Cisco Cisco Firepower Management Center 2000 Notas de publicación
8
FireSIGHT System Release Notes
Version 5.3.1
Installing the Update
Installation Method
Use the Defense Center’s web interface to perform the update.
Installing the Update on Paired Defense Centers
When you begin to update one Defense Center in a high availability pair, the other Defense Center in the
pair becomes the primary, if it is not already. In addition, the paired Defense Centers stop sharing
configuration information; paired Defense Centers do not receive software updates as part of the regular
synchronization process.
pair becomes the primary, if it is not already. In addition, the paired Defense Centers stop sharing
configuration information; paired Defense Centers do not receive software updates as part of the regular
synchronization process.
To ensure continuity of operations, do not update paired Defense Centers at the same time. First,
complete the update procedure for the secondary Defense Center, then update the primary Defense
Center.
complete the update procedure for the secondary Defense Center, then update the primary Defense
Center.
After the Installation
After you perform the update on the Defense Center, you must reapply device configuration and access
control policies. Applying an access control policy may cause a short pause in traffic flow and
processing, and may also cause a few packets to pass uninspected. For more information, see the
FireSIGHT System User Guide.
control policies. Applying an access control policy may cause a short pause in traffic flow and
processing, and may also cause a few packets to pass uninspected. For more information, see the
FireSIGHT System User Guide.
There are several additional post-update steps you should take to ensure that your deployment is
performing properly. These include:
performing properly. These include:
•
verifying that the update succeeded
•
making sure that all appliances in your deployment are communicating successfully
•
updating to the latest patch for Version 5.3.1, if available, to take advantage of the latest
enhancements and security fixes
enhancements and security fixes
•
optionally, updating your intrusion rules and vulnerability database (VDB) and reapplying your
access control policies
access control policies
•
making any required configuration changes based on the information in
The next sections include detailed instructions not only on performing the update, but also on completing
any post-update steps. Make sure you complete all of the listed tasks.
any post-update steps. Make sure you complete all of the listed tasks.