Firmware Upgrade per CLI

Falls aus irgendwelchen Gründen kein Update per Web zur Verfügung steht, kann mann immer noch per CLI Update.

Hier für muss mittels eines Null-Modem-Kabel eine Verbindung zum ZD hergestellt werden. Hier nun ein Beispiel:

Welcome to the Ruckus Wireless ZoneDirector 1200 Command Line Interface
ruckus> en
ruckus# debug
You have all rights in this mode.
ruckus(debug)# fw_upgrade tftp://192.168.1.210/zd1200_10.2.0.0.189.img
------------------------------------------------------------------------
 ** Starting CLI Upgrade  **
------------------------------------------------------------------------
        Protocol  : tftp
        Server IP : 192.168.1.210
        Image Name: zd1200_10.2.0.0.189.img
------------------------------------------------------------------------
 ** Checking if memory is sufficient **
------------------------------------------------------------------------
.
----->Sufficient memory to perform upgrade
------------------------------------------------------------------------
 ** Downloading ZD image **
------------------------------------------------------------------------
.....................................................................
----->Downloading image succeed
------------------------------------------------------------------------
 ** Verifying the image **
------------------------------------------------------------------------
................................................................verify-upgrade returns->[OK::]
----->Verifying image done
----->Are you sure you want to upgrade the entire wireless network?
      [y|n] enter>--------------------------------------------------------------                                                                                                                                                           
 ** Upgrading the system **
------------------------------------------------------------------------
        ZoneDirector is being upgraded, DO NOT disconnect ZoneDirector
        from the power source or the wired network. Wait a few minutes
        after the automatic system restart.
..................


Bei den Access Point's muss SSH aktiv sein um eine Firmware-Upgrade durchzuführen, zudem muss auch Kontroll-Datei für den entsprechenden AP erstellt sein.

Please login: admin
password : 
Copyright(C) 2016 Ruckus Wireless, Inc. All Rights Reserved.

** Ruckus R500 Multimedia Hotzone Wireless AP: 441504706343

rkscli: fw set host 172.16.10.5
OK
rkscli: fw set prot tftp
OK
rkscli: fw set control R500_cntrl.rcks
OK
rkscli: fw update

fw: Updating rcks_wlan.bkup ...
v54_fw_update: download 172.16.10.5 section=rcks_fw.main image=Image2 ctl_file=R500_cntrl.rcks (/writable/fw/main.cntl)
flash id is 0x10220
imghdr.{hdr_len=160, bin_len=9975644}
fw_flash_read_open: open((null),) failed
rks_flash_read_open(2) failed
tail_offset 9973600 bin_len 9975644 sign 1.
fwcheck is 2.
net_get_flash, Upgrading from Fully Signed Image(FSI) to Intermediate Signed Image(ISI) image.
Firmware size mentioned in control file(9975804)
_erase_flash: offset=0x0 count=39
Erase Total 39 Units
Performing Flash Erase of length 262144 at offset 0x980000 done
[===================================================================================================>] 99 
+ read_size 8192; rc=6140
net_get_flash: Receive last block buf 6140
net_get_flash: hdr_fsize=9973760, real_fsize=9969664 net_buf 0x7fec5f04 
[====================================================================================================] 100 

Reading Image TAIL:-
TLV No-1.TLV INFO 
  Number of TLVS in Tail is 2.
  Size of Tail is 2044.
len 9 tail_len = 9
2. SIGNATURE OBTAINED SUCCESSFULLY
len 259 tail_len = 268
	cert len 1773 pass
3. CERTICATE OBTAINED SUCCESSFULLY
len 1776 tail_len = 2044
1444: rc1 2044 tail_len 2044


MD5 Checksum successful!!!!!!!!! 

Checking Image hash:-
1. Obtaining public key from Certificate.
	Executing openssl x509 -in /tmp/in_cert.pem -pubkey -noout >/tmp/pubkey.pem
	line: Certificate will not expire
  Certificate validity verified.
	line: /tmp/in_cert.pem: OK
2. Public key verified.
3. Decrypting the Image signature.
	Executing openssl rsautl -verify -pubin -inkey /tmp/pubkey.pem -in /tmp/signsure.bin -out /tmp/ext_sha256.
4. Comparing the signatures:-
  IMAGE TAIL SHA256 :
	1d11b182fba8ce5521508fe770497afb7fbdae8e3117c1f2d1fd5842fbb12bdc
  CALC SHA256 :
	1d11b182fba8ce5521508fe770497afb7fbdae8e3117c1f2d1fd5842fbb12bdc
	HASH CHECK PASSED.

AIS cleanup : Removing /tmp/ext_sha256...
AIS cleanup : Removing /tmp/in_cert.pem...
AIS cleanup : Removing /tmp/signsure.bin...
AIS cleanup : Removing /tmp/pubkey.pem...
AIS cleanup : Completed
bdSave: sizeof(bd)=0x7c, sizeof(rbd)=0xd0
  caching flash data from /dev/mtd3 [ 0x00000000 - 0x00010000 ]
  updating flash data [0x00008000 - 0x000080d0] from [0x7fecc748 - 0x7fecc818]
_erase_flash: offset=0x0 count=1
Erase Total 1 Units
Performing Flash Erase of length 262144 at offset 0x0 done
  caching flash data from /dev/mtd3 [ 0x00000000 - 0x00010000 ]
  verifying flash data [0x00008000 - 0x000080d0] from [0x7fecc748 - 0x7fecc818]
**fw(11795) : Completed

rkscli: reboot
OK
rkscli: exit
Quit:
OK
Diese Website verwendet Cookies. Durch die Nutzung der Website stimmen Sie dem Speichern von Cookies auf Ihrem Computer zu. Außerdem bestätigen Sie, dass Sie unsere Datenschutzbestimmungen gelesen und verstanden haben. Wenn Sie nicht einverstanden sind, verlassen Sie die Website.Weitere Information
  • ruckus/cli_update.txt
  • Zuletzt geändert: vor 19 Monaten