Download Print this page

Cisco ASA 55 Series Software Manual page 19

Threat defense reimage guide

Advertisement

Cisco ASA and Firepower Threat Defense Reimage Guide
d) Load the ASA FirePOWER boot image:
sw-module module sfr recover boot
Example:
ciscoasa# sw-module module sfr recover boot
Module sfr will be recovered. This may erase all configuration and all data
on that device and attempt to download/install a new image for it. This may take
several minutes.
Recover module sfr? [confirm] y
Recover issued for module sfr.
e) Wait a few minutes for the ASA FirePOWER module to boot up, and then open a console session to the
now-running ASA FirePOWER boot image. You might need to press Enter after opening the session to
get to the login prompt. The default username is admin and the default password is Admin123.
Example:
ciscoasa# session sfr console
Opening console session with module sfr.
Connected to module sfr. Escape character sequence is 'CTRL-^X'.
asasfr login: admin
Password: Admin123
If the module boot has not completed, the session command will fail with a message about not being able
to connect over ttyS1. Wait and try again.
a) Configure the system so that you can install the system software install package.
setup
You are prompted for the following. Note that the management address and gateway, and DNS information,
are the key settings to configure.
Example:
asasfr-boot> setup
• Host name—Up to 65 alphanumeric characters, no spaces. Hyphens are allowed.
• Network address—You can set static IPv4 or IPv6 addresses, or use DHCP (for IPv4) or IPv6 stateless
autoconfiguration.
• DNS information—You must identify at least one DNS server, and you can also set the domain name
and search domain.
• NTP information—You can enable NTP and configure the NTP servers, for setting system time.
Welcome to Cisco FirePOWER Services Setup
Default values are inside []
[hit Ctrl-C to abort]
Cisco ASA and Firepower Threat Defense Reimage Guide
Reimage from Firepower Threat Defense to ASA
19

Advertisement

loading