Solved

Upgrading Watchguard Firebox from v6.2 to v7.0..... a few questions.

Posted on 2003-11-20
3
378 Views
Last Modified: 2013-11-16
I have the usual firebox setup; firebox that sends logs to workstation where all config files are stored as well.  
This is my first firebox upgrade.

Basically, do I need to create fresh config files or will the 7.0 software use the old configs and allow me to activate the new features?

Also, I can install the software and make sure I have the proper configs setup before I save to the firebox where they are implimented, correct?

Is there anything else I should know before I start?  
How long should this take if it uses my old configs?

0
Comment
Question by:JamesN1830
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
3 Comments
 
LVL 1

Accepted Solution

by:
diaxos earned 40 total points
ID: 9997275
James,

If you havent done this already.
Take a FBI backup (Flash Disk management and take a backup of the box)
Install the WG 7 software on your management PC, it will see the v6 install. Overwrite this. Open the policy in v7 and save to the firebox. I have done loads of times with no issues (apart from one with VPN manager)
If it should fail for some reason, you can always just factory reset the box. Reinstall v6 and load back the FBI image (takes about 5 mins) save and you are back
0
 
LVL 23

Expert Comment

by:Tim Holman
ID: 10976373
No comment has been added to this question in more than 21 days, so it is now classified as abandoned..
I will leave the following recommendation for this question in the Cleanup topic area:

--> Accept: diaxos

Any objections should be posted here in the next 4 days. After that time, the question will be closed.

tim_holman
EE Cleanup Volunteer
0

Featured Post

Threat Trends for MSPs to Watch

See the findings.
Despite its humble beginnings, phishing has come a long way since those first crudely constructed emails. Today, phishing sites can appear and disappear in the length of a coffee break, and it takes more than a little know-how to keep your clients secure.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Do you have a windows based Checkpoint SmartCenter for centralized Checkpoint management?  Have you ever backed up the firewall policy residing on the SmartCenter?  If you have then you know the hassles of connecting to the server, doing an upgrade_…
To setup a SonicWALL for policy based routing to be used with the Websense Content Gateway there are several steps that need to be completed. Below is a rough guide for accomplishing this. One thing of note is this guide is intended to assist in the…
NetCrunch network monitor is a highly extensive platform for network monitoring and alert generation. In this video you'll see a live demo of NetCrunch with most notable features explained in a walk-through manner. You'll also get to know the philos…
Michael from AdRem Software explains how to view the most utilized and worst performing nodes in your network, by accessing the Top Charts view in NetCrunch network monitor (https://www.adremsoft.com/). Top Charts is a view in which you can set seve…

728 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question