Upgrade ASA Active/Standby Failover Pair for the Secure Firewall (2024)

    Introduction

    This document describes how to upgradeASA for failover deployments for Secure Firewall 1000, 2100 in Appliance mode, and Secure Firewall 3100/4200.

    Prerequisites

    Requirements

    Cisco recommends that you have knowledge of these topics:

    • Cisco Secure Firewall Threat Defense.
    • Cisco Adaptive Security Appliance (ASA) configuration.

    Components Used

    The information in this document is based on the software versions:

    • Cisco Adaptive Security Appliance Software Version 9.14(4)
    • Cisco Adaptive Security Appliance Software Version 9.16(4)

    The information in this document was created from the devices in a specific lab environment. All of the devices used in this document started with a cleared (default) configuration. If your network is live, ensure that you understand the potential impact of any command.

    Configure

    Verify the Prerequisites

    Step 1. Run the command show fxos mode to verify that your device is in appliance mode

    Upgrade ASA Active/Standby Failover Pair for the Secure Firewall (1)

    Note: For Secure Firewall 21XX In version 9.13 and earlier, only support Platform mode. In version 9.14 and later, the Appliance mode is the default.

    ciscoasa# show fxos mode 
    Mode is currently set to appliance

    Step 2. Verify the compatibility.

    Consult the Cisco Secure Firewall ASA compatibility document to verify the compatibility between FTD hardware platform and the Secure Firewall ASA software. Refer to

    Cisco Secure Firewall ASA Compatibility

    Step 3. Download the upgrade package from Cisco Software Central.

    Upgrade ASA Active/Standby Failover Pair for the Secure Firewall (2)

    Note: For the Secure Firewall 1000/2100 and Secure Firewall 3100/4200, you cannot install ASA or FXOS separately; both images are part of a bundle.

    Consult the linked title to know the version of ASA and FXOS that are part of the bundle. See, Secure Firewall 1000/2100 and 3100/4200 ASA and FXOS Bundle Versions.

    Upgrade Using the CLI

    Step 1. Reset the ASDM image.

    Connect to the primary unit in global configuration mode and run the commands:

    ciscoasa(config)# asdm image disk0:/asdm.binciscoasa(config)# exitciscoasa# copy running-config startup-configSource filename [running-config]? Cryptochecksum: 6beb01d1 b7a3c30f 5e8eb557 a8ebb8ca 12067 bytes copied in 3.780 secs (4022 bytes/sec)

    Step 2. Upload the software image to the primary unit.

    ciscoasa# copy ftp://calo:[email protected]/cisco-asa-fp2k.9.16.4.SPA disk0:/cisco-asa-fp2k.9.16.4.SPAAddress or name of remote host [10.88.7.12]? Source username [calo]? Source password []? ****Source filename [cisco-asa-fp2k.9.16.4.SPA]? Destination filename [cisco-asa-fp2k.9.16.4.SPA]? Accessing ftp:/calo:<password>@10.88.7.12/cisco-asa-fp2k.9.16.4.SPA...!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!Verifying file disk0:/cisco-asa-fp2k.9.16.4.SPA...Writing file disk0:/cisco-asa-fp2k.9.16.4.SPA...474475840 bytes copied in 843.230 secs (562842 bytes/sec)

    Step 3. Upload the software image to the secondary unit.

    Run the command on the primary unit.

    ciscoasa# failover exec mate copy /noconfirm ftp://calo:[email protected]/cisco-asa-fp2k.9.16.4.SPA disk0:/cisco-asa-fp2k.9.16.4.SPAAccessing ftp://calo:<password>@10.88.7.12/cisco-asa-fp2k.9.16.4.SPA...!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!Verifying file disk0:/cisco-asa-fp2k.9.16.4.SPA...Writing file disk0:/cisco-asa-fp2k.9.16.4.SPA...474475840 bytes copied in 843.230 secs (562842 bytes/sec) 

    Step 4.Check if you have a current boot image configured with the show running-config boot system command.

    Upgrade ASA Active/Standby Failover Pair for the Secure Firewall (4)

    Note: You may not have configured a boot system.

    ciscoasa(config)# show running-config boot systemboot system disk0:/cisco-asa-fp2k.9.14.4.SPA

    Step 5 (optional).Encase you have boot image configured, you must remove it.

    no boot system diskn:/asa_image_name

    Example:

    ciscoasa(config)# no boot system disk0:/cisco-asa-fp2k.9.14.4.SPA

    Step 6. Select the image to boot.

    ciscoasa(config)# boot system disk0:/cisco-asa-fp2k.9.16.4.SPA The system is currently installed with security software package 9.14.4, which has: - The platform version: 2.8.1.172 - The CSP (asa) version: 9.14.4Preparing new image for install...!!!!!!!!!!!!Image download complete (Successful unpack the image).Installation of version 9.16.4 will do the following: - upgrade to the new platform version 2.10.1.217 - upgrade to the CSP ASA version 9.16.4After installation is complete, ensure to do write memory and reload to save this config and apply the new image.Finalizing image install process...Install_status: ready............................Install_status: validating-images....Install_status: upgrading-npuInstall_status: upgrading-system.Install_status: update-software-pack-completed

    Step 7. Save the configuration with the copy running-config startup-config command.

    Step 8. Reload the secondary unit to install the new version.

    ciscoasa(config)# failover reload-standby  

    Wait until the secondary unit loads.

    Step 9. Once the standby unit is reloaded, change the primary unit from the active state to standby state.

    ciscoasa# no failover active 

    Step 10. Reload the new standby unit to install the new version. You must connect to the new active unit.

    ciscoasa(config)# failover reload-standby 

    Once the new standby unit loads, the upgrade is complete.

    Upgrade Using ASDM

    Step 1. Connect to the secondary unit with ASDM.

    Upgrade ASA Active/Standby Failover Pair for the Secure Firewall (5)

    Step 2. Go to Tools > Upgrade Software from Local Computer.

    Upgrade ASA Active/Standby Failover Pair for the Secure Firewall (6)

    Step 3. Select ASA from the drop-down list.

    Upgrade ASA Active/Standby Failover Pair for the Secure Firewall (7)

    Step 4. In the Upgrade Software window, click on Browse Local Files to upload the software image to the secondary unit.

    Upgrade ASA Active/Standby Failover Pair for the Secure Firewall (8)

    Note: By default, the Flash File System Path is disk0; to change it, click on Browse Flash and select the new path.

    Upgrade ASA Active/Standby Failover Pair for the Secure Firewall (9)

    Click on Upload Image.

    Upgrade ASA Active/Standby Failover Pair for the Secure Firewall (10)

    Once the image upload is finished, click on No.

    Upgrade ASA Active/Standby Failover Pair for the Secure Firewall (11)

    Step 5. Reset the ASDM image.

    Connect to the primary unit with ASDM and go to Configuration > Device Management > System Image/Configuration > Boot Image/Configuration.

    In ASDM Image File Path, enter the value disk0:/asdm.bin and Apply.

    Upgrade ASA Active/Standby Failover Pair for the Secure Firewall (12)

    Step 6.Upload the software Image to the primary unit.

    Click on Browse Local Files and select the upgrade package on your device.

    Click on Upload Image.

    Upgrade ASA Active/Standby Failover Pair for the Secure Firewall (13)

    Once the image upload is finished, click on Yes.

    Upgrade ASA Active/Standby Failover Pair for the Secure Firewall (14)

    In the preview windows, click on Send button to save configuration.

    Upgrade ASA Active/Standby Failover Pair for the Secure Firewall (15)

    Step 7.Click on Save to save configuration.

    Upgrade ASA Active/Standby Failover Pair for the Secure Firewall (16)

    Step 8.Reload the secondary unit to install the new version.

    Go to Monitoring > Properties > Failover > Status and click on Reload Standby.

    Upgrade ASA Active/Standby Failover Pair for the Secure Firewall (17)

    Wait until the standby unit loads.

    Step 9. Once the standby unit is reloaded, change the primary unit from active state to standby state.

    Go to Monitoring > Properties > Failover > Status and click on Make Standby.

    Upgrade ASA Active/Standby Failover Pair for the Secure Firewall (18)

    Note: ASMD automatically connects to the new active unit.

    Upgrade ASA Active/Standby Failover Pair for the Secure Firewall (19)

    Step 10. Reload the new standby unit to install the new version.

    Go to Monitoring > Properties > Failover > Status and click on Reload Standby.

    Upgrade ASA Active/Standby Failover Pair for the Secure Firewall (20)

    Once the new standby unit loads, the upgrade is complete.

    Verify

    To validate that the upgrade has been completed on both units, check the upgrade via CLI and ASDM.

    Via CLI

    ciscoasa# show failover 
    Failover On
    Failover unit Primary
    Failover LAN Interface: folink Ethernet1/1 (up)
    Reconnect timeout 0:00:00
    Unit Poll frequency 1 seconds, holdtime 15 seconds
    Interface Poll frequency 5 seconds, holdtime 25 seconds
    Interface Policy 1
    Monitored Interfaces 1 of 1292 maximum
    MAC Address Move Notification Interval not set
    Version: Ours 9.16(4), Mate 9.16(4)
    Serial Number: Ours JAD25430R73, Mate JAD25430RCG
    Last Failover at: 22:45:48 UTC Jan 31 2024
    This host: Primary - Active
    Active time: 45 (sec)
    slot 0: FPR-2120 hw/sw rev (1.5/9.16(4)) status (Up Sys)
    Interface management (10.88.15.58): Normal (Monitored)
    Other host: Secondary - Standby Ready
    Active time: 909 (sec)
    slot 0: FPR-2120 hw/sw rev (1.5/9.16(4)) status (Up Sys)
    Interface management (10.88.15.59): Normal (Monitored)

    Stateful Failover Logical Update Statistics
    Link : folink Ethernet1/1 (up)
    Stateful Obj xmit xerr rcv rerr
    General 27 0 29 0
    sys cmd 27 0 27 0
    up time 0 0 0 0
    RPC services 0 0 0 0
    TCP conn 0 0 0 0
    UDP conn 0 0 0 0
    ARP tbl 0 0 1 0
    Xlate_Timeout 0 0 0 0
    IPv6 ND tbl 0 0 0 0
    VPN IKEv1 SA 0 0 0 0
    VPN IKEv1 P2 0 0 0 0
    VPN IKEv2 SA 0 0 0 0
    VPN IKEv2 P2 0 0 0 0
    VPN CTCP upd 0 0 0 0
    VPN SDI upd 0 0 0 0
    VPN DHCP upd 0 0 0 0
    SIP Session 0 0 0 0
    SIP Tx 0 0 0 0
    SIP Pinhole 0 0 0 0
    Route Session 0 0 0 0
    Router ID 0 0 0 0
    User-Identity 0 0 1 0
    CTS SGTNAME 0 0 0 0
    CTS PAC 0 0 0 0
    TrustSec-SXP 0 0 0 0
    IPv6 Route 0 0 0 0
    STS Table 0 0 0 0
    Umbrella Device-ID 0 0 0 0

    Logical Update Queue Information
    Cur Max Total
    Recv Q: 0 10 160
    Xmit Q: 0 1 53

    Via ASDM

    Go toMonitoring > Properties > Failover > Status, You can see the ASA Version for both devices.

    Upgrade ASA Active/Standby Failover Pair for the Secure Firewall (21)

    Related Information

    • Cisco Secure Firewall ASA Compatibility

    • Cisco Secure Firewall ASA Upgrade Guide

    Upgrade ASA Active/Standby Failover Pair for the Secure Firewall (2024)
    Top Articles
    Tax Write-Offs: Airbnb Hosts & Vacation Rental Owners
    RANKED: World's top 10 gold mining companies - MINING.COM
    Frederick County Craigslist
    Angela Babicz Leak
    Visitor Information | Medical Center
    Blanchard St Denis Funeral Home Obituaries
    Did 9Anime Rebrand
    South Carolina defeats Caitlin Clark and Iowa to win national championship and complete perfect season
    Merlot Aero Crew Portal
    Walgreens Alma School And Dynamite
    ds. J.C. van Trigt - Lukas 23:42-43 - Preekaantekeningen
    [2024] How to watch Sound of Freedom on Hulu
    [PDF] INFORMATION BROCHURE - Free Download PDF
    Diablo 3 Metascore
    Transfer Credits Uncc
    Les Schwab Product Code Lookup
    Daily Voice Tarrytown
    Air Force Chief Results
    Craigslist Prescott Az Free Stuff
    Apple Original Films and Skydance Animation’s highly anticipated “Luck” to premiere globally on Apple TV+ on Friday, August 5
    Air Traffic Control Coolmathgames
    Home
    Raw Manga 1000
    Move Relearner Infinite Fusion
    Is Light Raid Hard
    R Baldurs Gate 3
    Neteller Kasiinod
    Vadoc Gtlvisitme App
    Best Restaurants Ventnor
    WOODSTOCK CELEBRATES 50 YEARS WITH COMPREHENSIVE 38-CD DELUXE BOXED SET | Rhino
    Urban Blight Crossword Clue
    15 Downer Way, Crosswicks, NJ 08515 - MLS NJBL2072416 - Coldwell Banker
    Wbli Playlist
    Shnvme Com
    B.k. Miller Chitterlings
    Appraisalport Com Dashboard /# Orders
    Roto-Rooter Plumbing and Drain Service hiring General Manager in Cincinnati Metropolitan Area | LinkedIn
    Orangetheory Northville Michigan
    Kelsey Mcewen Photos
    Best Workers Compensation Lawyer Hill & Moin
    Petsmart Northridge Photos
    Mandy Rose - WWE News, Rumors, & Updates
    Craigslist Ludington Michigan
    Cocaine Bear Showtimes Near Cinemark Hollywood Movies 20
    If You're Getting Your Nails Done, You Absolutely Need to Tip—Here's How Much
    Jamesbonchai
    Tinfoil Unable To Start Software 2022
    Craigslist Binghamton Cars And Trucks By Owner
    Unblocked Games 6X Snow Rider
    San Diego Padres Box Scores
    Assignation en paiement ou injonction de payer ?
    Dumb Money Showtimes Near Regal Stonecrest At Piper Glen
    Latest Posts
    Article information

    Author: Van Hayes

    Last Updated:

    Views: 5880

    Rating: 4.6 / 5 (46 voted)

    Reviews: 85% of readers found this page helpful

    Author information

    Name: Van Hayes

    Birthday: 1994-06-07

    Address: 2004 Kling Rapid, New Destiny, MT 64658-2367

    Phone: +512425013758

    Job: National Farming Director

    Hobby: Reading, Polo, Genealogy, amateur radio, Scouting, Stand-up comedy, Cryptography

    Introduction: My name is Van Hayes, I am a thankful, friendly, smiling, calm, powerful, fine, enthusiastic person who loves writing and wants to share my knowledge and understanding with you.