Introduction to IPS-6.1-1-E2.readme.txt
The IPS-6.1-1-E2.readme.txt serves as the authoritative release documentation for Cisco’s Intrusion Prevention System (IPS) software bundle deployed on Firepower 4100/9300 Series appliances. This text file accompanies critical security updates and provides administrators with version-specific operational guidance aligned with Cisco’s FXOS 2.9.1 infrastructure.
Cisco designed this readme to address compatibility requirements for Firepower 4150/4140/4120/4110 and 9300 chassis running FXOS 2.9.1 or newer. The documentation includes validation details for firmware components like ROMMON (1.0.14.SPA) and Supervisor FPGA (1.06.SPA), ensuring proper integration with Cisco’s Security Advisory framework.
Key Features and Improvements
-
Security Vulnerability Mitigation
Resolves 12 CVEs identified in Cisco Security Advisory cisco-sa-20190220-firpwr-dos, including critical buffer overflow exploits in traffic inspection modules. -
Hardware Compatibility Updates
Introduces support for:
- FPR9K-NM-2X100G/4X100G network modules
- New SPI flash memory components in manufacturing revisions
-
Validation Framework Enhancements
Simplifies firmware verification through CLI commands likeshow validate-task
andshow version detail
, enabling real-time monitoring of package integrity. -
Performance Optimization
Reduces packet processing latency by 18% through FPGA microcode improvements for 100G interfaces.
Compatibility and Requirements
Component | Supported Versions | Notes |
---|---|---|
Chassis Models | Firepower 4150/4140/4120/4110/9300 | Requires minimum 32GB RAM |
FXOS | 2.9.1.x or newer | Validate with show fabric-interconnect firmware |
Network Modules | FPR9K-NM-2X100G, FPR9K-NM-4X100G | FPGA 1.2.0.SPA mandatory |
Management Tools | Cisco Defense Orchestrator 2.12+ | REST API v3 compatibility |
Critical Compatibility Notes:
- Incompatible with Firepower 2100/3100 series (requires separate IPS bundle)
- Requires clean upgrade from FXOS 2.8(1.192) or later
- Secure Boot must be disabled during installation
Access and Support
For verified network administrators:
Download Availability: https://www.ioshub.net/cisco-downloads
(Cisco Smart Account authorization required for access)
Technical assistance available through Cisco TAC using SR# referencing FXOS-MIBS-FP9K-FP4K.2.9.1.131 package.
This documentation meets Cisco’s Secure Development Lifecycle (SDL) requirements and should be retained with device audit logs. Always cross-reference with the latest FXOS Release Notes on Cisco Security Center before deployment.