Inhaltsverzeichnis

Firmware Upgrade per CLI

Falls aus irgendwelchen Gründen kein Update per Web zur Verfügung steht, kann mann immer noch per CLI Update.

Zonedirector

Hier für muss mittels eines Null-Modem-Kabel eine Verbindung zum ZD hergestellt werden. Hier nun ein Beispiel:

Welcome to the Ruckus Wireless ZoneDirector 1200 Command Line Interface
ruckus> en
ruckus# debug
You have all rights in this mode.
ruckus(debug)# fw_upgrade tftp://192.168.1.210/zd1200_10.2.0.0.189.img
------------------------------------------------------------------------
 ** Starting CLI Upgrade  **
------------------------------------------------------------------------
        Protocol  : tftp
        Server IP : 192.168.1.210
        Image Name: zd1200_10.2.0.0.189.img
------------------------------------------------------------------------
 ** Checking if memory is sufficient **
------------------------------------------------------------------------
.
----->Sufficient memory to perform upgrade
------------------------------------------------------------------------
 ** Downloading ZD image **
------------------------------------------------------------------------
.....................................................................
----->Downloading image succeed
------------------------------------------------------------------------
 ** Verifying the image **
------------------------------------------------------------------------
................................................................verify-upgrade returns->[OK::]
----->Verifying image done
----->Are you sure you want to upgrade the entire wireless network?
      [y|n] enter>--------------------------------------------------------------                                                                                                                                                           
 ** Upgrading the system **
------------------------------------------------------------------------
        ZoneDirector is being upgraded, DO NOT disconnect ZoneDirector
        from the power source or the wired network. Wait a few minutes
        after the automatic system restart.
..................


Access Point

Bei den Access Point's muss SSH aktiv sein um eine Firmware-Upgrade durchzuführen, zudem muss auch Kontroll-Datei für den entsprechenden AP erstellt sein.

Please login: admin
password : 
Copyright(C) 2016 Ruckus Wireless, Inc. All Rights Reserved.

** Ruckus R500 Multimedia Hotzone Wireless AP: 441504706343

rkscli: fw set host 172.16.10.5
OK
rkscli: fw set prot tftp
OK
rkscli: fw set control R500_cntrl.rcks
OK
rkscli: fw update

fw: Updating rcks_wlan.bkup ...
v54_fw_update: download 172.16.10.5 section=rcks_fw.main image=Image2 ctl_file=R500_cntrl.rcks (/writable/fw/main.cntl)
flash id is 0x10220
imghdr.{hdr_len=160, bin_len=9975644}
fw_flash_read_open: open((null),) failed
rks_flash_read_open(2) failed
tail_offset 9973600 bin_len 9975644 sign 1.
fwcheck is 2.
net_get_flash, Upgrading from Fully Signed Image(FSI) to Intermediate Signed Image(ISI) image.
Firmware size mentioned in control file(9975804)
_erase_flash: offset=0x0 count=39
Erase Total 39 Units
Performing Flash Erase of length 262144 at offset 0x980000 done
[===================================================================================================>] 99 
+ read_size 8192; rc=6140
net_get_flash: Receive last block buf 6140
net_get_flash: hdr_fsize=9973760, real_fsize=9969664 net_buf 0x7fec5f04 
[====================================================================================================] 100 

Reading Image TAIL:-
TLV No-1.TLV INFO 
  Number of TLVS in Tail is 2.
  Size of Tail is 2044.
len 9 tail_len = 9
2. SIGNATURE OBTAINED SUCCESSFULLY
len 259 tail_len = 268
	cert len 1773 pass
3. CERTICATE OBTAINED SUCCESSFULLY
len 1776 tail_len = 2044
1444: rc1 2044 tail_len 2044


MD5 Checksum successful!!!!!!!!! 

Checking Image hash:-
1. Obtaining public key from Certificate.
	Executing openssl x509 -in /tmp/in_cert.pem -pubkey -noout >/tmp/pubkey.pem
	line: Certificate will not expire
  Certificate validity verified.
	line: /tmp/in_cert.pem: OK
2. Public key verified.
3. Decrypting the Image signature.
	Executing openssl rsautl -verify -pubin -inkey /tmp/pubkey.pem -in /tmp/signsure.bin -out /tmp/ext_sha256.
4. Comparing the signatures:-
  IMAGE TAIL SHA256 :
	1d11b182fba8ce5521508fe770497afb7fbdae8e3117c1f2d1fd5842fbb12bdc
  CALC SHA256 :
	1d11b182fba8ce5521508fe770497afb7fbdae8e3117c1f2d1fd5842fbb12bdc
	HASH CHECK PASSED.

AIS cleanup : Removing /tmp/ext_sha256...
AIS cleanup : Removing /tmp/in_cert.pem...
AIS cleanup : Removing /tmp/signsure.bin...
AIS cleanup : Removing /tmp/pubkey.pem...
AIS cleanup : Completed
bdSave: sizeof(bd)=0x7c, sizeof(rbd)=0xd0
  caching flash data from /dev/mtd3 [ 0x00000000 - 0x00010000 ]
  updating flash data [0x00008000 - 0x000080d0] from [0x7fecc748 - 0x7fecc818]
_erase_flash: offset=0x0 count=1
Erase Total 1 Units
Performing Flash Erase of length 262144 at offset 0x0 done
  caching flash data from /dev/mtd3 [ 0x00000000 - 0x00010000 ]
  verifying flash data [0x00008000 - 0x000080d0] from [0x7fecc748 - 0x7fecc818]
**fw(11795) : Completed

rkscli: reboot
OK
rkscli: exit
Quit:
OK