Upgrade Firewall Threat
Defense or chassis without a manual readiness check.
|
7.7.0
|
7.7.0
|
You no longer have to run time-consuming pre-upgrade
readiness checks for Firewall Threat
Defense or chassis upgrades. Instead, these checks are now
regularly run by the system and reported in the health
monitor. This allows you to preemptively fix any issues that
will block upgrade.
-
The Database module, new for devices, manages
monitors database schema and configuration data
(EO) integrity.
-
The FXOS Health module, new for devices, monitors the
FXOS httpd service on FXOS-based devices.
-
The Disk Status
module
is now more robust, alerting on disk health issues
reported by daily running of smartctl (a Linux
utility for monitoring reliability, predicting
failures, and performing other self-tests).
Version restrictions: This feature is supported for upgrades
from Version 7.7+. Devices running earlier
versions still require the in-upgrade readiness check.
|
Devices with internet access download
upgrade packages from the
internet.
|
7.6.1
7.7.0
|
Any
|
You can now begin device and chassis upgrades without the
upgrade package. At the appropriate time, devices will get
the package directly from the internet. This saves time and
Firewall Management
Center disk space.
Devices without internet access can continue to get the
package from the Firewall Management
Center or an internal
server.
Note that devices try the internal server (if configured)
before either the internet or the Firewall Management
Center. If the internal server download fails, newer devices
with internet access try the internet then the Firewall Management
Center, while older devices and devices without internet access
just try the Firewall Management
Center. (In this context, "newer" means Firewall Threat Defense 7.6+ or chassis 7.4.1+.)
Restrictions: Firewall Management
Center and devices must be able to access the internet. There is
no way to force a device with internet access to try the Firewall Management
Center before it tries the internet. Not supported for
hotfixes.
Download location:
https://cdo-ftd-images.s3-us-west-2.amazonaws.com/
|
Generate and download post-upgrade
configuration change reports from the Firewall Threat Defense and chassis upgrade wizards.
|
7.6.0
|
Any
|
You can now generate and download post-upgrade configuration
change reports from the Firewall Threat Defense and chassis upgrade wizards, as long as you have not
cleared your upgrade workflow.
Previously, you used the Advanced Deploy screens to generate
the reports and the Message Center to download them. Note
that you can still use this method, which is useful if you
want to quickly generate change reports for multiple
devices, or if you cleared your workflow.
New/modified screens:
|
Deprecated: Copy upgrade packages
("peer-to-peer sync") from device to device.
|
7.6.0
|
7.6.0
|
You can no longer use the Firewall Threat Defense CLI to copy upgrade packages between devices over the
management network. If you have limited bandwidth between
the Firewall Management
Center and its devices, configure devices to get upgrade
packages directly from an internal web server.
Deprecated CLI commands: configure p2psync enable , configure p2psync disable , show peers , show peer details , sync-from-peer , show p2p-sync-status
|
Chassis upgrade for the Secure Firewall 3100 in multi-instance
mode.
|
7.4.1
|
7.4.1
|
For the Secure Firewall 3100 in multi-instance mode, you upgrade
the operating system and the firmware (chassis upgrade)
separately from the container instances (Firewall Threat
Defense upgrade).
New/modified screens:
|
Firmware upgrades included in FXOS
upgrades.
|
7.4.1
|
Any
|
Chassis/FXOS upgrade impact. Firmware upgrades cause an
extra reboot.
For the Firepower 4100/9300, FXOS upgrades to Version 2.14.1
now include firmware upgrades. If any firmware
component on the device is older than the one included in
the FXOS bundle, the FXOS upgrade also updates the firmware.
If the firmware is upgraded, the device reboots twice—once
for FXOS and once for the firmware.
Just as with software and operating system upgrades, do not
make or deploy configuration changes during firmware
upgrade. Even if the system appears inactive, do not
manually reboot or shut down during firmware upgrade.
See: Cisco Firepower 4100/9300
FXOS Firmware Upgrade Guide
|
Choose and direct-download upgrade
packages to the Firewall Management
Center.
|
7.3.0
|
Any
|
You can now choose which Firewall Threat Defense upgrade packages you want to direct download to the Firewall Management
Center. Use the new Download
Updates sub-tab on .
Version restrictions: this feature is replaced by an improved
package management system in Version 7.2.6/7.4.1.
|
Upload upgrade packages to the Firewall Management
Center from the Firewall Threat Defense wizard.
|
7.3.0
|
Any
|
You now use the wizard to upload Firewall Threat Defense upgrade packages or specify their location.
Previously (depending on version), you used or .
Version restrictions: this feature is replaced by an improved
package management system in Version 7.2.6/7.4.1.
|
Auto-upgrade to Snort 3 after
successful Firewall Threat Defense upgrade is no longer optional.
|
7.3.0
|
Any
|
Upgrade impact. All eligible devices upgrade to Snort 3
when you deploy.
When you upgrade Firewall Threat Defense to Version 7.3+, you can no longer disable the
Upgrade Snort 2 to Snort 3
option.
After the software upgrade, all eligible devices will upgrade
from Snort 2 to Snort 3 when you deploy configurations.
Although you can switch individual devices back, Snort 2 is
not supported on Firewall Threat Defense 7.7+. You should stop using it now.
For devices that are ineligible for auto-upgrade because they
use custom intrusion or network analysis policies, manually
upgrade to Snort 3 for improved detection and performance.
For migration assistance, see the Cisco Secure Firewall
Management Center Snort 3 Configuration
Guide for your version.
|
Combined upgrade and install package
for Secure Firewall 3100.
|
7.3.0
|
7.3.0
|
Reimage Impact.
In Version 7.3, we combined the Firewall Threat Defense install and upgrade package for the Secure Firewall 3100,
as follows:
-
Version 7.1–7.2 install package:
cisco-ftd-fp3k.version.SPA
-
Version 7.1–7.2 upgrade package:
Cisco_FTD_SSP_FP3K_Upgrade-version-build.sh.REL.tar
-
Version 7.3+ combined package:
Cisco_FTD_SSP_FP3K_Upgrade-version-build.sh.REL.tar
Although you can upgrade Firewall Threat Defense without issue, you cannot reimage from older Firewall Threat Defense and ASA versions directly to Firewall Threat Defense Version 7.3+. This is due to a ROMMON update required by
the new image type. To reimage from those older versions,
you must "go through" ASA 9.19+, which is supported with the
old ROMMON but also updates to the new ROMMON. There is no
separate ROMMON updater.
To get to Firewall Threat Defense Version 7.3+, your options are:
|
Push packages and check readiness for
older ASA FirePOWER and NGPISv devices before
upgrade.
|
7.4.3
|
—
|
With the new upgrade capabilities introduced in 7.2.6 and
7.4.1, we deprecated the ability to perform a pre-upgrade
package push and readiness check for ASA FirePOWER and
NGPISv. These options have returned to the Classic device
upgrade workflow.
Version restrictions: These devices were last supported in
Version 7.0, and the Version 7.4 Firewall
Management Center is the last that can manage them.
|
Firewall Threat Defense and chassis upgrade wizards optimized for lower
resolution screens.
|
7.2.10
7.4.3
7.6.0
|
Any
|
We optimized the Firewall Threat Defense and chassis upgrade wizards for lower resolution screens
(and smaller browser windows). Text appears smaller and
certain screen elements are hidden. If you change your
resolution or window size mid-session, you may need to
refresh the page for the web interface to adjust. Note that
the minimum screen resolution to use the Firewall Management
Center is 1280 x 720.
New/modified screens:
|
Enable revert from the Firewall Threat Defense upgrade wizard.
|
7.2.6
7.4.1
|
Any, if upgrading to 7.1+
|
You can now enable revert from the Firewall Threat Defense upgrade wizard.
Version restrictions: You must be upgrading Firewall Threat Defense to Version
7.1+. Not supported with Firewall Management
Center Version 7.3.x or 7.4.0.
|
View detailed upgrade status from
the Firewall Threat Defense upgrade wizard.
|
7.2.6
7.4.1
|
Any
|
The final page of the Firewall Threat Defense upgrade wizard now allows you to monitor upgrade
progress. This is in addition to the existing monitoring
capability on the Upgrade tab on the Device Management page,
and on the Message Center. Note that as long as you have not
started a new upgrade flow, brings you back to this final wizard page,
where you can view the detailed status for the current (or
most recently complete) device upgrade.
|
Improved upgrade starting page and
package management.
|
7.2.6
7.4.1
|
Any
|
A new upgrade page makes it easier to choose, download,
manage, and apply upgrades to your entire deployment. This includes the Firewall Management
Center, Firewall Threat Defense, and any older NGIPSv/ASA FirePOWER devices. The
page lists all upgrade packages that apply to your current
deployment, with suggested releases specially marked. You
can easily choose and direct-download packages from Cisco,
as well as manually upload and delete packages.
Internet access is
required to retrieve the list/direct download upgrade
packages. Otherwise, you are limited to manual
management. Patches are not listed unless you have
at least one appliance at the appropriate maintenance
release (or you manually uploaded the patch). You must
manually upload hotfixes.
New/modified screens:
-
System( ) is now where you upgrade the Firewall Management
Center and all managed devices, as well as manage
upgrade packages.
-
System( ) is now where you update intrusion
rules, the VDB, and the GeoDB.
-
takes you directly to the Firewall Threat Defense upgrade wizard.
-
System( ) allows you to grant access to
Content Updates (VDB,
GeoDB, intrusion rules) without allowing access to
Product Upgrades (system
software).
Deprecated screens/options:
-
System( ) is deprecated. All Firewall Threat Defense upgrades now use the wizard.
-
The Add Upgrade Package button
on the Firewall Threat Defense upgrade wizard has been replaced by a
Manage Upgrade Packages
link to the new upgrade page.
|
Suggested release
notifications.
|
7.2.6
7.4.1
|
Any
|
The Firewall Management
Center now notifies you when a new suggested release is
available.
If you don't want to upgrade right now, you can have the
system remind you
later, or defer
reminders until the next suggested release. The new upgrade
page also indicates suggested
releases.
See: Cisco Secure Firewall
Management Center New Features by
Release
|
Select devices to upgrade from
the Firewall Threat Defense upgrade wizard.
|
7.2.6
7.3.0
December 13,
2022
|
Any
|
Use the wizard to select devices to upgrade.
You can now use the Firewall Threat Defense upgrade wizard to select or refine the devices to
upgrade. On the wizard, you can toggle the view between
selected devices, remaining upgrade candidates, ineligible
devices (with reasons why), devices that need the upgrade
package, and so on. Previously, you could only use the
Device Management page and the process was much less
flexible.
|
Unattended Firewall Threat Defense upgrades.
|
7.2.6
7.3.0
December 13,
2022
|
Any
|
The Firewall Threat Defense upgrade wizard now supports unattended upgrades, using a
new Unattended Mode menu. You just
need to select the target version and the devices you want
to upgrade, specify a few upgrade options, and step away.
You can even log out or close the browser.
|
Simultaneous Firewall Threat Defense upgrade workflows by different
users.
|
7.2.6
7.3.0
December 13,
2022
|
Any
|
We now allow simultaneous upgrade workflows by different
users, as long as you are upgrading different devices. The
system prevents you from upgrading devices already in
someone else's workflow. Previously, only one upgrade
workflow was allowed at a time across all users.
|
Skip pre-upgrade troubleshoot
generation for Firewall Threat Defense.
|
7.2.6
7.3.0
December 13,
2022
|
Any
|
You can now skip the
automatic generating of troubleshooting files before major
and maintenance upgrades by disabling the new
Generate troubleshooting files before upgrade
begins option. This saves time and disk
space.
To manually generate troubleshooting files for a Firewall Threat Defense device, choose System( ), click the device in the left panel, then
View System & Troubleshoot
Details, then Generate
Troubleshooting
Files.
|
Copy upgrade packages ("peer-to-peer sync") from device to
device.
|
7.2.0
|
7.2.0
|
Instead of copying upgrade packages to each device from the Firewall Management
Center or internal web server, you can use the Firewall Threat Defense CLI to copy upgrade packages between devices ("peer to peer sync"). This
secure and reliable resource-sharing goes over the management network but does
not rely on the Firewall Management
Center. Each device can accommodate 5 package concurrent
transfers.
This feature is supported for Version 7.2.x–7.4.x standalone devices managed by
the same Version 7.2.x–7.4.x standalone Firewall Management
Center. It is not supported for:
-
Container instances.
-
Device high availability pairs and clusters. These devices get the
package from each other as part of their normal sync process. Copying
the upgrade package to one group member automatically syncs it to all
group members.
-
Devices managed by high availability Firewall Management
Centers.
-
Devices in different domains, or devices separated by a NAT gateway.
-
Devices upgrading from Version 7.1 or earlier, regardless of Firewall Management
Center version.
-
Devices running Version 7.6+.
New/modified CLI commands: configure p2psync
enable , configure p2psync
disable , show
peers , show peer
details ,
sync-from-peer ,
show p2p-sync-status
|
Auto-upgrade to Snort 3 after successful Firewall Threat Defense upgrade.
|
7.2.0
|
7.0.0
|
When you use a Version 7.2+ Firewall Management
Center to upgrade Firewall Threat Defense to Version 7.2+, you can now choose whether to
Upgrade Snort 2 to Snort 3.
After the software upgrade, eligible devices upgrade from
Snort 2 to Snort 3 when you deploy configurations. For
devices that are ineligible because they use custom
intrusion or network analysis policies, we strongly
recommend you manually upgrade to Snort 3 for improved
detection and performance. For help, see the Cisco Secure Firewall
Management Center Snort 3 Configuration
Guide for your version.
Version restrictions: Not supported for Firewall Threat Defense upgrades to Version 7.0.x or
7.1.x.
|
Upgrade for single-node clusters.
|
7.2.0
|
Any
|
You can now use the device upgrade page () to upgrade clusters with only one active node. Any deactivated nodes are also upgraded. Previously, this type of upgrade
would fail. This feature is not supported from the system updates page ().
Hitless upgrades are also not supported in this case.
Interruptions to traffic flow and inspection depend on the
interface configurations of the lone active unit, just as
with standalone devices.
Supported platforms: Firepower 4100/9300, Secure Firewall
3100
|
Revert Firewall Threat Defense upgrades from the CLI.
|
7.2.0
|
7.2.0
|
You can now revert Firewall Threat Defense upgrades from the device CLI if communications between
the Firewall Management
Center and device are disrupted. Note that in high
availability/scalability deployments, revert is more
successful when all units are reverted simultaneously. When
reverting with the CLI, open sessions with all units, verify
that revert is possible on each, then start the processes at
the same time.
Caution
|
Reverting from the CLI can cause configurations between
the device and the Firewall Management
Center to go out of sync, depending on what you changed
post-upgrade. This can cause further communication and
deployment issues.
|
New/modified CLI commands: upgrade
revert , show upgrade
revert-info .
|
Revert a successful device upgrade.
|
7.1.0
|
7.1.0
|
You can now revert major and maintenance upgrades to FTD.
Reverting returns the software to its state just before the last
upgrade, also called a snapshot. If you revert an upgrade
after installing a patch, you revert the patch as well as the
major and/or maintenance upgrade.
Important
|
If you think you might need to revert, you must use to upgrade FTD. The System Updates page is the only place you can enable the Enable revert after successful upgrade option, which configures the system to save a revert snapshot when you initiate the upgrade. This is in contrast to our usual
recommendation to use the wizard on the page.
|
This feature is not supported for container instances.
Minimum FTD: 7.1
|
Improvements to the upgrade workflow for clustered and high
availability devices.
|
7.1.0
|
Any
|
We made the following improvements to the upgrade workflow for
clustered and high availability devices:
-
The upgrade wizard now correctly displays clustered and
high availability units as groups, rather than as
individual devices. The system can identify, report, and
preemptively require fixes for group-related issues you
might have. For example, you cannot upgrade a cluster on
the Firepower 4100/9300 if you have made unsynced
changes on Firepower Chassis Manager.
-
We improved the speed and efficiency of copying upgrade
packages to clusters and high availability pairs.
Previously, the FMC copied the package to each group
member sequentially. Now, group members can get the
package from each other as part of their normal sync
process.
-
You can now specify the upgrade order of data units in a
cluster. The control unit always upgrades last.
|
Improved FTD upgrade performance and status reporting.
|
7.0.0
|
7.0.0
|
FTD upgrades are now easier faster, more reliable, and take
up less disk space. A new Upgrades
tab in the Message Center provides further enhancements to
upgrade status and error reporting.
|
Easy-to-follow upgrade workflow for FTD devices.
|
7.0.0
|
Any
|
A new device upgrade page () on the FMC provides an easy-to-follow wizard for upgrading Version 6.4+ FTD devices. It walks you through important pre-upgrade
stages, including selecting devices to upgrade, copying the upgrade package to the devices, and compatibility and readiness
checks.
To begin, use the new Upgrade Firepower Software action on the Device Management page .
As you proceed, the system displays basic information about
your selected devices, as well as the current
upgrade-related status. This includes any reasons why you
cannot upgrade. If a device does not "pass" a stage in the
wizard, it does not appear in the next stage.
If you navigate away from wizard, your progress is preserved,
although other users with Administrator access can reset,
modify, or continue the wizard.
Note
|
You must still use to upload or specify the location of FTD upgrade packages. You must also use the System Updates page to upgrade the FMC itself,
as well as all non-FTD managed devices.
|
Note
|
In Version 7.0, the wizard does not correctly display
devices in clusters or high availability pairs. Even
though you must select and upgrade these devices as a
unit, the wizard displays them as standalone devices.
Device status and upgrade readiness are evaluated and
reported on an individual basis. This means it is
possible for one unit to appear to "pass" to the next
stage while the other unit or units do not. However,
these devices are still grouped. Running a readiness
check on one, runs it on all. Starting the upgrade on
one, starts it on all.
To avoid possible time-consuming upgrade failures,
manually ensure all group members are ready
to move on to the next step of the wizard before you
click Next.
|
|
Upgrade more FTD devices at once.
|
7.0.0
|
Any (source)
6.7.0 (target)
|
The number of devices you can upgrade at once is now limited
by your management network bandwidth—not the system's
ability to manage simultaneous upgrades. Previously, we
recommended against upgrading more than five devices at a
time.
Important
|
Only upgrades to FTD Version 6.7+ using the FTD upgrade
wizard see this improvement. If you are upgrading
devices to an older FTD release—even if you are using
the new upgrade wizard—we still recommend you limit to
five devices at a time.
|
|
Upgrade different device models together.
|
7.0.0
|
Any
|
You can now use the FTD upgrade wizard to queue and invoke
upgrades for all FTD models at the same time, as long as the
system has access to the appropriate upgrade packages.
Previously, you would choose an upgrade package, then choose
the devices to upgrade using that package. That meant that
you could upgrade multiple devices at the same time
only if they shared an upgrade package. For
example, you could upgrade two Firepower 2100 series devices
at the same time, but not a Firepower 2100 series and a
Firepower 1000 series.
|
Upgrades remove PCAP files to save disk space.
|
6.7.0
|
6.7.0
|
Upgrades now remove locally stored PCAP files. To upgrade, you
must have enough free disk space or the upgrade fails.
|
Improved FTD upgrade status reporting and cancel/retry
options.
|
6.7.0
|
6.7.0
|
You can now view the status of FTD device upgrades and readiness
checks in progress on the Device Management page, as well as a
7-day history of upgrade success/failures. The Message Center
also provides enhanced status and error messages.
A new Upgrade Status pop-up, accessible from both Device
Management and the Message Center with a single click, shows
detailed upgrade information, including percentage/time
remaining, specific upgrade stage, success/failure data, upgrade
logs, and so on.
Also on this pop-up, you can manually cancel failed or
in-progress upgrades (Cancel Upgrade), or
retry failed upgrades (Retry Upgrade).
Canceling an upgrade reverts the device to its pre-upgrade
state.
Note
|
To be able to manually cancel or retry a failed upgrade, you
must disable the new auto-cancel option, which appears when
you use the FMC to upgrade an FTD device:
Automatically cancel on upgrade failure and
roll back to the previous version. With the
option enabled, the device automatically reverts to its
pre-upgrade state upon upgrade failure.
Auto-cancel is not supported for patches.
In an HA or clustered deployment, auto-cancel applies to
each device individually. That is, if the upgrade fails on
one device, only that device is
reverted.
|
New/modified screens:
New/modified CLI commands: show upgrade status
detail , show upgrade status
continuous , show upgrade
status , upgrade
cancel , upgrade
retry
|
Get FTD upgrade packages from an internal web server.
|
6.6.0
|
6.6.0
|
FTD devices can now get upgrade packages from your own internal
web server, rather than from the FMC. This is especially useful
if you have limited bandwidth between the FMC and its devices.
It also saves space on the FMC.
Note
|
This feature is supported only for FTD devices running
Version 6.6+. It is not supported for upgrades to
Version 6.6, nor is it supported for the FMC or Classic
devices.
|
New/modified screens: We added a Specify software
update source option to the page where you
upload upgrade packages.
|
Copy upgrade packages to managed devices before the upgrade.
|
6.2.3
|
Any
|
You can now copy (or push) an upgrade package from the FMC to a
managed device before you run the actual upgrade. This is useful
because you can push during times of low bandwidth use, outside
of the upgrade maintenance window.
When you push to high availability, clustered, or stacked
devices, the system sends the upgrade package to the
active/control/primary first. Then, it sends the package to the
standby/data/secondary.
New/modified screens:
|