02-18-2019 05:30 AM - edited 02-21-2020 08:49 AM
Hello together,
I have 2x5525-X (in a Failover-Cluster config) and (first Version from 2015) with the old IPS Software Modul.
I want to upgrade the 5525x Hardware with 2x5525-FP-UPG Pack, so that i can use the new Firepower Services.
So anyone here, he knows a Upgrade Path or an Guide for this procedure?
thanks for any help!
Br
Tino
Solved! Go to Solution.
02-18-2019 03:09 PM
As per one of thread from @marvin Rhodes
The support doesn't cover any of the upgrade.
You would need to purchase the SSD for each appliance. Have your reseller also order the (no cost) Control license.
Then you need to choose which features you want to license: IPS, URL Filtering and/or Malware (AMP) and the term (1, 3 or 5 years).
Finally you need to decide on local management (ASDM - limited features and per-device configuration required even in an HA pair) or remote (Firepower Management Center - requires a separate license and a VM but has the full feature set including the ability to share policies across multiple devices).
02-18-2019 03:09 PM
As per one of thread from @marvin Rhodes
The support doesn't cover any of the upgrade.
You would need to purchase the SSD for each appliance. Have your reseller also order the (no cost) Control license.
Then you need to choose which features you want to license: IPS, URL Filtering and/or Malware (AMP) and the term (1, 3 or 5 years).
Finally you need to decide on local management (ASDM - limited features and per-device configuration required even in an HA pair) or remote (Firepower Management Center - requires a separate license and a VM but has the full feature set including the ability to share policies across multiple devices).
02-19-2019 01:36 AM
02-19-2019 01:43 AM
The SSD is hot-swappable. The installation guide says to reboot after inserting but I have found that to not always be necessary.
You can always put it in the standby unit first, reload and then make standby active. The repeat on the newly standby unit.
02-19-2019 01:52 AM
02-19-2019 02:06 AM - edited 02-19-2019 02:12 AM
You're welcome.
I've done 3 pairs of them this year so far and they all went fine. Follow the module installation instructions carefully and you will be fine. Be sure to have your ASAs at one of the currently recommended code releases before beginning. 9.8(3) interim 21 is the current best choice.
https://software.cisco.com/download/home/284143129/type/280775065/release/9.8.3%20Interim
For the module software, overall 6.2.3.x is slightly recommended over 6.3.0 only because the latter hasn't had any patches released yet. That may change in the coming weeks.
You can always open a TAC case proactively if you have any doubt. (assuming your have Smartnet support)
02-19-2019 02:42 AM
08-30-2019 05:24 AM
08-30-2019 06:30 AM
Cisco updates the recommended versions regularly. Currently for most ASAs it's 9.8(4)10.
Reference the "Gold Star" here:
https://software.cisco.com/download/home/284143129/type/280775065/release/9.8.4%20Interim
09-13-2019 07:14 AM
Hi Marvin,
thanks for your fast response!
For the version 9.8(4)x, however, on the download page a lot of errors to read:
- Breaks Anyconnect (no workaround) and Failover (workaround)
- Removes default NAT for Internet Access
Perhaps it is better to go from 9.6 to 9.8.3.21, on the download page from 9.8.3, there is nothing to read of known errors?
Thanks for advice and best regards
09-13-2019 10:12 PM
9.8(4.8) fixes the critical bugs as far as I know. Have you looked at the interim build release notes?
https://www.cisco.com/web/software/280775065/146525/ASA-984-Interim-Release-Notes.html
09-16-2019 09:49 AM
Hi Marvin,
ok good to know!
Currently I have not made it yet to look into the notes.
Thanks for your advice.
Best regards
02-18-2019 10:05 PM
The basic configuration procedure is described here:
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide