Prepare a USB Flash Drive for Bootstrapping a Firewall

You can use a USB flash drive to bootstrap a physical firewall. However, to do so you must be running a PAN-OS 7.1.0 or later image and Reset the Firewall to Factory Default Settings. For security reasons, you can bootstrap a firewall only when it is in factory default state or has all private data deleted.
  1. Obtain serial numbers (S/Ns) and auth codes for support subscriptions from your order fulfillment email.
  2. Register S/Ns of new firewalls on the Customer Support portal.
    1. Go to support.paloaltonetworks.com, log in, and select
      Assets
      Devices
      Register New Device
      Register device using Serial Number or Authorization Code
      .
    2. Follow the steps to Register the Firewall.
    3. Click
      Submit
      .
  3. Activate authorization codes on the Customer Support portal, which creates license keys.
    1. Go to support.paloaltonetworks.com, log in, and select the
      Assets
      Devices
      on the left-hand navigation pane.
    2. For each device S/N you just registered, click the
      Action
      link (the pencil icon).
    3. Under Activate Licenses, select
      Activate Auth-Code
      .
    4. Enter the
      Authorization code
      and click
      Agree
      and
      Submit
      .
  4. Add the S/Ns in Panorama.
    Complete Step 1 in Add a Firewall as a Managed Device in the Panorama Administrator’s Guide.
  5. Create the init-cfg.txt file.
    Create the init-cfg.txt file, a mandatory file that provides bootstrap parameters. The fields are described in Sample init-cfg.txt Files.
    If the init-cfg.txt file is missing, the bootstrap process will fail and the firewall will boot up with the default configuration in the normal boot-up sequence.
    There are no spaces between the key and value in each field; do not add spaces because they cause failures during parsing on the management server side.
    You can have multiple init-cfg.txt files—one each for different remote sites—by prepending the S/N to the file name. For example:
    0008C200105-init-cfg.txt
    0008C200107-init-cfg.txt
    If no prepended filename is present, the firewall uses the init-cfg.txt file and proceeds with bootstrapping.
  6. (
    Optional
    ) Create the bootstrap.xml file.
    The optional bootstrap.xml file is a complete firewall configuration that you can export from an existing production firewall.
    1. Select
      Device
      Setup
      Operations
      Export named configuration snapshot
      .
    2. Select the
      Name
      of the saved or the running configuration.
    3. Click
      OK
      .
    4. Rename the file as
      bootstrap.xml
      .
  7. Create and download the bootstrap bundle from the Customer Support portal.
    For a physical firewall, the bootstrap bundle requires only the /license and /config directories.
    Use one of the following methods to create and download the bootstrap bundle:
    • Use
      Method 1
      to create a bootstrap bundle specific to a remote site (you have only one init-cfg.txt file).
    • Use
      Method 2
      to create one bootstrap bundle for multiple sites.
    Method 1
    1. On your local system, go to support.paloaltonetworks.com and log in.
    2. Select
      Assets
      .
    3. Select the S/N of the firewall you want to bootstrap.
    4. Select
      Bootstrap Container
      .
    5. Click
      Select
      .
    6. Upload and
      Open
      the init-cfg.txt file you created.
    7. (
      Optional
      ) Select the bootstrap.xml file you created and
      Upload Files
      .
      You must use a bootstrap.xml file from a firewall of the same model and PAN-OS version.
    8. Select
      Bootstrap Container Download
      to download a tar.gz file named
      bootstrap_<S/N>_<date>.tar.gz
      to your local system. This bootstrap container includes the license keys associated with the S/N of the firewall.
    Method 2
    Create a tar.gz file on your local system with two top-level directories: /license and /config. Include all licenses and all init-cfg.txt files with S/Ns prepended to the filenames.
    The license key files you download from the Customer Support portal have the S/N in the license file name. PAN-OS checks the S/N in the file name against the firewall S/N while executing the bootstrap process.
  8. Import the tar.gz file you created (to a firewall running a PAN-OS 7.1.0 or later image) using Secure Copy (SCP) or TFTP.
    Access the CLI and enter one of the following commands:
    • tftp import bootstrap-bundle file <path and filename> from <host IP address>
      For example:
      tftp import bootstrap-bundle file /home/userx/bootstrap/devices/pa5000.tar.gz from 10.1.2.3
    • scp import bootstrap-bundle from <<user>@<host>:<path to file>>
      For example:
      scp import bootstrap-bundle from userx@10.1.2.3:/home/userx/bootstrap/devices/pa200_bootstrap_bundle.tar.gz
  9. Prepare the USB flash drive.
    1. Insert the USB flash drive into the firewall that you used in the prior step.
    2. Enter the following CLI operational command, using your tar.gz filename in place of “
      pa5000.tar.gz
      ”. This command formats the USB flash drive, unzips the file, and validates the USB flash drive:
      request system bootstrap-usb prepare from pa5000.tar.gz
    3. Press
      y
      to continue. The following message displays when the USB drive is ready:
      USB prepare completed successfully.
    4. Remove the USB flash drive from the firewall.
    5. You can prepare as many USB flash drives as needed.
  10. Deliver the USB flash drive to your remote site.
    If you used Method 2 to create the bootstrap bundle, you can use the same USB flash drive content for bootstrapping firewalls at multiple remote sites. You can translate the content into multiple USB flash drives or a single USB flash drive used multiple times.

Related Documentation