Fortinet 60B manual Additional CLI Commands for a USB key, To restore configuration using the CLI

Page 55

 

 

 

FortiGate Firmware

Installing firmware from a system reboot using the CLI

To restore configuration using the CLI

1Log into the CLI.

2Enter the following command to restore the configuration files: exec restore image usb <filename>

The FortiGate unit responds with the following message:

This operation will replace the current firmware version!

Do you want to continue? (y/n)

3Type y.

Using the USB Auto-Install

The USB Auto-Install feature automatically updates the FortiGate configuration file and image file on a system reboot. Also, this feature provides you with an additional backup if you are unable to save your system settings before shutting down or rebooting your FortiGate unit.

Note: You need an unencrypted configuration file for this feature. Also the default files, image.out and system.conf, must be in the root directory of the USB key.

Note: Make sure at least FortiOS v3.0MR1 is installed on the FortiGate unit before installing.

To configure the USB Auto-Install using the CLI

1Log into the CLI.

2Enter the following command:

config system auto-install

set default-config-file <filename>

set auto-intall-config {enable disable} set default-image-file <filename>

set auto-install-image {enable disable}

end

3Enter the following command to see the new firmware installation settings: get system status

Additional CLI Commands for a USB key

Use the following CLI commands when you want to delete a file from the FortiUSB key, list what files are on the key, including formatting the key or renaming a file:

exec usb-disk list

exec usb-disk delete <filename>

exec usb-disk format

exec usb-disk rename <old_filename1> <old_filename2>

Note: If you are trying to delete a configuration file from the CLI command interface, and the filename contains spaces, you will need quotations around the filename before you can delete the file from the FortiUSB key.

FortiGate-60B FortiOS 3.0 MR6 Install Guide

 

01-30006-0446-20080910

55

Image 55
Contents Install G U I D E Regulatory compliance TrademarksContents Protection profiles Advanced configurationConfiguring the modem interface Configuring Transparent modeIndex FortiGate FirmwarePage Register your FortiGate unit IntroductionAbout this document About the FortiGate-60BDocument conventions Typographic conventions Further ReadingFortinet Knowledge Center Customer service and technical supportComments on Fortinet technical documentation Environmental specifications InstallingRack mount instructions GroundingMounting Connecting to the networkPlugging in the FortiGate Turning off the FortiGate unitTurning off the FortiGate unit NAT mode NAT vs. Transparent modeTo connect to the web-based manager Connecting to the FortiGate unitTransparent mode Connecting to the web-based managerTo connect to the CLI Connecting to the CLITo configure interfaces Go to System Network Interface Configuring NAT modeUsing the web-based manager Configure the interfacesAdding a default route and gateway Configure a DNS serverAdding firewall policies To modify the default gateway Go to Router StaticTo set an interface to use a static address Using the CLITo set an interface to use Dhcp addressing To set an interface to use PPPoE addressing To configure DNS server settingsTo modify the default gateway Configuring Transparent modeTo add an outgoing traffic firewall policy To switch to Transparent mode Go to System Status Switching to Transparent modeTo switch to Transparent mode To configure DNS server settings Backing up the configuration Verify the configurationSet the time and date Restoring a configurationAdditional configuration Set the Administrator passwordUpdating antivirus and IPS signatures Configure FortiGuardAdditional configuration Protection profiles Advanced configurationFirewall policies Firewall policiesAntivirus options Configuring firewall policiesAntiSpam options Web filtering Logging Redundant mode Selecting a modem modeStand alone mode Configuring modem settingsDial on demand To configure modem settings Go to System Network ModemSyntax Configuring the modem using the CLIKeywords and variables Description Default Mode redudant Phone-number ExampleDead gateway detection Adding a Ping ServerAdding firewall policies for modem connections Administrative access through the modem portConfiguring the Pcmcia modem card To configure the modem Go to System Network ModemAt+cpin=5555 Downloading firmware FortiGate FirmwareUpgrading the firmware Using the web-based managerReverting to a previous version Using the USB Auto-Install Backup and Restore from a USB keyTo revert to a previous firmware version To upgrade the firmware using the CLI Using the CLITo revert to a previous firmware version using the CLI Execute restore image namestr tftpip4Execute restore image namestr tftpipv4 Installing firmware from a system reboot using the CLIPress any key to display configuration menu To install firmware from a system rebootTo backup configuration using the CLI Restoring the previous configurationTo restore configuration using the CLI Additional CLI Commands for a USB keyTo configure the USB Auto-Install using the CLI To test the new firmware image Testing new firmware before installingTesting new firmware before installing Testing new firmware before installing Index System modem 43 system reboot, installing Page Page Page Page

60B specifications

The Fortinet FortiGate 60B is a compact, high-performance network security appliance designed for small to medium-sized businesses. As part of Fortinet's FortiGate series, the 60B integrates advanced security features and technologies, making it an ideal solution for organizations seeking to protect their networks from growing cyber threats.

One of the main features of the FortiGate 60B is its robust firewall capability. The device provides next-generation firewall (NGFW) functionalities, allowing businesses to monitor and control traffic at multiple layers. This includes application control, intrusion prevention, and web filtering, ensuring that only legitimate traffic is allowed access to critical resources. With a strong emphasis on threat detection, the 60B employs FortiGuard Labs' threat intelligence services to stay updated on the latest malware and attack vectors.

Another significant characteristic of the FortiGate 60B is its integrated virtual private network (VPN) capabilities. The device supports both site-to-site and remote access VPNs, enabling secure connections for remote employees and branch offices. This feature is essential for organizations that require secure communication over public networks, ensuring that sensitive data remains protected.

Performance is also a focal point of the FortiGate 60B. The appliance is equipped with dedicated hardware acceleration that optimizes throughput and minimizes latency. With impressive SSL inspection capabilities, it can handle encrypted traffic efficiently, making it well-suited for an increasingly secure internet landscape.

The FortiGate 60B also boasts extensive reporting and analytics features, enabling IT teams to gain valuable insights into network activity. This includes detailed logs and dashboards that help organizations identify potential security risks and respond to incidents in real time. In addition, the appliance is built with scalability in mind, allowing businesses to expand their security posture as they grow.

Furthermore, the FortiGate 60B is designed for ease of management. The unit can be configured and monitored through Fortinet's centralized management system, FortiManager, simplifying the administration of multiple devices across various locations.

In summary, the Fortinet FortiGate 60B is a powerful, versatile network security solution that combines advanced firewall capabilities, VPN support, and integrated threat intelligence. With its strong performance metrics and user-friendly management tools, it is an excellent choice for organizations aiming to bolster their cybersecurity defenses while maintaining operational efficiency.