Solved

Cisco ASA 5510 upgrade From 8.0(2) to 8.4

Posted on 2014-02-25
4
1,912 Views
Last Modified: 2014-02-25
Due to changes made by TrendMicro, I need to upgrade from ASA version8.0(2) to 8.4(7).
Though not required would also like to upgrade ASDM from 7.1(1) to 7.1(5).
Question - is this straight forward download, install, reboot? Or will I need to reformat, reload config, etc.?
0
Comment
Question by:holcom86
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
  • 2
4 Comments
 
LVL 12

Accepted Solution

by:
Gary Dewrell earned 250 total points
ID: 39886118
Not straight forward at all. :(
Major changes were made in the 8.3 release that require you to make many changes to your config. Here is a link to get you started.

https://supportforums.cisco.com/docs/DOC-12690
0
 
LVL 28

Assisted Solution

by:Jan Springer
Jan Springer earned 250 total points
ID: 39886208
Upgrade to 8.2, then 8.3 and then 8.4.

This will ensure that configuration changes get applied properly.  You can do one right after another but I recommend backing up each configuration with a unique file name both to flash and tftp before each upgrade.
0
 
LVL 12

Expert Comment

by:Gary Dewrell
ID: 39886214
Definitely backup. jesper that process did not work for us 100%. We have a 5520, 5510 and 4 5505's. 5520 and 5505 worked no problem. 5510 crashed during the automated configuration upgrade process. Fortunately we had spare units so I could test off line.
0
 
LVL 28

Expert Comment

by:Jan Springer
ID: 39886230
i've had not problems with the 5510s.  

i have done the upgrade and rolled back to a previous release and retry an upgrade.

but yes, you could have problems although I think the upgrade process has been improved.

i specifically went with a later release 8.2, 8.3 and 8.4 to avoid upgrade problems.
0

Featured Post

Technology Partners: We Want Your Opinion!

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

The use of stolen credentials is a hot commodity this year allowing threat actors to move laterally within the network in order to avoid breach detection.
Examines three attack vectors, specifically, the different types of malware used in malicious attacks, web application attacks, and finally, network based attacks.  Concludes by examining the means of securing and protecting critical systems and inf…
Both in life and business – not all partnerships are created equal. As the demand for cloud services increases, so do the number of self-proclaimed cloud partners. Asking the right questions up front in the partnership, will enable both parties …
Both in life and business – not all partnerships are created equal. Spend 30 short minutes with us to learn:   • Key questions to ask when considering a partnership to accelerate your business into the cloud • Pitfalls and mistakes other partners…

738 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question