User guide

CHAPTER 10: Firebox Read-Only System Area
120 WatchGuard Firebox System 6.0
Booting from the system area
From Control Center:
1 Select Tools => Advanced => Flash Disk Management.
The Flash Disk Management Tool dialog box appears.
2 Select Boot From the System Area. Click Continue.
The read-only system area Setup dialog box appears.
3 Enter the IP address you want to temporarily assign to the Firebox
Trusted interface. Click OK.
The Firebox uses this address for only a brief period of time until the Firebox
reboots. However, the address
must
be available on the same IP subnet as the
Management Station. The COM Port Setup dialog box appears.
4 Select the COM port you want to open.
5 Turn the Firebox off and then on.
Check the Firebox front panel indicator lights. The SysB light should be
illuminated indicating that the Firebox is running from its read-only system area
configuration. An Operation Complete dialog box appears.
6 Click OK.
Working with a Firebox booted from the read-only system
area
After you successfully boot the Firebox from the read-only system area,
you can copy a new configuration file to the primary area of the Firebox
flash disk and reset Firebox passphrases. The read-only system area
configuration file enables you to communicate only with the Firebox
Trusted interface; while booted from the read-only system area, the
Firebox will not pass traffic or perform other normal operations.
N
OTE
Do not attempt to use the read-only system area configuration file as a
base or template for your working configuration. It will not work. You
must create a new configuration file using the QuickSetup Wizard or open
an existing configuration file.
1 Verify that you can communicate with the Firebox.
The Firebox read-only system area configuration image allows the Firebox to
respond to network pings. Ping the temporary address assigned to the Trusted
interface. If the Firebox does not respond to the ping command, you may have a
connectivity problem.