Template for remote-access (8.3 and later)
object network NETWORK_OBJ_192.168.10.0_24
subnet 192.168.10.0 255.255.254.0
object network NETWORK_OBJ_192.168.200.128_26
subnet 192.168.200.128 255.255.255.192
access-list remote-access_splitTunnelAcl standard permit 192.168.10.0 255.255.254.0
nat (inside,outside) source static NETWORK_OBJ_192.168.10.0_24 NETWORK_OBJ_192.168.10.0_24 destination static NETWORK_OBJ_192.168.200.128_26 NETWORK_OBJ_192.168.200.128_26
ip local pool outside_mappool 192.168.200.150-192.168.200.190 mask 255.255.255.0
crypto ipsec ikev1 transform-set ESP-3DES-SHA esp-3des esp-sha-hmac
crypto ipsec ikev1 transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac
crypto ipsec ikev1 transform-set ESP-DES-SHA esp-des esp-sha-hmac
crypto ipsec ikev1 transform-set ESP-DES-MD5 esp-des esp-md5-hmac
crypto ipsec ikev1 transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac
crypto ipsec ikev1 transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac
crypto ipsec ikev1 transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac
crypto ipsec ikev1 transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac
crypto ipsec ikev1 transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac
crypto ipsec ikev1 transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac
crypto dynamic-map dynmap 65535 set ikev1 transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA ESP-3DES-MD5 ESP-DES-SHA ESP-DES-MD5
crypto map outside_map 65535 ipsec-isakmp dynamic dynmap
crypto map outside_map interface outside
crypto ikev1 enable outside
crypto ikev1 policy 10
authentication pre-share
encryption 3des
hash sha
group 2
lifetime 86400
group-policy remote-access internal
group-policy remote-access attributes
dns-server value 4.2.2.2
outside_map-tunnel-protocol ikev1
split-tunnel-policy tunnelspecified
split-tunnel-network-list value remote-access_splitTunnelAcl
default-domain value company.local
tunnel-group remote-access type remote-access
tunnel-group remote-access general-attributes
address-pool outside_mappool
default-group-policy remote-access
tunnel-group remote-access ipsec-attributes
ikev1 pre-shared-key whateveritis
This is the retired Shane Killen personal blog, an IT technical blog about configs and topics related to the Network and Security Engineer working with Cisco, Brocade, Check Point, and Palo Alto and Sonicwall. I hope this blog serves you well. -- May The Lord bless you and keep you. May He shine His face upon you, and bring you peace.
Friday, March 30, 2012
Thursday, March 29, 2012
Step by step: Upgrading the firmware of the Brocade RS6000 wireless controller from 4.3 to 5.2
Upgrading firmware of the RS6000 from 4.3 to 5.2:
Login via console cable.
"Please press Enter to activate this console."
BR-RFS6000 login: cli (type cli)
userame is: admin
password is: admin123
type "enable" to get into enable mode (no password).
If you do a "show ip interface brief" in CLI from default config, this is what is shown:
BR-RFS6000#show ip inter brief
Interface IP-Address/Mask Status Protocol
me1 10.1.1.100/24 up down
vlan1 unassigned(DHCP) up up
Configure DHCP server on your laptop (I use dualserver).
RS6000 gets an IP address. I showed this by using the command in CLI:
BR-RFS6000#show ip inter brief
Interface IP-Address/Mask Status Protocol
me1 10.1.1.100/24 up down
vlan1 192.168.0.5/24(DHCP) up up
Log into the web browswer: http://192.168.0.5
You get the following screen:
Login is admin/admin123 for the screenshot above.
Notice this box ships with version 4.3.4.0. We want to be at at least version 5.2.
Emailed Brocade contact and downloaded image from download location he gave me.
Copy image into FTP directory and FTP to unit. Go to Firmware → Update Firmware.
Put in the information of the TFTP server. Dont forget to put in “.img” at the end of the filename.
Notice above that the screen says at the next reboot, it will boot to the secondary firmware. That is what you want.
I changed the ip address to something static so that I could do initial configuration on this unit. See below.
I want to reboot now to boot up to the new image, but not sure how. Went in CLI and did the following:
BR-RFS6000#reload
wireless-controller will be rebooted, do you want to continue? ([y]es/[n]o): Y
Save current configuration? ([y]es/[n]o/[d]isplay unsaved/[c]ancel reload): y
[OK]
The system is going down NOW !!
When rebooting, you see this in CLI:
Restarting system.
...þ....
Booting from NOR image2
BootOS Copyright (c) 2004-2011. All rights reserved.
BR-RFS6000 version 5.2.0.0-069R
PCI Speed is configured as 133Mhz
NO PCI Card Present, leaving PCI Block disabled
Loading runtime image 2 ................................................
Welcome to BR-RFS6000
restoring /var2/./lib/dpd
restoring /var2/./state
restoring /var2/./state/dhcp
restoring /flash/./cache
restoring /flash/./floorplans
This can take some time, please be patient.
4x to 5x configuration conversion in process
4x to 5x configuration conversion complete
Starting daemons...........
Running Secondary software, version 5.2.0.0-069R
Alternate software Primary, version 4.3.4.0-014R
Software fallback feature is enabled
Please press Enter to activate this console.
Notice this time, after the reboot, I have to type in https://192.168.0.5/MainApp.htmlin the browser to get to the interface. See below.
Subscribe to:
Posts (Atom)