Cisco Cisco Firepower Management Center 2000

Seite von 46
9
FireSIGHT System Release Notes
Before You Begin: Important Update and Compatibility Notes
The FireSIGHT System Virtual Installation Guide incorrect states the following about logging in to a virtual device at 
the VMware console using admin as the username and the new admin account password specified in the 
deployment setup wizard: If you did not change the password using the wizard or you are deploying with a ESXi 
OVF template, use Cisco as the password.
 The documentation should state that if you did not change the password 
using the wizard or you are deploying with an ESXi OVF template, use Sourcefire as the password. (CSCut77002)
Before You Begin: Important Update and Compatibility Notes
Before you begin the update process for Version 5.4.0.7 and Version 5.4.1.6, you should familiarize yourself with the 
behavior of the system during the update process, as well as with any compatibility issues or required pre- or 
post-update configuration changes.
Caution:
 Cisco strongly recommends you perform the update in a maintenance window or at a time when the 
interruption will have the least impact on your deployment.
For more information, see the following sections:
Configuration and Event Backup Guidelines
Before you begin the update, Cisco strongly recommends that you delete or move any backup files that reside on your 
appliance, then back up current event and configuration data to an external location.
Use the Defense Center to back up event and configuration data for itself and the devices it manages. For more 
information on the backup and restore feature, see the FireSIGHT System User Guide.
Note: 
The Defense Center purges locally stored backups from previous updates. To retain archived backups, store the 
backups externally.
Caution:
 BIOS Version 2.0.1b must be running on your DC2000 and DC4000 appliances in order to update to version 
5.4.1.1 or later. If updating your appliances fails due to an incompatible BIOS version, contact Support. 
Prior to updating an ASA FirePOWER module running FirePOWER Services or a Cisco ASA managed by ASDM, set the 
device clock to the correct time. If an ASA device clock is set to the incorrect time before updating, the Access Control 
Licensing page does not load.
Traffic Flow and Inspection During the Update
The update process reboots managed devices and might restart the Snort process. Depending on how your devices are 
configured and deployed, the following capabilities could be affected
traffic inspection, including application awareness and control, user control, URL filtering, Security Intelligence, 
intrusion detection and prevention, and connection logging 
traffic flow, including switching, routing, NAT, VPN, and related functionality