Cisco Cisco Firepower Management Center 2000 Notas de publicación

Descargar
Página de 40
Firepower System Release Notes
 
Installing the Update
 
20
Updating ASA FirePOWER modules Managed by ASDM
Step 1
Update the ASA FirePOWER software on the devices running ASA FirePOWER FireSIGHT module to 
ASA FirePOWER version 9.5(1.5) and ASDM 7.5.1. For more information, see the Release Notes for the 
Cisco ASA Series
, 9.5(x) and the Release Notes for Cisco ASDM, 7.5(x).
Step 2
Download the update from the Beta site:
for ASA FirePOWER modules:
Cisco_Network_Sensor_-6.0.0.1-26.sh
Step 3
Note
: Download the update directly from the Support site. If you transfer an update file by email, it may 
become corrupted. 
Step 4
Select Configuration > ASA FirePOWER Configuration > Updates.
Step 5
Click Upload Update
Step 6
Click Choose File to navigate to and select the update. 
Step 7
Click Upload.
Step 8
Select Monitoring > ASA FirePOWER Monitoring > Task Status to view the task tab and make sure 
that there are no jobs in process.
You must wait until any long-running tasks are complete before you begin the update. After the system update 
completes, to reduce clutter, remove the messages for these tasks from the Message Center.
Step 9
Select Configuration > ASA FirePOWER Configuration > Updates.
Step 10
Click the install icon next to the update you uploaded.
The update process begins. How you monitor the update depends on whether the update is a major or minor update. 
For major updates, you can begin monitoring the update’s progress in the task queue. However, after the ASA 
FirePOWER module completes its necessary pre-update checks, you are locked out of the module interface.
Step 11
After the update finishes, reconnect ASDM to the ASA device.
Step 12
Access the ASA FirePOWER module interface and refresh the page. Otherwise, the interface may 
exhibit unexpected behavior. If you are the first user to access the interface after a major update, the End 
User License Agreement (EULA) may appear. You must review and accept the EULA to continue.
Step 13
If the intrusion rule update available on the Support site is newer than the rules on your ASA 
FirePOWER module, import the newer rules. Do not auto-apply the imported rules when working with  .
For more information, see the Cisco ASA with FirePOWER Services Local Management Configuration Guide,  
Step 14
If the VDB available on the Support Site is newer than the most recently installed VDB, install the latest 
VDB.
Installing a VDB update causes a short pause in traffic flow and processing, and may also cause a few packets to 
pass uninspected. For more information, see the Cisco ASA with FirePOWER Services Local Management 
Configuration Guide
,  .
Step 15
Redeploy policies.
Deploying an access control policy may cause a short pause in traffic flow and processing, and may also cause a 
few packets to pass uninspected. For more information, see the Cisco ASA with FirePOWER Services Local 
Management Configuration Guide
.