Deployment failed on device due to snort failed to restart
Upgraded my HA pair of FTD 2110s to 6.2.3 a couple weeks ago. Yesterday I started seeing FW01 as primary-failed and FW02 as secondary-active. Turns out the primary failed due to snort failing to restart. Rebooted FW01 and still the same issue. Cisco TAC suggested to break the HA pair and then try reboots to see if that fixes the issue. No such luck.
Also, a hotfix for 126.96.36.199-10 was released 2 days ago which I applied and now both FW01 and FW02 are failing deployments due to snort.
Anyone else having the issues or know a quick fix?
Attackers will always target the "low hanging fruit": devices that have passed end-of-software maintenance and end-of-support. A few years ago, Cisco described the evolution of attacks against infrastructure devices. All of the attacks discussed in t...
I somehow stumbled upon Cisco's IBNS 2.0 Auto Identity (AI) templates in my CML/VIRL IOSv layer2 image (IOS 15.2(6)).
I find these templates great, because these are the best practices that we tend to hard-code manually - e.g there are...
Hello. Thanks in advance for any input. I have just spun up a Cisco ISE lab and having some issues with the certificates. I created a self-signed certificate to be used with EAP and admin. DNS name of ise1.example.local points to the ...
Adversarial Tactics and TechniquesA Call to Action
Cisco Identity Services Engine (ISE) gives you intelligent Integrated protection through intent-based policy and compliance solution. Cisco ISE supports posturing of endpoints with different ...
Cisco Defense Orchestrator (CDO) is a cloud-based, multi-device manager that manages security products like Adaptive Security Appliance (ASA), Firepower Threat Defense next-generation firewall, and Meraki devices, to name a few.
We make improvement...