Understanding Upgrades, Downgrades, and System Images
Caution You cannot use the
downgrade command to revert to a previous major or minor version, for example, from Cisco IPS 7.3 to 7.2. You can only use the
downgrade command to downgrade from the latest signature update or signature engine update. To revert to 7.2, you must reimage the sensor.
Note After you upgrade any IPS software on your sensor, you must restart the IDM to see the latest software features.
Note You cannot downgrade the sensor using the recovery partition. To downgrade to an earlier version, you must install the appropriate system image file (.img file).
Note During a signature upgrade all signature configurations are retained, both the signature tunings as well as the custom signatures. During a signature downgrade the current signature configuration is replaced with the old signature configuration. So if the last signature set had custom signatures and/or signature tunings, these are restored during the downgrade. Threat profiles may also be upgraded during signature upgrades
You can upgrade and downgrade the software on the sensor. Upgrading applies a service pack, signature update, (which includes threat profile updates), signature engine update, minor version, major version, or recovery partition file. Downgrading removes the last applied service pack or signature update from the sensor. With a signature downgrade, the threat profile is downgraded to the version available in the previous signature version.
You can recover the application partition image on your sensor if it becomes unusable. Using the
recover
command lets you retain your host settings while other settings revert to the factory defaults.
To install a new system image on the sensor, use ROMMON, the bootloader file, or the maintenance partition depending on which platform you have. When you install a new system image on your sensor, all accounts are removed and the default cisco account is reset to use the default password
cisco
. After installing the system image, you must initialize the sensor again.
After you reimage and initialize your sensor, upgrade your sensor with the most recent service pack, signature update, signature engine update, minor update, major update, and recovery partition files.
For More Information
Upgrading the Sensor
Note For the IDM procedure for upgrading the sensor, see Manually Updating the Sensor.
This section explains how to use the
upgrade
command to upgrade the software on the sensor. It contains the following topics:
Manually Upgrading the Sensor
Caution You must log in to Cisco.com using an account with cryptographic privileges to download software. The first time you download software on Cisco.com, you receive instructions for setting up an account with cryptographic privileges.
Caution Do not change the filename. You must preserve the original filename for the sensor to accept the update.
Note During a signature upgrade all signature configurations are retained, both the signature tunings as well as the custom signatures. During a signature downgrade the current signature configuration is replaced with the old signature configuration. So if the last signature set had custom signatures and/or signature tunings, these are restored during the downgrade.
Use the
upgrade
source-url
command to apply service pack, signature update, engine update, minor version, major version, or recovery partition file upgrades. The following options apply:
-
source-url
—Specifies the location of the source file to be copied:
– ftp:—Source URL for an FTP network server. The syntax for this prefix is:
ftp://[[username@]location][/relativeDirectory]/filename
ftp://[[username@]location][//absoluteDirectory]/filename
Note You are prompted for a password.
– scp:—Source URL for the SCP network server. The syntax for this prefix is:
scp://[[username@]location][/relativeDirectory]/filename
scp://[[username@]location][//absoluteDirectory]/filename
Note You are prompted for a password. You must add the remote host to the SSH known hosts list.
– http:—Source URL for the web server. The syntax for this prefix is:
http://[[username@]location][/directory]/filename
Note The directory specification should be an absolute path to the desired file.
– https:—Source URL for the web server. The syntax for this prefix is:
https://[[username@]location][/directory]/filename
Note The directory specification should be an absolute path to the desired file. The remote host must be a TLS trusted host.
Upgrading the Sensor
Note The CLI output is an example of what your configuration may look like. It will not match exactly due to the optional setup choices, sensor model, and IPS version you have installed.
To upgrade the sensor, follow these steps:
Step 1 Download the appropriate file to an FTP, SCP, HTTP, or HTTPS server that is accessible from your sensor.
Step 2 Log in to the CLI using an account with administrator privileges.
Step 3 Enter configuration mode.
sensor# configure terminal
Step 4 Upgrade the sensor.
sensor(config)# upgrade url/IPS-4360-K9-7.3-1-E4.pkg
The URL points to where the update file is located, for example, to retrieve the update using FTP, enter the following:
sensor(config)# upgrade ftp://username@ip_address//directory/IPS-4360-K9-7.3-1-E4.pkg
Step 5 Enter the password when prompted.
Step 6 Enter
yes
to complete the upgrade.
Note Major updates, minor updates, and service packs may force a restart of the IPS processes or even force a reboot of the sensor to complete installation.
Note The operating system is reimaged and all files that have been placed on the sensor through the service account are removed.
Step 7 Verify your new sensor version.
Cisco Intrusion Prevention System, Version 7.3(1)E4 Signature Update S741.0 2013-09-10 Serial Number: FGL1702401M Licensed, expires: 21-Nov-2014 UTC Using 14372M out of 15943M bytes of available memory (90% usage) system is using 32.4M out of 160.0M bytes of available disk space (20% usage) application-data is using 85.6M out of 376.4M bytes of available disk space (24% usage) boot is using 63.1M out of 70.2M bytes of available disk space (95% usage) application-log is using 494.0M out of 513.0M bytes of available disk space (96% usage) MainApp C-2013_12_16_14_00_7_3_0_143 (Release) 2013-12-16T14:06:20-0600 Running AnalysisEngine C-2013_12_16_14_00_7_3_0_143 (Release) 2013-12-16T14:06:20-0600 Running CollaborationApp C-2013_12_16_14_00_7_3_0_143 (Release) 2013-12-16T14:06:20-0600 Running CLI C-2013_12_16_14_00_7_3_0_143 (Release) 2013-12-16T14:06:20-0600 IPS-K9-7.3-1-E4 11:22:07 UTC Sat Jan 19 2013 Recovery Partition Version 1.1 - 7.3(1)E4 Host Certificate Valid from: 09-Oct-2014 to 09-Oct-2016
For More Information
Upgrading the Recovery Partition
Note You cannot downgrade the sensor using the recovery partition. To downgrade to an earlier version, you must install the appropriate system image file (.img file).
Use the
upgrade
command to upgrade the recovery partition with the most recent version so that it is ready if you need to recover the application partition on your sensor. Recovery partition images are generated for major and minor updates and only in rare situations for service packs or signature updates.
To upgrade the recovery partition on your sensor, follow these steps:
Step 1 Download the appropriate recovery partition image file to an FTP, SCP, HTTP, or HTTPS server that is accessible from your sensor.
Caution Some browsers add an extension to the filename. The filename of the saved file must match what is displayed on the download page or you cannot use it to upgrade the recovery partition.
Step 2 Log in to the CLI using an account with administrator privileges.
Step 3 Enter configuration mode.
sensor# configure terminal
Step 4 Upgrade the recovery partition.
sensor(config)# upgrade scp://user@server_ipaddress//upgrade_path/IPS-4360-K9-r-1.1-a-7.3-1-E4.pkg sensor(config)# upgrade ftp://user@server_ipaddress//upgrade_path/IPS-4360-K9-r-1.1-a-7.3-1-E4.pkg
Step 5 Enter the server password. The upgrade process begins.
Note This procedure only reimages the recovery partition. The application partition is not modified by this upgrade. To reimage the application partition after the recovery partition, use the recover application-partition command.
For More Information
Configuring Automatic Upgrades
This section describes how to configure the sensor to automatically look for upgrades in the upgrade directory and how to apply an update immediately. It contains the following topics:
Understanding Automatic Upgrades
You can configure the sensor to look for new upgrade files in your upgrade directory automatically. For example, several sensors can point to the same remote FTP server directory with different update schedules, such as every 24 hours, or Monday, Wednesday, and Friday at 11:00 pm.
You specify the following information to schedule automatic upgrades:
-
Server IP address
-
Path of the directory on the file server where the sensor checks for upgrade files
-
File copy protocol (SCP or FTP)
-
Username and password
-
Upgrade schedule
You must download the software upgrade from Cisco.com and copy it to the upgrade directory before the sensor can poll for automatic upgrades.
For More Information
Using the auto-upgrade Command
Use the
auto-upgrade-option
enabled
command in the service host mode to configure automatic upgrades.
The following options apply:
-
cisco-server {disabled | enabled}
—Enables automatic signature and engine updates from Cisco.com.
-
cisco-url
cisco_url
—Specifies the Cisco server locator service. You do not need to change this unless the www.cisco.com IP address changes.
-
default
— Sets the value back to the system default setting.
-
directory
directory
— Specifies the directory where upgrade files are located on the file server. A leading ‘/’ indicates an absolute path.
-
file-copy-protocol {ftp | scp}
— Specifies the file copy protocol used to download files from the file server.
Note If you use SCP, you must use the ssh host-key command to add the server to the SSH known hosts list so the sensor can communicate with it through SSH.
-
ip-address
ip_address
—Specifies the IP address of the file server.
-
password
password
—Specifies the user password for Cisco server authentication.
-
schedule-option
—Specifies the schedules for when Cisco server automatic upgrades occur. Calendar scheduling starts upgrades at specific times on specific days. Periodic scheduling starts upgrades at specific periodic intervals.
–
calendar-schedule
—Configures the days of the week and times of day that automatic upgrades will be performed.
–
days-of-week
—Specifies the days of the week on which auto-upgrades will be performed. You can select multiple days:
sunday
through
saturday
are the valid values.
–
no
—Removes an entry or selection setting.
–
times-of-day
—Specifies the times of day at which auto-upgrades will begin. You can select multiple times. The valid value is
hh:mm[:ss]
.
–
periodic-schedule
—Specifies the time that the first automatic upgrade should occur, and how long to wait between automatic upgrades.
–
interval
—Specifies the number of hours to wait between automatic upgrades. Valid values are 1 to 8760. The default value is 24.
–
start-time
—Specifies the time of day to start the first automatic upgrade. The valid value is
hh:mm[:ss]
.
-
user-name
user_name
—Specifies the username for server authentication.
-
user-server {disabled | enabled}
—Enables automatic upgrades from a user-defined server.
Configuring Automatic Upgrades
If you get an unauthorized error message while configuring an automatic update, make sure you have the correct ports open on any firewalls between the sensor and Cisco.com. For example, you need port 443 for the initial automatic update connection to www.cisco.com, and you need port 80 to download the chosen package from a Cisco file server. The IP address may change for the Cisco file server, but you can find it in the lastDownloadAttempt section in the output of the
show statistics host
command.
Note To check the status of the last automatic update or the next scheduled automatic update, run the show statistics host command and check the Auto Update Statistics section.
To schedule automatic upgrades, follow these steps:
Step 1 Log in to the CLI using an account with administrator privileges.
Step 2 Enter automatic upgrade submode.
sensor# configure terminal sensor(config)# service host sensor(config-hos)# auto-upgrade
Step 3 Configure the sensor to automatically look for new upgrades either on Cisco.com or on your file server:
a. On Cisco.com. Continue with Step 4.
sensor(config-hos-aut)# cisco-server enabled
b. From your server.
sensor(config-hos-aut)# user-server enabled
c. Specify the IP address of the file server.
sensor(config-hos-ena)# ip-address 10.1.1.1
d. Specify the directory where the upgrade files are located on the file server.
sensor(config-hos-ena)# directory /tftpboot/sensor_updates
e. Specify the file server protocol.
sensor(config-hos-ena)# file-copy-protocol ftp
Note If you use SCP, you must use the ssh host-key command to add the server to the SSH known hosts list so the sensor can communicate with it through SSH.
Step 4 Specify the username for authentication.
sensor(config-hos-ena)# user-name tester
Step 5 Specify the password of the user.
sensor(config-hos-ena)# password Re-enter password: ******
Step 6 Specify the scheduling:
a. For calendar scheduling (starts upgrades at specific times on specific day):
sensor(config-hos-ena)# schedule-option calendar-schedule sensor(config-hos-ena-cal)# days-of-week sunday sensor(config-hos-ena-cal)# times-of-day 12:00:00
b. For periodic scheduling (starts upgrades at specific periodic intervals):
sensor(config-hos-ena)# schedule-option periodic-schedule sensor(config-hos-ena-per)# interval 24 sensor(config-hos-ena-per)# start-time 13:00:00
Step 7 Verify the settings.
sensor(config-hos-ena)# show settings ----------------------------------------------- ----------------------------------------------- ----------------------------------------------- ----------------------------------------------- ----------------------------------------------- directory: /tftpboot/update/6.1_dummy_updates file-copy-protocol: ftp default: scp -----------------------------------------------
Step 8 Exit automatic upgrade submode.
sensor(config-hos-ena)# exit
Step 9 Press
Enter
to apply the changes or type
no
to discard them.
For More Information
Applying an Immediate Update
Use the
autoupdatenow
command to perform an immediate update on the sensor. You receive a warning that this command performs an update on the sensor immediately. After executing this command, disable the
user-server/cisco-server
options in the auto-upgrade settings in the service host submode, if you do not want scheduled automatic updates.
Note You must have either a DNS or HTTP proxy server configured to download automatic updates from cisco.com.
Note You must have automatic update configured and a valid license to apply updates.
To perform an immediate update on the sensor, follow these steps:
Step 1 Log in to the sensor using an account with administrator privileges.
Step 2 Start immediate automatic update.
Warning: Executing this command will perform an auto-upgrade on the sensor immediately. Before executing this command, you must have a valid license to apply the Signature AutoUpdates and auto-upgrade settings configured.After executing this command please disable user-server/cisco-server inside 'auto-upgrade' settings, if you don't want scheduled auto-updates
Step 3 Enter
yes
to continue. The update is applied.
Step 4 Check to see if the update was applied.
sensor# show statistics host lastDirectoryReadAttempt = N/A lastDownloadAttempt = N/A
Recovering the Application Partition
You can recover the application partition image for the sensor if it becomes unusable. Some network configuration information is retained when you use this method, which lets you have network access after the recovery is performed. Use the
recover
application-partition
command to boot to the recovery partition, which automatically recovers the application partition on your sensor. If you have upgraded your recovery partition to the most recent version before you recover the application partition image, you can install the most up-to-date software image.
Because you can execute the
recover
application-partition
command through a Telnet or SSH connection, we recommend using this command to recover sensors that are installed at remote locations.
Note When you reconnect to the sensor after recovery, you must log in with the default username and password cisco.
Recovering the Application Partition Image
To recover the application partition image, follow these steps:
Step 1 Download the recovery partition image file to an FTP, HTTP, or HTTPS server that is accessible from your sensor.
Step 2 Log in to the CLI using an account with administrator privileges.
Step 3 Enter configuration mode.
sensor# configure terminal
Step 4 Recover the application partition image.
sensor(config)# recover application-partition Warning: Executing this command will stop all applications and re-image the node to version 7.1(x)E4. All configuration changes except for network settings will be reset to default. Continue with recovery? []:
Step 5 Enter
yes
to continue. Shutdown begins immediately after you execute the
recover
command. Shutdown can take a while, and you will still have access to the CLI, but access will be terminated without warning.
The application partition is reimaged using the image stored on the recovery partition. You must now initialize the sensor with the
setup
command.The IP address, netmask, access lists, time zone, and offset are saved and applied to the reimaged application partition. If you executed the
recover application-partition
command remotely, you can SSH to the sensor with the default username and password (
cisco
/
cisco
) and then initialize the sensor again with the
setup
command. You cannot use Telnet until you initialize the sensor because Telnet is disabled by default.
For More Information
Installing System Images
Caution All user configuration settings are lost when you install the system image. Before trying to recover the sensor by installing the system image, try to recover by using the
recover application-partition command or by selecting the recovery partition during sensor bootup.
This section contains the procedures for installing system images on the appliances and modules. It contains the following topics:
For More Information
For the procedure for using the
recover application-partition
command, see Recovering the Application Partition.
ROMMON
Some Cisco sensors include a preboot CLI called ROMMON, which lets you boot images on sensors where the image on the primary device is missing, corrupt, or otherwise unable to boot the normal application. ROMMON is particularly useful for recovering remote sensors as long as the serial console port is available.
Access to ROMMON is available only through the serial console port, a Cisco-standard asynchronous RS-232C DTE available in an RJ-45F connector on the sensor chassis. The serial port is configured for 9600 baud, 8 data bits, 1 stop bit, no parity, and no flow control.
For More Information
For the procedure for using a terminal server, see Connecting an Appliance to a Terminal Server.
TFTP Servers
ROMMON uses TFTP to download an image and launch it. TFTP does not address network issues such as latency or error recovery. It does implement a limited packet integrity check so that packets arriving in sequence with the correct integrity value have an extremely low probability of error. But TFTP does not offer pipelining so the total transfer time is equal to the number of packets to be transferred times the network average RTT. Because of this limitation, we recommend that the TFTP server be located on the same LAN segment as the sensor. Any network with an RTT less than a 100 milliseconds should provide reliable delivery of the image. Be aware that some TFTP servers limit the maximum file size that can be transferred to ~32 MB.
Connecting an Appliance to a Terminal Server
A terminal server is a router with multiple, low speed, asynchronous ports that are connected to other serial devices. You can use terminal servers to remotely manage network equipment, including appliances.
To set up a Cisco terminal server with RJ-45 or hydra cable assembly connections, follow these steps:
Step 1 Connect to a terminal server using one of the following methods:
-
For terminal servers with RJ-45 connections, connect a rollover cable from the console port on the appliance to a port on the terminal server.
-
For hydra cable assemblies, connect a straight-through patch cable from the console port on the appliance to a port on the terminal server.
Step 2 Configure the line and port on the terminal server. In enable mode, enter the following configuration, where # is the line number of the port to be configured.
Step 3 Be sure to properly close a terminal session to avoid unauthorized access to the appliance. If a terminal session is not stopped properly, that is, if it does not receive an exit(0) signal from the application that initiated the session, the terminal session can remain open. When terminal sessions are not stopped properly, authentication is not performed on the next session that is opened on the serial port.
Caution Always exit your session and return to a login prompt before terminating the application used to establish the connection.
Caution If a connection is dropped or terminated by accident, you should reestablish the connection and exit normally to prevent unauthorized access to the appliance.
Installing the IPS 4300 Series Sensor System Images
Note This procedure is for IPS 4345, but is also applicable to IPS 4360. The system image for IPS 4360 has “4360” in the filename.
You can install the IPS 4345 and IPS 4360 system image by using the ROMMON on the appliance to TFTP the system image on to the compact flash device. To install the IPS 4345 and IPS 4360 system image, follow these steps:
Step 1 Download the IPS 4345 system image file to the tftp root directory of a TFTP server that is accessible from your IPS 4345.
Note Make sure you can access the TFTP server location from the network connected to the Ethernet port of your IPS 4345.
Step 2 Boot the IPS 4345.
Booting system, please wait... Embedded BIOS Version 1.0(5)0 09/14/04 12:23:35.90 Bus Dev Func VendID DevID Class Irq 00 00 00 8086 2578 Host Bridge 00 01 00 8086 2579 PCI-to-PCI Bridge 00 03 00 8086 257B PCI-to-PCI Bridge 00 1C 00 8086 25AE PCI-to-PCI Bridge 00 1D 00 8086 25A9 Serial Bus 11 00 1D 01 8086 25AA Serial Bus 10 00 1D 04 8086 25AB System 00 1D 05 8086 25AC IRQ Controller 00 1D 07 8086 25AD Serial Bus 9 00 1E 00 8086 244E PCI-to-PCI Bridge 00 1F 00 8086 25A1 ISA Bridge 00 1F 02 8086 25A3 IDE Controller 11 00 1F 03 8086 25A4 Serial Bus 5 00 1F 05 8086 25A6 Audio 5 02 01 00 8086 1075 Ethernet 11 03 01 00 177D 0003 Encrypt/Decrypt 9 03 02 00 8086 1079 Ethernet 9 03 02 01 8086 1079 Ethernet 9 03 03 00 8086 1079 Ethernet 9 03 03 01 8086 1079 Ethernet 9 04 02 00 8086 1209 Ethernet 11 04 03 00 8086 1209 Ethernet 5 Evaluating BIOS Options ... Launch BIOS Extension to setup ROMMON Cisco Systems ROMMON Version (1.0(5)0) #1: Tue Sep 14 12:20:30 PDT 2004 MAC Address: 0000.c0ff.ee01
Step 3 Press
Break
or
Esc
at the following prompt while the system is booting to interrupt boot. Press the spacebar to begin boot immediately.
Note You have ten seconds to press Break or Esc.
Use BREAK or ESC to interrupt boot. Use SPACE to begin boot immediately.
The system enters ROMMON mode. The
rommon>
prompt appears.
Step 4 Check the current network settings.
ROMMON Variable Settings:
The variables have the following definitions:
-
Address—Local IP address of the IPS 4345.
-
Server—TFTP server IP address where the application image is stored.
-
Gateway—Gateway IP address used by the IPS 4345.
-
Port—Ethernet interface used for the IPS 4345 management.
-
VLAN—VLAN ID number (leave as untagged).
-
Image—System image file/path name.
-
Config—Unused by these platforms.
Note Not all values are required to establish network connectivity. The address, server, gateway, and image values are required. If you are not sure of the settings needed for your local environment, contact your system administrator.
Step 5 If necessary, change the interface used for the TFTP download.
Note The default interface used for TFTP downloads is Management 0/0, which corresponds to the MGMT interface of the IPS 4345.
rommon> PORT=interface_name
Step 6 If necessary, assign an IP address for the local port on the IPS 4345.
rommon> ADDRESS=ip_address
Note Use the same IP address that is assigned to the IPS 4345.
Step 7 Assign the TFTP server IP address.
rommon> SERVER=ip_address
Step 8 If necessary, assign the gateway IP address.
rommon> GATEWAY=ip_address
Step 9 Verify that you have access to the TFTP server by pinging it from your local Ethernet port with one of the following commands:
rommon> ping server_ip_address
Step 10 If necessary define the path and filename on the TFTP file server from which you are downloading the image.
rommon> IMAGE=path file_name
Caution Make sure that you enter the
IMAGE command in all uppercase. You can enter the other ROMMON commands in either lower case or upper case, but the
IMAGE command specifically must be all uppercase.
UNIX Example
rommon> IMAGE=system_images/IPS-4345-K9-sys-1.1-a-7.3-1-E4.img
Note The path is relative to the default tftpboot directory of the UNIX TFTP server. Images located in the default tftpboot directory do not have any directory names or slashes in the IMAGE specification.
Windows Example
rommon> IMAGE=system_images/IPS-4345-K9-sys-1.1-a-7.3-1-E4.img
Step 11 Enter
set
and press
Enter
to verify the network settings.
Note You can use the sync command to store these settings in NVRAM so they are maintained across boots. Otherwise, you must enter this information each time you want to boot an image from ROMMON.
Step 12 Download and install the system image.
Caution To avoid corrupting the system image, do not remove power from the IPS 4345 while the system image is being installed.
Note If the network settings are correct, the system downloads and boots the specified image on the IPS 4345. Be sure to use the IPS 4345 image.
For More Information
Installing the IPS 4500 Series Sensor System Images
Note The following procedure references the IPS 4510 but it also refers to the IPS 4520 and IPS 4520-XL.
You can install the IPS 4500 series sensor system image by using the ROMMON on the appliance to TFTP the system image onto the compact flash device.
To install the IPS 4510 system image, follow these steps:
Step 1 Download the IPS 4510 system image file to the tftp root directory of a TFTP server that is accessible from your IPS 4510.
Note Make sure you can access the TFTP server location from the network connected to the Management port of your IPS 4510.
Step 2 Boot the IPS 4510.
Step 3 Press
Break
or
Esc
at the following prompt while the system is booting to interrupt boot. Press the spacebar to begin boot immediately.
Note You have ten seconds to press Break or Esc.
Use BREAK or ESC to interrupt boot. Use SPACE to begin boot immediately.
The system enters ROMMON mode. The
rommon>
prompt appears.
Step 4 Check the current network settings.
ROMMON Variable Settings:
The variables have the following definitions:
-
Address—Specifies the local IP address of the IPS 4510.
-
Server—Specifies the TFTP server IP address where the application image is stored.
-
Gateway—Specifies the gateway IP address used by the IPS 4510.
-
Port—Specifies the Ethernet interface used for IPS 4510 management.
-
VLAN—Specifies the VLAN ID number (leave as untagged).
-
Image—Specifies the system image file/path name.
-
Config—Unused by these platforms.
Note Not all values are required to establish network connectivity. The address, server, gateway, and image values are required. If you are not sure of the settings needed for your local environment, contact your system administrator.
Step 5 If necessary, assign an IP address for the Management port on the IPS 4510.
rommon> ADDRESS=ip_address
Note Use the same IP address that is assigned to the IPS 4510.
Step 6 If necessary, assign the TFTP server IP address.
rommon> SERVER=ip_address
Step 7 If necessary, assign the gateway IP address.
rommon> GATEWAY=ip_address
Step 8 Verify that you have access to the TFTP server by pinging it from your local Ethernet port with one of the following commands:
rommon> ping server_ip_address
Step 9 If necessary define the path and filename on the TFTP file server from which you are downloading the image.
rommon> IMAGE=path/file_name
UNIX Example
rommon> IMAGE=/system_images/IPS-4510-K9-sys-1.1-a-7.3-1-E4.img
Note The path is relative to the UNIX TFTP server default tftpboot directory. Images located in the default tftpboot directory do not have any directory names or slashes in the IMAGE specification.
Windows Example
rommon> IMAGE=\system_images\IPS-4510-K9-sys-1.1-a-7.3-1-E4.img
Step 10 Enter
set
and press
Enter
to verify the network settings.
Note You can use the sync command to store these settings in NVRAM so they are maintained across boots. Otherwise, you must enter this information each time you want to boot an image from ROMMON.
Step 11 Download and install the system image.
Caution To avoid corrupting the system image, do not remove power from the IPS 4510 while the system image is being installed.
Note If the network settings are correct, the system downloads and boots the specified image on the IPS 4510. Be sure to use the IPS 4510 image.
For More Information
Installing the ASA 5500-X Series Sensor System Image
Note Be sure the TFTP server that you specify can transfer files up to 60 MB in size.
Note The CLI output is an example of what your configuration may look like. It will not match exactly due to the optional setup choices, sensor model, and IPS version you have installed.
To install the system image on the ASA 5500-X IPS SSP, follow these steps:
Step 1 Download the IPS system image file corresponding to your ASA platform to the TFTP root directory of a TFTP server that is accessible from your adaptive security appliance.
Note Make sure you can access the TFTP server location from the network connected to the Ethernet port of the adaptive security appliance.
Step 2 Log in to the adaptive security appliance.
Step 3 Enter enable mode.
Step 4 Copy the IPS image to the disk0 flash of the adaptive security appliance.
asa# copy tftp://192.0.2.0/directory/IPS-5545-K9-sys-1.1-a-7.1-3-E4.aip disk0:
Step 5 Image the ASA 5500-X IPS SSP.
asa# sw-module module ips recover configure image disk0:/IPS-SSP_5545-K9-sys-1.1-a-7.3-1-E4.aip
Step 6 Execute the recovery. This transfers the image from the TFTP server to the ASA 5500-X IPS SSP and restarts it.
asa# sw-module module ips recover boot
Step 7 Periodically check the recovery until it is complete.
Mod Card Type Model Serial No. --- -------------------------------------------- ------------------ ----------- 0 Cisco ASA 5545 Appliance with 8 GE ports, 1 ASA5545 ABC1234D56E 1 IPS 5545 Intrusion Protection System IPS5545 ABC1234D56E Mod MAC Address Range Hw Version Fw Version Sw Version --- --------------------------------- ------------ ------------ ------------- 0 503d.e59c.6dc1 to 503d.e59c.6dca 1.0 8.6.1 ips 503d.e59c.6dcb to 503d.e59c.6dcb N/A N/A 7.1(3)E4 Mod SSM Application Name Status SSM Application Version --- ------------------------------ ---------------- -------------------------- Mod Status Data Plane Status Compatibility --- ------------------ --------------------- -------------
Note The Status field in the output indicates the operational status of the ASA 5500-X IPS SSP. An ASA 5500-X IPS SSP operating normally shows a status of “Up.” While the adaptive security appliance transfers an application image to the ASA 5500-X IPS SSP, the Status field in the output reads “Recover.” When the adaptive security appliance completes the image transfer and restarts the ASA 5500-X IPS SSP, the newly transferred image is running.
Note To debug any errors that may happen in the recovery process, use the debug module-boot command to enable debugging of the system reimaging process.
Step 8 Session to the ASA 5500-X IPS SSP and initialize it with the
setup
command.
Installing the ASA 5585-X IPS SSP System Image
This section describes how to install the ASA 5585-X IPS SSP system image using the
hw-module
command or ROMMON, and contains the following topics:
Installing the ASA 5585-X IPS SSP Using the hw-module Command
Note Be sure the TFTP server that you specify can transfer files up to 60 MB in size.
Note This process can take approximately 15 minutes to complete, depending on your network and the size of the image.
Note The CLI output is an example of what your configuration may look like. It will not match exactly due to the optional setup choices, sensor model, and IPS version you have installed.
To install the system image, transfer the software image from a TFTP server to the ASA 5585-X IPS SSP using the adaptive security appliance CLI. The adaptive security appliance can communicate with the ROMMON application of the ASA 5585-X IPS SSP to transfer the image.
To install the ASA 5585-X IPS SSP software image, follow these steps:
Step 1 Download the ASA 5585-X IPS SSP system image file to the TFTP root directory of a TFTP server that is accessible from your adaptive security appliance.
Note Make sure you can access the TFTP server location from the network connected to the Ethernet port of your adaptive security appliance.
Step 2 Log in to the adaptive security appliance.
Step 3 Enter enable mode.
Step 4 Configure the recovery settings for the ASA 5585-X IPS SSP.
asa (enable)# hw-module module 1 recover configure
Note If you make an error in the recovery configuration, use the hw-module module 1 recover stop command to stop the system reimaging and then you can correct the configuration.
Step 5 Specify the TFTP URL for the software image.
Image URL [tftp://0.0.0.0/]:
Example
Image URL [tftp://0.0.0.0/]: tftp://192.0.2.0/IPS-SSP_40-K9-sys-1.1-a-7.1-3-E4.img
Step 6 Specify the command and control interface of the ASA 5585-X IPS SSP.
Note The port IP address is the management IP address of the ASA 5585-X IPS SSP.
Port IP Address [0.0.0.0]:
Example
Port IP Address [0.0.0.0]: 10.89.149.231
Step 7 Leave the VLAN ID at 0.
Step 8 Specify the default gateway of the ASA 5585-X IPS SSP.
Gateway IP Address [0.0.0.0]:
Example
Gateway IP Address [0.0.0.0]: 10.89.149.254
Step 9 Execute the recovery. This transfers the software image from the TFTP server to the ASA 5585-X IPS SSP and restarts it.
asa# hw-module module 1 recover boot
Step 10 Periodically check the recovery until it is complete.
Note The status reads Recovery
during recovery and reads Up
when installation is complete.
asa# show module 1 details Getting details from the Service Module, please wait... ASA 5585-X IPS Security Services Processor-10 with 8GE Serial Number: JAF1350ABSL Firmware version: 2.0(1)3 Software version: 7.1(3)E4 MAC Address Range: 8843.e12f.5414 to 8843.e12f.541f App. Status Desc: Normal Operation Mgmt Network mask: 255.255.255.0 Mgmt Gateway: 10.89.148.254 Mgmt Access List: 10.0.0.0/8 Mgmt Access List: 64.0.0.0/8
Note The Status field in the output indicates the operational status of the ASA 5585-X IPS SSP. An ASA 5585-X IPS SSP operating normally shows a status of “Up.” While the adaptive security appliance transfers the software image to the ASA 5585-X IPS SSP, the Status field in the output reads “Recover.” When the adaptive security appliance completes the software image transfer and restarts the ASA 5585-X IPS SSP, the newly transferred image is running.
Note To debug any errors that may happen during this process, use the debug module-boot command to enable debugging of the software installation process.
Step 11 Session to the ASA 5585-X IPS SSP.
Step 12 Enter
cisco
three times and your new password twice.
Step 13 Initialize the ASA 5585-X IPS SSP with the
setup
command.
For More Information
Installing the ASA 5585-X IPS SSP System Image Using ROMMON
You can install the ASA 5585-X IPS SSP system image by using the ROMMON on the adaptive security appliance to TFTP the system image onto the ASA 5585-X IPS SSP.
To install the ASA 5585-X IPS SSP system image, follow these steps:
Step 1 Download the ASA 5585-X IPS SSP system image file to the TFTP root directory of a TFTP server that is accessible from your adaptive security appliance.
Note Make sure you can access the TFTP server location from the network connected to the Ethernet port of your adaptive security appliance.
Step 2 Boot the ASA 5585-X IPS SSP.
Booting system, please wait... Embedded BIOS Version 0.0(2)10 11:16:38 04/15/10 Com KbdBuf SMM UsbHid Msg0 Prompt Pmrt Cache1 LowM ExtM HugeM Cache2 Flg Siz0 Amrt PMM PnpDsp Smbios Lpt0 Npx1 Apm Lp1 Acpi Typ Dbg Enb Mp MemReduce MemSync1 CallRoms MemSync2 DriveInit Total number of CPU cores : 8 Com Lp1 Admgr2 Brd10 Plx2 OEM0=7EFF5C74 Cisco Systems ROMMON Version (1.0(12)10) #0: Thu Apr 8 00:12:33 CDT 2010 Use BREAK or ESC to interrupt boot. Use SPACE to begin boot immediately. MAC Address: 5475.d029.7fa9
Step 3 Press
Break
or
Esc
at the following prompt while the system is booting to interrupt boot. Press the spacebar to begin boot immediately.
Note You have ten seconds to press Break or Esc.
Use BREAK or ESC to interrupt boot. Use SPACE to begin boot immediately.
The system enters ROMMON mode. The
rommon>
prompt appears.
Step 4 Check the current network settings.
ROMMON Variable Settings:
The variables have the following definitions:
-
Address—Specifies the local IP address of the ASA 5585-X IPS SSP.
-
Server—Specifies the TFTP server IP address where the application image is stored.
-
Gateway—Specifies the gateway IP address used by the ASA 5585-X IPS SSP.
-
Port—Specifies the ethernet interface used for the ASA 5585-X IPS SSP management.
-
VLAN—Specifies the VLAN ID number (leave as untagged).
-
Image—Specifies the system image file/path name.
-
Config—Specifies the unused by these platforms.
Note Not all values are required to establish network connectivity. The address, server, gateway, and image values are required. If you are not sure of the settings needed for your local environment, contact your system administrator.
Step 5 If necessary, change the interface used for the TFTP download.
Note The default interface used for TFTP downloads is Management 0/0, which corresponds to the management interface of the ASA 5585-X IPS SSP.
rommon> PORT=interface_name
Step 6 If necessary, assign an IP address for the local port on the ASA 5585-X IPS SSP.
rommon> ADDRESS=ip_address
Note Use the same IP address that is assigned to the ASA 5585-X IPS SSP.
Step 7 If necessary, assign the TFTP server IP address.
rommon> SERVER=ip_address
Step 8 If necessary, assign the gateway IP address.
rommon> GATEWAY=ip_address
Step 9 Verify that you have access to the TFTP server by pinging it from your local Ethernet port with one of the following commands.
rommon> ping server_ip_address
Step 10 If necessary define the path and filename on the TFTP file server from which you are downloading the image.
rommon> IMAGE=path/file_name
Caution Make sure that you enter the
IMAGE command in all uppercase. You can enter the other ROMMON commands in either lower case or upper case, but the
IMAGE command specifically must be all uppercase.
UNIX Example
rommon> IMAGE=/system_images/IPS-SSP_10-K9-sys-1.1-a-7.1-3-E4.img
Note The path is relative to the default tftpboot directory of the UNIX TFTP server. Images located in the default tftpboot directory do not have any directory names or slashes in the IMAGE specification.
Windows Example
rommon> IMAGE=\system_images\IPS-SSP_10-K9-sys-1.1-a-7.1-3-E4.img
Step 11 Enter
set
and press
Enter
to verify the network settings.
Note You can use the sync command to store these settings in NVRAM so they are maintained across boots. Otherwise, you must enter this information each time you want to boot an image from ROMMON.
Step 12 Download and install the system image.
Note If the network settings are correct, the system downloads and boots the specified image on the ASA 5585-X IPS SSP. Be sure to use the ASA 5585-X IPS SSP image.
Caution To avoid corrupting the system image, do not remove power from the ASA 5585-X IPS SSP while the system image is being installed.
For More Information