Erasing Configuration And Rebooting; Upgrading Firmware - McAfee SG310 Administration Manual

Utm firewall
Table of Contents

Advertisement

System menu features
Advanced menu
Halting the appliance before powering down
Use this procedure to halt the appliance before you power down. This ensures all configuration is saved. If
external devices are connected to the appliance, such as USB drives, there may be cached data stored on
the appliance. To avoid loss of data, halt the appliance to force an orderly shutdown. Allow the SG300
about two to three seconds to perform a halt; allow other models 20-30 seconds before powering down
after a halt.
From the System menu, click Advanced. The Reboot page appears.
1
To halt the appliance, click Halt. The H/B (HeartBeat) LED and all other LEDs except for Power turn off.
2
You can now safely power down the appliance.

Erasing configuration and rebooting

To clear the UTM Firewall device's stored configuration information and revert the device to the default
factory settings, push the erase button on the back panel of the UTM Firewall device twice, 1 second
apart but within 3 seconds. Pressing the button too quickly will not erase the device.
Tip:
Either use a secondhand on a watch or count "one thousand one, one thousand two, one thousand three",
while pressing the erase button on counts one and three.
The erase button is particularly useful should the device become uncontactable; for example, due to
misconfiguration. Pushing the erase button twice as instructed clears all stored configuration information,
reverts all settings to the factory defaults, and reboots the UTM Firewall device. When the UTM Firewall
device reboots, it has an IP address of 192.168.0.1; netmask 255.255.255.0. The device also accepts an
assigned IP address if there is a DHCP server on the LAN/A port. You can contact the device on either the
default or the DHCP-assigned address.
For additional recovery options, see

Upgrading firmware

Periodically, McAfee releases new versions of firmware for your UTM Firewall appliance. If a new version
fixes an issue you have been experiencing, or contains a new feature you want to use, go to the download
page on the product registration Web site to obtain the latest firmware. You can then load the new
firmware with a flash upgrade.
Caution:
Before attempting a firmware upgrade, read
There are two primary methods available for performing a flash upgrade, Netflash and Flash upgrade via
HTTP. Remote upgrades can also be performed using TFTP if you have a TFTP server at the remote site.
During the upgrade, the front panel LEDs on the UTM Firewall appliance flash in an in-and-out pattern. The
appliance retains its configuration information with the new firmware.
Caution:
If the flash upgrade is interrupted (such as powered down), the UTM Firewall appliance stops functioning
and becomes unusable until a recovery boot is performed. User care is advised. For instructions on performing a
recovery boot,
Recovering from a failed
Upgrading flash firmware via HTTP
Use this procedure to perform a flash upgrade of firmware via HTTP. The UTM Firewall Firmware Upgrades
page is available from
http://www.securecomputing.com/index.cfm?skey=1597.
Note:
This feature is only available on firmware versions 2.1.4 or higher. If you have a lower firmware version,
you must use the Netflash executable to perform a flash upgrade. Be sure to read the release notes and
important migration notes posted on the firmware download page. If you do not upgrade your firmware to 2.1.4
or higher, you must use the Netflash executable to perform a flash upgrade. See
Netflash.
Prerequisites:
• Download the binary image file (.sgu).
• Backup your current configuration if you have not already done so. See
remotely.
McAfee UTM Firewall 4.0.4 Administration Guide
Recovering from a failed
Firmware upgrade best practices and
upgrade.
upgrade.
Upgrading firmware using
Backing up a configuration
precautions.
365

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Sg560Sg560uSg565Sg580

Table of Contents