Notes for upgrading the IOS version of CiscoASA Firewall

Source: Internet
Author: User
Tags filezilla

Notes for upgrading the IOS version of CiscoASA Firewall

Reference the official Cisco announcement:

Vulnerability in Internet Key Exchange (IKE) Version 1 (V1) and IKE Protocol Version 2 (v2) the Cisco ASA software code may allow unauthenticated remote attackers to reinstall the system or execute code remotely.

This vulnerability is caused by a buffer overflow in the affected code zone. Attackers can exploit this vulnerability to exploit this vulnerability by sending specially crafted UDP packets. A vulnerability may allow attackers to execute arbitrary code to gain full control of the system or cause the impact of system reinstallation.

Note: Only traffic directed to the affected system can be used to exploit this vulnerability. This vulnerability affects the configuration of the firewall mode only in one or more context mode systems. This vulnerability can trigger IPv4 and IPv6 traffic.

Cisco released software updates to fix this vulnerability.

The affected Cisco ASA software may be affected by this vulnerability for the following products:

Cisco ASA5500 Series Adaptive Security Devices

Cisco ASA5500-X series next generation Firewall

Cisco Catalyst 6500 series switches and Cisco 7600 series routers for the Cisco ASA Service Module

Cisco ASA1000V cloud Firewall

Cisco Adaptive Security Virtual Device (ASAV)

Cisco firepower 9300 ASA Security Module

Cisco ISA 3000 Industrial Security Equipment

 

Therefore, the exit firewall of a large enterprise, Cisco 5520, also needs to upgrade IOS.

 

Preparations before Upgrade (important, must be executed)

1. Check the current running status of the firewall, including the firewall panel indicators, firewall fans, firewall CPU, and memory.

Of course, to view the firewall indicators, the fan can only be viewed on site

To view the running status of the firewall CPU and memory, run the following command:

CiscoASA#showprocesscpu-usageCiscoASA#showprocessmemory

2. Be sure to back up the configuration. You need to use the record session function of SecureCRT to import the content in show running-config to the log file.

Then, use SecureCRT to connect to the firewall and enter show running-config to save the configuration command in the local log file. In this way, you are not afraid to lose the configuration and capture it everywhere.

Note: Under normal circumstances, upgrading CiscoASA IOS will not cause configuration loss, even if you upgrade from the asa847-k8.bin to the asa912-k8.bin, it is normal that the command will automatically convert to the commands supported by the current version. However, the risk of command loss is not ruled out.

3. (very important) back up the License of CiscoASA

During the upgrade, you may still be able to remedy the loss of the configuration, but if the License is lost, it may not be easy to find. You need to contact Cisco again to retrieve the License.

However, it is very easy to back up the License of CiscoASA. You only need to run the Show version command.

Ciscoasa # showversion ************************************* **************************************** * *** WARNING ** WARNING ************* ----> MinimumMemoryRequirementsNOTMet! <---- ******** InstalledRAM: 1024 MB ***** RequiredRAM: 2048 MB ***** Upgradepart #: ASA5520-MEM-2GB = *** ThisASAdoesnotmeettheminimummemoryrequirementsneededto *** runthisimage. pleaseinstalladditionalmemory (partnumber ***** listedabove) ordowngradetoASAversion8.2orearlier. * *** Continuingtorunwithoutamemoryupgradeisunsupported, and *** criticalsystemfeatureswillnotfunctionproperly. **************************************** * ********************************** CiscoAdaptiveSecurityApplianceSoftwareVersion9.1 (2) deviceManagerVersion7.5 (1) CompiledonThu09-May-1315: 37 bybuildersSystemimagefileis "disk0:/asa912-k8.bin" Configfileatbootwas "startup-config" <--- More ---> parameters: ASA5520, 1024 MBRAM, role, InternalATACompactFlash, 256 MB [email protected], 2048 KBEncryptionhardwaredevice: CiscoASA-55xxon-boardaccelerator (revision0x0) Bootmicrocode: CN1000-MC-BOOT-2.00SSL/IKEmicrocode: CNLite-MC-SSLm-PLUS-2_05IPSecmicrocode: CNlite-MC-IPSECm-MAIN-2.08Numberofaccelerators: 10: Ext: GigabitEthernet0/0: addressisc84c. 7561.88fe, irq91: Ext: GigabitEthernet0/1: addressisc84c. 7561.88ff, irq92: Ext: GigabitEthernet0/2: addressisc84c. 7561.8900, irq93: Ext: GigabitEthernet0/3: addressisc84c. 7561.8901, irq94: Ext: Management0/0: addressisc84c. 7561.8902, irq115: Int: Notused: irq116: Int: Notused: pushed: MaximumPhysicalInterfaces: pushed: 150 perpetual <--- More ---> InsideHosts: pushed: Active/pushed-DES: EnabledperpetualEncryption-3DES-AES: protocol: 2 perpetualgp/GPRS: Protocol: 2 protocol: Protocol: 750 Protocol: 750 perpetualSharedLicense: Protocol: 2 Protocol: 2 perpetualBotnetTrafficFilter: Protocol: DisabledperpetualCluster: protocol. # Here is the firewall serial number and License. I have not provided the SerialNumber: J ********** hVRunningPermanentActivationKey: 0x1 ************** 20x08 ******* a80x ******** 00x4 ****** 97Configurationregisteris0x1Configurationhasnotbeenmodifiedsincelastsystemrestart.

 

4. Only after the backup work is completed can potential risks be avoided, and then you can prepare for IOS image upgrade.

What you need to prepare is:

FileZilla Server

Fire Prevention IOS

Note: If the firewall model is a Cisco55xx-X, you must have "smp" in your IOS

The firewall model used in this upgrade project is Cisco5520, the original IOS version is asa741-k8.bin, so you must follow the upgrade order provided by Cisco to complete the upgrade, it is best not to Skip, otherwise, the configuration or License is easily lost.

So the upgrade step shocould be 7.0-> 7.1-> 7.2-> 8.2-> 8.4 (6)-> 9.1x

So, you must upgrade to 8.2, that is, asa821-k8.bin, and then to 8.4 (6), that is, asa846.k8. bin, and then upgrade to 9.1 (2) before the upgrade to 9.1 (3) or more advanced.

 

The upgrade operation is actually relatively simple. Use FileZilla to set up FTP and set the user name test and password haha.

Then copy the IOS image to the flash memory of the ASA.

ciscoasa#copyftp://test:[email protected]/asa847-k8.binflash:Addressornameofremotehost[]?10.164.12.3Sourcefilename[]?asa847-k8.binDestinationfilename[asa847-k8.bin]?

After the copy is complete, you can use show flash: to see

ciscoasa#showflash:-#---length-------date/time------path10Mar12201118:52:14crypto_archive28515584Jun18201005:53:48asa724-k8.bin34181246Jun18201005:55:04securedesktop-asa-3.2.1.103-k9.pkg4398305Jun18201005:55:30sslclient-win-1.1.0.154.pkg156514852Mar12201103:46:24asdm-524.bin180Feb10201409:27:06log482289Feb23201609:42:027_2_4_0_startup_cfg.sav490Feb10201409:27:24coredumpinfo5059Feb10201409:27:24coredumpinfo/coredump.cfg511138Jul04201414:05:58upgrade_startup_errors_201407041405.log521138Feb23201608:40:18upgrade_startup_errors_201602230840.log531138Feb23201609:42:04upgrade_startup_errors_201602230942.log5424809472Feb23201611:14:52asa847-k8.bin210485248bytesavailable(44818432bytesused)

 

After the copy is complete, execute the upgrade command

Ciscoasa # conftciscoasa (config) # bootsystemdisk0:/asa847-k8.binciscoasa (config) # nobootsystemdisk0:/asa724-k8.binciscoasa (config) # exitciscoasa # reload can be upgraded simultaneously ASDMciscoasa (config) # asdmimagefiledisk0:/asdm-751.bin

 

After the upgrade is completed, the following criteria must be met:

Run show vlan to view the vlan status on the firewall

Run show route to view the firewall route table

Use the ping command to check Service connectivity

 

Requirements: firewall configurations and policies are not lost, and firewall route entries are not lost.

2. the IOS software version currently running on the firewall must comply with the upgraded software version.

Run show version to view the current IOS software version.

ASDM can be used normally

3. The firewall is running normally, and the CPU and memory usage are not significantly high.

Execute show process cpu-usage

4. Firewall SSM works properly

Run show module all to view the firewall module

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.