Step 3 | At the console port, log in to FXOS as admin, and reformat the system.
connect local-mgmt
format everything
firepower-2110# connect local-mgmt firepower-2110(local-mgmt)# format everything All configuration and bootable images will be lost. Do you still want to format? (yes/no):yes
Enter yes, and the Firepower 2100 reboots.
|
Step 4 | Press Esc during the bootup when prompted to reach the ROMMON prompt. Pay close attention to the monitor. Example: ******************************************************************************* Cisco System ROMMON, Version 1.0.03, RELEASE SOFTWARE Copyright (c) 1994-2017 by Cisco Systems, Inc. Compiled Thu 04/06/2017 12:16:16.21 by builder ******************************************************************************* Current image running: Boot ROM0 Last reset cause: ResetRequest DIMM_1/1 : Present DIMM_2/1 : Present Platform FPR-2130 with 32768 MBytes of main memory BIOS has been successfully locked !! MAC Address: 0c:75:bd:08:c9:80 Use BREAK or ESC to interrupt boot. Use SPACE to begin boot immediately.
Press Esc at this point. If you miss the interrupt prompt, the Firepower 2100 attempts to reboot 3 times; because there is no image on the device, only ROMMON is available.
|
Step 5 | Set the network settings for Management 1/1, and load FXOS (part of the Firepower Threat Defense package) using the following ROMMON commands.
address management_ip_address
server tftp_ip_address
gateway gateway_ip_address
filepath/filename
set
sync
tftp -b
The FXOS image downloads and boots up to the CLI.
See the following information:
Example: rommon 1> address 10.86.118.4 rommon 2> server 10.86.118.21 rommon 3> gateway 10.86.118.21 rommon 4> file cisco-ftd-fp2k.6.2.2.SPA rommon 5> set ROMMON Variable Settings: ADDRESS=10.86.118.4 NETMASK=255.255.255.0 GATEWAY=10.86.118.21 SERVER=10.86.118.21 IMAGE=cisco-ftd-fp2k.6.2.2.SPA CONFIG= PS1="rommon ! > " rommon 6> sync rommon #9> tftp -b Enable boot bundle: tftp_reqsize = 268435456 ADDRESS: 10.86.118.4 NETMASK: 255.255.255.0 GATEWAY: 10.86.118.21 SERVER: 10.86.118.21 IMAGE: cisco-asa-fp2k.9.8.2.SPA MACADDR: d4:2c:44:0c:26:00 VERBOSITY: Progress RETRY: 40 PKTTIMEOUT: 7200 BLKSIZE: 1460 CHECKSUM: Yes PORT: GbE/1 PHYMODE: Auto Detect link up Receiving cisco-ftd-fp2k.6.2.2.SPA from 10.86.118.21!!!!!!!! […] |
Step 6 | Log in to FXOS using the default username: admin and password: Admin123.
After the device boots up into FXOS, the Management IP address that you set in ROMMON is erased and set to the default: 192.168.45.45. You will need to set the correct IP address and other related settings for your network in FXOS before you can download the Firepower Threat Defense package from the server.
|
Step 7 | Disable the DHCP server.
scope system
scope services
disable dhcp-server
commit-buffer
Before you can change the management IP address, you must disable the DHCP server.
Example: firepower-2110# scope system firepower-2110 /system # scope services firepower-2110 /system/services # disable dhcp-server firepower-2110 /system/services* # commit-buffer |
Step 8 | Configure an IPv4 management IP address, and optionally the gateway.
scope fabric-interconnect a
set out-of-band static ip ip_address netmask network_mask gw gateway_ip_address
commit-buffer
To keep the currently-set gateway (by default 0.0.0.0, which represents the Firepower Threat Defense data interfaces), omit the gwkeyword. If your download server is not on the local Management 1/1 network, then change the gateway IP address; the Firepower Threat Defense data interfaces do not exist yet, so you cannot reach any remote servers with the default setting.
Example: firepower-2110# scope fabric-interconnect a firepower-2110 /fabric-interconnect # firepower-2100 /fabric-interconnect # set out-of-band ip 10.86.118.4 netmask 255.255.255.0 Warning: When committed, this change may disconnect the current CLI session firepower-2100 /fabric-interconnect* # commit-buffer firepower-2100 /fabric-interconnect # |
Step 9 | Download and boot the Firepower Threat Defense package. |
Step 10 | Wait for the chassis to finish rebooting (5-10 minutes), and log in to FXOS using the default username: admin and password: Admin123.
Although FXOS is up, you still need to wait for the Firepower Threat Defense to come up (30 minutes). Wait until you see the following messages:
[…] User enable_1 logged in to firepower Logins over the last 1 days: 1. Failed logins since the last login: 0. Type help or '?' for a list of available commands. firepower> Aug 26 01:31:48 firepower port-manager: Alert: Ethernet1/2 link changed to DOWN Aug 26 01:31:48 firepower port-manager: Alert: Ethernet1/1 link changed to DOWN firepower#
After the rest of the Firepower Threat Defense startup messages show, you can return to the FXOS prompt.
|
Step 11 | Connect to the Firepower Threat Defense CLI.
connect ftd
|
Step 12 | You are prompted to accept the EULA; press Enter, and then the Space bar at the More prompt until you see:Please enter 'YES' or press <ENTER> to AGREE to the EULA: |
https://tr.linkedin.com/in/ali-ihsan-celebi-53093288
11 Ocak 2018 Perşembe
Firepower IOS Remove
Kaydol:
Kayıt Yorumları (Atom)
Hiç yorum yok:
Yorum Gönder