1. Trang chủ
  2. » Công Nghệ Thông Tin

Tài liệu Qui trình nâng cấp ios asa pdf

3 352 1
Tài liệu đã được kiểm tra trùng lặp

Đang tải... (xem toàn văn)

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Tiêu đề Tài liệu qui trình nâng cấp iOS ASA PDF
Thể loại Hướng dẫn
Năm xuất bản 2004
Định dạng
Số trang 3
Dung lượng 30 KB

Các công cụ chuyển đổi và chỉnh sửa cho tài liệu này

Nội dung

When a new image or file is downloaded, it is stored in flash with a specific filename.. You can use the following command to check the available free space in the flash memory: Firewall

Trang 1

Dưới đây là một qui trình nâng cấp, qui trình này chưa có phần cập nhật activation-key

Upgrading an Image from an Administrative Session

1 Make sure an image server is available

The server should have the firewall image available for downloading, either by TFTP, FTP, HTTP, or HTTPS

2 Make sure you have sufficient space on the flash file system

An ASA allows one or more image files as well as other files to be stored in flash, as long

as you have sufficient space to contain them all When a new image or file is

downloaded, it is stored in flash with a specific filename A file is overwritten only if an existing file in flash has an identical filename You can use the following command to check the available (free) space in the flash memory:

Firewall# dir flash:/

For example, suppose a new firewall image is available on a server The image file size is 4,995,512 bytes First, the amount of free flash memory is checked, giving the following output:

Firewall# dir flash:/

Directory of flash:/

6 -rw- 4976640 10:04:50 Nov 12 2004 image.bin

10 -rw- 1575 23:05:09 Sep 30 2004 old_running.cfg

12 -rw- 3134 23:30:24 Nov 08 2004 admin.cfg

13 -rw- 1401 14:12:31 Oct 20 2004 CustomerA.cfg

14 -rw- 2515 23:29:28 Nov 08 2004 border.cfg

17 -rw- 1961 13 22 Oct 25 2004 datacenter.cfg

23 -rw- 8596996 10:12:38 Nov 12 2004 asdm.bin

21 drw- 704 15:06:09 Nov 22 2004 syslog

32 -rw- 205 15:06:08 Nov 22 2004 stuff

16128000 bytes total (2466816 bytes free)

Firewall#

Clearly, 2,466,816 bytes free is insufficient to store the new image unless the existing image (image.bin) is overwritten On an FWSM or a PIX 6.3 platform, only one

operating system image and one PDM image can be stored in the flash file system at any time If a new image is downloaded, it automatically overwrites an existing image in flash

3 Make sure the firewall can reach the server:

Trang 2

Firewall# ping [interface] ip-address

The server has IP address ip-address The firewall should already have the necessary routing information to reach the server You can specify the firewall interface where the server is located ("outside," for example) if the firewall cannot determine that directly For example, this firewall can reach the server at 192.168.254.2:

Firewall# ping 192.168.254.2

Type escape sequence to abort.

Sending 5, 100-byte ICMP Echos to 192.168.254.2, timeout is

2 seconds:

!!!!!

Success rate is 100 percent (5/5), round-trip min/avg/max = 1/1/1 ms

Firewall#

4 (TFTP only) Identify a possible TFTP server:

Firewall(config)# tftp-server interface ip-address path

The TFTP server can be found at ip-address on the firewall interface named interface (outside), for example As of FWSM 3.1(1) and ASA 7.0(1), the interface parameter is required For prior releases, the firewall always assumes the inside interface is used for TFTP The only way to override this assumption is by specifying a firewall interface in the tftp-server command This interface is always used whenever files are copied to and from a

TFTP server, even if the server address is different from the one configured with this command

The image files are stored in the path directory on the TFTP server This path is relative only to the TFTP process itself For example, if the image files are stored in the topmost TFTP directory (/tftpboot within the server's file system, for example), the path would

be /, or theroot of the TFTP directory tree

The tftp-server command is optional because most of the TFTP parameters can be given with the copy EXEC command when the image is downloaded

5 Copy the image file from the server

With any download method, the basic command syntax is:

Firewall# copy source flash:[image | pdm | filename]

The image is downloaded and copied into flash memory as either an operating system

Trang 3

image or a pdm image Only one of either image type can be stored in the firewall flash, and their locations are automatically determined In fact, PIX 6.3 restricts the image transfer to these two file types

ASA and FWSM platforms make use of their more flexible flash file systems From the system execution space, you can copy one or more image files into flash and then specify which image the firewall should use You can give the destination filename as an

arbitrary filename You also can use the image or asdm keywords for backward

compatibility In that case, the firewall uses the image filename configured with the boot system or asdm image commands, respectively Also, you can choose TFTP, FTP, or HTTP as the copy method, as discussed in the following steps

Use a TFTP server:

Firewall# copy tftp:[:[[//location][/pathname]] flash:

[image | pdm |

filename]

The image file is located on the TFTP server at location, which can be either a hostname (already defined with a name command) or an IP address The image file is referenced by pathname, which can include any directory structure needed within TFTP, along with the filename (If the actual path name of the TFTP directory contains spaces, you should first define the whole path name using the tftp-server command Spaces are not allowed in the pathname here.) If the location or pathname parameters are left out of this command, the firewall prompts you for those values If you add a colon after the tftp keyword, the firewall picks up the remaining parameters configured with the tftp-server command For example, suppose a new operating system image named newimage.bin is located on TFTP server 192.168.254.2 Recall that the firewall assumes that the TFTP server is located on the inside interface by default In this case, it is located on the outside

interface You can download the new firewall image into flash memory using the

following commands:

Firewall# configure terminal

Firewall(config)# tftp-server outside 192.168.254.2 /

Firewall(config)# exit

Firewall# copy tftp://192.168.254.2/newimage.bin

flash:image

Address or name of remote host [192.168.254.2]?

Source filename [newimage.bin]?

Destination filename [image.bin]?

%Warning:There is a file already existing with this name

Do you want to over write? [confirm]

Accessing tftp://192.168.254.2/newimage.bin !!!!!!!!!!!!! [output omitted]

Writing file flash:/image.bin

!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!1

4976640 bytes copied in 143.380 secs (34801 bytes/sec)

Firewall#

Ngày đăng: 25/01/2014, 19:20

TỪ KHÓA LIÊN QUAN

🧩 Sản phẩm bạn có thể quan tâm

w