Fortinet 50A/50B Testing a new firmware image before installing it, To test a new firmware image

Page 75

 

 

FortiGate Firmware

Testing a new firmware image before installing it

config system auto-install

set default-config-file <filename>

set auto-install-config <enable/disable> set default-image-file <filename>

set auto-install-image <enable/disable> end

Additional CLI commands for the FortiUSB key

Use the following CLI commands when you want to delete a file from the FortiUSB key, list what files are on the key, including formatting the key or renaming a file:

exec usb-disk list

exec usb-disk delete <filename>

exec usb-disk format

exec usb-disk rename <old_filename1> <old_filename2>

Note: If you are trying to delete a configuration file from the CLI, and the filename contains spaces, you will need quotations around the filename before you can delete the file from the FortiUSB key.

Testing a new firmware image before installing it

You can test a new firmware image by installing the firmware image from a system reboot and saving it to system memory. After completing this procedure, the FortiGate unit operates using the new firmware image with the current configuration. This new firmware image is not permanently installed. The next time the FortiGate unit restarts, it operates with the originally installed firmware image using the current configuration. If the new firmware image operates successfully, you can install it permanently using the procedure “Upgrading to a new firmware version” on page 65.

Use this procedure to test a new firmware image before installing it. To use this procedure, you must connect to the CLI using the FortiGate console port and a RJ-45 to DB-9 or null-modem cable. This procedure temporarily installs a new firmware image using your current configuration.

For this procedure you:

Access the CLI by connecting to the FortiGate console port using a RJ-45 to DB-9 serial cable or null-modem cable.

Install a TFTP server that you can connect to from the FortiGate internal interface. The TFTP server should be on the same subnet as the internal interface.

To test a new firmware image

1Connect to the CLI using a RJ-45 to DB-9 serial cable or a null-modem cable and FortiGate console port.

2Make sure the TFTP server is running.

3Copy the new firmware image file to the root directory of the TFTP server.

FortiGate-50A/50B, FortiWiFi-50B and FortiGate-100 FortiOS 3.0 MR4 Install Guide

75

01-30004-0265-20070831

Image 75
Contents Install G U I D E Regulatory compliance TrademarksContents Configuring the FortiGate unit Factory defaultsConfiguring the modem interface Using a wireless networkFortiGate Firmware Index Reverting to a previous firmware versionFortiUSB key Introduction About the FortiGate unitFortiGate-50A Register your FortiGate unit FortiWiFi-50BFortiGate-50B FortiGate-100FortiMail FortiGuard Subscription ServicesFortinet Family Products FortiClientFortiBridge About this documentFortiAnalyzer FortiReporterTypographic conventions Document conventionsFortinet documentation Comments on Fortinet technical documentation Customer service and technical supportFortinet Tools and Documentation CD Fortinet Knowledge CenterCustomer service and technical support Package Contents Installing the FortiGate unitSpecifications Technical Specifications DimensionsWeight Power RequirementsFortiWiFi-50B package contents Back FortiGate-100 package contents FrontPowering on the FortiGate unit To power on the FortiGate unitMounting Power over Ethernet Connecting to the web-based manager Powering off the FortiGate unitConnecting to the FortiGate unit Command line interfaceTo connect to the web-based manager FortiGate loginStop bits Flow control Connecting to the CLITo connect to the CLI Bits per second 9600 Data bits ParityQuick configuration using default settings Quick installation using factory defaultsGo to System Network Options Quick installation using factory defaults Factory defaults Factory default NAT/Route mode network configuration Factory default Dhcp server configurationManagement IP Factory default Transparent mode network configurationFactory default firewall configuration Administrative accessFactory default protection profiles To reset the default settings Go to System Status Restoring the default settingsRestoring the default settings using the web-based manager Restoring the default settings using the CLIRestoring the default settings Configuring the FortiGate unit Planning the FortiGate configurationNAT/Route mode Internet Router NAT/Route mode with multiple external network connectionsTransparent mode Go to System Network Interface NAT/Route mode installationPreparing to configure the FortiGate unit in NAT/Route mode NAT/Route mode settingsDhcp or PPPoE configuration Using the web-based managerConfiguring basic settings Adding a default route To configure interfaces Go to System Network InterfaceTo add a default route Go to Router Static Verify the connection Verifying the web-based manager configurationUsing the command line interface Configuring the FortiGate unit to operate in NAT/Route modeTo set the external interface to use PPPoE, enter To configure DNS server settingsExample To set the external interface to use DHCP, enterTo add a default route Connecting the FortiGate unit to the networks Configuring the networksTo connect the FortiGate unit DNS Settings Transparent mode installationPreparing to configure Transparent mode Transparent mode settings Administrator PasswordTo verify the DNS server settings To change to Transparent mode using the CLIReconnecting to the web-based manager Connecting the FortiGate unit to your networkTo connect the FortiGate unit running in Transparent mode Set the date and time Next stepsUpdating antivirus and IPS signatures Updating the IPS signatures from the CLI Scheduling antivirus and IPS updatesTo update IPS signatures using the CLI To enable schedule updates from the CLIAdding an override server To add an override server using the CLINext steps Connecting a modem to the FortiGate-50A Configuring the modem interfaceSelecting a modem mode Redundant mode configurationStand alone mode configuration Mode must be standalone Interface name Configuring the modem for the FortiGate-50APhone-number CLI commands for the FortiGate-50ADead gateway detection Adding a Ping ServerAdding firewall policies for modem connections Setting up a wireless network Using a wireless networkRadio Frequency interface Positioning an Access PointUsing multiple APs to provide a constant strong signal Using multiple access pointsWireless Security Wireless Equivalent Privacy WEPWi-Fi Protected Access WPA Additional security measures FortiWiFi-50B operation modesService Set Identifier Access Point modeFortiWiFi in Access Point mode Client modeSetting up the FortiWiFi-50B as an Access Point Changing the operating modeSet the Dhcp settings Configure the firewall policies To set the data security Go to System Wireless SettingsSet the security options Upgrading to a new firmware version Upgrading the firmware using the web-based managerTo upgrade the firmware using the web-based manager FortiGate FirmwareTo upgrade the firmware using the CLI Upgrading the firmware using the CLIReverting to a previous firmware version For information, see the FortiGate Administration GuideTo revert to a previous firmware version using the CLI Reverting to a previous firmware version using the CLIExecute ping To install firmware from a system reboot Press Any Key To Download Boot Image Restoring the previous configuration Backup and Restore from the FortiUSB key To backup configuration using the CLIFortiUSB key Using the USB Auto-Install feature To restore configuration using the CLITo configure the USB Auto-Install using the CLI Testing a new firmware image before installing it Additional CLI commands for the FortiUSB keyTo test a new firmware image Testing a new firmware image before installing it Installing a backup firmware image Installing and using a backup firmware imagePress any key to enter configuration menu To install a backup firmware imageEnter File Name image.out Installing and using a backup firmware image CLI IndexWall mounting Web-based manager, connecting
Related manuals
Manual 272 pages 22.37 Kb