09-22-2015 12:56 AM - edited 03-12-2019 05:46 AM
Hi, can anybody help me please?
I have Cisco ASA 5516-X. It is connected to Virtual Defense Center.
How there is an updating through VDC? In System-Updates I see many different updates, such as: Sourcefire Vulnerability And Fingerprint Database Updates, Sourcefire 3D Defense Center S3 Patch, Cisco Network Sensor Patch
1) How to understand what it is necessary to setup?
2) Cisco Network Sensor Patch is it for Cisco ASA? I have two Cisco ASA in failover how it will behave if both modules will start rebooting?
3) On the Rule Updates page, configuration of updating of signatures for Cisco ASA or for VDC?
09-22-2015 07:50 AM
For the VDB updates you can set them to automatically download and reapply your policies to your managed devices afterwards. (or automatically download to FireSIGHT Management Center only or not download automatically at all).
For the device and sensor updates, you should check the release notes for the respective packages. they will tell you applicability in addition to allowing you to make and informed decision about upgrading or not.
If you try to update a target device with an incompatible package, FireSIGHT Management Center will tell you it's incompatible and prevent the operation.
When updating your devices in an HA pair, it is generally best to update the standby unit first and, after validating success, then failover to it as active and then upgrade the other unit. If both sensors (FirePOWER modules) are offline, you may or may not have connectivity through the firewall - depending on whether your service-policy is set to fail-open or fail-closed.
03-09-2016 02:39 PM
Hello,
I'm new to DCenter.
Couple questions...
Is it good practice to setup Recurring Rule Update Imports?
Does:
Cisco Network Sensor Patch = sensor update?
Sourcefire 3D Defensse Center S3 Patch = device update?
Just to verify... Installing a device or sensor patch that indicates reboot, will stop all traffic unless the service policy is set to fail-open?
03-09-2016 08:46 PM
Recurring Rule Update Imports - with reapply policy after import - is a recommended practice.
Cisco Network Sensor Patch = update of the software running on the ASA FirePOWER module
Sourcefire 3D Defense Center S3 Patch = update of Defense Center itself (old name - it's FirePOWER Management Center as of 6.0)
Installing a device or sensor patch that indicates reboot, will stop all traffic unless the service policy is set to fail-open - That is correct.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide