<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: FPR1140 in HA firmware update in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/fpr1140-in-ha-firmware-update/m-p/5344140#M1123367</link>
    <description>&lt;P&gt;this is what show network shows on the active fw.&lt;/P&gt;
&lt;P&gt;===============[ System Information ]===============&lt;BR /&gt;Hostname : FTxxxxxxx&lt;BR /&gt;DNS Servers : 2xxxxxxxxx&lt;BR /&gt;xxxxxxxxxxxx&lt;BR /&gt;xxxxxxxxxxxxxxxx&lt;BR /&gt;DNS from router : disabled&lt;BR /&gt;Management port : 8xxx&lt;BR /&gt;IPv4 Default route&lt;BR /&gt;Gateway : data-interfaces&lt;BR /&gt;IPv6 Default route&lt;BR /&gt;Gateway : data-interfaces&lt;/P&gt;
&lt;P&gt;==================[ management0 ]===================&lt;BR /&gt;Admin State : enabled&lt;BR /&gt;Admin Speed : 1gbps&lt;BR /&gt;Operation Speed : indeterminate&lt;BR /&gt;Link : link-down&lt;BR /&gt;Channels : Management &amp;amp; Events&lt;BR /&gt;Mode : Non-Autonegotiation &lt;BR /&gt;MDI/MDIX : Auto/MDIX &lt;BR /&gt;MTU : 1500&lt;BR /&gt;MAC Address : D4:xxxxxxxxxxx&lt;BR /&gt;----------------------[ IPv4 ]----------------------&lt;BR /&gt;Configuration : DHCP&lt;BR /&gt;----------------------[ IPv6 ]----------------------&lt;BR /&gt;Configuration : DHCP&lt;/P&gt;
&lt;P&gt;===============[ Proxy Information ]================&lt;BR /&gt;State : Disabled&lt;BR /&gt;Authentication : Disabled&lt;/P&gt;</description>
    <pubDate>Mon, 03 Nov 2025 16:58:52 GMT</pubDate>
    <dc:creator>peat</dc:creator>
    <dc:date>2025-11-03T16:58:52Z</dc:date>
    <item>
      <title>FPR1140 in HA firmware update</title>
      <link>https://community.cisco.com/t5/network-security/fpr1140-in-ha-firmware-update/m-p/5343380#M1123328</link>
      <description>&lt;P&gt;I went to update a pair of FPR1140 that are in HA yesterday using FDM.&lt;/P&gt;
&lt;P&gt;I had read conflicting instructions online.&amp;nbsp; Ciscos instructions were saying log on to the standby unit (which i cant as its in HA) so I went with some other instructions that said the whole process is automated. It said run the update on the active and that will then run a process starting with updating the standby first then switch over and update the active (now standby unit).&amp;nbsp; That all sounded good.&lt;/P&gt;
&lt;P&gt;I pressed update and got warnings straight off saying the internal and web certificates had expired.&amp;nbsp; I only installed these 2 FWs last year and didnt do anything with certs so had to look online what that was about.&amp;nbsp; &amp;nbsp;Found instructions how to update the certs which said i had to suspend the HA or I could lose Gui access!&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I carefully followed those instructions but after i suspended HA and then tried to add a new internal self signed cert (not even having applied it to anything) I got a warning saying I cant do that as the device isnt Active so I cant make any changes. Assuming because the HA was suspended.&lt;/P&gt;
&lt;P&gt;So my question is how do i sort this out as it feels like I'm in a loop here.&amp;nbsp; I cant update the certs in HA as I will lose gui access and i cant update the certs out of HA as the (suspended active) firewall says its not the active firewall so i cant make any changes.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 30 Oct 2025 11:25:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fpr1140-in-ha-firmware-update/m-p/5343380#M1123328</guid>
      <dc:creator>peat</dc:creator>
      <dc:date>2025-10-30T11:25:06Z</dc:date>
    </item>
    <item>
      <title>Re: FPR1140 in HA firmware update</title>
      <link>https://community.cisco.com/t5/network-security/fpr1140-in-ha-firmware-update/m-p/5343459#M1123337</link>
      <description>&lt;P&gt;You should be able to login to the standby unit in an FDM-managed HA pair - you just cannot make configuration changes from there.&lt;/P&gt;
&lt;P&gt;Then, just follow these official instructions:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/device-manager/740/upgrade-device-manager-74/upgrade-threat-defense.html#task_AE850BD023684725BBA13AEC03BFE1DF" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/upgrade/device-manager/740/upgrade-device-manager-74/upgrade-threat-defense.html#task_AE850BD023684725BBA13AEC03BFE1DF&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 30 Oct 2025 15:39:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fpr1140-in-ha-firmware-update/m-p/5343459#M1123337</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2025-10-30T15:39:20Z</dc:date>
    </item>
    <item>
      <title>Re: FPR1140 in HA firmware update</title>
      <link>https://community.cisco.com/t5/network-security/fpr1140-in-ha-firmware-update/m-p/5343461#M1123338</link>
      <description>&lt;P&gt;How do I log in to the standby unit?&amp;nbsp; It doesn't have an IP address on it.&amp;nbsp; I could get on the cli but not sure how that would help me.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 30 Oct 2025 15:42:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fpr1140-in-ha-firmware-update/m-p/5343461#M1123338</guid>
      <dc:creator>peat</dc:creator>
      <dc:date>2025-10-30T15:42:55Z</dc:date>
    </item>
    <item>
      <title>Re: FPR1140 in HA firmware update</title>
      <link>https://community.cisco.com/t5/network-security/fpr1140-in-ha-firmware-update/m-p/5343751#M1123346</link>
      <description>&lt;P&gt;The standby unit should have an address on its management interface. You can see it in the cli with "show network". But it should also present the FDM GUI via that same address you use for ssh. If you are using console for cli access, you may need to flip from fxos to clish by using "connect ftd" command.&lt;/P&gt;</description>
      <pubDate>Fri, 31 Oct 2025 17:20:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fpr1140-in-ha-firmware-update/m-p/5343751#M1123346</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2025-10-31T17:20:28Z</dc:date>
    </item>
    <item>
      <title>Re: FPR1140 in HA firmware update</title>
      <link>https://community.cisco.com/t5/network-security/fpr1140-in-ha-firmware-update/m-p/5344140#M1123367</link>
      <description>&lt;P&gt;this is what show network shows on the active fw.&lt;/P&gt;
&lt;P&gt;===============[ System Information ]===============&lt;BR /&gt;Hostname : FTxxxxxxx&lt;BR /&gt;DNS Servers : 2xxxxxxxxx&lt;BR /&gt;xxxxxxxxxxxx&lt;BR /&gt;xxxxxxxxxxxxxxxx&lt;BR /&gt;DNS from router : disabled&lt;BR /&gt;Management port : 8xxx&lt;BR /&gt;IPv4 Default route&lt;BR /&gt;Gateway : data-interfaces&lt;BR /&gt;IPv6 Default route&lt;BR /&gt;Gateway : data-interfaces&lt;/P&gt;
&lt;P&gt;==================[ management0 ]===================&lt;BR /&gt;Admin State : enabled&lt;BR /&gt;Admin Speed : 1gbps&lt;BR /&gt;Operation Speed : indeterminate&lt;BR /&gt;Link : link-down&lt;BR /&gt;Channels : Management &amp;amp; Events&lt;BR /&gt;Mode : Non-Autonegotiation &lt;BR /&gt;MDI/MDIX : Auto/MDIX &lt;BR /&gt;MTU : 1500&lt;BR /&gt;MAC Address : D4:xxxxxxxxxxx&lt;BR /&gt;----------------------[ IPv4 ]----------------------&lt;BR /&gt;Configuration : DHCP&lt;BR /&gt;----------------------[ IPv6 ]----------------------&lt;BR /&gt;Configuration : DHCP&lt;/P&gt;
&lt;P&gt;===============[ Proxy Information ]================&lt;BR /&gt;State : Disabled&lt;BR /&gt;Authentication : Disabled&lt;/P&gt;</description>
      <pubDate>Mon, 03 Nov 2025 16:58:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fpr1140-in-ha-firmware-update/m-p/5344140#M1123367</guid>
      <dc:creator>peat</dc:creator>
      <dc:date>2025-11-03T16:58:52Z</dc:date>
    </item>
    <item>
      <title>Re: FPR1140 in HA firmware update</title>
      <link>https://community.cisco.com/t5/network-security/fpr1140-in-ha-firmware-update/m-p/5344314#M1123372</link>
      <description>&lt;P&gt;What do you mean by saying the standby unit doesn't have an IP on it? the secondary device would have a management port and that port would be configured with a management IP address similar to what you have on the primary unit. If you didn't configure these devices and you don't know which IP the standby unit has then probably you can connect to the switch where the standby management port is connected to and try to lookup its MAC address and then try to look at the switch ARP table.&lt;/P&gt;</description>
      <pubDate>Tue, 04 Nov 2025 10:05:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fpr1140-in-ha-firmware-update/m-p/5344314#M1123372</guid>
      <dc:creator>Aref Alsouqi</dc:creator>
      <dc:date>2025-11-04T10:05:33Z</dc:date>
    </item>
    <item>
      <title>Re: FPR1140 in HA firmware update</title>
      <link>https://community.cisco.com/t5/network-security/fpr1140-in-ha-firmware-update/m-p/5344316#M1123373</link>
      <description>&lt;P&gt;That’s a tough loop to be stuck in. The best way out is to temporarily break the HA pair instead of just suspending it. Once the primary is running standalone, renew or replace the internal and web certificates there. After confirming access and stability, rebuild the HA pair the updated certs will sync automatically. Cisco’s HA update via FDM can get messy with expired certs, so doing it manually like this keeps GUI access safe and avoids getting locked out.&lt;/P&gt;</description>
      <pubDate>Tue, 04 Nov 2025 10:10:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fpr1140-in-ha-firmware-update/m-p/5344316#M1123373</guid>
      <dc:creator>davidmubarak</dc:creator>
      <dc:date>2025-11-04T10:10:11Z</dc:date>
    </item>
    <item>
      <title>Re: FPR1140 in HA firmware update</title>
      <link>https://community.cisco.com/t5/network-security/fpr1140-in-ha-firmware-update/m-p/5344338#M1123374</link>
      <description>&lt;P&gt;Thanks.&amp;nbsp; To temp break the HA will physically disconnecting the HA link do it or do I have to do it in the Gui?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Whilst they are both standalone I'm guessing I should get the management interfaces setup with IP's cus it looks like neither the primary or secondary have an IP on the management interfaces.&amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 04 Nov 2025 10:23:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fpr1140-in-ha-firmware-update/m-p/5344338#M1123374</guid>
      <dc:creator>peat</dc:creator>
      <dc:date>2025-11-04T10:23:00Z</dc:date>
    </item>
    <item>
      <title>Re: FPR1140 in HA firmware update</title>
      <link>https://community.cisco.com/t5/network-security/fpr1140-in-ha-firmware-update/m-p/5344342#M1123376</link>
      <description>&lt;P&gt;Curious how others handle this — do you use spreadsheets, in-house scoring systems, or something else to make project decisions faster?&lt;/P&gt;</description>
      <pubDate>Tue, 04 Nov 2025 10:26:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fpr1140-in-ha-firmware-update/m-p/5344342#M1123376</guid>
      <dc:creator>executordelta933</dc:creator>
      <dc:date>2025-11-04T10:26:44Z</dc:date>
    </item>
    <item>
      <title>Re: FPR1140 in HA firmware update</title>
      <link>https://community.cisco.com/t5/network-security/fpr1140-in-ha-firmware-update/m-p/5345770#M1123441</link>
      <description>&lt;P&gt;I take it I can set this command to give me mgmt IPs on the 2 firewalls (the HA port is on 8 so I think i'm safe to do this, these Ciscos make me very wary of making any changes as there always seems to be some weird caveat I wasn't expecting for what is normally a straight forward job)&lt;/P&gt;
&lt;P&gt;Then I will be safe to start the process of breaking ha, adding certs, then updating the firewalls...&lt;/P&gt;
&lt;P&gt;configure terminal&lt;BR /&gt;interface management&lt;BR /&gt;nameif management&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address 10.10.10.1 255.255.255.0 standby 10.10.10.2&lt;BR /&gt;management-only&lt;/P&gt;</description>
      <pubDate>Mon, 10 Nov 2025 10:26:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fpr1140-in-ha-firmware-update/m-p/5345770#M1123441</guid>
      <dc:creator>peat</dc:creator>
      <dc:date>2025-11-10T10:26:28Z</dc:date>
    </item>
    <item>
      <title>Re: FPR1140 in HA firmware update</title>
      <link>https://community.cisco.com/t5/network-security/fpr1140-in-ha-firmware-update/m-p/5345797#M1123444</link>
      <description>&lt;P&gt;You don't configure FTD with the "configure terminal" and subsequent commands you listed.&lt;/P&gt;
&lt;P&gt;Instead you would use "configure network ipv4 manual..." and related commands.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Reference:&amp;nbsp;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/firepower/command_ref/b_Command_Reference_for_Firepower_Threat_Defense/c_3.html#wp3839275562" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/firepower/command_ref/b_Command_Reference_for_Firepower_Threat_Defense/c_3.html#wp3839275562&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 10 Nov 2025 12:41:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fpr1140-in-ha-firmware-update/m-p/5345797#M1123444</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2025-11-10T12:41:26Z</dc:date>
    </item>
    <item>
      <title>Re: FPR1140 in HA firmware update</title>
      <link>https://community.cisco.com/t5/network-security/fpr1140-in-ha-firmware-update/m-p/5345852#M1123447</link>
      <description>&lt;P&gt;Thanks for that info.&amp;nbsp; I couldnt find anywhere in there where it says how to setup the standby IP unfortunately.&amp;nbsp; &amp;nbsp;&lt;/P&gt;
&lt;P&gt;I just checked on the FDM on the management interface and if i change it to static again there is nowhere to put in the standby IP.&lt;/P&gt;
&lt;P&gt;Whilst I was on there I looked at the HA setup and can see ips on the failover link on port 8.&amp;nbsp; &amp;nbsp;so could i in theory disconnect port 8 on the standby firewall (breaking the HA) then use the IP 10.10.1.2 on port 8 to get into the standby firewall?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Or should I just console into the standby firewall and set 10.10.2.2 on the mgmt interface there.&amp;nbsp; and set 10.10.2.1 on the primary mgmt interface in mdm.&amp;nbsp; &amp;nbsp;I am guessing I would need to disconnect HA for that though?&lt;/P&gt;</description>
      <pubDate>Mon, 10 Nov 2025 14:45:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fpr1140-in-ha-firmware-update/m-p/5345852#M1123447</guid>
      <dc:creator>peat</dc:creator>
      <dc:date>2025-11-10T14:45:47Z</dc:date>
    </item>
    <item>
      <title>Re: FPR1140 in HA firmware update</title>
      <link>https://community.cisco.com/t5/network-security/fpr1140-in-ha-firmware-update/m-p/5345863#M1123448</link>
      <description>&lt;P&gt;The management interface address does not replicate in an HA pair. It is set individually on each unit. Changing it via cli using the "configure network " command does not affect the HA configuration or require any down time. You will need to have the physical management interfaces properly connected to a switch and assigned to the VLAN that is associated with that subnet.&lt;/P&gt;</description>
      <pubDate>Mon, 10 Nov 2025 15:05:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fpr1140-in-ha-firmware-update/m-p/5345863#M1123448</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2025-11-10T15:05:07Z</dc:date>
    </item>
  </channel>
</rss>

