EasyManua.ls Logo

Black Box LES1508A - How It Works

Black Box LES1508A
334 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
_____________________________________________________________________
724-746-5500 | blackbox.com Page 305
1. Generate an X.509 certificate for the client. Place it and its private key file onto a USB flash drive (concatenated
as a single file, client.pem).
2. Set up a HTTPS server that restricts access to the .opg or .xml file for HTTPS onnections providing the client
certificate.
3. Put a copy of the CA cert (that signed the HTTP server's certificate) onto the USB flash drive as well (ca-
bundle.crt).
4. Insert the USB flash drive into the Console server device before attaching power or network.
5. Continue with the steps above, but using only a https URL.
6. A detailed step-by-step document for preparing a USB flash drive and using OpenSSL to create keys is at Howto:
set up a USB key for authenticated restore
15.16.3 How it works
This section explains in detail how the Console server device uses DHCP to obtain its initial configuration.
First, a console manager is either configured or unconfigured. ZTP needs it to be in an unconfigured state, which is only
obtained in the following ways:
Firmware programming at factory
Pressing the Config Erase button twice during operation
Selecting Config Erase under System: Administration in the web UI, and rebooting
Creating the file /etc/config/.init and then rebooting (command-line)
When an unconfigured Console server boots, it performs these steps to find a configuration:
The Console server device transmits a DHCP DISCOVER request onto its primary Network Interface (wan). This
DHCP request will carry a Vendor Class Identifier.
On receipt of a DHCP OFFER, the device will use the information in the offer to assign an IPv4 address to its
primary Network Interface, add a default route, and prepare its DNS resolver.
If the offer also contained an option 43 with sub-option 1, the device interprets the sub-option as a whitespace-
separated list of URLs to configuration files to try to restore.
If an NTP server option was provided in the DHCP offer, the system clock is (quickly) synchronized with the NTP
server.
The system now searches all attached USB storage devices for two optional certificate files. The first file is named
ca-bundle.crt and the second one is whichever one of the following filenames is found first:
o client-AABBCCDDEEFF.pem (where AABBCCDDEEFF is the MAC address of the primary network
interace); or
o client-MODEL.pem (where MODEL is the (vendor class) model name in lowercase, truncated to before
the first hyphen); or
o client.pem
If both files are found (ca-bundle.crt and a client.pem), then secure mode is enabled for the next section.
Each URL in the list obtained from option 43 sub-option 1 is tried in sequence until one succeeds:
o The URL undergoes substring replacement from the following table:
Substring
Replaced by
Example
${mac}
the 12-digit MAC address of the device, lowercase
0013b600b669

Table of Contents

Other manuals for Black Box LES1508A

Related product manuals