Deploy Configuration Changes
Caution | Do NOT push the management center deployments over a VPN tunnel that is terminating directly on the threat defense. Pushing the management center deployments can potentially inactivate the tunnel and disconnect the management center and the threat defense. Recovering the device from this situation can be very disruptive and require executing the disaster recovery procedure. This procedure resets the threat defense configuration to factory defaults by changing manager from management center to local and configuring the device from beginning. For more information, see Deploying the Management Center Policy Configuration over VPN Tunnel. |
After you change configurations, deploy them to the affected devices. We strongly recommend that you deploy in a maintenance window or at a time when any interruptions to traffic flow and inspection will have the least impact.
Caution | When you deploy, resource demands may result in a small number of packets dropping without inspection. Additionally, deploying some configurations restarts the Snort process, which interrupts traffic inspection. Whether traffic drops during this interruption or passes without further inspection depends on how the target device handles traffic. See Snort® Restart Traffic Behavior and Configurations that Restart the Snort Process When Deployed or Activated.
|
Before you begin
-
Review the guidelines described in Best Practices for Deploying Configuration Changes.
-
Be sure all managed devices use the same revision of the Security Zones object. If you have edited security zone objects: Do not deploy configuration changes to any device until you edit the zone setting for interfaces on all devices you want to sync. You must deploy to all managed devices at the same time. See Synchronizing Security Zone Object Revisions.
Note | Policy deployment process fails if the sensor configuration is being read by the system during deployment. Executing commands such as show running-config from the sensor CLI disturbs the deployment, which results in deployment failure. |
Procedure
Step 1 | On the management center menu bar, click Deploy and then select Deployment. The GUI page lists the devices with out-of-date configurations having the pending status.
| ||
Step 2 | Identify and choose the devices on which you want to deploy configuration changes.
| ||
Step 3 | (Optional) Click Estimate to get a rough estimate of the deployment duration. For more details, see Deployment Estimate. | ||
Step 4 | Click Deploy. | ||
Step 5 | If the system identifies errors or warnings in the changes to be deployed, it displays them in the Validation Messages window. To view complete details, click the arrow icon before the warnings or errors. You have the following choices:
|
What to do next
-
(Optional) Monitor deployment status; see Viewing Deployment Messages.
-
If deploy fails, see Best Practices for Deploying Configuration Changes.
-
During deployment, if there is a deployment failure due to any reason, there is a possibility that the failure may impact traffic. However, it depends on certain conditions. If there are specific configuration changes in the deployment, the deployment failure may lead to traffic being interrupted. See the following table to know what configuration changes may cause traffic interruption when deployment fails.
Configuration Changes
Exists?
Traffic Impacted?
Threat Defense Service changes in an access control policy
Yes
Yes
VRF
Yes
Yes
Interface
Yes
Yes
QoS
Yes
Yes
NoteThe configuration changes interrupting traffic during deployment is valid only if both the management center and threat defense are of version 6.2.3 or higher.