Cisco Cisco Firepower Management Center 2000

Pagina di 50
14
FireSIGHT System Release Notes
Installing the Update
Sourcefire_3D_Device_2100-5.4.0-Restore.iso
Sourcefire_3D_Device_2500-5.4.0-Restore.iso
Sourcefire_3D_Device_3500-5.4.0-Restore.iso
Sourcefire_3D_Device_45100-5.4.0-Restore.iso
Sourcefire_3D_Device_6500-5.4.0-Restore.iso
for Series 3 managed devices:
Sourcefire_3D_Device_S3-5.4.0-763-Restore.iso
for virtual managed devices:
Sourcefire_3D_Device_Virtual64_VMWare-5.4.0-763.tar.gz
for ASA FirePOWER modules:
asasfr-sys-5.4.0-763.pkg
for Cisco ASA with FirePOWER Services (ASA5506-X, ASA5506H-X, ASA5506W-X, ASA5508-X, and ASA5516-X):
asasfr-5500X-boot-5.4.1-211.img
asafr-sys-5.4.1-211.pkg
Note
: To install the ASA FirePOWER module Version 5.4.1 image on an ASA device, see the Cisco ASA FirePOWER Module Quick 
Start Guide for more information on deploying and installing the module.
Installing the Update
Before you begin the update, you must thoroughly read and understand these release notes, especially 
.
To update Defense Centers running at least Version 5.4.1 to Version 5.4.1.8, ASA FirePOWER modules (ASA5506-X, ASA5506H-X, 
ASA5506W-X, ASA5508-X, and ASA5516-X) running at least Version 5.4.1 to update Version 5.4.1.8, the ISA3000 must be running at 
least Version 5.4.1.7 to update to Version 5.4.1.8, and managed devices and ASA FirePOWER modules (ASA5512-X, ASA5515-X, 
ASA5525-X, ASA5545-X, ASA5555-X, ASA5585-X-SSP-10, ASA5585-X-SSP-20, ASA5585-X-SSP-40, and ASA5585-X-SSP-60) 
running at least Version 5.4 of the FireSIGHT System to Version 5.4.0.9, see the guidelines and procedures outlined below:
Caution:
 Do not reboot or shut down your appliances during the update until you see the login prompt. The system may appear inactive 
during the pre-checks portion of the update; this is expected behavior and does not require you to reboot or shut down your appliances.
When to Perform the Update
Because the update process may affect traffic inspection, traffic flow, and link state, Cisco strongly recommends you perform the update in 
a maintenance window or at a time when the interruption will have the least impact on your deployment.
Installation Method
Use the Defense Center’s web interface to perform the update. Update the Defense Center first, then use it to update the devices it manages.
Caution: 
If you update a Defense Center from Version 5.4.0 to Version 5.4.1.8, the system re-installs all intrusion rule updates instead of 
the latest intrusion rule update and the update takes much longer than the projected time listed in the 
. To reduce update time, Cisco strongly recommends updating to Version 
5.4.1.2, then updating from Version 5.4.1.2 to Version 5.4.1.8.