<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Signature Update S601 Pulled From Cisco.com in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/signature-update-s601-pulled-from-cisco-com/m-p/1777754#M56101</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;One thing I have noticed in this thread is the only help being provided is from the community.&amp;nbsp; NICKSMI seems to be the only Cisco representative responding to this thread and his comments make it sound like it is our fault for not running the latest update.&amp;nbsp; But no were in the release notes of S601 does it say only supports 7.0.5 and above.&amp;nbsp; After a coupe of days of this you would think that someone within Cisco would be able to supply some answers besides upgrade to 7.0.6.&amp;nbsp; Some of us cannot because the S601 update screwed up the systems that bad.&amp;nbsp; It would be nice just to hear Cisco admit that they screwed up on this one but hear it what you can do to recover.&amp;nbsp; Come on and man up.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 14 Oct 2011 21:21:41 GMT</pubDate>
    <dc:creator>hartkl5277</dc:creator>
    <dc:date>2011-10-14T21:21:41Z</dc:date>
    <item>
      <title>Signature Update S601 Pulled From Cisco.com</title>
      <link>https://community.cisco.com/t5/network-security/signature-update-s601-pulled-from-cisco-com/m-p/1777738#M56077</link>
      <description>&lt;P&gt;Due to a bug in IPS software versions prior to 7.0.6, it is not advised to apply signature updates past S601 without having upgraded to 7.0.6 first.&amp;nbsp; This issue is being tracked as CSCtn23051.&amp;nbsp; &lt;SPAN style="color: #000000; font-size: 10pt; "&gt;If a customer has applied&amp;nbsp; S601 without problems, there is no issue beyond having to upgrade to 7.0.6 to&amp;nbsp; apply updates S602 and later.&lt;/SPAN&gt;&amp;nbsp; If you have not applied S601 yet, it is advised to upgrade to 7.0.6 before applying update S602 and later.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you for your patience and understanding in this matter.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Nicholas Smith&lt;/P&gt;&lt;P&gt;Cisco IPS Signature Team&lt;/P&gt;</description>
      <pubDate>Tue, 26 Mar 2019 00:20:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/signature-update-s601-pulled-from-cisco-com/m-p/1777738#M56077</guid>
      <dc:creator>nicksmi</dc:creator>
      <dc:date>2019-03-26T00:20:11Z</dc:date>
    </item>
    <item>
      <title>Signature Update S601 Pulled From Cisco.com</title>
      <link>https://community.cisco.com/t5/network-security/signature-update-s601-pulled-from-cisco-com/m-p/1777739#M56080</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Is there a fix for the systems that have the S601 applied and not responding?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 12 Oct 2011 15:17:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/signature-update-s601-pulled-from-cisco-com/m-p/1777739#M56080</guid>
      <dc:creator>hartkl5277</dc:creator>
      <dc:date>2011-10-12T15:17:10Z</dc:date>
    </item>
    <item>
      <title>Re: Signature Update S601 Pulled From Cisco.com</title>
      <link>https://community.cisco.com/t5/network-security/signature-update-s601-pulled-from-cisco-com/m-p/1777740#M56082</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Upgrade to 7.0(6) or 7.1.&amp;nbsp; Update 6.2.4 also resolves the issue.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 12 Oct 2011 15:36:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/signature-update-s601-pulled-from-cisco-com/m-p/1777740#M56082</guid>
      <dc:creator>nicksmi</dc:creator>
      <dc:date>2011-10-12T15:36:02Z</dc:date>
    </item>
    <item>
      <title>Re: Signature Update S601 Pulled From Cisco.com</title>
      <link>https://community.cisco.com/t5/network-security/signature-update-s601-pulled-from-cisco-com/m-p/1777741#M56083</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This is unacceptable. I've attempted to upgrade 4 devices to 7.0.6 today and three have failed.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You released signature update that only works on the latest code&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;...which has only been released for a month&lt;/P&gt;&lt;P&gt;... which automatically applies to all devices in the field&lt;/P&gt;&lt;P&gt;... without any ability to remove short of a reimage&lt;/P&gt;&lt;P&gt;... without sufficient (any?) testing on other versions &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What if you released a 602 sig file that is actually 600? Would that roll back?&amp;nbsp; If so, do that and release 601 as 603 when it's actually been tested!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;EDIT:&amp;nbsp; I have found that rebooting before attempting the upgrade seems to increase the chance of success.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 12 Oct 2011 20:19:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/signature-update-s601-pulled-from-cisco-com/m-p/1777741#M56083</guid>
      <dc:creator>hoylea</dc:creator>
      <dc:date>2011-10-12T20:19:38Z</dc:date>
    </item>
    <item>
      <title>Signature Update S601 Pulled From Cisco.com</title>
      <link>https://community.cisco.com/t5/network-security/signature-update-s601-pulled-from-cisco-com/m-p/1777742#M56084</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Mr. Anderson,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We apologize for the problems you have been experiencing with our sensors.&amp;nbsp; The root cause is a memory segmentation problem that is fixed in the 7.0(6) software release and cannot be reliably fixed via a signature update. Signature update S601 merely brought us to the threshold where the problem manifests itself more frequently.&amp;nbsp; Our updates are tested and due to the nature of this problem its occurrence is fairly random and we did not observe it.&amp;nbsp; We apologize for the problems this has caused and are reviewing our internal processes to avoid a reoccurrence.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We recomend that customers be at the latest signature update level to provide the max protection, and it is important to be at the latest code level as well to ensure reliable and effective functionality.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;At this time, we are asking you to open a TAC case to document your upgrade woes and resolve them.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/cisco/web/support/index.html"&gt;http://www.cisco.com/cisco/web/support/index.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you for your patience in this matter.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Nicholas Smith&lt;/P&gt;&lt;P&gt;Cisco IPS Signature Team&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 12 Oct 2011 21:42:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/signature-update-s601-pulled-from-cisco-com/m-p/1777742#M56084</guid>
      <dc:creator>nicksmi</dc:creator>
      <dc:date>2011-10-12T21:42:45Z</dc:date>
    </item>
    <item>
      <title>Re: Signature Update S601 Pulled From Cisco.com</title>
      <link>https://community.cisco.com/t5/network-security/signature-update-s601-pulled-from-cisco-com/m-p/1777743#M56085</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hoyle,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I had the same problem, this is what I did to get it downgraded.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;---------&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Downgrade from console---&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;....unplug&amp;nbsp; monitor port (prevent engine from running) .... reset IPS.....downgrade&amp;nbsp; from command line to 600....go to gui turn off auto update....plug&amp;nbsp; ports back in.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Downgrade from ssh---&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;shutdown&amp;nbsp; monitor port (prevent engine from running) .... reset IPS.....downgrade&amp;nbsp; from command line to 600....go to gui turn off auto update....plug&amp;nbsp; ports back in.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;At this point you should be able initiate the system upgrade.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Will&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 13 Oct 2011 00:06:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/signature-update-s601-pulled-from-cisco-com/m-p/1777743#M56085</guid>
      <dc:creator>whaydenscana</dc:creator>
      <dc:date>2011-10-13T00:06:28Z</dc:date>
    </item>
    <item>
      <title>Re: Signature Update S601 Pulled From Cisco.com</title>
      <link>https://community.cisco.com/t5/network-security/signature-update-s601-pulled-from-cisco-com/m-p/1777744#M56086</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Is the issue with a specific signature being loaded or something else in the package?&amp;nbsp; I was thinking that if is just a signature that you could use the command line to retire the signature so that it is not loaded and then reset the system.&amp;nbsp; Any thoughts or feedback?&amp;nbsp; Seems like S602 is taking a long time to get released, going through a better QA process I hope.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 13 Oct 2011 14:16:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/signature-update-s601-pulled-from-cisco-com/m-p/1777744#M56086</guid>
      <dc:creator>hartkl5277</dc:creator>
      <dc:date>2011-10-13T14:16:50Z</dc:date>
    </item>
    <item>
      <title>Signature Update S601 Pulled From Cisco.com</title>
      <link>https://community.cisco.com/t5/network-security/signature-update-s601-pulled-from-cisco-com/m-p/1777745#M56087</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Nick, you said "Update 6.2.4 also resolves the issue".&lt;/P&gt;&lt;P&gt;Does that mean that also the 6.0.x, 6.1.x and 6.2.[1,2,3] are affected by this bug?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you,&lt;/P&gt;&lt;P&gt;C.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 13 Oct 2011 14:43:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/signature-update-s601-pulled-from-cisco-com/m-p/1777745#M56087</guid>
      <dc:creator>Costin Vilcu</dc:creator>
      <dc:date>2011-10-13T14:43:45Z</dc:date>
    </item>
    <item>
      <title>Re: Signature Update S601 Pulled From Cisco.com</title>
      <link>https://community.cisco.com/t5/network-security/signature-update-s601-pulled-from-cisco-com/m-p/1777746#M56088</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The root issue is with the sensor software (CSCtn23051) and was addressed a number of months ago in the 7.0(5) SP.&amp;nbsp; We reccomend upgrading to 7.0(6) due to other issues with 7.0(5).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;S601 happens to fairly reliably reproduce the memory condition that triggers the bug.&amp;nbsp; The only way to reliably fix the problem is to upgrade the sensor software.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 13 Oct 2011 15:03:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/signature-update-s601-pulled-from-cisco-com/m-p/1777746#M56088</guid>
      <dc:creator>nicksmi</dc:creator>
      <dc:date>2011-10-13T15:03:41Z</dc:date>
    </item>
    <item>
      <title>Re: Signature Update S601 Pulled From Cisco.com</title>
      <link>https://community.cisco.com/t5/network-security/signature-update-s601-pulled-from-cisco-com/m-p/1777747#M56089</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I belive that is correct.&amp;nbsp; We reccomend that customers be at the latest sig update level to provide the max protection, and it is important to be at the latest code level as well to ensure reliable and effective functionality.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 13 Oct 2011 15:04:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/signature-update-s601-pulled-from-cisco-com/m-p/1777747#M56089</guid>
      <dc:creator>nicksmi</dc:creator>
      <dc:date>2011-10-13T15:04:21Z</dc:date>
    </item>
    <item>
      <title>Re: Signature Update S601 Pulled From Cisco.com</title>
      <link>https://community.cisco.com/t5/network-security/signature-update-s601-pulled-from-cisco-com/m-p/1777748#M56090</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; What is the reccommended course of action for those of us that have AIP-SSM's inside our firewalls?&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Question:&amp;nbsp; should we wait until 602 is released?&amp;nbsp; and will the automatic upgrade work for them i.e. will they automatically update to 602?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I cannot upgrade any of our AIP-SSM's currently running 7.0.4 (E4) to the current release via the GUI either with ASDM or with IEV.&amp;nbsp; This is pretty bad.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would like to avoid downtime since they are inside redundant fw pairs.&amp;nbsp; Upgrades of the AIP-SSM typically require a FW failover when upgrading, so waiting for a sig update to 602 is preferable if it will automatically update.&amp;nbsp; Otherwise I need to know if this will not work in order to schedule downtime / change control to get this fixed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;From a customer support standpoint, if this was a know issue which it evidently was ... Cisco needs to tell customers beforehand to upgrade to the most recent code rev.&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The fact that a sig update can kill off the IPS inside a FW is pretty lame.&amp;nbsp; It also shows the lack of regression testing in your software process.&amp;nbsp; You need to fix that but I guess since you guys outsource so much to foreign countries, I'm not surprised when stuff like this happens.&amp;nbsp; I've learned how to suffer being a Cisco customer.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 13 Oct 2011 15:48:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/signature-update-s601-pulled-from-cisco-com/m-p/1777748#M56090</guid>
      <dc:creator>twilcox</dc:creator>
      <dc:date>2011-10-13T15:48:19Z</dc:date>
    </item>
    <item>
      <title>Re: Signature Update S601 Pulled From Cisco.com</title>
      <link>https://community.cisco.com/t5/network-security/signature-update-s601-pulled-from-cisco-com/m-p/1777749#M56091</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Upgrading to S602 will not solve the problem.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Signature Update S601 aggravated a bug (CSCtn23051) existing in some older versions of the sensor software.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To resolve this issue, upgrade the sensor software to version 6.2(4) (released June 2011) or 7.0(5) (released May 2011) or greater (7.0(6) (released Sept 2011) is recommended).&amp;nbsp; Sensors running 7.1(x) software are not affected.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;A signature update will not resolve the problem.&amp;nbsp; While the problem may not immediately manifest itself with future signature updates, unless the sensor is updated, the problem can occur, depending on the sensor configuration, the traffic being inspected, and the state of the memory.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For the best protection it is critical to apply the appropriate service packs to the sensor to ensure reliable and accurate operation.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 13 Oct 2011 17:29:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/signature-update-s601-pulled-from-cisco-com/m-p/1777749#M56091</guid>
      <dc:creator>nicksmi</dc:creator>
      <dc:date>2011-10-13T17:29:17Z</dc:date>
    </item>
    <item>
      <title>Re: Signature Update S601 Pulled From Cisco.com</title>
      <link>https://community.cisco.com/t5/network-security/signature-update-s601-pulled-from-cisco-com/m-p/1777750#M56092</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Nicholas,&lt;/P&gt;&lt;P&gt;Thank you for taking the time to respond to this thread.&lt;/P&gt;&lt;P&gt;H&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 13 Oct 2011 17:49:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/signature-update-s601-pulled-from-cisco-com/m-p/1777750#M56092</guid>
      <dc:creator>hoylea</dc:creator>
      <dc:date>2011-10-13T17:49:15Z</dc:date>
    </item>
    <item>
      <title>Re: Signature Update S601 Pulled From Cisco.com</title>
      <link>https://community.cisco.com/t5/network-security/signature-update-s601-pulled-from-cisco-com/m-p/1777751#M56094</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;UPDATE:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Signature Update S601 aggravated a bug (&lt;A href="http://cdetsweb-prd.cisco.com/apps/dumpcr?identifier=CSCtn23051&amp;amp;parentprogram=QDDTS"&gt;CSCtn23051&lt;/A&gt;) existing in some older versions of the sensor software.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To resolve this issue, upgrade the sensor software to version &lt;A href="http://www.cisco.com/cisco/software/release.html?mdfid=278810718&amp;amp;flowid=4425&amp;amp;softwareid=282549759&amp;amp;release=6.2%284%29E4&amp;amp;rellifecycle=&amp;amp;relind=AVAILABLE&amp;amp;reltype=all"&gt;6.2(4)&lt;/A&gt; (released June 2011) or &lt;A href="http://www.cisco.com/cisco/software/release.html?mdfid=278810718&amp;amp;flowid=4425&amp;amp;softwareid=282549759&amp;amp;release=7.0%285a%29E4&amp;amp;rellifecycle=&amp;amp;relind=AVAILABLE&amp;amp;reltype=all"&gt;7.0(5)&lt;/A&gt; (released May 2011) or greater (&lt;A href="http://www.cisco.com/cisco/software/release.html?mdfid=278810718&amp;amp;flowid=4425&amp;amp;softwareid=282549759&amp;amp;release=7.0%286%29E4&amp;amp;rellifecycle=&amp;amp;relind=AVAILABLE&amp;amp;reltype=latest"&gt;7.0(6)&lt;/A&gt; (released Sept 2011) is recommended).&amp;nbsp; Sensors running 7.1(x) software are not affected.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;A signature update will &lt;STRONG&gt;not&lt;/STRONG&gt; resolve the problem.&amp;nbsp; While the problem may not immediately manifest itself with future signature updates, unless the sensor is updated, the problem can occur, depending on the sensor configuration, the traffic being inspected, and the state of the memory.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For the best protection it is critical to apply the appropriate service packs to the sensor to ensure reliable and accurate operation.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 13 Oct 2011 20:44:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/signature-update-s601-pulled-from-cisco-com/m-p/1777751#M56094</guid>
      <dc:creator>nicksmi</dc:creator>
      <dc:date>2011-10-13T20:44:47Z</dc:date>
    </item>
    <item>
      <title>Signature Update S601 Pulled From Cisco.com</title>
      <link>https://community.cisco.com/t5/network-security/signature-update-s601-pulled-from-cisco-com/m-p/1777752#M56096</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Wow, what a $#%# up.&amp;nbsp; Glad I had my module set to bypass, or I would have been super pissed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is what worked for me without any down time, since I'm a little lost without my precious GUI:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Putty into your ASA, and do "sh module", and you should see your ips module as 1.&amp;nbsp; Run command "&lt;STRONG&gt;hw-module module 1 reset" &lt;/STRONG&gt;to reset your ips module.&amp;nbsp; I tried running the update without restarting the module, and it just got hung up until I restarted it.&amp;nbsp; Download the upgrade 7.0(6) .pkg from cisco.&amp;nbsp; After module is backup, telnet to the module. Run upgrade as stated in this article "&lt;A href="http://www.cisco.com/en/US/docs/security/ips/6.2/configuration/guide/cli/cli_system_images.html#wp1142504"&gt;http://www.cisco.com/en/US/docs/security/ips/6.2/configuration/guide/cli/cli_system_images.html#wp1142504&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp; ".&amp;nbsp; After module is backup you should be good to go.&amp;nbsp; Module takes a while to restart, so be patient.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Not a pro, so please correct me if any of the above is wrong.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 14 Oct 2011 16:49:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/signature-update-s601-pulled-from-cisco-com/m-p/1777752#M56096</guid>
      <dc:creator>yantiscompany</dc:creator>
      <dc:date>2011-10-14T16:49:02Z</dc:date>
    </item>
    <item>
      <title>Re: Signature Update S601 Pulled From Cisco.com</title>
      <link>https://community.cisco.com/t5/network-security/signature-update-s601-pulled-from-cisco-com/m-p/1777753#M56099</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for the tip on the hw-module command that saved me a trip to one of our remote sites …&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 14 Oct 2011 17:26:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/signature-update-s601-pulled-from-cisco-com/m-p/1777753#M56099</guid>
      <dc:creator>twilcox</dc:creator>
      <dc:date>2011-10-14T17:26:04Z</dc:date>
    </item>
    <item>
      <title>Re: Signature Update S601 Pulled From Cisco.com</title>
      <link>https://community.cisco.com/t5/network-security/signature-update-s601-pulled-from-cisco-com/m-p/1777754#M56101</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;One thing I have noticed in this thread is the only help being provided is from the community.&amp;nbsp; NICKSMI seems to be the only Cisco representative responding to this thread and his comments make it sound like it is our fault for not running the latest update.&amp;nbsp; But no were in the release notes of S601 does it say only supports 7.0.5 and above.&amp;nbsp; After a coupe of days of this you would think that someone within Cisco would be able to supply some answers besides upgrade to 7.0.6.&amp;nbsp; Some of us cannot because the S601 update screwed up the systems that bad.&amp;nbsp; It would be nice just to hear Cisco admit that they screwed up on this one but hear it what you can do to recover.&amp;nbsp; Come on and man up.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 14 Oct 2011 21:21:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/signature-update-s601-pulled-from-cisco-com/m-p/1777754#M56101</guid>
      <dc:creator>hartkl5277</dc:creator>
      <dc:date>2011-10-14T21:21:41Z</dc:date>
    </item>
    <item>
      <title>Re: Signature Update S601 Pulled From Cisco.com</title>
      <link>https://community.cisco.com/t5/network-security/signature-update-s601-pulled-from-cisco-com/m-p/1777755#M56103</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;A lot of work to do.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It seems that upgrades work OK but I have problems with one IPS 4240 device which hangs. All other non-problematic devices are &lt;/P&gt;&lt;P&gt;ASA-AIP type.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any ideas why IPS ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks and best regards,&lt;/P&gt;&lt;P&gt;Marko&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 19 Oct 2011 20:04:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/signature-update-s601-pulled-from-cisco-com/m-p/1777755#M56103</guid>
      <dc:creator>m.vuckovic</dc:creator>
      <dc:date>2011-10-19T20:04:34Z</dc:date>
    </item>
    <item>
      <title>Re: Signature Update S601 Pulled From Cisco.com</title>
      <link>https://community.cisco.com/t5/network-security/signature-update-s601-pulled-from-cisco-com/m-p/1777756#M56105</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I had to open a TAC case because one of our AIP-SSM’s license files was corrupted.  The other three AIP-SSMs I was able to fix and one of the suggestions was to use the session command from the firewall which save me a trip out to a remote site to do a reboot manually (like unplug the unit from the FW) so someone posted a note about resetting the IPS 4250 appliances from the console port which would be a good idea to try if you haven’t done so already.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;All in all this issue cost me a couple of days of productive work.  And I agree that the guys from Cisco on this page pretty much came across as blaming us as end users for not upgrading to the latest code.  I mean we were a couple of revs back on 7.02 (e4) still in the same train of code; so I thought those comments were completely inappropriate especially since there was no prior warning or major service bulletin on the security bulletin that is emailed out; like the one I just received on S603 a few minutes ago.  In other words, that is how you need to warn customers about major code bugs like this …   that guy was acting like a corporate parrot, puppet and tool for blaming the customers.  I know he pissed off a lot of customers.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 19 Oct 2011 20:39:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/signature-update-s601-pulled-from-cisco-com/m-p/1777756#M56105</guid>
      <dc:creator>twilcox</dc:creator>
      <dc:date>2011-10-19T20:39:03Z</dc:date>
    </item>
    <item>
      <title>Signature Update S601 Pulled From Cisco.com</title>
      <link>https://community.cisco.com/t5/network-security/signature-update-s601-pulled-from-cisco-com/m-p/1777757#M56107</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Thank you very much for your comments. It seems that IPS 4240 is the only device that is having a problem, at least in my case. One sleepless night and tomorrow I'll open the case. For me whole week is strange so I'm in kind a&amp;nbsp; 'just think positive' mantra &lt;SPAN __jive_emoticon_name="cool" __jive_macro_name="emoticon" class="jive_macro jive_macro_emoticon" src="https://community.cisco.com/4.5.4/images/tiny_mce3/plugins/jiveemoticons/images/spacer.gif"&gt;&lt;/SPAN&gt; but I can understand the frustration of many of you.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 19 Oct 2011 21:07:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/signature-update-s601-pulled-from-cisco-com/m-p/1777757#M56107</guid>
      <dc:creator>m.vuckovic</dc:creator>
      <dc:date>2011-10-19T21:07:23Z</dc:date>
    </item>
  </channel>
</rss>

