Asa Upgrade
Asa Upgrade
Americas Headquarters
Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134-1706
USA
http://www.cisco.com
Tel: 408 526-4000
800 553-NETS (6387)
Fax: 408 527-0883
© 2018 Cisco Systems, Inc. All rights reserved.
CONTENTS
CHAPTER 4 Upgrade the Firepower 4100/9300 Chassis Configured with ASA Logical Devices 97
Upgrade FXOS and an ASA Standalone Device or Intra-Chassis Cluster 97
Upgrade FXOS and an ASA Standalone Device or Intra-Chassis Cluster Using Firepower Chassis
Manager 97
Upgrade FXOS and an ASA Standalone Device or Intra-Chassis Cluster Using the FXOS CLI 98
Upgrade FXOS and an ASA Active/Standby Failover Pair 102
Upgrade FXOS and an ASA Active/Standby Failover Pair Using Firepower Chassis Manager 102
Upgrade FXOS and an ASA Active/Standby Failover Pair Using the FXOS CLI 104
Upgrade FXOS and an ASA Active/Active Failover Pair 112
Upgrade FXOS and an ASA Active/Active Failover Pair Using Firepower Chassis Manager 112
Upgrade FXOS and an ASA Active/Active Failover Pair Using the FXOS CLI 115
Upgrade FXOS and an ASA Inter-chassis Cluster 124
Upgrade FXOS and an ASA Inter-chassis Cluster Using Firepower Chassis Manager 124
Upgrade FXOS and an ASA Inter-chassis Cluster Using the FXOS CLI 126
Monitor the Upgrade Progress 131
Verify the Installation 132
1. Current FXOS version (Firepower 4100/9300 Upgrade Path , on page 27): _____________________
2. Check ASA/Firepower 4100 and 9300 compatibility (Firepower 4100/9300 Compatibility with the
ASA or Firepower Threat Defense, on page 12).
Target FXOS version: _____________________
3. Check the upgrade path for FXOS (Firepower 4100/9300 Upgrade Path , on page 27). Are there
intermediate versions required? Yes _____ No _____
If yes, intermediate FXOS versions: ______________________________________________________
Make sure you plan to upgrade the ASA in step with the FXOS upgrades to stay compatible.
Intermediate ASA versions required to stay compatible during the upgrade:
______________________________________________________
4. Download the target and intermediate FXOS version (FXOS for Firepower 4100/9300 Chassis Upgrade
Packages, on page 39).
Download the intermediate ASA versions (Download ASA Software, on page 28).
5. Do you use the Radware DefensePro decorator application? Yes _____ No _____
If yes:
1. Current DefensePro version: _____________________
2. Check ASA/FXOS/DefensePro compatibility (Radware DefensePro Compatibility, on page 15).
Target DefensePro version: _____________________
3. Download the target DefensePro version.
8. Back up your configurations. See the configuration guide for each operating system for backup methods.
Compatibility
This section includes tables showing the compatibility between platforms, operating systems, and applications.
ASA ASA ASA ASAv ASASM ASA on ASA on ASA on ISA 3000
5506-X 5512-X 5585-X Firepower Firepower Firepower
2110 4110 9300
5506H-X 5515-X
2120 4120
5506W-X 5525-X
2130 4140
5508-X 5545-X
2140 4150
5516-X 5555-X
9.10(1) 7.10(1)+ YES YES YES YES YES YES YES YES YES
9.9(2) 7.9(2)+ YES YES YES YES YES YES YES YES YES
9.9(1) 7.9(1)+ YES YES YES YES YES YES YES YES YES
9.8(2) 7.8(2)+ YES YES YES YES YES YES YES YES YES
9.8(1.200) No — — — YES — — — — —
support
9.8(1) 7.8(1)+ YES YES YES YES YES — YES YES YES
(+ASAv50)
9.7(1.4) 7.7(1)+ YES YES YES YES YES — YES YES YES
9.6(4) 7.9(1)+ YES YES YES YES YES — YES YES YES
9.6(3.1) 7.7(1)+ YES YES YES YES YES — YES YES YES
9.6(2) 7.6(2)+ YES YES YES YES YES — YES YES YES
9.6(1) 7.6(1)+ YES YES YES YES YES — YES YES YES
(except
4150)
ASA ASA ASA ASAv ASASM ASA on ASA on ASA on ISA 3000
5506-X 5512-X 5585-X Firepower Firepower Firepower
2110 4110 9300
5506H-X 5515-X
2120 4120
5506W-X 5525-X
2130 4140
5508-X 5545-X
2140 4150
5516-X 5555-X
ASA 5506-X ASA 5512-X ASA 5585-X ASAv ASASM ASA on ISA 3000
Firepower
5506H-X 5515-X
9300
5506W-X 5525-X
5508-X 5545-X
5516-X 5555-X
ASA 5506-X ASA 5512-X ASA 5585-X ASAv ASASM ASA on ISA 3000
Firepower
5506H-X 5515-X
9300
5506W-X 5525-X
5508-X 5545-X
5516-X 5555-X
6.2.3 ASDM ASA 9.10(x) (No YES YES YES YES YES —
7.9(2)+ 5506-X, 5512-X)
ASA 9.9(x)
ASA 9.8(x)
ASA 9.7(x)
ASA 9.6(x)
ASA 9.5(2), 9.5(3) (No
5506-X)
6.2.2 ASDM ASA 9.10(x) (No YES YES YES YES YES —
7.8(2)+ 5506-X, 5512-X)
ASA 9.9(x)
ASA 9.8(x)
ASA 9.7(x)
ASA 9.6(x)
ASA 9.5(2), 9.5(3) (No
5506-X)
6.2.0 ASDM ASA 9.10(x) (No YES YES YES YES YES —
7.7(1)+ 5506-X, 5512-X)
ASA 9.9(x)
ASA 9.8(x)
ASA 9.7(x)
ASA 9.6(x)
ASA 9.5(2), 9.5(3) (No
5506-X)
6.1.0 ASDM ASA 9.10(x) (No YES YES YES YES YES —
7.6(2)+ 5506-X, 5512-X)
ASA 9.9(x)
ASA 9.8(x)
ASA 9.7(x)
ASA 9.6(x)
ASA 9.5(2), 9.5(3) (No
5506-X)
Note For the SSP40/60 combination, you might see an error message that this combination is not supported. You
can ignore the message.
Note that you can patch a device without patching the FMC, and vice versa. However, we always recommend
you upgrade both. This allows you to take advantage of any new features and bug fixes.
This table lists the major FMC versions, and the major versions of devices they can manage. Find your current
major version in the first column, then read across to determine which devices you can manage.
5.3.0 — — — — — — — — — — — Yes
* A device must be running at least Version 5.4.0.2/5.4.1.1 to be managed by a Version 6.0, 6.0.1, or 6.1
FMC.
Note Firepower 2100 series appliances utilize FXOS only as an underlying operating system that is included in the
ASA and Firepower Threat Defense unified image bundles.
8.13.01 2.4(1) 9.10(1) 6.2.3 YES YES (No YES YES YES
ASA support
2.3(1) 9.9(1) 6.2.2
with FXOS
2.3.1)
8.10.01.17-2 2.2(2) 9.8(x) 6.2.2 YES YES (No YES YES YES
ASA
2.2(1) 9.7(1) 6.2.0
support)
2.1(1)
Upgrade Path
For each operating system that you are upgrading, check the supported upgrade path. In some cases, you may
have to install interim upgrades before you can upgrade to your final version.
See the following table for the upgrade path for your version. Some older versions require an intermediate
upgrade before you can upgrade to a newer version. Recommended versions are in bold.
Note The ASA 5506-X series and the ASA 5512-X do not support the ASA FirePOWER module running ASA
9.10(1) with any Firepower version.
Note Upgrading to Version 6.0 requires a preinstallation package. For more information, see FireSIGHT System
Release Notes Version 6.0.0 Preinstallation.
6.2.1 — —
Not supported on this platform.
Note The ASA 5506-X series and the ASA 5512-X do not support the ASA FirePOWER module running ASA
9.10(1) with any Firepower version.
Note Upgrading to Version 6.0 requires a preinstallation package. For more information, see FireSIGHT System
Release Notes Version 6.0.0 Preinstallation.
6.2.1 — —
Not supported on this platform.
Note Upgrading to Version 6.0 and Version 6.0.1 requires a preinstallation package, as does upgrading from Version
6.2.x directly to Version 6.3 on some models.
You might also need to upgrade the application versions for any logical devices that you have installed. Pay
close attention to the supported application versions for each FXOS release (see Firepower 4100/9300
Compatibility with the ASA or Firepower Threat Defense, on page 12). Then perform any necessary interim
upgrades for your logical device.
For example, when upgrading from FXOS 1.1(4) to 2.2(2) with ASA, perform the following upgrades in
order:
1. FXOS: Upgrade from 1.1(4) to 2.0(1).
2. FXOS: Upgrade from 2.0(1) to 2.1(1).
3. ASA: Upgrade from 9.6(1) to 9.7(1).
4. FXOS: Upgrade from 2.1(1) to 2.2(1).
5. FXOS: Upgrade from 2.2(1) to 2.2(2).
6. ASA: Upgrade from 9.7(1) to 9.8(1).
REST API Software The API software file has a filename like
asa-restapi-132-lfbff-k8.SPA. To install the
Choose your model > Adaptive Security Appliance
REST API, see the API quick start guide
REST API Plugin > version.
REST API Software The API software file has a filename like
asa-restapi-132-lfbff-k8.SPA. To install the
Choose your model > Software on Chassis >
REST API, see the API quick start guide
Adaptive Security Appliance REST API Plugin
> version.
ASA Device Package for Cisco Application Policy For APIC 1.2(7) and later, choose either the
Infrastructure Controller (APIC) Policy Orchestration with Fabric Insertion, or
the Fabric Insertion-only package. The device
Choose your model > Software on Chassis > ASA
package software file has a filename like
for Application Centric Infrastructure (ACI)
asa-device-pkg-1.2.7.10.zip. To install the ASA
Device Packages > version.
device package, see the “Importing a Device
Package” chapter of the Cisco APIC Layer 4 to
Layer 7 Services Deployment Guide.
REST API Software The API software file has a filename like
asa-restapi-132-lfbff-k8.SPA. To install the
Choose your model > Software on Chassis >
REST API, see the API quick start guide.
Adaptive Security Appliance REST API Plugin
> version.
ASA Device Package for Cisco Application Policy For APIC 1.2(7) and later, choose either the
Infrastructure Controller (APIC) Policy Orchestration with Fabric Insertion, or
the Fabric Insertion-only package. The device
Choose your model > Software on Chassis > ASA
package software file has a filename like
for Application Centric Infrastructure (ACI)
asa-device-pkg-1.2.7.10.zip. To install the ASA
Device Packages > version.
device package, see the “Importing a Device
Package” chapter of the Cisco APIC Layer 4 to
Layer 7 Services Deployment Guide.
ASAv http://www.cisco.com/go/asav-software
ASA Software (Upgrade) The ASAv upgrade file has a filename like
asa962-smp-k8.bin; use this upgrade file for all
Choose Adaptive Security Appliance (ASA)
supervisors. Note: The .zip (VMware), .vhdx
Software > version.
(Hyper-V), and .qcow2 (KVM) files are only for
initial deployment. Amazon Web Services and
Microsoft Azure provide deployment images
directly.
ASDM Software (Upgrade) The ASDM software file has a filename like
asdm-762.bin.
Choose Adaptive Security Appliance (ASA)
Device Manager > version.
REST API Software The API software file has a filename like
asa-restapi-132-lfbff-k8.SPA. To install the
Choose Adaptive Security Appliance REST API
REST API, see the API quick start guide.
Plugin > version.
ASA Device Package for Cisco Application Policy For APIC 1.2(7) and later, choose either the
Infrastructure Controller (APIC) Policy Orchestration with Fabric Insertion, or
the Fabric Insertion-only package. The device
Choose ASA for Application Centric
package software file has a filename like
Infrastructure (ACI) Device Packages > version.
asa-device-pkg-1.2.7.10.zip. To install the ASA
device package, see the “Importing a Device
Package” chapter of the Cisco APIC Layer 4 to
Layer 7 Services Deployment Guide.
ASA, ASDM, and FXOS Software The ASA package includes ASA, ASDM, and
FXOS software. The ASA package has a
Choose your model > Adaptive Security Appliance
filename like cisco-asa.9.8.2.SPA.csp.
(ASA) Software > version.
REST API Software The API software file has a filename like
asa-restapi-132-lfbff-k8.SPA. To install the
Choose your model > Adaptive Security Appliance
REST API, see the API quick start guide.
REST API Plugin > version.
REST API Software The API software file has a filename like
asa-restapi-132-lfbff-k8.SPA. To install the
Choose Adaptive Security Appliance REST API
REST API, see the API quick start guide.
Plugin > version.
ASA Services Module ASA Software The ASA software file has a filename like
asa962-smp-k8.bin.
http://www.cisco.com/go/asasm-software
Choose your version.
REST API Software The API software file has a filename like
asa-restapi-132-lfbff-k8.SPA. To install the
Choose your model > Adaptive Security Appliance
REST API, see the API quick start guide.
REST API Plugin > version.
This table includes naming conventions and information about ASA FirePOWER software on Cisco.com.
Procedure
Choose your model > Firepower Management Center Software > version.
Patch Cisco_Firepower_Mgmt_Center_Patch-version.sh
Cisco_Firepower_Mgmt_Center_Patch-version.sh.REL.tar
Hotfix Cisco_Firepower_Mgmt_Center_Hotfix_letter-version.sh
Cisco_Firepower_Mgmt_Center_Hotfix_letter-version.sh.REL.tar
Table 12: FMC Upgrade Packages: Upgrading to Version 5.4.x - Version 6.2.3.x
Hotfix Sourcefire_3D_Defense_Center_S3_Hotfix_letter-version.sh
Sourcefire_3D_Defense_Center_S3_Hotfix_letter-version.sh.REL.tar
For more information, see Upgrade High Availability FMCs, on page 93.
Choose your model > Firepower Extensible Operating System > version.
MIBs fxos-mibs-fp9k-fp4k.version.zip
9.9 Guidelines
• ASA 5506-X memory issues with large configurations on 9.9(2) and later—If you upgrade to 9.9(2) or
later, parts of a very large configuration might be rejected due to insufficient memory with the following
message: "ERROR: Insufficient memory to install the rules". One option is to enter the
object-group-search access-control command to improve memory usage for ACLs; your performance
might be impacted, however. Alternatively, you can downgrade to 9.9(1).
9.8 Guidelines
• Do not upgrade to 9.8(1) for ASAv on Amazon Web Services--Due to CSCve56153, you should not
upgrade to 9.8(1). After upgrading, the ASAv becomes unreachable. Upgrade to 9.8(1.5) or later instead.
9.7 Guidelines
• Upgrade issue with 9.7(1) to 9.7(1.x) and later for VTI and VXLAN VNI—If you configure both Virtual
Tunnel Interfaces (VTIs) and VXLAN Virtual Network Identifier (VNI) interfaces, then you cannot
perform a zero downtime upgrade for failover; connections on these interface types will not replicate to
the standby unit until both units are on the same version. (CSCvc83062)
9.6 Guidelines
• (ASA 9.6(2) through 9.7(x)) Upgrade impact when using SSH public key authentication—Due to updates
to SSH authentication, additional configuration is required to enable SSH public key authentication; as
a result, existing SSH configurations using public key authentication no longer work after upgrading.
Public key authentication is the default for the ASAv on Amazon Web Services (AWS), so AWS users
will see this issue. To avoid loss of SSH connectivity, you can update your configuration before you
upgrade. Or you can use ASDM after you upgrade (if you enabled ASDM access) to fix the configuration.
To use the ssh authentication command, before you upgrade, enter the following commands:
We recommend setting a password for the username as opposed to keeping the nopassword keyword,
if present. The nopassword keyword means that any password can be entered, not that no password can
be entered. Prior to 9.6(2), the aaa command was not required for SSH public key authentication, so the
nopassword keyword was not triggered. Now that the aaa command is required, it automatically also
allows regular password authentication for a username if the password (or nopassword) keyword is
present.
After you upgrade, the username command no longer requires the password or nopassword keyword;
you can require that a user cannot enter a password. Therefore, to force public key authentication only,
re-enter the username command:
• Upgrade impact when upgrading the ASA on the Firepower 9300— Due to license entitlement naming
changes on the back-end, when you upgrade to ASA 9.6(1)/FXOS 1.1(4), the startup configuration may
not parse correctly upon the initial reload; configuration that corresponds to add-on entitlements is
rejected.
For a standalone ASA, after the unit reloads with the new version, wait until all the entitlements are
processed and are in an "Authorized" state (show license all or Monitoring > Properties > Smart
License), and simply reload again (reload or Tools > System Reload) without saving the configuration.
After the reload, the startup configuration will be parsed correctly.
For a failover pair if you have any add-on entitlements, follow the upgrade procedure in the FXOS release
notes, but reset failover after you reload each unit (failover reset or Monitoring > Properties > Failover
> Status, Monitoring > Failover > System, or Monitoring > Failover > Failover Group, and then
click Reset Failover).
For a cluster, follow the upgrade procedure in the FXOS release notes; no additional action is required.
If a value less than 456,384,512 is returned for “Max memory footprint,” then the failure condition
is present, and you must complete the remaining steps before you upgrade. If the memory shown is
456,384,512 or greater, then you can skip the rest of this procedure and upgrade as normal.
2. Enter global configuration mode:
WARNING: The certificate provided by the auto-update servers will not be verified. In order
to verify this certificate please use the verify-certificate option.
CLI:
ciscoasa(config)# privilege cmd level 5 mode exec command more
not in use are removed. If the IPv6 ACL is in use for another feature, it is migrated to an extended
ACL of the same name.
• ACL Any Keyword Migration—Now that ACLs support both IPv4 and IPv6, the any keyword now
represents “all IPv4 and IPv6 traffic.” Any existing ACLs that use the any keyword will be changed to
use the any4 keyword, which denotes “all IPv4 traffic.”
In addition, a separate keyword was introduced to designate “all IPv6 traffic”: any6.
The any4 and any6 keywords are not available for all commands that use the any keyword. For example,
the NAT feature uses only the any keyword; any represents IPv4 traffic or IPv6 traffic depending on the
context within the specific NAT command.
• Static NAT-with-port-translation Requirement Before Upgrading—In Version 9.0 and later, static
NAT-with-port-translation rules limit access to the destination IP address for the specified port only. If
you try to access the destination IP address on a different port not covered by a NAT rule, then the
connection is blocked. This behavior is also true for Twice NAT. Moreover, traffic that does not match
the source IP address of the Twice NAT rule will be dropped if it matches the destination IP address,
regardless of the destination port. Therefore, before you upgrade, you must add additional rules for all
other traffic allowed to the destination IP address.
For example, you have the following Object NAT rule to translate HTTP traffic to the inside server
between port 80 and port 8080:
If you want any other services to reach the server, such as FTP, then you must explicitly allow them:
Or, to allow traffic to other ports of the server, you can add a general static NAT rule that will match all
other ports:
For Twice NAT, you have the following rule to allow HTTP traffic from 192.168.1.0/24 to the inside
server and translate between port 80 and port 8080:
If you want the outside hosts to reach another service on the inside server, add another NAT rule for the
service, for example FTP:
If you want other source addresses to reach the inside server on any other ports, you can add another
NAT rule for that specific IP address or for any source IP address. Make sure the general rule is ordered
after the specific rule.
Note Note In 8.3 and earlier, as an unsupported configuration, you could configure a
management interface without an IP address, and you could access the interface
using the device management address. In 8.4, the device management address is
assigned to the BVI, and the management interface is no longer accessible using
that IP address; the management interface requires its own IP address.
• When upgrading to 8.4(2) from 8.3(1), 8.3(2), and 8.4(1), all identity NAT configurations will now
include the no-proxy-arp and route-lookup keywords, to maintain existing functionality. The
unidirectional keyword is removed.
Clustering Guidelines
There are no special requirements for Zero Downtime Upgrades for ASA clustering with the following
exceptions.
Note Zero Downtime Downgrades are not officially supported with clustering.
• Firepower 4100/9300 Cluster Upgrade to FXOS 2.3/ASA 9.9(2)—Slaves on ASA 9.8 and earlier cannot
rejoin a cluster where the master unit is on FXOS 2.3/9.9(2) or later; they will join after you upgrade the
ASA version to 9.9(2)+ [CSCvi54844].
• Distributed Site-to-Site VPN—Distributed Site-to-Site VPN sessions on a failed unit require up to 30
minutes to stabilize on other units. During this time, additional unit failures might result in lost sessions.
Therefore, during a cluster upgrade, to avoid traffic loss, follow these steps. Refer to the FXOS/ASA
cluster upgrade procedure so you can integrate these steps into your upgrade task.
Note Zero Downtime Upgrade is not supported with Distributed Site-to-Site VPN when
upgrading from 9.9(1) to 9.9(2) or later. In 9.9(2), due to Active Session
Redistribution enhancements, you cannot run some units on 9.9(2) and other units
on 9.9(1).
1. On the chassis without the master unit, disable clustering on one module using the ASA console.
cluster group name
no enable
If you are upgrading FXOS on the chassis as well as ASA, save the configuration so clustering will
be disabled after the chassis reboots:
write memory
2. Wait for the cluster to stabilize; verify all backup sessions have been created.
show cluster vpn-sessiondb summary
3. Repeat steps 1 and 2 for each module on this chassis.
4. Upgrade FXOS on the chassis using the FXOS CLI or Firepower Chassis Manager.
5. After the chassis comes online, update the ASA image on each module using the FXOS CLI or
Firepower Chassis Manager.
6. After the modules come online, re-enable clustering on each module at the ASA console.
cluster group name
enable
write memory
7. Repeat steps 1 through 6 on the second chassis, being sure to disable clustering on the slave units
first, and then finally the master unit.
A new master unit will be chosen from the upgraded chassis.
8. After the cluster has stabilized, redistribute active sessions among all modules in the cluster using
the ASA console on the master unit.
cluster redistribute vpn-sessiondb
• Upgrade issue for 9.9(1) and later with clustering—9.9(1) and later includes an improvement in the
backup distribution. You should perform your upgrade to 9.9(1) or later as follows to take advantage of
the new backup distribution method; otherwise upgraded units will continue to use the old method.
1. Remove all secondary units from the cluster (so the cluster consists only of the primary unit).
2. Upgrade 1 secondary unit, and rejoin the cluster.
3. Disable clustering on the primary unit; upgrade it, and rejoin the cluster.
4. Upgrade the remaining secondary units, and join them back to the cluster, one at a time.
• Firepower 4100/9300 Cluster Upgrade to ASA 9.8(1) and earlier—When you disable clustering on a
slave unit (no enable), which is part of the upgrade process, traffic directed to that unit can drop for up
to three seconds before traffic is redirected to a new owner [CSCvc85008].
• Zero Downtime Upgrade may not be supported when upgrading to the following releases with the fix
for CSCvb24585. This fix moved 3DES from the default (medium) SSL ciphers to the low cipher set. If
you set a custom cipher that only includes 3DES, then you may have a mismatch if the other side of the
connection uses the default (medium) ciphers that no longer include 3DES.
• 9.1(7.12)
• 9.2(4.18)
• 9.4(3.12)
• 9.4(4)
• 9.5(3.2)
• 9.6(2.4)
• 9.6(3)
• 9.7(1)
• 9.8(1)
• Upgrade issues for fully-qualified domain name (FQDN) ACLs—Due to CSCuv92371, ACLs containing
FQDNs might result in incomplete ACL replication to secondary units in a cluster or failover pair. This
bug is present in 9.1(7), 9.5(2), 9.6(1), and some interim releases. We suggest that you upgrade to a
version that includes the fix for CSCuy34265: 9.1(7.6) or later, 9.5(3) or later, 9.6(2) or later. However,
due to the nature of configuration replication, zero downtime upgrade is not available. See CSCuy34265
for more information about different methods of upgrading.
• Firepower Threat Defense Version 6.1.0 clusters do not support inter-site clustering (you can configure
inter-site features using FlexConfig starting in 6.2.0). If you deployed or re-deployed a 6.1.0 cluster in
FXOS 2.1.1, and you entered a value for the (unsupported) site ID, then you must remove the site ID
(set it to 0) on each unit in FXOS before you upgrade to 6.2.3. Otherwise, the units will not be able to
rejoin the cluster after the upgrade. If you already upgraded, change the site ID to 0 on each unit to resolve
the issue. See the FXOS configuration guide to view or change the site ID
• Upgrade to 9.5(2) or later (CSCuv82933)—Before you upgrade the master unit, if you enter show cluster
info, the upgraded slave units show as “DEPUTY_BULK_SYNC”; other mismatched states are also
shown. You can ignore this display; the status will show correctly when you upgrade all units.
• Upgrade from 9.0(1) or 9.1(1) (CSCue72961)—Zero Downtime Upgrade is not supported.
Failover Guidelines
There are no special requirements for Zero Downtime Upgrades for failover with the following exceptions:
• Upgrade issues with 8.4(6), 9.0(2) , and 9.1(2)—Due to CSCug88962, you cannot perform a Zero
Downtime Upgrade to 8.4(6), 9.0(2), or 9.1(3). You should instead upgrade to 8.4(5) or 9.0(3). To upgrade
9.1(1), you cannot upgrade directly to the 9.1(3) release due to CSCuh25271, so there is no workaround
for a Zero Downtime Upgrade; you must upgrade to 9.1(2) before you upgrade to 9.1(3) or later.
• Upgrade issues for fully-qualified domain name (FQDN) ACLs—Due to CSCuv92371, ACLs containing
FQDNs might result in incomplete ACL replication to secondary units in a cluster or failover pair. This
bug is present in 9.1(7), 9.5(2), 9.6(1), and some interim releases. We suggest that you upgrade to a
version that includes the fix for CSCuy34265: 9.1(7.6) or later, 9.5(3) or later, 9.6(2) or later. However,
due to the nature of configuration replication, zero downtime upgrade is not available. See CSCuy34265
for more information about different methods of upgrading.
• Upgrade issue with 9.7(1) to 9.7(1.x) and later for VTI and VXLAN VNI—If you configure both Virtual
Tunnel Interfaces (VTIs) and VXLAN Virtual Network Identifier (VNI) interfaces, then you cannot
perform a zero downtime upgrade for failover; connections on these interface types will not replicate to
the standby unit until both units are on the same version. (CSCvc83062)
Additional Guidelines
• Cisco ASA Clientless SSL VPN Portal Customization Integrity Vulnerability—Multiple vulnerabilities
have been fixed for clientless SSL VPN in ASA software, so you should upgrade your software to a fixed
version. See http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20141008-asa
for details about the vulnerability and a list of fixed ASA versions. Also, if you ever ran an earlier ASA
version that had a vulnerable configuration, then regardless of the version you are currently running, you
should verify that the portal customization was not compromised. If an attacker compromised a
customization object in the past, then the compromised object stays persistent after you upgrade the ASA
to a fixed version. Upgrading the ASA prevents this vulnerability from being exploited further, but it
will not modify any customization objects that were already compromised and are still present on the
system.
Procedure
Step 1 In privileged EXEC mode, copy the ASA software to flash memory.
copy ftp://[[user[:password]@]server[/path]/asa_image_name diskn:/[path/]asa_image_name
Example:
Step 5 Remove any existing boot image configurations so that you can enter the new boot image as your first choice:
no boot system diskn:/[path/]asa_image_name
Example:
Step 6 Set the ASA image to boot (the one you just uploaded):
boot system diskn:/[path/]asa_image_name
Repeat this command for any backup images that you want to use in case this image is unavailable. For
example, you can re-enter the images that you previously removed.
Example:
Step 7 Set the ASDM image to use (the one you just uploaded):
asdm image diskn:/[path/]asdm_image_name
You can only configure one ASDM image to use, so you do not need to first remove the existing configuration.
Example:
Step 10 If you are upgrading the ASA FirePOWER module, disable the ASA REST API or else the upgrade will fail.
no rest-api agent
You can reenable it after the upgrade:
rest-api agent
Note The ASA 5506-X series does not support the ASA REST API if you are running the FirePOWER
module Version 6.0 or later.
Procedure
Step 1 In the main ASDM application window, choose Tools > Upgrade Software from Local Computer.
The Upgrade Software dialog box appears.
Step 6 You are prompted to set this image as the ASDM image. Click Yes.
Step 7 You are reminded to exit ASDM and save the configuration. Click OK.
You exit the Upgrade tool. Note: You will save the configuration and exit and reconnect to ASDM after you
upgrade the ASA software.
Step 8 Repeat these steps, choosing ASA from the Image to Upload drop-down list. You can also use this procedure
to upload other file types.
Step 9 Choose Tools > System Reload to reload the ASA.
A new window appears that asks you to verify the details of the reload.
a) Click the Save the running configuration at the time of reload radio button (the default).
b) Choose a time to reload (for example, Now, the default).
c) Click Schedule Reload.
Once the reload is in progress, a Reload Status window appears that indicates that a reload is being performed.
An option to exit ASDM is also provided.
Step 11 If you are upgrading an ASA FirePOWER module, disable the ASA REST API by choosing Tools > Command
Line Interface, and entering no rest-api agent.
If you do not disable the REST API, the ASA FirePOWER module upgrade will fail. You can reenable it after
the upgrade:
rest-api agent
Note The ASA 5506-X series does not support the ASA REST API if you are running the FirePOWER
module Version 6.0 or later.
Note ASDM downloads the latest image version, which includes the build number.
For example, if you are downloading 9.9(1), the download might be 9.9(1.2).
This behavior is expected, so you can proceed with the planned upgrade.
Procedure
Step 2 Enter your Cisco.com username and password, and then click Login.
The Cisco.com Upgrade Wizard appears.
Note If there is no upgrade available, a dialog box appears. Click OK to exit the wizard.
Step 4 To upgrade the ASA version and ASDM version, perform the following steps:
a) In the ASA area, check the Upgrade to check box, and then choose an ASA version to which you want
to upgrade from the drop-down list.
b) In the ASDM area, check the Upgrade to check box, and then choose an ASDM version to which you
want to upgrade from the drop-down list.
Step 5 Click Next to display the Review Changes screen.
Step 6 Verify the following items:
• The ASA image file and/or ASDM image file that you have downloaded are the correct ones.
• The ASA image file and/or ASDM image file that you want to upload are the correct ones.
• The correct ASA boot image has been selected.
Step 8 If the upgrade installation succeeded, for the upgrade versions to take effect, check the Save configuration
and reload device now check box to restart the ASA, and restart ASDM.
Step 9 Click Finish to exit the wizard and save the configuration changes that you have made.
Note To upgrade to the next higher version, if any, you must restart the wizard.
Step 11 If you are upgrading an ASA FirePOWER module, disable the ASA REST API by choosing Tools > Command
Line Interface, and entering no rest-api agent.
If you do not disable the REST API, the ASA FirePOWER module upgrade will fail. You can reenable it after
the upgrade:
rest-api agent
Note The ASA 5506-X series does not support the ASA REST API if you are running the FirePOWER
module Version 6.0 or later.
Procedure
Step 1 On the active unit in privileged EXEC mode, copy the ASA software to the active unit flash memory:
copy ftp://[[user[:password]@]server[/path]/asa_image_name diskn:/[path/]asa_image_name
Example:
Step 2 Copy the software to the standby unit; be sure to specify the same path as for the active unit:
failover exec mate copy /noconfirm ftp://[[user[:password]@]server[/path]/asa_image_name
diskn:/[path/]asa_image_name
Example:
Step 3 Copy the ASDM image to the active unit flash memory:
copy ftp://[[user[:password]@]server[/path]/asdm_image_name diskn:/[path/]asdm_image_name
Example:
Step 4 Copy the ASDM image to the standby unit; be sure to specify the same path as for the active unit:
failover exec mate copy /noconfirm ftp://[[user[:password]@]server[/path]/asdm_image_name
diskn:/[path/]asdm_image_name
Example:
Step 5 If you are not already in global configuration mode, access global configuration mode:
configure terminal
The ASA uses the images in the order listed; if the first image is unavailable, the next image is used, and so
on. You cannot insert a new image URL at the top of the list; to specify the new image to be first, you must
remove any existing entries, and enter the image URLs in the order desired, according to the next steps.
Step 7 Remove any existing boot image configurations so that you can enter the new boot image as your first choice:
no boot system diskn:/[path/]asa_image_name
Example:
Step 8 Set the ASA image to boot (the one you just uploaded):
boot system diskn:/[path/]asa_image_name
Example:
Repeat this command for any backup images that you want to use in case this image is unavailable. For
example, you can re-enter the images that you previously removed.
Step 9 Set the ASDM image to use (the one you just uploaded):
asdm image diskn:/[path/]asdm_image_name
Example:
You can only configure one ASDM image to use, so you do not need to first remove the existing configuration.
Step 11 If you are upgrading ASA FirePOWER modules, disable the ASA REST API or else the upgrade will fail.
no rest-api agent
Step 14 Force the active unit to fail over to the standby unit.
no failover active
If you are disconnected from your SSH session, reconnect to the main IP address, now on the new active/former
standby unit.
Step 15 Upgrade the ASA FirePOWER module on the former active unit.
For an ASA FirePOWER module managed by ASDM, connect ASDM to the standby management IP address.
Wait for the upgrade to complete.
Step 16 From the new active unit, reload the former active unit (now the new standby unit).
failover reload-standby
Example:
Note If you are connected to the former active unit console port, you should instead enter the reload
command to reload the former active unit.
Procedure
Step 1 Launch ASDM on the standby unit by connecting to the standby IP address.
Step 2 In the main ASDM application window, choose Tools > Upgrade Software from Local Computer.
The Upgrade Software dialog box appears.
Step 7 Repeat these steps, choosing ASA from the Image to Upload drop-down list.
When you are prompted to set this image as the ASA image, click No. You exit the Upgrade tool.
Step 8 Connect ASDM to the active unit by connecting to the main IP address, and upload the ASDM software,
using the same file location you used on the standby unit.
Step 9 When you are prompted to set the image as the ASDM image, click Yes.
You are reminded to exit ASDM and save the configuration. Click OK. You exit the Upgrade tool. Note:
You will save the configuration and reload ASDM after you upgrade the ASA software.
Step 10 Upload the ASA software, using the same file location you used for the standby unit.
Step 11 When you are prompted to set the image as the ASA image, click Yes.
You are reminded to reload the ASA to use the new image. Click OK. You exit the Upgrade tool.
Step 12 Click the Save icon on the toolbar to save your configuration changes.
These configuration changes are automatically saved on the standby unit.
Step 13 If you are upgrading ASA FirePOWER modules, disable the ASA REST API by choosing Tools > Command
Line Interface, and entering no rest-api enable.
If you do not disable the REST API, the ASA FirePOWER module upgrade will fail.
Step 15 Reload the standby unit by choosing Monitoring > Properties > Failover > Status, and clicking Reload
Standby.
Stay on the System pane to monitor when the standby unit reloads.
Step 16 After the standby unit reloads, force the active unit to fail over to the standby unit by choosing Monitoring
> Properties > Failover > Status, and clicking Make Standby.
ASDM will automatically reconnect to the new active unit.
Step 17 Upgrade the ASA FirePOWER module on the former active unit.
For an ASA FirePOWER module managed by ASDM, connect ASDM to the standby management IP address.
Wait for the upgrade to complete, and then connect ASDM back to the active unit.
Step 18 Reload the (new) standby unit by choosing Monitoring > Properties > Failover > Status, and clicking
Reload Standby.
Procedure
Step 1 On the primary unit in privileged EXEC mode, copy the ASA software to flash memory:
copy ftp://[[user[:password]@]server[/path]/asa_image_name diskn:/[path/]asa_image_name
Example:
Step 2 Copy the software to the secondary unit; be sure to specify the same path as for the primary unit:
failover exec mate copy /noconfirm ftp://[[user[:password]@]server[/path]/asa_image_name
diskn:/[path/]asa_image_name
Example:
Step 3 Copy the ASDM image to the primary unit flash memory:
copy ftp://[[user[:password]@]server[/path]/asdm_image_name diskn:/[path/]asdm_image_name
Example:
Step 4 Copy the ASDM image to the secondary unit; be sure to specify the same path as for the primary unit:
failover exec mate copy /noconfirm ftp://[[user[:password]@]server[/path]/asdm_image_name
diskn:/[path/]asdm_image_name
Example:
Step 5 If you are not already in global configuration mode, access global configuration mode:
configure terminal
The ASA uses the images in the order listed; if the first image is unavailable, the next image is used, and so
on. You cannot insert a new image URL at the top of the list; to specify the new image to be first, you must
remove any existing entries, and enter the image URLs in the order desired, according to the next steps.
Step 7 Remove any existing boot image configurations so that you can enter the new boot image as your first choice:
no boot system diskn:/[path/]asa_image_name
Example:
Step 8 Set the ASA image to boot (the one you just uploaded):
boot system diskn:/[path/]asa_image_name
Example:
Repeat this command for any backup images that you want to use in case this image is unavailable. For
example, you can re-enter the images that you previously removed.
Step 9 Set the ASDM image to use (the one you just uploaded):
asdm image diskn:/[path/]asdm_image_name
Example:
You can only configure one ASDM image to use, so you do not need to first remove the existing configuration.
Step 11 If you are upgrading ASA FirePOWER modules, disable the ASA REST API or else the upgrade will fail.
no rest-api agent
Step 15 Force both failover groups to become active on the secondary unit:
no failover active group 1
no failover active group 2
Example:
If you are disconnected from your SSH session, reconnect to the failover group 1 IP address, now on the
secondary unit.
For an ASA FirePOWER module managed by ASDM, connect ASDM to the failover group 1 or 2 standby
management IP address. Wait for the upgrade to complete.
Note If you are connected to the primary unit console port, you should instead enter the reload command
to reload the primary unit.
Step 18 If the failover groups are configured with the preempt command, they automatically become active on their
designated unit after the preempt delay has passed.
Procedure
Step 1 Launch ASDM on the secondary unit by connecting to the management address in failover group 2.
Step 2 In the main ASDM application window, choose Tools > Upgrade Software from Local Computer.
The Upgrade Software dialog box appears.
Step 7 Repeat these steps, choosing ASA from the Image to Upload drop-down list.
When you are prompted to set this image as the ASA image, click No. You exit the Upgrade tool.
Step 8 Connect ASDM to the primary unit by connecting to the management IP address in failover group 1, and
upload the ASDM software, using the same file location you used on the secondary unit.
Step 9 When you are prompted to set the image as the ASDM image, click Yes.
You are reminded to exit ASDM and save the configuration. Click OK. You exit the Upgrade tool. Note:
You will save the configuration and reload ASDM after you upgrade the ASA software.
Step 10 Upload the ASA software, using the same file location you used for the secondary unit.
Step 11 When you are prompted to set the image as the ASA image, click Yes.
You are reminded to reload the ASA to use the new image. Click OK. You exit the Upgrade tool.
Step 12 Click the Save icon on the toolbar to save your configuration changes.
These configuration changes are automatically saved on the secondary unit.
Step 13 If you are upgrading ASA FirePOWER modules, disable the ASA REST API by choosing Tools > Command
Line Interface, and entering no rest-api enable.
If you do not disable the REST API, the ASA FirePOWER module upgrade will fail.
Step 14 Make both failover groups active on the primary unit by choosing Monitoring > Failover > Failover
Group #, where # is the number of the failover group you want to move to the primary unit, and clicking
Make Active.
Step 15 Upgrade the ASA FirePOWER module on the secondary unit.
For an ASA FirePOWER module managed by ASDM, connect ASDM to the failover group 1 or 2 standby
management IP address. Wait for the upgrade to complete, and then connect ASDM back to the primary unit.
Step 16 Reload the secondary unit by choosing Monitoring > Failover > System, and clicking Reload Standby.
Stay on the System pane to monitor when the secondary unit reloads.
Step 17 After the secondary unit comes up, make both failover groups active on the secondary unit by choosing
Monitoring > Failover > Failover Group #, where # is the number of the failover group you want to move
to the secondary unit, and clicking Make Standby.
ASDM will automatically reconnect to the failover group 1 IP address on the secondary unit.
Step 19 Reload the primary unit by choosing Monitoring > Failover > System, and clicking Reload Standby.
Step 20 If the failover groups are configured with Preempt Enabled, they automatically become active on their
designated unit after the preempt delay has passed. ASDM will automatically reconnect to the failover group
1 IP address on the primary unit.
Procedure
Step 1 On the master unit in privileged EXEC mode, copy the ASA software to all units in the cluster.
cluster exec copy /noconfirm ftp://[[user[:password]@]server[/path]/asa_image_name
diskn:/[path/]asa_image_name
Example:
Step 3 If you are not already in global configuration mode, access it now.
configure terminal
Example:
The ASA uses the images in the order listed; if the first image is unavailable, the next image is used, and so
on. You cannot insert a new image URL at the top of the list; to specify the new image to be first, you must
remove any existing entries, and enter the image URLs in the order desired, according to the next steps.
Step 5 Remove any existing boot image configurations so that you can enter the new boot image as your first choice:
no boot system diskn:/[path/]asa_image_name
Example:
Step 6 Set the ASA image to boot (the one you just uploaded):
boot system diskn:/[path/]asa_image_name
Example:
Repeat this command for any backup images that you want to use in case this image is unavailable. For
example, you can re-enter the images that you previously removed.
Step 7 Set the ASDM image to use (the one you just uploaded):
asdm image diskn:/[path/]asdm_image_name
Example:
You can only configure one ASDM image to use, so you do not need to first remove the existing configuration.
Step 9 If you are upgrading ASA FirePOWER modules, disable the ASA REST API or else the ASA FirePOWER
module upgrade will fail.
no rest-api agent
Step 10 If you are upgrading ASA FirePOWER modules that are managed by ASDM, you will need to connect ASDM
to the individual management IP addresses, so you need to note the IP addresses for each unit.
show running-config interface management_interface_id
Note the cluster-pool poolname used.
show ip[v6] local pool poolname
Note the cluster unit IP addresses.
Example:
If you also have ASA FirePOWER module upgrades (using the slave Console):
a) Connect to the console port of a slave unit, and enter global configuration mode.
enable
configure terminal
Example:
asa/unit2/slave> enable
Password:
asa/unit2/slave# configure terminal
asa/unit2/slave(config)#
b) Disable clustering.
cluster group name
no enable
Do not save this configuration; you want clustering to be enabled when you reload. You need to disable
clustering to avoid multiple failures and rejoins during the upgrade process; this unit should only rejoin
after all of the upgrading and reloading is complete.
Example:
Note Some older versions of ASDM do not support disabling the cluster on this screen; in this case,
use the Tools > Command Line Interface tool, click the Multiple Line radio button, and
enter cluster group name and no enable. You can view the cluster group name in the Home >
Device Dashboard > Device Information > ASA Cluster area.
d) Click Apply.
e) You are prompted to exit ASDM. Reconnect ASDM to the same IP address.
f) Upgrade the ASA FirePOWER module.
Wait for the upgrade to complete.
g) In ASDM, choose Tools > System Reload.
h) Click the Reload without saving the running configuration radio button.
You do not want to save the configuration; when this unit reloads, you want clustering to be enabled
on it.
i) Click Schedule Reload.
j) Click Yes to continue the reload.
k) Repeat for each slave unit.
To avoid connection loss and allow traffic to stabilize, wait for each unit to come back up and rejoin
the cluster (approximately 5 minutes) before repeating these steps for the next unit. To view when a
unit rejoins the cluster, see the Monitoring > ASA Cluster > Cluster Summary pane on the master
unit.
Procedure
Step 1 Launch ASDM on the master unit by connecting to the main cluster IP address.
This IP address always stays with the master unit.
Step 2 In the main ASDM application window, choose Tools > Upgrade Software from Local Computer.
The Upgrade Software from Local Computer dialog box appears.
Step 7 Click Upload Image. The uploading process might take a few minutes.
Step 8 You are prompted to set this image as the ASDM image. Click Yes.
Step 9 You are reminded to exit ASDM and save the configuration. Click OK.
You exit the Upgrade tool. Note: You will save the configuration and reload ASDM after you upgrade the
ASA software.
Step 10 Repeat these steps, choosing ASA from the Image to Upload drop-down list.
Step 11 Click the Save icon on the toolbar to save your configuration changes.
These configuration changes are automatically saved on the slave units.
Step 12 Take note of the individual management IP addresses for each unit on Configuration > Device Management
> High Availability and Scalability > ASA Cluster > Cluster Members so that you can connect ASDM
directly to slave units later.
Step 13 If you are upgrading ASA FirePOWER modules, disable the ASA REST API by choosing Tools > Command
Line Interface, and entering no rest-api enable.
If you do not disable the REST API, the ASA FirePOWER module upgrade will fail.
To avoid connection loss and allow traffic to stabilize, wait for each unit to come back up and rejoin
the cluster (approximately 5 minutes) before repeating these steps for the next unit. To view when a
unit rejoins the cluster, see the Monitoring > ASA Cluster > Cluster Summary pane.
Procedure
Step 6 Click the Upgrade icon to the right of the new package.
Step 7 Click Yes to confirm that you want to proceed with installation.
There is no indicator that the new package is being loaded. You will still see the Firepower Chassis Manager
at the beginning of the upgrade process. When the system reboots, you will be logged out. You must wait for
the system to come back up before you can log in to the Firepower Chassis Manager. The reboot process takes
approximately 20 minutes. After the reboot, you will see the login screen.
Procedure
Step 1 Connect to the FXOS CLI, either the console port (preferred) or using SSH.
Step 2 Download the package to the chassis.
a) Enter firmware mode.
scope firmware
Example:
• tftp://server[:port]/[path/]image_name
Example:
Download task:
File Name Protocol Server Port Userid State
--------- -------- --------------- ---------- --------------- -----
cisco-asa-fp2k.9.8.2.SPA
Tftp 10.88.29.181 0 Downloaded
cisco-asa-fp2k.9.8.2.2.SPA
Tftp 10.88.29.181 0 Downloading
firepower-2110 /firmware #
Step 3 When the new package finishes downloading (Downloaded state), boot the package.
a) View the version number of the new package.
show package
Example:
The system is currently installed with security software package 9.8.2, which has:
- The platform version: 2.2.2.52
- The CSP (asa) version: 9.8.2
If you proceed with the upgrade 9.8.2.2, it will do the following:
- upgrade to the CSP asa version 9.8.2.2
Attention:
If you proceed the system will be re-imaged. All existing configuration will be lost,
Note Ignore the message, "All existing configuration will be lost, and the default configuration
applied." The configuration will not be erased, and the default configuration is not applied. The
default configuration is only applied during a reimage, not an upgrade.
firepower-2110#
Cisco ASA: CMD=-install, CSP-ID=cisco-asa.9.8.2.2__asa_001_JAD20280BW90MEZR11, FLAG=''
Verifying signature for cisco-asa.9.8.2.2 ...
Verifying signature for cisco-asa.9.8.2.2 ... success
Procedure
Step 2 Make the unit that you just upgraded the active unit so that traffic flows to the upgraded unit.
a) Launch ASDM on the standby unit by connecting to the standby ASA IP address.
b) Force the standby unit to become active by choosing Monitoring > Properties > Failover > Status,
and clicking Make Active.
Step 3 Upgrade the former active unit.
a) Connect to the Firepower Chassis Manager on the former active unit.
b) Choose System > Updates.
The Available Updates area shows a list of the packages available on the chassis.
c) Click Upload Image to upload the new package from your management computer.
d) Click Choose File to navigate to and select the package that you want to upload.
e) Click Upload.
The selected package is uploaded to the chassis. The Upload Image dialog box shows the upload status.
Wait for the Success dialog box, and click OK. After completing the upload, the integrity of the image
is automatically verified.
f) Click the Upgrade icon to the right of the new package.
g) Click Yes to confirm that you want to proceed with installation.
There is no indicator that the new package is being loaded. You will still see the Firepower Chassis
Manager at the beginning of the upgrade process. When the system reboots, you will be logged out. You
must wait for the system to come back up before you can log in to the Firepower Chassis Manager. The
reboot process takes approximately 20 minutes. After the reboot, you will see the login screen.
Procedure
Example:
Example:
Download task:
File Name Protocol Server Port Userid State
--------- -------- --------------- ---------- --------------- -----
cisco-asa-fp2k.9.8.2.SPA
Tftp 10.88.29.181 0 Downloaded
cisco-asa-fp2k.9.8.2.2.SPA
Tftp 10.88.29.181 0 Downloading
2110-sec /firmware #
e) When the new package finishes downloading (Downloaded state), boot the package. View the version
number of the new package.
show package
Example:
The system is currently installed with security software package 9.8.2, which has:
- The platform version: 2.2.2.52
- The CSP (asa) version: 9.8.2
If you proceed with the upgrade 9.8.2.2, it will do the following:
- upgrade to the CSP asa version 9.8.2.2
Attention:
If you proceed the system will be re-imaged. All existing configuration will be lost,
Note Ignore the message, "All existing configuration will be lost, and the default configuration
applied." The configuration will not be erased, and the default configuration is not applied. The
default configuration is only applied during a reimage, not an upgrade.
2110-sec#
Cisco ASA: CMD=-install, CSP-ID=cisco-asa.9.8.2.2__asa_001_JAD20280BW90MEZR11, FLAG=''
Verifying signature for cisco-asa.9.8.2.2 ...
Verifying signature for cisco-asa.9.8.2.2 ... success
Step 2 Make the unit that you just upgraded the active unit so that traffic flows to the upgraded unit.
a) Connect to the standby ASA CLI from FXOS.
connect asa
enable
The enable password is blank by default.
Example:
scope firmware
Example:
Example:
Download task:
File Name Protocol Server Port Userid State
--------- -------- --------------- ---------- --------------- -----
cisco-asa-fp2k.9.8.2.SPA
Tftp 10.88.29.181 0 Downloaded
cisco-asa-fp2k.9.8.2.2.SPA
Tftp 10.88.29.181 0 Downloading
2110-pri /firmware #
e) When the new package finishes downloading (Downloaded state), boot the package. View the version
number of the new package.
show package
Example:
The system is currently installed with security software package 9.8.2, which has:
- The platform version: 2.2.2.52
- The CSP (asa) version: 9.8.2
If you proceed with the upgrade 9.8.2.2, it will do the following:
- upgrade to the CSP asa version 9.8.2.2
Attention:
If you proceed the system will be re-imaged. All existing configuration will be lost,
Note Ignore the message, "All existing configuration will be lost, and the default configuration
applied." The configuration will not be erased, and the default configuration is not applied. The
default configuration is only applied during a reimage, not an upgrade.
2110-pri#
Cisco ASA: CMD=-install, CSP-ID=cisco-asa.9.8.2.2__asa_001_JAD20280BW90MEZR11, FLAG=''
Verifying signature for cisco-asa.9.8.2.2 ...
Verifying signature for cisco-asa.9.8.2.2 ... success
Procedure
Step 3 Make both failover groups active on the secondary unit. In ASDM on the primary unit, choose Monitoring
> Failover > Failover Group 1, and click Make Standby.
ASDM will automatically reconnect to the failover group 1 IP address on the secondary unit.
The selected package is uploaded to the chassis. The Upload Image dialog box shows the upload status.
Wait for the Success dialog box, and click OK. After completing the upload, the integrity of the image
is automatically verified.
f) Click the Upgrade icon to the right of the new package.
g) Click Yes to confirm that you want to proceed with installation.
There is no indicator that the new package is being loaded. You will still see the Firepower Chassis
Manager at the beginning of the upgrade process. When the system reboots, you will be logged out. You
must wait for the system to come back up before you can log in to the Firepower Chassis Manager. The
reboot process takes approximately 20 minutes. After the reboot, you will see the login screen.
Step 5 If the failover groups are configured with Preempt Enabled, they automatically become active on their
designated unit after the preempt delay has passed. If the failover groups are not configured with Preempt
Enabled, you can return them to active status on their designated units using the ASDM Monitoring > Failover
> Failover Group # pane.
Procedure
Step 1 Connect to the FXOS CLI on the secondary unit, either the console port (preferred) or using SSH.
Step 2 Make both failover groups active on the primary unit.
a) Connect to the ASA CLI from FXOS.
connect asa
enable
The enable password is blank by default.
Example:
Example:
Download task:
File Name Protocol Server Port Userid State
--------- -------- --------------- ---------- --------------- -----
cisco-asa-fp2k.9.8.2.SPA
Tftp 10.88.29.181 0 Downloaded
cisco-asa-fp2k.9.8.2.2.SPA
Tftp 10.88.29.181 0 Downloading
2110-sec /firmware #
d) When the new package finishes downloading (Downloaded state), boot the package. View the version
number of the new package.
show package
Example:
cisco-asa-fp2k.9.8.2.SPA 9.8.2
cisco-asa-fp2k.9.8.2.2.SPA 9.8.2.2
2110-sec /firmware #
The system is currently installed with security software package 9.8.2, which has:
- The platform version: 2.2.2.52
- The CSP (asa) version: 9.8.2
If you proceed with the upgrade 9.8.2.2, it will do the following:
- upgrade to the CSP asa version 9.8.2.2
Attention:
If you proceed the system will be re-imaged. All existing configuration will be lost,
Note Ignore the message, "All existing configuration will be lost, and the default configuration
applied." The configuration will not be erased, and the default configuration is not applied. The
default configuration is only applied during a reimage, not an upgrade.
2110-sec#
Cisco ASA: CMD=-install, CSP-ID=cisco-asa.9.8.2.2__asa_001_JAD20280BW90MEZR11, FLAG=''
Verifying signature for cisco-asa.9.8.2.2 ...
Verifying signature for cisco-asa.9.8.2.2 ... success
[…]
Example:
Download task:
File Name Protocol Server Port Userid State
--------- -------- --------------- ---------- --------------- -----
cisco-asa-fp2k.9.8.2.SPA
Tftp 10.88.29.181 0 Downloaded
cisco-asa-fp2k.9.8.2.2.SPA
Tftp 10.88.29.181 0 Downloading
2110-pri /firmware #
e) When the new package finishes downloading (Downloaded state), boot the package. View the version
number of the new package.
show package
Example:
The system is currently installed with security software package 9.8.2, which has:
- The platform version: 2.2.2.52
- The CSP (asa) version: 9.8.2
If you proceed with the upgrade 9.8.2.2, it will do the following:
- upgrade to the CSP asa version 9.8.2.2
Here is the checklist of things that are recommended before starting Auto-Install
(1) Review current critical/major faults
(2) Initiate a configuration backup
Attention:
If you proceed the system will be re-imaged. All existing configuration will be lost,
Note Ignore the message, "All existing configuration will be lost, and the default configuration
applied." The configuration will not be erased, and the default configuration is not applied. The
default configuration is only applied during a reimage, not an upgrade.
2110-pri#
Cisco ASA: CMD=-install, CSP-ID=cisco-asa.9.8.2.2__asa_001_JAD20280BW90MEZR11, FLAG=''
Verifying signature for cisco-asa.9.8.2.2 ...
Verifying signature for cisco-asa.9.8.2.2 ... success
Step 6 If the failover groups are configured with the ASA preempt command, they automatically become active on
their designated unit after the preempt delay has passed. If the failover groups are not configured with the
preempt command, you can return them to active status on their designated units by connecting to the ASA
CLI and using the failover active group command.
Caution Do not make configuration changes, manually reboot, or shut down an upgrading module. Do not restart an
upgrade in progress. The upgrade process may appear inactive during prechecks; this is expected. If you
encounter issues with the upgrade, including a failed upgrade or unresponsive appliance, contact Cisco TAC.
Procedure
For patches:
• Upgrading to 5.4.1.x through 6.2.1.x — Cisco_Network_Sensor_Patch-[version]-[build].sh
• Upgrading to Version 6.2.2.1+ — Cisco_Network_Sensor_Patch-[version]-[build].sh.REL.tar
Download directly from the Cisco Support & Download site. If you transfer a package by email, it may become
corrupted. Note that upgrade packages from Version 6.2.2+ are signed, and terminate in .sh.REL.tar instead
of just .sh. Do not untar signed upgrade packages.
Step 3 Connect to the ASA with ASDM and upload the upgrade package.
a) Choose Configuration > ASA FirePOWER Configuration > Updates.
b) Click Upload Update.
c) Click Choose File to navigate to and choose the update.
d) Click Upload.
Step 4 Deploy pending configuration changes. Otherwise, the upgrade may fail.
When you deploy, resource demands may result in a small number of packets dropping without inspection.
Additionally, deploying some configurations restarts Snort, which interrupts traffic inspection and, depending
on how your device handles traffic, may interrupt traffic until the restart completes. For more information,
see ASA FirePOWER Upgrade Behavior, on page 89.
Step 6 Choose Monitoring > ASA FirePOWER Monitoring > Task Status to make sure essential tasks are complete.
Tasks running when the upgrade begins are stopped, become failed tasks, and cannot be resumed. You can
manually delete failed status messages later.
Caution Do not deploy changes to or from, manually reboot, or shut down an upgrading appliance. Do not restart an
upgrade in progress. The upgrade process may appear inactive during prechecks; this is expected. If you
encounter issues with the upgrade, including a failed upgrade or unresponsive appliance, contact Cisco TAC.
Procedure
Step 6 Monitor precheck progress in the Message Center until you are logged out.
Do not make configuration changes or deploy to any device while the FMC is upgrading. Even if the Message
Center shows no progress for several minutes or indicates that the upgrade has failed, do not restart the upgrade
or reboot the FMC. Instead, contact Cisco TAC.
• Major upgrades: You can log in before the upgrade completes. The FMC displays a page you can use to
monitor the upgrade's progress and view the upgrade log and any error messages. You are logged out
again when the upgrade completes and the FMC reboots. After the reboot, log back in again.
Step 8 If prompted, review and accept the End User License Agreement (EULA).
Step 9 Verify upgrade success.
If the FMC does not notify you of the upgrade's success when you log in, choose Help > About to display
current software version information.
Step 12 Complete any post-upgrade configuration changes described in the release notes.
Step 13 Redeploy configurations.
Redeploy to all managed devices. If you do not deploy to a device, its eventual upgrade may fail and you may
have to reimage it.
Caution Do not deploy changes to or from, manually reboot, or shut down an upgrading appliance. Do not restart an
upgrade in progress. The upgrade process may appear inactive during prechecks; this is expected. If you
encounter issues with the upgrade, including a failed upgrade or unresponsive appliance, contact Cisco TAC.
Procedure
Step 1 On the active FMC, deploy to managed devices whose configurations are out of date.
On the FMC menu bar, click Deploy. Choose devices, then click Deploy again. If you do not deploy to an
out-of-date device now, its eventual upgrade may fail and you may have to reimage it.
When you deploy, resource demands may result in a small number of packets dropping without inspection.
Additionally, deploying some configurations restarts Snort, which interrupts traffic inspection and, depending
on how your device handles traffic, may interrupt traffic until the restart completes. .
Step 2 Use the Message Center to check deployment health before you pause synchronization.
Click the System Status icon on the FMC menu bar to display the Message Center. Make sure the appliances
in your deployment are successfully communicating and that there are no issues reported by the health monitor.
Step 5 On the FMC you want to make the active peer, restart synchronization.
a) Choose System > Integration.
b) On the High Availability tab, click Make-Me-Active.
c) Wait until synchronization restarts and the other FMC switches to standby mode.
Step 6 Use the Message Center to recheck deployment health.
Step 7 Update intrusion rules (SRU) and the vulnerability database (VDB).
If the SRU or the VDB available on the Cisco Support & Downloads site is newer than the version currently
running, install the newer version. For more information, see the Firepower Management Center Configuration
Guide. Note that when you update intrusion rules, you do not need to automatically reapply policies. You will
do that later.
Step 8 Complete any post-upgrade configuration changes described in the release notes.
Step 9 Redeploy configurations.
Redeploy to all managed devices. If you do not deploy to a device, its eventual upgrade may fail and you may
have to reimage it.
• Upgrading standalone ASA devices: If you are also upgrading ASA, use the FMC to upgrade the ASA
FirePOWER module just after you upgrade ASA and reload.
• Upgrading ASA clusters and failover pairs: To avoid interruptions in traffic flow and inspection, fully
upgrade these devices one at a time. If you are also upgrading ASA, use the FMC to upgrade the ASA
FirePOWER module just before you reload each unit to upgrade ASA.
For more information, see ASA FirePOWER Upgrade Path: with FMC, on page 24 and the ASA upgrade
procedures.
Caution Do not deploy changes to or from, manually reboot, or shut down an upgrading appliance. Do not restart an
upgrade in progress. The upgrade process may appear inactive during prechecks; this is expected. If you
encounter issues with the upgrade, including a failed upgrade or unresponsive appliance, contact Cisco TAC.
Procedure
• Check disk space: Perform a final disk space check. Without enough free disk space, the upgrade fails.
Step 6 Click Install, then confirm that you want to upgrade and reboot the devices.
Traffic either drops throughout the upgrade or traverses the network without inspection depending on how
your devices are configured and deployed. For more information, see ASA FirePOWER Upgrade Behavior,
on page 89.
Step 11 Complete any post-upgrade configuration changes described in the release notes.
Step 12 Redeploy configurations to the devices you just upgraded.
Procedure
Step 4 Click Yes to confirm that you want to proceed with installation.
FXOS unpacks the bundle and upgrades/reloads the components.
Step 5 Firepower Chassis Manager will be unavailable during upgrade. You can monitor the upgrade process using
the FXOS CLI (see Monitor the Upgrade Progress, on page 131).
Step 6 After all components have successfully upgraded, verify the status of the security modules/security engine
and any installed applications before continuing (see Verify the Installation, on page 132).
Step 7 Choose Logical Devices.
The Logical Devices page opens to show a list of configured logical devices on the chassis.
Step 8 For each ASA logical device that you want to upgrade:
a) Click the Set Version icon for the logical device that you want to update to open the Update Image
Version dialog box.
b) For the New Version, choose the software version to which you want to upgrade.
c) Click OK.
Step 9 After the upgrade process finishes, verify that the applications are online and have upgraded successfully:
a) Choose Logical Devices.
b) Verify the application version and operational status.
Procedure
Example:
The following example copies an image using the SCP protocol:
Firepower-chassis # scope firmware
Firepower-chassis /firmware # download image
scp://[email protected]/images/fxos-k9.2.3.1.58.SPA
Firepower-chassis /firmware # scope download-task fxos-k9.2.3.1.58.SPA
Firepower-chassis /firmware/download-task # show detail
Download task:
File Name: fxos-k9.2.3.1.58.SPA
Protocol: scp
Server: 192.168.1.1
Userid:
Path:
Downloaded Image Size (KB): 853688
State: Downloading
Current Task: downloading image fxos-k9.2.3.1.58.SPA from
192.168.1.1(FSM-STAGE:sam:dme:FirmwareDownloaderDownload:Local)
Step 3 After the new FXOS platform bundle image has successfully downloaded, upgrade the FXOS bundle:
a) If necessary, return to firmware mode:
up
b) Make note of the version number for the FXOS platform bundle you are installing:
show package
c) Enter auto-install mode:
scope auto-install
d) Install the FXOS platform bundle:
install platform platform-vers version_number
version_number is the version number of the FXOS platform bundle you are installing--for example,
2.3(1.58).
e) The system will first verify the software package that you want to install. It will inform you of any
incompatibility between currently-installed applications and the specified FXOS platform software package.
It will also warn you that any existing sessions will be terminated and that the system will need to be
rebooted as part of the upgrade. As long as the ASA version is listed as upgradeable in the compatibility
table, you can ignore these warnings.
Enter yes to confirm that you want to proceed with verification.
f) Enter yes to confirm that you want to proceed with installation, or enter no to cancel the installation.
FXOS unpacks the bundle and upgrades/reloads the components.
g) To monitor the upgrade process, see Monitor the Upgrade Progress, on page 131.
Step 4 After all components have successfully upgraded, verify the status of the security modules/security engine
and any installed applications before continuing (see Verify the Installation, on page 132).
Step 5 Download the new ASA software image to the chassis:
a) Enter Security Services mode:
top
scope ssa
b) Enter Application Software mode:
scope app-software
c) Download the logical device software image:
download image URL
Specify the URL for the file being imported using one of the following syntax:
• ftp://username@server/path
• scp://username@server/path
• sftp://username@server/path
• tftp://server:port-num/path
show app
Make note of the ASA version for the software package you downloaded. You will need to use the exact
version string to enable the application in a later step.
Example:
The following example copies an image using the SCP protocol:
Firepower-chassis # scope ssa
Firepower-chassis /ssa # scope app-software
Firepower-chassis /ssa/app-software # download image
scp://[email protected]/images/cisco-asa.9.4.1.65.csp
Firepower-chassis /ssa/app-software # show download-task
Firepower-chassis /ssa/app-software # up
Application:
Name Version Description Author Deploy Type CSP Type Is Default App
---------- ---------- ----------- ---------- ----------- ----------- --------------
asa 9.4.1.41 N/A Native Application No
asa 9.4.1.65 N/A Native Application Yes
Step 6 For each ASA logical device that you want to upgrade:
a) Enter Security Services mode:
top
scope ssa
b) Set the scope to the security module you are updating:
scope slotslot_number
c) Set the scope to the ASA application:
For FXOS 2.3.1 and earlier: scope app-instance asa
For FXOS 2.4.1 and later: scope app-instance asa instance_name
d) Set the Startup version to the new ASA software version:
set startup-version version_number
Step 8 To verify the status of the security modules/security engine and any installed applications, see Verify the
Installation, on page 132.
Procedure
Step 1 On the Firepower security appliance that contains the standby ASA logical device, upload the new FXOS
platform bundle image and ASA software image:
Note If you are upgrading to a version earlier than FXOS 2.3.1, do not upload the ASA CSP image to
your security appliance until after you upgrade the FXOS platform bundle software.
Step 2 After the new FXOS platform bundle image has successfully uploaded, upgrade the FXOS bundle on the
Firepower security appliance that contains the standby ASA logical device:
a) Click the Upgrade icon for the FXOS platform bundle to which you want to upgrade.
The system will first verify the software package that you want to install. It will inform you of any
incompatibility between currently-installed applications and the specified FXOS platform software package.
It will also warn you that any existing sessions will be terminated and that the system will need to be
rebooted as part of the upgrade. As long as the ASA version is listed as upgradeable in the compatibility
table, you can ignore these warnings.
b) Click Yes to confirm that you want to proceed with installation.
FXOS unpacks the bundle and upgrades/reloads the components.
Step 3 Firepower Chassis Manager will be unavailable during upgrade. You can monitor the upgrade process using
the FXOS CLI (see Monitor the Upgrade Progress, on page 131).
Step 4 After all components have successfully upgraded, verify the status of the security modules/security engine
and any installed applications before continuing (see Verify the Installation, on page 132).
Step 5 Upgrade the ASA logical device image:
a) Choose Logical Devices to open the Logical Devices page.
The Logical Devices page opens to show a list of configured logical devices on the chassis.
b) Click the Set Version icon for the logical device that you want to update to open the Update Image
Version dialog box.
c) For the New Version, choose the software version to which you want to update.
d) Click OK.
Step 6 After the upgrade process finishes, verify that the applications are online and have upgraded successfully:
a) Choose Logical Devices.
b) Verify the application version and operational status.
Step 7 Make the unit that you just upgraded the active unit so that traffic flows to the upgraded unit:
a) Launch ASDM on the standby unit by connecting to the standby ASA IP address.
b) Force the standby unit to become active by choosing Monitoring > Properties > Failover > Status,
and clicking Make Active.
Step 8 On the Firepower security appliance that contains the new standby ASA logical device, upload the new FXOS
platform bundle image and ASA software image:
Note If you are upgrading to a version earlier than FXOS 2.3.1, do not upload the ASA CSP image to
your security appliance until after you upgrade the FXOS platform bundle software.
The system will first verify the software package that you want to install. It will inform you of any
incompatibility between currently-installed applications and the specified FXOS platform software package.
It will also warn you that any existing sessions will be terminated and that the system will need to be
rebooted as part of the upgrade. As long as the ASA version is listed as upgradeable in the compatibility
table, you can ignore these warnings.
b) Click Yes to confirm that you want to proceed with installation.
FXOS unpacks the bundle and upgrades/reloads the components.
Step 10 Firepower Chassis Manager will be unavailable during upgrade. You can monitor the upgrade process using
the FXOS CLI (see Monitor the Upgrade Progress, on page 131).
Step 11 After all components have successfully upgraded, verify the status of the security modules/security engine
and any installed applications before continuing (see Verify the Installation, on page 132).
Step 12 Upgrade the ASA logical device image:
a) Choose Logical Devices.
The Logical Devices page opens to shows a list of configured logical devices on the chassis. If no logical
devices have been configured, a message stating so is shown instead.
b) Click the Set Version icon for the logical device that you want to update to open the Update Image
Version dialog box.
c) For the New Version, choose the software version to which you want to update.
d) Click OK.
Step 13 After the upgrade process finishes, verify that the applications are online and have upgraded successfully:
a) Choose Logical Devices.
b) Verify the application version and operational status.
Step 14 (Optional) Make the unit that you just upgraded the active unit as it was before the upgrade:
a) Launch ASDM on the standby unit by connecting to the standby ASA IP address.
b) Force the standby unit to become active by choosing Monitoring > Properties > Failover > Status,
and clicking Make Active.
Upgrade FXOS and an ASA Active/Standby Failover Pair Using the FXOS CLI
The upgrade process can take up to 45 minutes per chassis. Please plan your upgrade activity accordingly.
• IP address and authentication credentials for the server from which you are copying the image.
• Fully qualified name of the image file.
Procedure
Step 1 On the Firepower security appliance that contains the standby ASA logical device, download the new FXOS
platform bundle image:
a) Connect to the FXOS CLI.
b) Enter firmware mode:
scope firmware
c) Download the FXOS platform bundle software image:
download image URL
Specify the URL for the file being imported using one of the following syntax:
• ftp://username@server/path/image_name
• scp://username@server/path/image_name
• sftp://username@server/path/image_name
• tftp://server:port-num/path/image_name
Example:
The following example copies an image using the SCP protocol:
Firepower-chassis # scope firmware
Firepower-chassis /firmware # download image
scp://[email protected]/images/fxos-k9.2.3.1.58.SPA
Firepower-chassis /firmware # scope download-task fxos-k9.2.3.1.58.SPA
Firepower-chassis /firmware/download-task # show detail
Download task:
File Name: fxos-k9.2.3.1.58.SPA
Protocol: scp
Server: 192.168.1.1
Userid:
Path:
Downloaded Image Size (KB): 853688
State: Downloading
Current Task: downloading image fxos-k9.2.3.1.58.SPA from
192.168.1.1(FSM-STAGE:sam:dme:FirmwareDownloaderDownload:Local)
Step 2 After the new FXOS platform bundle image has successfully downloaded, upgrade the FXOS bundle:
a) If necessary, return to firmware mode:
up
b) Make note of the version number for the FXOS platform bundle you are installing:
show package
c) Enter auto-install mode:
scope auto-install
d) Install the FXOS platform bundle:
install platform platform-vers version_number
version_number is the version number of the FXOS platform bundle you are installing--for example,
2.3(1.58).
e) The system will first verify the software package that you want to install. It will inform you of any
incompatibility between currently-installed applications and the specified FXOS platform software package.
It will also warn you that any existing sessions will be terminated and that the system will need to be
rebooted as part of the upgrade. As long as the ASA version is listed as upgradeable in the compatibility
table, you can ignore these warnings.
Enter yes to confirm that you want to proceed with verification.
f) Enter yes to confirm that you want to proceed with installation, or enter no to cancel the installation.
FXOS unpacks the bundle and upgrades/reloads the components.
g) To monitor the upgrade process, see Monitor the Upgrade Progress, on page 131.
Step 3 After all components have successfully upgraded, verify the status of the security modules/security engine
and any installed applications before continuing (see Verify the Installation, on page 132).
Step 4 Download the new ASA software image to the chassis:
a) Enter Security Services mode:
top
scope ssa
b) Enter Application Software mode:
scope app-software
c) Download the logical device software image:
download image URL
Specify the URL for the file being imported using one of the following syntax:
• ftp://username@server/path
• scp://username@server/path
• sftp://username@server/path
• tftp://server:port-num/path
up
show app
Make note of the ASA version for the software package you downloaded. You will need to use the exact
version string to enable the application in a later step.
Example:
The following example copies an image using the SCP protocol:
Firepower-chassis # scope ssa
Firepower-chassis /ssa # scope app-software
Firepower-chassis /ssa/app-software # download image
scp://[email protected]/images/cisco-asa.9.4.1.65.csp
Firepower-chassis /ssa/app-software # show download-task
Firepower-chassis /ssa/app-software # up
Application:
Name Version Description Author Deploy Type CSP Type Is Default App
---------- ---------- ----------- ---------- ----------- ----------- --------------
asa 9.4.1.41 N/A Native Application No
asa 9.4.1.65 N/A Native Application Yes
Step 6 To verify the status of the security modules/security engine and any installed applications, see Verify the
Installation, on page 132.
Step 7 Make the unit that you just upgraded the active unit so that traffic flows to the upgraded unit:
a) On the Firepower security appliance that contains the standby ASA logical device, connect to the module
CLI using a console connection or a Telnet connection.
connect module slot_number {console | telnet}
To connect to the security engine of a device that does not support multiple security modules, always use
1 as the slot_number.
Example:
Firepower-module1>
Example:
The following example copies an image using the SCP protocol:
Firepower-chassis # scope firmware
Firepower-chassis /firmware # download image
scp://[email protected]/images/fxos-k9.2.3.1.58.SPA
Firepower-chassis /firmware # scope download-task fxos-k9.2.3.1.58.SPA
Firepower-chassis /firmware/download-task # show detail
Download task:
File Name: fxos-k9.2.3.1.58.SPA
Protocol: scp
Server: 192.168.1.1
Userid:
Path:
Downloaded Image Size (KB): 853688
State: Downloading
Current Task: downloading image fxos-k9.2.3.1.58.SPA from
192.168.1.1(FSM-STAGE:sam:dme:FirmwareDownloaderDownload:Local)
Step 11 After the new FXOS platform bundle image has successfully downloaded, upgrade the FXOS bundle:
a) If necessary, return to firmware mode:
up
b) Make note of the version number for the FXOS platform bundle you are installing:
show package
c) Enter auto-install mode:
scope auto-install
d) Install the FXOS platform bundle:
install platform platform-vers version_number
version_number is the version number of the FXOS platform bundle you are installing--for example,
2.3(1.58).
e) The system will first verify the software package that you want to install. It will inform you of any
incompatibility between currently-installed applications and the specified FXOS platform software package.
It will also warn you that any existing sessions will be terminated and that the system will need to be
rebooted as part of the upgrade. As long as the ASA version is listed as upgradeable in the compatibility
table, you can ignore these warnings.
Enter yes to confirm that you want to proceed with verification.
f) Enter yes to confirm that you want to proceed with installation, or enter no to cancel the installation.
FXOS unpacks the bundle and upgrades/reloads the components.
g) To monitor the upgrade process, see Monitor the Upgrade Progress, on page 131.
Step 12 After all components have successfully upgraded, verify the status of the security modules/security engine
and any installed applications before continuing (see Verify the Installation, on page 132).
Step 13 Download the new ASA software image to the chassis:
a) Enter Security Services mode:
top
scope ssa
b) Enter Application Software mode:
scope app-software
c) Download the logical device software image:
download image URL
Specify the URL for the file being imported using one of the following syntax:
• ftp://username@server/path
• scp://username@server/path
• sftp://username@server/path
• tftp://server:port-num/path
show app
Make note of the ASA version for the software package you downloaded. You will need to use the exact
version string to enable the application in a later step.
Example:
The following example copies an image using the SCP protocol:
Firepower-chassis # scope ssa
Firepower-chassis /ssa # scope app-software
Firepower-chassis /ssa/app-software # download image
scp://[email protected]/images/cisco-asa.9.4.1.65.csp
Firepower-chassis /ssa/app-software # show download-task
Firepower-chassis /ssa/app-software # up
Application:
Name Version Description Author Deploy Type CSP Type Is Default App
---------- ---------- ----------- ---------- ----------- ----------- --------------
asa 9.4.1.41 N/A Native Application No
asa 9.4.1.65 N/A Native Application Yes
Step 15 To verify the status of the security modules/security engine and any installed applications, see Verify the
Installation, on page 132.
Step 16 (Optional) Make the unit that you just upgraded the active unit as it was before the upgrade:
a) On the Firepower security appliance that contains the standby ASA logical device, connect to the module
CLI using a console connection or a Telnet connection.
connect module slot_number {console | telnet}
To connect to the security engine of a device that does not support multiple security modules, always use
1 as the slot_number.
Example:
Firepower-module1>
UpgradeFXOSandanASAActive/ActiveFailoverPairUsingFirepowerChassis
Manager
The upgrade process can take up to 45 minutes per chassis. Please plan your upgrade activity accordingly.
Procedure
Step 4 Firepower Chassis Manager will be unavailable during upgrade. You can monitor the upgrade process using
the FXOS CLI (see Monitor the Upgrade Progress, on page 131).
Step 5 After all components have successfully upgraded, verify the status of the security modules/security engine
and any installed applications before continuing (see Verify the Installation, on page 132).
Step 9 On the Firepower security appliance that contains the primary ASA logical device, upload the new FXOS
platform bundle image and ASA software image:
Note If you are upgrading to a version earlier than FXOS 2.3.1, do not upload the ASA CSP image to
your security appliance until after you upgrade the FXOS platform bundle software.
Step 11 Firepower Chassis Manager will be unavailable during upgrade. You can monitor the upgrade process using
the FXOS CLI (see Monitor the Upgrade Progress, on page 131).
Step 12 After all components have successfully upgraded, verify the status of the security modules/security engine
and any installed applications before continuing (see Verify the Installation, on page 132).
Step 13 Upgrade the ASA logical device image:
a) Choose Logical Devices.
The Logical Devices page opens to show a list of configured logical devices on the chassis.
b) Click the Set Version icon for the logical device that you want to update to open the Update Image
Version dialog box.
c) For the New Version, choose the software version to which you want to update.
d) Click OK.
Step 14 After the upgrade process finishes, verify that the applications are online and have upgraded successfully:
a) Choose Logical Devices.
b) Verify the application version and operational status.
Step 15 If the failover groups are configured with Preempt Enabled, they automatically become active on their
designated unit after the preempt delay has passed. If the failover groups are not configured with Preempt
Enabled, you can return them to active status on their designated units using the ASDM Monitoring > Failover
> Failover Group # pane.
Upgrade FXOS and an ASA Active/Active Failover Pair Using the FXOS CLI
The upgrade process can take up to 45 minutes per chassis. Please plan your upgrade activity accordingly.
Procedure
Step 1 Connect to the FXOS CLI on the secondary unit, either the console port (preferred) or using SSH.
Step 2 Make both failover groups active on the primary unit.
a) Connect to the module CLI using a console connection or a Telnet connection.
connect module slot_number {console | telnet}
To connect to the security engine of a device that does not support multiple security modules, always use
1 as the slot_number.
Example:
Firepower-module1>
a) Enter Ctrl-], .
Step 5 On the Firepower security appliance that contains the secondary ASA logical device, download the new FXOS
platform bundle image and ASA software image:
a) Connect to the FXOS CLI.
b) Enter firmware mode:
scope firmware
c) Download the FXOS platform bundle software image:
download image URL
Specify the URL for the file being imported using one of the following syntax:
• ftp://username@server/path/image_name
• scp://username@server/path/image_name
• sftp://username@server/path/image_name
• tftp://server:port-num/path/image_name
Example:
The following example copies an image using the SCP protocol:
Firepower-chassis # scope firmware
Firepower-chassis /firmware # download image
scp://[email protected]/images/fxos-k9.2.3.1.58.SPA
Firepower-chassis /firmware # scope download-task fxos-k9.2.3.1.58.SPA
Firepower-chassis /firmware/download-task # show detail
Download task:
File Name: fxos-k9.2.3.1.58.SPA
Protocol: scp
Server: 192.168.1.1
Userid:
Path:
Downloaded Image Size (KB): 853688
State: Downloading
Current Task: downloading image fxos-k9.2.3.1.58.SPA from
192.168.1.1(FSM-STAGE:sam:dme:FirmwareDownloaderDownload:Local)
Step 6 After the new FXOS platform bundle image has successfully downloaded, upgrade the FXOS bundle:
a) If necessary, return to firmware mode:
top
scope firmware
b) Make note of the version number for the FXOS platform bundle you are installing:
show package
c) Enter auto-install mode:
scope auto-install
d) Install the FXOS platform bundle:
install platform platform-vers version_number
version_number is the version number of the FXOS platform bundle you are installing--for example,
2.3(1.58).
e) The system will first verify the software package that you want to install. It will inform you of any
incompatibility between currently-installed applications and the specified FXOS platform software package.
It will also warn you that any existing sessions will be terminated and that the system will need to be
rebooted as part of the upgrade. As long as the ASA version is listed as upgradeable in the compatibility
table, you can ignore these warnings.
Enter yes to confirm that you want to proceed with verification.
f) Enter yes to confirm that you want to proceed with installation, or enter no to cancel the installation.
FXOS unpacks the bundle and upgrades/reloads the components.
g) To monitor the upgrade process, see Monitor the Upgrade Progress, on page 131.
Step 7 After all components have successfully upgraded, verify the status of the security modules/security engine
and any installed applications before continuing (see Verify the Installation, on page 132).
Step 8 Download the new ASA software image to the chassis:
a) Enter Security Services mode:
top
scope ssa
b) Enter Application Software mode:
scope app-software
c) Download the logical device software image:
download image URL
Specify the URL for the file being imported using one of the following syntax:
• ftp://username@server/path
• scp://username@server/path
• sftp://username@server/path
• tftp://server:port-num/path
show app
Make note of the ASA version for the software package you downloaded. You will need to use the exact
version string to enable the application in a later step.
Example:
The following example copies an image using the SCP protocol:
Firepower-chassis # scope ssa
Firepower-chassis /ssa # scope app-software
Firepower-chassis /ssa/app-software # download image
scp://[email protected]/images/cisco-asa.9.4.1.65.csp
Firepower-chassis /ssa/app-software # show download-task
Firepower-chassis /ssa/app-software # up
Application:
Name Version Description Author Deploy Type CSP Type Is Default App
---------- ---------- ----------- ---------- ----------- ----------- --------------
asa 9.4.1.41 N/A Native Application No
asa 9.4.1.65 N/A Native Application Yes
Step 10 To verify the status of the security modules/security engine and any installed applications, see Verify the
Installation, on page 132.
Step 11 Make both failover groups active on the secondary unit.
a) Connect to the module CLI using a console connection or a Telnet connection.
Firepower-module1>
Example:
The following example copies an image using the SCP protocol:
Firepower-chassis # scope firmware
Firepower-chassis /firmware # download image
scp://[email protected]/images/fxos-k9.2.3.1.58.SPA
Firepower-chassis /firmware # scope download-task fxos-k9.2.3.1.58.SPA
Firepower-chassis /firmware/download-task # show detail
Download task:
File Name: fxos-k9.2.3.1.58.SPA
Protocol: scp
Server: 192.168.1.1
Userid:
Path:
Downloaded Image Size (KB): 853688
State: Downloading
Current Task: downloading image fxos-k9.2.3.1.58.SPA from
192.168.1.1(FSM-STAGE:sam:dme:FirmwareDownloaderDownload:Local)
Step 15 After the new FXOS platform bundle image has successfully downloaded, upgrade the FXOS bundle:
a) If necessary, return to firmware mode:
up
b) Make note of the version number for the FXOS platform bundle you are installing:
show package
c) Enter auto-install mode:
scope auto-install
d) Install the FXOS platform bundle:
install platform platform-vers version_number
version_number is the version number of the FXOS platform bundle you are installing--for example,
2.3(1.58).
e) The system will first verify the software package that you want to install. It will inform you of any
incompatibility between currently-installed applications and the specified FXOS platform software package.
It will also warn you that any existing sessions will be terminated and that the system will need to be
rebooted as part of the upgrade. As long as the ASA version is listed as upgradeable in the compatibility
table, you can ignore these warnings.
Enter yes to confirm that you want to proceed with verification.
f) Enter yes to confirm that you want to proceed with installation, or enter no to cancel the installation.
FXOS unpacks the bundle and upgrades/reloads the components.
g) To monitor the upgrade process, see Monitor the Upgrade Progress, on page 131.
Step 16 After all components have successfully upgraded, verify the status of the security modules/security engine
and any installed applications before continuing (see Verify the Installation, on page 132).
Step 17 Download the new ASA software image to the chassis:
a) Enter Security Services mode:
top
scope ssa
b) Enter Application Software mode:
scope app-software
c) Download the logical device software image:
download image URL
Specify the URL for the file being imported using one of the following syntax:
• ftp://username@server/path
• scp://username@server/path
• sftp://username@server/path
• tftp://server:port-num/path
show app
Make note of the ASA version for the software package you downloaded. You will need to use the exact
version string to enable the application in a later step.
Example:
The following example copies an image using the SCP protocol:
Firepower-chassis # scope ssa
Firepower-chassis /ssa # scope app-software
Firepower-chassis /ssa/app-software # download image
scp://[email protected]/images/cisco-asa.9.4.1.65.csp
Firepower-chassis /ssa/app-software # show download-task
Firepower-chassis /ssa/app-software # up
Application:
Name Version Description Author Deploy Type CSP Type Is Default App
---------- ---------- ----------- ---------- ----------- ----------- --------------
asa 9.4.1.41 N/A Native Application No
asa 9.4.1.65 N/A Native Application Yes
Step 19 To verify the status of the security modules/security engine and any installed applications, see Verify the
Installation, on page 132.
Step 20 If the failover groups are configured with Preempt Enabled, they automatically become active on their
designated unit after the preempt delay has passed. If the failover groups are not configured with Preempt
Enabled, you can return them to active status on their designated units using the ASDM Monitoring > Failover
> Failover Group # pane.
Procedure
Step 1 Determine which chassis has the Master unit. You will upgrade this chassis last:
a) Connect to Firepower Chassis Manager.
b) Choose Logical Devices.
c) Click the plus sign (+) to see the attributes for the security modules included in the cluster.
d) Verify that the Primary unit is on this chassis. There should be an ASA instance with CLUSTER-ROLE
set to master.
Step 2 Connect to Firepower Chassis Manager on a chassis in the cluster that does not have the Master unit.
Step 3 Upload the new FXOS platform bundle image and ASA software image:
Note If you are upgrading to a version earlier than FXOS 2.3.1, do not upload the ASA CSP image to
your security appliance until after you upgrade the FXOS platform bundle software.
Step 6 Firepower Chassis Manager will be unavailable during upgrade. You can monitor the upgrade process using
the FXOS CLI (see Monitor the Upgrade Progress, on page 131).
Step 7 After all components have successfully upgraded, verify the status of the security modules/security engine
and any installed applications before continuing (see Verify the Installation, on page 132).
Step 8 Upgrade the ASA logical device image on each security module:
a) Choose Logical Devices.
The Logical Devices page opens to show a list of configured logical devices on the chassis.
b) Click the Set Version icon for the logical device that you want to update to open the Update Image
Version dialog box.
c) For the New Version, choose the software version to which you want to update.
d) Click OK.
Step 9 After the upgrade process finishes, verify that the applications are online and have upgraded successfully:
a) Choose Logical Devices.
b) Verify the application version and operational status.
Step 10 Re-enable clustering for all security modules on the chassis:
a) Choose Logical Devices.
b) Click the Enable switch for each security module included in the cluster.
The Cluster Operational Status changes to in-cluster.
Step 11 Repeat steps 2-10 for all remaining chassis in the cluster that do not have the Master unit.
Step 12 After all chassis in the cluster that do not have the Master unit have been upgraded, repeat steps 2-10 on the
chassis with the Master unit, being sure to disable clustering on the slave units first, and then finally the master
unit.
A new master unit will be chosen from one of the previously upgraded chassis.
Step 13 After the cluster has stabilized, redistribute active sessions among all modules in the cluster using the ASA
console on the master unit.
cluster redistribute vpn-sessiondb
Upgrade FXOS and an ASA Inter-chassis Cluster Using the FXOS CLI
The upgrade process can take up to 45 minutes per chassis. Please plan your upgrade activity accordingly.
Procedure
Step 1 Determine which chassis has the Master unit. You will upgrade this chassis last:
a) Connect to the FXOS CLI.
b) Verify that the Primary unit is on this chassis. There should be an ASA instance with Cluster Role set to
“Master”:
scope ssa
show app-instance
Step 2 Connect to the FXOS CLI on a chassis in the cluster that does not have the Master unit.
Step 3 Download the new FXOS platform bundle image to the chassis:
a) Enter firmware mode:
scope firmware
b) Download the FXOS platform bundle software image:
download image URL
Specify the URL for the file being imported using one of the following syntax:
• ftp://username@server/path/image_name
• scp://username@server/path/image_name
• sftp://username@server/path/image_name
• tftp://server:port-num/path/image_name
Example:
The following example copies an image using the SCP protocol:
Firepower-chassis # scope firmware
Firepower-chassis /firmware # download image
scp://[email protected]/images/fxos-k9.2.3.1.58.SPA
Firepower-chassis /firmware # scope download-task fxos-k9.2.3.1.58.SPA
Firepower-chassis /firmware/download-task # show detail
Download task:
File Name: fxos-k9.2.3.1.58.SPA
Protocol: scp
Server: 192.168.1.1
Userid:
Path:
Downloaded Image Size (KB): 853688
State: Downloading
Current Task: downloading image fxos-k9.2.3.1.58.SPA from
192.168.1.1(FSM-STAGE:sam:dme:FirmwareDownloaderDownload:Local)
Step 4 After the new FXOS platform bundle image has successfully downloaded, disable clustering for all security
modules on the chassis:
a) Connect to the module CLI using a console connection or a Telnet connection.
connect module slot_number {console | telnet}
To connect to the security engine of a device that does not support multiple security modules, always use
1 as the slot_number.
Example:
Firepower-module1>
If you are upgrading FXOS on the chassis as well as ASA, save the configuration so clustering will be
disabled after the chassis reboots:
write memory
d) Wait for the cluster to stabilize; verify all backup sessions have been created.
show cluster vpn-sessiondb summary
e) Repeat step 4 for each security module on this chassis.
Step 5 Exit the application console to the FXOS module CLI.
Enter Ctrl-a, d
show app
Make note of the ASA version for the software package you downloaded. You will need to use the exact
version string to enable the application in a later step.
Example:
The following example copies an image using the SCP protocol:
Firepower-chassis # scope ssa
Firepower-chassis /ssa # scope app-software
Firepower-chassis /ssa/app-software # download image
scp://[email protected]/images/cisco-asa.9.4.1.65.csp
Firepower-chassis /ssa/app-software # show download-task
Firepower-chassis /ssa/app-software # up
Application:
Name Version Description Author Deploy Type CSP Type Is Default App
---------- ---------- ----------- ---------- ----------- ----------- --------------
asa 9.4.1.41 N/A Native Application No
asa 9.4.1.65 N/A Native Application Yes
Step 11 To verify the status of the security modules/security engine and any installed applications, see Verify the
Installation, on page 132.
Step 12 After the upgraded security module come online, re-enable clustering for all security modules on the chassis:
a) Connect to the module CLI using a console connection or a Telnet connection.
connect module slot_number {console | telnet}
To connect to the security engine of a device that does not support multiple security modules, always use
1 as the slot_number.
Example:
Firepower-module1>
connect asa
Example:
Procedure
Example
Firepower-chassis# scope system
Firepower-chassis /system # show firmware monitor
FPRM:
Package-Vers: 2.3(1.58)
Upgrade-Status: Ready
Fabric Interconnect A:
Package-Vers: 2.3(1.58)
Upgrade-Status: Ready
Chassis 1:
Server 1:
Package-Vers: 2.3(1.58)
Upgrade-Status: Ready
Server 2:
Package-Vers: 2.3(1.58)
Upgrade-Status: Ready
Procedure
Example
Firepower-chassis# scope ssa
Firepower-chassis /ssa # show slot
Slot:
Slot ID Log Level Admin State Oper State
---------- --------- ------------ ----------
1 Info Ok Online
2 Info Ok Online
3 Info Ok Not Available
Firepower-chassis /ssa #
Firepower-chassis /ssa # show app-instance
App Name Identifier Slot ID Admin State Oper State Running Version Startup Version
Cluster State Cluster Role
---------- ---------- ---------- ----------- ---------------- --------------- ---------------
--------------- ------------
asa asa1 1 Enabled Online 9.10.0.85 9.10.0.85
Not Applicable None
asa asa2 2 Enabled Online 9.10.0.85 9.10.0.85
Not Applicable None
Firepower-chassis /ssa #