Guidelines and Limitations for Uninstalling
These important guidelines and limitations apply to uninstall.
Verify Uninstall is Supported for Your Patch
Uninstalling specific patches can cause issues on Firepower appliances, including:
-
Inability to deploy configuration changes after uninstall.
-
Incompatibilities between the operating system and the Firepower software.
-
FSIC (file system integrity check) failure when the appliance reboots, if you patched with security certifications compliance enabled (CC/UCAPL mode).
Caution |
If security certifications compliance is enabled and the FSIC fails, Firepower software does not start, remote SSH access is disabled, and you can access the appliance only via local console. If this happens, contact Cisco TAC. |
In these cases, if you need to revert to an earlier patch, we recommend you reimage and then upgrade.
The following table lists situations where you should not uninstall.
Platforms | Uninstalling From | If Upgraded From |
---|---|---|
FMC/FMCv |
6.5.0.1 |
6.5.0 |
Uninstall from Devices First, Using the Shell
In FMC deployments, uninstall patches from managed devices first. We recommend that FMCs run a higher version than their managed devices.
To uninstall a device patch, you must use the Linux shell, also called expert mode. This means that you uninstall from devices both individually and locally. In other words:
-
You cannot batch-uninstall patches from clustered, stacked, or high availability (HA) Firepower devices, or from clustered or failover ASA with FirePOWER Services devices. To plan an uninstall order that minimizes disruption, see Uninstall Order for HA/Scalability Deployments.
-
You cannot use an FMC, ASDM, or FDM to uninstall a patch from a device, nor can you use the local web interface on a 7000/8000 series device.
-
You cannot use an FMC user account to log into and uninstall the patch from one of its managed devices. Firepower appliances maintain their own user accounts.
-
You must have access to the device shell as the
admin
user for the device, or as another local user with CLI configuration access. If you disabled shell access, you cannot uninstall device patches. Contact Cisco TAC to reverse the device lockdown.
Uninstall from FMCs After Devices
Uninstall patches from FMCs after you uninstall from their managed devices. As with upgrade, you must uninstall from high availability FMCs one at a time; see Uninstall Order for HA/Scalability Deployments.
We recommend you use the FMC web interface to uninstall FMC patches. You must have Administrator access. If you cannot use the web interface, you can use the Linux shell as either the
admin
user for the shell, or as an external user with shell access. If you disabled shell access, contact Cisco TAC to reverse the FMC lockdown.
Verify NTP Synchronization
Before you uninstall, make sure Firepower appliances are synchronized with any NTP server you are using to serve time. Being out of sync can cause uninstall failure. In FMC deployments, the Time Synchronization Status health module does alert if clocks are out of sync by more than 10 seconds, but you should still check manually.
To check time:
-
FMC: Choose System > Configuration > Time.
-
Devices: Use the show time CLI command.
Appliance Access
Firepower devices can stop passing traffic during the uninstall (depending on interface configurations), or if the uninstall fails. Before you uninstall a patch from a Firepower device, make sure traffic from your location does not have to traverse the device itself to access the device's management interface. In Firepower Management Center deployments, you should also able to access the FMC management interface without traversing the device.
Disable ASA REST API on ASA FirePOWER Devices
Before you uninstall an ASA FirePOWER patch, make sure the ASA REST API is disabled. Otherwise, the uninstall could fail.
From the ASA CLI: no rest api agent
. You can reenable after the uninstall: rest-api agent
.
Unresponsive Uninstalls
Do not deploy changes to or from, manually reboot, or shut down an uninstalling appliance. Do not restart an uninstall in progress. The uninstall process may appear inactive at times; this is expected. If you encounter issues with the uninstall, including a failed uninstall or unresponsive appliance, contact Cisco TAC.
A failed uninstall may require a reimage, which returns most settings to factory defaults. For this reason, we strongly recommend you back up event and configuration data to an external location before you reimage.
Traffic Flow, Inspection, and Device Behavior
Interruptions in traffic flow and inspection during an uninstall are the same as the interruptions that occur during an upgrade. We strongly recommend performing any uninstall in a maintenance window or at a time when any interruption will have the least impact on your deployment. For more information, see Traffic Flow, Inspection, and Device Behavior.