Cisco Cisco FirePOWER Appliance 8130 Notas de publicación
Version 5.2.0.2
Sourcefire 3D System Release Notes
8
Updating Your Appliances
applies it to the secondary device, which goes into maintenance mode until any
necessary processes restart and the device is processing traffic again. The
system then applies the update to the primary device, which follows the same
process.
Installing the Update on Stacked Devices
When you install an update on stacked devices, the system performs the updates
simultaneously. Each device resumes normal operation when the update
completes. Note that:
•
If the primary device completes the update before all of the secondary
devices, the stack operates in a limited, mixed-version state until all devices
have completed the update.
•
If the primary device completes the upgrade after all of the secondary
devices, the stack resumes normal operation when the update completes
on the primary device.
Installing the Update on Clustered Stacks
When you install an update on a clustered stack, the system performs the update
one stack at a time. When the update starts, the system first applies it to the
secondary stack, which goes into maintenance mode until any necessary
processes restart and the stack is processing traffic again. The system then
applies the update to the primary stack, which follows the same process.
After the Installation
After you perform the update on either the Defense Center or managed devices,
you must reapply device configuration and access control policies. Applying an
access control policy may cause a short pause in traffic flow and processing, and
may also cause a few packets to pass uninspected. For more information, see the
Sourcefire 3D System User Guide.
There are several additional post-update steps you should take to ensure that
There are several additional post-update steps you should take to ensure that
your deployment is performing properly. These include:
•
verifying that the update succeeded
•
making sure that all appliances in your deployment are communicating
successfully
•
updating your vulnerability database (VDB), if necessary
The next sections include detailed instructions not only on performing the update,
but also on completing any post-update steps. Make sure you complete all of the
listed tasks.