EasyManuals Logo
Home>Cisco>Firewall>Firepower 1010

Cisco Firepower 1010 User Manual

Cisco Firepower 1010
190 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #88 background imageLoading...
Page #88 background image
To check the DDNS operation:
show ddns update interface fmc_access_ifc_name
> show ddns update interface outside
Dynamic DNS Update on outside:
Update Method Name Update Destination
RBD_DDNS not available
Last Update attempted on 04:11:58.083 UTC Thu Jun 11 2020
Status : Success
FQDN : domain.example.org
IP addresses : 209.165.200.225
Check Management Center log files
See https://cisco.com/go/fmc-reg-error.
Roll Back the Configuration if the Management Center Loses Connectivity
If you use a data interface on the threat defense for the management center, and you deploy a configuration
change from the management center that affects the network connectivity, you can roll back the configuration
on the threat defense to the last-deployed configuration so you can restore management connectivity. You
can then adjust the configuration settings in the management center so that the network connectivity is
maintained, and re-deploy. You can use the rollback feature even if you do not lose connectivity; it is not
limited to this troubleshooting situation.
See the following guidelines:
Only the previous deployment is available locally on the threat defense; you cannot roll back to any
earlier deployments.
Rollback is not supported for High Availability or Clustering deployments.
The rollback only affects configurations that you can set in the management center. For example, the
rollback does not affect any local configuration related to the dedicated Management interface, which
you can only configure at the threat defense CLI. Note that if you changed data interface settings after
the last management center deployment using the configure network management-data-interface
command, and then you use the rollback command, those settings will not be preserved; they will roll
back to the last-deployed management center settings.
UCAPL/CC mode cannot be rolled back.
Out-of-band SCEP certificate data that was updated during the previous deployment cannot be rolled
back.
During the rollback, connections will drop because the current configuration will be cleared.
Before you begin
Model Support—Threat Defense
Cisco Firepower 1010 Getting Started Guide
86
Threat Defense Deployment with a Remote Management Center
Roll Back the Configuration if the Management Center Loses Connectivity

Table of Contents

Other manuals for Cisco Firepower 1010

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Cisco Firepower 1010 and is the answer not in the manual?

Cisco Firepower 1010 Specifications

General IconGeneral
BrandCisco
ModelFirepower 1010
CategoryFirewall
LanguageEnglish

Related product manuals