scp i86bi_linux-adventerprisek9-ms.156-3.M3a.bin root@192.168.122.56:/opt/unetlab/addons/iol/bin/
scp L2-ADVENTERPRISEK9-M-15.2-IRON-20151103.bin root@192.168.122.56:/opt/unetlab/addons/iol/bin/
ssh root@192.168.122.56 # password pnet
! in pnetlab
/opt/unetlab/wrappers/unl_wrapper -a fixpermissions
python2 /opt/unetlab/addons/iol/bin/CiscoIOUKeygen.py
cd /opt/unetlab/addons/iol/bin
touch NETMAP
LD_LIBRARY_PATH=/opt/unetlab/addons/iol/lib /opt/unetlab/addons/iol/bin/<iosname.bin> 1 # do it with each IOL image before testing them in UI
mkdir /opt/unetlab/addons/qemu/fortinet-FGT-v6-4-build1579
scp ./fortinet-FGT-v6-4-build1579/virtioa.qcow2 root@192.168.122.56:/opt/unetlab/addons/qemu/fortinet-FGT-v6-4-build1579/
/opt/unetlab/wrappers/unl_wrapper -a fixpermissions
! go to UI and start the FW
! Now go the FGT cli:
admin no password, then password admin too
config system interface
edit port1
set mode static
set ip 192.168.100.1/30
end