1-29
Cisco ASA Series CLI Configuration Guide
Chapter 1 Managing Software and Configurations
Configuring Auto Update
The ASA is also configured to use the hostname as the device ID and to poll an Auto Update Server every
Friday and Saturday night at a random time between 10:00 p.m. and 11:00 p.m. On a failed polling
attempt, the ASA will try to reconnect to the Auto Update Server ten times, and will wait three minutes
between attempts at reconnecting, as shown in the following example:
hostname(config)#
auto-update server
https://jcrichton:farscape@209.165.200.224:1742/management source outside
verify-certificate
hostname (config)#
auto-update device-id
hostname
hostname (config)#
auto-update poll-at Friday Saturday 22:00 randomize 60 2 10
Configuring Client Updates as an Auto Update Server
Entering the
client-update
command enables updates for ASAs configured as Auto Update clients and
lets you specify the type of software component (ASDM or boot image), the type or family of ASA,
revision numbers to which the update applies, and a URL or IP address from which to obtain the update.
To configure the ASA as an Auto Update Server, perform the following steps:
Step 1
To enable client update, enter the following command:
hostname(config)#
client-update enable
Step 2
Configure the following parameters for the
client-update
command that you want to apply to the ASAs:
client-update
{
component
{
asdm
|
image
} |
device-id
dev_string
|
family
family_name
|
type
type
}
url
url-string
rev-nums
rev-nums
}
The
component
{
asdm
|
image
} parameter specifies the software component, either ASDM or the boot
image of the ASA.
The
device-id
dev_string
parameter specifies a unique string that the Auto Update client uses to identify
itself. The maximum length is 63 characters.
The
family
family_name
parameter
specifies the family name that the Auto Update client uses to identify
itself. It can be asa, pix, or a text string with a maximum length of seven characters.
The
rev-nums
rev-nums
parameter specifies the software or firmware images for this client. Enter up to
four, in any order, separated by commas.
The
type
type
parameter specifies the type of clients to notify of a client update. Because this command
is also used to update Windows clients, the list of clients includes several Windows operating systems.
The ASAs in the list may include the following:
•
asa5505: Cisco 5505 ASA
•
asa5510: Cisco 5510 ASA
•
asa5520: Cisco 5520 ASA
•
asa5540: Cisco 5540 ASA
The
url
url-string
parameter specifies the URL for the software/firmware image. This URL must point
to a file appropriate for this client. For all Auto Update clients, you must use the protocol “http://” or
“https://” as the prefix for the URL.
Configure the parameters for the client update that you want to apply to all ASAs of a particular type.
That is, specify the type of ASA and the URL or IP address from which to get the updated image. In
addition, you must specify a revision number. If the revision number of the remote ASA matches one of
the specified revision numbers, there is no need to update the client, and the update is ignored.
To configure a client update for Cisco 5520 ASAs, enter the following command:
Summary of Contents for 5505 - ASA Firewall Edition Bundle
Page 28: ...Glossary GL 24 Cisco ASA Series CLI Configuration Guide ...
Page 61: ...P A R T 1 Getting Started with the ASA ...
Page 62: ......
Page 219: ...P A R T 2 Configuring High Availability and Scalability ...
Page 220: ......
Page 403: ...P A R T 2 Configuring Interfaces ...
Page 404: ......
Page 499: ...P A R T 2 Configuring Basic Settings ...
Page 500: ......
Page 533: ...P A R T 2 Configuring Objects and Access Lists ...
Page 534: ......
Page 601: ...P A R T 2 Configuring IP Routing ...
Page 602: ......
Page 745: ...P A R T 2 Configuring Network Address Translation ...
Page 746: ......
Page 845: ...P A R T 2 Configuring AAA Servers and the Local Database ...
Page 846: ......
Page 981: ...P A R T 2 Configuring Access Control ...
Page 982: ......
Page 1061: ...P A R T 2 Configuring Service Policies Using the Modular Policy Framework ...
Page 1062: ......
Page 1093: ...P A R T 2 Configuring Application Inspection ...
Page 1094: ......
Page 1191: ...P A R T 2 Configuring Unified Communications ...
Page 1192: ......
Page 1333: ...P A R T 2 Configuring Connection Settings and QoS ...
Page 1334: ......
Page 1379: ...P A R T 2 Configuring Advanced Network Protection ...
Page 1380: ......
Page 1475: ...P A R T 2 Configuring Modules ...
Page 1476: ......
Page 1549: ...P A R T 2 Configuring VPN ...
Page 1550: ......
Page 1965: ...P A R T 2 Configuring Logging SNMP and Smart Call Home ...
Page 1966: ......
Page 2059: ...P A R T 2 System Administration ...
Page 2060: ......
Page 2098: ...1 8 Cisco ASA Series CLI Configuration Guide Chapter 1 Troubleshooting Viewing the Coredump ...
Page 2099: ...P A R T 2 Reference ...
Page 2100: ......