The Cisco Secure Firewall 3100 series is the latest Next-Generation Firewall (NGFW) product from Cisco. The 3100 can be deployed to run either the classic ASA or the latest Firewall Thread Defense (FTD) software.
The 3100 front chassis has a fixed 8x RJ45 ports (Ethernet 1/1 - 1/8) and 8x fiber SFP ports (Ethernet 1/9 - 16).
The 3100 have an RJ45 and USB Console ports which are just beside the Management port (left).
The out of band Management port (Management 1/1) would need a GLC-TE copper SFP.
The 3100 has dual power supplies found in the rear and they're hot-swappable. It also has a power on/off toggle switch found on the left hand side.
I ran the classic ASA software and followed the upgrade path. I always choose an ASA software with a Long Term Release (LTR) which will be supported for 36 months (3 years) in terms of TAC support and software patches. LTR is designated by an even number in the second digit of its major release, i.e. FTD 6.4 and ASA 9.12.
Aside from the ASA upgrade path, you should also follow the ASA and ASDM Compatibility Matrix (Table 2). In this case I chose ASA version 9.18 and its compatible ASDM should be 7.20(1).
You can download the 3100 ASA software and ASDM from the Cisco Software Download page. The upgrade procedure is identical with the classic ASA. Just change the boot variable to point to the new ASA version stored in flash memory (disk0).
The ASA now use Smart License which started around ASA version 9.4.
First, transfer the ASA and ASDM images to flash memory then verify the MD5 hash.
cisocasa# copy ftp://ftpuser:ftp123@172.16.5.2/cisco-asa-fp3k.9.18.3.56.SPA disk0:
Address or name of remote host [172.16.5.2]?
Source username [ftpuser]?
Source password []? *******
Source filename [cisco-asa-fp3k.9.18.3.56.SPA]?
Destination filename [cisco-asa-fp3k.9.18.3.56.SPA]?
Accessing ftp://ftpuser:<password>@172.16.5.2/cisco-asa-fp3k.9.18.3.56.SPA...
!!!!!!!!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
Verifying file disk0:/cisco-asa-fp3k.9.18.3.56.SPA...
Writing file disk0:/cisco-asa-fp3k.9.18.3.56.SPA...
738779600 bytes copied in 4515.190 secs (163627 bytes/sec)
cisocasa# copy ftp://ftpuser:ftpuser@172.16.5.2/asdm-7201.bin disk0:
Address or name of remote host [172.16.5.2]?
Source username [ftpuser]?
Source password []? *******
Source filename [asdm-7201.bin]?
Destination filename [asdm-7201.bin]?
Accessing ftp://ftpuser:<password>@172.16.5.2/asdm-7201.bin...
!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
Verifying file disk0:/asdm-7201.bin...
Writing file disk0:/asdm-7201.bin...
116798028 bytes copied in 1029.990 secs (113506 bytes/sec)
ciscoasa# dir
Directory of disk0:/
<OUTPUT TRUNCATED>
1610981055 -rwx 116798028 02:22:49 Nov 01 2023 asdm-7201.bin
1610973629 -rwx 738779600 12:51:00 Oct 31 2023 cisco-asa-fp3k.9.18.3.56.SPA
8 file(s) total size: 972729823 bytes
16106127360 bytes total (14880296960 bytes free/92% free)
You can compare the hash output with the hash published in the Cisco Software Download website to confirm its authenticity and it's not corrupted during the file transfer.
ciscoasa# verify /md5 cisco-asa-fp3k.9.18.3.56.SPA
!!!!!!!!!!!!!!Done!
verify /MD5 (disk0:/cisco-asa-fp3k.9.18.3.56.SPA) = f466853bcebf15c81279e956e6c37906
ciscoasa# verify /md5 asdm-7201.bin
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!Done!
verify /MD5 (disk0:/asdm-7201.bin) = ba376c64777461ca587f8a8b5578554e
The ASA currently runs version 9.17 and ASDM 7.18.
ciscoasa# show version
Cisco Adaptive Security Appliance Software Version 9.17(1)21
SSP Operating System Version 2.11(1.191)
Device Manager Version 7.18(1)152
Compiled on Wed 16-Nov-22 00:04 GMT by builders
System image file is "disk0:/installables/switch/fxos-k8-fp3k-lfbff.2.11.1.191.SPA"
Config file at boot was "startup-config"
ciscoasa up 7 days 15 hours
Start-up time 3 secs
Hardware: FPR-3110, 52169 MB RAM, CPU Ryzen Zen 2 2900 MHz, 1 CPU (24 cores)
Encryption hardware device : Cisco ASA Crypto on-board accelerator (revision 0x1)
AE microcode : CNN5x-MC-AE-MAIN-0007
SE SSL microcode : CNN5x-MC-SE-SSL-0018
Number of accelerators: 1
1: Int: Internal-Data0/1 : address is 0000.0041.0004, irq 239
3: Int: Not licensed : irq 0
4: Ext: Management1/1 : address is c47e.e07e.1482, irq 0
5: Int: Internal-Data1/1 : address is 0000.0100.0001, irq 0
License mode: Smart Licensing
Licensed features for this platform:
Maximum Physical Interfaces : Unlimited
Maximum VLANs : 1024
Inside Hosts : Unlimited
Failover : Active/Active
Encryption-DES : Enabled
Encryption-3DES-AES : Disabled
Security Contexts : 2
Carrier : Disabled
AnyConnect Premium Peers : 3000
AnyConnect Essentials : Disabled
Other VPN Peers : 3000
Total VPN Peers : 3000
AnyConnect for Mobile : Enabled
AnyConnect for Cisco VPN Phone : Enabled
Advanced Endpoint Assessment : Enabled
Shared License : Disabled
Total TLS Proxy Sessions : 4000
Cluster : Enabled
Serial Number: FJZ27231234
Configuration register is 0x1
Configuration last modified by enable_15 at 02:47:41.036 UTC Wed Nov 1 2023
Change to the boot variable to point to the new ASA and ASDM image. Save the config and reload for the new ASA version to take effect. It's highly recommended to monitor the upgrade procedure via the console.
ciscoasa#
ciscoasa# show run asdm
no asdm history enable
ciscoasa# configure terminal
ciscoasa(config)# boot system disk0:/cisco-asa-fp3k.9.18.3.56.SPA
The system is currently installed with security software package 9.17.1.21, which has:
- The platform version: 2.11.1.191
- The CSP (asa) version: 9.17.1.21
Preparing new image for install...
!!!!!
Image download complete (Successful unpack the image).
Installation of version 9.18.3.56 will do the following:
- upgrade to the new platform version 2.12.0.519
- upgrade to the CSP ASA version 9.18.3.56
After installation is complete, ensure to do write memory and reload to save this config and apply the new image.
Finalizing image install process...
Install_status: ready.............................
Install_status: validating-images.
Install_status: upgrading-system
Install_status: upgrading-firmware
Install_status: update-software-pack-completed
ciscoasa(config)# asdm image disk0:/asdm-7201.bin
ciscoasai(config)# end
ciscoasa# write memory
Building configuration...
Cryptochecksum: 9db145a0 ceddd2a5 4416d104 91137070
14594 bytes copied in 0.260 secs
[OK]
It took around 2 mins for installing the new ASA software to finish.
ciscoasa# show run boot
boot system disk0:/cisco-asa-fp3k.9.18.3.56.SPA
ciscoasa# show run asdm
asdm image disk0:/asdm-7201.bin
no asdm history enable
ciscoasa# reload
Proceed with reload? [confirm]
ciscoasa#
***
*** --- START GRACEFUL SHUTDOWN ---
Shutting down Application Agent
Shutting down isakmp
Shutting down webvpn
Shutting down sw-module
Shutting down License Controller
Shutting down File system
***
*** --- SHUTDOWN NOW ---
Process shutdown finished
Rebooting... (status 0x9)
..
<13>Nov 1 04:08:42 root: FXOS shutdown log started: pid = 955 cmdline = /bin/sh/sbin/fxos_log_shutdown ####
Broadcast message from root@firepower-3110 (Wed Nov 1 04:08:42 2023):
The system is going down for reboot NOW!
2023 Nov 01 04:08:44 PMLOG: PM IPC UTILITY: Shutting down all ports
Stopping OpenBSD Secure Shell server: sshd
stopped /usr/sbin/sshd (pid 8992)
done.
Stopping Advanced Configuration and Power Interface daemon: stopped /usr/sbin/acpid (pid 1403)
acpid.
Stopping web server: apache2failed
Stopping system message bus: dbus.
Stopping DHCP server: dhcpd3no /usr/sbin/dhcpd found; none killed
.
stopping DNS forwarder and DHCP server: dnsmasq... no /usr/bin/dnsmasq found; none killed
stopping mountd: done
stopping nfsd: .done
Stopping ntpd: start-stop-daemon: warning: killing process 1441: No such process
done
Stopping internet superserver: xinetd.
stopping statd: done
Stopping random number generator daemon.
Stopping domain name service: named.
Stopping crond: OK
Stopping rpcbind daemon...
done.
Stopping fan control daemon: fancontrol... no process in pidfile '/var/run/fancontrol.pid' found; none killed
done.
Stopping sensors logging daemon: sensord... stopped /usr/sbin/sensord (pid 2433)
done.
* Stopping virtualization library daemon: libvirtd [fail]
Deconfiguring network interfaces... done.
Stopping FreeRADIUS daemon radiusd Failed
Wed Nov 1 04:08:45 UTC 2023
SSP-Security-Module is shutting down ...
Wed Nov 1 04:08:45 UTC 2023 SHUTDOWN WARNING: Beginning System Shutdown request for CSP Apps
Wed Nov 1 04:08:45 UTC 2023 SHUTDOWN WARNING: Upgrade process ready for reboot
Wed Nov 1 04:08:45 UTC 2023 SHUTDOWN WARNING: Continue System Shutdown request for CSP Apps
DEBUG-CSPM: Checkpoint: autorun exist
Nov 1 04:08:45 firepower-3110 NVRAM: Confreg value: confreg = 0x1
DEBUG-CSPM: Checkpoint: autorun exist
omit_pids_opt: -o 680,683
Wed Nov 1 04:08:49 UTC 2023
Sending ALL processes the TERM signal ...
Note: SIGKILL_ALL will be triggered after after 1 + 2 secs ...
Wed Nov 1 04:08:51 UTC 2023
Sending ALL processes the KILL signal ...
Wed Nov 1 04:08:52 UTC 2023
Deactivating swap...
Unmounting local filesystems...
Stop Soft RAID
2023 Nov 01 04:08:53:
Soft-RAID configuration started
2023 Nov 01 04:08:53: found 1 devices
2023 Nov 01 04:08:53: enter FSM state PROBE
2023 Nov 01 04:08:53: probe /dev/nvme0n1
2023 Nov 01 04:08:53: superblock meta entries 6
2023 Nov 01 04:08:53: sysfs_probe_md: version=1.0, level=raid1, state=active
2023 Nov 01 04:08:53: enter FSM state DESTROY
2023 Nov 01 04:08:53: /sbin/mdadm --stop /dev/md0: 0
2023 Nov 01 04:08:54: enter FSM state PROBE
2023 Nov 01 04:08:54: probe /dev/nvme0n1
2023 Nov 01 04:08:54: superblock meta entries 6
2023 Nov 01 04:08:54: Soft-RAID configuration exit
2023 Nov 01 04:08:55: retrieving device list ...
2023 Nov 01 04:08:55: /usr/sbin/nvme subsystem-reset /dev/nvme0: 0
Reset TAM device ...
Rebooting... [661655.890391] reboot: Restarting system
<OUTPUT TRUNCATED>
Please do not remove the AC power!
Insyde H2OFFT (Flash Firmware Tool) Version (SEG) 200.00.00.10
Copyright (C) 2020 Insyde Software Corp. All Rights Reserved.
Current BIOS Model Name: FPR-3100
New BIOS Model Name: FPR-3100
Current System BIOS Version: 1.2.04
New BIOS Image Version: 1.2.05
Updating Block at FFFF0000h
0% 25% 50% 75% 100%
****+++******************************************* 100%
Update Progress: Completed
Checking media [Fail]
Checking media [Fail]
To launch ROMMON.
Time: 11/01/2023 04:26:47 (LOCAL)
*******************************************************************************
Cisco System ROMMON, Version 1.2.04, RELEASE SOFTWARE
Copyright (c) 1994-2022 by Cisco Systems, Inc.
Compiled Tue 10/18/2022 19:08:38.69 by Administrator
*******************************************************************************
Current image running: Boot ROM1
Last reset cause: ResetRequest (0x00001000)
DIMMs installed: P0 CHANNEL C P0 CHANNEL D
Platform FPR-3110 with 65536 MBytes of main memory
switch: bar0=0xd0800000 bar2=0xcc000000 bar4=0xd0000000 cmd=0x6
Switch Microinit: allocated buffer 5b758018, aligned buffer 5c000000
Mgmt port in SGMII mode
INFO: Firmware upgrade state: ROMMON_UPG_START (1)
firmware_upgrade: ROMMON_UPG_START
INFO: Reset code: 0x00001000
firmware_upgrade: ROMMON_UPG_START default
Active ROMMON: Preferred 1, selected 1, booted 1
Preparing to launch the new ROMMON upgrade image.
The new ROMMON upgrade image has been detected.
This will be launch attempt (1 of 4) to start the upgraded ROMMON image.
Power cyling the system to start the upgraded ROMMON image...
Toggling power on system board...
Checking media [Fail]
Checking media [Fail]
To launch ROMMON.
Time: 11/01/2023 04:29:20 (LOCAL)
*******************************************************************************
Cisco System ROMMON, Version 1.2.05, RELEASE SOFTWARE
Copyright (c) 1994-2022 by Cisco Systems, Inc.
Compiled Thu 12/08/2022 11:19:32.18 by builder
*******************************************************************************
Current image running: *Upgrade in progress* Boot ROM0
Last reset cause: BootRomUpgrade (0x00000010)
DIMMs installed: P0 CHANNEL C P0 CHANNEL D
Platform FPR-3110 with 65536 MBytes of main memory
switch: bar0=0xd0800000 bar2=0xcc000000 bar4=0xd0000000 cmd=0x6
Switch Microinit: allocated buffer 5bcad018, aligned buffer 5c000000
Mgmt port in SGMII mode
INFO: Firmware upgrade state: ROMMON_UPG_START (1)
firmware_upgrade: ROMMON_UPG_START
INFO: Reset code: 0x00000010
firmware_upgrade: ROMMON_UPG_START PLD_RST_REASON_FLASH
The upgraded ROMMON image has successfully started.
The boot watchdog timer is being stopped.
Active ROMMON: Preferred 1, selected 1, booted 0
INFO: File 'FS0:installables/switch/fxos-k8-fp3k-firmware.1.2.20.SPA' has 231330384 bytes.
fs_fopen_readonly: FileHandle 5d4fd020
Golden FPGA Version : 0.21.0
New Golden FPGA version : 0.21.0
Golden FPGA image is up-to-date.
INFO: Set the ROMMON upgrade state: ROMMON_UPG_NONE
+-----------------------------------------------------------------+
+--------------- ROMMON FIRMWARE UPGRADE SUCCESS ---------------+
+-----------------------------------------------------------------+
| |
| Start the security application to complete the ROMMON upgrade. |
| |
| Rebooting this unit without starting the security application |
| will cause the ROMMON to default back to the previously running |
| ROMMON version. |
| |
+-----------------------------------------------------------------+
MAC Address: c4:7e:e0:7e:12:34
Use BREAK or ESC to interrupt boot.
Use SPACE to begin boot immediately.
Boot in 10 seconds.
<OUTPUT TRUNCATED>
INFO: Configure management0 interface ...
INFO: Configure system files ...
INFO: System Name is: firepower-3110
Create 16 QDMA VFs from PF: 0000:41:00.0
Starting sensors logging daemon: sensord... done.
INFO: fp1000 asa copy appliance mode
INFO: console : ttyS0, speed : 9600
INFO: manager_startup: setting up fxmgr apache ...
INFO: manager_startup: Start manager httpd setup...
INFO: manager_startup: using HTTPD_INFO persistent cache
/bin/rm: cannot remove '/tmp/openssl.conf': No such file or directory
httpdRegister INFO: [httpd.2689 -s -4 0.0.0.0 -n localhost]
httpdRegister INFO: SKIP httpd syntax check
httpdRegister INFO: Starting httpd setup/registration...
httpdRegister INFO: Completed httpd setup/registration!
INFO: httpdRegister [httpd.2689 script exit]
INFO: manager_startup: Completed manager httpd setup!
Starting crond: OK
1:/opt/cisco/csp/cores
2:/opt/cisco/csp/packet-capture
/opt/cisco/csp/cores 62914560
/opt/cisco/csp/packet-capture 41943040
System Mode Check: NATIVE mode assigned
System Mode Check: NATIVE mode assigned
System Mode Check: NATIVE mode assigned
Cisco ASA: CMD=-bootup, CSP-ID=cisco-asa.9.17.1.21__asa_001_FJC27261SLF3EN1234, FLAG=''
Cisco ASA booting up ...
INFO: starting config regster monitor
System Mode Check: NATIVE mode assigned
firepower-3110 login: admin (automatic login)
Last login: Tue Oct 24 12:22:18 UTC 2023 on ttyS0
Successful login attempts for user 'admin' : 1
INFO: System Disk /dev/md0 present. Status: Operable.
System Mode Check: NATIVE mode assigned
System Mode Check: NATIVE mode assigned
Waiting for Application infrastructure to be ready...
Verifying the signature of the Application image...
System Mode Check: NATIVE mode assigned
Creating FXOS swap file ...
Please wait for Cisco ASA to come online...1...
Please wait for Cisco ASA to come online...2...
Please wait for Cisco ASA to come online...3...
Please wait for Cisco ASA to come online...4...
Please wait for Cisco ASA to come online...5...
Please wait for Cisco ASA to come online...6...
Please wait for Cisco ASA to come online...7...
Cisco ASA: CMD=-upgrade, CSP-ID=cisco-asa.9.18.3.56__asa_001_FJC27261SLF3EN1234, FLAG='cisco-asa.9.17.1.21__asa_001_FJC27261SLF3EN1234'
Cisco ASA begins upgrade ...
Please wait for Cisco ASA to come online...8...
Verifying signature for cisco-asa.9.18.3.56 ...
Verifying signature for cisco-asa.9.18.3.56 ... success
Please wait for Cisco ASA to come online...9...
Cisco ASA: CMD=-start, CSP-ID=cisco-asa.9.18.3.56__asa_001_FJC27261SLF3EN1234, FLAG=''
Cisco ASA starting ...
ASA start done pre
ASA Clear status
Memory allocated to application in kbytes: 54914048
CPU cores allocated to application: 1,13,2,14,3,15,4,16,5,17,6,18,7,19,8,20,9,21,10,22,11,23
Deleting previous CGroup Configuration ...
Registering to process manager ...
Cisco ASA started successfully.
lina_init_env: memif is not enabled.
System Cores 24 Nodes 1 Max Cores 128
IO Memory Nodes: 1
IO Memory Per Node: 2147483648 bytes num_pages = 524288 page_size = 4096
Global Reserve Memory Per Node: 2147483648 bytes Nodes=1
LCMB: got DMA 2147483648 bytes on numa-id=0, phys=0x0000000180000000, virt=0x00007fa040000000
LCMB: HEAP-CACHE POOL got 2147483648 bytes on numa-id=0, virt=0x00007f9f80000000
total_reserved_mem = 2147483648
total_heapcache_mem = 2147483648
ERROR: fail to open /var/run/lina/meminfo_new
ERROR: fail to open /var/run/lina/meminfo_old
total mem 54702424064 system 67387310080 kernel 134217728 image 112999912
new 54702424064 old 2260483560 reserve 4294967296 priv new 50541674496 priv old 0
Processor memory: 54702424064
M_MMAP_THRESHOLD 65536, M_MMAP_MAX 834692
POST started...
POST finished, result is 0 (hint: 1 means it failed)
Cisco Adaptive Security Appliance Software Version 9.18(3)56
Compiled on Tue 12-Sep-23 19:15 GMT by builders
FPR-3110 platformNic assigned 0
Total NICs found: 5
cpss_poll_devmain success!!
en_vtun rev00 Backplane Ext-Mgmt Interface @ index 03 MAC: c47e.e07e.1234
en_vtun rev00 Backplane Tap Interface @ index 04 MAC: 0000.0100.0001
livecore intialized
Counter ID 'TLS13_DOWNSTREAM_CLIENT_CERTIFICATE_VERIFY' is too long must be 40 characters or less
WARNING: Attribute already exists in the dictionary.
ILK enabled for instance 0 with lane mask 0xF speed 6250 MHz
Init ILK - NPS_CORE_GBL_VFCFG 0X00000000
Configure the GSER registers
ILK configured on QLM 0 with ref_clk 156250000 Hz, baud 6250 MHz, instance 0
QLM0: Lane 0: TX_SWING=16, TX_PRE=0, TX_POST=4, TX_GAIN=-1, TX_VBOOST=-1
QLM0: Lane 1: TX_SWING=16, TX_PRE=0, TX_POST=4, TX_GAIN=-1, TX_VBOOST=-1
QLM0: Lane 2: TX_SWING=16, TX_PRE=0, TX_POST=4, TX_GAIN=-1, TX_VBOOST=-1
QLM0: Lane 3: TX_SWING=16, TX_PRE=0, TX_POST=4, TX_GAIN=-1, TX_VBOOST=-1
ILK configured on QLM 1 with ref_clk 156250000 Hz, baud 6250 MHz, instance 0
Clear TX/TX calendars
Configure the SERDES for all possible lanes
Configure TX / RX Calendars
Enable per lane RX error counts
Bring up the TX side
Configure the RX lanes
RX equalization for speeds > 5G
QLM0: Lane 0 RX equalization complete
QLM0: Lane 1 RX equalization complete
QLM0: Lane 2 RX equalization complete
QLM0: Lane 3 RX equalization complete
Bring up RX link
ILK0: Lane alignment complete
Encryption hardware device : Cisco ASA Crypto on-board accelerator (revision 0x1)
AE microcode : CNN5x-MC-AE-MAIN-0007
SE SSL microcode : CNN5x-MC-SE-SSL-0018
The 3DES/AES algorithms require a Encryption-3DES-AES entitlement.
The 3DES/AES algorithms require a Encryption-3DES-AES entitlement.
Cisco Adaptive Security Appliance Software Version 9.18(3)56
****************************** Warning *******************************
This product contains cryptographic features and is
subject to United States and local country laws
governing, import, export, transfer, and use.
Delivery of Cisco cryptographic products does not
imply third-party authority to import, export,
distribute, or use encryption. Importers, exporters,
distributors and users are responsible for compliance
with U.S. and local country laws. By using this
product you agree to comply with applicable laws and
regulations. If you are unable to comply with U.S.
and local laws, return the enclosed items immediately.
A summary of U.S. laws governing Cisco cryptographic
products may be found at:
http://www.cisco.com/wwl/export/crypto/tool/stqrg.html
If you require further assistance please contact us by
sending email to export@cisco.com.
******************************* Warning *******************************
Cisco Adaptive Security Appliance Software, version 9.18
Copyright (c) 1996-2023 by Cisco Systems, Inc.
For licenses and notices for open source software used in this product, please visit
http://www.cisco.com/go/asa-opensource
Restricted Rights Legend
Use, duplication, or disclosure by the Government is
subject to restrictions as set forth in subparagraph
(c) of the Commercial Computer Software - Restricted
Rights clause at FAR sec. 52.227-19 and subparagraph
(c) (1) (ii) of the Rights in Technical Data and Computer
Software clause at DFARS sec. 252.227-7013.
Cisco Systems, Inc.
170 West Tasman Drive
San Jose, California 95134-1706
Reading from flash...
!!!.......
Cryptochecksum (unchanged): 9db145a0 ceddd2a5 4416d104 91137070
INFO: File /mnt/disk0/.private/dynamic-config.json not opened; errno 2
INFO: Network Service reload not performed.
INFO: Power-On Self-Test in process.
........................
INFO: Power-On Self-Test complete.
INFO: Starting HW-DRBG health test...
INFO: HW-DRBG health test passed.
INFO: Starting SW-DRBG health test...
INFO: SW-DRBG health test passed.
User enable_1 logged in to ciscoasa
Logins over the last 1 days: 1.
Failed logins since the last login: 0.
Type ' for a list of available commands.
ciscoasa> show version
Cisco Adaptive Security Appliance Software Version 9.18(3)56
SSP Operating System Version 2.12(0.519)
Device Manager Version 7.20(1)
Compiled on Tue 12-Sep-23 19:15 GMT by builders
System image file is "disk0:/installables/switch/fxos-k8-fp3k-lfbff.2.12.0.519.SPA"
Config file at boot was "startup-config"
ciscoasa up 1 min 57 secs
Start-up time 8 secs
Hardware: FPR-3110, 52168 MB RAM, CPU Ryzen Zen 2 2900 MHz, 1 CPU (24 cores)
Encryption hardware device : Cisco ASA Crypto on-board accelerator (revision 0x1)
AE microcode : CNN5x-MC-AE-MAIN-0007
SE SSL microcode : CNN5x-MC-SE-SSL-0018
Number of accelerators: 1
1: Int: Internal-Data0/1 : address is 0000.0041.0004, irq 152
3: Int: Not licensed : irq 0
4: Ext: Management1/1 : address is c47e.e07e.1482, irq 0
5: Int: Internal-Data1/1 : address is 0000.0100.0001, irq 0
License mode: Smart Licensing
Licensed features for this platform:
Maximum Physical Interfaces : Unlimited
Maximum VLANs : 1024
Inside Hosts : Unlimited
Failover : Active/Active
Encryption-DES : Enabled
Encryption-3DES-AES : Disabled
Security Contexts : 2
Carrier : Disabled
AnyConnect Premium Peers : 3000
AnyConnect Essentials : Disabled
Other VPN Peers : 3000
Total VPN Peers : 3000
AnyConnect for Mobile : Enabled
AnyConnect for Cisco VPN Phone : Enabled
Advanced Endpoint Assessment : Enabled
Shared License : Disabled
Total TLS Proxy Sessions : 4000
Cluster : Enabled
Serial Number: FJZ27231234
Configuration register is 0x1
Configuration has not been modified since last system restart.
It took around 30 mins for the ASA software upgrade to finish.