<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Firewall IOS UpGradation in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/firewall-ios-upgradation/m-p/2235687#M386915</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You can still have zero downtime upgrade across major releases. Other than that, your procedure is generally correct.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;One important step to add is to check and understand the migrated NAT rules after step k above. There will be a file created on disk0: explaining what rules were migrated and any exceptions generated. Those are typically the biggest source of concern during an upgrade to 8.3+.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;After you have successfully upgraded I would also encourage you to look at moving to AnyConnect 3.1 as a separate activity. Your configurations currently include the older and less capable AnyConnect 2.5.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would also first remove all of the fsck* files on both units. Those are the results of non-graceful reloads and not necessary for system operation. After everything is verified running fine on the upgraded pair I would go back later and delete the old ASA and ASDM images as well.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 15 May 2013 13:43:28 GMT</pubDate>
    <dc:creator>Marvin Rhoads</dc:creator>
    <dc:date>2013-05-15T13:43:28Z</dc:date>
    <item>
      <title>Firewall IOS UpGradation</title>
      <link>https://community.cisco.com/t5/network-security/firewall-ios-upgradation/m-p/2235686#M386914</link>
      <description>&lt;P style="margin-bottom: 0.0001pt;"&gt;Hi Team,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="margin-bottom: 0.0001pt;"&gt;I got an assignment from one of the customer.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="margin-bottom: 0.0001pt;"&gt;As per the customer request they would like to upgrade existing firewall ( Active/Standby) ios from 8.2(4)&amp;nbsp; to 9.1.1.&lt;/P&gt;&lt;P style="margin-bottom: 0.0001pt;"&gt;They have two firewal without context and one firewall is acting as active and second one is working as Standby.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="margin-bottom: 0.0001pt;"&gt;What all points i need to take care before upgrading to 9.1.1 ? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="margin-bottom: 0.0001pt;"&gt;Whether IOS will automatically upgrade existing legacy configuration to new syntax ? ( My Answer is yes )&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="margin-bottom: 0.0001pt;"&gt;What all issues i may face after IOS upgradation?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="margin-bottom: 0.0001pt;"&gt;Without down time whether i will able to complete IOS upgradation? ( My answer is no because its Major upgrade from 8.X to 9.X).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="margin-bottom: 0.0001pt;"&gt;Also please share your experience.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="margin-bottom: 0.0001pt;"&gt;These are the steps, i am going to follow.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;•a.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Configuration backup&lt;/LI&gt;&lt;LI&gt;•b.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Download IOS from Cisco portal.&lt;/LI&gt;&lt;LI&gt;•c.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Copies the ASA software to the active unit flash memory.&lt;/LI&gt;&lt;LI&gt;•d.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Copies the software to the standby unit.&lt;/LI&gt;&lt;LI&gt;•e.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Copies the ASDM image to the active unit flash memory.&lt;/LI&gt;&lt;LI&gt;•f.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Copies the ASDM image to the standby unit.&lt;/LI&gt;&lt;LI&gt;•g.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Removes any existing boot image configurations.&lt;/LI&gt;&lt;LI&gt;•h.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Sets the ASA image to boot that newly uploaded IOS.&lt;/LI&gt;&lt;LI&gt;•i.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Sets the ASDM image.&lt;/LI&gt;&lt;LI&gt;•j.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Saves the new settings to the startup configuration.&lt;/LI&gt;&lt;LI&gt;•k.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Reloads the standby unit to boot the new image.&lt;/LI&gt;&lt;LI&gt;•l.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Forces the active unit to fail over to the standby unit.&lt;/LI&gt;&lt;LI&gt;•m.&amp;nbsp;&amp;nbsp;&amp;nbsp; Reloads the former active unit.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="margin-bottom: 0.0001pt;"&gt;Please let me know if i need to change this flow.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="margin-bottom: 0.0001pt;"&gt;I have uploaded a sample crafted configuration for your reference. ( Partial-Crafted-FakeIpaddress-Passwords are available in this sample configuration)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="margin-bottom: 0.0001pt;"&gt;Thank You.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="margin-bottom: 0.0001pt;"&gt;VKV&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 01:43:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firewall-ios-upgradation/m-p/2235686#M386914</guid>
      <dc:creator>vivekkumarv</dc:creator>
      <dc:date>2019-03-12T01:43:32Z</dc:date>
    </item>
    <item>
      <title>Firewall IOS UpGradation</title>
      <link>https://community.cisco.com/t5/network-security/firewall-ios-upgradation/m-p/2235687#M386915</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You can still have zero downtime upgrade across major releases. Other than that, your procedure is generally correct.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;One important step to add is to check and understand the migrated NAT rules after step k above. There will be a file created on disk0: explaining what rules were migrated and any exceptions generated. Those are typically the biggest source of concern during an upgrade to 8.3+.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;After you have successfully upgraded I would also encourage you to look at moving to AnyConnect 3.1 as a separate activity. Your configurations currently include the older and less capable AnyConnect 2.5.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would also first remove all of the fsck* files on both units. Those are the results of non-graceful reloads and not necessary for system operation. After everything is verified running fine on the upgraded pair I would go back later and delete the old ASA and ASDM images as well.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 15 May 2013 13:43:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firewall-ios-upgradation/m-p/2235687#M386915</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2013-05-15T13:43:28Z</dc:date>
    </item>
    <item>
      <title>Re: Firewall IOS UpGradation</title>
      <link>https://community.cisco.com/t5/network-security/firewall-ios-upgradation/m-p/2235688#M386916</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;We recently did something similar, but from 8.2 to 8.3.&lt;/P&gt;&lt;P&gt;What it meant for us, completely redo all our NAT rules, the rest seems fine.&lt;/P&gt;&lt;P&gt;Regarding AnyConnect 3.1, it's not really a must to change. It offers some new features, but also a very annoying caveat, it starts automatically with Login into Windows. That means you always have AnyConnect running in the background and you can only disable this with a little registry hack to get the old behaviour back.&lt;/P&gt;&lt;P&gt;Also check the changed RAM and Flash requirements for ASA 8.3 and newer!&lt;/P&gt;&lt;P&gt;[Edit]&lt;/P&gt;&lt;P&gt;Just checked your attachement, as you use a 5585-X the memory requirements are fine.&lt;/P&gt;&lt;P&gt;You might want to take 9.1.2 though, it was released today and fixes a ton of bugs.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 15 May 2013 13:53:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firewall-ios-upgradation/m-p/2235688#M386916</guid>
      <dc:creator>patoberli</dc:creator>
      <dc:date>2013-05-15T13:53:59Z</dc:date>
    </item>
    <item>
      <title>Re: Firewall IOS UpGradation</title>
      <link>https://community.cisco.com/t5/network-security/firewall-ios-upgradation/m-p/2235689#M386917</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Patoberli - thanks for the heads up on 9.1(2). I hadn't noticed that yet. Lots of good stuff there.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You're also right re checking memory as a general step . I had already noticed the OP was talking about a 5585 though which is a memory-rich platform already. &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 15 May 2013 14:04:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firewall-ios-upgradation/m-p/2235689#M386917</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2013-05-15T14:04:55Z</dc:date>
    </item>
  </channel>
</rss>

