Cisco Cisco Firepower Management Center 2000

Página de 42
9
FireSIGHT System Release Notes
Before You Begin: Important Update and Compatibility Notes
Before You Begin: Important Update and Compatibility Notes
Before you begin the update process for Version 5.4.0.6 and Version 5.4.1.5, you should familiarize yourself with the behavior of the system 
during the update process, as well as with any compatibility issues or required pre- or post-update configuration changes.
Caution:
 Cisco strongly recommends you perform the update in a maintenance window or at a time when the interruption will have the 
least impact on your deployment.
Note:
 If you plan on updating the system to Version 6.0, you must install the FireSIGHT System Version 6.0 Pre-Installation package prior 
to updating the Version 6.0. For more information, see the 
For more information, see the following sections:
Configuration and Event Backup Guidelines
Before you begin the update, Cisco strongly recommends that you delete or move any backup files that reside on your appliance, then back 
up current event and configuration data to an external location.
Use the Defense Center to back up event and configuration data for itself and the devices it manages. For more information on the backup 
and restore feature, see the FireSIGHT System User Guide.
Note: 
The Defense Center purges locally stored backups from previous updates. To retain archived backups, store the backups externally.
Caution:
 BIOS Version 2.0.1b must be running on your DC2000 and DC4000 appliances in order to update to version 5.4.1.1 or later. If 
updating your appliances fails due to an incompatible BIOS version, contact Support. 
Traffic Flow and Inspection During the Update
The update process reboots managed devices. Depending on how your devices are configured and deployed, the following capabilities are 
affected:
traffic inspection, including application awareness and control, URL filtering, Security Intelligence, intrusion detection and prevention, 
and connection logging 
traffic flow, including switching, routing, NAT, VPN, and related functionality
link state
Note that when you update clustered devices, the system performs the update one device at a time to avoid traffic interruption.
Traffic Inspection and Link State
In an inline deployment, your managed devices (depending on model) can affect traffic flow via application control, user control, URL 
filtering, Security Intelligence, and intrusion prevention, as well as switching, routing, NAT, and VPN. For more information on appliance 
capabilities, see the FireSIGHT System Installation Guide.