01-08-2019 09:53 AM
Hello,
I'm facing this issue and a lot of downtime in the envinronment. I have downgraded the version of FTD device from 6.2.3.8 to 6.2.3.6, but the problem still happening. TAC support told me that is not needed to downgrade the FMC version, but I'm confusing and I guess that I will do it. Any suggestion?
01-08-2019 01:00 PM
My resolution was to spin up a new vFMC and point the sensors to that. I exported the policies from the old one to the new one and now am happy. I have also upgraded to 6.3.0. Upgrading the old vFMC and sensors to 6.3.0 didn't work.
01-08-2019 01:05 PM - edited 01-08-2019 01:07 PM
You cannot have your FMC or any managed device running v6.2.3.8 as that code contains the critical bug that somehow made it through Cisco QA.
If your managed devices have already been upgraded to v6.2.3.8 you'll need to downgrade them via the CLI first, then downgrade your FMC to v6.2.3.7 and redeploy policies.
01-08-2019 01:51 PM - edited 01-08-2019 01:53 PM
To downgrade an SFR or FTD box you can do the following. (THIS WILL REBOOT THE DEVICE WHEN DONE)
Once that is done run the uninstaller in FMC.
If you run scheduled updates/upgrades be sure to delete the bad upgrades from the FMC under system > updates as well.
The only workaround we've seen is to possibly disable all file inspection policy in your access control policies.
01-09-2019 07:39 AM
I can also confirm, Cisco TAC tells me to disable file inspection for a workaround, until 6.2.3.9 comes out tomorrow with the permanent fix. No downgrade needed.
01-09-2019 02:57 PM
Yes, I did it and it worked for me. I'm waiting the new release with the permanent fix.
01-09-2019 04:32 PM
01-11-2019 08:56 AM
The version 6.2.3.9 was released. I'll upgrade to this version all environment FMC and FTDs to test. If someone already have upgraded to this version, please, inform to me.
01-14-2019 10:52 AM
Did the upgrade to 6.2.3.9 solve the problem? did you previously have the File policy on with Http selected or no ?
Tx
01-11-2019 09:00 AM - edited 01-11-2019 09:04 AM
I ran into the same thing on our system. The problem started after we'd only upgraded the FMC, while the sensor was still running 6.2.3.7. TAC knew right away what the issue was when I called them, and they had me change the system policy so the sensor would be in Monitor mode, which got things running (but of course opened a gaping security hole).
I reverted the FMC back to 6.2.3.7 and restored a backup I'd taken just before the upgrade, and for good measure I wiped and recreated the sensor on our ASA. That seems to have fixed the issue (26+ hours and no blackhole *knocks on wood*).
I'm going to give 6.3.2.9 some more time to mature before I make the leap.
01-11-2019 11:54 AM - edited 01-14-2019 10:57 AM
We had to downgrade the FMC as well. Beware: The FMC may clear your config and cause interface, routing, and NAT problems.
If you need to restore your backup, you need to have all devices on the same software version.
We have been going back and forth for 4 days with TAC. We are still trying to return to a normal state at this time.
Steps that may save you trouble:
1) Downgrade everything to previous software release.
2) Restore from a backup before 6.2.3.8 was applied. See this bug:CSCvb77246
Edit: 1/11 our system returned to normal.
Beware removing devices from FMC, still problem in 6.2.3.7. See this bug:CSCvb77246
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide