This is an old revision of the document!
tar xvf PNET_4.2.10.ovaqcow: qemu-img convert -O qcow2 PNET_4.2.10-disk1.vmdk PNET_4.2.10-disk1.qcow2scp i86bi_linux-adventerprisek9-ms.156-3.M3a.bin root@192.168.122.56:/opt/unetlab/addons/iol/bin/ scp L2-ADVENTERPRISEK9-M-15.2-IRON-20151103.bin root@192.168.122.56:/opt/unetlab/addons/iol/bin/ ssh root@192.168.122.56 # password pnet ! in pnetlab /opt/unetlab/wrappers/unl_wrapper -a fixpermissions python2 /opt/unetlab/addons/iol/bin/CiscoIOUKeygen.py cd /opt/unetlab/addons/iol/bin touch NETMAP LD_LIBRARY_PATH=/opt/unetlab/addons/iol/lib /opt/unetlab/addons/iol/bin/<iosname.bin> 1 # do it with each IOL image before testing them in UI
mkdir /opt/unetlab/addons/qemu/fortinet-FGT-v6-4-build1579 scp ./fortinet-FGT-v6-4-build1579/virtioa.qcow2 root@192.168.122.56:/opt/unetlab/addons/qemu/fortinet-FGT-v6-4-build1579/ /opt/unetlab/wrappers/unl_wrapper -a fixpermissions ! go to UI and start the FW ! Now go the FGT cli: admin no password, then password admin too config system interface edit port1 set imode static set ip 192.168.1.2/24 end