<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Firepower 6.2.3 released in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/firepower-6-2-3-released/m-p/3367470#M924182</link>
    <description>&lt;P&gt;It was an internal doc.&amp;nbsp; I wouldn't want to be responsible for any issues it might cause.&amp;nbsp; I suggest you contact TAC for the workaround.&lt;/P&gt;</description>
    <pubDate>Tue, 17 Apr 2018 15:56:24 GMT</pubDate>
    <dc:creator>dan.letkeman</dc:creator>
    <dc:date>2018-04-17T15:56:24Z</dc:date>
    <item>
      <title>Firepower 6.2.3 released</title>
      <link>https://community.cisco.com/t5/network-security/firepower-6-2-3-released/m-p/3357974#M924170</link>
      <description>&lt;P&gt;For all of you out there eager to upgrade their lab environments (or brave enough to upgrade to a new software release a few hours after release), Firepower 6.2.3 has just been released and brings some interesting and long awaited changes...&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Some features worth noting:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;SSL Hardware Acceleration&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;FPR4100/9300 can make use of their built in crypto chips for ssl encryption and decryption&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Firepower Management Center REST API Improvements&lt;BR /&gt;&lt;/STRONG&gt;CRUD Operations for NAT, Static Routing, and HA Bundling&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Upgrade Package Push&lt;/STRONG&gt;&lt;BR /&gt;Download updates to your sensors before maintenance windows... Saves a lot of time in case you have some low bandwidth links&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Policy Deploy Restart Improvements&lt;BR /&gt;&lt;/STRONG&gt;Less snort restarts during policy deployments, leading to more smoother policy deployments&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Firepower Device Manager REST API&lt;/STRONG&gt;&lt;BR /&gt;FTD now includes an API browser and a large set of CRUD operations&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Direct Upgrade from 6.1.x (!)&lt;/STRONG&gt;&lt;BR /&gt;Starting with version 6.1.0 you can directly upgrade to 6.2.3. No need to go through many time consuming upgrades (upgrade times should also be greatly enhanced, but we'll see &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Apart from some other enhancements there have been 207 bug fixes and minor changes in default behavior. For a full list of changes check out the release notes:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/firepower/623/relnotes/Firepower_Release_Notes_623.html" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/firepower/623/relnotes/Firepower_Release_Notes_623.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;EDIT:&lt;/P&gt;
&lt;P&gt;The Upgrade was pulled of the cisco download site due to a bug that basically changed your ips variable set when you were using objects in it. An updated upgrade package should be available on monday, 2nd of april.&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 15:34:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-6-2-3-released/m-p/3357974#M924170</guid>
      <dc:creator>Oliver Kaiser</dc:creator>
      <dc:date>2020-02-21T15:34:53Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower 6.2.3 released</title>
      <link>https://community.cisco.com/t5/network-security/firepower-6-2-3-released/m-p/3358164#M924171</link>
      <description>&lt;P&gt;I was brave enough to attempt the FMC upgrade, of which doesn't appear to be available to download any longer at the time of writing this. Luck was not on my side...&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I am running the FMCv on ESXi, was at version 6.2.2.2, managed one FTD device (FP 2110).&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;My upgrade fails at 42%, I'm still playing around with it (blindly) but wanted to share what I am seeing in case it helps anyone make a more informed decision.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;getting&amp;nbsp;filenames&amp;nbsp;from&amp;nbsp;[/usr/local/sf/etc/db_updates/base-6.2.3]&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;getting&amp;nbsp;exceptions&amp;nbsp;from&amp;nbsp;[/usr/local/sf/etc/db_exceptions/db_exceptions.yaml]&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Unable&amp;nbsp;to&amp;nbsp;run&amp;nbsp;DB&amp;nbsp;Check,&amp;nbsp;Can't&amp;nbsp;call&amp;nbsp;method&amp;nbsp;"e;selectall_arrayref"e;&amp;nbsp;on&amp;nbsp;unblessed&amp;nbsp;reference&amp;nbsp;at&amp;nbsp;/usr/local/sf/bin/DBCheck.pl&amp;nbsp;line&amp;nbsp;71.&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;running&amp;nbsp;database&amp;nbsp;integrity&amp;nbsp;check&amp;nbsp;with&amp;nbsp;the&amp;nbsp;following&amp;nbsp;options:&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;-&amp;nbsp;use&amp;nbsp;exception&amp;nbsp;directory&amp;nbsp;/usr/local/sf/etc/db_exceptions&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;-&amp;nbsp;check&amp;nbsp;refererences&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;-&amp;nbsp;check&amp;nbsp;enterprise&amp;nbsp;objects&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;-&amp;nbsp;check&amp;nbsp;schema&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;-&amp;nbsp;check&amp;nbsp;required&amp;nbsp;data&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;-&amp;nbsp;log&amp;nbsp;to&amp;nbsp;file&amp;nbsp;/var/log/sf/Sourcefire_3D_Defense_Center_S3_Upgrade-6.2.3/DBCheck.log&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;-&amp;nbsp;log&amp;nbsp;to&amp;nbsp;stderr&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Fatal&amp;nbsp;error:&amp;nbsp;ERROR:&amp;nbsp;Post-install&amp;nbsp;database&amp;nbsp;integrity&amp;nbsp;check&amp;nbsp;failed&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;**********************************************************&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;[180330&amp;nbsp;17:22:35:398]&amp;nbsp;Starting&amp;nbsp;script:&amp;nbsp;600_schema/110_post_update_dbic.sh&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Entering&amp;nbsp;600_schema/110_post_update_dbic.sh...&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;No&amp;nbsp;/.skip_pidbic&amp;nbsp;file&amp;nbsp;found,&amp;nbsp;running&amp;nbsp;the&amp;nbsp;post&amp;nbsp;install&amp;nbsp;database&amp;nbsp;integrity&amp;nbsp;check&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;getting&amp;nbsp;filenames&amp;nbsp;from&amp;nbsp;[/usr/local/sf/etc/db_updates/index]&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;getting&amp;nbsp;filenames&amp;nbsp;from&amp;nbsp;[/usr/local/sf/etc/db_updates/base-6.2.3]&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;getting&amp;nbsp;exceptions&amp;nbsp;from&amp;nbsp;[/usr/local/sf/etc/db_exceptions/db_exceptions.yaml]&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;I don't have much experiance or knowledge working through the linux based CLI so I won't be able to provide much logs. I do see this though:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!&lt;BR /&gt;The Cisco 6.2.3 upgrade has halted, status:&lt;BR /&gt; [42%] Fatal error: Error running script 600_schema/110_post_update_dbic.sh&lt;/P&gt;
&lt;P&gt;Log files for the halted upgrade are located beneath:&lt;BR /&gt; /var/log/sf/Sourcefire_3D_Defense_Center_S3_Upgrade-6.2.3&lt;BR /&gt;If log files indicate upgrade failure please contact technical support.'&lt;BR /&gt;!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!&lt;/P&gt;
&lt;P&gt;If log files indicate upgrade failure and failure condition has been fixed, up grade can be resumed by running 'upgrade_resume.sh'&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Fourtanently my system hasn't made it to production yet...&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 30 Mar 2018 17:35:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-6-2-3-released/m-p/3358164#M924171</guid>
      <dc:creator>Brandon1</dc:creator>
      <dc:date>2018-03-30T17:35:37Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower 6.2.3 released</title>
      <link>https://community.cisco.com/t5/network-security/firepower-6-2-3-released/m-p/3358191#M924172</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I would suggest to open TAC case for this one.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;Yogesh&lt;/P&gt;</description>
      <pubDate>Fri, 30 Mar 2018 18:10:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-6-2-3-released/m-p/3358191#M924172</guid>
      <dc:creator>yogdhanu</dc:creator>
      <dc:date>2018-03-30T18:10:20Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower 6.2.3 released</title>
      <link>https://community.cisco.com/t5/network-security/firepower-6-2-3-released/m-p/3358218#M924173</link>
      <description>Hi,&lt;BR /&gt;Had exactly same crash.&lt;BR /&gt;Index errors in my db.&lt;BR /&gt;It was in my lab so I reinstalled it.&lt;BR /&gt;&lt;BR /&gt;Br, Micke</description>
      <pubDate>Fri, 30 Mar 2018 18:51:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-6-2-3-released/m-p/3358218#M924173</guid>
      <dc:creator>mikael.lahtela</dc:creator>
      <dc:date>2018-03-30T18:51:18Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower 6.2.3 released</title>
      <link>https://community.cisco.com/t5/network-security/firepower-6-2-3-released/m-p/3358220#M924174</link>
      <description>&lt;P&gt;I downloaded the update for our 2110 and then ran the install_update.pl --readiness-check from the cli.&amp;nbsp; The final response at the end of the check says "UPGRADE READINESS CHECK COMPLETE&amp;nbsp; status : PASS" but when I scroll up a bit there's an error that says the appliance lacks enough disk space to install the update:&lt;/P&gt;
&lt;P&gt;"...&lt;/P&gt;
&lt;P&gt;[180330 18:35:43:278] Low disk space detected, upgrade may fail if pruning not recovered enough disk space 000_start/410_check_disk_space.sh&lt;BR /&gt;Find largest table in /var/lib/mysql ...&lt;BR /&gt;Checking for 770048K of /var disk space to upgrade the database&lt;BR /&gt;Total disk space calculated based on mysql files&lt;BR /&gt;Warning: Using a password on the command line interface can be insecure.&lt;BR /&gt;/ngfw/Volume/lib/mysql /ngfw/var/tmp/selfgz225123829&lt;BR /&gt;/ngfw/var/tmp/selfgz225123829&lt;BR /&gt;disk space required to backup database is 2107578&lt;BR /&gt;Total /var disk space needed for upgrade is 11006138&lt;BR /&gt;Fatal error: Not enough var disk space available.&amp;nbsp; You need at least 11006138K free to perform this upgrade.&amp;nbsp; You have 8302620K free.&lt;BR /&gt;Low disk space detected, upgrade may fail if pruning not recovered enough disk space&lt;BR /&gt;[180330 18:35:43:281] continuing on next script due to readiness check.&lt;/P&gt;
&lt;P&gt;..."&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;How is it possible that the check passed after it failed the space check, and how is it possible an update has been released that won't fit on the appliance?&lt;/P&gt;</description>
      <pubDate>Fri, 30 Mar 2018 19:01:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-6-2-3-released/m-p/3358220#M924174</guid>
      <dc:creator>davidgardnerccs2</dc:creator>
      <dc:date>2018-03-30T19:01:27Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower 6.2.3 released</title>
      <link>https://community.cisco.com/t5/network-security/firepower-6-2-3-released/m-p/3358377#M924175</link>
      <description>&lt;P&gt;I upgraded my FMC and two managed sensors (FTDv) in my lab successfully. That went without a hitch and has been running OK so far.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I also upgraded an ASA 5506 with local (FDM) management. I ended up having to reimage it and start from bare metal. Once I did that it is also working fine (so far).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/169850"&gt;@Oliver Kaiser&lt;/a&gt;&amp;nbsp;I will be interested to see if you do some further experimentation with the API now that there are a bunch more PUT operations available.&lt;/P&gt;</description>
      <pubDate>Sat, 31 Mar 2018 07:42:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-6-2-3-released/m-p/3358377#M924175</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2018-03-31T07:42:40Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower 6.2.3 released</title>
      <link>https://community.cisco.com/t5/network-security/firepower-6-2-3-released/m-p/3359096#M924176</link>
      <description>I am currently working on ansible modules for the FMC API... Hopefully I will be done with a alpha release by end of april. I will update this post once I have something that is useful to others. &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;</description>
      <pubDate>Mon, 02 Apr 2018 16:20:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-6-2-3-released/m-p/3359096#M924176</guid>
      <dc:creator>Oliver Kaiser</dc:creator>
      <dc:date>2018-04-02T16:20:25Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower 6.2.3 released</title>
      <link>https://community.cisco.com/t5/network-security/firepower-6-2-3-released/m-p/3359223#M924177</link>
      <description>&lt;P&gt;I received a workaround from TAC for this.&amp;nbsp; I was on 6.2.2 upgrading to 6.2.3 and had the same issue.&amp;nbsp; There was a bug that didn't rotate the mysql-server.err file.&amp;nbsp; This workaround must be done in order to have enough space.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The bug is fixed in 6.2.2.2&amp;nbsp;and 6.2.3 but if you don''t have space you can't upgrade so you are stuck with performing the workaround.&lt;/P&gt;</description>
      <pubDate>Mon, 02 Apr 2018 19:59:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-6-2-3-released/m-p/3359223#M924177</guid>
      <dc:creator>dan.letkeman</dc:creator>
      <dc:date>2018-04-02T19:59:36Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower 6.2.3 released</title>
      <link>https://community.cisco.com/t5/network-security/firepower-6-2-3-released/m-p/3359228#M924178</link>
      <description>&lt;P&gt;Installed 6.2.3 on the 30th on an FMCv, 2120 and a 5545x which are all working without issue.&amp;nbsp; I don't use IPS so I didn't have an issue with the bug that was found last week.&amp;nbsp; I had a list of 8 bugs that I ran into with 6.2.2 so 6.2.3 was a welcome patch to install.&amp;nbsp; For me SSL deycrption is the only thing still not working properly even on 6.2.3.&lt;/P&gt;</description>
      <pubDate>Mon, 02 Apr 2018 20:03:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-6-2-3-released/m-p/3359228#M924178</guid>
      <dc:creator>dan.letkeman</dc:creator>
      <dc:date>2018-04-02T20:03:08Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower 6.2.3 released</title>
      <link>https://community.cisco.com/t5/network-security/firepower-6-2-3-released/m-p/3361835#M924179</link>
      <description>&lt;P&gt;After reading the Firepower Compatibility guide, I understand that for 4100/9000 Appliances, FXOS should be upgraded first to 2.3.1.73+ on the appliance before proceeding with the FMC upgrade&lt;/P&gt;</description>
      <pubDate>Fri, 06 Apr 2018 14:17:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-6-2-3-released/m-p/3361835#M924179</guid>
      <dc:creator>Moe Shea</dc:creator>
      <dc:date>2018-04-06T14:17:49Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower 6.2.3 released</title>
      <link>https://community.cisco.com/t5/network-security/firepower-6-2-3-released/m-p/3362084#M924180</link>
      <description>Subscribed for updates on the ansible modules.&lt;BR /&gt;&lt;BR /&gt;Hopefully they release the API for VPN operations soon.</description>
      <pubDate>Fri, 06 Apr 2018 22:56:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-6-2-3-released/m-p/3362084#M924180</guid>
      <dc:creator>michoudi</dc:creator>
      <dc:date>2018-04-06T22:56:04Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower 6.2.3 released</title>
      <link>https://community.cisco.com/t5/network-security/firepower-6-2-3-released/m-p/3367451#M924181</link>
      <description>&lt;P&gt;Hi Dan,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Can you share the provided workaround? I'm stuck trying to upgrade a NGFWv from 6.2.2.2 to 6.2.3, getting the disk space errors.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I tried to free some disk space erasing old update files, logs, tmp and so on, but still unsuccessful.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thank you for your help!&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 17 Apr 2018 15:24:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-6-2-3-released/m-p/3367451#M924181</guid>
      <dc:creator>edeloscobos</dc:creator>
      <dc:date>2018-04-17T15:24:52Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower 6.2.3 released</title>
      <link>https://community.cisco.com/t5/network-security/firepower-6-2-3-released/m-p/3367470#M924182</link>
      <description>&lt;P&gt;It was an internal doc.&amp;nbsp; I wouldn't want to be responsible for any issues it might cause.&amp;nbsp; I suggest you contact TAC for the workaround.&lt;/P&gt;</description>
      <pubDate>Tue, 17 Apr 2018 15:56:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-6-2-3-released/m-p/3367470#M924182</guid>
      <dc:creator>dan.letkeman</dc:creator>
      <dc:date>2018-04-17T15:56:24Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower 6.2.3 released</title>
      <link>https://community.cisco.com/t5/network-security/firepower-6-2-3-released/m-p/3370106#M924183</link>
      <description>&lt;P&gt;Thank you Dan,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I will contact TAC to get help.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;</description>
      <pubDate>Fri, 20 Apr 2018 19:41:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-6-2-3-released/m-p/3370106#M924183</guid>
      <dc:creator>edeloscobos</dc:creator>
      <dc:date>2018-04-20T19:41:24Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower 6.2.3 released</title>
      <link>https://community.cisco.com/t5/network-security/firepower-6-2-3-released/m-p/3398004#M924184</link>
      <description>&lt;P&gt;I will be doing the same. It&amp;nbsp;would be nice if Cisco formally published the workaround advice, since&amp;nbsp;you need a current support contract to&amp;nbsp;download the update in the first place.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Jun 2018 12:09:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-6-2-3-released/m-p/3398004#M924184</guid>
      <dc:creator>David Lang</dc:creator>
      <dc:date>2018-06-12T12:09:17Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower 6.2.3 released</title>
      <link>https://community.cisco.com/t5/network-security/firepower-6-2-3-released/m-p/3410421#M924185</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;SPAN&gt;&amp;nbsp;Brandon,&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;I do see a Fatal erro in your logs. if you are upgrading FMC to 6.2.3 then all your sensor in the FMC must be at least on 6.1.0 version.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;The Fatal error mainly refers if the senors are not supporting to the FMC upgrade which you are going.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;check on upgrading sensors first with the supported version of FMC which you are going either 6.2.0 or 6.2.3 etc. then you can upgrade the FMC.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Regards,&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Azeem Usman&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 04 Jul 2018 19:27:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-6-2-3-released/m-p/3410421#M924185</guid>
      <dc:creator>azeemusman.mca@gmail.com</dc:creator>
      <dc:date>2018-07-04T19:27:01Z</dc:date>
    </item>
  </channel>
</rss>

