Set up the storage location and firmware repository
You can use NCM to upgrade the firmware on many devices at one time. Because security fixes are distributed as new firmware revisions, upgrading firmware helps network administrators correct security vulnerabilities.
To ensure device security and compliance, use vulnerability reporting to identify NCM nodes at risk. Next, upgrade the firmware of those devices to address vulnerabilities.
Before you perform a firmware upgrade operation, you must complete the initial setup. First, you designate a storage location that will contain the firmware images. This feeds the firmware repository in NCM, from which you select images for devices when upgrading.
NCM currently supports only
.bin files for firmware upgrades.
Integrity of firmware images
You can use the MD5 Hash column in the firmware repository to verify the integrity of your images. This value is calculated automatically when you add an image to the storage location. Compare the image hashes between the firmware repository and the website of the manufacturer of your device.
By default, NCM verifies the integrity of backed up and uploaded firmware images. You can toggle these settings under Upgrade Options in the Firmware Upgrade Operation wizard.