Managing CX Devices in Multiple Device Mode

Licenses: Smart Software Licensing (ASAv, ASA on Firepower)

Deploying Cisco ASA Firewall Features (FIREWALL) v1.0. Global Knowledge European Remote Labs Instructor Guide

High Availability Options

Deploying the Cisco ASA 1000V

Installing and Configuring the TS Agent

Licensing the Firepower System

Set Up Cisco ISE in a Distributed Environment

System Configuration. The following topics explain how to configure system configuration settings on Firepower Management Centers and managed devices:

ForeScout CounterACT Resiliency Solutions

Planning Your Upgrade

FortiVoice 200D/200D-T/2000E-T2 High Availability Technical Note

Managing Deployment. Understanding Deployment CHAPTER

Configuring High Availability (HA)

Configuring Failover. Understanding Failover CHAPTER

User Identity Sources

Getting Started. About the ASA for Firepower How the ASA Works with the Firepower 2100

Aggregate Interfaces and LACP

ForeScout CounterACT. Resiliency Solutions. CounterACT Version 8.0

Introduction to Cisco ASA to Firepower Threat Defense Migration

Cisco Terminal Services (TS) Agent Guide, Version 1.1

Push Notifications (On-Premises Deployments)

NSX-T Upgrade Guide. VMware NSX-T 2.0

Cisco Terminal Services (TS) Agent Guide, Version 1.1

Realms and Identity Policies

Upgrade a FireAMP Connector on Windows Operating Systems

Cisco Terminal Services (TS) Agent Guide, Version 1.0

Cisco TelePresence VCS Cluster Creation and Maintenance

The following topics describe how to use dashboards in the Firepower System:

F5 BIG-IQ Centralized Management: Upgrading a DCD Cluster to Version 5.4. Version 5.4

Using VMware vsphere with Your System

Cisco - ASA Lab Camp v9.0

Set Up Cisco ISE in a Distributed Environment

License Management for the ASA

About Updating a System, page 1 Connecting to an ISO Image from the CD/DVD Drive, page 4 Updating Data Centers, page 4

Upgrading Software and Firmware

Multiple Context Mode

Maintaining Cisco Unity Connection Server

Release Notes. Release Purpose... 1 Platform Compatibility... 1 Upgrading Information... 1 Browser Support... 2 Known Issues... 3 Resolved Issues...

ASDM Graphical User Interface

Failover for High Availability

This Tech Note provides instructions on how to upgrade to ClearPass 6.7 from versions 6.5 and later.

Installation. Installation Overview. Installation and Configuration Taskflows CHAPTER

Application Detection

Polycom RealPresence Resource Manager System

Security, Internet Access, and Communication Ports

DNS Policies. DNS Policy Overview. The following topics explain DNS policies, DNS rules, and how to deploy DNS policies to managed devices.

Cisco Expressway Cluster Creation and Maintenance

MediaSense Installation

Managing Blade Servers

Firepower Threat Defense Cluster for the Firepower 4100/9300

Failover for High Availability

ASA Cluster for the Firepower 9300 Chassis

SonicOS Enhanced Release Notes

Licensing the Firepower System

IM and Presence Service Network Setup

Cisco UCS Director Tech Module Cisco Adaptive Security Appliance (ASA & ASAv)

Servicing ACNS Devices and Origin Servers

Configuring Failover

Failover Dynamics and Options with BeyondTrust 3. Methods to Configure Failover Between BeyondTrust Appliances 4

Managing Feature Licenses

Upgrading the Server Software

IPS Device Deployments and Configuration

Upgrading Your System

Transcription:

This document describes how to upgrade the ASA FirePOWER module using ASDM or the Firepower Management Center, depending on your management choice. Refer to Upgrade the ASA Appliance or ASAv to determine when you should perform the FirePOWER upgrade in a standalone, failover, or clustering scenario. ASA FirePOWER Upgrade Behavior, page 1 Upgrade an ASA FirePOWER Module Managed by ASDM, page 2 Upgrade the Firepower Management Center, page 3 Upgrade ASA FirePOWER Modules Managed by thefirepower Management Center, page 7 ASA FirePOWER Upgrade Behavior Your ASA service policies for redirecting traffic to the ASA FirePOWER module determine how the module handles traffic during the Firepower software upgrade, including when you deploy certain configurations that restart the Snort process. Traffic Redirection Policy Traffic Behavior Fail open (sfr fail-open) Passed without inspection Fail closed (sfr fail-close) Dropped Monitor only (sfr {fail-close} {fail-open} monitor-only) Egress packet immediately, copy not inspected Traffic Behavior During Deployment Traffic behavior while the Snort process restarts is the same as when you upgrade the ASA FirePOWER module. You deploy configurations multiple times during the upgrade process. The Snort process typically restarts during the first deployment immediately after the upgrade. It does not restart during other deployments unless, before deploying, you modify specific policy or device configurations. 1

Upgrade an ASA FirePOWER Module Managed by ASDM When you deploy, resources demands may result in a small number of packets dropping without inspection. Additionally, restarting the Snort process interrupts traffic inspection. Your service policies determine whether traffic drops or passes without inspection during the interruption. Upgrade an ASA FirePOWER Module Managed by ASDM Use the following procedure to upgrade ASA FirePOWER modules managed by ASDM. Caution Do not make configuration changes, manually reboot, or shut down an upgrading module. Do not restart an upgrade in progress. The upgrade process may appear inactive during prechecks; this is expected. If you encounter issues with the upgrade, including a failed upgrade or unresponsive appliance, contact Cisco TAC. Procedure Step 1 Step 2 Make sure you are running a supported version of ASA. There is wide compatibility between ASA and ASA FirePOWER versions. However, even if an ASA upgrade is not strictly required, resolving issues may require an upgrade to the latest supported version. See the ASA upgrade procedures for standalone, failover, and clustering scenarios for when to upgrade the ASA FirePOWER module in the sequence. Even if you are not upgrading the ASA software, you should still refer to the ASA failover and clustering upgrade procedures so you can perform a failover or disable clustering on a unit before the module upgrade to avoid traffic loss. For example, in a cluster, you should upgrade each secondary unit serially (which involves disabling clustering, upgrading the module, then reenabling clustering), and then upgrade the primary unit. Download the upgrade package from Cisco.com. For major versions: Upgrading to Version 6.0 through 6.2.2 Cisco_Network_Sensor_Upgrade-[version]-[build].sh Upgrading to Version 6.2.3+ Cisco_Network_Sensor_Upgrade-[version]-[build].sh.REL.tar For patches: Upgrading to 5.4.1.x through 6.2.1.x Cisco_Network_Sensor_Patch-[version]-[build].sh Upgrading to Version 6.2.2.1+ Cisco_Network_Sensor_Patch-[version]-[build].sh.REL.tar Download directly from Cisco.com. If you transfer a package by email, it may become corrupted. Note that upgrade packages from Version 6.2.2+ are signed, and terminate in.sh.rel.tar instead of just.sh. Do not untar signed upgrade packages. Step 3 Step 4 Connect to the ASA with ASDM and upload the upgrade package. a) Choose Configuration > ASA FirePOWER Configuration > Updates. b) Click Upload Update. c) Click Choose File to navigate to and choose the update. d) Click Upload. Deploy pending configuration changes. Otherwise, the upgrade may fail. 2

Upgrade the Firepower Management Center When you deploy, resource demands may result in a small number of packets dropping without inspection. Additionally, deploying some configurations restarts the Snort process, which interrupts traffic inspection and, depending on how your device handles traffic, may interrupt traffic until the restart completes. For more information, see ASA FirePOWER Upgrade Behavior, on page 1. Step 5 Step 6 Step 7 Step 8 Step 9 Step 10 Step 11 Step 12 Step 13 Step 14 Step 15 (Upgrading to Version 6.1+) Disable the ASA REST API. If you do not disable the REST API, the upgrade will fail. Note that ASA 5506-X series devices do not support the ASA REST API if you are also running Version 6.0+ of the ASA FirePOWER module. Use the CLI on the ASA to disable the REST API: no rest-api agent You can reenable it after the upgrade: rest-api agent Choose Monitoring > ASA FirePOWER Monitoring > Task Status to make sure essential tasks are complete. Tasks running when the upgrade begins are stopped, become failed tasks, and cannot be resumed. You can manually delete failed status messages later. Choose Configuration > ASA FirePOWER Configuration > Updates. Click the Install icon next to the upgrade package you uploaded, then confirm that you want to upgrade and reboot the module. Traffic either drops throughout the upgrade or traverses the network without inspection, depending on how the module is configured. For more information, see ASA FirePOWER Upgrade Behavior, on page 1. Monitor upgrade progress on the Task Status page. Do not make configuration changes to the module while it is upgrading. Even if the upgrade status shows no progress for several minutes or indicates that the upgrade has failed, do not restart the upgrade or reboot the module. Instead, contact Cisco TAC. After the upgrade finishes, reconnect ASDM to the ASA. Choose Configuration > ASA FirePOWER Configuration and click Refresh. Otherwise, the interface may exhibit unexpected behavior. Choose Configuration > ASA FirePOWER Configuration > System Information and confirm that the module has the correct software version. If the intrusion rule update or the vulnerability database (VDB) available on the Support site is newer than the version currently running, install the newer version. Complete any post-upgrade configuration changes described in the release notes. Redeploy configurations. Upgrade the Firepower Management Center If you manage the ASA FirePOWER module using the Firepower Management Center, then you need to upgrade the Management Center before you upgrade the module. 3

Upgrade a Standalone Firepower Management Center Upgrade a Standalone Firepower Management Center This procedure explains how to upgrade a standalone Firepower Management Center, including Firepower Management Center Virtual. Caution Do not deploy changes to or from, manually reboot, or shut down an upgrading appliance. Do not restart an upgrade in progress. The upgrade process may appear inactive during prechecks; this is expected. If you encounter issues with the upgrade, including a failed upgrade or unresponsive appliance, contact Cisco TAC. Before You Begin Check your place in the upgrade path, including hosting environment and managed device upgrades. Make sure you have fully planned and prepared for this step. Procedure Step 1 Step 2 Deploy to managed devices whose configurations are out of date. On the Firepower Management Center menu bar, click Deploy. Choose devices, then click Deploy again. If you do not deploy to an out-of-date device now, its eventual upgrade may fail and you may have to reimage it. When you deploy, resource demands may result in a small number of packets dropping without inspection. Additionally, deploying some configurations restarts the Snort process, which interrupts traffic inspection and, depending on how your device handles traffic, may interrupt traffic until the restart completes. Perform final preupgrade checks. Check health Use the Message Center (click the System Status icon on the menu bar). Make sure the appliances in your deployment are successfully communicating and that there are no issues reported by the health monitor. Running tasks Also in the Message Center, make sure essential tasks are complete. Tasks running when the upgrade begins are stopped, become failed tasks, and cannot be resumed. You can manually delete failed status messages later. Check disk space Perform a final disk space check. Without enough free disk space, the upgrade fails. Step 3 Step 4 Step 5 Step 6 Step 7 Choose System > Updates. Click the Install icon next to the upgrade package you want to use, then choose the Firepower Management Center. Click Install to begin the upgrade. Confirm that you want to upgrade and reboot the Firepower Management Center. Monitor precheck progress in the Message Center until you are logged out. Do not make configuration changes or deploy to any device while the Firepower Management Center is upgrading. Even if the Message Center shows no progress for several minutes or indicates that the upgrade has failed, do not restart the upgrade or reboot the Firepower Management Center. Instead, contact Cisco TAC. Log back into the Firepower Management Center when you can. 4

Upgrade High Availability Firepower Management Centers Minor upgrades (patches and hotfixes) You can log in after the upgrade completes and the Firepower Management Center reboots. Major upgrades You can log in before the upgrade completes. The Firepower Management Center displays a page you can use to monitor the upgrade's progress and view the upgrade log and any error messages. You are logged out again when the upgrade completes and the Firepower Management Center reboots. Step 8 Step 9 Step 10 Step 11 Step 12 Step 13 (Major upgrades only) Log back into thefirepower Management Center. If prompted, review and accept the End User License Agreement (EULA). Otherwise, you are logged out. Verify upgrade success. If the Firepower Management Center does not notify you of the upgrade's success when you log in, choose Help > About to display current software version information. Use the Message Center to recheck deployment health. Update intrusion rules and the vulnerability database (VDB). If the intrusion rule update or the VDB available on the Support site is newer than the version currently running, install the newer version. For more information, see the Firepower Management Center Configuration Guide. Note that when you update intrusion rules, you do not need to automatically reapply policies. You will do that later. Complete any post-upgrade configuration changes described in the release notes. Redeploy configurations. Redeploy to all managed devices. If you do not deploy to a device, its eventual upgrade may fail and you may have to reimage it. Upgrade High Availability Firepower Management Centers This procedure explains how to upgrade the Firepower software on Firepower Management Centers in a high availability pair. You upgrade peers one at a time. With synchronization paused, first upgrade the standby (or secondary), then the active (or primary). When the standby Firepower Management Center starts prechecks, its status switches from standby to active, so that both peers are active. This temporary state is called split-brain and is not supported except during upgrade. Do not make or deploy configuration changes while the pair is split-brain. Your changes will be lost after you upgrade the Firepower Management Centers and restart synchronization. Caution Do not deploy changes to or from, manually reboot, or shut down an upgrading appliance. Do not restart an upgrade in progress. The upgrade process may appear inactive during prechecks; this is expected. If you encounter issues with the upgrade, including a failed upgrade or unresponsive appliance, contact Cisco TAC. Before You Begin Check your place in the upgrade path, including managed device upgrades. Make sure you have fully planned and prepared for this step. 5

Upgrade High Availability Firepower Management Centers Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Step 9 On the active Firepower Management Center, deploy to managed devices whose configurations are out of date. On the Firepower Management Center menu bar, click Deploy. Choose devices, then click Deploy again. If you do not deploy to an out-of-date device now, its eventual upgrade may fail and you may have to reimage it. When you deploy, resource demands may result in a small number of packets dropping without inspection. Additionally, deploying some configurations restarts the Snort process, which interrupts traffic inspection and, depending on how your device handles traffic, may interrupt traffic until the restart completes. Use the Message Center to check deployment health before you pause synchronization. Click the System Status icon on the Firepower Management Center menu bar to display the Message Center. Make sure the appliances in your deployment are successfully communicating and that there are no issues reported by the health monitor. Pause synchronization. a) Choose System > Integration. b) On the High Availability tab, click Pause Synchronization. Upgrade the Firepower Management Centers one at a time. a) Upgrade the standby. b) Upgrade the active. To upgrade, follow the instructions in Upgrade a Standalone Firepower Management Center, on page 4, but omit the initial deploy, and stop after you verify update success on each Firepower Management Center. Do not make or deploy configuration changes while the pair is split-brain. On the Firepower Management Center you want to make the active peer, restart synchronization. a) Choose System > Integration. b) On the High Availability tab, click Make-Me-Active. c) Wait until high availability synchronization restarts and the other Firepower Management Center switches to standby mode. Use the Message Center to recheck deployment health. Update intrusion rules and the vulnerability database (VDB). If the intrusion rule update or the VDB available on the Support site is newer than the version currently running, install the newer version. For more information, see the Firepower Management Center Configuration Guide. Note that when you update intrusion rules, you do not need to automatically reapply policies. You will do that later. Complete any post-upgrade configuration changes described in the release notes. Redeploy configurations. Redeploy to all managed devices. If you do not deploy to a device, its eventual upgrade may fail and you may have to reimage it. 6

Upgrade ASA FirePOWER Modules Managed by thefirepower Management Center Upgrade ASA FirePOWER Modules Managed by thefirepower Management Center This procedure explains how to upgrade ASA FirePOWER modules managed by a Firepower Management Center. When you upgrade ASA and the ASA FirePOWER module together on a standalone ASA device, upgrade the ASA FirePOWER module after you upgrade ASA and reload. For clustered or failover ASA devices, upgrade each ASA FirePOWER module before you reload each unit: Active/standby failover ASA pair Upgrade the standby unit, fail over the active, then upgrade the new standby. Active/active failover ASA pair Make both failover groups active on the primary and upgrade the secondary. Repeat the process, reversing the roles. ASA cluster Upgrade each slave unit, then upgrade the master. Remove each unit from the cluster before upgrade and rejoin after you reload. For details, see the ASA upgrade procedures. If you are not upgrading ASA, you can upgrade all ASA FirePOWER modules together, regardless of ASA failover or clustering configuration. However, you should still refer to the ASA failover and clustering upgrade procedures so you can perform a failover or disable clustering on a unit before the module upgrade to avoid traffic loss. Caution Do not deploy changes to or from, manually reboot, or shut down an upgrading appliance. Do not restart an upgrade in progress. The upgrade process may appear inactive during prechecks; this is expected. If you encounter issues with the upgrade, including a failed upgrade or unresponsive appliance, contact Cisco TAC. Before You Begin Check your place in the upgrade path, including ASA and Firepower Management Center upgrades. Make sure you have fully planned and prepared for this step. Note that there is wide compatibility between ASA and ASA FirePOWER versions. However, even if an ASA upgrade is not strictly required, resolving issues may require an upgrade to the latest supported version. Procedure Step 1 Deploy configurations to the devices you are about to upgrade. On the Firepower Management Center menu bar, click Deploy. Choose devices, then click Deploy again. If you do not deploy to an out-of-date device now, its eventual upgrade may fail and you may have to reimage it. When you deploy, resource demands may result in a small number of packets dropping without inspection. Additionally, deploying some configurations restarts the Snort process, which interrupts traffic inspection and, depending on how your device handles traffic, may interrupt traffic until the restart completes. For more information, see ASA FirePOWER Upgrade Behavior, on page 1. 7

Upgrade ASA FirePOWER Modules Managed by thefirepower Management Center Step 2 Step 3 (Upgrading to Version 6.1+) Disable the ASA REST API. If you do not disable the REST API, the upgrade will fail. Note that ASA 5506-X series devices do not support the ASA REST API if you are also running Version 6.0+ of the ASA FirePOWER module. Use the CLI on the ASA to disable the REST API: no rest-api agent You can reenable it after the upgrade: rest-api agent Perform final preupgrade checks. Check health Use the Message Center (click the System Status icon on the menu bar). Make sure the appliances in your deployment are successfully communicating and that there are no issues reported by the health monitor. Running tasks Also in the Message Center, make sure essential tasks are complete. Tasks running when the upgrade begins are stopped, become failed tasks, and cannot be resumed. You can manually delete failed status messages later. Check disk space Perform a final disk space check. Without enough free disk space, the upgrade fails. Step 4 Step 5 Step 6 Step 7 Step 8 Step 9 Step 10 Step 11 Step 12 Choose System > Updates. Click the Install icon next to the upgrade package you want to use and choose the devices to upgrade. If the devices you want to upgrade are not listed, you chose the wrong upgrade package. Note We strongly recommend upgrading no more than five devices simultaneously. The Firepower Management Center does not allow you stop a device upgrade until all selected devices complete the process. If there is an issue with any one device upgrade, all devices must finish upgrading before you can resolve the issue. Click Install, then confirm that you want to upgrade and reboot the devices. Traffic either drops throughout the upgrade or traverses the network without inspection depending on how your devices are configured and deployed. For more information, see ASA FirePOWER Upgrade Behavior, on page 1. Monitor upgrade progress in the Message Center. Do not deploy configurations to the device while it is upgrading. Even if the Message Center shows no progress for several minutes or indicates that the upgrade has failed, do not restart the upgrade or reboot the device. Instead, contact Cisco TAC. Verify update success. After the upgrade completes, choose Devices > Device Management and confirm that the devices you upgraded have the correct software version. Use the Message Center to recheck deployment health. Update intrusion rules and the vulnerability database (VDB). If the intrusion rule update or the VDB available on the Support site is newer than the version currently running, install the newer version. For more information, see the Firepower Management Center Configuration Guide. Note that when you update intrusion rules, you do not need to automatically reapply policies. You will do that later. Complete any post-upgrade configuration changes described in the release notes. Redeploy configurations to the devices you just upgraded. 8

Upgrade ASA FirePOWER Modules Managed by thefirepower Management Center 9

Upgrade ASA FirePOWER Modules Managed by thefirepower Management Center 10