系统状态

修改 FortiGate 固件

 

 

您可以在进行这一操作之前先进行:

·使用命令 execute backup config 备份 FortiGate 设备的配置。

·使用命令 execute backup nidsuserdefsig 备份 NIDS 用户定义的特征。

·备份网页内容和电子邮件过滤列表,请见 FortiGate 内容保护指南。

如果您要恢复到一个旧版本的 FortiOS (例如,从 FortiOS v2.50 恢复到 v2.36),您可能无法恢复您的配置备份文件中保存的从前的配置。

注意:安装固件将使用您所安装的固件中包含的病毒防护定义和攻击定义替换您当前的病毒防护 定义和攻击定义。当您安装一个新的固件时,使用 第 99 页 手工更新病毒防护定义和攻击 定义中的步骤保病毒防护定义和攻击定义是最新的。您可以使用 CLI 命令 execute

updatecenter updatenow 更新病毒防护定义和攻击定义。

您必须有一个可以从 FortiGate 连接到的 TFTP 服务器才能按照下述步骤升级。 1 确保 TFTP 正在运行。

2 将您要恢复的固件映像文件拷贝到 TFPT 服务器的根目录下。

3 用 admin 帐号登录到 FortiGate。

4 确保 FortiGate 可以连接到 TFTP 服务器。

确认您可以从 FortiGate 连接到 TFTP 服务器上。具体方法是使用以下命令 ping 运行 TFPT 服务的电脑。例如,如果 TFTP 服务器的 IP 地址是 192.168.1.168:

execute ping 192.168.1.168

5 输入下述命令将固件映像文件从 TFPT 服务器拷贝到 FortiGate 上: execute restore image < 名称 _ 字符串 > <tftp_ip>

< 名称 _ 字符串 > 是 TFTP 服务器上的固件映像文件的文件名, <tftp_ip> 是 TFTP 服务器的 IP 地址。例如,如果固件映像文件的文件名是 FGT-60-v236-build068- FORTINET.out ,TFTP 服务器的 IP 地址为 192.168.1.168,输入:

execute restore image FGT_300-v250-build045-FORTINET.out 192.168.1.168

FortiGate 将上载升级文件。一旦文件上载完成,将显示如下信息:

Get image from tftp server OK.

This operation will downgarde the current firmware version!

Do you want to continue? (y/n)

6

输入 Y。

 

 

FortiGate 设备回复到旧版本的固件,将配置恢复到出厂默认设置,并重新启动。这一

 

过程将需要几分钟时间。

 

7

重新连接到 CLI。

 

 

关于在 FortiGate 设备的出厂默认状态下连接到 CLI 的详细信息,请见

第 19 页

 

连接到命令行接口 (CLI)

 

8

要确认回复的版本的固件已经加载了,输入:

 

 

get system status

 

9

要恢复到您从前的配置,使用如下命令:

 

 

execute restore config

 

FortiGate-500 安装和配置指南

79

Page 91
Image 91
Fortinet 500 manual FortiGate 将上载升级文件。一旦文件上载完成,将显示如下信息:, 19 页, 连接到命令行接口 Cli 。, 要确认回复的版本的固件已经加载了,输入:, 要恢复到您从前的配置,使用如下命令:

500 specifications

Fortinet 500 is a next-generation firewall (NGFW) that is part of Fortinet's acclaimed FortiGate family, designed to provide advanced security for medium to large enterprises. This appliance is known for its high performance, flexibility, and ability to protect networks from a variety of cyber threats through its robust features and technologies.

One of the main features of the Fortinet 500 is its integrated security capabilities. It combines multiple security functions into a single device, allowing organizations to manage everything from intrusion prevention and antivirus to web filtering and application control. This integration leads to simplified management and increased efficiency, as users can address multiple security needs without deploying multiple devices.

The Fortinet 500 runs on the FortiOS operating system, which is known for its simplicity and user-friendliness. FortiOS provides a centralized management interface that allows for the easy configuration and monitoring of security policies across the entire network. Additionally, the Fortinet management tools, such as FortiManager and FortiAnalyzer, enable detailed insights and reporting capabilities, helping organizations stay compliant with their security mandates.

Another characteristic that sets Fortinet 500 apart is its advanced threat intelligence, powered by the FortiGuard Labs. This global threat intelligence system continuously updates the firewall with the latest threat signatures and attack vectors, ensuring that organizations stay ahead of emerging threats. The firewall also employs machine learning and artificial intelligence to detect and mitigate sophisticated attacks in real-time.

Performance is crucial in any security appliance, and the Fortinet 500 does not disappoint. With hardware acceleration and purpose-built security processors, it delivers high throughput levels, enabling organizations to maintain productivity without sacrificing security. This level of performance is particularly beneficial in environments with heavy traffic and bandwidth demands.

In addition to these core features, the Fortinet 500 supports seamless integration with other security solutions within the Fortinet Security Fabric. This comprehensive approach allows for greater visibility and control over the entire security posture of an organization.

Overall, the Fortinet 500 is a powerful NGFW that offers a blend of advanced security features, ease of management, top-notch performance, and robust threat intelligence. Its ability to adapt to the ever-evolving landscape of cybersecurity makes it a valuable asset for businesses seeking to safeguard their digital assets and ensure seamless network operation.