! Configure an “enable password” which is the administrator password of the deviceĮnable password 2KFQnbNIdI.2KYOU encrypted
The management PC is running also a TFTP server software (tftp32) which will be used to transfer the ASDM image to the ASA.īelow is the CLI configuration used in this initial setup (see video below also for more information): We will configure Interface GigabitEthernet 5 as a management interface with IP address 10.10.10.1/24.Īlso, on the same subnet we have our management PC with IP address 10.10.10.10/24.
Refer to Cisco IOS or Firmware Release Types to understand the different types of IOS.First we need to have console access (with a serial console cable) to the device in order to configure some initial settings to allow user access with ASDM or with SSH.
There are many types of IOS available on the Cisco Software Download Center and it creates confusion about which is the best. After reloading the ASA will have a new ASA and ASDM image. Writing file disk0:/asdm-openjre-7131-101.bin.ġ10660520 bytes copied in 130.940 secs (851234 bytes/sec)Ĭhange the ASDM boot system to latest ASDM image. Verifying file disk0:/asdm-openjre-7131-101.bin. As shown below: edledge-asa# copy tftp flash: Proceed with reload? ASDM Image Upgradeįollow Steps 1 to 4 Same as earlier as mentioned above. Save the changes so that the latest boot settings should be saved and then reload the ASA to boot with the latest ISO image.
edledge-asa# sh bootĬurrent BOOT variable = disk0:/ asa9-13-1-10-lfbff-k8.SPA INFO: Converting flash:asa9-13-1-10-lfbff-k8.SPA to disk0:/asa9-13-1-10-lfbff-k8.SPAĬheck and confirm that the boot system is set for the new IOS image. Writing file disk0:/asa9-13-1-10-lfbff-k8.SPA.ġ07571680 bytes copied in 125.180 secs (860573 bytes/sec)Ĭheck the current boot system edledge-asa# sh bootīOOT variable = disk0:/asa982-lfbff-k8.SPAĬurrent BOOT variable = disk0:/asa982-lfbff-k8.SPAĬhange the boot system to new uploaded IOS as shown below edledge-asa(config)# boot system flash:asa9-13-1-10-lfbff-k8.SPA edledge-asa# copy tftp flash:Īddress or name of remote host ? 192.168.1.5 Since TFTP is accessible, we can transfer the IOS file to the ASA. Success rate is 100 percent (5/5), round-trip min/avg/max = 1/1/1 ms Sending 5, 100-byte ICMP Echos to 192.168.1.5, timeout is 2 seconds: Let us consider here TFTP host IP is 192.168.1.5 edledge-asa# ping 192.168.1.5
Follow the steps shown below edledge-asa# sh flash: Hardware: ASA5508, 8192 MB RAM, CPU Atom C2000 series 2000 MHz, 1 CPU (8 cores)Įncryption hardware device : Cisco ASA Crypto on-board accelerator (revision 0x1)Ĭheck “flash:” to know free available space and also the files it already has. System image file is "disk0:/asa982-lfbff-k8.SPA" edledge-asa# sh versionĬisco Adaptive Security Appliance Software Version 9.8(2)įirepower Extensible Operating System Version 2.2(2.52)Ĭompiled on Sun 27-Aug-17 13:06 PDT by builders To check the current version of the ASA follows the command shown below. Select the IOS Version and download it from the Cisco Software Download Center and save it in the local Computer.
Follow the link to get GUI method to upgrade IOS of ASA. This article contains the CLI method of upgrading Cisco IOS. Model: ASA 5506-X, ASA 5506 W-X, ASA 5508-Xĭescription: In this article, we will discuss the stepwise method to upgrade and/or downgrade the IOS of Cisco ASA Firewalls.