Firmware Upgrade per CLI
Falls aus irgendwelchen Gründen kein Update per Web zur Verfügung steht, kann mann immer noch per CLI Update.
Zonedirector
Hier für muss mittels eines Null-Modem-Kabel eine Verbindung zum ZD hergestellt werden. Hier nun ein Beispiel:
Welcome to the Ruckus Wireless ZoneDirector 1200 Command Line Interface
ruckus> en
ruckus# debug
You have all rights in this mode.
ruckus(debug)# fw_upgrade tftp://192.168.1.210/zd1200_10.2.0.0.189.img
------------------------------------------------------------------------
** Starting CLI Upgrade **
------------------------------------------------------------------------
Protocol : tftp
Server IP : 192.168.1.210
Image Name: zd1200_10.2.0.0.189.img
------------------------------------------------------------------------
** Checking if memory is sufficient **
------------------------------------------------------------------------
.
----->Sufficient memory to perform upgrade
------------------------------------------------------------------------
** Downloading ZD image **
------------------------------------------------------------------------
.....................................................................
----->Downloading image succeed
------------------------------------------------------------------------
** Verifying the image **
------------------------------------------------------------------------
................................................................verify-upgrade returns->[OK::]
----->Verifying image done
----->Are you sure you want to upgrade the entire wireless network?
[y|n] enter>--------------------------------------------------------------
** Upgrading the system **
------------------------------------------------------------------------
ZoneDirector is being upgraded, DO NOT disconnect ZoneDirector
from the power source or the wired network. Wait a few minutes
after the automatic system restart.
..................
Access Point
Bei den Access Point's muss SSH aktiv sein um eine Firmware-Upgrade durchzuführen, zudem muss auch Kontroll-Datei für den entsprechenden AP erstellt sein.
Please login: admin
password :
Copyright(C) 2016 Ruckus Wireless, Inc. All Rights Reserved.
** Ruckus R500 Multimedia Hotzone Wireless AP: 441504706343
rkscli: fw set host 172.16.10.5
OK
rkscli: fw set prot tftp
OK
rkscli: fw set control R500_cntrl.rcks
OK
rkscli: fw update
fw: Updating rcks_wlan.bkup ...
v54_fw_update: download 172.16.10.5 section=rcks_fw.main image=Image2 ctl_file=R500_cntrl.rcks (/writable/fw/main.cntl)
flash id is 0x10220
imghdr.{hdr_len=160, bin_len=9975644}
fw_flash_read_open: open((null),) failed
rks_flash_read_open(2) failed
tail_offset 9973600 bin_len 9975644 sign 1.
fwcheck is 2.
net_get_flash, Upgrading from Fully Signed Image(FSI) to Intermediate Signed Image(ISI) image.
Firmware size mentioned in control file(9975804)
_erase_flash: offset=0x0 count=39
Erase Total 39 Units
Performing Flash Erase of length 262144 at offset 0x980000 done
[===================================================================================================>] 99
+ read_size 8192; rc=6140
net_get_flash: Receive last block buf 6140
net_get_flash: hdr_fsize=9973760, real_fsize=9969664 net_buf 0x7fec5f04
[====================================================================================================] 100
Reading Image TAIL:-
TLV No-1.TLV INFO
Number of TLVS in Tail is 2.
Size of Tail is 2044.
len 9 tail_len = 9
2. SIGNATURE OBTAINED SUCCESSFULLY
len 259 tail_len = 268
cert len 1773 pass
3. CERTICATE OBTAINED SUCCESSFULLY
len 1776 tail_len = 2044
1444: rc1 2044 tail_len 2044
MD5 Checksum successful!!!!!!!!!
Checking Image hash:-
1. Obtaining public key from Certificate.
Executing openssl x509 -in /tmp/in_cert.pem -pubkey -noout >/tmp/pubkey.pem
line: Certificate will not expire
Certificate validity verified.
line: /tmp/in_cert.pem: OK
2. Public key verified.
3. Decrypting the Image signature.
Executing openssl rsautl -verify -pubin -inkey /tmp/pubkey.pem -in /tmp/signsure.bin -out /tmp/ext_sha256.
4. Comparing the signatures:-
IMAGE TAIL SHA256 :
1d11b182fba8ce5521508fe770497afb7fbdae8e3117c1f2d1fd5842fbb12bdc
CALC SHA256 :
1d11b182fba8ce5521508fe770497afb7fbdae8e3117c1f2d1fd5842fbb12bdc
HASH CHECK PASSED.
AIS cleanup : Removing /tmp/ext_sha256...
AIS cleanup : Removing /tmp/in_cert.pem...
AIS cleanup : Removing /tmp/signsure.bin...
AIS cleanup : Removing /tmp/pubkey.pem...
AIS cleanup : Completed
bdSave: sizeof(bd)=0x7c, sizeof(rbd)=0xd0
caching flash data from /dev/mtd3 [ 0x00000000 - 0x00010000 ]
updating flash data [0x00008000 - 0x000080d0] from [0x7fecc748 - 0x7fecc818]
_erase_flash: offset=0x0 count=1
Erase Total 1 Units
Performing Flash Erase of length 262144 at offset 0x0 done
caching flash data from /dev/mtd3 [ 0x00000000 - 0x00010000 ]
verifying flash data [0x00008000 - 0x000080d0] from [0x7fecc748 - 0x7fecc818]
**fw(11795) : Completed
rkscli: reboot
OK
rkscli: exit
Quit:
OK