Hello Guys. Yesterday I have upgraded Firesight and ASA5555 to version 6 at our customer site. FireSight upgrade was easy and it completed successfully, but then I was unable to upgrade FirePower modules - I was getting error. So, I did it manually with recover procedure.
Customer is using Fisight with AD integration and FireSight user agent. So, after upgrade I had two problems:
FireSight was not working properly - it was not getting updates from User Agent and I was getting such message in FireSight Health monitor:
Thank you for your answer. I have tested connection from User Agent to AD and FireSight - is it ok.
About errors - I did not had enought time for troubleshooting, as main rules on firesight are based on AD groups and users. So when we found out this issues, we decided to rollback. That's why I am just asking about upgrade experience of ASA5555 and firesight manage to version 6.
Also, I am going to upgrade the system again in two-three days , again and I think, I will have enogh time for troubleshooting.
My guess, you traffic drop problem could have been due to snort process. You can check if there was some core generated using ls -lrt /var/common or if snort is Down or stuck, you can user command like "top" or "pmtool status | grep Running" or "pmtool status | grep Down".
Regarding User agent related issue as you mentioned we could have done more troubleshooting. I would suggest to open a TAC case and have a TAC engineer to look into it if you face same issue again.
Are you responsible for risk management, compliance management and auditing of a network?
If so, we’d like to speak with you to learn your current processes of enforcing compliance and managing risk to help us develop services that will ...
Once you've expanded Cisco Secure Endpoint connector deployment to about 50% of your licensed count (check out this article that shows you how to do that), it's time to put those connectors to action i.e. convert them to Protect from Audit mode for vari...
Hello! I’m Betsy, UX Researcher, on the Cisco+ Secure Connect Now team. Nice to meet you all .We have a short survey to learn about your Zero Trust Network Access (ZTNA) journey. Whether you have, plan to, or have not implemented a ...
A set of interface access rules can cause the Cisco Adaptive Security Appliance to permit or deny a designated host to access another particular host with a specific network application (service). When there is only one client, one host and one se...
How To: Cisco ISE Captive Portals with Aruba Wireless
Authors: Adam Hollifield, Brad Johnson
IntroductionPrerequisitesMinimum RequirementsComponents UsedConfigurationAruba Wireless ControllerWLAN CreationAuthentication ConfigurationRole & Policy Confi...