Step 1 |
Connect to the FXOS CLI on the secondary unit, either the console port (preferred) or using SSH.
|
Step 2 |
Make both failover groups active on the primary unit.
-
Connect to the module CLI using a console connection or a Telnet connection.
connect
module
slot_number
{ console | telnet}
To connect to the security engine of a device that does not support multiple security modules, always use 1 as the slot_number .
Firepower# connect module 1 console
Telnet escape character is '~'.
Trying 127.5.1.1...
Connected to 127.5.1.1.
Escape character is '~'.
CISCO Serial Over LAN:
Close Network Connection to Exit
Firepower-module1>
-
Connect to the application console.
Firepower-module1> connect asa
Connecting to asa(asa1) console... hit Ctrl + A + D to return to bootCLI
[...]
asa>
-
Make both failover groups active on the primary unit.
The enable password is blank by default.
no failover active group 1
no failover active group 2
asa> enable
Password: <blank>
asa# no failover active group 1
asa# no failover active group 2
|
Step 3 |
Exit the application console to the FXOS module CLI.
|
Step 4 |
Return to the supervisor level of the FXOS CLI.
-
Enter ~
You exit to the Telnet application.
-
To exit the Telnet application, enter:
-
Enter Ctrl-], .
|
Step 5 |
On the Firepower security appliance that contains the secondary ASA logical device, download the new FXOS platform bundle image and ASA software image:
-
Connect to the FXOS CLI.
-
Enter firmware mode:
-
Download the FXOS platform bundle software image:
download image URL
Specify the URL for the file being imported using one of the following syntax:
-
ftp://username@server/ path/ image_name
-
scp://username@server/ path/ image_name
-
sftp://username@server/ path/ image_name
-
tftp://server: port-num/ path/ image_name
-
To monitor the download process:
scope download-task image_name
show detail
The following example copies an image using the SCP protocol:
Firepower-chassis # scope firmware
Firepower-chassis /firmware # download image scp://user@192.168.1.1/images/fxos-k9.2.3.1.58.SPA
Firepower-chassis /firmware # scope download-task fxos-k9.2.3.1.58.SPA
Firepower-chassis /firmware/download-task # show detail
Download task:
File Name: fxos-k9.2.3.1.58.SPA
Protocol: scp
Server: 192.168.1.1
Userid:
Path:
Downloaded Image Size (KB): 853688
State: Downloading
Current Task: downloading image fxos-k9.2.3.1.58.SPA from 192.168.1.1(FSM-STAGE:sam:dme:FirmwareDownloaderDownload:Local)
|
Step 6 |
After the new FXOS platform bundle image has successfully downloaded, upgrade the FXOS bundle:
-
If necessary, return to firmware mode:
-
Make note of the version number for the FXOS platform bundle you are installing:
-
Enter auto-install mode:
-
Install the FXOS platform bundle:
install platform platform-vers
version_number
version_number is the version number of the FXOS platform bundle you are installing--for example, 2.3(1.58).
-
The system will first verify the software package that you want to install. It will inform you of any incompatibility between
currently-installed applications and the specified FXOS platform software package. It will also warn you that any existing
sessions will be terminated and that the system will need to be rebooted as part of the upgrade. As long as the ASA version
is listed as upgradeable in the compatibility table, you can ignore these warnings.
Enter yes to confirm that you want to proceed with verification.
-
Enter yes to confirm that you want to proceed with installation, or enter no to cancel the installation.
FXOS unpacks the bundle and upgrades/reloads the components.
-
To monitor the upgrade process, see Monitor the Upgrade Progress.
|
Step 7 |
After all components have successfully upgraded, verify the status of the security modules/security engine and any installed
applications before continuing (see Verify the Installation).
|
Step 8 |
Download the new ASA software image to the chassis:
-
Enter Security Services mode:
-
Enter Application Software mode:
-
Download the logical device software image:
download image URL
Specify the URL for the file being imported using one of the following syntax:
-
ftp://username@server/path
-
scp://username@server/path
-
sftp://username@server/path
-
tftp://server:port-num/path
-
To monitor the download process:
-
To view the downloaded applications:
up
show app
Make note of the ASA version for the software package you downloaded. You will need to use the exact version string to enable
the application in a later step.
The following example copies an image using the SCP protocol:
Firepower-chassis # scope ssa
Firepower-chassis /ssa # scope app-software
Firepower-chassis /ssa/app-software # download image scp://user@192.168.1.1/images/cisco-asa.9.4.1.65.csp
Firepower-chassis /ssa/app-software # show download-task
Downloads for Application Software:
File Name Protocol Server Userid State
------------------------------ ---------- -------------------- --------------- -----
cisco-asa.9.4.1.65.csp Scp 192.168.1.1 user Downloaded
Firepower-chassis /ssa/app-software # up
Firepower-chassis /ssa # show app
Application:
Name Version Description Author Deploy Type CSP Type Is Default App
---------- ---------- ----------- ---------- ----------- ----------- --------------
asa 9.4.1.41 N/A Native Application No
asa 9.4.1.65 N/A Native Application Yes
|
Step 9 |
Upgrade the ASA logical device image:
-
Enter Security Services mode:
-
Set the scope to the security module you are updating:
-
Set the scope to the ASA application:
For FXOS 2.3.1 and earlier: scope app-instance asa
For FXOS 2.4.1 and later: scope app-instance asa
instance_name
-
Set the Startup version to the version you want to update:
set startup-version
version_number
-
Commit the configuration:
commit-buffer
Commits the transaction to the system configuration. The application image is updated and the application restarts.
|
Step 10 |
To verify the status of the security modules/security engine and any installed
applications, see Verify the Installation.
|
Step 11 |
Make both failover groups active on the secondary unit.
-
Connect to the module CLI using a console connection or a Telnet connection.
connect
module
slot_number
{ console | telnet}
To connect to the security engine of a device that does not support multiple security modules, always use 1 as the slot_number .
Firepower# connect module 1 console
Telnet escape character is '~'.
Trying 127.5.1.1...
Connected to 127.5.1.1.
Escape character is '~'.
CISCO Serial Over LAN:
Close Network Connection to Exit
Firepower-module1>
-
Connect to the application console.
Firepower-module1> connect asa
Connecting to asa(asa1) console... hit Ctrl + A + D to return to bootCLI
[...]
asa>
-
Make both failover groups active on the secondary unit.
The enable password is blank by default.
failover active group 1
failover active group 2
asa> enable
Password: <blank>
asa# failover active group 1
asa# failover active group 2
|
Step 12 |
Exit the application console to the FXOS module CLI.
|
Step 13 |
Return to the supervisor level of the FXOS CLI.
-
Enter ~
You exit to the Telnet application.
-
To exit the Telnet application, enter:
-
Enter Ctrl-], .
|
Step 14 |
On the Firepower security appliance that contains the primary ASA logical device, download the new FXOS platform bundle image and ASA software image:
-
Connect to the FXOS CLI.
-
Enter firmware mode:
-
Download the FXOS platform bundle software image:
download image URL
Specify the URL for the file being imported using one of the following syntax:
-
ftp://username@server/ path/ image_name
-
scp://username@server/ path/ image_name
-
sftp://username@server/ path/ image_name
-
tftp://server: port-num/ path/ image_name
-
To monitor the download process:
scope download-task image_name
show detail
The following example copies an image using the SCP protocol:
Firepower-chassis # scope firmware
Firepower-chassis /firmware # download image scp://user@192.168.1.1/images/fxos-k9.2.3.1.58.SPA
Firepower-chassis /firmware # scope download-task fxos-k9.2.3.1.58.SPA
Firepower-chassis /firmware/download-task # show detail
Download task:
File Name: fxos-k9.2.3.1.58.SPA
Protocol: scp
Server: 192.168.1.1
Userid:
Path:
Downloaded Image Size (KB): 853688
State: Downloading
Current Task: downloading image fxos-k9.2.3.1.58.SPA from 192.168.1.1(FSM-STAGE:sam:dme:FirmwareDownloaderDownload:Local)
|
Step 15 |
After the new FXOS platform bundle image has successfully downloaded, upgrade the FXOS bundle:
-
If necessary, return to firmware mode:
-
Make note of the version number for the FXOS platform bundle you are installing:
-
Enter auto-install mode:
-
Install the FXOS platform bundle:
install platform platform-vers
version_number
version_number is the version number of the FXOS platform bundle you are installing--for example, 2.3(1.58).
-
The system will first verify the software package that you want to install. It will inform you of any incompatibility between
currently-installed applications and the specified FXOS platform software package. It will also warn you that any existing
sessions will be terminated and that the system will need to be rebooted as part of the upgrade. As long as the ASA version
is listed as upgradeable in the compatibility table, you can ignore these warnings.
Enter yes to confirm that you want to proceed with verification.
-
Enter yes to confirm that you want to proceed with installation, or enter no to cancel the installation.
FXOS unpacks the bundle and upgrades/reloads the components.
-
To monitor the upgrade process, see Monitor the Upgrade Progress.
|
Step 16 |
After all components have successfully upgraded, verify the status of the
security modules/security engine and any installed applications before
continuing (see Verify the Installation).
|
Step 17 |
Download the new ASA software image to the chassis:
-
Enter Security Services mode:
-
Enter Application Software mode:
-
Download the logical device software image:
download image URL
Specify the URL for the file being imported using one of the following syntax:
-
ftp://username@server/path
-
scp://username@server/path
-
sftp://username@server/path
-
tftp://server:port-num/path
-
To monitor the download process:
-
To view the downloaded applications:
up
show app
Make note of the ASA version for the software package you downloaded. You will need to use the exact version string to enable
the application in a later step.
The following example copies an image using the SCP protocol:
Firepower-chassis # scope ssa
Firepower-chassis /ssa # scope app-software
Firepower-chassis /ssa/app-software # download image scp://user@192.168.1.1/images/cisco-asa.9.4.1.65.csp
Firepower-chassis /ssa/app-software # show download-task
Downloads for Application Software:
File Name Protocol Server Userid State
------------------------------ ---------- -------------------- --------------- -----
cisco-asa.9.4.1.65.csp Scp 192.168.1.1 user Downloaded
Firepower-chassis /ssa/app-software # up
Firepower-chassis /ssa # show app
Application:
Name Version Description Author Deploy Type CSP Type Is Default App
---------- ---------- ----------- ---------- ----------- ----------- --------------
asa 9.4.1.41 N/A Native Application No
asa 9.4.1.65 N/A Native Application Yes
|
Step 18 |
Upgrade the ASA logical device image:
-
Enter Security Services mode:
-
Set the scope to the security module you are updating:
-
Set the scope to the ASA application:
For FXOS 2.3.1 and earlier: scope app-instance asa
For FXOS 2.4.1 and later: scope app-instance asa
instance_name
-
Set the Startup version to the version you want to update:
set startup-version
version_number
-
Commit the configuration:
commit-buffer
Commits the transaction to the system configuration. The application image is updated and the application restarts.
|
Step 19 |
To verify the status of the security modules/security engine and any installed
applications, see Verify the Installation.
|
Step 20 |
If the failover groups are configured with Preempt Enabled, they automatically become active on their designated unit after
the preempt delay has passed. If the failover groups are not configured with Preempt Enabled, you can return them to active
status on their designated units using the ASDM Monitoring > Failover > Failover Group # pane.
|