Troubleshooting > Restoring firmware (“clean install”)

Restoring firmware (“clean install”)

Restoring (also called re-imaging) the firmware can be useful if:

Unlike updating firmware, restoring firmware re-images the boot device, including the signatures that were current at the time that the firmware image file was created. Also, restoring firmware can only be done during a boot interrupt, before network connectivity is available, and therefore requires a local console connection to the CLI. It cannot be done through an SSH or Telnet connection.

Alternatively, if you cannot physically access the appliance’s local console connection, connect the appliance’s local console port to a terminal server to which you have network access. Once you have used a client to connect to the terminal server over the network, you will be able to use the appliance’s local console through it. However, be aware that from a remote location, you may not be able to power cycle the appliance if abnormalities occur.
To restore the firmware
Back up your configuration before beginning this procedure, if possible. Restoring firmware resets the configuration, including the IP addresses of network interfaces. For information on backups, see Backups. For information on reconnecting to a FortiWeb appliance whose network interface configuration was reset, see Connecting to the web UI or CLI.

1.  Download the firmware file from the Fortinet Technical Support web site:

https://support.fortinet.com/

2.  Connect your management computer to the FortiWeb console port using a RJ-45-to-DB-9 serial cable or a null-modem cable.

3.  Initiate a local console connection from your management computer to the CLI of the FortiWeb appliance, and log in as the admin administrator, or an administrator account whose access profile contains Read and Write permissions in the Maintenance category.

For details, see Connecting to the web UI or CLI.

4.  Connect port1 of the FortiWeb appliance directly or to the same subnet as a TFTP server.

5.  Copy the new firmware image file to the root directory of the TFTP server.

6.  If necessary, start your TFTP server. (If you do not have one, you can temporarily install and run one such as tftpd (Windows, Mac OS X, or Linux) on your management computer.)

Because TFTP is not secure, and because it does not support authentication and could allow anyone to have read and write access, you should only run it on trusted administrator-only networks, never on computers directly connected to the Internet. If possible, immediately turn off tftpd off when you are done.

7.  Verify that the TFTP server is currently running, and that the FortiWeb appliance can reach the TFTP server.

To use the FortiWeb CLI to verify connectivity, enter the following command:

execute ping 192.168.1.168

where 192.168.1.168 is the IP address of the TFTP server.

8.  Enter the following command to restart the FortiWeb appliance:

execute reboot

9.  As the FortiWeb appliances starts, a series of system startup messages appear.

Press any key to display configuration menu........

10.  Immediately press a key to interrupt the system startup.

You have only 3 seconds to press a key. If you do not press a key soon enough, the FortiWeb appliance reboots and you must log in and repeat the execute reboot command.

If you successfully interrupt the startup process, the following messages appears:

[G]: Get firmware image from TFTP server.
[F]: Format boot device.
[B]: Boot with backup firmware and set as default.
[Q]: Quit menu and continue to boot with default firmware.
[H]: Display this list of options.

Enter G,F,B,Q,or H:

Please connect TFTP server to Ethernet port "1".

11.  If the firmware version requires that you first format the boot device before installing firmware, type F. Format the boot disk before continuing.

12.  Type G to get the firmware image from the TFTP server.

The following message appears:

Enter TFTP server address [192.168.1.168]:

13.  Type the IP address of the TFTP server and press Enter.

The following message appears:

Enter local address [192.168.1.188]:

14.  Type a temporary IP address that can be used by the FortiWeb appliance to connect to the TFTP server.

The following message appears:

Enter firmware image file name [image.out]:

15.  Type the file name of the firmware image and press Enter.

The FortiWeb appliance downloads the firmware image file from the TFTP server and displays a message similar to the following:

MAC:00219B8F0D94

###########################

Total 28385179 bytes data downloaded.

Verifying the integrity of the firmware image..

Save as Default firmware/Backup firmware/Run image without saving:[D/B/R]?

If the download fails after the integrity check with the error message:

invalid compressed format (err=1)

but the firmware matches the integrity checksum on the Fortinet Technical Support web site, try a different TFTP server.

16.  Type D.

The FortiWeb appliance downloads the firmware image file from the TFTP server. The FortiWeb appliance installs the firmware and restarts. The time required varies by the size of the file and the speed of your network connection.

The FortiWeb appliance reverts the configuration to default values for that version of the firmware.

17.  To verify that the firmware was successfully installed, log in to the CLI and type:

get system status

The firmware version number is displayed.

18.  Either reconfigure the FortiWeb appliance or restore the configuration file. For details, see How to set up your FortiWeb and Restoring a previous configuration.

If you are downgrading the firmware to a previous version, and the settings are not fully backwards compatible, the FortiWeb appliance may either remove incompatible settings, or use the feature’s default values for that version of the firmware. You may need to reconfigure some settings.

19.  Update the attack definitions.

Installing firmware replaces the current attack definitions with those included with the firmware release that you are installing. After you install the new firmware, make sure that your attack definitions are up-to-date. For more information, see Uploading signature & geography-to-IP updates.