Cisco Cisco Firepower Management Center 2000 Notas de publicación
![Cisco](https://files.manualsbrain.com/attachments/7380d0050044647c30f5c24bbbf5d0c0b6d9bb84/common/fit/150/50/faa183d287233c52228cfea3dbc2a127fe780f60564fcb0955d9c3d1cd23/brand_logo.png)
Firepower System Release Notes
Installing the Update
19
The Install Update page appears.
Step 8
Select the Firepower Management Center and click Install. Confirm that you want to install the update
and reboot the Firepower Management Center.
and reboot the Firepower Management Center.
The update process begins. To view the task status, click the System Status icon, then click on the Tasks tab.
However, after the Firepower Management Center completes its necessary pre-update checks, you are logged
out. When you log back in, the Upgrade Status page appears. The Upgrade Status page displays a progress bar
and provides details about the script currently running.
However, after the Firepower Management Center completes its necessary pre-update checks, you are logged
out. When you log back in, the Upgrade Status page appears. The Upgrade Status page displays a progress bar
and provides details about the script currently running.
If the update fails for any reason, the page displays an error message indicating the time and date of the failure,
which script was running when the update failed, and instructions on how to contact Support. Do not restart the
update.
which script was running when the update failed, and instructions on how to contact Support. Do not restart the
update.
Caution:
If you encounter any other issue with the update (for example, if a manual refresh of the Update
Status page shows no progress for several minutes), do not restart the update. Instead, contact Support.
When the update completes, the Firepower Management Center displays a success message and reboots.
Step 9
After the update finishes, clear your browser cache and force a reload of the browser. Otherwise, the user
interface may exhibit unexpected behavior.
interface may exhibit unexpected behavior.
Step 10
Log into the Firepower Management Center.
Step 11
Review and accept the End User License Agreement (EULA). Note that you are logged out of the
appliance if you do not accept the EULA.
appliance if you do not accept the EULA.
Step 12
Select Help > About and confirm that the software version is listed correctly: Version 6.0.1. Also note
the versions of the intrusion rule update and VDB on the Firepower Management Center; you will need
this information later.
the versions of the intrusion rule update and VDB on the Firepower Management Center; you will need
this information later.
Step 13
Verify that the appliances in your deployment are successfully communicating and that there are no
issues reported by the health monitor.
issues reported by the health monitor.
Step 14
If the rule update available on the Support site is newer than the rules on your Firepower Management
Center, import the newer rules. Do not auto-apply the imported rules at this time.
Center, import the newer rules. Do not auto-apply the imported rules at this time.
For information on rule updates, see the Firepower Management Center Configuration Guide.
Step 15
If the VDB available on the Support site is newer than the VDB on your Firepower Management Center,
install the latest VDB.
install the latest VDB.
Installing a VDB update causes a short pause in traffic flow and processing, and may also cause a few packets to
pass uninspected. For more information, see the Firepower Management Center Configuration Guide.
pass uninspected. For more information, see the Firepower Management Center Configuration Guide.
Step 16
Redeploy your configurations to all managed devices.
Deployment may cause a short pause in traffic flow and processing, and may also cause a few packets to pass
uninspected. For more information, see the Firepower Management Center Configuration Guide.
uninspected. For more information, see the Firepower Management Center Configuration Guide.
Step 17
If a patch for Version 6.0.1 is available on the Support site, apply the latest patch as described in the
Firepower System Release Notes for that version.
Firepower System Release Notes for that version.
Caution:
When you deploy configurations, resource demands may result in a small number of packets
dropping without inspection. Additionally, deploying some configurations requires the Snort process to
restart, which interrupts traffic inspection. Whether traffic drops during this interruption or passes without
further inspection depends on the model of the managed device and how it handles traffic. For more
information, see the Configurations that Restart the Snort Process section of the Firepower Management
Center Configuration Guide.
restart, which interrupts traffic inspection. Whether traffic drops during this interruption or passes without
further inspection depends on the model of the managed device and how it handles traffic. For more
information, see the Configurations that Restart the Snort Process section of the Firepower Management
Center Configuration Guide.
You must update to the latest patch to take advantage of the latest enhancements and security fixes.