Cisco ASA IOS Upgrade/Downgrade CLI

edledge Cisco logo

Scenario:
Make: Cisco ASA
Model
: ASA 5506-X, ASA 5506 W-X, ASA 5508-X
Mode: CLI (Command Line Interface)
Description: In this article, we will discuss the stepwise method to upgrade and/or downgrade the IOS of Cisco ASA Firewalls. This article contains the CLI method of upgrading Cisco IOS. We can upgrade the IOS via GUI as well. Follow the link to get GUI method to upgrade IOS of ASA. Select the IOS Version and download it from the Cisco Software Download Center and save it in the local Computer.

ASA Image Upgrade

Step1: Login
Login to the Firewall via CLI

Step2: Current Version
To check the current version of the ASA follows the command shown below.

edledge-asa# sh version
Cisco Adaptive Security Appliance Software Version 9.8(2)
Firepower Extensible Operating System Version 2.2(2.52)
Device Manager Version 7.8(2)

Compiled on Sun 27-Aug-17 13:06 PDT by builders
System image file is "disk0:/asa982-lfbff-k8.SPA"
Config file at boot was "startup-config"

edledge-asa up 8 days 18 hours

Hardware: ASA5508, 8192 MB RAM, CPU Atom C2000 series 2000 MHz, 1 CPU (8 cores)
Internal ATA Compact Flash, 8000MB
BIOS Flash M25P64 @ 0xfed01000, 16384KB

Encryption hardware device : Cisco ASA Crypto on-board accelerator (revision 0x1)
Number of accelerators: 1

<.......Overall output of the "sh version" command wil be long hence it has been shorten and only
top few lines are showed.....>

Step3: Check Flash
Check “flash:” to know free available space and also the files it already has. Follow the steps shown below

edledge-asa# sh flash:
--#-- --length-- -----date/time------ path
94 108563072 Jan 04 2020 00:03:20 asa982-lfbff-k8.SPA
95 26970456 Jan 04 2020 00:03:40 asdm-782.bin
96 33 Jan 26 2021 11:07:55 .boot_string
11 4096 Jan 04 2020 00:07:00 log
13 625 Jan 25 2021 15:24:46 log/asa-appagent.log
21 4096 Jan 04 2020 00:07:52 crypto_archive
22 4096 Jan 04 2020 00:07:54 coredumpinfo
23 59 Jan 04 2020 00:07:54 coredumpinfo/coredump.cfg

7859437568 bytes total (4393017344 bytes free)

Step4: TFTP Connection
Check and ensure TFTP is accessible. Let us consider here TFTP host IP is 192.168.1.5

edledge-asa# ping 192.168.1.5
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 192.168.1.5, timeout is 2 seconds:
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max = 1/1/1 ms

Step5: Transfer IOS File
Since TFTP is accessible, we can transfer the IOS file to the ASA. Follow the commands shown below.

edledge-asa# copy tftp flash:

Address or name of remote host []? 192.168.1.5

Source filename []? asa9-13-1-10-lfbff-k8.SPA

Destination filename [asa9-13-1-10-lfbff-k8.SPA]? [ENTER]

Accessing tftp://192.168.1.5/asa9-13-1-10-lfbff-k8.SPA...!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
Verifying file disk0:/asa9-13-1-10-lfbff-k8.SPA...

Computed Hash SHA2: 5555f952834545f95222b4545f952cc8

Embedded Hash SHA2: 5555f952834545f95222b4545f952cc8

Digital signature successfully validated

Writing file disk0:/asa9-13-1-10-lfbff-k8.SPA...

107571680 bytes copied in 125.180 secs (860573 bytes/sec)

Step6: Boot System
Check the current boot system

edledge-asa# sh boot

BOOT variable = disk0:/asa982-lfbff-k8.SPA
Current BOOT variable = disk0:/asa982-lfbff-k8.SPA
CONFIG_FILE variable =
Current CONFIG_FILE variable =

Step7: Change Boot System
Change the boot system to new uploaded IOS as shown below

edledge-asa(config)# boot system flash:asa9-13-1-10-lfbff-k8.SPA
INFO: Converting flash:asa9-13-1-10-lfbff-k8.SPA to disk0:/asa9-13-1-10-lfbff-k8.SPA
edledge-asa(config)#

Step8: Confirm Boot System
Check and confirm that the boot system is set for the new IOS image.

edledge-asa# sh boot

BOOT variable =
Current BOOT variable = disk0:/asa9-13-1-10-lfbff-k8.SPA
CONFIG_FILE variable =
Current CONFIG_FILE variable =

Step9: Save Change & Reload
Save the changes so that the latest boot settings should be saved and then reload the ASA to boot with the latest ISO image.

<save the config>

edledge-asa# wr
Building configuration...
Cryptochecksum: 845e144f f45e143e 945e144f 945e144f

3384 bytes copied in 0.170 secs
[OK]

<reload the ASA>

edledge-asa# reload
Proceed with reload? [confirm]

ASDM Image Upgrade

Follow Steps 1 to 4 Same as earlier as mentioned above.

Step10: Load the “ASDM” image. As shown below:

edledge-asa# copy tftp flash:

Address or name of remote host []? 192.168.1.5

Source filename []? asdm-openjre-7131-101.bin

Destination filename [asdm-openjre-7131-101.bin]? [ENTER]

Accessing tftp://192.168.1.5/asdm-openjre-7131-101.bin...!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
Verifying file disk0:/asdm-openjre-7131-101.bin...
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
Writing file disk0:/asdm-openjre-7131-101.bin...

INFO: No digital signature found
110660520 bytes copied in 130.940 secs (851234 bytes/sec)

Step11: ASDM Boot System
Change the ASDM boot system to latest ASDM image.

edledge-asa(config)# asdm image flash:asdm-openjre-7131-101.bin

Step12: Check and Save ASDM Boot File

<check asdm boot image>
edledge-asa# sh asdm image
Device Manager image file, disk0:/asdm-openjre-7131-101.bin


<save running configuration>
edledge-asa# wr
Building configuration...
Cryptochecksum: 845e144f e144f13e e144f44f e144f44f

3384 bytes copied in 0.160 secs
[OK]

Reload the ASA. After reloading the ASA will have a new ASA and ASDM image.

There are many types of IOS available on the Cisco Software Download Center and it creates confusion about which is the best. Refer to Cisco IOS or Firmware Release Types to understand the different types of IOS.

Source: Cisco, Knowledge Base, Internet

EA00042

Leave a Reply

Your email address will not be published.