Falls aus irgendwelchen Gründen kein Update per Web zur Verfügung steht, kann mann immer noch per CLI Update.
Hier für muss mittels eines Null-Modem-Kabel eine Verbindung zum ZD hergestellt werden. Hier nun ein Beispiel:
Welcome to the Ruckus Wireless ZoneDirector 1200 Command Line Interface ruckus> en ruckus# debug You have all rights in this mode. ruckus(debug)# fw_upgrade tftp://192.168.1.210/zd1200_10.2.0.0.189.img ------------------------------------------------------------------------ ** Starting CLI Upgrade ** ------------------------------------------------------------------------ Protocol : tftp Server IP : 192.168.1.210 Image Name: zd1200_10.2.0.0.189.img ------------------------------------------------------------------------ ** Checking if memory is sufficient ** ------------------------------------------------------------------------ . ----->Sufficient memory to perform upgrade ------------------------------------------------------------------------ ** Downloading ZD image ** ------------------------------------------------------------------------ ..................................................................... ----->Downloading image succeed ------------------------------------------------------------------------ ** Verifying the image ** ------------------------------------------------------------------------ ................................................................verify-upgrade returns->[OK::] ----->Verifying image done ----->Are you sure you want to upgrade the entire wireless network? [y|n] enter>-------------------------------------------------------------- ** Upgrading the system ** ------------------------------------------------------------------------ ZoneDirector is being upgraded, DO NOT disconnect ZoneDirector from the power source or the wired network. Wait a few minutes after the automatic system restart. ..................
Bei den Access Point's muss SSH aktiv sein um eine Firmware-Upgrade durchzuführen, zudem muss auch Kontroll-Datei für den entsprechenden AP erstellt sein.
Please login: admin password : Copyright(C) 2016 Ruckus Wireless, Inc. All Rights Reserved. ** Ruckus R500 Multimedia Hotzone Wireless AP: 441504706343 rkscli: fw set host 172.16.10.5 OK rkscli: fw set prot tftp OK rkscli: fw set control R500_cntrl.rcks OK rkscli: fw update fw: Updating rcks_wlan.bkup ... v54_fw_update: download 172.16.10.5 section=rcks_fw.main image=Image2 ctl_file=R500_cntrl.rcks (/writable/fw/main.cntl) flash id is 0x10220 imghdr.{hdr_len=160, bin_len=9975644} fw_flash_read_open: open((null),) failed rks_flash_read_open(2) failed tail_offset 9973600 bin_len 9975644 sign 1. fwcheck is 2. net_get_flash, Upgrading from Fully Signed Image(FSI) to Intermediate Signed Image(ISI) image. Firmware size mentioned in control file(9975804) _erase_flash: offset=0x0 count=39 Erase Total 39 Units Performing Flash Erase of length 262144 at offset 0x980000 done [===================================================================================================>] 99 + read_size 8192; rc=6140 net_get_flash: Receive last block buf 6140 net_get_flash: hdr_fsize=9973760, real_fsize=9969664 net_buf 0x7fec5f04 [====================================================================================================] 100 Reading Image TAIL:- TLV No-1.TLV INFO Number of TLVS in Tail is 2. Size of Tail is 2044. len 9 tail_len = 9 2. SIGNATURE OBTAINED SUCCESSFULLY len 259 tail_len = 268 cert len 1773 pass 3. CERTICATE OBTAINED SUCCESSFULLY len 1776 tail_len = 2044 1444: rc1 2044 tail_len 2044 MD5 Checksum successful!!!!!!!!! Checking Image hash:- 1. Obtaining public key from Certificate. Executing openssl x509 -in /tmp/in_cert.pem -pubkey -noout >/tmp/pubkey.pem line: Certificate will not expire Certificate validity verified. line: /tmp/in_cert.pem: OK 2. Public key verified. 3. Decrypting the Image signature. Executing openssl rsautl -verify -pubin -inkey /tmp/pubkey.pem -in /tmp/signsure.bin -out /tmp/ext_sha256. 4. Comparing the signatures:- IMAGE TAIL SHA256 : 1d11b182fba8ce5521508fe770497afb7fbdae8e3117c1f2d1fd5842fbb12bdc CALC SHA256 : 1d11b182fba8ce5521508fe770497afb7fbdae8e3117c1f2d1fd5842fbb12bdc HASH CHECK PASSED. AIS cleanup : Removing /tmp/ext_sha256... AIS cleanup : Removing /tmp/in_cert.pem... AIS cleanup : Removing /tmp/signsure.bin... AIS cleanup : Removing /tmp/pubkey.pem... AIS cleanup : Completed bdSave: sizeof(bd)=0x7c, sizeof(rbd)=0xd0 caching flash data from /dev/mtd3 [ 0x00000000 - 0x00010000 ] updating flash data [0x00008000 - 0x000080d0] from [0x7fecc748 - 0x7fecc818] _erase_flash: offset=0x0 count=1 Erase Total 1 Units Performing Flash Erase of length 262144 at offset 0x0 done caching flash data from /dev/mtd3 [ 0x00000000 - 0x00010000 ] verifying flash data [0x00008000 - 0x000080d0] from [0x7fecc748 - 0x7fecc818] **fw(11795) : Completed rkscli: reboot OK rkscli: exit Quit: OK