Upgrade Checklist for Threat Defense
Planning and Feasibility
Careful planning and preparation can help you avoid missteps.
✓ |
Action/Check |
Details |
---|---|---|
Assess your deployment. |
Understanding where you are determines how you get to where you want to go. In addition to current version and model information, determine if your deployment is configured for high availability/scalability, if your devices are deployed as an IPS or as firewalls, and so on. |
|
Plan your upgrade path. |
This is especially important for large deployments, multi-hop upgrades, and situations where you need to upgrade operating systems or hosting environments. Upgrades can be major (A.x), maintenance (A.x.y), or patch (A.x.y.z) releases. See: |
|
Read upgrade guidelines and plan configuration changes. |
Especially with major upgrades, upgrading may cause or require significant configuration changes either before or after upgrade. Start with these:
|
|
Decide whether to use the wizard or System Updates page. |
Some of the checklist items refer to using the threat defense upgrade wizard vs the System Updates page. The wizard walks you through important upgrade stages, including selecting devices to upgrade, copying the upgrade package to the devices, and performing compatibility and readiness checks. Upgrades performed with this wizard are faster, more reliable, and take up less disk space. We usually recommend you use the wizard to upgrade threat defense. But if you think you might need to revert after a successful upgrade, use System (). You must also use the System Updates page to delete upgrade packages and to upgrade the management center and older Classic devices. |
|
Check appliance access. |
Devices can stop passing traffic during the upgrade or if the upgrade fails. Before you upgrade, make sure traffic from your location does not have to traverse the device itself to access the device's management interface. You should also able to access the management center's management interface without traversing the device. |
|
Check bandwidth. |
Make sure your management network has the bandwidth to perform large data transfers. Whenever possible, upload upgrade packages ahead of time. If you transfer an upgrade package to a device at the time of upgrade, insufficient bandwidth can extend upgrade time or even cause the upgrade to time out. See Guidelines for Downloading Data from the Firepower Managemen t Center to Managed Devices (Troubleshooting TechNote). |
|
Schedule maintenance windows. |
Schedule maintenance windows when they will have the least impact, considering any effect on traffic flow and inspection and the time upgrades are likely to take. Consider the tasks you must perform in the window, and those you can perform ahead of time. See: |
Backups
With the exception of hotfixes, upgrade deletes all backups stored on the system. We strongly recommend you back up to a secure remote location and verify transfer success, both before and after upgrade:
-
Before upgrade: If an upgrade fails catastrophically, you may have to reimage and restore. Reimaging returns most settings to factory defaults, including the system password. If you have a recent backup, you can return to normal operations more quickly.
-
After upgrade: This creates a snapshot of your freshly upgraded deployment. Back up the management center after you upgrade its managed devices, so your new management center backup file 'knows' that its devices have been upgraded.
✓ |
Action/Check |
Details |
---|---|---|
Back up threat defense. |
Use the management center to back up threat defense configurations, when supported. See the Backup/Restore chapter in the Cisco Secure Firewall Management Center Administration Guide. If you have a Firepower 9300 with threat defense and ASA logical devices running on separate modules, use ASDM or the ASA CLI to back up ASA configurations and other critical files, especially if there is an ASA configuration migration. See the Software and Configurations chapter in the Cisco ASA Series General Operations Configuration Guide. |
|
Back up FXOS on the Firepower 4100/9300. |
Use the chassis manager or the FXOS CLI to export chassis configurations, including logical device and platform configuration settings. See the Configuration Import/Export chapter in the Cisco Firepower 4100/9300 FXOS Configuration Guide. |
Upgrade Packages
Uploading upgrade packages to the system before you begin upgrade can reduce the length of your maintenance window.
✓ |
Action/Check |
Details |
---|---|---|
Download upgrade packages from Cisco and upload them to the management center or internal web server. |
Upgrade packages are available on the Cisco Support & Download site: Upgrade Packages for Management Center and Threat Defense. You may also be able to use the management center to perform a direct download: Download Upgrade Packages with the Management Center. Upload device upgrade packages to the management center, or configure devices to get them from an internal server: For the Firepower 4100/9300, FXOS upload instructions are included in the FXOS upgrade procedures. |
|
Copy upgrade packages to devices. |
To upgrade threat defense, the upgrade package must be on the device. The threat defense upgrade wizard prompts you to copy upgrade packages to devices that need them. Or, you can use the System Updates page. |
Associated Upgrades
Because operating system and hosting environment upgrades can affect traffic flow and inspection, perform them in a maintenance window.
✓ |
Action/Check |
Details |
---|---|---|
Upgrade virtual hosting. |
If needed, upgrade the hosting environment. If this is required, it is usually because you are running an older version of VMware and are performing a major upgrade. |
|
Upgrade firmware on the Firepower 4100/9300. |
We recommend the latest firmware. See the Cisco Firepower 4100/9300 FXOS Firmware Upgrade Guide. |
|
Upgrade FXOS on the Firepower 4100/9300. |
Upgrading FXOS is usually a requirement for major upgrades, but very rarely for maintenance releases and patches. To minimize disruption, upgrade FXOS in threat defense high availability pairs and inter-chassis clusters one chassis at a time. |
Final Checks
A set of final checks ensures you are ready to upgrade the software.
✓ |
Action/Check |
Details |
---|---|---|
Check configurations. |
Make sure you have made any required pre-upgrade configuration changes, and are prepared to make required post-upgrade configuration changes. |
|
Check NTP synchronization. |
Make sure all appliances are synchronized with any NTP server you are using to serve time. Although the health monitor alerts if clocks are out of sync by more than 10 seconds, you should still check manually. Being out of sync can cause upgrade failure. To check time:
|
|
Deploy configurations. |
Deploying configurations before you upgrade reduces the chance of failure. Deploying can affect traffic flow and inspection; see Traffic Flow and Inspection for Threat Defense Upgrades. |
|
Run readiness checks. |
Passing readiness checks reduces the chance of upgrade failure. The threat defense upgrade wizard prompts you to perform readiness checks. Or, you can use the System Updates page. |
|
Check disk space. |
Readiness checks include a disk space check. Without enough free disk space, the upgrade fails. To check the disk space available on a device, choose System () and select the device you want to check. Under Disk Usage, expand the By Partition details. |
|
Check running tasks. |
Make sure essential tasks are complete, including the final deploy. Tasks running when the upgrade begins are stopped, become failed tasks, and cannot be resumed. Upgrades automatically postpone scheduled tasks. Any task scheduled to begin during the upgrade will begin five minutes after the post-upgrade reboot. If you do not want this to happen, check for tasks that are scheduled to run during the upgrade and cancel or postpone them. |