<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Firepower version via cli in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/firepower-version-via-cli/m-p/3717528#M32308</link>
    <description>&lt;P&gt;Hi there,&lt;/P&gt;
&lt;P&gt;SSH onto the device and issue the command &lt;STRONG&gt;sh module&lt;/STRONG&gt; ...the lines beginning '&lt;STRONG&gt;sfr&lt;/STRONG&gt;' will give you the info you're after. A python script with a bit of regex could scrape this info easily.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;cheers,&lt;/P&gt;
&lt;P&gt;Seb.&lt;/P&gt;</description>
    <pubDate>Tue, 02 Oct 2018 15:17:55 GMT</pubDate>
    <dc:creator>Seb Rupik</dc:creator>
    <dc:date>2018-10-02T15:17:55Z</dc:date>
    <item>
      <title>Firepower version via cli</title>
      <link>https://community.cisco.com/t5/network-security/firepower-version-via-cli/m-p/3717519#M32299</link>
      <description>&lt;P&gt;Is there a way to collect the current running version of firepower without using FMC? SSH, snmp, python, etc...&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have dozens of different sites in multiple states that have firepower modules in their Cisco ASAs.&amp;nbsp; I would like to create a dashboard that checks each one maybe once a month and displays their running version (6.2.3.5) and even better if it can include the vuln and fingerprint version as well (304).&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have tried&amp;nbsp;applications like spiceworks, but nothing seems to really be able to get that information from outside of the management center&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 16:18:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-version-via-cli/m-p/3717519#M32299</guid>
      <dc:creator>Danny Mainprize</dc:creator>
      <dc:date>2020-02-21T16:18:39Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower version via cli</title>
      <link>https://community.cisco.com/t5/network-security/firepower-version-via-cli/m-p/3717528#M32308</link>
      <description>&lt;P&gt;Hi there,&lt;/P&gt;
&lt;P&gt;SSH onto the device and issue the command &lt;STRONG&gt;sh module&lt;/STRONG&gt; ...the lines beginning '&lt;STRONG&gt;sfr&lt;/STRONG&gt;' will give you the info you're after. A python script with a bit of regex could scrape this info easily.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;cheers,&lt;/P&gt;
&lt;P&gt;Seb.&lt;/P&gt;</description>
      <pubDate>Tue, 02 Oct 2018 15:17:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-version-via-cli/m-p/3717528#M32308</guid>
      <dc:creator>Seb Rupik</dc:creator>
      <dc:date>2018-10-02T15:17:55Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower version via cli</title>
      <link>https://community.cisco.com/t5/network-security/firepower-version-via-cli/m-p/3717770#M32318</link>
      <description>&lt;P&gt;That gets me the network sensor version, thank you for that.&amp;nbsp; I&amp;nbsp;was also hoping to get the other versions of software, but hopefully I can base everything from the sensor.&lt;/P&gt;</description>
      <pubDate>Tue, 02 Oct 2018 20:03:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-version-via-cli/m-p/3717770#M32318</guid>
      <dc:creator>Danny Mainprize</dc:creator>
      <dc:date>2018-10-02T20:03:11Z</dc:date>
    </item>
  </channel>
</rss>

