Software Upgrades for Standalone Devices
Devices operate in maintenance mode while they upgrade. Entering maintenance mode at
the beginning of the upgrade causes a 2-3 second interruption in traffic
inspection. Interface configurations determine how a standalone
device handles traffic both then and during the upgrade.
Table 4. Traffic Flow and Inspection: Software Upgrades for Standalone Devices
Interface Configuration
|
Traffic Behavior
|
Firewall interfaces
|
Routed or switched including EtherChannel, redundant,
subinterfaces.
Switched interfaces are also known as bridge group or transparent
interfaces.
|
Dropped.
For bridge group interfaces on the ISA 3000 only,
you can use a FlexConfig policy to configure hardware bypass for
power failure. This causes traffic to drop during software
upgrades but pass without inspection while the device completes
its post-upgrade reboot.
|
IPS-only interfaces
|
Inline set, hardware bypass force-enabled: Bypass:
Force
|
Passed without inspection until you either disable hardware
bypass, or set it back to standby mode.
|
Inline set, hardware bypass standby mode: Bypass:
Standby
|
Dropped during the upgrade, while the device is in maintenance
mode. Then, passed without inspection while the device completes
its post-upgrade reboot.
|
Inline set, hardware bypass disabled: Bypass:
Disabled
|
Dropped.
|
Inline set, no hardware bypass module.
|
Dropped.
|
Inline set, tap mode.
|
Egress packet immediately, copy not inspected.
|
Passive, ERSPAN passive.
|
Uninterrupted, not inspected.
|
Software Upgrades for High Availability/Scalability
You should not experience interruptions in traffic flow or inspection while upgrading
high availability or clustered devices. For high availability pairs, the standby
device upgrades first. The devices switch roles, then the new standby upgrades.
For clusters, the data security module or modules upgrade first, then the control
module. During the control security module upgrade, although traffic inspection and
handling continues normally, the system stops logging events. Events for traffic
processed during the logging downtime appear with out-of-sync timestamps after the
upgrade is completed. However, if the logging downtime is significant, the system
may prune the oldest events before they can be logged.
Software Revert (Major/Maintenance Releases)
You should expect interruptions to traffic flow and inspection during revert, even in
a high availability/scalability deployment. This is because revert is more
successful when all units are reverted simultaneously. Simultaneous revert means
that interruptions to traffic flow and inspection depend on interface configurations
only, as if every device were standalone.
Software Uninstall (Patches)
For standalone devices, interruptions to traffic flow and inspection during patch
uninstall are the same as for upgrade. In high availability/scalability deployments,
you must explicitly plan an uninstall order that minimizes disruption. This is
because you uninstall patches from devices individually, even those that you
upgraded as a unit.
Deploying Configuration Changes
Restarting the Snort process briefly interrupts traffic flow and inspection on all
devices, including those configured for high availability/scalability. Interface
configurations determine whether traffic drops or passes without inspection during
the interruption. When you deploy without restarting Snort, resource demands may
result in a small number of packets dropping without inspection.
Snort typically restarts during the first deployment immediately after the upgrade.
It does not restart during other deployments unless, before deploying, you modify
specific policy or device configurations.
Table 5. Traffic Flow and Inspection: Deploying Configuration Changes
Interface Configuration
|
Traffic Behavior
|
Firewall interfaces
|
Routed or switched including EtherChannel, redundant,
subinterfaces.
Switched interfaces are also known as bridge group or transparent
interfaces.
|
Dropped.
|
IPS-only interfaces
|
Inline set, Failsafe enabled or
disabled.
|
Passed without inspection.
A few packets might drop if Failsafe is
disabled and Snort is busy but not down.
|
Inline set, Snort Fail Open: Down:
disabled.
|
Dropped.
|
Inline set, Snort Fail Open: Down:
enabled.
|
Passed without inspection.
|
Inline set, tap mode.
|
Egress packet immediately, copy not inspected.
|
Passive, ERSPAN passive.
|
Uninterrupted, not inspected.
|