Installation via USB

To be able to install Threat Defender, you need a USB flash drive with the installation image (see Installation Preparation.

If you install the software on a headless device using a serial console, there may be issues when using special characters. Try to avoid this by using an EN keyboard layout.

To make sure that Threat Defender will be able to get software and license updates, you will be asked to enter a reachable network gateway and DNS server for the management interface.
You can also do this via the user interface when the installation is complete, see Changing the Management Interface.

Depending on your hardware equipment, autonegotiation for the network ports may have to be disabled (best case: device AND switch). Otherwise, Threat Defender may configure the management interface before the network card has a proper IP state for the dedicated management LAN port, for example. Threat Defender may then start without having an IP address.

1. Setup

To install Threat Defender, proceed as follows:

  1. Insert the USB flash drive with the installation image into your appliance.

  2. Make sure that your appliance boots from USB.
    In BIOS, select the USB flash drive as Boot Option.

    Boot screen

  3. Reboot your appliance.
    The device boots from the USB flash drive and starts the installation. An installation wizard guides you through the installation process.

  4. Select Yes to confirm that the installer may delete your hard disk.

    Confirm deletion

  5. Select the time zone as required. Press OK to confirm the setting.

    Select time zone

    You can also change the time zone via the GUI when the installation is complete (see Changing Hostname and Time Settings.

  6. The installer prompts you to change the system date and time. If the settings are correct, select No and proceed with checking the usable network cards.

    Change system time

    Otherwise, select Yes to change the date using the date picker:

    Set date

    Confirm your settings with OK.

    Enter the time in the HH:MM:SS format:

    Set time

    Confirm your settings with OK.

  7. The system checks the link status of the usable network cards. Select Skip if you wish to omit this step.

  8. Select the interface you want to use for out-of-band management (i.e. the management interface).

    Select interface

    The installer automatically detects usable network interfaces. If an interface is connected to a switch, the connection speed is indicated after the MAC address of that interface.

    Optional:

    • To verify a selected interface, select Identify. This will cause the LEDs of the selected interface to flash.
    • Select Rename if you wish to assign more convenient names to the interface(s), e.g. management for your management interface.
  9. Enter the hostname of the device.

    Do not use fully qualified domain names such as td.mydomain.org as hostnames. Instead, use td in this case.

    Set hostname

    Confirm your settings with OK.

  10. Enter the IP address of the management interface in CIDR format.

    For example, 10.10.10.100/24 is equivalent to IP 10.10.10.100 with netmask 255.255.255.0

    Set IP of the management interface

    Confirm your settings with OK.

  11. If you want to receive software and signature updates via the Internet, enter your gateway and DNS server.

    • Enter the IP address of your gateway, if applicable. Confirm your settings with OK.

      Set gateway

    • Enter the IP address of a reachable DNS server. Confirm your settings with OK.

      Set DNS server

    To be able to get firmware and license updates, Threat Defender has to be able to reach our servers via the Internet. If you do not want to connect Threat Defender to the Internet, you need to update it manually (see Updates).
    If Threat Defender is not updated for 180 days, it will no longer allow traffic to pass.

  12. The last screen displays a summary of the settings and prompts you to confirm that they are correct.

    Configuration summary

  13. Confirm them with Yes to proceed with the installation.

    The installer creates a new file system. This will take a few minutes.

    When the installation is complete, the appliance shuts down.

    Some appliances do not shut down automatically, but halt instead.

  14. If it did not shut down automatically, turn your appliance off.

  15. Remove the USB flash drive.

  16. Restart the appliance.

2. Result

When the appliance is restarted, you see a summary of your settings.

Installation complete

The installation of Threat Defender is now complete.

To proceed with its configuration, open the specified URL in your browser. We recommend using Chrome.


Additional References:

results matching ""

    No results matching ""