|
|||
Part I Planning to Install Over the Network 1. Where to Find Solaris Installation Planning Information 2. Preconfiguring System Configuration Information (Tasks) 3. Preconfiguring With a Naming Service or DHCP Part II Installing Over a Local Area Network 4. Installing From the Network (Overview) 5. Installing From the Network With DVD Media (Tasks) 6. Installing From the Network With CD Media (Tasks) 7. Installing Over the Network (Examples) 8. Installing From the Network (Command Reference) Part III Installing Over a Wide Area Network 10. Preparing to Install With WAN Boot (Planning) 11. Installing With WAN Boot (Tasks) Installing Over a Wide Area Network (Task Maps) Configuring the WAN Boot Server (Optional) To Configure the WAN Boot Logging Server (Optional) Protecting Data by Using HTTPS (Optional) To Use Digital Certificates for Server and Client Authentication Creating the Custom JumpStart Installation Files To Create the Solaris Flash Archive Creating the Configuration Files To Create the System Configuration File To Create the wanboot.conf File (Optional) Providing Configuration Information With a DHCP Server 12. SPARC: Installing With WAN Boot (Tasks) 13. SPARC: Installing With WAN Boot (Examples) |
(Optional) Protecting Data by Using HTTPSTo protect your data during the transfer from the WAN boot server to the client, you can use HTTP over Secure Sockets Layer (HTTPS). To use the more secure installation configuration that is described in Secure WAN Boot Installation Configuration, you must enable your web server to use HTTPS. If you do not want to perform a secure WAN boot, skip the procedures in this section. To continue preparing for your less secure installation, see Creating the Custom JumpStart Installation Files. To enable the web server software on the WAN boot server to use HTTPS, you must perform the following tasks.
This section describes how to use digital certificates and keys in your WAN boot installation. (Optional) To Use Digital Certificates for Server and Client AuthenticationThe WAN boot installation method can use PKCS#12 files to perform an installation over HTTPS with server or both client and server authentication. For requirements and guidelines about using PKCS#12 files, see Digital Certificate Requirements. To use a PKCS#12 file in a WAN boot installation, you perform the following tasks.
The wanbootutil command provides options to perform the tasks in the previous list. If you do not want to perform a secure WAN boot, skip this procedure. To continue preparing for your less secure installation, see Creating the Custom JumpStart Installation Files. Follow these steps to create a trusted certificate and a client private key. Before You BeginBefore you split a PKCS#12 file, create the appropriate subdirectories of the /etc/netboot hierarchy on the WAN boot server.
In the following example, you use a PKCS#12 file to install client 010003BA152A42 on subnet 192.168.198.0. This command sample extracts a certificate from a PKCS#12 file that is named client.p12. The command then places the contents of the trusted certificate in the client's truststore file. Before you execute these commands, you must first assume the same user role as the web server user. In this example, the web server user role is nobody. server# su nobody Password: nobody# wanbootutil p12split -i client.p12 \ -t /etc/netboot/192.168.198.0/010003BA152A42/truststore nobody# chmod 600 /etc/netboot/192.168.198.0/010003BA152A42/truststore More InformationContinuing the WAN Boot InstallationAfter you create a digital certificate, create a hashing key and an encryption key. For instructions, see(Optional) To Create a Hashing Key and an Encryption Key. See AlsoFor more information about how to create trusted certificates, see the man page wanbootutil(1M). (Optional) To Create a Hashing Key and an Encryption KeyIf you want to use HTTPS to transmit your data, you must create a HMAC SHA1 hashing key and an encryption key. If you plan to install over a semi-private network, you might not want to encrypt the installation data. You can use a HMAC SHA1 hashing key to check the integrity of the wanboot program. By using the wanbootutil keygen command, you can generate these keys and store them in the appropriate /etc/netboot directory. If you do not want to perform a secure WAN boot, skip this procedure. To continue preparing for your less secure installation, see Creating the Custom JumpStart Installation Files. To create a hashing key and an encryption key, follow these steps.
The following example creates a master HMAC SHA1 key for the WAN boot server. This example also creates a HMAC SHA1 hashing key and 3DES encryption key for client 010003BA152A42 on subnet 192.168.198.0. Before you execute these commands, you must first assume the same user role as the web server user. In this example, the web server user role is nobody. server# su nobody Password: nobody# wanbootutil keygen -m nobody# wanbootutil keygen -c -o net=192.168.198.0,cid=010003BA152A42,type=sha1 nobody# wanbootutil keygen -c -o net=192.168.198.0,cid=010003BA152A42,type=3des More InformationContinuing the WAN Boot InstallationAfter you create a hashing and an encryption key, you must create the installation files. For instructions, see Creating the Custom JumpStart Installation Files. See AlsoFor overview information on hashing keys and encryption keys, see Protecting Data During a WAN Boot Installation. For more information about how to create hashing and encryption keys, see the man page wanbootutil(1M). |
||
|