PDF

Contents
Introduction
Prerequisites
Requirements
Components Used
Background Information
Type of Updates
Configure Firepower Module Updates
Install Product (Firmware) Update
Install VDB Update
Install Rule Updates
One-Time Rule Update/Rule Import
Recurring Rule Update Imports
Install Geolocation Updates
One-Time Geolocation Updates
Recurring Geolocation Updates
Verify the Update Installation
Troubleshoot
Related Information
Introduction
This document describes the various Upgrade/Update/Patch available in Firepower module and
their installation procedure using Adaptive Security Device Manager (On-Box Management).
Contributed by Avinash, Prashant Joshi, and Sunil Kumar, Cisco TAC Engineers.
Prerequisites
Requirements
Cisco recommends that you have knowledge of these topics:
●
●
Knowledge of Adaptive Security Appliance(ASA) firewall and Adaptive Security Device
Manager (ASDM)
Firepower Appliance Knowledge
Components Used
The information in this document is based on these software and hardware versions:
●
●
ASA Firepower modules (ASA 5506X/5506H-X/5506W-X, ASA 5508-X, ASA 5516-X )
running software version 5.4.1 and above
ASA Firepower module (ASA 5515-X, ASA 5525-X, ASA 5545-X, ASA 5555-X) running
software version 6.0.0 and above
The version of ASDM depends on the version running on the ASA. A detailed compatibility
matrix ASA and ASDM Compatibility
The information in this document is created from the devices in a particular lab environment. All of
the devices used in this document started with a cleared (default) configuration. If your network is
live, make sure that you understand the potential impact of any command.
●
Background Information
Type of Updates
Firepower module has these types of updates:
●
●
●
●
Product (Firmware) Upgrade/ Patch
Vulnerability Database (VDB) Update
Rule (Signature) Update
Geolocation Update
Configure Firepower Module Updates
Install Product (Firmware) Update
Product Updates are of two types.
Type 1. Product upgrade is the upgrading system from minor version to major version.
For Example: Upgrading Firepower from version 5.4.x to 6.0.x. These updates contain major
enhancement in product functionality.
Type 2. Patch installation is a minor upgrade which includes the bug fixes for the current version.
For Example: Upgrading Firepower Module from Version 5.4.1 to 5.4.x.
Note: Cisco recommends to review Release Notes before installation of any update/patch.
In order to install product updates/patch for the Firepower Module, navigate to Configuration >
ASA Firepower Configuration > Updates.
Here,
you
get
twoimage,
Manual
As
Vulnerability
Auto
Once
shown
Download:
the
Update:
update
in
the
Database
Download
Ifisoptions.
Firepower
manually
(aVDB)
progress
the
Module
uploaded
update
Product
has
contains
appears
or
Upgrade/
Internet
downloaded
updates
while
Patch
access,
uploading
from
from
forFirepower
updates
Application
Cisco
Cisco
aupgrade
site,
website,
file
can
site
Module
toSelect
Detection
be
to
Firepower
the
downloaded
Select
can
local
the (Application
download
version
the
module.
system
version
directly
and
and
theand
click
1.
Tip:
Navigate
to Monitoring
>bar
Task
Status
to monitor
the
installation.
from
upload
the
it
Cisco
manually
site
by
clicking
clicking
the
Upload
Download
Update.
Updates.
Select
File andUpdates.
browse the file from the
the install
Filter)
VDB
click
the
updates
and
install
VDB
icon,
directly
icon,
update.
as by
shown
as
from
VDB
shown
in
Cisco
the
update
inimage.
website
the
isimage.
listed
by clicking
under
Product
onChoose
the Download
Updates.
1. Tip: Navigate to Monitoring > Task Status, in order to monitor the VDB installation.
Install Rule Updates
Rule (Signature) updates are Cisco IOS Intrusion Prevention System (IPS) signature updates
which Cisco TALOS team releases on a regular basis to provide the coverage for latest threats.
In order to install Rule Updates, navigate to Configuration > ASA Firepower Configuration >
Updates and then click Rule Updates.
There are two options to configure the rule updates.
●
●
One-Time Rule Update/ Rule Import
Recurring Rule Update Import
One-Time Rule Update/Rule Import
One-Time Rule Update/Rule Import is a manual process of updating signatures. Here, you have
two options.
Auto download: If Firepower Module has Internet connectivity, select Download Rule update
from the support site.
Manual Update: If you have manually downloaded the rule update file from Cisco website at your
local system then select Rule update or text rule file to upload and install and then click
Choose File to upload the signature file.
Once the upload/download of rules is complete, you can select Reapply all policies after rule
update import completes then click Import to automatically apply the signature update to all
Access Control policies after the Rule update/install has completed.
To apply policies manually, leave the checkbox uncheck.
1. Tip: In order to monitor rule import installation, navigate to Configuration > ASA Firepower
Configuration > Updates > rule Updates > Rule Update log.
Recurring Rule Update Imports
Recurring Rule Update option is to schedule the Firepower Module to check for rule updates.
Download and install new rule if new rule database is available.
Note: Firepower Module must have connectivity to Cisco Support Site.
In order to configure Recurring Rule Updates, Select Enable Recurring Rule Update Imports
from the Support Site. Configure frequency to check for the new Rule Update and download/
install rule update if available.
You can choose to apply access policies automatically by selecting Deploy updated policies to
targeted devices after rule update completes if you want to apply new rule changes to the
module and then click Save.
1. Tip: In order to monitor rule import installation, navigate to Configuration > ASA Firepower
Configuration > Updates > Rule Updates > Rule Update log.
Install Geolocation Updates
Geolocation update.
There are two options to configure the Geolocation updates, they are as follows:
One-Time Geolocation Updates
One-Time Geolocation Updates is a manual process of updating Geolocation database. There are
two ways to get these updates.
Manual Update: If you have manually downloaded the geolocation file from Cisco website then
select Upload and install geolocation update and click Choose File to upload the geolocation
file.
Auto download: If Firepower Module has internet connectivity, select Download and Install
geolocation update from the Support Site and click Import.
Recurring Geolocation Updates
Recurring Geolocation Updates option is an user-defined schedule to check for the availability of
geolocation updates. It downloads and installs the new database if available.
Note: Firepower Module must have connectivity to Cisco Support Site.
In order to configure Recurring Geolocation Updates, Select Enable Recurring Weekly Updates
from the Support Site and define the frequency to check the Geolocation Updates & download/
install the updates if it is available and then click Save.
1. Tip: In order to monitor the upgrade installation, navigate to Monitoring > Task Status.
Verify the Update Installation
In order to verify the various update installation, navigate to Configuration > ASA Firepower
Configuration > System Information.
Software version and OS: The OS section shows the upgraded version of the software
VDB Version: VDB shows the upgraded version of VDB
Geolocation Update version: Geolocation Update Version
Rule Update Version: Shows SRU version
Troubleshoot
There is currently no specific troubleshooting information available for this configuration.
Related Information
●
Technical Support & Documentation - Cisco Systems