<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Ah that makes sense. in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cisco-firewpower-update-fails-after-6-1/m-p/2957643#M149988</link>
    <description>&lt;P&gt;Ah that makes sense.&lt;/P&gt;
&lt;P&gt;In effect there is a proxy server - the FirePOWER module itself. As it inspects (decrypts / resigns) traffic in the data plane it caused its own traffic from the management plane to fail to connect.&lt;/P&gt;</description>
    <pubDate>Fri, 07 Apr 2017 12:49:24 GMT</pubDate>
    <dc:creator>Marvin Rhoads</dc:creator>
    <dc:date>2017-04-07T12:49:24Z</dc:date>
    <item>
      <title>Cisco FirewPOWER Update fails after 6.1</title>
      <link>https://community.cisco.com/t5/network-security/cisco-firewpower-update-fails-after-6-1/m-p/2957637#M149977</link>
      <description>&lt;P&gt;I have Cisco ASA 5516X with FirePOWER services. I received the FirePOWER running SFR 5.4.1-211.&lt;/P&gt;
&lt;P&gt;Via CLI - I performed a reimage of the device to upgrade the boot image&amp;nbsp;and the software to&amp;nbsp;6.0.0-1005.&lt;/P&gt;
&lt;P&gt;Via ASDM - I was able to use the update feature to go to 6.0.1.XX&lt;/P&gt;
&lt;P&gt;Via ASDM - I upgraded to 6.1&lt;/P&gt;
&lt;P&gt;Now I am not longer able to update via the update feature in ASDM.&lt;/P&gt;
&lt;P&gt;I get this error: Download updates failed: Peer certificate cannot be authenticated with known CA certificates.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Some Info:&lt;/P&gt;
&lt;P&gt;show module sfr&lt;/P&gt;
&lt;DIV&gt;Mod&amp;nbsp; MAC Address Range&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Hw Version&amp;nbsp;&amp;nbsp; Fw Version&amp;nbsp;&amp;nbsp; Sw Version&lt;BR /&gt;---- --------------------------------- ------------ ------------ ---------------&lt;BR /&gt;&amp;nbsp;sfr 002a.1025.7adb to 002a.1025.7adb&amp;nbsp; N/A&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; N/A&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 6.1.0-330&lt;/DIV&gt;
&lt;DIV&gt;Mod&amp;nbsp; SSM Application Name&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Status&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; SSM Application Version&lt;BR /&gt;---- ------------------------------ ---------------- --------------------------&lt;BR /&gt;&amp;nbsp;sfr ASA FirePOWER&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Up&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 6.1.0-330&lt;/DIV&gt;
&lt;DIV&gt;Mod&amp;nbsp; Status&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Data Plane Status&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Compatibility&lt;BR /&gt;---- ------------------ --------------------- -------------&lt;BR /&gt;&amp;nbsp;sfr Up&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Up&lt;/DIV&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Any ideas?&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 08:16:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-firewpower-update-fails-after-6-1/m-p/2957637#M149977</guid>
      <dc:creator>EckoForce_1</dc:creator>
      <dc:date>2019-03-12T08:16:20Z</dc:date>
    </item>
    <item>
      <title>Well at Release 6.1.0-330 you</title>
      <link>https://community.cisco.com/t5/network-security/cisco-firewpower-update-fails-after-6-1/m-p/2957638#M149978</link>
      <description>&lt;P&gt;Well at Release 6.1.0-330 you are at the latest release.&lt;/P&gt;
&lt;P&gt;Still - the ASDM update feature should confirm that and not throw the error.&lt;/P&gt;
&lt;P&gt;Are you running ASDM 7.6(2)?&lt;/P&gt;</description>
      <pubDate>Thu, 15 Sep 2016 03:10:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-firewpower-update-fails-after-6-1/m-p/2957638#M149978</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2016-09-15T03:10:04Z</dc:date>
    </item>
    <item>
      <title>Marvin,</title>
      <link>https://community.cisco.com/t5/network-security/cisco-firewpower-update-fails-after-6-1/m-p/2957639#M149981</link>
      <description>&lt;P&gt;Marvin,&lt;/P&gt;
&lt;P&gt;Yes I am running IOS&amp;nbsp;9.6(2), ASDM&amp;nbsp;7.6(2), and FirePOWER 6.1.0-330.&lt;/P&gt;
&lt;P&gt;The issue is I cant update anything via the "update"&lt;/P&gt;
&lt;P&gt;Actually this issue probably started before as I upgraded to 6.1 by downloading from Cisco and uploading.&amp;nbsp; I had to that with Snort, VDB and other&amp;nbsp;updates as well.&lt;/P&gt;</description>
      <pubDate>Thu, 15 Sep 2016 11:47:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-firewpower-update-fails-after-6-1/m-p/2957639#M149981</guid>
      <dc:creator>EckoForce_1</dc:creator>
      <dc:date>2016-09-15T11:47:06Z</dc:date>
    </item>
    <item>
      <title>When I try to:Download</title>
      <link>https://community.cisco.com/t5/network-security/cisco-firewpower-update-fails-after-6-1/m-p/2957640#M149983</link>
      <description>&lt;DIV&gt;When I try to:&lt;BR /&gt;Download Rules&lt;BR /&gt;Error&amp;nbsp;Peer certificate cannot be authenticated with known CA certificates&lt;/DIV&gt;
&lt;DIV&gt;&lt;/DIV&gt;
&lt;DIV&gt;Download Updates&lt;BR /&gt;Error&amp;nbsp;Download updates failed: Peer certificate cannot be authenticated with known CA certificates&lt;/DIV&gt;
&lt;DIV&gt;&lt;/DIV&gt;
&lt;DIV&gt;Update URL Filtering&lt;BR /&gt;Error&amp;nbsp;Failed URL Filtering Update: 2016-10-31 09:30:03&lt;/DIV&gt;
&lt;DIV&gt;&lt;/DIV&gt;
&lt;DIV&gt;Not sure whats wrong&lt;/DIV&gt;</description>
      <pubDate>Mon, 31 Oct 2016 13:36:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-firewpower-update-fails-after-6-1/m-p/2957640#M149983</guid>
      <dc:creator>EckoForce_1</dc:creator>
      <dc:date>2016-10-31T13:36:26Z</dc:date>
    </item>
    <item>
      <title>Is there possibly a proxy</title>
      <link>https://community.cisco.com/t5/network-security/cisco-firewpower-update-fails-after-6-1/m-p/2957641#M149985</link>
      <description>&lt;P&gt;Is there possibly a proxy server between your FirePOWER Management Center and the Internet?&lt;/P&gt;</description>
      <pubDate>Mon, 31 Oct 2016 13:57:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-firewpower-update-fails-after-6-1/m-p/2957641#M149985</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2016-10-31T13:57:22Z</dc:date>
    </item>
    <item>
      <title>Just getting back to this....</title>
      <link>https://community.cisco.com/t5/network-security/cisco-firewpower-update-fails-after-6-1/m-p/2957642#M149986</link>
      <description>&lt;P&gt;Just getting back to this.....&lt;/P&gt;
&lt;P&gt;This issue was caused by the SSL inspection configuration.&amp;nbsp; It was set to "Decrypt - Resign" all SSL traffic.&amp;nbsp; I added a "Do not decrypt" rule at the very top of the SSL Policy for the ASA and SFR module.&amp;nbsp; Once deployed works again.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 07 Apr 2017 10:39:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-firewpower-update-fails-after-6-1/m-p/2957642#M149986</guid>
      <dc:creator>EckoForce_1</dc:creator>
      <dc:date>2017-04-07T10:39:08Z</dc:date>
    </item>
    <item>
      <title>Ah that makes sense.</title>
      <link>https://community.cisco.com/t5/network-security/cisco-firewpower-update-fails-after-6-1/m-p/2957643#M149988</link>
      <description>&lt;P&gt;Ah that makes sense.&lt;/P&gt;
&lt;P&gt;In effect there is a proxy server - the FirePOWER module itself. As it inspects (decrypts / resigns) traffic in the data plane it caused its own traffic from the management plane to fail to connect.&lt;/P&gt;</description>
      <pubDate>Fri, 07 Apr 2017 12:49:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-firewpower-update-fails-after-6-1/m-p/2957643#M149988</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2017-04-07T12:49:24Z</dc:date>
    </item>
    <item>
      <title>yeah you would think the ASA</title>
      <link>https://community.cisco.com/t5/network-security/cisco-firewpower-update-fails-after-6-1/m-p/2957644#M149990</link>
      <description>&lt;P&gt;yeah you would think the ASA/SFR would be aware but oh well.&amp;nbsp; It appears support.sourcefire.com is similar to google.com in chrome.&amp;nbsp; Another issue we are having where resigning google certs fails to load the page.&amp;nbsp; All the workarounds (from cisco and google) are to whitelist the domains....&lt;/P&gt;</description>
      <pubDate>Fri, 07 Apr 2017 13:08:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-firewpower-update-fails-after-6-1/m-p/2957644#M149990</guid>
      <dc:creator>EckoForce_1</dc:creator>
      <dc:date>2017-04-07T13:08:23Z</dc:date>
    </item>
    <item>
      <title>I believe that may be due to</title>
      <link>https://community.cisco.com/t5/network-security/cisco-firewpower-update-fails-after-6-1/m-p/2957645#M149991</link>
      <description>&lt;P&gt;I believe that may be due to what's known as "certificate pinning". It's becoming a greater and greater issue. Apps like iTunes and Dropbox have it too.&lt;/P&gt;
&lt;P&gt;The preferred approach in the long term is to put security on the endpoints using solutions like Cisco Umbrella (former OpenDNS product) and AMP for Enpdpoints.&lt;/P&gt;</description>
      <pubDate>Fri, 07 Apr 2017 16:14:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-firewpower-update-fails-after-6-1/m-p/2957645#M149991</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2017-04-07T16:14:21Z</dc:date>
    </item>
    <item>
      <title>Correct, but this is past</title>
      <link>https://community.cisco.com/t5/network-security/cisco-firewpower-update-fails-after-6-1/m-p/2957646#M149992</link>
      <description>&lt;P&gt;Correct, but this is past cert pinning and HSTS.&amp;nbsp; This is specific only to Chrome and google domains.&amp;nbsp; For example google.com works on IE, Edge, Firefox and Opera.&amp;nbsp; Even though they are pinning the cert we resign and they accept it but Google Chrome can check it further down in the application - I suppose since they had some cert forgery in the past the decided to implement this. &amp;nbsp; Oh well, just added a do not decrypt for DN=*.google for the application chrome and the it works fine.&lt;/P&gt;</description>
      <pubDate>Fri, 07 Apr 2017 17:10:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-firewpower-update-fails-after-6-1/m-p/2957646#M149992</guid>
      <dc:creator>EckoForce_1</dc:creator>
      <dc:date>2017-04-07T17:10:59Z</dc:date>
    </item>
  </channel>
</rss>

