Cisco Cisco Firepower Management Center 2000

Página de 36
14
FireSIGHT System Release Notes
Installing the Update
Sourcefire_Defense_Center_Virtual64_VMWare-5.4.0-763.tar.gz
for Series 2 managed devices:
Sourcefire_3D_Device_500-5.4.0-Restore.iso
Sourcefire_3D_Device_1000-5.4.0-Restore.iso
Sourcefire_3D_Device_2000-5.4.0-Restore.iso
Sourcefire_3D_Device_2100-5.4.0-Restore.iso
Sourcefire_3D_Device_2500-5.4.0-Restore.iso
Sourcefire_3D_Device_3500-5.4.0-Restore.iso
Sourcefire_3D_Device_45100-5.4.0-Restore.iso
Sourcefire_3D_Device_6500-5.4.0-Restore.iso
for Series 3 managed devices:
Sourcefire_3D_Device_S3-5.4.0-763-Restore.iso
for Cisco NGIPS for Blue Coat X-Series devices:
SF3DSensor-5.4-763.cbi
for ASA FirePOWER modules:
asasfr-sys-5.4.0-763.pkg
for Cisco ASA with FirePOWER Services (ASA5506-X, ASA5506H-X, ASA5506W-X, ASA5508-X, and 
ASA5516-X):
asasfr-5500X-boot-5.4.1-211.img
asafr-sys-5.4.1-211.pkg
Note
: To install the ASA FirePOWER module Version 5.4.1.2 image on Cisco ASA with FirePOWER Services, see the 
Cisco ASA FirePOWER Module Quick Start Guide for more information on deploying and installing the module.
Installing the Update
Before you begin the update, you must thoroughly read and understand these release notes, especially 
To update Defense Centers running at least Version 5.4.1 to Version 5.4.1.2, Cisco ASA with FirePOWER Services 
running at least Version 5.4.1 to Version 5.4.1.2, and managed devices and ASA FirePOWER modules running at least 
Version 5.4 of the FireSIGHT System to Version 5.4.0.3, see the guidelines and procedures outlined below:
Note: 
This update is not supported onvirtual managed devices or Cisco NGIPS for Blue Coat X-Series. 
Caution:
 Do not reboot or shut down your appliances during the update until you see the login prompt. The system may 
appear inactive during the pre-checks portion of the update; this is expected behavior and does not require you to reboot 
or shut down your appliances.
When to Perform the Update
Because the update process may affect traffic inspection, traffic flow, and link state, Cisco strongly recommends you 
perform the update in a maintenance window or at a time when the interruption will have the least impact on your 
deployment.