Firepower on 5506

Dear friends!

I installed a x 5506 on my company and I decide to upgrade the software of firepower to the 6.0 version, but it was impossible to migrate right version 6.0, then I did the upgrade to version 5.4.1.3 - 26, after I shuttle upgrade to version 6.0, didn t work.

Now I m still with version 5.4.1.3 - 26 and when I try to access the firewall by using ASDM, the error msg appears, as you can see attach file and I can access functions of firepower than the status.

The IP 192.168.13.251 is already set up on firepower.

Anyone know what is the cause of this problem?

Thank you

Marcio

Marcio,

The failure of the upgrade may have damaged some of the necessary files. You may reimage software module.

If you Smartnet open a TAC case. (You should have a Smartnet or well you wouldn't have the right to upgrade - right?)

Otherwise the process is fairly well laid out here:

http://www.Cisco.com/c/en/us/support/docs/security/ASA-firepower-service...

You must uninstall the current module first (explained earlier in the same document).

Using this approach, you can start with 6.0 from a new installation.

.

Tags: Cisco Security

Similar Questions

  • The services configuration of firepower on Cisco asa 5506 with ASDM

    I have a few 5506 firewalls, and they are fully licensed with services of power, control, Protection, URL filtering, malware. I have intend running and configuration of all of this on the 5506 by ASDM. I was wondering if there are guides for a basic configuration and the implementation of policies available. Something to show a basic configuration which would technically begin inspection of traffic and work. Then I can edit and make changes to my taste.

    Thank you

    My recommendation to clients is to look at the Cisco Live, BRKSEC-2018presentation. Please refer to the 56 slide from for a good overview of how policies are installed in a module of firepower.

    There are also a number of other detailed guides available in the FireSIGHT Management Center product support page should you care to learn more about customization and operations. You can also find the series of videos of ASA FirePOWER on request to Labminutes.com useful to guide you on execution of operations of your system.

  • upgrade of firepower that run in asa integrated

    I have a x-5506 running 9.5.1 asa and 5.4.1 sfr.

    I have had't used for a while and ran the Manager of the sfr cmd line configuration command. I read that the DB variable for sfr consecutive in a 5506 may be damaged. It seems there because it will not register with my asa now.

    If I go to configure > local > register he is stuck on waiting to record. Even on the sfr cmd line.

    It is a device that I got through a course less than a year yet. Is that mean that one is not allowed forever to update or download the installation images? can I register to my account?

    Hello

    When you use Configuration manager to SFR, it expects to sign up to a power of fire aka Defense center management center.

    See this article.

    http://www.Cisco.com/c/en/us/support/docs/security/firesight-management-...

    So once you configure the manager address at sfr, you must complete the registration process in separate Manager as well.

    If you are not running a separate management centre, then I believe that you want to manage the ASA and SFR module using ASDM.

    You can do this, but for this you don't need configuration manager. So if you do this, remove the handler by using the command "configure Manager delete" and make sure that the computer running ASDM can reach sfr module and vice versa.

    See this article to make sure that you are running scenarios.

    http://www.Cisco.com/c/en/us/support/docs/security/IPS-sensor-software-v...

    See this article for more information on how you can use ASDM to fire module /SFR Power Manager

    http://www.Cisco.com/c/en/us/TD/docs/security/firesight/541/firepower-mo...

    Rate if this can help.

    Yogesh

  • ASA stable for the firepower 6.0.1 software recommendation

    Hi all

    I need to install 2 x 5525 in a Cluster for firepower. We will use the most recent version of firepower and now I would like to know your recommendations for the more stable/better Version of the Cisco ASA software to use. We have no specific requirements for the featureset, the firewall itself will be the gateway for production networks and must protect the traffic to and from this network. No VPN will be used, no dynamic routing. The software should be a stable release, which is known to work very well with the firepower 6.0.1.

    I see in the documentation of the firepower 6.0.1 (http://www.cisco.com/c/en/us/td/docs/security/firepower/601/relnotes/fir...) We need to at least: "running ASA version 9.4 (2), 9.5 (2) or 9.6 1.

    It would be great, if someone could share its recommendation on which software, I should go for. On a x 5506 in my lab I m currently using 9.5.2 and I didn t face no problems so far.

    Another question about the firepower upgrade process. As described in the manuals of firepower, initially the CMF must be updated, then the Module of firepower on the Cisco ASA follows. What is the best way to update the Module of firepower on the ASA to use FMC? What is the average recommenend? Or can I also place the firepower module Services in the CLI without losing its configuration?

    Best regards

    Sebastian

    Hello team,

    I checked the errors and confirmed that the error may occur if there is an object in the EO tables whose revision is exceeded. For this we need the help of the Cisco TAC to trace the problem to the engineering team and get a fix. You are not supposed to change whatever it considers either with arrays of EO. So be sure that you contact the Cisco TAC.

    Rate if my message will help.

    Concerning

    jetsy

  • Version 6.0.1 of firepower

    Hello guys

    I recently updated my power of fire ASA 5506 version 6.0.1-29 and I can no longer see the users active directory, I have searched for this thing and I found this link set up the Active Directory integration with the device of firepower , but is not help because I don't want a captive portal authentication in my environment and I don't even see users in the access control policy (he gives me a warning triangle indicates that I do with identity politics), so I tried to create the identity strategy but he needs a self-signed certificate and I did it but when the storage of the certificate, it gives me this error (could not validate EO based Cert: System (/ usr/bin/openssl rsa-outform pem - inform pem-in/tmp/SIrNBopGd5-passin' file:/tmp/Jd8gZivkm_-sortie/tmp/A4qZjXp0YY) Failed) and now I'm really stuck here I don't know what to do... Please help :/

    Hello

    This occurs when the key used is not encrypted by password. Try:

    Encrypt the key with a password, and then import the certificate and key.

    Kind regards

    Aastha Bhardwaj

    Rate if this is useful!

  • ASA with firepower and Licensing Service

    Hello

    If I buy an ASA with the power of Fire Service (e.g. 5516-X) should which licenses I buy?

    I understand that I need to order a license for the Service of firepower. E.g. IPS, URLS, and AMP.

    Should I order a license management FireSIGHT, too? The centre of mandatory FireSIGHT management? This license is necessary?

    Concerning

    You will need the license of control (CTRL). It is free and automatically included with any package of power of fire SKU (i.e. ASA5516-FPWR-K9).

    Then you must add the IPS, URLS or AMP (or combination of both) services in term 1, 3 or 5 years.

    FireSIGHT Management Center is not required for entry-level (5506, 5508 or 5516) models. It is optional on those you can use the entry firesight level integrated in ASDM for the model.

    For all other models, it is necessary. If you manage more than a simple ASA (even an HA pair) it is recommended even for the entry level models that you will be so power sync policies through them all.

  • Block the Page - Asa Firepower

    Hello world

    Now I m working with an ASA 5506 X and Sourcefire module, by now it s works well, but I have a problem with the calibrated block page (Https response) only works with Internet Explorer and the other browser does, and Don t show also the http response when the page is running with securty (HTTPS).

    URL filtering policies are working correctly, the problem is that I can't see the block page that I customized with browsers like Mozilla or Chrome and when the page uses port 443.

    No one knows why this happens?

    Thanks for reading. :)

    Hello

    For Https Web sites, we will not receive a message block, it is because https with encrypted data and fire power module does not have the ability to decipher the encrypted traffic. Only the material fire power and now the latest version 6.0 Drambuie devices will have the ability to decrypt SSL traffic.

    Only FirePOWER series-3 device support SSL at the moment so, this is the expected behavior.

    Kind regards

    Aastha

    Rate if this can help!

  • Add the date of activation of the system of detention of intrusions and Cisco ASA FirePOWER

    Good evening

    I want to add detention system intrusions to Cisco ASA FirePOWER license (with I.P.S, protection MPAs., Apps and URL). Is possible that? I have to buy another license or only (not free) upgrade?

    the start date of the firepower Cisco ASA license-protection starts from the purchase date or from date of activation/installation on router ASA5506-X?

    Hi again, my responses below:

    (3) the L-ASA5506W-TAMÁS = is the correct part number if you are looking to get the model of 5506-X Wireless ASA. Don't know why ours (CDW) site has not listed :) However, we have listed promotional SKU: L-ASA5506WTAMC-1PR. For more information, I suggest that join you your CDW account manager. If you are not a customer CDW then I would suggest that you contact your local Cisco partner dealer

    (4) here's the datasheet FireSIGHT:

    http://www.Cisco.com/c/en/us/products/collateral/security/firesight-Management-Center/datasheet-C78-736775.html

    The device can be virtual or physical

    5.1) IOS-base-2960 - I'm not sure I understand the question. Can you elaborate a bit more on what you're asking here?

    5.2) I.D.S. requires no additional licenses. It is part of the solution if you buy above subscriptions. The main difference here is that IPS (Intrusion Prevention System) is deployed in line and he will drop the traffic/connections if a malicious activity is detected. IDS (Intrusion Detection System) is monitor only. Thus, if the malicious traffic is detected, firepower will alert you to this topic but he will drop all traffic.

    3DES/5,3) AES will be included at the time of the references you listed.

    Thank you for evaluating useful messages!

  • Registration Module software firepower to the CMF. Need a key "Reg"?

    Community,.

    I'm extremely new to the product of the power of fire and was assigned to the online in my new job. We have the power module of heat load on the x 5545 and CME loaded as a virtual machine on a server. IM at the stage now where Im trying to record the firepower to the CSP module using the Configure Manager add x.x.x.x   command in the CLI of Module of firepower. My question is, where can I get the registration key of? All the documentation says it's a key to register the module in the CSP. Unfortunately this deployment was already partially in place before I was here so I don't know what this alphanumeric key is or where to find it. Any ideas?

    Thank you!

    Hello Craddockc,

    You can use any combination of alphanumeric characters as key such as abc123.  Make sure that you add the same key when registering of firepower on CMF too.

    Note and mark the messages useful.

    Concerning

    Jetsy

  • ASA 5506 and control license included

    Hello! I have searched, but have not yet found a solid answer on this. We received an ASA5506-X, which has a license of control included.

    From what I see, to get all the benefits of the control license, I will also need a license of protection (as described here:http://www.cisco.com/c/en/us/td/docs/security/firesight/541/firepower-mo...)

    Is this correct? Is license included control essentially pointless until we get a license protection, or we would gain any advantage by applying?

    Thanks for the help!

    Self-control offers very limited functionality. See the following Cisco description:.

    Function application visibility and control (AVC) by default. This function allows the application identification and control more of 3,000 applications, detected and classified by risk and business relevance.

    To perform most interesting actions based on policies, you need one of the extra cost of licenses like IPS, filtering URL or Advanced Malware Protection (AMP).

  • Cisco ASA 5508 with firepower of speeds VPN

    Nice day

    Can someone tell me which is better performance Anyconnect VPN or Cisco VPN?, I intend to use a VPN for my users to connect and transfer files to a shared folder speed does.

    Also, I don't want my clients to access a Web page or portal to get the client I can install the VPN client on the client labtop.

    Is it possible to do this as well?

    Hello

    The shared screenshot has the correct option is selected.

    Yes anyconnect supports IPSEC thus:

    https://supportforums.Cisco.com/discussion/11501221/Cisco-AnyConnect-DOE...

    http://www.Cisco.com/c/en/us/support/docs/security/AnyConnect-secure-mob...

    Please visit this link for the plug ASA 5508-firepower:

    http://www.Cisco.com/c/en/us/products/collateral/security/ASA-5500-serie...

    Kind regards

    Aditya

    Please evaluate the useful messages and mark the correct answers.

  • Cisco Firepower 4110 Clustering with ASA and DFT

    Hi all

    We have a pair of Cisco 4110 firepower devices and have them clustered for the ASA Security Module.

    There seems to be no option to add an additional logical device for the threat of fire power defence Module, so can only assume this is not supported in an active/active state.

    More on the SAA Module there is no tab of remote access VPN Configuration.

    So my question is how to incorporate the functionality of defense threat in the ASA, I suppose that this would be by the engine unloading in the advanced settings, but requires the SAA be in Active mode / standby and the power of fire threat defense logical device will be available?

    Second question is it would have been better buy the Cisco ASA 5585 X with the Module of firepower in support of all the regular features of the SAA as well as traffic inspection unloading to the module of firepower?

    I found some documentation on the Cisco site, but tend to lose sight of where the reference to FTD and not be supported of the Clustering or RAS VPN not supported by ASA or FXOS docs, so I was hoping for some insight on here.

    Appreciate any clarity around the support of devices 4110 of the firepower and configuration of the FTD and ASA combines the features supported.

    We run ASA v9.6 (2) and FXOS 2.0.1 (86).

    Thanks in advance.

    Mark

    On a firepower 4100 Series chassis, you can run a single logical unit. Several logical devices are supported only on the 9300 firepower that supports up to 3 modules of security.

    So choosing between types of module ASA and DFT (or technically you can also deploy the RADware vDefense Pro but it is mainly for service providers).

    One or the other and never the two.

    The module of the SAA supports remote access VPN over 4110 of firepower. I put one in place personally nothing this month. Have you recorded the chassis with the smart licence and applied ASA licenses (basic an and 3DES / AES)?

    The ASA modules take supported the HA and inter-chassis clustering on the 4100 series hardware.

    If you run picture FTD, there is currently no support for remote access VPN. It is a high priority position of roadmap for a future version (post - 6.2). FTD does not currently support the chassis inter cluster but that should be in version 6.2.

  • Cannot change the access policy (firepower 6.1)

    Hello

    I use the Service Module of firepower on ASA5525 and MC, firepower, the two version 6.1.

    After the upgrade to version 6.1, I can't save any changes on my access policy. I always get a message "error saving data - another operation by another user has prevented this operation. Please try again after some time.
    I am the only on access to the MC, there is no task that is running and I tried to reload the MC, but I got the same error.

    Please, did anyone see that? This could be the cause?

    Thank you.

    I solved the problem by replacing all the objects 'Private network' by 'IPv4-private-All-RFC1918.

  • Flow of firepower of ASA

    Hi guys,.

    I noticed of Palo Alto and other sellers specify a much higher rate for their new generation compared to Cisco solution, when they make the full filtering URL, antivirus and anti-spam protection

    I think it's because they treat the package in parallel where ASA he treats one by a single module, is that correct?

    For example, ASA a past traffic to URL filtering, then Spam and then...

    Where as Palo Alto passes to the URL and SPam and... all at once so achieve a significantly higher flow rate.

    on this basis, it is correct to say that Cisco may not be the dealer in this area due to how they manage the firepower?

    I think the best way to address this issue is using NSS Labs reports. They publish an annual report which includes a chart to see how much you pay by protected Mbit/sec. Given that the supplier has published performance data are not always correct that you can watch their conclusions.

    I don't know if you're talking about absolute return (e.g. 7080 PAN vs FP9300), but in case you do I would say looking at the relative numbers and check what bitrate you lose by using for example the IPS.

    Architecture: hardware wise performance will always beat the software. FPGA used for specific loads occur always better than generic processors. Parallel processing is not something that each salesperson makes. Try to not get lost in the marketing of buzz and just analyze the performance counters and see how they compare when it comes to price - at the end of the day an architecture that results in better performance of 10%, but 100% higher price might not be what you're looking for.

  • Firepower does not work when using the Active Directory group as a rule filter access control

    I am PoV of Cisco ASA with the power of fire with my client. I would like to integrate the power of fire to MS Active Directory. Everything seems to work properly.

    -Fire power user agent installation to complete successfully. Connection to AD work fine. The newspaper is GREEN.

    -J' created a Kingdom in FireSight and you can download users and groups from Active Directory.

    -J' created a politics of identity with passive authentication (using the field I created)

    -Can I use the AD account "user" as a filter in access control rule and it work very well.

    However, if I create the rule of access control with AD Group', the rule never get match. I'm sure that the user that I test is a member of the group. Connection event show the system to ignore this rule and the traffic is blocked by the default action below. It doesn't look like the firepower doesn't know that the user belongs to the group.

    I use

    -User agent firepower for Active Directory v2.3 build 10.

    -ASA 5515 software Version 9.5 (2)

    -Fire version 6.0.0 - 1005 power module

    -Firepower for VMWare Management Center

    Any suggestion would be appreciated. Thanks in advance.

    Hello

    You should check the download user under domain option. Download the users once belonging to a group is specified on the ad and then test the connection.

    Thank you

    Yogesh

Maybe you are looking for