Upgrading your Cisco ASA firewall
Find out how to upgrade your Cisco ASA firewall
Find out how to upgrade your Cisco ASA firewall
End of support for the Cisco ASA Firewall feature on dedicated servers
OVHcloud announces the end of its support for the Cisco ASA Firewall feature for dedicated servers. More information is available on this page.
Last updated 28th February 2018
To ensure that your system is optimally protected, you will need to regularly upgrade your Cisco Adaptive Security Appliance (ASA) firewall with the latest patches. By doing so, you will avoid potential security vulnerabilities.
This guide will explain how to upgrade your Cisco ASA firewall.
The upgrade process will require your system to reboot several times. For this reason, we recommend disabling the Cisco ASA firewall, so that your server does not experience any outages during the upgrade process.
To do this, go to your OVH Control Panel, and open the Bare Metal Cloud
section. Then select your dedicated server, and Cisco ASA Firewall
. Next, click Disable the Cisco ASA firewall
, on the right-hand side.
Log in to your Cisco Adaptive Security Device Manager (ASDM), then choose File
and Save Running Configuration to Flash
.
Log in to the ASA via the SSH protocol:
user@desk:~$ ssh adminovh@IP_ASA
adminovh@IP_ASAs password:
Type help or '?' for a list of available commands.
asa12345> en
Password: ********
Then run the following command:
asa12345# write memory
Building configuration...
Cryptochecksum: 4b86b1e4 2e731d6b 9d1fc491 a5eae0f3
6854 bytes copied in 1.20 secs (6854 bytes/sec)
[OK]
Create a local file, e.g. backupAsa.txt
. Next, log in to the ASDM and go to Tools
, then Backup Configurations
.
In the pop-up menu that opens, select the local file that you have just created (with Browse Local...
), then save the configuration by clicking Backup
.
This step is important, as you need to ensure that the ASA works properly and is accessible after a single reload.
Log in to your Cisco Adaptive Security Device Manager, then choose Tools
, and System Reload...
.
To reload the service immediately, select the following in the window that appears: Reload Start Time
> Now
> Schedule Reload
.
Log in to the ASA using the SSH protocol, then run the following command: reload
asa12345# reload
Proceed with reload? [confirm]
***
*** --- START GRACEFUL SHUTDOWN ---
Shutting down isakmp
Shutting down File system
***
*** --- SHUTDOWN NOW ---
The reboot to reload the configuration will take a few minutes.
As per the first step, go to your OVH Control Panel, and open the Bare Metal Cloud
section. Select your dedicated server, then Cisco ASA Firewall
. Next, click Enable the Cisco ASA firewall
, on the right-hand side.
After the reload, once the ASA firewall is enabled again, check that all of your server's services are working properly. If everything works, move onto the next step. If you experience any issues, carry out the checks required to resolve them before you move onto the next steps.
You now need to disable the Cisco ASA firewall again, as you did in the first step.
To do this, go to your OVH Control Panel, and open the Bare Metal Cloud
section. Then select your dedicated server, and Cisco ASA Firewall
. Next, click Disable the Cisco ASA firewall
, on the right-hand side.
.
Log in to the Cisco Adaptive Security Device Manager, then go to Device Information
, and General
. Here, you will see the Cisco ASA and ASDM versions you are using. We recommend taking note of these details, and keeping them to hand.
Log in via the SSH protocol, and run the following command:
asa12345# sh run | i bin
boot system disk0:/asa847-30-k8.bin
asdm image disk0:/asdm-771.bin
To find the binary image you need to use, refer to the table below:
Current ASA version | First required upgrade | Final required upgrade |
---|---|---|
8.2(x) or older | 8.4(6) | 9.1(3) or later |
8.3(x) | 8.4(6) | 9.1(3) or later |
8.4(1) to 8.4(4) | 8.4(6) to 9.0(2+) | 9.1(3) or later |
8.4(5+) | None | 9.1(3) or later |
8.5(1) | 9.0(2+) | 9.1(3) or later |
8.6(1) | 9.0(2+) | 9.1(3) or later |
9.0(1) | 9.0(2+) | 9.1(3) or later |
9.0(2+) | None | 9.1(3) or later |
9.1(1) | 9.1(2) | 9.1(3) or later |
9.1(2+) | None | 9.1(3) or later |
9.2(x) | None | 9.2(2) or later |
For example, if you are using ASA version 8.4(2), you will need to upgrade your system to version 8.4(6) first, then upgrade it to 8.4(7+) or 9.2+.
For further information, please refer to the Cisco ASA upgrade guide.
For Cisco ASA firewalls with 256 MB memory, we recommend only upgrading to 8.4(x). Versions 9.1(x) and 9.2(x) will use almost all of the available memory before they even start running.
There are two ways of checking which version you have:
asa12345# sh ver| i RAM
Hardware: ASA5505, 512 MB RAM, CPU CPU Geode 500 MHz
Tools
section, using Command Line Interface...
:Before you add new binary images, we recommend removing old ones.
Log in to the Cisco Adaptive Security Device Manager. Then go to Tools
, and File Management...
.
Then delete the binary images (.bin) that you are not using. You should now have just one file for the ASA, and another for the ASDM on the disk.
Log in to your ASA via the SSH protocol, then remove the files after you have listed them:
asa12345# sh flash: | i bin
128 26995116 Apr 18 2017 23:55:52 asdm-771.bin
144 23016144 Dec 12 2016 14:35:07 asdm-721-150.bin
138 25214976 Nov 18 2017 23:29:54 asa847-30-k8.bin
asa12345# delete flash:asdm-781-150.bin
Delete filename [asdm-721-150.bin]?
Delete disk0:/asdm-721-150.bin? [confirm]
Log in to the Cisco Adaptive Security Device Manager. Go to Tools
, then click Upgrade Software from Local Computer...
.
.
In the window that opens, select:
Browse Local Files
and choose your ASDM binary image version.To confirm your choice, click Upload Image
, then click Yes
to confirm that this should be the boot image.
The binary image should be placed on an FTP server in advance. You will then need to configure the ASA using the SSH protocol and save its configuration:
asa12345# copy ftp://USER:PASSWORD@FTP_IP/FOLDER/asdm-781.bin flash:asdm-781.bin
Address or name of remote host [FTP_IP]?
Source username [USER]?
Source password [PASSWORD]?
Source filename [asdm-781.bin]?
Destination filename [asdm-781.bin]?
Accessing ftp://USER:PASSWORD@FTP_IP/FOLDER/asdm-781.bin...!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
Writing file disk0:/asdm-781.bin...
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
25025404 bytes copied in 41.690 secs (610375 bytes/sec)
asa12345# conf t
asa12345(config)# asdm image disk0:/asdm-781.bin
asa12345(config)# end
asa12345# write memory
Log in to the Cisco Adaptive Security Device Manager. Then go to Tools
, and click Upgrade Software from Local Computer...
.
In the window that opens, select:
Browse Local Files
and choose your ASA binary image version.To confirm your choice, click Upload Image
, then click Yes
to confirm that this should be the boot image.
Log in using the SSH protocol, and run the following commands:
asa12345# copy ftp://USER:PASSWORD@FTP_IP/FOLDER/asa-924.bin flash:asa-924.bin
Address or name of remote host [FTP_IP]?
Source username [USER]?
Source password [PASSWORD]?
Source filename [asa-924.bin]?
Destination filename [asa-924.bin]?
Accessing ftp://USER:PASSWORD@FTP_IP/FOLDER/asa-924.bin...!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
Writing file disk0:/asa-924.bin...
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
28057462 bytes copied in 46.270 secs (609345 bytes/sec)
asa12345# conf t
asa12345(config)# asdm image disk0:/asa-924.bin
asa12345(config)# end
asa12345# write memory
This step is important, as you need to ensure that the ASA firewall works properly and is accessible after a single reload.
Log in to the Cisco Adaptive Security Device Manager. Next, click Tools
, then System Reload...
.
To reload the service immediately, in the window that appears, select Reload Start Time
: Now
, then click Schedule Reload
.
Log in to the ASA using the SSH protocol, then run the following command: reload
asa12345# reload
Proceed with reload? [confirm]
***
*** --- START GRACEFUL SHUTDOWN ---
Shutting down isakmp
Shutting down File system
***
*** --- SHUTDOWN NOW ---
The reboot to reload the configuration will take a few minutes.
At this stage, if you are unable to add the ASA binary image, reboot the system to upgrade the ASDM, then remove the unused ASDM binary image to free up space.
You should then update the ASA binary image, following the procedure detailed above.
When you upgrade the ASA from versions older than 8.4.6, you will see this new configuration after the reboot:
asa12345# sh run | i permit-
no arp permit-nonconnected
Correct the configuration as follows:
asa12345# conf t
asa12345(config)# aarp permit-nonconnected
asa12345(config)# end
asa12345# write memory
Building configuration...
Cryptochecksum: 4b86b1e4 2e731d6b 9d1fc491 a5eae0f3
6854 bytes copied in 1.20 secs (6854 bytes/sec)
[OK]
As per the first step, go to your OVH Control Panel, and open the Bare Metal Cloud
section. Then select your dedicated server, and Cisco ASA Firewall
. Next, click Enable the Cisco ASA firewall
, on the right-hand side.
Your ASA is now upgraded.
Join our community of users on https://community.ovh.com/en/.
Please feel free to give any suggestions in order to improve this documentation.
Whether your feedback is about images, content, or structure, please share it, so that we can improve it together.
Your support requests will not be processed via this form. To do this, please use the "Create a ticket" form.
Thank you. Your feedback has been received.
Access your community space. Ask questions, search for information, post content, and interact with other OVHcloud Community members.
Discuss with the OVHcloud community