Here's a link regarding the Cisco Firepower (FPR) 2100 upgrade in ASA version 9.12 and earlier (Platform mode). You can only perform the upgrade via the FXOS CLI and it will remain in Platform mode. You can change to Appliance mode after it has been upgraded to ASA version 9.13 and above.
Here's a link on how to perform the FTD to ASA re-image procedure (and vice versa). This is in case you've received the wrong Firepower appliance image.
You can check the ASA version using the show version command. Notice it's version 9.12 and runs in Platform mode (default).
ciscoasa# show version
Cisco Adaptive Security Appliance Software Version 9.12(1)2
Firepower Extensible Operating System Version 2.6(1.113)
Device Manager Version 7.12(1)
ciscoasa# show fx?
ERROR: % Unrecognized command
ciscoasa# configure terminal
ciscoasa(config)# fxos ?
configure mode commands/options:
https Configure FXOS HTTPS options
snmp Configure FXOS SNMP options
ssh Configure FXOS SSH options
You can transfer the ASA image using the scope firmware FX-OS CLI command. Use the show download-task to check the transfer status.
Cisco FPR Series Security Appliance
firepower-2120 login: admin
Password: <Admin123>
firepower-2120# scope firmware
firepower-2120 /firmware # download image ftp://ftpuser@172.27.25.253/cisco-asa-fp2k.9.16.3.19.SPA
Password: <FTP PASSWORD>
Please use the command 'show download-task' or 'show download-task detail' to check download progress.
firepower-2120 /firmware # show download-task
Download task:
File Name Protocol Server Port Userid State
--------- -------- --------------- ---------- --------------- -----
cisco-asa-fp2k.9.16.3.19.SPA
Ftp 172.27.25.253 0 ftpuser Failed
firepower-2120 /firmware # show download-task
Download task:
File Name Protocol Server Port Userid State
--------- -------- --------------- ---------- --------------- -----
cisco-asa-fp2k.9.16.3.19.SPA
Tftp 172.27.25.253 0 Failed
I tried FTP and FTP file transfer but both failed. I made a search and learned that I encountered an ASA bug. The only way to transfer the image file is via USB (slot beside the CONSOLE port).
firepower-2120 /firmware # show fault
Severity Code Last Transition Time ID Description
--------- -------- ------------------------ -------- -----------
Cleared F16517 2022-09-13T03:01:59.715 153432 [FSM:STAGE:FAILED]: deleting downloadable cisco-asa-fp2k.9.16.3.19.SPA on local(FSM-STAGE:sam:dme:FirmwareDownloaderDownload:DeleteLocal)
Cleared F77957 2022-09-13T03:01:59.715 153430 [FSM:STAGE:REMOTE-ERROR]: Result: end-point-failed Code: unspecified Message: End point timed out. Check for IP, port, password, disk space or network access related issues.#(sam:dme:FirmwareDownloaderDownload:DeleteLocal)
Cleared F999557 2022-09-13T03:01:59.715 153438 [FSM:FAILED]: downloading image cisco-asa-fp2k.9.16.3.19.SPA from 172.27.25.253(FSM:sam:dme:FirmwareDownloaderDownload)
firepower-2120# scope firmware
firepower-2120 /firmware # download image usbA:/cisco-asa-fp2k.9.16.3.19.SPA
Please use the command 'show download-task' or 'show download-task detail' to check download progress.
firepower-2120 /firmware # show download-task detail
Download task:
File Name: cisco-asa-fp2k.9.16.3.19.SPA
Protocol: Usb A
Server:
Port: 0
Userid:
Path:
Downloaded Image Size (KB): 463204
Time stamp: 2022-09-13T17:25:39.762
State: Downloading
Status: validating and unpacking the image
Transfer Rate (KB/s): 18528.160156
Current Task: unpacking image cisco-asa-fp2k.9.16.3.19.SPA on primary(FSM-STAGE:sam:dme:FirmwareDownloaderDownload:UnpackLocal)
firepower-2120 /firmware # show download-task
Download task:
File Name Protocol Server Port Userid State
--------- -------- --------------- ---------- --------------- -----
cisco-asa-fp2k.9.16.3.19.SPA
Usb A 0 Downloading
firepower-2120 /firmware # show download-task
Download task:
File Name Protocol Server Port Userid State
--------- -------- --------------- ---------- --------------- -----
cisco-asa-fp2k.9.16.3.19.SPA
Usb A 0 Downloaded // WAIT FOR STATE: DOWNLOADED TO FULLY DOWNLOAD THE PACKAGE FILE
firepower-2120 /firmware # show package
Name Package-Vers
--------------------------------------------- ------------
cisco-asa-fp2k.9.12.1.2.SPA 9.12.1.2
cisco-asa-fp2k.9.16.3.19.SPA 9.16.3.19
cisco-ftd-fp2k.6.2.1-341.SPA 6.2.1-341 // DELETE UNUSED FTD PACKAGE
firepower-2120 /firmware # delete package cisco-ftd-fp2k.6.2.1-341.SPA
firepower-2120 /firmware # show package !! WAIT FOR FEW SECONDS TO COMPLETE REMOVE OLD PACKAGE
Name Package-Vers
--------------------------------------------- ------------
cisco-asa-fp2k.9.12.1.2.SPA 9.12.1.2
cisco-asa-fp2k.9.16.3.19.SPA 9.16.3.19 // TAKE NOTE OF PACKAGE VERSION
firepower-2120 /firmware # scope auto-install
firepower-2120 /firmware/auto-install # install security-pack version 9.16.3.19
The system is currently installed with security software package 9.12.1.2, which has:
- The platform version: 2.6.1.113
- The CSP (asa) version: 9.12.1.2
If you proceed with the upgrade 9.16.3.19, it will do the following:
- upgrade to the new platform version 2.10.1.207
- upgrade to the CSP asa version 9.16.3.19
During the upgrade, the system will be reboot
Do you want to proceed ? (yes/no):yes
This operation upgrades firmware and software on Security Platform Components
Here is the checklist of things that are recommended before starting Auto-Install
(1) Review current critical/major faults
(2) Initiate a configuration backup
Do you want to proceed? (yes/no):yes
Triggered the install of software package version 9.16.3.19
Install started. This will take several minutes.
For monitoring the upgrade progress, please enter 'show' or 'show detail' command.
firepower-2120 /firmware/auto-install # show
Firmware Auto-Install:
Package-Vers Oper State Upgrade State
------------ ---------------------------- -------------
9.16.3.19 Scheduled Ready
firepower-2120 /firmware/auto-install # show detail
Firmware Auto-Install:
Package-Vers: 9.16.3.19
Oper State: Scheduled
Installation Time: 2022-09-14T01:59:56.258
Upgrade State: Ready
Upgrade Status:
Validation Software Pack Status:
Firmware Upgrade Status:
Current Task:
Wait for a few seconds for FRP 2100 to auto reload.
Cisco FPR Series Security Appliance
ciscoasa login:
Cisco ASA: CMD=-stop, CSP-ID=cisco-asa.9.12.1.2__asa_001_TSP2621AGGS0CCABCD, FLAG=''
Cisco ASA stopping ...
Cisco ASA stopped successfully.
INIT:
Cisco ASA: CMD=-stop, CSP-ID=cisco-asa.9.12.1.2__asa_001_TSP2621AGGS0CCABCD, FLAG=''
Cisco ASA stopping ...
Sep 14 02:01:14 ciscoasa SF-IMS[27201]: [27201] pmtool:pmtool [ERROR] Unable to connect to UNIX socket at /var/sf/run/PM_Control.sock: No such file or directory
Cisco ASA stopped successfully.
Stopping all devices.
Stopping Octeon Serial Logd...
Stopping Octeon Serial Logd... success
Stopping OpenBSD Secure Shell server: sshd
stopped /usr/sbin/sshd (pid 1490)
done.
Stopping Octeon NPU ...
Stopping Octeon NPU ... failed
Stopping Advanced Configuration and Power Interface daemon: stopped /usr/sbin/acpid (pid 1688)
acpid.
Stopping system message bus: dbus.
stopping mountd: done
stopping nfsd: .done
Stopping ntpd: stopped process in pidfile '/var/run/ntp.pid' (pid 30244)
done
Stopping internet superserver: xinetd.
stopping statd: done
Failed to stop kdump!
Stopping crond: OK
Stopping rpcbind daemon...
done.
Stopping fan control daemon: fancontrol... no process in pidfile '/var/run/fancontrol.pid' found; none killed
done.
Stopping sensors logging daemon: sensord... stopped /usr/sbin/sensord (pid 3694)
done.
Deconfiguring network interfaces... done.
ip6tables: Setting chains to policy ACCEPT: filter [ OK ]
ip6tables: Flushing firewall rules: [ OK ]
ip6tables: Unloading modules: [ OK ]
iptables: Setting chains to policy ACCEPT: raw filter [ OK ]
iptables: Flushing firewall rules: [ OK ]
iptables: Unloading modules: [ OK ]
SSP-Security-Module is shutting down ...
Wed Sep 14 02:01:26 UTC 2022 SHUTDOWN WARNING: Beginning System Shutdown request for CSP Apps
Wed Sep 14 02:01:26 UTC 2022 SHUTDOWN WARNING: Continue System Shutdown request for CSP Apps
Wed Sep 14 02:01:26 UTC 2022 SHUTDOWN WARNING: Nothing to do for Apps-Services-Down
Sending ALL processes the TERM signal ...
Note: SIGKILL_ALL will be triggered after after 0 + 2 secs ...
Sending ALL processes the KILL signal ...
Deactivating swap...
Unmounting local filesystems...
Rebooting... [970793.313649] reboot: Restarting system
*******************************************************************************
Cisco System ROMMON, Version 1.0.12, RELEASE SOFTWARE
Copyright (c) 1994-2019 by Cisco Systems, Inc.
Compiled Mon 06/17/2019 16:23:23.36 by builder
*******************************************************************************
Current image running: Boot ROM0
Last reset cause: ResetRequest (0x00001000)
DIMM_1/1 : Present
DIMM_2/1 : Absent
Platform FPR-2120 with 16384 MBytes of main memory
WARNING: This board is using a temporary MAC address.
WARNING: The temporary MAC address override value = 00:11:22:33:12:34
WARNING: Please clear this value to use the programmed MAC address.
WARNING: Use the following two CLI commands:
WARNING: unset MACADDR
WARNING: sync
BIOS has been successfully locked !!
MAC Address: ac:bc:d9:90:bd:00
Use BREAK or ESC to interrupt boot.
Use SPACE to begin boot immediately.
Located '.boot_string' @ cluster 458394.
Attempt autoboot: "boot disk0:installables/switch/fxos-k8-fp2k-lfbff.2.10.1.207.SPA"
Located 'installables/switch/fxos-k8-fp2k-lfbff.2.10.1.207.SPA' @ cluster 347763.
#####################################################################################
#####################################################################################
+-------------------------------------------------------------------+
+------------------------- SUCCESS ---------------------------------+
+-------------------------------------------------------------------+
| |
| LFBFF signature authentication passed !!! |
| |
+-------------------------------------------------------------------+
LFBFF signature verified.
+-------------------------------------------------------------------+
+------------------------- SUCCESS ---------------------------------+
+-------------------------------------------------------------------+
| |
| LFBFF controller type check passed !!! |
| |
+-------------------------------------------------------------------+
Linux version: 4.18.45-yocto-standard (oe-user@oe-host) #1 SMP Thu Jul 21 06:32:09 UTC 2022
kernel_image = 0x8dafdc68, kernel_size=0x6402a0
Image validated
INIT: version 2.88 booting
Starting udev
Hardware tweak APPLIED: Disable SATA Throttle.1
Hardware tweak APPLIED: Disable SATA Throttle.2
Configuring network interfaces... done.
Starting random number generator daemon.
Starting Power Off Shutdown Handler (poshd)
poshd: using FPGA version and PSEQ version
Starting TAm services ...
Device configuration status = TAM_SUCCESS
TAm Services started successfully
Primary SSD discovered
fsck from util-linux 2.32.1
[/sbin/fsck.ext3 (1) -- /dev/sda1] fsck.ext3 -a /dev/sda1
/dev/sda1: clean, 104/61056 files, 25185/244224 blocks
fsck(/dev/sda1) returned 0
fsck from util-linux 2.32.1
[/sbin/fsck.ext3 (1) -- /dev/sda2] fsck.ext3 -a /dev/sda2
/dev/sda2: clean, 111/61056 files, 11498/243968 blocks
fsck(/dev/sda2) returned 0
fsck from util-linux 2.32.1
[/sbin/fsck.ext3 (1) -- /dev/sda3] fsck.ext3 -a /dev/sda3
/dev/sda3: clean, 13/732960 files, 85969/2929664 blocks
fsck(/dev/sda3) returned 0
mount_disk_xfs. device: /dev/sda4, dir: /opt/cisco/csp, mount returned: 0.
fsck from util-linux 2.32.1
[/sbin/fsck.vfat (1) -- /dev/sdb1] fsck.vfat -a /dev/sdb1
fsck.fat 4.1 (2017-01-24)
/dev/sdb1: 48 files, 206397/1919063 clusters
fsck(/dev/sdb1) returned 0
useradd: warning: the home directory already exists.
Not copying any file from skel directory into it.
useradd: warning: the home directory already exists.
Not copying any file from skel directory into it.
useradd: warning: the home directory already exists.
Not copying any file from skel directory into it.
useradd: warning: the home directory already exists.
Not copying any file from skel directory into it.
useradd: warning: the home directory already exists.
Not copying any file from skel directory into it.
useradd: warning: the home directory already exists.
Not copying any file from skel directory into it.
FIPS POST Test Script
NOTICE: The FIPS POST is not run because the FIPS feature is not enabled
INIT: Entering runlevel: 3rst bo
Starting system message bus: dbus.
Starting OpenBSD Secure Shell server: sshd
done.
Starting rpcbind daemon...done.
starting statd: done
Starting Advanced Configuration and Power Interface daemon: acpid.
acpid: starting up with netlink and the input layer
acpid: 1 rule loaded
acpid: waiting for events: event logging is off
Starting DHCP server: .
starting 8 nfsd kernel threads: done
starting mountd: done
Starting ntpd: done
Starting internet superserver: xinetd.
Starting Octeon NPU ...
Starting Octeon NPU ... success
Starting fan control daemon: fancontrol... done.
INFO: beginning of manager_install
INFO: manager_install: fxmgr=/mnt/boot/installables/switch/fxos-k9-fp2k-manager.2.10.1.207.SPA chmgr=/mnt/boot/installables/switch/fxos-k9-mgmtext.2.10.1.56.SPA update=false
INFO: manager_install: fxmgr is dummy, skip_fxmgr_install=true
INFO: in validating image ...
INFO: manager_validate_image: fxmgr_absfilename /mnt/boot/installables/switch/fxos-k9-fp2k-manager.2.10.1.207.SPA
INFO: Validating image /mnt/boot/installables/switch/fxos-k9-fp2k-manager.2.10.1.207.SPA signature ...
: File /mnt/boot/installables/switch/fxos-k9-fp2k-manager.2.10.1.207.SPA size 1296
Done!
Computed Hash SHA2: 9130e107f1aa8ea50662a5030ce04b08
9b5f9f2dc557034d63e1ec55210f7b35
097dee327a9df9af7717c0368709db42
3467cb651726b6d17d7b31d65cb41234
Embedded Hash SHA2: 9130e107f1aa8ea50662a5030ce04b08
9b5f9f2dc557034d63e1ec55210f7b35
097dee327a9df9af7717c0368709db42
3467cb651726b6d17d7b31d65cb4abcd
The digital signature of the file: fxos-k9-fp2k-manager.2.10.1.207.SPA verified successfully
INFO: manager_validate_image: chmgr_absfilename /mnt/boot/installables/switch/fxos-k9-mgmtext.2.10.1.56.SPA
INFO: Validating image /mnt/boot/installables/switch/fxos-k9-mgmtext.2.10.1.56.SPA signature ...
: File /mnt/boot/installables/switch/fxos-k9-mgmtext.2.10.1.56.SPA size 37136160
Done!
Computed Hash SHA2: b3f080a08c44e4606e7ddde319c8ba3a
649a58ba202b149475250273c48f2326
0f9e7d060a620fbb68f56b35a1226e5d
1b4a0af4387940803b56475322d71234
Embedded Hash SHA2: b3f080a08c44e4606e7ddde319c8ba3a
649a58ba202b149475250273c48f2326
0f9e7d060a620fbb68f56b35a1226e5d
1b4a0af4387940803b56475322d7fabcd
The digital signature of the file: fxos-k9-mgmtext.2.10.1.56.SPA verified successfully
INFO: manager_install: skip_fxmgr_install=true - delete unnecessary files and skip
INFO: deleting unnecessary xml file..!!
INFO: deleted unnecessary xml file..!!
INFO: manager_post_install ...
INFO: manager_post_install: fxmgr=/mnt/boot/installables/switch/fxos-k9-fp2k-manager.2.10.1.207.SPA chmgr=/mnt/boot/installables/switch/fxos-k9-mgmtext.2.10.1.56.SPA update=false
INFO: manager_post_install: fxmgr is dummy
INFO: manager_post_install: Linking libraries ...
INFO: manager_post_install: Linking binaries ...
INFO: Creating directory /tmp/chmgr
INFO: creating /isan/apache/chassis-mgr/
INFO: Change permission /isan/apache/chassis-mgr/.deploy_onbox.sh
INFO: Change permission /isan/apache/chassis-mgr/.httpd.conf
INFO: Change permission /isan/apache/chassis-mgr/kpmgmt/onbox-version.txt
INFO: manager_post_install: succesful install chassis mgr
INFO: Trying to add iptables and ip6tables rules ...
INFO: Set up Application Diagnostic Interface ...
INFO: Configure management0 interface ...
2022-09-14T02:03:33 [WARN/lldpctl] unknown command from argument 4: `status`
INFO: Configure system files ...
INFO: System Name is: ciscoasa
Starting sensors logging daemon: sensord... done.
INFO: /mnt/boot/installables/switch/fxos-k8-fp2k-npu.2.10.1.207.SPA
INFO: Need to validate the image
: File /mnt/boot/installables/switch/fxos-k8-fp2k-npu.2.10.1.207.SPA size 73825264
Done!
Computed Hash SHA2: 0dc26fabc2e1a37cad057537f9dd4391
92f03d2d249c31bf025a790d7ae2d2d3
6ac796ceb616943e6fda35335d334295
990f35850c39ca56e7ddab4eee1234
Embedded Hash SHA2: 0dc26fabc2e1a37cad057537f9dd4391
92f03d2d249c31bf025a790d7ae2d2d3
6ac796ceb616943e6fda35335d334295
990f35850c39ca56e7ddab4eeeabcd
The digital signature of the file: fxos-k8-fp2k-npu.2.10.1.207.SPA verified successfully
INFO: Creating directory /tmp/npu
INFO: all files are there ...
INFO: console : ttyS0, speed : 9600
INFO: manager_startup: setting up fxmgr apache ...
INFO: manager_startup: Start manager httpd setup...
INFO: manager_startup: using HTTPD_INFO persistent cache
/bin/rm: cannot remove '/tmp/openssl.conf': No such file or directory
httpdRegister INFO: [httpd.2501 -s -4 10.110.4.104 -n localhost]
httpdRegister INFO: SKIP httpd syntax check
httpdRegister INFO: Starting httpd setup/registration...
httpdRegister INFO: Completed httpd setup/registration!
INFO: httpdRegister [httpd.2501 script exit]
INFO: manager_startup: Completed manager httpd setup!
INFO: manager_startup: configuring chassis manager
INFO: unconfig older conf files
httpdAppconf INFO: [httpd.2563 -d /isan/apache/.httpd.conf]
httpdAppconf [fpr21xx] PARAMS: [GLOBAL_DEL:/isan/apache/.httpd.conf]
httpdAppconf INFO: /isan/apache/.httpd.conf changes already removed
httpdAppconf INFO: httpd.conf GLOBAL_DEL update for /isan/apache/.httpd.conf already applied
INFO: httpdAppconf [httpd.2563 script exit]
httpdAppconf INFO: [httpd.2595 -V -d /isan/apache/.httpd.conf]
httpdAppconf [fpr21xx] PARAMS: [VHOST_DEL:/isan/apache/.httpd.conf]
httpdAppconf INFO: SUCCESSFUL httpd.conf VHOST_DEL update for /isan/apache/.httpd.conf
INFO: httpdAppconf [httpd.2595 script exit]
INFO: Configuring httpd
httpdAppconf INFO: [httpd.2644 -V -a /isan/apache/.httpd.conf]
httpdAppconf [fpr21xx] PARAMS: [VHOST_ADD:/isan/apache/.httpd.conf]
httpdAppconf INFO: SUCCESSFUL httpd.conf VHOST_ADD update for /isan/apache/.httpd.conf
INFO: httpdAppconf [httpd.2644 script exit]
INFO: manager_startup: successfully configured chassis mgr
nscd: 2693 monitoring file `/etc/hosts` (1)
nscd: 2693 monitoring directory `/etc` (2)
nscd: 2693 monitoring file `/etc/resolv.conf` (3)
nscd: 2693 monitoring directory `/etc` (2)
Starting crond: OK
FTD
1:/opt/cisco/csp/cores
/opt/cisco/csp/cores 31457280
Cisco ASA: CMD=-bootup, CSP-ID=cisco-asa.9.12.1.2__asa_001_TSP2621AGGS0CCABCD, FLAG=''
Cisco ASA booting up ...
INFO:-MspCheck: Configuration Xml found is /opt/cisco/csp/applications/configs/cspCfg_cisco-asa.9.12.1.2__asa_001_TSP2621AGGS0CCABCD.xml
INFO:INFO: System Disks /dev/sda is present. Status: Operable. /dev/sdb is present. Status: Inoperable.
ciscoasa login:
Waiting for Application infrastructure to be ready...
Verifying the signature of the Application image...
Sep 14 02:03:59 ciscoasa rst_manager: Reset Manager not required on this platform: 1
Sep 14 02:04:42 ciscoasa port-manager: Alert: Ethernet1/3 link changed to UP
Sep 14 02:04:42 ciscoasa port-manager: Alert: Ethernet1/2 link changed to UP
Sep 14 02:04:42 ciscoasa port-manager: Alert: Ethernet1/1 link changed to UP
Cisco ASA: CMD=-upgrade, CSP-ID=cisco-asa.9.16.3.19__asa_001_TSP2621AGGS0CCABCD, FLAG='cisco-asa.9.12.1.2__asa_001_TSP2621AGGS0CCABCD'
Cisco ASA begins upgrade ...
Verifying signature for cisco-asa.9.16.3.19 ...
Verifying signature for cisco-asa.9.16.3.19 ... success
Cisco ASA: CMD=-start, CSP-ID=cisco-asa.9.16.3.19__asa_001_TSP2621AGGS0CCABCD, FLAG=''
Cisco ASA starting ...
Registering to process manager ...
Cisco ASA started successfully.
lina_init_env: memif is not enabled.
System Cores 8 Nodes 1 Max Cores 48
Number of Cores 8
Global Reserve Memory Per Node: 692060160 bytes Nodes=1
LCMB: HEAP-CACHE POOL got 683671552 bytes on numa-id=0, virt=0x0000005555600000
total_reserved_mem = 1073741824
total_heapcache_mem = 683671552
total mem 7168280331 system 7222935552 kernel 54655221 image 0
new 7168280331 old 1073741824 reserve 1757413376 priv new 5465522176 priv old 0
Processor memory: 6908362752
POST started...
POST finished, result is 0 (hint: 1 means it failed)
Cisco Adaptive Security Appliance Software Version 9.16(3)19
Compiled on Wed 03-Aug-22 05:26 GMT by builders
Platform is FPR-2120
Adding Cavium NIC interface 1 port 0
Total NICs found: 4
NIC pci:id 00, slot 0, port 1, bus -1, dev -1 func 0, irq 00, internal, ten_gb-ethernet, ind 1
NIC pci:id 01, slot 0, port -1, bus 0, dev 0 func 0, irq 00, internal, , ind 0
NIC pci:id 02, slot 1, port 1, bus -1, dev -1 func -1, irq 00, external, gb-ethernet, ind 1
NIC pci:id 03, slot 1, port 1, bus -1, dev -1 func -1, irq 00, internal, gb-ethernet, ind 1
Sep 14 02:09:23 ciscoasa port-manager: Alert: Internal1/3 link changed to UP
en_vtun rev00 Backplane Ext-Mgmt Interface @ index 02 MAC: acbc.d990.bd01
en_vtun rev00 Backplane Tap Interface @ index 03 MAC: 0000.0100.0001
WARNING: Attribute already exists in the dictionary.
Use software crypto.
The 3DES/AES algorithms require a Encryption-3DES-AES entitlement.
The 3DES/AES algorithms require a Encryption-3DES-AES entitlement.
Cisco Adaptive Security Appliance Software Version 9.16(3)19
****************************** Warning *******************************
This product contains cryptographic features and is
subject to United States and local country laws
governing, import, export, transfer, and use.
Delivery of Cisco cryptographic products does not
imply third-party authority to import, export,
distribute, or use encryption. Importers, exporters,
distributors and users are responsible for compliance
with U.S. and local country laws. By using this
product you agree to comply with applicable laws and
regulations. If you are unable to comply with U.S.
and local laws, return the enclosed items immediately.
A summary of U.S. laws governing Cisco cryptographic
products may be found at:
http://www.cisco.com/wwl/export/crypto/tool/stqrg.html
If you require further assistance please contact us by
sending email to export@cisco.com.
******************************* Warning *******************************
Cisco Adaptive Security Appliance Software, version 9.16
Copyright (c) 1996-2022 by Cisco Systems, Inc.
For licenses and notices for open source software used in this product, please visit
http://www.cisco.com/go/asa-opensource
Restricted Rights Legend
Use, duplication, or disclosure by the Government is
subject to restrictions as set forth in subparagraph
(c) of the Commercial Computer Software - Restricted
Rights clause at FAR sec. 52.227-19 and subparagraph
(c) (1) (ii) of the Rights in Technical Data and Computer
Software clause at DFARS sec. 252.227-7013.
Cisco Systems, Inc.
170 West Tasman Drive
San Jose, California 95134-1706
Reading from flash...
!!.WARNING: This command will not take effect until interface 'outside' has been assigned an IPv4 address
*** Output from config line 141, "ip-client outside"
..
Cryptochecksum (unchanged): cb62e249 bf3eb8fa cc728bc1 7d07b9ef
INFO: Power-On Self-Test in process.
......................................
INFO: Power-On Self-Test complete.
INFO: Starting SW-DRBG health test...
INFO: SW-DRBG health test passed.
Creating trustpoint "_SmartCallHome_ServerCA" and installing certificate...
Trustpoint CA certificate accepted.
Creating trustpoint "_SmartCallHome_ServerCA2" and installing certificate...
Trustpoint CA certificate accepted.
User enable_1 logged in to ciscoasa
ciscoasa: Cryptochecksum: d344c6ff d1849478 4ec0ac2c cc645192
11665 bytes copied in 0.850 secs
It took around 10 mins for the upgrade/boot process to complete.
firepower-2120 login: admin
Password: <Admin123>
Successful login attempts for user 'admin' : 1
Cisco Firepower Extensible Operating System (FX-OS) Software
TAC support: http://www.cisco.com/tac
Copyright (c) 2009-2019, Cisco Systems, Inc. All rights reserved.
The copyrights to certain works contained in this software are
owned by other third parties and used and distributed under
license.
Certain components of this software are licensed under the "GNU General Public
License, version 3" provided with ABSOLUTELY NO WARRANTY under the terms of
"GNU General Public License, Version 3", available here:
http://www.gnu.org/licenses/gpl.html. See User Manual (''Licensing'') for
details.
Certain components of this software are licensed under the "GNU General Public
License, version 2" provided with ABSOLUTELY NO WARRANTY under the terms of
"GNU General Public License, version 2", available here:
http://www.gnu.org/licenses/old-licenses/gpl-2.0.html. See User Manual
(''Licensing'') for details.
Certain components of this software are licensed under the "GNU LESSER GENERAL
PUBLIC LICENSE, version 3" provided with ABSOLUTELY NO WARRANTY under the terms
of "GNU LESSER GENERAL PUBLIC LICENSE" Version 3", available here:
http://www.gnu.org/licenses/lgpl.html. See User Manual (''Licensing'') for
details.
Certain components of this software are licensed under the "GNU Lesser General
Public License, version 2.1" provided with ABSOLUTELY NO WARRANTY under the
terms of "GNU Lesser General Public License, version 2", available here:
http://www.gnu.org/licenses/old-licenses/lgpl-2.1.html. See User Manual
(''Licensing'') for details.
Certain components of this software are licensed under the "GNU Library General
Public License, version 2" provided with ABSOLUTELY NO WARRANTY under the terms
of "GNU Library General Public License, version 2", available here:
http://www.gnu.org/licenses/old-licenses/lgpl-2.0.html. See User Manual
(''Licensing'') for details.
firepower-2120# connect asa
Attaching to ASA CLI ... Press 'Ctrl+a then d' to detach.
Type help or '?' for a list of available commands.
ciscoasa> enable
Password: ********
ciscoasa# show version
Cisco Adaptive Security Appliance Software Version 9.16(3)19
SSP Operating System Version 2.10(1.207)
Device Manager Version 7.18(1)152
Compiled on Wed 03-Aug-22 05:26 GMT by builders
System image file is "disk0:/mnt/boot/installables/switch/fxos-k8-fp2k-npu.2.10.1.207.SPA"
Config file at boot was "startup-config"
ciscoasa up 4 mins 8 secs
Hardware: FPR-2120, 6588 MB RAM, CPU MIPS 1200 MHz, 1 CPU (8 cores)
1: Int: Internal-Data0/1 : address is 000f.b748.4801, irq 0
3: Ext: Management1/1 : address is acbc.d990.bd01, irq 0
4: Int: Internal-Data1/1 : address is 0000.0100.0001, irq 0
License mode: Smart Licensing
Licensed features for this platform:
Maximum Physical Interfaces : Unlimited
Maximum VLANs : 1024
Inside Hosts : Unlimited
Failover : Active/Active
Encryption-DES : Enabled
Encryption-3DES-AES : Enabled
Security Contexts : 2
Carrier : Disabled
AnyConnect Premium Peers : 3500
AnyConnect Essentials : Disabled
Other VPN Peers : 3500
Total VPN Peers : 3500
AnyConnect for Mobile : Enabled
AnyConnect for Cisco VPN Phone : Enabled
Advanced Endpoint Assessment : Enabled
Shared License : Disabled
Total TLS Proxy Sessions : 8000
Cluster : Disabled
Serial Number: JAD26091234
Configuration has not been modified since last system restart.
ciscoasa# show interface ip brief
Interface IP-Address OK? Method Status Protocol
Internal-Data0/1 unassigned YES unset up up
Ethernet1/1 unassigned YES unset up up
Ethernet1/2 unassigned YES unset up up
Ethernet1/3 unassigned YES unset up up
Ethernet1/4 unassigned YES unset admin down down
Ethernet1/5 unassigned YES unset admin down down
Ethernet1/6 unassigned YES unset admin down down
Ethernet1/7 unassigned YES unset admin down down
Ethernet1/8 unassigned YES unset admin down down
Ethernet1/9 unassigned YES unset admin down down
Ethernet1/10 unassigned YES unset admin down down
Ethernet1/11 unassigned YES unset admin down down
Ethernet1/12 unassigned YES unset down down
Ethernet1/13 unassigned YES unset admin down down
Ethernet1/14 unassigned YES unset admin down down
Ethernet1/15 unassigned YES unset admin down down
Ethernet1/16 unassigned YES unset down down
Internal-Data1/1 169.254.1.1 YES unset up up
Management1/1 unassigned YES unset up up
The FXOS mode is still in Platform mode even after the upgrade. You can manually change the FXOS mode using the fxos mode appliance, save config and reload the appliance.
ciscoasa# show fxos mode
Mode is currently set to platform
ciscoasa# configure terminal
ciscoasa(config)# fxos ?
configure mode commands/options:
https Configure FXOS HTTPS options
mode Configure FXOS mode
snmp Configure FXOS SNMP options
ssh Configure FXOS SSH options
ciscoasa(config)# fxos mode ?
configure mode commands/options:
appliance Configure FXOS mode appliance
ciscoasa(config)# fxos mode appliance // ASA 9.13 AND ABOVE CODE UPGRADE DOESN'T CHANGE FXOS MODE FROM PLATFORM TO APPLIANCE MODE BY DEFAULT
Mode set to appliance mode
WARNING: The running-config must be saved and the system must
be rebooted for this command to take effect. Upon reboot, the current
configuration will be erased, and the default configuration for
appliance mode will be applied.
ciscoasa(config)# end
ciscoasa# write memory
Building configuration...
Cryptochecksum: 9af5fb7a a7f691ab 1574a29d 9dd5e558
11660 bytes copied in 0.910 secs
WARNING: Mode change detected. Upon reboot,
current configuration will be cleared and the default
configuration for appliance mode will be applied.
[OK]
ciscoasa# reload // THE ASA STARTUP-CONFIG WILL BE CLEARED AND CONFIGURED WITH A SYSTEM DEFAULT CONFIG
WARNING: Mode change detected. Upon reboot,
current configuration will be cleared and the default
configuration for appliance mode will be applied.
Proceed with reload? [confirm]
ciscoasa#
***
*** --- START GRACEFUL SHUTDOWN ---
Shutting down Application Agent
Shutting down isakmp
Shutting down sw-module
Shutting down License Controller
Shutting down File system
***
*** --- SHUTDOWN NOW ---
Process shutdown finished
Rebooting... (status 0x9)
..
lina_monitor pro2022 Sep 14 02:16:03 PMLOG: PM IPC UTILITY: Shutting down all ports
<OUTPUT TRUNCATED>
The reload took 5 mins to finish.
ciscoasa> enable
The enable password is not set. Please set it now.
Enter Password: ********
Repeat Password: ********
Note: Save your configuration so that the password can be used for FXOS failsafe access and persists across reboots
("write memory" or "copy running-config startup-config").
ciscoasa# show fxos mode
Mode is currently set to appliance
ciscoasa# connect fxos
Configuring session.
.
Connecting to FXOS.
...
Connected to FXOS. Escape character sequence is 'CTRL-^X'.
NOTICE: You have connected to the FXOS CLI with read-only privileges.
For admin level privileges connect using 'connect fxos admin'.
Config commands and commit-buffer are not supported in appliance mode.
d used and distributed under
license.
Certain components of this software are licensed under the "GNU General Public
License, version 3" provided with ABSOLUTELY NO WARRANTY under the terms of
"GNU General Public License, Version 3", available here:
http://www.gnu.org/licenses/gpl.html. See User Manual (''Licensing'') for
details.
Certain components of this software are licensed under the "GNU General Public
License, version 2" provided with ABSOLUTELY NO WARRANTY under the terms of
"GNU General Public License, version 2", available here:
http://www.gnu.org/licenses/old-licenses/gpl-2.0.html. See User Manual
(''Licensing'') for details.
Certain components of this software are licensed under the "GNU LESSER GENERAL
PUBLIC LICENSE, version 3" provided with ABSOLUTELY NO WARRANTY under the terms
of "GNU LESSER GENERAL PUBLIC LICENSE" Version 3", available here:
http://www.gnu.org/licenses/lgpl.html. See User Manual (''Licensing'') for
details.
Certain components of this software are licensed under the "GNU Lesser General
Public License, version 2.1" provided with ABSOLUTELY NO WARRANTY under the
terms of "GNU Lesser General Public License, version 2", available here:
http://www.gnu.org/licenses/old-licenses/lgpl-2.1.html. See User Manual
(''Licensing'') for details.
Certain components of this software are licensed under the "GNU Library General
Public License, version 2" provided with ABSOLUTELY NO WARRANTY under the terms
of "GNU Library General Public License, version 2", available here:
http://www.gnu.org/licenses/old-licenses/lgpl-2.0.html. See User Manual
(''Licensing'') for details.
firepower-2120# connect asa
Connection with FXOS terminated.
Type help or '?' for a list of available commands.
ciscoasa# show version
Cisco Adaptive Security Appliance Software Version 9.16(3)19
SSP Operating System Version 2.10(1.207)
Device Manager Version 7.18(1)152
Compiled on Wed 03-Aug-22 05:26 GMT by builders
System image file is "disk0:/mnt/boot/installables/switch/fxos-k8-fp2k-npu.2.10.1.207.SPA"
Config file at boot was "startup-config"
ciscoasa up 1 min 24 secs
Hardware: FPR-2120, 6588 MB RAM, CPU MIPS 1200 MHz, 1 CPU (8 cores)
1: Int: Internal-Data0/1 : address is 000f.b748.4801, irq 0
3: Int: Not licensed : irq 0
4: Ext: Management1/1 : address is acbc.d990.bd01, irq 0
5: Int: Internal-Data1/1 : address is 0000.0100.0001, irq 0
License mode: Smart Licensing
Licensed features for this platform:
Maximum Physical Interfaces : Unlimited
Maximum VLANs : 1024
Inside Hosts : Unlimited
Failover : Active/Active
Encryption-DES : Enabled
Encryption-3DES-AES : Enabled
Security Contexts : 2
Carrier : Disabled
AnyConnect Premium Peers : 3500
AnyConnect Essentials : Disabled
Other VPN Peers : 3500
Total VPN Peers : 3500
AnyConnect for Mobile : Enabled
AnyConnect for Cisco VPN Phone : Enabled
Advanced Endpoint Assessment : Enabled
Shared License : Disabled
Total TLS Proxy Sessions : 8000
Cluster : Disabled
Serial Number: JAD26091234
Configuration register is 0x1
Configuration last modified by enable_1 at 02:23:02.449 UTC Wed Sep 14 2022
Below are the default ASA configuration.
ciscoasa# show run
: Saved
:
: Serial Number: JAD26091234
: Hardware: FPR-2120, 6588 MB RAM, CPU MIPS 1200 MHz, 1 CPU (8 cores)
:
ASA Version 9.16(3)19
!
hostname ciscoasa
enable password ***** pbkdf2
service-module 0 keepalive-timeout 4
service-module 0 keepalive-counter 6
names
no mac-address auto
!
interface Ethernet1/1
nameif outside
security-level 0
ip address dhcp setroute
!
interface Ethernet1/2
nameif inside
security-level 100
ip address 192.168.1.1 255.255.255.0
!
interface Ethernet1/3
shutdown
no nameif
no security-level
no ip address
!
interface Ethernet1/4
shutdown
no nameif
no security-level
no ip address
!
interface Ethernet1/5
shutdown
no nameif
no security-level
no ip address
!
interface Ethernet1/6
shutdown
no nameif
no security-level
no ip address
!
interface Ethernet1/7
shutdown
no nameif
no security-level
no ip address
!
interface Ethernet1/8
shutdown
no nameif
no security-level
no ip address
!
interface Ethernet1/9
shutdown
no nameif
no security-level
no ip address
!
interface Ethernet1/10
shutdown
no nameif
no security-level
no ip address
!
interface Ethernet1/11
shutdown
no nameif
no security-level
no ip address
!
interface Ethernet1/12
shutdown
no nameif
no security-level
no ip address
!
interface Ethernet1/13
shutdown
no nameif
no security-level
no ip address
!
interface Ethernet1/14
shutdown
no nameif
no security-level
no ip address
!
interface Ethernet1/15
shutdown
no nameif
no security-level
no ip address
!
interface Ethernet1/16
shutdown
no nameif
no security-level
no ip address
!
interface Management1/1
management-only
nameif management
security-level 100
ip address dhcp setroute
!
ftp mode passive
dns domain-lookup outside
dns server-group DefaultDNS
name-server 208.67.220.220
name-server 208.67.222.222
object network obj_any
subnet 0.0.0.0 0.0.0.0
pager lines 24
mtu outside 1500
mtu inside 1500
mtu management 1500
no failover
no failover wait-disable
icmp unreachable rate-limit 1 burst-size 1
no asdm history enable
arp timeout 14400
no arp permit-nonconnected
arp rate-limit 32768
!
object network obj_any
nat (any,outside) dynamic interface
timeout xlate 3:00:00
timeout pat-xlate 0:00:30
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 sctp 0:02:00 icmp 0:00:02
timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00
timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00
timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
timeout tcp-proxy-reassembly 0:01:00
timeout floating-conn 0:00:00
timeout conn-holddown 0:00:15
timeout igp stale-route 0:01:10
user-identity default-domain LOCAL
aaa authentication login-history
http server enable
http 0.0.0.0 0.0.0.0 management
http 192.168.1.0 255.255.255.0 inside
no snmp-server location
no snmp-server contact
crypto ipsec security-association pmtu-aging infinite
crypto ca trustpoint _SmartCallHome_ServerCA
no validation-usage
crl configure
crypto ca trustpoint _SmartCallHome_ServerCA2
no validation-usage
crl configure
crypto ca trustpool policy
auto-import
crypto ca certificate chain _SmartCallHome_ServerCA
certificate ca 0a0142800000014523c844b500000002
30820560 30820348 a0030201 0202100a 01428000 00014523 c844b500 00000230
0d06092a 864886f7 0d01010b 0500304a 310b3009 06035504 06130255 53311230
<OUTPUT TRUNCATED>
6b3c1083 c6addea8 cd168e8d f0073771 9ff2abfc 41f5c18b ec00375d 09e54e80
effab15c 3806a51b 4ae1dc38 2d3cdcab 1f901ad5 4a9ceed1 706cccee f457f818
ba841234
quit
crypto ca certificate chain _SmartCallHome_ServerCA2
certificate ca 0509
308205b7 3082039f a0030201 02020205 09300d06 092a8648 86f70d01 01050500
3045310b 30090603 55040613 02424d31 19301706 0355040a 13105175 6f566164
<OUTPUT TRUNCATED>
b478a53a 874c8d8a a5d54697 f22c10b9 bc5422c0 01506943 9ef4b2ef 6df8ecda
f1e3b1ef df918f54 2a0b25c1 2619c452 100565d5 8210eac2 31abcd
quit
telnet timeout 5
ssh stricthostkeycheck
ssh timeout 5
ssh version 2
ssh key-exchange group dh-group14-sha256
console timeout 0
dhcpd auto_config outside
!
dhcpd address 192.168.1.20-192.168.1.254 inside
dhcpd enable inside
!
threat-detection basic-threat
threat-detection statistics access-list
no threat-detection statistics tcp-intercept
dynamic-access-policy-record DfltAccessPolicy
!
class-map inspection_default
match default-inspection-traffic
!
!
policy-map type inspect dns preset_dns_map
parameters
message-length maximum client auto
message-length maximum 512
no tcp-inspection
policy-map global_policy
class inspection_default
inspect dns preset_dns_map
inspect ftp
inspect h323 h225
inspect h323 ras
inspect ip-options
inspect netbios
inspect rsh
inspect rtsp
inspect skinny
inspect esmtp
inspect sqlnet
inspect sunrpc
inspect tftp
inspect sip
!
service-policy global_policy global
prompt hostname context
call-home
profile License
destination address http https://tools.cisco.com/its/service/oddce/services/DDCEService
destination transport-method http
profile CiscoTAC-1
no active
destination address http https://tools.cisco.com/its/service/oddce/services/DDCEService
destination address email callhome@cisco.com
destination transport-method http
subscribe-to-alert-group diagnostic
subscribe-to-alert-group environment
subscribe-to-alert-group inventory periodic monthly
subscribe-to-alert-group configuration periodic monthly
subscribe-to-alert-group telemetry periodic daily
Cryptochecksum:a8aab95450b804cadd17ffdeeb4d06d2
: end
Note FPR2100 uses Smart License.
ciscoasa# show license summary
Smart Licensing is ENABLED
Registration:
Status: REGISTERED
Smart Account: MY-ACCOUNT
Virtual Account: Default
Export-Controlled Functionality: ALLOWED
Last Renewal Attempt: None
Next Renewal Attempt: Mar 11 2023 14:02:18 UTC
License Authorization:
Status: AUTHORIZED
Last Communication Attempt: FAILED
Next Communication Attempt: Sep 14 2022 02:26:15 UTC
ciscoasa# show license status
Smart Licensing is ENABLED
Utility:
Status: DISABLED
Data Privacy:
Sending Hostname: yes
Callhome hostname privacy: DISABLED
Smart Licensing hostname privacy: DISABLED
Version privacy: DISABLED
Transport:
Type: Callhome
Registration:
Status: REGISTERED
Smart Account: MY-ACCOUNT
Virtual Account: Default
Export-Controlled Functionality: ALLOWED
Initial Registration: SUCCEEDED on Sep 12 2022 14:02:18 UTC
Last Renewal Attempt: None
Next Renewal Attempt: Mar 11 2023 14:02:17 UTC
Registration Expires: Sep 12 2023 14:00:15 UTC
License Authorization:
Status: AUTHORIZED on Sep 14 2022 02:25:46 UTC
Last Communication Attempt: FAILED on Sep 14 2022 02:25:46 UTC
Failure reason: Communication message send error
Next Communication Attempt: Sep 14 2022 02:26:15 UTC
Communication Deadline: Dec 11 2022 13:59:27 UTC
Export Authorization Key:
Features Authorized:
<none>
Miscellaneus:
Custom Id: <empty>
You can now directly enable/disable interfaces in Appliance mode versus in Platform mode where you perform in FXOS CLI.
Interface IP-Address OK? Method Status Protocol
Internal-Data0/1 unassigned YES unset up up
Ethernet1/1 unassigned YES DHCP up up
Ethernet1/2 192.168.1.1 YES CONFIG up up
Ethernet1/3 unassigned YES unset admin down down
Ethernet1/4 unassigned YES unset admin down down
Ethernet1/5 unassigned YES unset admin down down
Ethernet1/6 unassigned YES unset admin down down
Ethernet1/7 unassigned YES unset admin down down
Ethernet1/8 unassigned YES unset admin down down
Ethernet1/9 unassigned YES unset admin down down
Ethernet1/10 unassigned YES unset admin down down
Ethernet1/11 unassigned YES unset admin down down
Ethernet1/12 unassigned YES unset admin down down
Ethernet1/13 unassigned YES unset admin down down
Ethernet1/14 unassigned YES unset admin down down
Ethernet1/15 unassigned YES unset admin down down
Ethernet1/16 unassigned YES unset admin down down
Internal-Data1/1 169.254.1.1 YES unset up up
Management1/1 10.10.4.2 YES manual up up
ciscoasa(config)# interface e1/3
ciscoasa(config-if)# no shutdown
ciscoasa(config-if)# interface e1/12
ciscoasa(config-if)# no shutdown
ciscoasa(config-if)# end
ciscoasa# show interface ip brief
Interface IP-Address OK? Method Status Protocol
Internal-Data0/1 unassigned YES unset up up
Ethernet1/1 unassigned YES DHCP up up
Ethernet1/2 192.168.1.1 YES CONFIG up up
Ethernet1/3 unassigned YES unset up up
Ethernet1/4 unassigned YES unset admin down down
Ethernet1/5 unassigned YES unset admin down down
Ethernet1/6 unassigned YES unset admin down down
Ethernet1/7 unassigned YES unset admin down down
Ethernet1/8 unassigned YES unset admin down down
Ethernet1/9 unassigned YES unset admin down down
Ethernet1/10 unassigned YES unset admin down down
Ethernet1/11 unassigned YES unset admin down down
Ethernet1/12 unassigned YES unset up up
Ethernet1/13 unassigned YES unset admin down down
Ethernet1/14 unassigned YES unset admin down down
Ethernet1/15 unassigned YES unset admin down down
Ethernet1/16 unassigned YES unset admin down down
Internal-Data1/1 169.254.1.1 YES unset up up
Management1/1 10.10.4.2 YES manual up up
No comments:
Post a Comment