cc/td/doc/product/webscale/css/css_sca
hometocprevnextglossaryfeedbacksearchhelp
PDF

Table of Contents

Cisco CSS 11000 SCA 3.1.0 Software Downgrade Release Note

Cisco CSS 11000 SCA 3.1.0 Software Downgrade Release Note

This document describes the procedure for downgrading from firmware version 3.1.0 to version 3.0.6 for Cisco 11000 Series Secure Content Accelerator. This document contains the following sections:

Firmware Image

The following file is used to downgrade the firmware image. This file, located in the /306/fw directory, is used only for the purpose stated previously. This file is referred to as the "firmware image" throughout the remainder of this document.

css-sca-2fe-k9.v3.1.0-to-3.0.6.phr

Maintaining Device Configuration

When the firmware is downgraded, some configuration is lost. You can save the configuration, edit the file, and reload it following the downgrade procedure. Be aware that configurations for features not supported in 3.0.6 firmware cannot be used after the device has been downgraded. Additionally, keys might need to be loaded and any remote management shared-secret must be set before the saved configuration can be reloaded. Instructions are presented within each management session-specific section in this document. After the configuration file has been exported, use the steps presented immediately below to alter information that might cause device conflicts. Comment out a line by inserting "# " (POUND SIGN and SPACE) at the beginning of it.


Note   By commenting out lines instead of deleting them, you might be able to reuse the configuration file with another firmware version at a later date.

    1. Open the saved configuration file using any text editor.

    2. Find the ### Password ### section. Comment out these lines if found:

    sntp-server <IP address> no sntp-server

    3. Find the ### Telnet ### section. Comment out this line if found:

    telnet port <portID>

    4. Find the ### Web Management ### section. Comment out this line if found:

    web-mgmt port <portID>

    5. Find the ### SNMP Subsystem ### section. Comment out these lines if found:

    snmp trap-type enterprise ssl-cert-expire snmp trap-type enterprise ssl-cert-invalid snmp trap-type enterprise ssl-certify-fail snmp trap-type enterprise ssl-neg-failure

    6. Find the ### SSL Subsystem ### section. Comment out the lines pertaining to any backend-server name and configuration and reverse-proxy-server name and configuration. For servers, comment out these lines if found:

    session-cache size <cacheSize> session-cache timeout <timeoutSecs> session-cache enable no clientauth enable clientauth enable certgroup clientauth clientauth verifydepth <depth> clientauth error cert-other-error fail clientauth error cert-other-error failhtml clientauth error cert-other-error ignore clientauth error cert-other-error redirect <URL> clientauth error cert-not-provided fail clientauth error cert-not-provided failhtml clientauth error cert-not-provided ignore clientauth error cert-not-provided redirect <URL> clientauth error cert-has-expired fail clientauth error cert-has-expired failhtml clientauth error cert-has-expired ignore clientauth error cert-has-expired redirect <URL> clientauth error cert-not-yet-valid fail clientauth error cert-not-yet-valid failhtml clientauth error cert-not-yet-valid ignore clientauth error cert-not-yet-valid redirect <URL> clientauth error cert-has-invalid-ca fail clientauth error cert-has-invalid-ca failhtml clientauth error cert-has-invalid-ca ignore clientauth error cert-has-invalid-ca redirect <URL> clientauth error cert-has-signature-failure fail clientauth error cert-has-signature-failure failhtml clientauth error cert-has-signature-failure ignore clientauth error cert-has-signature-failure redirect <URL> clientauth error cert-revoked fail clientauth error cert-revoked failhtml clientauth error cert-revoked ignore clientauth error cert-revoked redirect <URL> no httpheader client-cert httpheader client-cert no httpheader server-cert httpheader server-cert no httpheader session httpheader session no httpheader pre-filter httpheader pre-filter httpheader prefix <"prefix"> ephrsa redirect
In the same subsystem section, change any "localport" text to "sslport". The actual port numbers are uploaded accurately.

Replace any certgroup CAdefault reference with a reference to another certificate group.

    7. Replace any secpolicy noexport56 reference with a reference to another security policy.

    8. Continue with the configuration restoration procedures within the session-specific section.

Serial Console CLI Instructions

We recommend using the serial console for downgrading the Secure Content Accelerator. Follow these instructions for downgrading using a serial management session.

    1. Copy the firmware image to an HTTP, FTP, or TFTP server on the same LAN as the Secure Content Accelerator. An FTP URL is preferable. An HTTP URL can only be used with a server that accepts PUT commands.

    2. Connect to the Secure Content Accelerator via a serial management session at 9,600 baud.

    3. If desired, save the running configuration for reloading following the downgrade using the copy running-configuration command. Enter the URL, including the protocol, for the configuration file when prompted. An FTP URL is preferable. An HTTP URL can only be used with a server that accept posts (PUT).

    4. Check the existing firmware version using the show device command. The returned text should contain "MaxOS 3.1.0".

    5. Enter these commands to load the firmware image, where protocol is HTTP, FTP, or TFTP; serverip is the IP address of the server; and path is the path to the firmware image file.

    enable copy to flash protocol://serverip/path/css-sca-2fe-k9.v3.1.0-to-3.0.6.phr reload

    6. Wait for several minutes for the device to reload and reboot.

    7. Change the terminal baud to 115,200, and reconnect to the Secure Content Accelerator.

    8. Check the firmware version by using the show device command. The returned text should contain "MaxOS 3.0.6".

    9. If you wish to reload the saved configuration, follow these steps:

    10. Continue with configuration as desired.

Telnet CLI Instructions

Follow these instructions for downgrading using a telnet management session.

    1. Copy the firmware image to an HTTP, FTP, or TFTP server on the same LAN as the Secure Content Accelerator.

    2. Connect to the Secure Content Accelerator using the IP address previously assigned to it.

    3. If desired, save the running configuration for reloading following the downgrade using the copy running-configuration command. Enter the URL, including the protocol, for the configuration file when prompted. An FTP URL is preferable. An HTTP URL can only be used with a server that accept posts (PUT).

    4. Check the existing firmware version using the show device command. The returned text should contain "MaxOS 3.1.0".

    5. Enter these commands to load the firmware image, where prot is HTTP, FTP, or TFTP; serverip is the IP address of the server; and path is the path to the firmware image file.

    enable copy to flash prot://serverip/path/css-sca-2fe-k9.v3.1.0-to-3.0.6.phr reload

    6. You will see a status message stating the connection to the device was lost. Wait for several minutes for the device to reload and reboot. The telnet connection to the device is lost.

    7. Connect to the device via a serial management session at 115,200 baud.

    8. Enter Privileged and Configuration modes, and assign an IP address to the device with these commands:

    enable configure ip address <IPaddress>

    9. Continue configuration using a serial management session, or reconnect to the device using telnet and the IP address assigned to it.

    10. Check the firmware version by using the show device command. The returned text should contain "MaxOS 3.0.6'.

    11. If you wish to reload the saved configuration, follow these steps:

    12. Continue with configuration using a serial management session or reconnect to the device using telnet.

Remote CLI Instructions

Follow these instructions for downgrading using a remote CLI management session.

    1. Copy the firmware image to the computer from which you configure the Secure Content Accelerator.

    2. Open the existing configuration manager application (cscacfg) using the desktop shortcut or the Start button (Windows) or entering cscacfg at a Unix or Linux prompt.

    3. Display all Secure Content Accelerators found by the configuration manager by entering the show device list command. If the device is not listed, use the discover command.

    4. The following commands assume only one device has been discovered by the configuration manager. If more than one Secure Content Accelerator is listed, use the on form of the command to specify the desired device.

Use these commands to attach to and enter Privileged mode:

    attach enable

    5. If only one Secure Content Accelerator is listed, use the show device command. If more than one device is listed, use the command on devname show device, where devname is the name of the device. The returned text should contain "MaxOS 3.1.0".

    6. If desired, save the running configuration for reloading following the downgrade using the write file command. Enter the path and file name for the configuration file when prompted.

    7. Enter these commands to load the firmware image, where path is the path to the firmware image file.

    copy to flash path/css-sca-2fe-k9.v3.1.0-to-3.0.6.phr reload

    8. Quit the configuration manager. If you wish to continue with configuration via the remote configuration manager, you must remove the 3.1 version and install the 3.0.6 version as described in "Remote Configuration Manager Replacement" below. Make sure you downgrade all 3.1.0 devices before removing the 3.1 version of the configuration manager.

    9. To continue configuring the device with the 3.0.6 remote configuration manager, open the application (cscacfg) using the desktop short cut or the Start button (Windows) or entering cscacfg at a Unix or Linux prompt.

    10. Display all Secure Content Accelerators found by the configuration manager by entering the show device list command. If the device is not listed, use the discover command.

    11. Attach to the device and check the firmware version using the show device command. The returned text should contain "MaxOS version 3.0.6".

    12. If you wish to reload the saved configuration, follow these steps:

      write flash reload
    Wait for several minutes for the device to reload and reboot. After the Secure Content Accelerator has been rebooted, management port assignments changed by the configuration file become active. The connection to the device is lost. Enter exit to close the configuration manager.

Remote Configuration Manager Replacement


Note   Make sure you downgrade all 3.1.0 devices before removing the 3.1.0 version of the remote configuration manager.

Linux

Use these instructions for installing the 3.0.6 remote configuration manager in Linux. Installing the 3.0.6 remote configuration manager will replace the 3.1.0 installation. If the 3.1.0 distribution CD is not in the CD drive, insert it now. Alternatively, use the appropriate path and file names if the 3.0.6 distribution directory has been downloaded onto the local file system. Enter the following commands at a Linux prompt:

mount -o map=off /mnt/cdrom cd /mnt/cdrom/306/Linux/i386 ./install_cscacfg

Solaris

Use these instructions for removing the 3.1.0 remote configuration manager and installing the 3.0.6 remote configuration manager in Solaris. If the 3.1.0 distribution CD is not in the CD drive, insert it now. Alternatively, use the appropriate path and file names if the 3.0.6 distribution directory has been downloaded onto the local file system.

    1. Remove the previous installation with pkgrm.

    2. Enter this command:

    pkgadd -d /cdrom/cdrom0/306/Solaris/Sparc

    3. When the package is presented for installation, press Enter to install it.

    4. Type q after installation to exit.

Windows NT and Windows 2000

Use these instructions for removing the 3.1.0 remote configuration manager and installing the 3.0.6 remote configuration manager in Windows NT or Windows 2000.

    1. Remove the 3.1.0 Configuration manager using Add/Remove Programs in the Control Panel.When the Install Shield Wizard opens, select the Remove option button and click Next. Follow the screen prompts as they are displayed.

    2. If the 3.1.0 distribution CD is not in the CD drive, insert it now. Alternatively, use the appropriate icon, path, and file names if the 3.0.6 distribution directory has been downloaded onto the local file system.

    3. Double-click the CD icon.

    4. Double-click the 306 icon.

    5. Double-click the MSWin icon.

    6. Double-click the WinNT icon (Windows NT) or Win2K icon. (Windows 2000).

    7. Double-click the setup.exe application icon.

    8. Follow the displayed Install Shield instructions.

GUI Instructions

Follow these instructions for downgrading using a GUI management session.

    1. Open a Web browser and connect to the Secure Content Accelerator.

    2. Ensure that the General>Status page is displayed.

    3. The Release panel should contain "3.1.0.N", where N is any number.

    4. If desired, save the running configuration for reloading following the downgrade using this procedure:

    5. Click Tools to activate the Tools tabs.

    6. Click the Firmware tab.

    7. Type the path and firmware image file name or URL in the Upload Firmware text box, or click Browse and navigate to and select the firmware image file from the local file system.

    8. Click Upload to load the firmware image into the GUI.

    9. Click Install Image next to the file information in the Installable Firmware Images panel.

    10. After the new firmware has uploaded, click the Restart tab.

    11. Click Reboot to reload the device. Wait several minutes for the device to reboot.

    12. Connect to the device via a serial management session at 115,200 baud.

    13. Enter Privileged and Configuration modes, and assign an IP address to the device with these commands:

    enable configure ip address <IPaddress>

    14. Continue configuration using a serial management session, or reconnect to the device using the GUI and the IP address assigned to it.

    15. Click General to activate the General tabs.

    16. The Release panel should contain "3.0.6".

    17. If you wish to reload the saved configuration, follow these steps:

    18. Continue with configuration as desired.

CCIP, the Cisco Powered Network mark, the Cisco Systems Verified logo, Cisco Unity, Fast Step, Follow Me Browsing, FormShare, Internet Quotient, iQ Breakthrough, iQ Expertise, iQ FastTrack, the iQ Logo, iQ Net Readiness Scorecard, Networking Academy, ScriptShare, SMARTnet, TransPath, and Voice LAN are trademarks of Cisco Systems, Inc.; Changing the Way We Work, Live, Play, and Learn, Discover All That's Possible, The Fastest Way to Increase Your Internet Quotient, and iQuick Study are service marks of Cisco Systems, Inc.; and Aironet, ASIST, BPX, Catalyst, CCDA, CCDP, CCIE, CCNA, CCNP, Cisco, the Cisco Certified Internetwork Expert logo, Cisco IOS, the Cisco IOS logo, Cisco Press, Cisco Systems, Cisco Systems Capital, the Cisco Systems logo, Empowering the Internet Generation, Enterprise/Solver, EtherChannel, EtherSwitch, GigaStack, IOS, IP/TV, LightStream, MGX, MICA, the Networkers logo, Network Registrar, Packet, PIX, Post-Routing, Pre-Routing, RateMUX, Registrar, SlideCast, StrataView Plus, Stratm, SwitchProbe, TeleRouter, and VCO are registered trademarks of Cisco Systems, Inc. and/or its affiliates in the U.S. and certain other countries.

All other trademarks mentioned in this document or Web site are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (0201R)

Copyright © 2002, Cisco Systems, Inc.
All rights reserved.


hometocprevnextglossaryfeedbacksearchhelp
Posted: Mon Aug 19 22:10:51 PDT 2002
All contents are Copyright © 1992--2002 Cisco Systems, Inc. All rights reserved.
Important Notices and Privacy Statement.