![Cisco Firepower 1010 Getting Started Manual Download Page 88](http://html.mh-extra.com/html/cisco/firepower-1010/firepower-1010_getting-started-manual_64691088.webp)
To check the DDNS operation:
show ddns update interface fmc_access_ifc_name
> show ddns update interface outside
Dynamic DNS Update on outside:
Update Method Name Update Destination
RBD_DDNS not available
Last Update attempted on 04:11:58.083 UTC Thu Jun 11 2020
Status : Success
FQDN : domain.example.org
IP addresses : 209.165.200.225
Check Management Center log files
See
https://cisco.com/go/fmc-reg-error
Roll Back the Configuration if the Management Center Loses Connectivity
If you use a data interface on the threat defense for the management center, and you deploy a configuration
change from the management center that affects the network connectivity, you can roll back the configuration
on the threat defense to the last-deployed configuration so you can restore management connectivity. You
can then adjust the configuration settings in the management center so that the network connectivity is
maintained, and re-deploy. You can use the rollback feature even if you do not lose connectivity; it is not
limited to this troubleshooting situation.
See the following guidelines:
• Only the previous deployment is available locally on the threat defense; you cannot roll back to any
earlier deployments.
• Rollback is not supported for High Availability or Clustering deployments.
• The rollback only affects configurations that you can set in the management center. For example, the
rollback does not affect any local configuration related to the dedicated Management interface, which
you can only configure at the threat defense CLI. Note that if you changed data interface settings after
the last management center deployment using the
configure network management-data-interface
command, and then you use the rollback command, those settings will not be preserved; they will roll
back to the last-deployed management center settings.
• UCAPL/CC mode cannot be rolled back.
• Out-of-band SCEP certificate data that was updated during the previous deployment cannot be rolled
back.
• During the rollback, connections will drop because the current configuration will be cleared.
Before you begin
Model Support—Threat Defense
Cisco Firepower 1010 Getting Started Guide
86
Threat Defense Deployment with a Remote Management Center
Roll Back the Configuration if the Management Center Loses Connectivity
Summary of Contents for Firepower 1010
Page 2: ......
Page 168: ...Cisco Firepower 1010 Getting Started Guide 166 Threat Defense Deployment with CDO What s Next ...
Page 189: ... 2022 Cisco Systems Inc All rights reserved ...
Page 190: ......