Fortinet FortiOS 3.0 Downgrading to FortiOS v2.80MR11 using the CLI, To downgrade using the CLI

Page 39

 

 

Reverting to FortiOS v2.80MR11

Downgrading to FortiOS v2.80MR11 using web-based manager

Downgrading to FortiOS v2.80MR11 using the CLI

Use the following procedure to downgrade to FortiOS v2.80MR11 in the CLI. If you have created additional settings in FortiOS 3.0, make sure you back up your configuration before downgrading. See “Backing up your FortiOS 3.0 configuration” on page 37 for more information.

To downgrade using the CLI

1Make sure the TFTP server is running.

2Copy the firmware image file to the root directory of the TFTP server.

3Log into the FortiGate CLI.

4Make sure the FortiGate unit can connect to the TFTP server.

You can use the following command to ping the computer running the TFTP server. For example, if the TFTP server’s IP address is 192.168.1.168:

execute ping 192.168.1.168

5Enter the following command to copy the firmware image from the TFTP server to the FortiGate unit:

execute restore image tftp <name_str> <tftp_ipv4>

Where <name_str> is the name of the firmware image file and <tftp_ipv4> is the IP address of the TFTP server. For example, if the firmware image file name is image.out and the IP address of the TFTP server er is 192.168.1.168, enter:

execute restore image tftp image.out 192.168.1.168

The FortiGate unit responds with the message:

This operation will replace the current firmware version! Do you want to continue? (y/n)

6Type y.

The FortiGate unit uploads the firmware image file. After the file uploads, a message similar to the following is displayed:

Get image from tftp server OK. Check image OK.

This operation will downgrade the current firmware version! Do you want to continue? (y/n)

7Type y.

The FortiGate unit reverts to the old firmware version, resets the configuration to factory defaults, and restarts. This process takes a few minutes.

After the FortiGate unit uploads the firmware, you will need to reconfigure your IP address since the FortiGate unit reverts to default settings, including its default IP address. See your install guide for configuring IP addresses.

8Reconnect to the CLI.

9To confirm the new firmware image has been loaded, enter: get system status

See “Restoring your configuration” on page 40 to restore you FortiOS v2.80MR11 configuration settings.

Update Guide for FortiOS v3.0

39

01-30000-0317-20060424

Image 39
Contents G R a D E G U I D E Regulatory compliance TrademarksContents AntiSpam formerly Spam Filter Backing up your configurationUpgrading to FortiOS Intrusion Protection formerly IPSIndex Reverting to FortiOS v2.80MR11Contents Upgrade Guide for FortiOS 01-30000-0317-20060424 Introduction About this documentDocument conventions Typographic conventions Fortinet documentationCustomer service and technical support Fortinet Knowledge CenterComments on Fortinet technical documentation Customer service and technical support FortiLog name change Upgrade NotesBacking up configuration files Setup Wizard01-30000-0317-20060424 Web-based manager changesChanges to the web-based manager Command Line Interface changesOther USB supportUpgrade Notes Other Other System New features and changesNetwork ConfigStatus SessionsMaintenance AdminShutdown is now located on System Status System Operation Virtual DomainRouter StaticDynamic Firewall Certificates IPSecWindows AD UserLocal RadiusQuarantine AntivirusIntrusion Protection formerly IPS File PatternWeb Filter Banned word Black/White list AntiSpam formerly Spam FilterIM/P2P new Banned wordBlack/White list User Log ConfigLog & Report StatisticsReport Log AccessIn-depth Snmp trap changes To upgrade the clusterSnmp MIBs and traps changes Upgrading the HA cluster for FortiOSOptions Backing up your configuration Backing up your configuration using the web-based managerUpgrading to FortiOS Backing up your configuration using the CLI Upgrading using the web-based managerUpgrading your FortiGate unit To upgrade to FortiOS 3.0 using the CLI Upgrading using the CLIVerifying the upgrade Backing up your FortiOS 3.0 configuration Reverting to FortiOS v2.80MR11Backing up to a FortiUSB key Verifying the downgrade Downgrading to FortiOS v2.80MR11 using web-based managerTo downgrade using the CLI Downgrading to FortiOS v2.80MR11 using the CLIRestoring your configuration Restoring your configuration settings using the CLITo restore configuration settings using the CLI Execute restore allconfig confall 192.168.1.168 ghrffdt123 Restoring your configuration Index 01-30000-0317-20060424

FortiOS 3.0 specifications

Fortinet FortiOS 3.0 is a robust network operating system designed to provide a comprehensive security solution for enterprise environments. Released as part of Fortinet's commitment to advancing cybersecurity, FortiOS 3.0 integrates several cutting-edge technologies and features to enhance network performance and protection against emerging threats.

One of the main features of FortiOS 3.0 is its advanced threat management capabilities. This includes intrusion prevention systems (IPS), application control, and web filtering, which work in tandem to identify and mitigate risks in real-time. The IPS component utilizes deep packet inspection to analyze traffic patterns and block malicious activity, ensuring that sensitive data remains secure.

Another key characteristic of FortiOS 3.0 is its unified threat management (UTM) approach. By consolidating multiple security functions into a single platform, organizations can simplify their infrastructure, reduce costs, and streamline administration. This consolidation is particularly beneficial for businesses looking to enhance their security posture without overwhelming their IT resources.

FortiOS 3.0 also incorporates advanced VPN capabilities, allowing remote access to secure corporate networks. With support for both IPsec and SSL VPN technologies, users can enjoy secure connections from virtually any location, which is essential in today's increasingly mobile work environment. This flexibility promotes productivity while maintaining stringent security standards.

Additionally, FortiOS 3.0 includes sophisticated logging and reporting features. These provide critical insights into network activity, helping organizations to analyze potential threats and compliance with industry regulations. Customizable alerts and reports empower IT teams to remain vigilant and responsive to any irregularities or breaches in security.

Moreover, FortiOS 3.0 leverages Fortinet's proprietary security processor technology, which accelerates threat processing and reduces latency. This hardware acceleration ensures that even in high-volume traffic situations, security measures do not compromise network speed.

In summary, Fortinet FortiOS 3.0 stands out due to its comprehensive security features, unified threat management capabilities, advanced VPN functionalities, and robust logging and reporting tools. These characteristics make it an ideal solution for organizations seeking to enhance their cybersecurity measures while maintaining operational efficiency. As cyber threats continue to evolve, FortiOS 3.0 equips enterprises with the tools necessary to safeguard their networks effectively.