Updated October 29, 2020
In order to perform the upgrade, you will need the USB drive that was shipped to you, a USB keyboard, and a VGA monitor. The admin interface will need to be plugged into a network that has Internet access and DHCP. We recommend that the bridging interface be unplugged during the upgrade since we will need to perform several reboots.
Prepare for the upgrade
1. Connect to the admin interface of the existing ThreatBlockr over HTTPS. Go to System -> Import/Export and click Export System Configuration. This will save a backup copy of the config for safe keeping.
2. Check if your policies are being managed by GMC by going to Resource Groups. If you see a green check mark in the GMC column, your policies are managed by GMC and will be synchronized to the ThreatBlockr after the upgrade to the new software (and you can skip to the next step).
If any of the Policies are not being managed by GMC, you can export these to GMC. This will make sure all Policy settings are available on GMC and will be synchronized to the new ThreatBlockr. In the admin interface on the System -> Import/Export page you’ll see a green Export button, which will allow you to download a file to your local machine that you can upload in the GMC.
Once you have downloaded the Export file, log into the GMC and navigate to the System -> Import page. Click the Choose button to locate the file on your local machine and then click on the green Upload button.
After selecting the file to upload, you’ll want to select the Policies and Exception Lists shown to you and click the Import button (you may select multiple lists, or all lists, in one upload) to upload to GMC.
3. Connect the USB drive, keyboard, and monitor to the ThreatBlockr. Take the bridging interface out of line of the network if desired.
Install ThreatBlockr 2.0 Recovery Console
4. Reboot the ThreatBlockr by going to System -> Reboot
5. When prompted, press F11 to load the BIOS boot menu. (NOTE: screenshot and key may be different on different models.)
6. Select the USB drive. (NOTE: the drive probably will have a different name than the screenshot and may look different on different models.)
7. In the boot menu, select Bandura Installer and press Enter.
8. After the system has booted, press Enter and then select the model number being installed. Consult support if you aren't sure which model to select.
9. Select Install Recovery Console, then select Yes to reformat the drives.
10. After successfully installing the recovery console, select Reboot.
License and Install ThreatBlockr 2.0 software
11. While the device is rebooting, unplug the USB installer.
12. On the boot menu, select Recovery Console and press Enter.
13. After the Recovery Console has booted, log in with the username 'root' and password 'redrum'. Press Enter to continue.
14. In the menu, select Request License and enter the Registration Code (provided by support) and Serial Number (on the device or provided by support). Press enter to use the default support site URL.
15. Next, select Reinstall firmware:
16. After the software is installed, select Reboot.
17. The device will now reboot into the standard ThreatBlockr 2.0 software with a default admin interface IP of 192.168.1.1/24. You can now change the IP address of the device either through the WEB UI (https://192.168.1.1, username 'admin', password 'admin') or through the console. See instructions below for changing the admin interface IP through the console.
Changing the IP address through the console
18. Login with the username of 'admin' and password of 'bandura'.
19. Select Network Menu and then Change admin interface settings.
20. Enter the admin interface settings.
Registering your device with the GMC
21. Navigate to https://gmc.banduracyber.com/assets. If not signed in, sign in with your GMC username and password.
22. Click the green ‘+’ button in the top right to register your upgraded device.
23. In the modal, enter your asset information.
a. Asset Registration Code: <Registration code provided by Bandura Cyber>
b. Asset Name: name of your device (e.g. HQ ThreatBlockr)
c. Asset Location: where the device is located (e.g. HQ address)
24. Click Register to complete device registration.
25. At this point, the upgrade process should be complete. You can find the ThreatBlockr 2.0 manual on our help site. Follow the instructions in the manual to complete configuration of your newly updated device.