Create the init-cfg.txt File
- Create a new text file.Use a text editor such as Notepad, EditPad, or other plain-text editors to create a text file.
- Add the basic network configuration for the management interface on the firewall.If any of the required parameters are missing in the file, the firewall exits the bootstrap process and boots up using the default IP address, 192.168.1.1. You can view the system log on the firewall to detect the reason for the bootstrap failure. For errors, see Licensing API.There are no spaces between the key and value in each field. Do not add spaces as they could cause failures during parsing on the mgmtsrvr side.
When you enable DHCP on the management interface, the firewall takes the DHCP assigned IP address and is accessible over the network. You can view the DHCP assigned IP address on the General Information widget on the Dashboard or with the CLI commandshow system info. However, the default static management IP address 192.168.1.1 is retained in the running configuration (show config running) on the firewall. This static IP address ensures that you can always restore connectivity to your firewall, in the event you lose DHCP access to the firewall.
- To configure the management interface with a static IP address, you must specify the IP address, type of address, default gateway, and netmask. An IPv4 address is required, IPv6 address is optional. For syntax, see Sample init-cfg.txt File.
- To configure the management interface as a DHCP client, you must specify only the type of address. If you enable the DHCP client on the management interface, the firewall ignores the IP address, default gateway, netmask, IPv6 address, and IPv6 default gateway values defined in the file. For syntax, see Sample init-cfg.txt File.
- Add the VM auth key to register a VM-Series firewall with Panorama.To add a VM-Series firewall on Panorama, you must add the VM auth key that you generated on Panorama to the basic configuration (init-cfg.txt) file. For details on generating a key, see Generate the VM Auth Key on Panorama.
- Add details for accessing Panorama.
- Add IP addresses for the primary and secondary Panorama servers.
- Specify the template and the device group to which you want to assign the firewall.
- (Recommended) Add the VM-Series registration pin and value for installing the device certificate.If you want to install the device certificate on the VM-Series firewall at launch, you must generate the VM-Series registration pin ID and value on the CSP and include it in theinit-cfg.txtfile. This pin and value also applies any site licenses that use the PAYG license.
- (Optional) Include additional parameters for the firewall.
- Add IP address for the primary and secondary DNS servers.
- Add the hostname for the firewall.
- Enable either jumbo frames or multiple-virtual systems (or both)
- Enable management interface swap (mgmt) and the dataplane interface (ethernet 1/1) for the VM-Series firewall on AWS or GCP. For more information on changing the management interface, see Management Interface Mapping for Use with Amazon ELB or Management Interface Swap for Google Cloud Platform Load Balancing.
- Enable or disable DPDK.
Recommended For You
Recommended videos not found.