Reading, Discarding, and Deploying Configuration Changes
Read All Device Configurations
If a configuration change is made to a device outside of Security Cloud Control, the device's configuration stored on Security Cloud Control and the device's local copy of its configuration are no longer the same. You many want to overwrite Security Cloud Control's copy of the device's configuration with the configuration stored on the device to make the configurations the same again. You can perform this task on many devices simultaneously using the Read All link.
See Reading, Discarding, Checking for, and Deploying Configuration Changes for more information about how Security Cloud Control manages the two copies of the device's configuration.
Here are three configuration statuses where clicking Read All will overwrite Security Cloud Control's copy of the device's configuration with the device's copy of the configuration.
-
Conflict Detected-If conflict detection is enabled, Security Cloud Control polls the devices it manages every 10 minutes for changes made to their configurations. If Security Cloud Control finds that the configuration on the device has changed, Security Cloud Control displays a "Conflict detected" configuration status for the device.
-
Synced-If the device is in a synced state, and you click Read All, Security Cloud Control immediately checks the devices to determine if there have been any changes made to its configurations directly. After clicking Read All, Security Cloud Control confirms your intent to overwrite its copy of the device's configuration and then Security Cloud Control performs the overwrite.
-
Not Synced-If the device is in the Not Synced state, and you click Read All, Security Cloud Control warns you that there are pending changes made to to the device's configuration using Security Cloud Control and that proceeding with the Read All operation will delete those changes and then overwrite Security Cloud Control's copy of the configuration with the configuration on the device. This Read All functions like Discard Changes.
Procedure
Step 1 |
In the left pane, click . |
Step 2 |
Click the Devices tab. |
Step 3 |
Click the appropriate device type tab. |
Step 4 |
(Optional) Create a change request label to identify the results of this bulk action easily in the Change Log. |
Step 5 |
Select the devices whose configurations you want to save Security Cloud Control. Notice that Security Cloud Control only provides command buttons for actions that can be applied to all the selected devices. |
Step 6 |
Click Read All. |
Step 7 |
Security Cloud Control warns you if there are configuration changes staged on Security Cloud Control, for any of the devices you selected, and asks if you want to continue with the bulk reading configurations action. Click Read All to continue. |
Step 8 |
Look at the notifications tab for the progress of the Read All configurations operation. |
Step 9 |
If you created and activated a change request label, remember to clear it so that you don't inadvertently associate other configuration changes with this event. |
Preview and Deploy Configuration Changes for All Devices
Security
Cloud Control informs you when you have made a configuration change to a device in your tenant, but you have not deployed that change, by displaying an
orange dot on the Deploy icon . The devices affected by these changes show the status "Not Synced" in the
Security Devices page. By clicking
Deploy, you can review which devices have pending changes
and deploy the changes to those devices.
This deployment method is available for all supported devices.
You can use this deployment method for single configuration changes or wait and deploy multiple changes at once.
Procedure
Step 1 |
In the menu bar of Security Cloud Control click the Deploy button |
Step 2 |
Select the devices with changes you want to deploy. If a device has a yellow caution triangle, you can not deploy changes to that device. Hover your mouse over the yellow caution triangle to find out why you can't deploy changes to that device. |
Step 3 |
(Optional) If you want to see more information about a pending change, click the View Detailed Changelog link to open the change log associated with that change. Click the Deploy icon to return to the Devices with Pending Changes page. |
Step 4 |
Click Deploy Now to deploy the changes immediately to the devices you selected. You'll see the progress in the Active jobs indicator in the Jobs tray. |
Step 5 |
(Optional) After the deployment has finished, click Jobs in the Security Cloud Control navigation bar. You will see a recent "Deploy Changes" job showing the results of the deployment. |
Step 6 |
If you created a change request label, and you have no more configuration changes to associate with it, clear it. |
Bulk Deploy Device Configurations
If you have made changes to multiple devices, for instance by editing a shared object, you can apply those change to all of the affected devices at once:
Procedure
Step 1 |
In the left pane, click . |
||
Step 2 |
Click the Devices tab. |
||
Step 3 |
Click the appropriate device type tab. |
||
Step 4 |
Select all of the devices for which you have made configuration changes on Security Cloud Control. These devices should show "Not Synced" status. |
||
Step 5 |
Deploy the changes using one of these methods:
|
||
Step 6 |
(Optional) Click the Jobs icon |
Preview and Deploy On-Premises Firewall Management Center Configurations
If you have made configuration changes to an object, for instance, changing a value or adding an override to an object, you can deploy all of those changes at once to your on-premises management center:
![]() Note |
Note that this task only pushes the configuration changes to the on-premises management center. Ensure you manually deploy these changes to your Firewall Threat Defense devices on your on-premises management center. See Configuration Deployment in the Cisco Secure Firewall Management Center Device Configuration Guide for more information. |
Procedure
Step 1 |
In the navigation pane, click and select the On-Premises Firewall Management Center, to which you want to preview and deploy changes.
|
||
Step 2 |
Click Preview and Deploy on the details pane on the right. |
||
Step 3 |
Review any warnings and click Deploy Now. The deployment starts immediately without a review of the changes. Click Discard All if you do not want to proceed with the deploy after previewing. |
||
Step 4 |
Alternatively, you can also click the |
||
Step 5 |
Click Deploy Now to deploy the changes. |
Discard Configuration Changes
Click Discard Changes when you want to "undo" all the undeployed configuration changes you made to a device's configuration using Security Cloud Control. When you click Discard Changes, Security Cloud Control completely overwrites its local copy of a device's configuration with the configuration stored on the device.
When you click Discard Changes, your device's configuration status is in a Not Synced state. After you discard your changes, the copy of the configuration on Security Cloud Control will be the same as the copy of the configuration on the device and the configuration status in Security Cloud Control will return to Synced.
To discard, or "undo," all of your undeployed configuration changes for a device:
Procedure
Step 1 |
In the left pane, click . |
Step 2 |
Click the Devices tab. |
Step 3 |
Click the appropriate device type tab. |
Step 4 |
Select the device you have been making configuration changes to. |
Step 5 |
Click Discard Changes in the Not Synced pane on the right.
|
Discard On-Premises Firewall Management Center Configuration Changes
If you want to undo all the configuration changes you made in Security Cloud Control, for instance to the objects that are shared between your Security Cloud Control and on-premises management center, use this procedure. Note that when you do this, Security Cloud Control completely overwrites its local copy of the configuration with the configuration stored on the device.
Procedure
Step 1 |
In the left pane, click . |
Step 2 |
Select the On-Premises Firewall Management Center, for which you want to discard changes. |
Step 3 |
Click Discard Changes in the Not Synced pane on the right. When you click Discard Changes, your on-premises management center's configuration status is in a Not Synced state. After you discard your changes, the copy of the configuration on Security Cloud Control will be the same as the copy of the configuration on the on-premises management center and the configuration status in Security Cloud Control returns to Synced. |
Out-of-Band Changes on Devices
Out-of-band changes refer to changes made directly on the device without using Security Cloud Control. These changes may be made using the device's command-line interface over an SSH connection or by using a local manager like the Adaptive Security Device Manager (ASDM) for the ASA, the FDM for the FDM-managed device, or for an On-Premises Firewall Management Center on the On-Premises Firewall Management Center user interface. An out-of-band change causes a conflict between the device's configuration stored on Security Cloud Control and the configuration stored on the device itself.
Detecting Out-of-Band Changes on Devices
If Conflict Detection is enabled for an ASA, or an FDM-managed device, a Cisco IOS device, or an On-Premises Firewall Management Center, Security Cloud Control checks the device every 10 minutes searching for any new changes made directly to the device's configuration outside of Security Cloud Control.
If Security Cloud Control finds that there are changes to the device's configuration that are not stored on Security Cloud Control, it changes the Configuration Status of that device to the "Conflict Detected" state.
When Security Cloud Control detects a conflict, one of two conditions is likely:
-
There have been configuration changes made to the device directly that have not been saved to Security Cloud Control's database.
-
In the case of an FDM-managed device, there may be "pending" configuration changes on the FDM-managed device that have not been deployed.
-
In the case of an On-Premises Firewall Management Center, there may be changes made, for instance, to objects outside Security Cloud Control, which are pending to be synchronized with Security Cloud Control or changes made in Security Cloud Control which are pending to be deployed to the On-Premises Firewall Management Center.