Network Based Installation
Network Based Installation
Guide: Network-Based
Installations
Sun Microsystems, Inc. has intellectual property rights relating to technology embodied in the product that is described in this document. In particular, and without
limitation, these intellectual property rights may include one or more U.S. patents or pending patent applications in the U.S. and in other countries.
U.S. Government Rights – Commercial software. Government users are subject to the Sun Microsystems, Inc. standard license agreement and applicable provisions
of the FAR and its supplements.
This distribution may include materials developed by third parties.
Parts of the product may be derived from Berkeley BSD systems, licensed from the University of California. UNIX is a registered trademark in the U.S. and other
countries, exclusively licensed through X/Open Company, Ltd.
Sun, Sun Microsystems, the Sun logo, the Solaris logo, the Java Coffee Cup logo, docs.sun.com, Sun4U, Power Management, SunOS, Ultra, JumpStart, Java, and
Solaris are trademarks or registered trademarks of Sun Microsystems, Inc. or its subsidiaries in the U.S. and other countries. All SPARC trademarks are used under
license and are trademarks or registered trademarks of SPARC International, Inc. in the U.S. and other countries. Products bearing SPARC trademarks are based
upon an architecture developed by Sun Microsystems, Inc.
The OPEN LOOK and SunTM Graphical User Interface was developed by Sun Microsystems, Inc. for its users and licensees. Sun acknowledges the pioneering efforts
of Xerox in researching and developing the concept of visual or graphical user interfaces for the computer industry. Sun holds a non-exclusive license from Xerox to
the Xerox Graphical User Interface, which license also covers Sun's licensees who implement OPEN LOOK GUIs and otherwise comply with Sun's written license
agreements.
Products covered by and information contained in this publication are controlled by U.S. Export Control laws and may be subject to the export or import laws in
other countries. Nuclear, missile, chemical or biological weapons or nuclear maritime end uses or end users, whether direct or indirect, are strictly prohibited. Export
or reexport to countries subject to U.S. embargo or to entities identified on U.S. export exclusion lists, including, but not limited to, the denied persons and specially
designated nationals lists is strictly prohibited.
DOCUMENTATION IS PROVIDED “AS IS” AND ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY
IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT, ARE DISCLAIMED, EXCEPT TO
THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BE LEGALLY INVALID.
Copyright 2009 Sun Microsystems, Inc. 4150 Network Circle, Santa Clara, CA 95054 U.S.A. Tous droits réservés.
Sun Microsystems, Inc. détient les droits de propriété intellectuelle relatifs à la technologie incorporée dans le produit qui est décrit dans ce document. En particulier,
et ce sans limitation, ces droits de propriété intellectuelle peuvent inclure un ou plusieurs brevets américains ou des applications de brevet en attente aux Etats-Unis
et dans d'autres pays.
Cette distribution peut comprendre des composants développés par des tierces personnes.
Certaines composants de ce produit peuvent être dérivées du logiciel Berkeley BSD, licenciés par l'Université de Californie. UNIX est une marque déposée aux
Etats-Unis et dans d'autres pays; elle est licenciée exclusivement par X/Open Company, Ltd.
Sun, Sun Microsystems, le logo Sun, le logo Solaris, le logo Java Coffee Cup, docs.sun.com, Sun4U, Power Management, SunOS, Ultra, JumpStart, Java et Solaris sont
des marques de fabrique ou des marques déposées de Sun Microsystems, Inc., ou ses filiales, aux Etats-Unis et dans d'autres pays. Toutes les marques SPARC sont
utilisées sous licence et sont des marques de fabrique ou des marques déposées de SPARC International, Inc. aux Etats-Unis et dans d'autres pays. Les produits
portant les marques SPARC sont basés sur une architecture développée par Sun Microsystems, Inc.
L'interface d'utilisation graphique OPEN LOOK et Sun a été développée par Sun Microsystems, Inc. pour ses utilisateurs et licenciés. Sun reconnaît les efforts de
pionniers de Xerox pour la recherche et le développement du concept des interfaces d'utilisation visuelle ou graphique pour l'industrie de l'informatique. Sun détient
une licence non exclusive de Xerox sur l'interface d'utilisation graphique Xerox, cette licence couvrant également les licenciés de Sun qui mettent en place l'interface
d'utilisation graphique OPEN LOOK et qui, en outre, se conforment aux licences écrites de Sun.
Les produits qui font l'objet de cette publication et les informations qu'il contient sont régis par la legislation américaine en matière de contrôle des exportations et
peuvent être soumis au droit d'autres pays dans le domaine des exportations et importations. Les utilisations finales, ou utilisateurs finaux, pour des armes nucléaires,
des missiles, des armes chimiques ou biologiques ou pour le nucléaire maritime, directement ou indirectement, sont strictement interdites. Les exportations ou
réexportations vers des pays sous embargo des Etats-Unis, ou vers des entités figurant sur les listes d'exclusion d'exportation américaines, y compris, mais de manière
non exclusive, la liste de personnes qui font objet d'un ordre de ne pas participer, d'une façon directe ou indirecte, aux exportations des produits ou des services qui
sont régis par la legislation américaine en matière de contrôle des exportations et la liste de ressortissants spécifiquement designés, sont rigoureusement interdites.
LA DOCUMENTATION EST FOURNIE "EN L'ETAT" ET TOUTES AUTRES CONDITIONS, DECLARATIONS ET GARANTIES EXPRESSES OU TACITES
SONT FORMELLEMENT EXCLUES, DANS LA MESURE AUTORISEE PAR LA LOI APPLICABLE, Y COMPRIS NOTAMMENT TOUTE GARANTIE
IMPLICITE RELATIVE A LA QUALITE MARCHANDE, A L'APTITUDE A UNE UTILISATION PARTICULIERE OU A L'ABSENCE DE CONTREFACON.
090821@22749
Contents
Preface .....................................................................................................................................................9
3
Contents
5
Contents
7
Contents
This book describes how to install the SolarisTM Operating System (Solaris OS) remotely over a
local area network or a wide area network.
This book does not include instructions about how to set up system hardware or other
peripherals.
Note – This Solaris release supports systems that use the SPARC® and x86 families of processor
architectures: UltraSPARC®, SPARC64, AMD64, Pentium, and Xeon EM64T. The supported
systems appear in the Solaris OS: Hardware Compatibility Lists at http://www.sun.com/
bigadmin/hcl. This document cites any implementation differences between the platform
types.
For supported systems, see the Solaris OS: Hardware Compatibility Lists.
For basic installation information, see Solaris 10 10/09 Installation Guide: Basic Installations.
9
Preface
Related Books
Table P–1 lists documentation for system administrators.
Description Information
Do you need system requirements or high-level planning information? Solaris 10 10/09 Installation Guide: Planning for Installation
Or want a high-level overview of Solaris ZFSTM installations, booting, and Upgrade
Solaris Zones partitioning technology, or creating RAID-1 volumes?
Do you need to install a single system from DVD or CD media? The Solaris 10 10/09 Installation Guide: Basic Installations
Solaris installation program steps you through an installation.
Do you need to upgrade or patch your system with almost no Solaris 10 10/09 Installation Guide: Solaris Live Upgrade and
downtime? Save system downtime when upgrading by using Solaris Upgrade Planning
Live Upgrade.
Do you need to install a secure installation over the network or Internet? Solaris 10 10/09 Installation Guide: Network-Based
Use WAN boot to install a remote client. Or, do you need to install over Installations
the network from a network installation image? The Solaris installation
program steps you through an installation.
Do you need to install or patch multiple systems quickly? Use Solaris Solaris 10 10/09 Installation Guide: Solaris Flash Archives
FlashTM software to create a Solaris Flash archive and install a copy of (Creation and Installation)
the OS on clone systems.
Do you need to back up your system? Chapter 23, “Backing Up and Restoring UFS File Systems
(Overview),” in System Administration Guide: Devices and
File Systems
Do you need troubleshooting information, a list of known problems, or Solaris Release Notes
a list of patches for this release?
Do you need to verify that your system works on Solaris? SPARC: Solaris Sun Hardware Platform Guide
Do you need to check on which packages have been added, removed, or Solaris Package List
changed in this release?
Do you need to verify that your system and devices work with Solaris Solaris Hardware Compatibility List for x86 Platforms
SPARC and x86 based systems and other third-party vendors.
Typographic Conventions
The following table describes the typographic conventions that are used in this book.
AaBbCc123 The names of commands, files, and directories, Edit your .login file.
and onscreen computer output
Use ls -a to list all files.
machine_name% you have mail.
aabbcc123 Placeholder: replace with a real name or value The command to remove a file is rm
filename.
AaBbCc123 Book titles, new terms, and terms to be Read Chapter 6 in the User's Guide.
emphasized
A cache is a copy that is stored
locally.
Do not save the file.
Note: Some emphasized items
appear bold online.
Shell Prompt
C shell machine_name%
11
Preface
13
14
1
C H A P T E R 1
This book describes how to install the Solaris OS remotely over a local area network or a wide
area network.
This chapter describes the preparations for completing a successful installation. Many
preparatory tasks are common to all Solaris installations, and so are described in one master
planning document.
This chapter describes new features in the Solaris installation programs. Chapter 2, “What’s New in Solaris Installation,” in
Solaris 10 10/09 Installation Guide: Planning for
Installation and Upgrade
This chapter provides you with information about decisions you need to make Chapter 3, “Solaris Installation and Upgrade
before you install or upgrade the Solaris OS. For example, you'll find information (Roadmap),” in Solaris 10 10/09 Installation Guide:
on deciding when to use a network installation image or DVD media and Planning for Installation and Upgrade
descriptions of all the Solaris installation programs.
This chapter describes system requirements to install or upgrade to the Solaris Chapter 4, “System Requirements, Guidelines, and
OS. General guidelines for planning the disk space and default swap space Upgrade (Planning),” in Solaris 10 10/09
allocation are also provided. Upgrade limitations are also described. Installation Guide: Planning for Installation and
Upgrade
15
Where to Find Planning and System Requirement Information
This chapter contains checklists to help you gather all of the information that you Chapter 5, “Gathering Information Before
need to install or upgrade your system. This is useful if you are doing an Installation or Upgrade (Planning),” in
interactive installation. You'll have all the information in the checklist that you'll Solaris 10 10/09 Installation Guide: Planning for
need to do an interactive installation. Installation and Upgrade
This book part includes chapters that provide overviews of several technologies Part II, “Understanding Installations That Relate
that relate to a Solaris OS installation or upgrade. Guidelines and requirements to ZFS, Booting, Solaris Zones, and RAID-1
related to these technologies are also included. These chapters include Volumes,” in Solaris 10 10/09 Installation Guide:
information about ZFS installations, booting, Solaris Zones partitioning Planning for Installation and Upgrade
technology, and RAID-1 volumes that can be created at installation.
This chapter describes how to preconfigure system information by using the sysidcfg file.
Preconfiguration can help you to avoid being prompted for this information when you install
the Solaris OS. This chapter also describes how to preconfigure Power ManagementTM
information. This chapter contains the following sections:
■ “Advantages of Preconfiguring System Configuration Information” on page 17
■ “Preconfiguring With the sysidcfg File” on page 18
■ “SPARC: Preconfiguring Power Management Information” on page 36
You can choose one of the following ways to preconfigure system information.
sysidcfg file Preset the domain name, netmask, “Preconfiguring With the
DHCP, IPv6 and other parameters sysidcfg File” on page 18
by using keywords in the sysidcfg
file.
17
Preconfiguring With the sysidcfg File
Naming service Preset host name and IP addresses “Preconfiguring With the Naming
by preconfiguring your system Service” on page 39
information in your naming
service.
For more detailed information about choosing a preconfiguration method, see “Choosing a
Naming Service” on page 37.
When the Solaris installation program or the custom JumpStartTM installation program detects
preconfigured system information, the installation program does not prompt you to enter the
information. For example, you have several systems and you do not want a time zone prompt
every time you install the current Solaris release on one of the systems. You can specify the time
zone in the sysidcfg file or the naming service databases. When you install the current Solaris
release, the installation program does not prompt you to type a time zone.
Note – The name_service keyword in the sysidcfg file automatically sets the naming service
during installation of the Solaris OS. This setting overrides SMF services previously set up for
site.xml. Therefore, you might need to reset your name service after installation.
You must create a unique sysidcfg file for every system that requires different configuration
information. You can use the same sysidcfg file to preconfigure the time zone on a set of
systems if you want all the systems to be assigned the same time zone. However, if you want to
preconfigure a different root (superuser) password for each of those systems, you need to create
a unique sysidcfg file for each system.
NFS file system If you put the sysidcfg file in a shared NFS file
system, you must use the -p option of the
add_install_client(1M) command when you set
up the system to install from the network. The -p
option specifies where the system can find the
sysidcfg file when you install the current Solaris
release.
UFS or PCFS diskette Place the sysidcfg file in the root (/) directory on the
diskette.
If you are performing a custom JumpStart installation
and you want to use a sysidcfg file on a diskette, you
must place the sysidcfg file on the profile diskette. To
create a profile diskette, see “Creating a Profile
Diskette for Standalone Systems” in Solaris 10 10/09
Installation Guide: Custom JumpStart and Advanced
Installations.
You can place only one sysidcfg file in a directory or
on a diskette. If you are creating more than one
sysidcfg file, you must place each file in a different
directory or on a different diskette.
HTTP or HTTPS server If you want to perform a WAN boot installation, place
the sysidcfg file in the document root directory of
the web server.
You can use the naming service or DHCP to preconfigure your system. For information, see
Chapter 3, “Preconfiguring With a Naming Service or DHCP.”
2 Make the sysidcfg file available to clients by using one of the locations described at Table 2–2.
NFSv4 domain name is automatically derived from the naming service. Because the
service_profile keyword is not included in this example, configuration is not altered for the
network services during installation.
keyboard=US-English
system_locale=en_US
timezone=US/Central
terminal=sun-cmd
timeserver=localhost
name_service=NIS {domain_name=marquee.central.example.com
name_server=nmsvr2(172.31.112.3)}
nfs4_domain=dynamic
root_password=m4QPOWNY
network_interface=hme0 {hostname=host1
default_route=172.31.88.1
ip_address=172.31.88.210
netmask=255.255.0.0
protocol_ipv6=no}
security_policy=kerberos {default_realm=example.com
admin_server=krbadmin.example.com
kdc=kdc1.example.com,
kdc2.example.com}
keyboard=US-English
timezone=US/Central
timeserver=timehost1
terminal=ibm-pc
service_profile=limited_net
name_service=NIS {domain_name=marquee.central.example.com
name_server=nmsvr2(172.25.112.3)}
nfs4_domain=example.com
root_password=URFUni9
timezone=US/Pacific
system_locale=C
terminal=xterms
timeserver=localhost
network_interface=eri0 {primary
hostname=host1
ip_address=192.168.2.7
netmask=255.255.255.0
protocol_ipv6=no
default_route=192.168.2.1}
network_interface=eri1 {hostname=host1-b
ip_address=192.168.3.8
netmask=255.255.255.0
protocol_ipv6=no
default_route=NONE}
root_password=JE2C35JGZi4B2
security_policy=none
name_service=NIS {domain_name=domain.example.com
name_server=nis-server(192.168.2.200)}
nfs4_domain=dynamic
If you plan to use the sysidcfg file in a WAN boot installation, you need to perform additional
tasks. For more information, see Chapter 10, “WAN Boot (Overview).”
If you plan to use the sysidcfg file in a custom JumpStart installation, you need to create a
profile and a rules.ok file. For more information, see Chapter 2, “Custom JumpStart
(Overview),” in Solaris 10 10/09 Installation Guide: Custom JumpStart and Advanced
Installations.
See Also For more information about the sysidcfg file, see the man page sysidcfg(4).
name_service=NIS {domain_name=marquee.central.example.com
name_server=connor(192.168.112.3)}
Network interface, host name, Internet Protocol (IP) address, “network_interface Keyword” on page 27
netmask, DHCP, IPv6
Language in which to display the install program and desktop “system_locale Keyword” on page 35
The following sections describe the keywords that you can use in the sysidcfg file.
keyboard Keyword
The sysidkdb tool configures your USB language and its corresponding keyboard layout.
Note – PS/2 keyboards are not self-identifying. You will be asked to select the keyboard
layout during the installation.
You can configure the keyboard language and its corresponding keyboard layout information
by using the keyboard keyword. Each language has its own keyboard layout. Use the following
syntax to select a language and its corresponding layout.
keyboard=keyboard_layout
For example, this entry sets the keyboard language and its corresponding keyboard layout for
the German language:
keyboard=German
The value provided for keyboard_layout must be a valid value. Otherwise, an interactive
response is required during installation. The valid keyboard_layout strings are defined in the
/usr/share/lib/keytables/type_6/kbd_layouts file.
SPARC only – Previously, the USB keyboard assumed a self-identifying value of 1 during the
installation. Therefore, all of the keyboards that were not self-identifying always configured for
a U.S. English keyboard layout during installation.
If the keyboard is not self-identifying and you want to prevent being prompted during your
JumpStart installation, select the keyboard language in your sysidcfg file. For JumpStart
installations, the default is for the U.S. English language. To select another language and its
corresponding keyboard layout, set the keyboard entry in your sysidcfg file as in the example
provided above.
For further information, see the sysidcfg(4) and sysidtool(1M) man pages.
name_service Keyword
You can use the name_service keyword to configure the naming service, the domain name, and
the name server for the system. The following sample shows the general syntax for the
name_service keyword.
name_service=name-service {domain_name=domain-name
name_server=name-server
optional-keyword=value}
Choose only one value for name_service. Include all or none of the domain_name,
name_server, or optional keywords, as needed. If no keywords are used, omit the curly braces
{}.
Note – The name_service option in the sysidcfg file automatically sets the naming service
during installation of the Solaris OS. This setting overrides SMF services that were previously
set up for site.xml. Therefore, you might need to reset your name service after installation.
The following sections describe the keyword syntax to configure the system to use a specific
naming service.
name_service=NIS {domain_name=domain-name
name_server=hostname(ip-address)}
domain-name Specifies the domain name
hostname Specifies the host name of the name server
ip-address Specifies the IP address of the name server
The following example specifies a NIS server with the domain name west.example.com. The
server's host name is timber, and the server IP address is 192.168.2.1.
name_service=NIS {domain_name=west.example.com
name_server=timber(192.168.2.1)}
For more information about the NIS name service, see System Administration Guide: Naming
and Directory Services (DNS, NIS, and LDAP).
name_service=NIS+ {domain_name=domain-name
name_server=hostname(ip-address)}
domain-name Specifies the domain name
hostname Specifies the host name of the name server
ip-address Specifies the IP address of the name server
The following example specifies a NIS+ server with the domain name west.example.com. The
server's host name is timber, and the server IP address is 192.168.2.1.
name_service=NIS+ {domain_name=west.example.com
name_server=timber(192.168.2.1)}
For more information about the NIS+ name service, see System Administration Guide: Naming
and Directory Services (NIS+).
name_service=DNS {domain_name=domain-name
name_server=ip-address,ip-address,ip-address
search=domain-name,domain-name,domain-name,
domain-name,domain-name,domain-name}
domain_name=domain-name Specifies the domain name.
name_server=ip-address Specifies the IP address of the DNS server. You can specify
up to three IP addresses as values for the name_server
keyword.
search=domain-name (Optional) Specifies additional domains to search for
naming service information. You can specify up to six
domain names to search. The total length of each search
entry cannot exceed 250 characters.
The following example specifies a DNS server with the domain name west.example.com. The
server IP addresses are 10.0.1.10 and 10.0.1.20. example.com and east.example.com are listed
as additional domains to search for naming service information.
name_service=DNS {domain_name=west.example.com
name_server=10.0.1.10,10.0.1.20
search=example.com,east.example.com}
For more information about the DNS name service, see System Administration Guide: Naming
and Directory Services (DNS, NIS, and LDAP).
name_service=LDAP {domain_name=domain_name
profile=profile_name profile_server=ip_address
proxy_dn="proxy_bind_dn" proxy_password=password}
domain_name Specifies the domain name of the LDAP server.
profile_name Specifies the name of the LDAP profile you want to use to configure the
system.
ip_address Specifies the IP address of the LDAP profile server.
proxy_bind_dn (Optional) Specifies the proxy bind distinguished name. You must enclose
the proxy_bind_dn value in double quotes.
password (Optional) Specifies the client proxy password.
The following example specifies an LDAP server with the following configuration information.
■ The domain name is west.example.com.
■ The installation program uses the LDAP profile that is named default to configure the
system.
■ The IP address of the LDAP server is 172.31.2.1.
■ The proxy bind distinguished name includes the following information.
■ The common name for the entry is proxyagent.
■ The organizational unit is profile.
■ The proxy domain includes the west, example, and com domain components.
■ The proxy password is password.
EXAMPLE 2–7 Specifying an LDAP Server With the name_service Keyword (Continued)
name_service=LDAP {domain_name=west.example.com
profile=default
profile_server=172.31.2.1
proxy_dn="cn=proxyagent,ou=profile,
dc=west,dc=example,dc=com"
proxy_password=password}
For more information about how to use LDAP, see System Administration Guide: Naming and
Directory Services (DNS, NIS, and LDAP).
network_interface Keyword
Use the network_interface keyword to perform the following tasks.
■ Specify a host name
■ Specify an IP address
■ Specify the default router address
■ Specify a netmask value
■ Use DHCP to configure the network interface
■ Enable IPv6 on the network interface
The following sections describe how to use the network_interface keyword to configure the
system interfaces.
network_interface=none
network_interface=PRIMARY or value
{dhcp protocol_ipv6=yes-or-no}
PRIMARY Instructs the installation program to configure the first up,
non-loopback interface that is found on the system. The
order is the same as the order that is displayed with the
ifconfig command. If no interfaces are up, then the first
non-loopback interface is used. If no non-loopback
interfaces are found, then the system is nonnetworked.
value Instructs the installation program to configure a specific
interface, such as hme0 or eri1.
protocol_ipv6=yes-or-no Instructs the installation program to configure the system to
use either IPv6 or to not use IPv6.
network_interface=PRIMARY or value
{hostname=host_name
default_route=ip_address
ip_address=ip_address
netmask=netmask
protocol_ipv6=yes_or_no}
PRIMARY Instructs the installation program to configure the
first up, non-loopback interface that is found on the
system. The order is the same as the order that is
displayed with the ifconfig command. If no
interfaces are up, then the first non-loopback
interface is used. If no non-loopback interfaces are
found, then the system is not networked.
Include any combination or none of the hostname, ip_address, and netmask keywords, as
needed. If you do not use any of these keywords, omit the curly braces ({}).
EXAMPLE 2–8 Configuring a Single Interface By Using DHCP With the network_interface Keyword
The following example instructs the installation program to use DHCP to configure the eri0
network interface. IPv6 support is not enabled.
EXAMPLE 2–9 Configuring a Single Interface By Specifying Configuration Information With the
network_interface Keyword
The following example configures the interface eri0 with the following settings.
■ The host name is set to host1.
■ The IP address is set to 172.31.88.100.
■ The netmask is set to 255.255.255.0.
EXAMPLE 2–9 Configuring a Single Interface By Specifying Configuration Information With the
network_interface Keyword (Continued)
You can use the network_interface keyword to configure multiple interfaces in the following
ways.
■ With DHCP – You can use a DHCP server on your network to configure a network
interface. For more information on how to use a DHCP server during your installation, see
“Preconfiguring System Configuration Information With the DHCP Service (Tasks)” on
page 43.
To use the DHCP server to configure a network interface on the system, use the following
syntax for the network_interface keyword.
network_interface=value {primary
dhcp protocol_ipv6=yes-or-no}
value Instructs the installation program to configure a specific
interface, such as hme0 or eri1.
primary (Optional) Specifies value as the primary interface.
protocol_ipv6=yes-or-no Instructs the installation program to configure the system to
either use IPv6 or to not use IPv6.
Note – For WAN boot installations, you must set the value of
protocol_ipv6=no.
■ Without DHCP – If you do not want to use DHCP to configure the network interface, you
can specify the configuration information in the sysidcfg file. To instruct the installation
program to configure multiple interfaces without using DHCP, use the following syntax.
protocol_ipv6=yes_or_no}
value Instructs the installation program to configure a
specific interface, such as hme0 or eri1.
primary (Optional) Specifies value as the primary
interface.
hostname=host_name (Optional) Specifies the host name of the system.
default_route=ip_address or NONE (Optional) Specifies the IP address of the default
router. If you want the installation program to
detect the router by using the ICMP router
discovery protocol, omit this keyword.
Include any combination or none of the hostname, ip_address, and netmask keywords, as
needed. If you do not use any of these keywords, omit the curly braces ({}).
In the same sysidcfg file, you can use DHCP to configure certain interfaces, while also
specifying the configuration information for other interfaces in the sysidcfg file.
In the following example, the network interfaces eri0 and eri1 are configured in the following
way.
■ eri0 is configured by using the DHCP server. IPv6 support is not enabled on eri0.
■ eri1 is the primary network interface. The host name is set to host1, and the IP address is set
to 172.31.88.100. The netmask is set to 255.255.255.0. IPv6 support is not enabled on eri1.
nfs4_domain Keyword
To prevent being asked to specify an NFSv4 domain name during installation, use the
nfs4_domain keyword in the sysidcfg file. This keyword suppresses selection of a domain
name during the installation process. Use the following syntax:
nfs4_domain=dynamic or custom_domain_name
dynamic This reserved keyword dynamically derives the NFSv4 domain
name, based on naming services configuration. For example:
nfs4_domain=dynamic
nfs4_domain=example.com
This example sets the value that is used by the nfsmapid daemon to
be example.com. This selection overrides the default domain name.
Note – In previous releases, scripts enabled users to avoid being prompted for the NFSv4 domain
name during installation.
For JumpStart installations in the Solaris 10 OS, you could use the workaround JumpStart
sample script, set_nfs4_domain, to suppress the NFSv4 prompt during installation. This script
is no longer required. Use the sysidcfg keyword, nfs4_domain, instead.
root_password Keyword
You can specify the root password to the system in the sysidcfg file. To specify the root
password, use the root_password keyword with the following syntax.
root_password=encrypted-password
security_policy Keyword
You can use the security_policy keyword in your sysidcfg file to configure your system to
use the Kerberos network authentication protocol. If you want to configure the system to use
Kerberos, use the following syntax.
security_policy=kerberos {default_realm=FQDN
admin_server=FQDN kdc=FQDN1, FQDN2, FQDN3}
FQDN specifies the fully qualified domain name of the Kerberos default realm, the
administration server, or key distribution center (KDC). You must specify at least one, but no
more than three, key distribution centers.
If you do not want to set the security policy for the system, set security_policy=NONE.
For more information about the Kerberos network authentication protocol, see System
Administration Guide: Security Services.
EXAMPLE 2–11 Configuring the System to Use Kerberos With the security_policy Keyword
This example configures the system to use Kerberos with the following information.
■ The Kerberos default realm is example.com.
■ The Kerberos administration server is krbadmin.example.com.
■ The two key distribution centers are kdc1.example.com and kdc2.example.com.
security_policy=kerberos
{default_realm=example.COM
admin_server=krbadmin.example.com
kdc=kdc1.example.com,
kdc2.example.com}
service_profile Keyword
You can use the service_profile keyword to install a more secure system by restricting
network services. This security option is available only for initial installations. An upgrade
maintains all previously set services.
service_profile=limited_net
service_profile=open
limited_net specifies that all network services, except for Secure Shell, are either disabled or
constrained to respond to local requests only. After installation, any individual network service
can be enabled by using the svcadm and svccfg commands.
open specifies that no network service changes are made during installation.
If the service_profile keyword is not present in the sysidcfg file, no changes are made to the
status of the network services during installation.
The network services can be enabled after installation by using the netservices open
command or by enabling individual services by using SMF commands. See “Revising Security
Settings After Installation” in Solaris 10 10/09 Installation Guide: Planning for Installation and
Upgrade.
For further information about limiting network security during installation, see “Planning
Network Security” in Solaris 10 10/09 Installation Guide: Planning for Installation and Upgrade.
See also the following man pages.
■ netservices(1M)
■ svcadm(1M)
■ svccfg(1M) commands
system_locale Keyword
You can use the system_locale keyword to specify the language in which to display the install
program and desktop. Use the following syntax to specify a locale.
system_locale=locale
locale specifies the language that you want the system to use to display the installation panels
and screens. For a list of valid locale values, see the /usr/lib/locale directory or International
Language Environments Guide.
terminal Keyword
You can use the terminal keyword to specify the terminal type for the system. Use the
following syntax to specify the terminal type.
terminal=terminal_type
terminal_type specifies the terminal type for the system. For a list of valid terminal values, see
the subdirectories in the /usr/share/lib/terminfo directory.
timezone Keyword
You can set the time zone for the system with the timezone keyword. Use the following syntax.
timezone=timezone
In the previous example, timezone specifies the time zone value for the system. The directories
and files in the /usr/share/lib/zoneinfo directory provide the valid time zone values. The
timezone value is the name of the path relative to the /usr/share/lib/zoneinfo directory. You
can also specify any valid Olson time zone.
EXAMPLE 2–12 Configuring the System Time Zone With the timezone Keyword
In the following example, the system time zone is set to mountain standard time in the United
States.
timezone=US/Mountain
The installation program configures the system to use the time zone information in
/usr/share/lib/zoneinfo/US/Mountain.
timeserver Keyword
You can use the timeserver keyword to specify the system that sets the date and time on the
system you want to install.
timeserver=hostname or ip-address
hostname is the host name of the time server system. ip-address specifies the IP address of
the time server.
Note – If your system has Energy Star version 3 or later, you are not prompted for this
information.
If you are performing interactive installations, you cannot preconfigure the Power Management
information and avoid the prompt. However, by using a custom JumpStart installation, you can
preconfigure the Power Management information by using a finish script to create an
/autoshutdown or /noautoshutdown file on the system. When the system reboots, the
/autoshutdown file enables Power Management and the /noautoshutdown file disables Power
Management.
For example, the following line in a finish script enables the Power Management software and
prevents the display of the prompt after the system reboots.
touch /a/autoshutdown
Finish scripts are described in “Creating Finish Scripts” in Solaris 10 10/09 Installation Guide:
Custom JumpStart and Advanced Installations.
This chapter describes procedures about preconfiguring system information with a naming
service or DHCP. This chapter contains the following sections:
■ “Choosing a Naming Service” on page 37
■ “Preconfiguring With the Naming Service” on page 39
■ “Preconfiguring System Configuration Information With the DHCP Service (Tasks)” on
page 43
Note – The name_service option in the sysidcfg file automatically sets the naming service
during installation of the Solaris OS. This setting overrides SMF services previously setup
for site.xml. Therefore, you might need to reset your name service after installation.
Use the following table to determine whether to use a sysidcfg file or a naming service
database to preconfigure system configuration information.
37
Choosing a Naming Service
Preconfigurable System Information Preconfigurable With the sysidcfg File? Preconfigurable With the Naming Service?
Netmask Yes No
DHCP Yes No
IPv6 Yes No
Language (locale) in which to display the install Yes Yes, if NIS or NIS+
program and desktop
No, if DNS or LDAP
Web proxy No No
You can configure this information
with the Solaris installation
program, but not through the
sysidcfg file or the naming service.
Date and time hosts. Specify the timehost alias next to the host name of the system
that will provide the date and time for the systems that are being
installed.
Netmask netmasks
You cannot preconfigure the locale for a system with the DNS or LDAP name service. If you use
the NIS or NIS+ name service, follow the procedure below to use your naming service to
preconfigure the locale for a system.
Note – In order to successfully preconfigure your system locale by using NIS or NIS+, the
following requirements must be met:
■ You must boot the system from the network by using the following command:
ok boot net
You can use options with this command. See details in Step 2 of the“SPARC: To Install the
Client Over the Network (DVD)” on page 75 procedure.
■ The NIS or NIS+ server must be available to access during the installation.
If these requirements are fulfilled, the installer uses the preconfigured settings and does not
prompt for the locale during the installation. If either requirement is not fulfilled, the installer
prompts for your locale information during the installation.
■ “To Preconfigure the Locale Using NIS” on page 40
■ “To Preconfigure the Locale Using NIS+” on page 42
a. Insert this shell procedure after the last variable.time shell procedure.
locale.time: $(DIR)/locale
-@if [ -f $(DIR)/locale ]; then \
sed -e "/^#/d" -e s/#.*$$// $(DIR)/locale \
| awk ’{for (i = 2; i<=NF; i++) print $$i, $$0}’ \
| $(MAKEDBM) - $(YPDBDIR)/$(DOM)/locale.byname; \
touch locale.time; \
echo "updated locale"; \
if [ ! $(NOPUSH) ]; then \
$(YPPUSH) locale.byname; \
echo "pushed locale"; \
else \
: ; \
fi \
else \
echo "couldn’t find $(DIR)/locale"; \
fi
b. Find the string all: and, at the end of the list of variables, insert the word locale.
all: passwd group hosts ethers networks rpc services protocols \
netgroup bootparams aliases publickey netid netmasks c2secure \
timezone auto.master auto.home locale
c. Near the end of the file, after the last entry of its type, insert the string locale:
locale.time on a new line.
passwd: passwd.time
group: group.time
hosts: hosts.time
ethers: ethers.time
networks: networks.time
rpc: rpc.time
services: services.time
protocols: protocols.time
netgroup: netgroup.time
bootparams: bootparams.time
aliases: aliases.time
publickey: publickey.time
netid: netid.time
passwd.adjunct: passwd.adjunct.time
group.adjunct: group.adjunct.time
netmasks: netmasks.time
timezone: timezone.time
auto.master: auto.master.time
auto.home: auto.home.time
locale: locale.time
3 Create the file /etc/locale and make one entry for each domain or specific system:
Note – Locales are available on the Solaris DVD or Solaris Software - 1 CD.
If you plan to use the NIS name service in a custom JumpStart installation, you need to create a
profile and a rules.ok file. For more information, see Chapter 2, “Custom JumpStart
(Overview),” in Solaris 10 10/09 Installation Guide: Custom JumpStart and Advanced
Installations.
See Also For more information about the NIS name service, see Part III, “NIS Setup and Administration,”
in System Administration Guide: Naming and Directory Services (DNS, NIS, and LDAP).
locale The locale you want to install on the system and use on the desktop after the
system is rebooted. International Language Environments Guide contains a list of
valid locales.
comment The comment field. Use double quotation marks to begin and end comments that
are longer than one word.
Note – Locales are available on the Solaris DVD or Solaris Software - 1 CD.
Systems that are specified by domain or individually in the locale table are now set up to use
the default locale. The default locale you specified is used during installation and by the desktop
after the system is rebooted.
If you plan to use the NIS+ name service in a custom JumpStart installation, you need to create a
profile and a rules.ok file. For more information, see Chapter 2, “Custom JumpStart
(Overview),” in Solaris 10 10/09 Installation Guide: Custom JumpStart and Advanced
Installations.
See Also For more information about the NIS+ name service, see System Administration Guide: Naming
and Directory Services (NIS+).
A primary benefit of DHCP is its ability to manage IP address assignments through leasing.
Leasing allows IP addresses to be reclaimed when not in use and reassigned to other clients.
This ability enables a site to use a smaller pool of IP address than would be needed if all clients
were assigned a permanent address.
You can use DHCP to install the Solaris OS on certain client systems on your network. All
SPARC based systems that are supported by the Solaris OS and x86 based systems that meet the
hardware requirements for running the Solaris OS can use this feature.
The following task map shows the high-level tasks that must be performed to enable clients to
obtain installation parameters by using DHCP.
TABLE 3–2 Task Map: Preconfiguring System Configuration Information With the DHCP Service
Set up an install server. Set up a Solaris server to support Chapter 4, “Installing From the
clients that must install the Solaris Network (Overview)”
OS from the network.
Set up client systems for Solaris Use add_install_client -d to Using Solaris DVD:
installation over the network by add DHCP network installation
“Adding Systems to Be Installed
using DHCP. support for a class of client (of a
From the Network With a DVD
certain machine type, for example)
Image” on page 69
or a particular client ID.
Using Solaris CD:
“Adding Systems to Be Installed
From the Network With a CD
Image” on page 92
add_install_client(1M)
Prepare your network to use the Decide how you want to configure Chapter 13, “Planning for DHCP
DHCP service. your DHCP server. Service (Tasks),” in System
Administration Guide: IP Services
Configure the DHCP server. Use DHCP Manager to configure Chapter 14, “Configuring the
your DHCP server DHCP Service (Tasks),” in System
Administration Guide: IP Services
Create DHCP options for Use DHCP Manager or dhtadm to “Creating DHCP Options and
installation parameters and macros create new Vendor options and Macros for Solaris Installation
that include the options. macros that the DHCP server can Parameters” on page 44
use to pass installation information
to the clients.
You can customize the options and macros in your DHCP service to perform the following
types of installations.
■ Class-specific installations – You can instruct the DHCP service to perform a network
installation for all clients of a specific class. For example, you can define a DHCP macro that
performs the same installation on all Sun Blade systems on the network. Use the output of
the add_install_client -d command to set up a class-specific installation.
■ Network-specific installations – You can instruct the DHCP service to perform a network
installation for all clients in a specific network. For example, you can define a DHCP macro
that performs the same installation on all systems in the 192.168.2 network.
■ Client-specific installations –You can instruct the DHCP service to perform a network
installation for a client with a specific Ethernet address. For example, you can define a
DHCP macro that performs a specific installation on the client with the Ethernet address
00:07:e9:04:4a:bf. Use the output of the add_install_client -d -e ethernet_address
command to set up a client-specific installation.
For more information on setting up clients to use a DHCP server for a network installation, see
the following procedures.
■ For network installations that use DVD media, see “Adding Systems to Be Installed From
the Network With a DVD Image” on page 69.
■ For network installations that use CD media, see “Adding Systems to Be Installed From the
Network With a CD Image” on page 92.
For detailed information on DHCP options, see “DHCP Option Information” in System
Administration Guide: IP Services.
TABLE 3–4 Values for Creating Vendor Category Options for Solaris Clients
Name Code Data Type Granularity Maximum Vendor Client Classes * Description
The following Vendor category options are required to enable a DHCP server to support Solaris installation clients. The options are used
in the Solaris client's startup scripts.
Note – Vendor client classes that are listed here are examples only. You should specify client classes that indicate the actual clients in
your network that you need to install from the network.
TABLE 3–4 Values for Creating Vendor Category Options for Solaris Clients (Continued)
Name Code Data Type Granularity Maximum Vendor Client Classes * Description
The following options can be used by the client startup scripts, but are not required by the scripts.
Note – Vendor client classes that are listed here are examples only. You should specify client classes that indicate the actual clients in
your network that you need to install from the network.
TABLE 3–4 Values for Creating Vendor Category Options for Solaris Clients (Continued)
Name Code Data Type Granularity Maximum Vendor Client Classes * Description
The following options are not currently used by the Solaris client startup scripts. You can use them only if you edit the startup scripts.
Note – Vendor client classes that are listed here are examples only. You should specify client classes that indicate the actual clients in
your network that you need to install from the network.
When you have created the options, you can create macros that include those options. The
following table lists sample macros you can create to support Solaris installation for clients.
xxx.xxx.xxx.xxx network address BootSrvA option could be added to existing network address macros. The value of BootSrvA
macros should indicate the tftboot server.
The macro names that are listed in the previous table match the Vendor client classes of the
clients that must install from the network. These names are examples of clients you might have
on your network. See “Working With DHCP Options (Task Map)” in System Administration
Guide: IP Services for information about determining a client's vendor client class.
You can create these options and macros by using the following methods.
■ Create the options and macros in DHCP Manager. See “Using DHCP Manager to Create
Install Options and Macros” on page 49 for instructions about how to create options and
macros in DHCP Manager.
■ Write a script that creates the options and macros by using the dhtadm command. See
“Writing a Script That Uses dhtadm to Create Options and Macros” on page 52 for
information about how to write scripts that create these options and macros.
Note that the total size of the vendor options that are provided to a particular client must not
exceed 255 bytes, including the option codes and length information. This is a limitation of the
current Solaris DHCP protocol implementation. Generally, you should pass the minimum
amount of vendor information needed. You should use short path names in options that
require path names. If you create symbolic links to long paths, you can use the shorter link
names.
5 Type the option name for the first option, then type values appropriate for that option.
Use the output of the add_install_client command , Table 3–3, and Table 3–4 to check the
option names and values for options you must create. Notice that the vendor client classes are
only suggested values. You should create classes to indicate the actual client types that need to
obtain Solaris installation parameters from the DHCP service. See “Working With DHCP
Options (Task Map)” in System Administration Guide: IP Services for information about how to
determine a client's vendor client class.
9 Type the name of another option, then modify other values appropriately.
The values for code, data type, granularity, and maximum are most likely to need modification.
See Table 3–3 and Table 3–4 for the values.
10 Repeat Step 7 through Step 9 until you have created all the options.
You can now create macros to pass the options to network installation clients, as explained in
the following procedure.
Note – You do not need to add these options to a Solaris client's /etc/dhcp/inittab file because
they are already included in that file.
6 Select an option you want to add to the macro and click OK.
8 Repeat Step 6 through Step 7 for each option you want to include.
To include another macro, type Include as the option name and type the macro name as the
option value.
If you plan to use DHCP in a WAN boot installation, you need to perform additional tasks. For
more information, see Chapter 10, “WAN Boot (Overview).”
If you plan to use DHCP in a custom JumpStart installation, you need to create a profile and a
rules.ok file. For more information, see Chapter 2, “Custom JumpStart (Overview),” in
Solaris 10 10/09 Installation Guide: Custom JumpStart and Advanced Installations.
See Also For more information about DHCP, see Part III, “DHCP,” in System Administration Guide: IP
Services.
# Load the Solaris vendor specific options. We’ll start out supporting
# the Sun-Blade-1000, Sun-Fire-880, and i86 platforms. Note that the
# SUNW.i86pc option only applies for the Solaris 10 3/05 release.
# Changing -A to -M would replace the current values, rather than add them.
dhtadm -A -s SrootOpt -d \
’Vendor=SUNW.Sun-Blade-1000 SUNW.Sun-Fire-880 SUNW.i86pc,1,ASCII,1,0’
dhtadm -A -s SrootIP4 -d \
’Vendor=SUNW.Sun-Blade-1000 SUNW.Sun-Fire-880 SUNW.i86pc,2,IP,1,1’
dhtadm -A -s SrootNM -d \
’Vendor=SUNW.Sun-Blade-1000 SUNW.Sun-Fire-880 SUNW.i86pc,3,ASCII,1,0’
dhtadm -A -s SrootPTH -d \
’Vendor=SUNW.Sun-Blade-1000 SUNW.Sun-Fire-880 SUNW.i86pc,4,ASCII,1,0’
dhtadm -A -s SswapIP4 -d \
’Vendor=SUNW.Sun-Blade-1000 SUNW.Sun-Fire-880 SUNW.i86pc,5,IP,1,0’
dhtadm -A -s SswapPTH -d \
’Vendor=SUNW.Sun-Blade-1000 SUNW.Sun-Fire-880 SUNW.i86pc,6,ASCII,1,0’
dhtadm -A -s SbootFIL -d \
’Vendor=SUNW.Sun-Blade-1000 SUNW.Sun-Fire-880 SUNW.i86pc,7,ASCII,1,0’
dhtadm -A -s Stz -d \
’Vendor=SUNW.Sun-Blade-1000 SUNW.Sun-Fire-880 SUNW.i86pc,8,ASCII,1,0’
dhtadm -A -s SbootRS -d \
’Vendor=SUNW.Sun-Blade-1000 SUNW.Sun-Fire-880 SUNW.i86pc,9,NUMBER,2,1’
dhtadm -A -s SinstIP4 -d \
’Vendor=SUNW.Sun-Blade-1000 SUNW.Sun-Fire-880 SUNW.i86pc,10,IP,1,1’
dhtadm -A -s SinstNM -d \
’Vendor=SUNW.Sun-Blade-1000 SUNW.Sun-Fire-880 SUNW.i86pc,11,ASCII,1,0’
dhtadm -A -s SinstPTH -d \
’Vendor=SUNW.Sun-Blade-1000 SUNW.Sun-Fire-880 SUNW.i86pc,12,ASCII,1,0’
dhtadm -A -s SsysidCF -d \
’Vendor=SUNW.Sun-Blade-1000 SUNW.Sun-Fire-880 SUNW.i86pc,13,ASCII,1,0’
dhtadm -A -s SjumpsCF -d \
’Vendor=SUNW.Sun-Blade-1000 SUNW.Sun-Fire-880 SUNW.i86pc,14,ASCII,1,0’
dhtadm -A -s Sterm -d \
’Vendor=SUNW.Sun-Blade-1000 SUNW.Sun-Fire-880 SUNW.i86pc,15,ASCII,1,0’
dhtadm -A -s SbootURI -d \
’Vendor=SUNW.Sun-Blade-1000 SUNW.Sun-Fire-880 SUNW.i86pc,16,ASCII,1,0’
dhtadm -A -s SHTTPproxy -d \
’Vendor=SUNW.Sun-Blade-1000 SUNW.Sun-Fire-880 SUNW.i86pc,17,ASCII,1,0’
# Load some useful Macro definitions.
# Define all Solaris-generic options under this macro named Solaris.
dhtadm -A -m Solaris -d \
’:SrootIP4=10.21.0.2:SrootNM="blue2":SinstIP4=10.21.0.2:SinstNM="red5":’
# Define all sparc-platform specific options under this macro named sparc.
dhtadm -A -m sparc -d \
’:SrootPTH="/export/sparc/root":SinstPTH="/export/sparc/install":’
# Define all sun4u architecture-specific options under this macro named sun4u.
# (Includes Solaris and sparc macros.)
dhtadm -A -m sun4u -d ’:Include=Solaris:Include=sparc:’
# Solaris on IA32-platform-specific parameters are under this macro named i86pc.
# Note that this macro applies only for the Solaris 10 3/05 release.
dhtadm -A -m i86pc -d \
’:Include=Solaris:SrootPTH="/export/i86pc/root":SinstPTH="/export/i86pc/install"\
:SbootFIL="/platform/i86pc/kernel/unix":’
# Solaris on IA32 machines are identified by the "SUNW.i86pc" class. All
# clients identifying themselves as members of this class will see these
# parameters in the macro called SUNW.i86pc, which includes the i86pc macro.
# Note that this class only applies for the Solaris 10 3/05 release.
dhtadm -A -m SUNW.i86pc -d ’:Include=i86pc:’
# Sun-Blade-1000 platforms identify themselves as part of the
# "SUNW.Sun-Blade-1000" class.
# All clients identifying themselves as members of this class
# will see these parameters.
dhtadm -A -m SUNW.Sun-Blade-1000 -d \
’:SbootFIL="/platform/sun4u/kernel/sparcv9/unix":\
Include=sun4u:’
# Sun-Fire-880 platforms identify themselves as part of the "SUNW.Sun-Fire-880" class.
# All clients identifying themselves as members of this class will see these parameters.
dhtadm -A -m SUNW.Sun-Fire-880 -d \
’:SbootFIL="/platform/sun4u/kernel/sparcv9/unix":Include=sun4u:’
# Add our boot server IP to each of the network macros for our topology served by our
# DHCP server. Our boot server happens to be the same machine running our DHCP server.
dhtadm -M -m 10.20.64.64 -e BootSrvA=10.21.0.2
dhtadm -M -m 10.20.64.0 -e BootSrvA=10.21.0.2
dhtadm -M -m 10.20.64.128 -e BootSrvA=10.21.0.2
dhtadm -M -m 10.21.0.0 -e BootSrvA=10.21.0.2
dhtadm -M -m 10.22.0.0 -e BootSrvA=10.21.0.2
# Make sure we return host names to our clients.
dhtadm -M -m DHCP-servername -e Hostname=_NULL_VALUE_
# Create a macro for PXE clients that want to boot from our boot server.
# Note that this macro applies for the Solaris 10 3/05 release.
dhtadm -A -m PXEClient:Arch:00000:UNDI:002001 -d \
:BootFile=nbp.i86pc:BootSrvA=10.21.0.2:
# Create a macro for PXE clients that want to boot from our boot server.
# Note that this macro applies for the Solaris 10 2/06 release.
dhtadm -A -m PXEClient:Arch:00000:UNDI:002001 -d \
:BootFile=i86pc:BootSrvA=10.21.0.2:
# Create a macro for the x86 based client with the Ethernet address 00:07:e9:04:4a:bf
# to install from the network by using PXE.
dhtadm -A -m 010007E9044ABF -d :BootFile=010007E9044ABF:BootSrvA=10.21.0.2:
# The client with this MAC address is a diskless client. Override the root settings
# which at the network scope setup for Install with our client’s root directory.
dhtadm -A -m 0800201AC25E -d \
’:SrootIP4=10.23.128.2:SrootNM="orange-svr-2":SrootPTH="/export/root/10.23.128.12":’
As superuser, execute dhtadm in batch mode. Specify the name of the script to add the options
and macros to your dhcptab. For example, if your script is named netinstalloptions, type the
following command.
# dhtadm -B netinstalloptions
Clients that have vendor client classes that are listed in the Vendor= string can now use DHCP to
install over the network.
For more information about how to use the dhtadm command, see dhtadm(1M). For more
information about the dhcptab file, see dhcptab(4).
55
56
4
C H A P T E R 4
This chapter provides an introduction on how to set up your local area network and systems to
install the Solaris software from the network instead of from DVD or CD media. This chapter
provides overview information on the following topics.
■ “Network Installation Introduction” on page 57
■ “x86: Overview of Booting and Installing Over the Network With PXE” on page 59
For information on how to install a client over a wide area network, see Chapter 10, “WAN
Boot (Overview).”
57
Network Installation Introduction
After you copy the image from the Solaris Software CDs, you can also copy the image
from the Solaris Languages CDs as necessary for your installation requirements.
You can enable a single install server to provide disc images for different Solaris releases and
for multiple platforms by copying the images on to the install server's hard disk. For
example, a single install server could contain the disc images for the SPARC platform and
x86 platform.
For details about how to create an install server, refer to one of the following sections.
■ “To Create an Install Server With SPARC or x86 DVD Media” on page 64
■ “SPARC: To Create an Install Server With SPARC or x86 CD Media” on page 86
■ Boot server – A server system that provides client systems on the same network subnet with
the information that they need to boot in order to install the OS. A boot server and install
server are typically the same system. However, if the system on which the current Solaris
release is to be installed is located in a different subnet than the install server and you are not
using DHCP, a boot server is required on that subnet.
A single boot server can provide current Solaris release boot software for multiple releases,
including the current Solaris release boot software for different platforms. For example, a
SPARC boot server can provide the Solaris 9 and current Solaris release boot software for
SPARC based systems. The same SPARC boot server can also provide the current Solaris
release boot software for x86 based systems.
Note – When using DHCP, you do not need to create a separate boot server. For more
information, see “Preconfiguring System Configuration Information With the DHCP
Service (Tasks)” on page 43.
For details about how to create a boot server, refer to one of the following sections:
■ “Creating a Boot Server on a Subnet With a DVD Image” on page 67
■ “Creating a Boot Server on a Subnet With a CD Image” on page 90
■ (Optional) DHCP server – A server that uses the Dynamic Host Configuration Protocol
(DHCP) to provide the network parameters that are necessary for installation. You can
configure a DHCP server to configure and install specific clients, all clients on a specific
network, or an entire class of clients. When using DHCP, you do not need to create a
separate boot server.
After you have created the install server, you add clients to the network with the
add_install_client command and the -d option. The -d option enables you to set up
client systems for Solaris installation from the network by using DHCP.
For information on DHCP options for installation parameters, see “Preconfiguring System
Configuration Information With the DHCP Service (Tasks)” on page 43.
■ (Optional) Name server – A system that manages a distributed network database, such as
DNS, NIS, NIS+, or LDAP, that contains information about systems on the network.
For details about how to create a name server, refer to System Administration Guide: Naming
and Directory Services (DNS, NIS, and LDAP).
Note – The install server and name server can be the same or different systems.
Figure 4–1 illustrates the servers that are typically used for network installation. Note that this
sample network does not include a DHCP server.
Name Install/Boot OS
server server server
Subnet
PXE network boot is available only for devices that implement the Intel Preboot Execution
Environment specification. To determine if your system supports PXE network boot, see your
hardware manufacturer's documentation.
When you are preparing to use PXE to install a client over the network, consider the following
issues.
■ Set up only one DHCP server on the subnet that includes the client system that you want to
install. The PXE network boot does not work properly over subnets that include multiple
DHCP servers.
■ Some early versions of PXE firmware have a variety of shortcomings. If you experience
difficulty with a particular PXE adapter, obtain firmware upgrade information from the
adapter manufacturer's web site. Refer to the elxl(7D) and iprb(7D) man pages for more
information.
This chapter describes how to use DVD media to set up your network and systems to install the
Solaris software from the network. Network installations enable you to install the Solaris
software from a system that has access to the current Solaris release disc images, called an install
server, to other systems on the network. You copy the contents of the current Solaris release
DVD media to the install server's hard disk. Then, you can install the Solaris software from the
network by using any of the Solaris installation methods.
61
Task Map: Installing From the Network With DVD Media
Note –
■ Starting with the Solaris 10 11/06 release, you have the option during an initial installation
to change the network security settings so that all network services, except Secure Shell, are
disabled or restricted to respond to local requests only. This security option is available only
during an initial installation, not during an upgrade. An upgrade maintains any previously
set services. If necessary, you can restrict network services after an upgrade by using the
netservices command. See “Planning Network Security” in Solaris 10 10/09 Installation
Guide: Planning for Installation and Upgrade.
The network services can be enabled after installation by using the netservices open
command or by enabling individual services by using SMF commands. See “Revising
Security Settings After Installation” in Solaris 10 10/09 Installation Guide: Planning for
Installation and Upgrade.
■ Starting with the Solaris 10 10/08 release, the structure of the Solaris DVD and Solaris
Software - 1 CD has changed for the SPARC platform. Slice 0 is no longer at the top of the
directory structure. Therefore, the structure of the x86 and SPARC DVDs and Solaris
Software - 1 CD are the same. This change in structure makes setting up an install server
easier if you have a mix of platforms, such as a SPARC install server and x86 media.
(x86 only): Verify that If you want to install an x86 based system over the Check your hardware
your system supports network, confirm that your machine can use PXE to manufacturer's
PXE. boot without local boot media. documentation or the system
BIOS.
If your x86 based system does not support PXE, you
must boot the system from a local DVD or CD.
Choose an installation The Solaris OS provides several methods for “Choosing a Solaris
method. installation or upgrade. Choose the installation Installation Method” in
method that is most appropriate for your Solaris 10 10/09 Installation
environment. Guide: Planning for
Installation and Upgrade
TABLE 5–1 Task Map: Setting Up an Install Server With DVD Media (Continued)
Task Description For Instructions
Gather information Use the checklist and complete the worksheet to Chapter 5, “Gathering
about your system. collect all of the information that you need to install Information Before
or upgrade. Installation or Upgrade
(Planning),” in
Solaris 10 10/09 Installation
Guide: Planning for
Installation and Upgrade
(Optional) Preconfigure You can preconfigure system information to avoid Chapter 2, “Preconfiguring
system information. being prompted for the information during the System Configuration
installation or upgrade. Information (Tasks)”
Create an install server. Use the setup_install_server(1M) command to “Creating an Install Server
copy the Solaris DVD to the install server's hard With DVD Media” on
disk. page 64
(Optional) Create boot If you want to install systems from the network that “Creating a Boot Server on a
servers. are not on the same subnet as the install server, you Subnet With a DVD Image”
must create a boot server on the subnet to boot the on page 67
systems. Use the setup_install_server command
with the -b option to set up a boot server. If you are
using Dynamic Host Configuration Protocol
(DHCP), a boot server is not necessary.
(Optional) Configure If you want to use DHCP to provide system Chapter 13, “Planning for
the DHCP server. configuration and installation parameters, DHCP Service (Tasks),” in
configure the DHCP server, then create the System Administration
appropriate options and macros for your Guide: IP Services
installation.
“Preconfiguring System
Note – If you want to install an x86 based system Configuration Information
from the network with PXE, you must configure a With the DHCP Service
DHCP server. (Tasks)” on page 43
Install the system over Begin the installation by booting the system from “Installing the System From
the network. the network. the Network With a DVD
Image” on page 74
Note – This procedure assumes that the system is running the Volume Manager. If you are not
using the Volume Manager to manage media, refer to System Administration Guide: Devices
and File Systems.
1 On the system that is to become the install server, become superuser or assume an equivalent
role.
The system must include a DVD-ROM drive and be part of the site's network and naming
service. If you use a naming service, the system must already be in a service, such as NIS, NIS+,
DNS, or LDAP. If you do not use a naming service, you must distribute information about this
system by following your site's policies.
5 Copy the DVD image in the drive to the install server's hard disk.
# ./setup_install_server install_dir_path
install_dir_path Specifies the directory where the DVD image is to be copied
Note – The setup_install_server command indicates whether you have enough disk space
available for the Solaris Software disc images. To determine available disk space, use the df -kl
command.
6 Decide if you need to make the install server available for mounting.
■ If the install server is on the same subnet as the system to be installed or you are using DHCP,
you do not need to create a boot server. Proceed to Step 7.
■ If the install server is not on the same subnet as the system to be installed and you are not
using DHCP, complete the following steps.
a. Verify that the path to the install server's image is shared appropriately.
# share | grep install_dir_path
install_dir_path Specifies the path to the installation image where the DVD image
was copied
■ If the path to the install server's directory is displayed and anon=0 is displayed in the
options, proceed to Step 7.
■ If the path to the install server's directory is not displayed or you do not have anon=0
in the options, continue.
■ If the install server is running the current Solaris release, or compatible version, type
the following command.
# svcs -l svc:/network/nfs/server:default
If the nfsd daemon is online, continue to Step d. If the nfsd daemon is not online,
start it.
■ If the install server is running the Solaris 9 OS, or compatible version, type the
following command.
# ps -ef | grep nfsd
If the nfsd daemon is running, continue to Step d. If the nfsd daemon is not running,
start it.
# /etc/init.d/nfs.server start
9 (Optional) Patch the files that are located in the miniroot on the net install image that was
created by setup_install_server.
Patching a file might be necessary if a boot image has problems. For step-by-step procedures,
see Chapter 7, “Patching the Miniroot Image (Tasks).”
■ If you are using DHCP or the install server is on the same subnet as the system to be installed,
you do not need to create a boot server. Proceed to “Adding Systems to Be Installed From the
Network With a DVD Image”on page 69.
■ If you are not using DHCP and the install server and the client are on a different subnet, you
must create a boot server. Proceed to “Creating a Boot Server on a Subnet With a DVD Image”
on page 67.
# mkdir -p /export/home/dvd
# cd /cdrom/cdrom0/Solaris_10/Tools
# ./setup_install_server /export/home/dvd
If you need a separate boot server, make the install server available to the boot server.
Using the share command, add this entry to the /etc/dfs/dfstab file.
Check if the nfsd daemon is online. If the nfsd daemon is not online, start it and share it.
# svcs -l svc:/network/nfs/server:default
# svcadm enable svc:/network/nfs/server
# shareall
# cd /
If you are not using DHCP, and your client system is on a different subnet than your install
server, you must create a boot server. For more information, see “Creating a Boot Server on a
Subnet With a DVD Image” on page 67.
See Also For additional information about the setup_install_server and the
add_to_install_server commands, see install_scripts(1M).
Note – The setup_install_server command indicates whether you have enough disk space
available for the images. To determine available disk space, use the df -kl command.
See Also For additional information about the setup_install_server command, see
install_scripts(1M).
Use the following add_install_client procedure for setting up install servers and clients.
Also, see the example procedures for the following:
■ If you are using DHCP to set installation parameters for a SPARC client, see Example 5–3.
■ If your install server and client are on the same subnet, see Example 5–4.
■ If your install server and your client are not on the same subnet and you are not using
DHCP, see Example 5–5.
■ If you are using DHCP to set installation parameters for x86 clients, see Example 5–6.
■ If you want to use a specific serial port to display output during the installation of an x86
based system, see Example 5–7.
For more options to use with this command, see the man page, add_install_client(1M).
Use the following add_install_client procedure for set up an x86 client to install from the
network.
Before You Begin If you have a boot server, make sure you have shared the install server installation image and
started the appropriate services. See “To Create a SPARC Install Server With SPARC or x86
DVD Media” Step 6.
Each system that you want to install needs to find the following items.
■ Install server
■ Boot server if it is required
■ sysidcfg file if you use a sysidcfg file to preconfigure system information
■ Name server if you use a naming service to preconfigure system information
■ The profile in the JumpStart directory on the profile server if you are using the custom
JumpStart installation method
1 On the install server or boot server, become superuser or assume an equivalent role.
2 If you use the NIS, NIS+, DNS, or LDAP naming service, verify that the following information
about the system to be installed has been added to the naming service.
■ Host name
■ IP address
■ Ethernet address
For more information on naming services, see System Administration Guide: Naming and
Directory Services (DNS, NIS, and LDAP).
a. On the client, find the ethers address. The /etc/ethers map is taken from the local file.
# ifconfig -a grep ether
ether 8:0:20:b3:39:1d
b. On the install server, open the /etc/ethers file in an editor. Add the address to the list.
For x86 clients, use this option to boot the systems from the network by using PXE network
boot. The output of this option lists the DHCP options you need to create on the DHCP
server.
For more information about class-specific installations by using DHCP, see “Creating DHCP
Options and Macros for Solaris Installation Parameters” on page 44.
-s install_server:install_dir_path
Specifies the name and path to the install server.
■ install_server is the host name of the install server.
■ install_dir_path is the absolute path to the Solaris DVD image.
-c jumpstart_server:jumpstart_dir_path
Specifies a JumpStart directory for custom JumpStart installations. jumpstart_server is the
host name of the server on which the JumpStart directory is located. jumpstart_dir_path is
the absolute path to the JumpStart directory.
-p sysid_server:path
Specifies the path to the sysidcfg file for preconfiguring system information. sysid_server is
either a valid host name or an IP address for the server that contains the file. path is the
absolute path to the directory containing the sysidcfg file.
-t boot_image_path
Specifies the path to an alternate boot image if you want to use a boot image other than the
one in the Tools directory on the current Solaris release net installation image, CD, or DVD.
-b “boot-property=value”
x86 based systems only: Enables you to set the value of a boot property variable that you
want to use to boot the client from the network. The -b option must be used with the -e
option.
The nbp. prefix is not used in boot file names. For example, if you specify -e
00:07:e9:04:4a:bf for an x86 based client, the command creates the boot file
010007E9044ABF.i86pc in the /tftpboot directory. However, the current Solaris release
supports the use of legacy boot files with the nbp. prefix.
For more information about client-specific installations by using DHCP, see “Creating
DHCP Options and Macros for Solaris Installation Parameters” on page 44.
client_name
Is the name of the system to be installed from the network. This name is not the host name of
the install server.
platform_group
Is the platform group of the system to be installed. For more information, see “Platform
Names and Groups” in Solaris 10 10/09 Installation Guide: Planning for Installation and
Upgrade.
Example 5–3 SPARC: Adding a SPARC Install Client on a SPARC Install Server When Using DHCP
(DVD)
The following example illustrates how to add an install client when you are using DHCP to set
installation parameters on the network. The install client is named basil, which is an UltraTM 5
system. The file system /export/home/dvdsparc/Solaris_10/Tools contains the
add_install_client command.
For more information on how to use DHCP to set installation parameters for network
installations, see “Preconfiguring System Configuration Information With the DHCP Service
(Tasks)” on page 43.
sparc_install_server# cd /export/home/dvdsparc/Solaris_10/Tools
sparc_install_server# ./add_install_client -d basil sun4u
Example 5–4 Adding an Install Client That Is On the Same Subnet As Its Server (DVD)
The following example illustrates how to add an install client that is on the same subnet as the
install server. The install client is named basil, which is an Ultra 5 system. The file system
/export/home/dvdsparc/ contains the add_install_client command.
install_server# cd /export/home/dvdsparc/Solaris_10/Tools
install_server# ./add_install_client basil sun4u
boot_server# cd /export/home/dvdsparc/Solaris_10/Tools
boot_server# ./add_install_client -s rosemary:/export/home/dvdsparc rose sun4u
Example 5–6 x86: Adding a Single x86 Install Client on an x86 Install Server When Using DHCP
(DVD)
The following example illustrates how to add an x86 install client to an install server when you
are using DHCP to set installation parameters on the network.
■ The -d option is used to specify that clients are to use the DHCP protocol for configuration.
If you plan to use PXE network boot, you must use the DHCP protocol.
■ The -e option indicates that this installation will only occur on the client with the Ethernet
address 00:07:e9:04:4a:bf .
■ The -s option is used to specify that the clients are to be installed from the install server that
is named rosemary.
This server contains a Solaris Operating System for x86 Platforms DVD image in
/export/home/dvdx86.
x86_install_server# cd /export/boot/dvdx86/Solaris_10/Tools
x86_install_server# ./add_install_client -d -e 00:07:e9:04:4a:bf \
-s rosemary:/export/home/dvdx86 i86pc
The previous commands set up the client with the Ethernet address 00:07:e9:04:4a:bf as an
installation client. The boot file 010007E9044ABF.i86pc is created on the installation server. In
previous releases, this boot file was named nbp.010007E9044ABF.i86pc.
For more information on how to use DHCP to set installation parameters for network
installations, see “Preconfiguring System Configuration Information With the DHCP Service
(Tasks)” on page 43.
Example 5–7 x86: Specifying a Serial Console to Use During a Network Installation (DVD)
The following example illustrates how to add an x86 install client to an install server and specify
a serial console to use during the installation. This example sets up the install client in the
following manner.
■ The -d option indicates that the client is set up to use DHCP to set installation parameters.
■ The -e option indicates that this installation will occur only on the client with the Ethernet
address 00:07:e9:04:4a:bf.
■ The -b option instructs the installation program to use the serial port ttya as an input and
an output device.
For a complete description of the boot property variables and values you can use with the -b
option, see the eeprom(1M) man page.
x86 based systems: If you are not using a DHCP server, you must boot the system from a local
Solaris OS DVD or CD.
See Also For additional information about the add_install_client command, see
install_scripts(1M).
Note – If you have a system that contains non-global zones, Solaris Live Upgrade is the
recommended upgrade program or program to add patches. Other upgrade programs
might require extensive upgrade time, because the time required to complete the
upgrade increases linearly with the number of installed non-global zones.
For information about upgrading with Solaris Live Upgrade, see Part I, “Upgrading
With Solaris Live Upgrade,” in Solaris 10 10/09 Installation Guide: Solaris Live Upgrade
and Upgrade Planning.
■ Create a sysidcfg file if you use a sysidcfg file to preconfigure system information. For
information about how to create a sysidcfg file, see “Preconfiguring With the sysidcfg
File” on page 18.
■ Set up a name server if you use a naming service to preconfigure system information. For
information about how to preconfigure information with a naming service, see
“Preconfiguring With the Naming Service” on page 39.
■ Create a profile in the JumpStart directory on the profile server if you are using the
custom JumpStart installation method. For information about how to set up a custom
JumpStart installation, see Chapter 3, “Preparing Custom JumpStart Installations
(Tasks),” in Solaris 10 10/09 Installation Guide: Custom JumpStart and Advanced
Installations.
■ To install with the Solaris interactive installation GUI, type the following command.
ok boot net
■ To install with the Solaris interactive text installer in a desktop session, type the following
command.
ok boot net - text
■ To install with the Solaris interactive text installer in a console session, type the following
command.
ok boot net - nowin
The system boots from the network.
4 If you are prompted, answer any additional questions to complete your installation.
■ If you preconfigured all of the installation options, the installation program does not prompt
you to enter any installation information. See Chapter 2,“Preconfiguring System
Configuration Information (Tasks),”for more information.
■ If you did not preconfigure all the installation options, use the “Checklist for Installation”in
Solaris 10 10/09 Installation Guide: Planning for Installation and Upgrade to help you answer
the installation questions.
See Also For information about how to complete an interactive installation with the Solaris installation
GUI, see “To Install or Upgrade With the Solaris Installation Program With GRUB” in
Solaris 10 10/09 Installation Guide: Basic Installations.
To install the system over the network, you must instruct the client system to boot over the
network. Enable network boot on the client system by using the BIOS setup program in the
system BIOS, the network adapter BIOS, or both. On some systems, you must also adjust the
boot device priority list so that network boot is attempted before booting from other devices.
See the manufacturer's documentation for each setup program, or watch for setup program
instructions during boot.
Before You Begin This procedure assumes that you have completed the following tasks.
■ Set up an install server. For instructions about how to create an install server from DVD
media, see “To Create an Install Server With SPARC or x86 DVD Media” on page 64.
■ Set up a boot server or a DHCP server, if necessary. If the system you want to install is on a
different subnet than the installation server, you must set up a boot server, or use a DHCP
server. For instructions about how to set up a boot server, see “Creating a Boot Server on a
Subnet With a DVD Image” on page 67. For instructions about how to set up a DHCP server
to support network installations, see “Preconfiguring System Configuration Information
With the DHCP Service (Tasks)” on page 43.
■ Gathered or preconfigured the information you need to install. You can perform this task in
one or more of the following ways.
■ Gather the information in “Checklist for Installation” in Solaris 10 10/09 Installation
Guide: Planning for Installation and Upgrade.
Note – If you have a system that contains non-global zones, Solaris Live Upgrade is the
recommended upgrade program or program to add patches. Other upgrade programs
might require extensive upgrade time, because the time required to complete the
upgrade increases linearly with the number of installed non-global zones.
For information about upgrading with Solaris Live Upgrade, see Part I, “Upgrading
With Solaris Live Upgrade,” in Solaris 10 10/09 Installation Guide: Solaris Live Upgrade
and Upgrade Planning.
■ Create a sysidcfg file if you use a sysidcfg file to preconfigure system information. For
information about how to create a sysidcfg file, see “Preconfiguring With the sysidcfg
File” on page 18.
■ Set up a name server if you use a naming service to preconfigure system information. For
information about how to preconfigure information with a naming service, see
“Preconfiguring With the Naming Service” on page 39.
■ Create a profile in the JumpStart directory on the profile server if you are using the
custom JumpStart installation method. For information about how to set up a custom
JumpStart installation, see Chapter 3, “Preparing Custom JumpStart Installations
(Tasks),” in Solaris 10 10/09 Installation Guide: Custom JumpStart and Advanced
Installations.
This procedure also assumes that your system can boot from the network.
3 In the system BIOS, instruct the system to boot from the network.
See your hardware documentation for information about how to set the boot priority in the
BIOS.
Note – The GRUB menu that is displayed on your system might vary from the following sample,
depending on the configuration of your network installation server.
■ To install the Solaris OS from the network, select the appropriate Solaris entry on the menu,
then press Enter.
Select this entry if you want to install from the network installation server you set up in “To
Create an Install Server With SPARC or x86 DVD Media” on page 64.
■ To install the Solaris OS from the network with specific boot arguments, follow these steps.
You might need to set specific boot arguments if you want to modify the device
configuration during the installation, and did not set these boot arguments previously with
the add_install_client command as described in “To Add Systems to Be Installed From
the Network With add_install_client (DVD)” on page 70.
a. On the GRUB menu, select the installation option you want to edit, then press e.
Boot commands that are similar to the following text are displayed in the GRUB menu.
kernel /I86pc.Solaris_10/multiboot kernel/unix \
-B install_media=192.168.2.1:/export/cdrom0/boot \
module /platform/i86pc/boot_archive
b. Use the arrow keys to select the boot entry that you want to edit, then press e.
The boot command that you want to edit is displayed in the GRUB edit window.
c. Edit the command by typing the boot arguments or options you want to use.
The command syntax for the Grub edit menu is as follows.
grub edit>kernel /image_directory/multiboot kernel/unix/ \
install [url|ask] -B options install_media=media_type
For information about boot arguments and command syntax, see Table 9–1.
d. To accept your edits and return to the GRUB menu, press Enter.
Note – To cancel your edits and return to the GRUB menu, press Escape.
The GRUB menu is displayed. The edits you made to the boot command are displayed.
The Solaris installation program checks the default boot disk for the requirements to install or
upgrade the system. If the Solaris installation cannot detect the system configuration, the
program prompts you for any missing information.
When the check is completed, the installation selection screen is displayed.
1 Solaris Interactive
2 Custom JumpStart
3 Solaris Interactive Text (Desktop session)
4 Solaris Interactive Text (Console session)
5 Apply driver updates
6 Single user shell
■ To install with the Solaris interactive installation GUI, type 1, then press Enter.
■ To install with the interactive text installer in a desktop session, type 3, then press Enter.
Select this installation type to override the default GUI installer and run the text installer.
■ To install with the interactive text installer in a console session, type 4, then press Enter.
Select this installation type to override the default GUI installer and run the text installer.
If you want to perform an unattended custom JumpStart installation (option 2), see
Solaris 10 10/09 Installation Guide: Custom JumpStart and Advanced Installations.
For detailed information about the Solaris installation GUI and text installer, see “System
Requirements and Recommendations” in Solaris 10 10/09 Installation Guide: Planning for
Installation and Upgrade.
The system configures the devices and interfaces, and searches for configuration files.The
installation program begins. Go to Step 7 to continue the installation.
■ To perform system administration tasks before your installation, choose from the following
options.
■ To update drivers or install an install time update (ITU), insert the update media, type 5,
then press Enter.
You might need to update drivers or install an ITU to enable the Solaris OS to run on
your system. Follow the instructions for your driver update or ITU to install the update.
Note – During installation, you can choose the default NFSv4 domain name. Or, you can
specify a custom NFSv4 domain name. For further information, see “nfs4_domain
Keyword” on page 32.
If you are using the installation GUI, after you confirm the system configuration information,
the Welcome to Solaris panel appears.
8 If you are prompted, answer any additional questions to complete your installation.
■ If you preconfigured all of the installation options, the installation program does not prompt
you to enter any installation information. See Chapter 2,“Preconfiguring System
Configuration Information (Tasks),”for more information.
■ If you did not preconfigure all the installation options, use the “Checklist for Installation”in
Solaris 10 10/09 Installation Guide: Planning for Installation and Upgrade to help you answer
the installation questions.
9 After the system boots and installs over the network, instruct the system to boot from the disk
drive on subsequent boots.
Note – When you boot the system after the installation, a GRUB menu lists the operating
systems that are installed, including the newly-installed Solaris OS. Select which operating
system you want to boot. The default selection loads if you do not make another selection.
See Also For information about how to complete an interactive installation with the Solaris installation
GUI, see “To Install or Upgrade With the Solaris Installation Program With GRUB” in
Solaris 10 10/09 Installation Guide: Basic Installations.
This chapter describes how to use CD media to set up your network and systems to install the
Solaris software from the network. Network installations enable you to install the Solaris
software from a system that has access to the current Solaris release disc images, called an install
server, to other systems on the network. You copy the contents of the CD media to the install
server's hard disk. Then, you can install the Solaris software from the network by using any of
the Solaris installation methods. This chapter covers the following topics:
■ “Task Map: Installing From the Network With CD Media” on page 84
■ “Creating an Install Server With SPARC or x86 CD Media” on page 86
■ “Creating a Boot Server on a Subnet With a CD Image” on page 90
■ “Adding Systems to Be Installed From the Network With a CD Image” on page 92
■ “Installing the System From the Network With a CD Image” on page 97
83
Task Map: Installing From the Network With CD Media
Note –
■ Starting with the Solaris 10 11/06 release, you have the option during an initial installation
to change the network security settings so that all network services, except Secure Shell, are
disabled or restricted to respond to local requests only. This security option is available only
during an initial installation, not during an upgrade. An upgrade maintains any previously
set services. If necessary, you can restrict network services after an upgrade by using the
netservices command. See “Planning Network Security” in Solaris 10 10/09 Installation
Guide: Planning for Installation and Upgrade.
The network services can be enabled after installation by using the netservices open
command or by enabling individual services by using SMF commands. See “Revising
Security Settings After Installation” in Solaris 10 10/09 Installation Guide: Planning for
Installation and Upgrade.
■ Starting with the Solaris 10 10/08 release, the structure of the Solaris DVD and Solaris
Software - 1 CD has changed for the SPARC platform. Slice 0 is no longer at the top of the
directory structure. Therefore the structure of the x86 and SPARC DVDs and Solaris
Software - 1 CD are the same. This change in structure makes setting up an install server
easier if you have a mix of platforms, such as a SPARC install server and x86 media.
(x86 only): Verify that If you want to install an x86 based system over the Check your hardware
your system supports network, confirm that your machine can use PXE to manufacturer's
PXE. boot without local boot media. documentation or the system
BIOS.
If your x86 based system does not support PXE, you
must boot the system from a local DVD or CD.
Choose an installation The Solaris OS provides several methods for “Choosing a Solaris
method. installation or upgrade. Choose the installation Installation Method” in
method that is most appropriate for your Solaris 10 10/09 Installation
environment. Guide: Planning for
Installation and Upgrade
TABLE 6–1 Task Map: Setting Up an Install Server With CD Media (Continued)
Task Description For Instructions
Gather information Use the checklist and complete the worksheet to Chapter 5, “Gathering
about your system. collect all of the information that you need to install Information Before
or upgrade. Installation or Upgrade
(Planning),” in
Solaris 10 10/09 Installation
Guide: Planning for
Installation and Upgrade
(Optional) Preconfigure You can preconfigure system information to avoid Chapter 2, “Preconfiguring
system information. being prompted for the information during the System Configuration
installation or upgrade. Information (Tasks)”
Create an install server. Use the setup_install_server(1M) command to “Creating an Install Server
copy the Solaris Software - 1 CD to the install With SPARC or x86 CD
server's hard disk. Media” on page 86
Use the add_to_install_server(1M) command to
copy additional Solaris Software CDs and the Solaris
Languages CDs to the install server's hard disk.
(Optional) Create boot If you want to install systems from the network that “Creating a Boot Server on a
servers. are not on the same subnet as the install server, you Subnet With a CD Image” on
must create a boot server on the subnet to boot the page 90
systems. Use the setup_install_server command
with the -b option to set up a boot server.If you are
using Dynamic Host Configuration Protocol
(DHCP), a boot server is not necessary.
(Optional) Configure If you want to use DHCP to provide system Chapter 13, “Planning for
the DHCP server. configuration and installation parameters, DHCP Service (Tasks),” in
configure the DHCP server, then create the System Administration
appropriate options and macros for your Guide: IP Services
installation.
“Preconfiguring System
Note – If you want to install an x86 based system Configuration Information
from the network with PXE, you must configure a With the DHCP Service
DHCP server. (Tasks)” on page 43
Install the system over Begin the installation by booting the system from “Installing the System From
the network. the network. the Network With a CD
Image” on page 97
Note – This procedure assumes that the system is running the Volume Manager. If you are not
using the Volume Manager to manage media, refer to System Administration Guide: Devices
and File Systems.
1 On the system that is to become the install server, become superuser or assume an equivalent
role.
The system must include a CD-ROM drive and be part of the site's network and naming service.
If you use a naming service, the system must already be in a naming service, such as NIS, NIS+,
DNS, or LDAP. If you do not use a naming service, you must distribute information about this
system by following your site's policies.
5 Copy the image in the drive to the install server's hard disk.
# ./setup_install_server install_dir_path
install_dir_path Specifies the directory where the CD image is to be copied
Note – The setup_install_server command indicates whether you have enough disk space
available for the Solaris Software disc images. To determine available disk space, use the df -kl
command.
6 Decide if you need to make the install server available for mounting.
■ If the install server is on the same subnet as the system to be installed or you are using DHCP,
you do not need to create a boot server. Proceed to Step 7.
■ If the install server is not on the same subnet as the system to be installed and you are not
using DHCP, complete the following steps.
a. Verify that the path to the install server's image is shared appropriately.
# share | grep install_dir_path
install_dir_path Specifies the path to the installation image where the
CD image was copied
■ If the path to the install server's directory is displayed and anon=0 is displayed in the
options, proceed to Step 7.
■ If the path to the install server's directory is not displayed or you do not have anon=0
in the options, continue.
■ If the install server is running the current Solaris release, or compatible version, type
the following command.
# svcs -l svc:/network/nfs/server:default
If the nfsd daemon is online, continue to Step d. If the nfsd daemon is not online,
start it.
■ If the install server is running the Solaris 9 OS, or compatible version, type the
following command.
# ps -ef | grep nfsd
If the nfsd daemon is running, continue to Step d. If the nfsd daemon is not running,
start it.
# /etc/init.d/nfs.server start
11 Copy the CD in the CD-ROM drive to the install server's hard disk.
# ./add_to_install_server install_dir_path
install_dir_path Specifies the directory where the CD image is to be copied
14 Repeat Step 9 through Step 13 for each Solaris Software CD that you want to install.
17 Copy the CD in the CD-ROM drive to the install server's hard disk.
# ./add_to_install_server install_dir_path
install_dir_path Specifies the directory where the CD image is to be copied
19 Repeat Step 15 through Step 18 for the second Solaris Languages CD.
21 (Optional) Patch the files that are located in the miniroot on the net install image that was
created by setup_install_server.
Patching a file might be necessary if a boot image has problems. For step-by-step procedures,
see Chapter 7, “Patching the Miniroot Image (Tasks).”
■ If you are using DHCP or the install server is on the same subnet as the system to be installed,
you do not need to create a boot server. Proceed to “Adding Systems to Be Installed From the
Network With a CD Image”on page 92.
■ If you are not using DHCP and the install server and the client are on a different subnet, you
must create a boot server. Proceed to “Creating a Boot Server on a Subnet With a CD Image”
on page 90.
# mkdir -p /export/home/cdimage
# cd /cdrom/cdrom0/Solaris_10/Tools
# ./setup_install_server /export/home/cdimage
■ If you have a separate boot server, add these steps.
1. Make the install server available to the boot server.
Using the share command, add this entry to the /etc/dfs/dfstab file.
# svcs -l svc:/network/nfs/server:default
# svcadm enable svc:/network/nfs/server
# shareall
# cd /
Eject the Solaris Software - 1 CD. Insert the Solaris Software - 2 CD in the CD-ROM drive.
# cd /cdrom/cdrom0/Solaris_10/Tools
# ./add_to_install_server /export/home/cdimage
# cd /
Repeat the previous commands for each Solaris Software CD that you want to install.
# cd /cdrom/cdrom0/Solaris_10/Tools
# ./add_to_install_server /export/home/cdimage
If you are not using DHCP, and your client system is on a different subnet than your install
server, you must create a boot server. For more information, see “Creating a Boot Server on a
Subnet With a CD Image” on page 90.
See Also For additional information about the setup_install_server and the
add_to_install_server commands, see install_scripts(1M).
■ If you are using DHCP to set installation parameters or your install server and client are on
the same subnet, you do not need a boot server. Proceed to “Adding Systems to Be Installed
From the Network With a CD Image” on page 92.
■ If your install server and your client are not on the same subnet and you are not using
DHCP, you must create separate boot servers for each subnet. You could create an install
server for each subnet; however, install servers require more disk space.
Note – The setup_install_server command indicates whether you have enough disk space
available for the images. To determine available disk space, use the df -kl command.
In this example, the disc is inserted and automatically mounted before the command. After the
command, the disc is removed.
See Also For additional information about the setup_install_server command, see
install_scripts(1M).
■ The profile in the JumpStart directory on the profile server if you are using the custom
JumpStart installation method
Use the following add_install_client procedure for setting up install servers and clients.
For more options to use with this command, see the man page, add_install_client(1M).
Use the following add_install_client procedure for set up an x86 client to install from the
network.
Before You Begin If you have a boot server, make sure you have shared the install server installation image. See the
procedure “To Create an Install Server,” Step 6.
Each system that you want to install needs to find the following items.
■ An install server
■ A boot server if it is required
■ The sysidcfg file if you use a sysidcfg file to preconfigure system information
■ A name server if you use a naming service to preconfigure system information
■ The profile in the JumpStart directory on the profile server if you are using the custom
JumpStart installation method
1 On the install server or boot server, become superuser or assume an equivalent role.
2 If you use the NIS, NIS+, DNS, or LDAP naming service, verify that the following information
about the system to be installed has been added to the naming service:
■ Host name
■ IP address
■ Ethernet address
For more information about naming services, see System Administration Guide: Naming and
Directory Services (DNS, NIS, and LDAP).
3 Change to the Tools directory on the current Solaris release CD image on the install server:
# cd /install_dir_path/Solaris_10/Tools
a. On the client, find the ethers address. The /etc/ethers map is taken from the local file.
# ifconfig -a grep ether
ether 8:0:20:b3:39:1d
b. On the install server, open the /etc/ethers file in an editor. Add the address to the list.
For x86 clients, use this option to boot the systems from the network by using PXE network
boot. The output of this option lists the DHCP options you need to create on the DHCP
server.
For more information about class-specific installations by using DHCP, see “Creating DHCP
Options and Macros for Solaris Installation Parameters” on page 44.
-s install_server:install_dir_path
Specifies the name and path to the install server.
■ install_server is the host name of the install server
■ install_dir_path is the absolute path to the current Solaris release CD image
-c jumpstart_server:jumpstart_dir_path
Specifies a JumpStart directory for custom JumpStart installations. jumpstart_server is the
host name of the server on which the JumpStart directory is located. jumpstart_dir_path is
the absolute path to the JumpStart directory.
-p sysid_server:path
Specifies the path to the sysidcfg file for preconfiguring system information. sysid_server is
either a valid host name or an IP address for the server that contains the file. path is the
absolute path to the directory containing the sysidcfg file.
-t boot_image_path
Specifies the path to an alternate boot image if you want to use a boot image other than the
one in the Tools directory on the current Solaris release net installation image, CD, or DVD.
-b “boot-property=value”
x86 based systems only: Enables you to set the value of a boot property variable that you
want to use to boot the client from the network. The -b must be used with the -e option.
See the eeprom(1M) man page for descriptions of boot properties.
-e ethernet_address
Specifies the Ethernet address of the client that you want to install. This option enables you
to set up the installation information to use for a specific client, including a boot file for that
client.
The nbp. prefix is not used in boot file names. For example, if you specify -e
00:07:e9:04:4a:bf for an x86 based client, the command creates the boot file
010007E9044ABF.i86pc in the /tftpboot directory. However, the current Solaris release
supports the use of legacy boot files with the nbp. prefix.
For more information about client-specific installations by using DHCP, see “Creating
DHCP Options and Macros for Solaris Installation Parameters” on page 44.
client_name
Is the name of the system to be installed from the network. This name is not the host name of
the install server.
platform_group
Is the platform group of the system to be installed. A detailed list of platform groups appears
in “Platform Names and Groups” in Solaris 10 10/09 Installation Guide: Planning for
Installation and Upgrade.
Example 6–3 SPARC: Adding a SPARC Install Client on a SPARC Install Server When Using DHCP
(CDs)
The following example illustrates how to add an install client when you are using DHCP to set
installation parameters on the network. The install client is named basil, which is an Ultra 5
system. The file system /export/home/cdsparc/Solaris_10/Tools contains the
add_install_client command.
For more information on how to use DHCP to set installation parameters for network
installations, see “Preconfiguring System Configuration Information With the DHCP Service
(Tasks)” on page 43.
sparc_install_server# cd /export/home/cdsparc/Solaris_10/Tools
sparc_install_server# ./add_install_client -d basil sun4u
Example 6–4 Adding an Install Client That Is on the Same Subnet as Its Server (CDs)
The following example illustrates how to add an install client that is on the same subnet as the
install server. The install client is named basil, which is an Ultra 5 system. The file system
/export/home/cdsparc/Solaris_10/Tools contains the add_install_client command.
install_server# cd /export/home/cdsparc/Solaris_10/Tools
install_server# ./add_install_client basil sun4u
boot_server# cd /export/home/cdsparc/Solaris_10/Tools
boot_server# ./add_install_client -s rosemary:/export/home/cdsparc rose sun4u
Example 6–6 x86: Adding a Single x86 Install Client on an x86 Install Server When Using DHCP
(CD)
The GRUB bootloader does not use the SUNW.i86pc DHCP class name. The following example
illustrates how to add an x86 install client to an install server when you are using DHCP to set
installation parameters on the network.
■ The -d option is used to specify that clients are to use the DHCP protocol for configuration.
If you plan to use PXE network boot, you must use the DHCP protocol.
■ The -e option indicates that this installation will only occur on the client with the Ethernet
address 00:07:e9:04:4a:bf .
■ The -s option is used to specify that the clients are to be installed from the install server that
is named rosemary.
This server contains a Solaris Operating System for x86 Platforms DVD image in
/export/home/cdx86.
x86_install_server# cd /export/boot/cdx86/Solaris_10/Tools
x86_install_server# ./add_install_client -d -e 00:07:e9:04:4a:bf \
-s rosemary:/export/home/cdx86 i86pc
The previous commands set up the client with the Ethernet address 00:07:e9:04:4a:bf as an
installation client. The boot file 010007E9044ABF.i86pc is created on the installation server. In
previous releases, this boot file was named nbp.010007E9044ABF.i86pc.
For more information on how to use DHCP to set installation parameters for network
installations, see “Preconfiguring System Configuration Information With the DHCP Service
(Tasks)” on page 43.
Example 6–7 x86: Specifying a Serial Console to Use During a Network Installation (CDs)
The following example illustrates how to add an x86 install client to an install server and specify
a serial console to use during the installation. This example sets up the install client in the
following manner.
■ The -d option indicates that the client is set up to use DHCP to set installation parameters.
■ The -e option indicates that this installation will occur only on the client with the Ethernet
address 00:07:e9:04:4a:bf.
■ The -b option instructs the installation program to use the serial port ttya as an input and
an output device.
For a complete description of the boot property variables and values you can use with the -b
option, see the eeprom(1M) man page.
x86 based systems: If you are not using a DHCP server, you must boot the system from a local
Solaris OS DVD or CD.
See Also For additional information about the add_install_client command, see
install_scripts(1M).
■ Set up an install server. For instructions about how to create an install server from CD
media, see “SPARC: To Create an Install Server With SPARC or x86 CD Media” on page 86.
■ Set up a boot server or a DHCP server, if necessary. If the system you want to install is on a
different subnet than the installation server, you must set up a boot server, or use a DHCP
server. For instructions about how to set up a boot server, see “Creating a Boot Server on a
Subnet With a CD Image” on page 90. For instructions about how to set up a DHCP server
to support network installations, see “Preconfiguring System Configuration Information
With the DHCP Service (Tasks)” on page 43.
■ Gathered or preconfigured the information you need to install. You can perform this task in
one or more of the following ways.
■ Gather the information in “Checklist for Installation” in Solaris 10 10/09 Installation
Guide: Planning for Installation and Upgrade.
■ Create a sysidcfg file if you use a sysidcfg file to preconfigure system information. For
information about how to create a sysidcfg file, see “Preconfiguring With the sysidcfg
File” on page 18.
■ Set up a name server if you use a naming service to preconfigure system information. For
information about how to preconfigure information with a naming service, see
“Preconfiguring With the Naming Service” on page 39.
■ Create a profile in the JumpStart directory on the profile server if you are using the
custom JumpStart installation method. For information about how to set up a custom
JumpStart installation, see Chapter 3, “Preparing Custom JumpStart Installations
(Tasks),” in Solaris 10 10/09 Installation Guide: Custom JumpStart and Advanced
Installations.
■ To install with the Solaris interactive installation GUI, type the following command.
ok boot net
■ To install with the Solaris interactive text installer in a desktop session, type the following
command.
ok boot net - text
■ To install with the Solaris interactive text installer in a console session, type the following
command.
ok boot net - nowin
The system boots from the network.
PS/2 keyboards are not self-identifying. You will be asked to select the keyboard layout
during the installation.
Note – During installation, you can choose the default NFSv4 domain name. Or, you can
specify a custom NFSv4 domain name. For further information, see “NFSv4 Domain Name
Configurable During Installation” in Solaris 10 10/09 Installation Guide: Planning for
Installation and Upgrade.
If you are using the GUI, after you confirm the system configuration information, the Welcome
to Solaris panel appears.
4 If you are prompted, answer any additional questions to complete your installation.
■ If you preconfigured all of the installation options, the installation program does not prompt
you to enter any installation information. See Chapter 2,“Preconfiguring System
Configuration Information (Tasks),”for more information.
■ If you did not preconfigure all the installation options, use the “Checklist for Installation”in
Solaris 10 10/09 Installation Guide: Planning for Installation and Upgrade to help you answer
the installation questions.
See Also For information about how to complete an interactive installation with the Solaris installation
GUI, see “To Install or Upgrade With the Solaris Installation Program With GRUB” in
Solaris 10 10/09 Installation Guide: Basic Installations.
Before You Begin This procedure assumes that you have completed the following tasks.
■ Set up an install server. For instructions about how to create an install server from CD
media, see “To Create an Install Server With SPARC or x86 DVD Media” on page 64.
■ Set up a boot server or a DHCP server, if necessary. If the system you want to install is on a
different subnet than the installation server, you must set up a boot server, or use a DHCP
server. For instructions about how to set up a boot server, see “Creating a Boot Server on a
Subnet With a DVD Image” on page 67. For instructions about how to set up a DHCP server
to support network installations, see “Preconfiguring System Configuration Information
With the DHCP Service (Tasks)” on page 43.
■ Gathered or preconfigured the information you need to install. You can perform this task in
one or more of the following ways.
■ Gather the information in “Checklist for Installation” in Solaris 10 10/09 Installation
Guide: Planning for Installation and Upgrade.
■ Create a sysidcfg file if you use a sysidcfg file to preconfigure system information. For
information about how to create a sysidcfg file, see “Preconfiguring With the sysidcfg
File” on page 18.
■ Set up a name server if you use a naming service to preconfigure system information. For
information about how to preconfigure information with a naming service, see
“Preconfiguring With the Naming Service” on page 39.
■ Create a profile in the JumpStart directory on the profile server if you are using the
custom JumpStart installation method. For information about how to set up a custom
JumpStart installation, see Chapter 3, “Preparing Custom JumpStart Installations
(Tasks),” in Solaris 10 10/09 Installation Guide: Custom JumpStart and Advanced
Installations.
This procedure also assumes that your system can boot from the network.
3 In the system BIOS, instruct the system to boot from the network.
See your hardware documentation for information about how to set the boot priority in the
BIOS.
Note – The GRUB menu that is displayed on your system might vary from the following sample,
depending on the configuration of your network installation server.
■ To install the Solaris OS from the network, select the appropriate Solaris entry on the menu,
then press Enter.
Select this entry if you want to install from the network installation server you set up in “To
Create an Install Server With SPARC or x86 DVD Media” on page 64.
■ To install the Solaris OS from the network with specific boot arguments, follow these steps.
You might need to set specific boot arguments if you want to modify the device
configuration during the installation, and did not set these boot arguments previously with
a. On the GRUB menu, select the installation option you want to edit, then press e.
Boot commands that are similar to the following text are displayed in the GRUB menu.
kernel /I86pc.Solaris_10/multiboot kernel/unix \
-B install_media=192.168.2.1:/export/cdrom0/boot \
module /platform/i86pc/boot_archive
b. Use the arrow keys to select the boot entry that you want to edit, then press e.
The boot command that you want to edit is displayed in the GRUB edit window.
c. Edit the command by typing the boot arguments or options you want to use.
The command syntax for the Grub edit menu is as follows.
grub edit>kernel /image_directory/multiboot kernel/unix/ \
install [url|ask] -B options install_media=media_type
For information about boot arguments and command syntax, see Table 9–1.
d. To accept your edits and return to the GRUB menu, press Enter.
The GRUB menu is displayed. The edits you made to the boot command are displayed.
1 Solaris Interactive
2 Custom JumpStart
3 Solaris Interactive Text (Desktop session)
4 Solaris Interactive Text (Console session)
5 Apply driver updates
6 Single user shell
■ To install with the Solaris interactive installation GUI, type 1, then press Enter.
■ To install with the interactive text installer in a desktop session, type 3, then press Enter.
Select this installation type to override the default GUI installer and run the text installer.
■ To install with the interactive text installer in a console session, type 4, then press Enter.
Select this installation type to override the default GUI installer and run the text installer.
If you want to perform an unattended custom JumpStart installation (option 2), see
Solaris 10 10/09 Installation Guide: Custom JumpStart and Advanced Installations.
For detailed information about the Solaris installation GUI and text installer, see “System
Requirements and Recommendations” in Solaris 10 10/09 Installation Guide: Planning for
Installation and Upgrade.
The system configures the devices and interfaces, and searches for configuration files. The
installation program begins. Go to Step 7 to continue the installation.
■ To perform system administration tasks before your installation, choose from the following
options.
■ To update drivers or install an install time update (ITU), insert the update media, type 5,
then press Enter.
You might need to update drivers or install an ITU to enable the Solaris OS to run on
your system. Follow the instructions for your driver update or ITU to install the update.
■ If you did not preconfigure all the system information, use the “Checklist for Installation” in
Solaris 10 10/09 Installation Guide: Planning for Installation and Upgrade to help you answer
the configuration questions.
Note – During installation, you can choose the default NFSv4 domain name. Or, you can
specify a custom NFSv4 domain name. For further information, see “NFSv4 Domain Name
Configurable During Installation” in Solaris 10 10/09 Installation Guide: Planning for
Installation and Upgrade.
If you are using the installation GUI, after you confirm the system configuration information,
the Welcome to Solaris panel appears.
8 If you are prompted, answer any additional questions to complete your installation.
■ If you preconfigured all of the installation options, the installation program does not prompt
you to enter any installation information. See Chapter 2,“Preconfiguring System
Configuration Information (Tasks),”for more information.
■ If you did not preconfigure all the installation options, use the “Checklist for Installation”in
Solaris 10 10/09 Installation Guide: Planning for Installation and Upgrade to help you answer
the installation questions.
9 After the system boots and installs over the network, instruct the system to boot from the disk
drive on subsequent boots.
Note – When you boot the system after the installation, a GRUB menu lists the operating
systems that are installed, including the newly-installed Solaris OS. Select which operating
system you want to boot. The default selection loads if you do not make another selection.
See Also For information about how to complete an interactive installation with the Solaris installation
GUI, see “To Install or Upgrade With the Solaris Installation Program With GRUB” in
Solaris 10 10/09 Installation Guide: Basic Installations.
This chapter provides a step-by-step procedure and an example to patch the miniroot image
when you are setting up an install server.
You might need to patch the miniroot before installation if the boot image has problems
booting or if you need to add driver and hardware support. When you patch the miniroot
image, the patch is not installed on the system where the Solaris OS installation occurs or on the
system that the patchadd command is run. Patching the miniroot image is strictly used for
adding driver and hardware support to the process that performs the actual installation of the
Solaris OS.
107
Patching the Miniroot Image (Tasks)
Note – This procedure is only for patching the miniroot, not for patching the complete network
installation image. If you need to patch the network installation image, perform the task after
the installation completes.
Note – These steps assume that you have a system on your network that is running the current
Solaris release, and that system is accessible over the network.
1 On a system that is running the current Solaris release, log in as superuser or assume an
equivalent role.
2 Change to the Tools directory of the installation image you created in Step 5.
# cd install-server-path/install-dir-path/Solaris_10/Tools
install-server-path Specifies the path to the install server system on your network, for
example, /net/installserver-1.
3 Create a new installation image, and place that image on the system that is running the current
Solaris release.
# ./setup_install_server remote_install_dir_path
remote_install_dir_path Specifies the path on the current Solaris release in which to create
the new installation image.
This command creates a new installation image on the current Solaris release. In order to patch
this image, you must temporarily place this image on a system that is running the current
Solaris release.
4 On the current Solaris release, unpack the network installation boot archive.
# /boot/solaris/bin/root_archive unpackmedia remote_install_dir_path \
destination_dir
remote_install_dir_path Specifies the path to the network installation image on the current
Solaris release.
destination_dir Specifies the path to the directory to contain the unpacked boot
archive.
path-to-patch Specifies the path to the patch that you want to add, for example,
/var/sadm/spool.
patch-id Specifies the patch ID that you want to apply.
You can specify multiple patches with the patchadd -M option. For more
information, see patchadd(1M).
Caution – Don't use the patchadd -C command unless you have read the Patch README
instructions or have contacted your local Sun support office.
7 Copy the patched archives to the installation image on the install server.
# cd remote_install_dir_path
# find boot Solaris_10/Tools/Boot | cpio -pdum \
install-server-path/install_dir_path
Next Steps After you have set up the install server and patched the miniroot, you might need to set up a
boot server or add systems to be installed from the network.
■ If you are using DHCP or the install server is on the same subnet as the system to be
installed, you do not need to create a boot server. Proceed to “Adding Systems to Be
Installed From the Network With a DVD Image” on page 69.
■ If you are not using DHCP and the install server and the client are on a different subnet, you
must create a boot server. Proceed to “Creating a Boot Server on a Subnet With a DVD
Image” on page 67.
1 On a system that is running the current Solaris release, log in as superuser or assume an
equivalent role.
2 Change to the directory where you want to unpack the miniroot and place the network
installation image.
# cd /net/server-1/export
4 Change directories to the Tools directory where the Solaris 10 10/09 installation images are
located.
# cd /net/jmp-start1/export/images/solaris_10/Solaris_10/Tools
5 Create a new installation image, and place the image on the system that is running the current
Solaris release.
# ./setup_install_server /export/u1
Verifying target directory...
Calculating the required disk space for the Solaris_10 product
Calculating space required for the installation boot image
Copying the CD image to disk...
Copying Install Boot Image hierarchy...
Copying /boot netboot hierarchy...
Install Server setup complete
The installation server setup is now complete.
7 Change directories.
# cd /export/mr/sbin
Caution – The SVCCFG_REPOSITORY variable must point to the location of the unpacked
miniroot's repository.db file. In this example, that location is the /export/mr/etc/svc
directory. The repository.db file is located in the directory /etc/svc under the unpacked
miniroot. Failure to export this variable results in the modification of the live repository, which
prevents the live system from booting.
12 Change directories. Then, restore the original copies of the rc2.orig and sulogin.orig files.
# cd /export/mr/sbin
# mv rc2.orig rc2
# mv sulogin.orig sulogin
13 Pack the modified miniroot that contains the changes you made. Place the modified miniroot in
the /export/u1 directory.
# /boot/solaris/bin/root_archive packmedia /export/u1 /export/mr
This step essentially replaces /export/u1/boot/miniroot directory, along with some other
necessary files.
Next Steps After you have set up the install server and patched the miniroot, you might need to set up a
boot server or add systems to be installed from the network.
■ If you are using DHCP or the install server is on the same subnet as the system to be
installed, you do not need to create a boot server. You are finished. Proceed to “Adding
Systems to Be Installed From the Network With a DVD Image” on page 69.
■ If you are not using DHCP and the install server and the client are on a different subnet, you
must create a boot server. Proceed to “Creating a Boot Server on a Subnet With a DVD
Image” on page 67.
This chapter provides examples that illustrate how to use DVD or CD media to install the
Solaris OS over the network.
113
Network Installation Over the Same Subnet (Examples)
EXAMPLE 8–1 SPARC: Install Over the Same Subnet (With DVD Media)
This example creates a SPARC install server with SPARC DVD media.
This example has the following conditions:
■ The install client is on the same subnet as the install server.
■ The network installation uses a graphical user interface (GUI) in a desktop session.
■ General conditions for this example are listed at Chapter 8, “Installing Over the Network
(Examples).”
1. Create and set up a SPARC install server.
This example creates an install server by copying the Solaris DVD to the install server's
/export/home/dvdsparc directory.
a. Insert the Solaris DVD in the SPARC system's drive.
b. Use the following command to create a directory to contain the DVD image. This
command also changes to the Tools directory on the mounted disc. Then the command
copies the DVD image in the drive to the install server's hard disk.
# mkdir -p /export/home/dvdsparc
# cd /cdrom/cdrom0/Solaris_10/Tools
# ./setup_install_server /export/home/dvdsparc
2. Install the system with a network installation image.
In this example, you install with the Solaris interactive installation GUI.
a. Boot the system from the network.
b. To install with the Solaris interactive installation GUI, type the following command.
ok bootnet - install
EXAMPLE 8–1 SPARC: Install Over the Same Subnet (With DVD Media) (Continued)
For a more detailed explanation about the network installation procedures that are used in this
example, see Chapter 5, “Installing From the Network With DVD Media (Tasks).”
EXAMPLE 8–2 SPARC: Install Over the Same Subnet (With CD Media)
# mkdir -p /export/home/cdsparc
# cd /cdrom/cdrom0/Solaris_10/Tools
# ./setup_install_server /export/home/cdsparc
# cd /
2. Add systems to be installed from the network.
a. Insert the Solaris Software for SPARC Platforms - 2 CD in the CD-ROM drive.
b. Use the following command. This command changes to the Tools directory on the
mounted CD. The command copies the CD in the CD-ROM drive to the install server's
hard disk. Then the command changes to the root (/) directory.
# cd /cdrom/cdrom0/Solaris_10/Tools
# ./add_to_install_server /export/home/cdsparc
# cd /
c. Repeat the previous commands for each Solaris Software CD that you want to install.
d. Insert the first Solaris Languages for SPARC Platforms CD in the CD-ROM drive.
# cd /cdrom/cdrom0/Solaris_10/Tools
# ./add_to_install_server /export/home/cdsparc
EXAMPLE 8–2 SPARC: Install Over the Same Subnet (With CD Media) (Continued)
ok boot net
EXAMPLE 8–3 x86: Install Over the Same Subnet (With DVD Media)
This example creates an x86 install server with x86 DVD media.
This example has the following conditions:
■ The install client is on the same subnet as the install server.
■ The network installation uses a graphical user interface (GUI) in a desktop session.
■ General conditions for this example are listed at Chapter 8, “Installing Over the Network
(Examples).”
1. Create and set up an x86 install server.
The following examples illustrate how to create an x86 install server by copying the Solaris
Operating System for x86 Platforms DVD to the install server's /export/home/dvdx86
directory.
a. Insert the Solaris DVD into the system's drive.
b. Use the following command. This command creates a directory to contain the boot
image. Then this command changes to the Tools directory on the mounted disc. Also,
the command copies the disc in the drive to the install server's hard disk by using the
setup_install_server command:
# mkdir -p /export/home/dvdx86
# cd /cdrom/cdrom0/Solaris_10/Tools
# ./setup_install_server /export/home/dvdx86
EXAMPLE 8–3 x86: Install Over the Same Subnet (With DVD Media) (Continued)
# svcs -l svc:/network/nfs/server:default
# svcadm enable svc:/network/nfs/server
# shareall
# cd /
Note – If the install server was running the Solaris 9 OS, or compatible version, you would
type the following command instead.
For this older release, if the nfsd daemon was running, you would continue to the next step.
If the nfsd daemon was not running, you would start it.
# /etc/init.d/nfs.server start
On the install server, open the /etc/ethers file in an editor. Add the address to the list.
b. Use the following command. This command changes to the Tools directory on the
Solaris DVD image. Then, this command sets up the client system so that it can be
installed from the network.
install_server# cd /export/home/dvdx86/Solaris_10/Tools
install_server# ./add_install_client basil i86pc
3. Install the system with a network installation image.
The Solaris installation programs for x86 based systems use the GRUB boot loader. This
example installs an x86 based system over the network with the GRUB boot loader.
EXAMPLE 8–3 x86: Install Over the Same Subnet (With DVD Media) (Continued)
a. In the system BIOS, instruct the system to boot from the network.
After you exit BIOS, the system installs from the network. The GRUB menu is displayed.
b. To install the Solaris OS from the network, select the appropriate Solaris entry on the
menu, then press Enter.
The installation selection screen is displayed.
c. To install with the Solaris interactive installation GUI, type 1, then press Enter.
The installation program begins.
d. If you are prompted, answer the system configuration questions.
After you confirm the system configuration information, the Welcome to Solaris panel
appears.
After the system boots and installs over the network, instruct the system to boot from the
disk drive on subsequent boots.
Note – When you boot the system after the installation, a GRUB menu lists the operating
systems that are installed, including the newly-installed Solaris OS. Select which
operating system you want to boot. The default selection loads if you do not make
another selection.
Procedure Reference
For a more detailed explanation about the network Chapter 5, “Installing From the Network With DVD
installation procedures that are used in this example Media (Tasks)”
For information about how to complete an interactive “To Install or Upgrade With the Solaris Installation
installation with the Solaris installation GUI Program With GRUB” in Solaris 10 10/09 Installation
Guide: Basic Installations
For overview information about the GRUB boot Chapter 7, “SPARC and x86 Based Booting (Overview
loader and Planning),” in Solaris 10 10/09 Installation Guide:
Planning for Installation and Upgrade
EXAMPLE 8–4 x86: Install Over the Same Subnet (With CD Media)
# mkdir -p /export/home/dvdx86
# cd /cdrom/cdrom0/Solaris_10/Tools
# ./setup_install_server /export/home/cdx86
c. Insert the Solaris Software - 2 CD in the system's CD-ROM drive.
d. Use the following command. This command changes to the Tools directory on the
mounted CD. Then this command copies the CD in the CD-ROM drive to the install
server's hard disk and changes to the root (/) directory.
# cd /cdrom/cdrom0/Solaris_10/Tools
# ./add_to_install_server /export/home/cdx86
# cd /
e. Repeat the previous commands for each Solaris Software CD that you want to install.
f. Insert the first Solaris Languages CD in the system's CD-ROM drive.
g. Use the following command. This command changes to the Tools directory on the
mounted CD. This command then copies the CD in the CD-ROM drive to the install
server's hard disk.
# cd /cdrom/cdrom0/Solaris_10/Tools
# ./add_to_install_server /export/home/cdx86
h. Eject the CD.
i. Repeat the previous commands for each Solaris Languages for SPARC Platforms CD CD
that you want to install.
2. Add systems to be installed from the network.
EXAMPLE 8–4 x86: Install Over the Same Subnet (With CD Media) (Continued)
In this example, the install client is named basil, which is an x86 system. The file system
/export/home/cdx86/Solaris_10/Tools contains the add_install_client command.
a. Add the client to the install server's /etc/ethers file. On the client, find the ethers
address. The /etc/ethers map is taken from the local file.
install_server# cd /export/home/cdx86/Solaris_10/Tools
install_server# ./add_install_client basil i86pc
3. Install the system with a network installation image.
This step describes how to install an x86 based system over the network with the GRUB boot
loader.
a. In the system BIOS, instruct the system to boot from the network.
After you exit BIOS, the system installs from the network. The GRUB menu is displayed.
b. To install the Solaris OS from the network, select the appropriate Solaris entry on the
menu, then press Enter.
The installation selection screen is displayed.
c. To install with the Solaris interactive installation GUI, type 1, then press Enter.
The installation program begins.
d. If you are prompted, answer the system configuration questions.
After you confirm the system configuration information, the Welcome to Solaris panel
appears.
e. After the system boots and installs over the network, instruct the system to boot from the
disk drive on subsequent boots.
Note – When you boot the system after the installation, a GRUB menu lists the operating
systems that are installed, including the newly-installed Solaris OS. Select which
operating system you want to boot. The default selection loads if you do not make
another selection.
EXAMPLE 8–4 x86: Install Over the Same Subnet (With CD Media) (Continued)
Procedure Reference
For a more detailed explanation about the network Chapter 6, “Installing From the Network With CD
installation procedures that are used in this example Media (Tasks)”
For information about how to complete an interactive “To Install or Upgrade With the Solaris Installation
installation with the Solaris installation GUI Program With GRUB” in Solaris 10 10/09 Installation
Guide: Basic Installations
For overview information about the GRUB boot Chapter 7, “SPARC and x86 Based Booting (Overview
loader and Planning),” in Solaris 10 10/09 Installation Guide:
Planning for Installation and Upgrade
This chapter lists the commands used to set up network installations. This chapter includes the
following topics.
■ “Network Installation Commands” on page 123
■ “x86: GRUB Menu Commands for Installation” on page 124
add_install_client All A command that adds network installation information about a system
to an install server or boot server from the network. The
add_install_client(1M) man page contains more information.
setup_install_server All A script that copies the current Solaris release DVD or CDs to an install
server's local disk or copies the boot software to a boot server. The
setup_install_server(1M) man page contains more information.
(CD media only) add_to_install_server All A script that copies additional packages within a product tree on the
CDs to the local disk on an existing install server. The
add_to_install_server(1M) man page contains more information.
mount All A command that enables the mounting of file systems and shows the
mounted file systems, including the file system on the Solaris DVD or
Solaris Software and Solaris Languages CDs. The mount(1M) man page
contains more information.
showmount -e All A command that lists all the shared file systems that are located on a
remote host. The showmount(1M) man page contains more information.
123
x86: GRUB Menu Commands for Installation
uname -i All A command for determining a system's platform name, for example,
SUNW,Ultra-5_10, or i86pc. You might need the system's platform
name when you install the Solaris software. The uname(1) man page
contains more information.
patchadd -C net_install_image All A command to add patches to the files that are located in the miniroot,
Solaris_10 /Tools/Boot, on a net installation image of a DVD or CD
that is created by setup_install_server. This facility enables you to
patch Solaris installation commands and other miniroot-specific
commands. net_install_image is the absolute path name of the net
installation image.
Caution – Don't use the patchadd -C command unless you have read the
Patch README instructions or have contacted your local Sun support
office.
For more information, see the following references:
■ Chapter 7, “Patching the Miniroot Image (Tasks)”
■ The patchadd(1M) man page contains more information.
reset SPARC An Open Boot PROM command for resetting the system and rebooting
the machine. Or, if you boot and see a series of error messages about I/O
interrupts, press the Stop and A keys at the same time, and then type
reset at the ok or > PROM prompt.
banner SPARC An Open Boot PROM command that displays system information, such
as model name, Ethernet address, and memory installed. You can issue
this command only at the ok or > PROM prompt.
In the GRUB menu, you can access the GRUB command line by typing b at the prompt. A
command line that is similar to the following output is displayed.
You can edit this command line to customize your boot and installation. The following list
describes several common commands you might want to use. For a complete list of boot
arguments that you can use with the -B option, see the eeprom(1M) man page.
Note – To add multiple arguments with the -B option, separate the arguments with a comma.
install Insert this option before the -B option to perform a custom JumpStart installation.
kernel /Solaris_10_x86/multiboot install
-B install_media=192.168.2.1:/export/cdrom0/boot
module /platform/i86pc/boot_archive
url|ask Specifies the location of the custom JumpStart files or prompts you for the location. Insert either
option with the install option.
■ url - Specifies the path to the files. You can specify a URL for files that are located in the
following places:
■ Local hard disk
file://jumpstart_dir_path/compressed_config_file
For example:
kernel /Solaris_10_x86/multiboot install
file://jumpstart/config.tar
-B install_media=192.168.2.1:/export/cdrom0/boot
module /platform/i86pc/boot_archive
■ NFS server
nfs://server_name:IP_address/jumpstart_dir_path/compressed_config_file
For example:
kernel /Solaris_10_x86/multiboot install
myserver:192.168.2.1/jumpstart/config.tar
-B install_media=192.168.2.1:/export/cdrom0/boot
module /platform/i86pc/boot_archive
■ HTTP server
http://server_name:IP_address/jumpstart_dir_path/
compressed_config_file&proxy_info
■ If you placed a sysidcfg file in the compressed configuration file, you must specify the
IP address of the server that contains the file, as in the following example:
kernel /Solaris_10_x86/multiboot install
http://192.168.2.1/jumpstart/config.tar
-B install_media=192.168.2.1:/export/cdrom0/boot
module /platform/i86pc/boot_archive
■ If you saved the compressed configuration file on an HTTP server that is behind a
firewall, you must use a proxy specifier during boot. You do not need to specify an IP
address for the server that contains the file. You must specify an IP address for the
proxy server, as in the following example:
kernel /Solaris_10_x86/multiboot install
http://www.shadow.com/jumpstart/config.tar&proxy=131.141.6.151
-B install_media=192.168.2.1:/export/cdrom0/boot
module /platform/i86pc/boot_archive
url|ask (continued) ■ ask - When used with the install option, specifies that the installation program prompt you
to type the location of the compressed configuration file after the system boots and connects to
the network. If you use this option, you are not able to do a completely hands off JumpStart
installation.
If you bypass the prompt by pressing Return, the Solaris installation program interactively
configures the network parameters. The installation program then prompts you for the
location of the compressed configuration file.
The following example performs a custom JumpStart and boots from a network installation
image. You are prompted to input the location of the configuration file after the system
connects to the network.
dhcp Insert this option before the -B option to instruct the installation programs to use a DHCP server to
obtain network installation information that is needed to boot the system. If you do not specify to
use a DHCP server by typing dhcp, the system uses the /etc/bootparams file or the naming service
bootparams database. For example, you would not specify dhcp if you wanted keep a static IP
address.
kernel /Solaris_10_x86/multiboot dhcp
-B install_media=192.168.2.1:/export/cdrom0/boot
module /platform/i86pc/boot_archive
- text Insert this option before the -B option to perform a text-based installation in a desktop session.
kernel /Solaris_10_x86/multiboot - text
-B install_media=192.168.2.1:/export/cdrom0/boot
module /platform/i86pc/boot_archive
- nowin Insert this option before the -B option to perform a text-based installation in a console session.
kernel /Solaris_10_x86/multiboot - nowin
-B install_media=192.168.2.1:/export/cdrom0/boot
module /platform/i86pc/boot_archive
console=serial-console Use this argument with the -B option to instruct the system to use a serial console, such as ttya
(COM1) or ttyb (COM2).
kernel /Solaris_10_x86/multiboot -B console=ttya
install_media=192.168.2.1:/export/cdrom0/boot
module /platform/i86pc/boot_archive
ata-dma-enabled=[0|1] Use this argument with the -B option to enable or disable Advanced Technology Attachment
(ATA) or Integrated Drive Electronics (IDE) devices and Direct Memory Access (DMA) during the
installation.
kernel /Solaris_10_x86/multiboot -B ata-dma-enabled=0
install_media=192.168.2.1:/export/cdrom0/boot
module /platform/i86pc/boot_archive
acpi-enum=[0|1] Use this argument with the -B option to enable or disable Advanced Configuration and Power
Interface (ACPI ) power management.
kernel /Solaris_10_x86/multiboot -B acpi-enum=0
install_media=192.168.2.1:/export/cdrom0/boot
module /platform/i86pc/boot_archive
atapi-cd-dma-enabled=[0|1] Use this argument with the -B option to enable or disable DMA for CD or DVD drives during the
installation.
kernel /Solaris_10_x86/multiboot -B atapi-cd-dma-enabled=0
install_media=192.168.2.1:/export/cdrom0/boot
module /platform/i86pc/boot_archive
Note – The DMA name atapi is the current variable name used for DMA. This variable is
subject to change.
129
130
10
C H A P T E R 1 0
This chapter provides an overview of the WAN boot installation method. This chapter
describes the following topics.
■ “What Is WAN Boot?” on page 131
■ “When to Use WAN Boot” on page 132
■ “How WAN Boot Works (Overview)” on page 133
■ “Security Configurations Supported by WAN Boot (Overview)” on page 137
The WAN boot installation method enables you to transmit an encrypted Solaris Flash archive
over a public network to a remote SPARC based client. The WAN boot programs then install
the client system by performing a custom JumpStart installation. To protect the integrity of the
installation, you can use private keys to authenticate and encrypt data. You can also transmit
your installation data and files over a secure HTTP connection by configuring your systems to
use digital certificates.
To perform a WAN boot installation, you install a SPARC based system by downloading the
following information from a web server over a HTTP or secure HTTP connection.
■ wanboot program – The wanboot program is the second level boot program that loads the
WAN boot miniroot, client configuration files, and installation files. The wanboot program
performs tasks similar to those that are performed by the ufsboot or inetboot second level
boot programs.
131
When to Use WAN Boot
■ WAN boot file system – WAN boot uses several different files to configure the client and
retrieve data to install the client system. These files are located in the /etc/netboot
directory of the web server. The wanboot-cgi program transmits these files to the client as a
file system, called the WAN boot file system.
■ WAN boot miniroot – The WAN boot miniroot is a version of the Solaris miniroot that has
been modified to perform a WAN boot installation. The WAN boot miniroot, like the
Solaris miniroot, contains a kernel and just enough software to install the Solaris
environment. The WAN boot miniroot contains a subset of the software in the Solaris
miniroot.
■ Custom JumpStart configuration files – To install the system, WAN boot transmits
sysidcfg, rules.ok, and profile files to the client. WAN boot then uses these files to
perform a custom JumpStart installation on the client system.
■ Solaris Flash archive – A Solaris Flash archive is a collection of files that you copy from a
master system. You can then use this archive to install a client system. WAN boot uses the
custom JumpStart installation method to install a Solaris Flash archive on the client system.
After you install an archive on a client system, the system contains the exact configuration of
the master system.
Note – The flarcreate command no longer has size limitations on individual files. You can
create a Solaris Flash archive that contains individual files over 4 Gbytes.
For more information, see “Creating an Archive That Contains Large Files” in
Solaris 10 10/09 Installation Guide: Solaris Flash Archives (Creation and Installation).
You then install the archive on the client by using the custom JumpStart installation method.
You can protect the transfer of the previously listed information by using keys and digital
certificates.
For a more detailed description of the sequence of events in a WAN boot installation, see “How
WAN Boot Works (Overview)” on page 133.
If you want to install systems that are located on your local area network (LAN), the WAN boot
installation method might require more configuration and administration than necessary. For
information about how to install systems over a LAN, see Chapter 4, “Installing From the
Network (Overview).”
WAN LAN
Web Install
server server
Client
■ Boot from the network by setting network interface variables in the Open Boot PROM
(OBP).
■ Boot from the network with the DHCP option.
■ Boot from a local CD-ROM.
2. The client OBP obtains configuration information from one of the following sources.
■ From boot argument values that are typed at the command line by the user
■ From the DHCP server, if the network uses DHCP
3. The client OBP requests the WAN boot second level boot program (wanboot).
The client OBP downloads the wanboot program from the following sources.
■ From a special web server, called the WAN boot server, by using the Hyper Text Transfer
Protocol (HTTP)
■ From a local CD-ROM (not shown in the figure)
4. The wanboot program requests the client configuration information from the WAN boot
server.
5. The wanboot program downloads configuration files that are transmitted by the
wanboot-cgi program from the WAN boot server. The configuration files are transmitted
to the client as the WAN boot file system.
6. The wanboot program requests the download of the WAN boot miniroot from the WAN
boot server.
7. The wanboot program downloads the WAN boot miniroot from the WAN boot server by
using HTTP or secure HTTP.
8. The wanboot program loads and executes the UNIX kernel from the WAN boot miniroot.
9. The UNIX kernel locates and mounts the WAN boot file system for use by the Solaris
installation program.
10. The installation program requests the download of a Solaris Flash archive and custom
JumpStart files from an install server.
The installation program downloads the archive and custom JumpStart files over an HTTP
or HTTPS connection.
11. The installation program performs a custom JumpStart installation to install the Solaris
Flash archive on the client.
For instructions about how to use a hashing key, see “(Optional) To Create a Hashing Key and
an Encryption Key” on page 170.
Once you install an encryption key on a client, the client uses this key for future WAN boot
installations.
Your site might not permit the use of encryption keys. To determine if your site permits
encryption, ask your site's security administrator. If your site permits encryption, ask your
security administrator which type of encryption key, either 3DES or AES, you should use.
For instructions on how to use encryption keys, see “(Optional) To Create a Hashing Key and
an Encryption Key” on page 170.
HTTPS uses digital certificates to authenticate systems that exchange data over the network. A
digital certificate is a file that identifies a system, either a server or client, as a system to trust
during online communication. You can request a digital certificate from an external certificate
authority, or create your own certificate and certificate authority.
To enable the client to trust the server and accept data from the server, you must install a digital
certificate on the server. You then instruct the client to trust this certificate. You can also require
the client to authenticate itself to the servers by providing a digital certificate to the client. You
can then instruct the server to accept the certificate's signer when the client presents the
certificate during the installation.
To use digital certificates during the installation, you must configure your web server to use
HTTPS. See your web server documentation for information about how to use HTTPS.
For information about the requirements to use digital certificates during your WAN boot
installation, see “Digital Certificate Requirements” on page 147. For instructions about how to
use digital certificates in your WAN boot installation, see “(Optional) To Use Digital
Certificates for Server and Client Authentication” on page 168.
This section briefly describes the different configurations you can use to set the level of security
for your WAN boot installation. The section also describes the security mechanisms that are
required by these configurations.
If you want to also require client authentication during the installation, you must also use the
following security features.
■ Private key for the WAN boot server
■ Digital certificate for the client
For a list of the tasks that are required to install with this configuration, see Table 12–1.
If you want the client to check the integrity of the data that is transmitted, you can use a HMAC
SHA1 hashing key with this configuration. However, the Solaris Flash archive is not protected
by the hashing key. The archive is transferred insecurely between the server and the client
during the installation.
For a list of the tasks that are required to install with this configuration, see Table 12–2.
This chapter describes how to prepare your network for a WAN boot installation. This chapter
describes the following topics.
■ “WAN Boot Requirements and Guidelines” on page 139
■ “WAN Boot Security Limitations” on page 148
■ “Gathering Information for WAN Boot Installations” on page 148
WAN boot server – The WAN boot ■ Operating system – Solaris 9 12/03 OS, or compatible version
server is a web server that provides
■ Must be configured as web server
the wanboot program, the
configuration and security files, and ■ Web server software must support HTTP 1.1
the WAN boot miniroot.
■ If you want to use digital certificates, the web server software must
support HTTPS
139
WAN Boot Requirements and Guidelines
Install server – The install server ■ Available disk space – space for each Solaris Flash archive
provides the Solaris Flash archive ■ Media drive – CD-ROM or DVD-ROM drive
and custom JumpStart files that are ■ Operating system – Solaris 9 12/03 OS, or compatible version
required to install the client.
If the install server is a different system than the WAN boot server, the
install server must meet these additional requirements.
■ Must be configured as a web server
■ Web server software must support HTTP 1.1
■ If you want to use digital certificates, the web server software must
support HTTPS
Client system – The remote system ■ Memory - Minimum of 768 Mbytes of RAM
you want to install over a WAN
■ CPU – UltraSPARC II processor minimum
■ Hard disk – At least 2 Gbytes of hard disk space
■ OBP – WAN boot-enabled PROM
If the client does not have the appropriate PROM, the client must
have a CD-ROM drive.
To determine if your client has a WAN boot-enabled PROM, see
“To Check the Client OBP for WAN Boot Support” on page 159.
(Optional) DHCP server – You can If you are using a SunOS DHCP server, you must perform one of the
use a DHCP server to provide client following tasks.
configuration information. ■ Upgrade the server to be an EDHCP server.
■ Rename Sun vendor options to satisfy the eight-character limit on
options. For more information about the WAN
installation-specific Sun vendor options, see “(Optional) Providing
Configuration Information With a DHCP Server” on page 187.
If the DHCP server is on a different subnet than the client, you must
configure a BOOTP relay agent. For more information about how to
configure a BOOTP relay agent, see Chapter 14, “Configuring the
DHCP Service (Tasks),” in System Administration Guide: IP Services.
(Optional) Proxy server – You can If the installation uses HTTPS, the proxy server must be configured to
configure the WAN boot feature to tunnel HTTPS.
use an HTTP proxy during the
download of the installation data and
files.
Note – The flarcreate command no longer has size limitations on individual files. You can
create a Solaris Flash archive that contains individual files over 4 Gbytes.
For more information, see “Creating an Archive That Contains Large Files” in
Solaris 10 10/09 Installation Guide: Solaris Flash Archives (Creation and Installation).
■ SSL support – If you want to use HTTPS in your WAN boot installation, the web server
software must support SSL version 3.
■ Multiple servers – If you want to distribute the installation data and files across your
network, you can host these servers on multiple machines. You might set up a central WAN
boot server, and configure multiple install servers to host Solaris Flash archives across your
network. If you host the install server and logging server on independent machines, you
must configure those servers as web servers.
To enable the wanboot-cgi program to transmit these files you must store these files in a
directory that is accessible to the web server software. One way to make these files accessible is
to place these files in the document root on your web server.
The document root, or primary document directory, is the directory on your web server where
you store files you want to make available to clients. You can name and configure this directory
in your web server software. See your web server documentation for more information about
setting up the document root directory on your web server.
You might want to create different subdirectories of the document root directory to store your
different installation and configuration files. For example, you might want to create specific
subdirectories for each group of clients that you want to install. If you plan to install several
different releases of the Solaris OS across your network, you might create subdirectories for
each release.
Figure 11–1 shows a basic sample structure for a document root directory. In this example, the
WAN boot server and install server are on the same machine. The server is running the Apache
web server software.
/opt/apache/htdocs
rules.ok
profile
begin
finish
archives
sol-10-sparc.flar
Note – If the WAN boot server and the install server are different systems, you might want to
store the flash directory on the install server. Ensure that these files and directories are
accessible to the WAN boot server.
For information about how to create the document root directory, see your web server
documentation. For detailed instructions about how to create and store these installation files,
see “Creating the Custom JumpStart Installation Files” on page 173.
/etc/netboot/net-ip
In this example, net-ip is the IP address of the client's subnet. For example, if you want all
systems on the subnet with the IP address of 192.168.255.0 to share configuration files,
create a /etc/netboot/192.168.255.0 directory. Then, store the configuration files in this
directory.
■ Client-specific configuration – If you want only a specific client to use the boot file system,
store the boot file system files in a subdirectory of /etc/netboot. Have the subdirectory
follow this naming convention.
/etc/netboot/net-ip/client-ID
In this example, net-ip is the IP address of the subnet. client-ID is either the client ID that is
assigned by the DHCP server, or a user-specified client ID. For example, if you want a
system with the client ID 010003BA152A42 on the subnet 192.168.255.0 to use specific
configuration files, create a /etc/netboot/192.168.255.0/010003BA152A42 directory.
Then, store the appropriate files in this directory.
Note – The certstore file must be located in the client ID directory. See “Customizing the
Scope of the WAN Boot Installation” on page 144 for more information about
subdirectories of the /etc/netboot directory.
For detailed instructions on how to create and store these files, see the following procedures.
■ “To Create the System Configuration File” on page 181
■ “To Create the wanboot.conf File” on page 183
■ “(Optional) To Create a Hashing Key and an Encryption Key” on page 170
■ “(Optional) To Use Digital Certificates for Server and Client Authentication” on page 168
The wanboot-cgi program searches for client information in the following order.
1. /etc/netboot/net-ip/client-ID – The wanboot-cgi program first checks for configuration
information that is specific to the client machine. If the /etc/netboot/net-ip/client-ID
directory contains all the client configuration information, the wanboot-cgi program does
not check for configuration information elsewhere in the /etc/netboot directory.
Figure 11–2 demonstrates how you can set up the /etc/netboot directory to customize your
WAN boot installations.
/etc/netboot
wanboot.conf 192.168.255.0
system.conf
wanboot.conf 010003BA152A42
keystore
keystore
system.conf
truststore
truststore
keystore
truststore
certstore
The /etc/netboot directory layout in Figure 11–2 enables you to perform the following WAN
boot installations.
■ When you install the client 010003BA152A42, the wanboot-cgi program uses the following
files in the /etc/netboot/192.168.255.0/010003BA152A42 directory.
■ system.conf
■ keystore
■ truststore
■ certstore
■ When you install a client that is located on the 192.168.255.0 subnet, the wanboot-cgi
program uses the wanboot.conf, keystore, and truststore files in the
/etc/netboot/192.168.255.0 directory. The wanboot-cgi program then uses the
system.conf file in the /etc/netboot directory.
■ When you install a client machine that is not located on the 192.168.255.0 subnet, the
wanboot-cgi program uses the following files in the /etc/netboot directory.
■ wanboot.conf
■ system.conf
■ keystore
■ truststore
If you want to require server or both client and server authentication during your installation,
you must install digital certificates on the server. Follow these guidelines when you use digital
certificates.
■ If you want to use digital certificates, the digital certificates must be formatted as part of a
Public-Key Cryptography Standards #12 (PKCS#12) file.
■ If you create your own certificates, you must create the certificates as PKCS#12 files.
■ If you receive your certificates from third-party certificate authorities, request your
certificates in the PKCS#12 format.
For detailed instructions on how to use PKCS#12 certificates during your WAN boot
installation, see “(Optional) To Use Digital Certificates for Server and Client Authentication”
on page 168.
Use the following worksheets to record the WAN boot installation information for your
network.
■ Table 11–2
■ Table 11–3
Information Notes
This chapter describes the following tasks that are necessary to prepare your network for a
WAN boot installation.
■ “Installing Over a Wide Area Network (Task Maps)” on page 151
■ “Configuring the WAN Boot Server” on page 155
■ “Creating the Custom JumpStart Installation Files” on page 173
■ “Creating the Configuration Files” on page 181
■ “(Optional) Providing Configuration Information With a DHCP Server” on page 187
■ “(Optional) To Configure the WAN Boot Logging Server” on page 166
To use a DHCP server or a logging server, complete the optional tasks that are listed at the
bottom of each table.
151
Installing Over a Wide Area Network (Task Maps)
TABLE 12–1 Task Map: Preparing to Perform a Secure WAN Boot Installation
Decide what security features you Review the security features and “Protecting Data During a WAN
want to use in your installation. configurations to decide what level Boot Installation” on page 135
of security you want to use in your
“Security Configurations
WAN boot installation.
Supported by WAN Boot
(Overview)” on page 137
Collect WAN boot installation Complete the worksheet to record “Gathering Information for WAN
information. all the information you need to Boot Installations” on page 148
perform a WAN boot installation.
Create the document root directory Create the document root directory “Creating the Document Root
on the WAN boot server. and any subdirectories to serve the Directory” on page 155
configuration and installation files.
Create the WAN boot miniroot. Use the setup_install_server “SPARC: To Create a WAN Boot
command to create the WAN boot Miniroot” on page 156
miniroot.
Verify that the client system Check the client OBP for boot “To Check the Client OBP for
supports WAN boot. argument support of WAN boot. WAN Boot Support” on page 159
Install the wanboot program on the Copy the wanboot program to the “Installing the wanboot Program on
WAN boot server. document root directory of the the WAN Boot Server” on page 160
WAN boot server.
Install the wanboot-cgi program Copy the wanboot-cgi program to “To Copy the wanboot-cgi
on the WAN boot server. the WAN boot server's CGI Program to the WAN Boot Server”
directory. on page 165
(Optional) Set up the logging Configure a dedicated system for “(Optional) To Configure the
server. displaying boot and installation log WAN Boot Logging Server” on
messages. page 166
Set up the /etc/netboot hierarchy. Populate the /etc/netboot “Creating the /etc/netboot
hierarchy with the configuration Hierarchy on the WAN Boot
and security files that are required Server” on page 162
for a WAN boot installation.
Configure the web server to use Identify the web server “(Optional) Protecting Data by
secure HTTP for a more secure requirements that are necessary to Using HTTPS” on page 167
WAN boot installation. perform a WAN installation with
HTTPS.
Format digital certificates for a Split PKCS#12 file into a private “(Optional) To Use Digital
more secure WAN boot key and a certificate to use with the Certificates for Server and Client
installation. WAN installation. Authentication” on page 168
TABLE 12–1 Task Map: Preparing to Perform a Secure WAN Boot Installation (Continued)
Task Description For Instructions
Create a hashing key and an Use the wanbootutil keygen “(Optional) To Create a Hashing
encryption key for a more secure command to create HMAC SHA1, Key and an Encryption Key” on
WAN boot installation. 3DES, or AES keys. page 170
Create the Solaris Flash archive. Use the flarcreate command to “To Create the Solaris Flash
create an archive of the software Archive” on page 173
that you want to install on the
client.
Create the installation files for the Use a text editor to create the “To Create the sysidcfg File” on
custom JumpStart installation. following files: page 175
■ sysidcfg
“To Create the Profile” on page 176
■ profile
■ rules.ok “To Create the rules File” on
■ begin scripts page 178
■ finish scripts “(Optional) Creating Begin and
Finish Scripts” on page 180
Create the system configuration Set the configuration information “To Create the System
file. in the system.conf file. Configuration File” on page 181
Create the WAN boot Set the configuration information “To Create the wanboot.conf File”
configuration file. in the wanboot.conf file. on page 183
(Optional) Configure the DHCP Set Sun vendor options and macros “Preconfiguring System
server to support a WAN boot in the DHCP server. Configuration Information With
installation. the DHCP Service (Tasks)” on
page 43
TABLE 12–2 Task Map: Preparing to Perform an Insecure WAN Boot Installation
Decide what security features you Review the security features and “Protecting Data During a WAN
want to use in your installation. configurations to decide what level Boot Installation” on page 135
of security you want to use in your
“Security Configurations
WAN boot installation.
Supported by WAN Boot
(Overview)” on page 137
Collect WAN boot installation Complete the worksheet to record “Gathering Information for WAN
information. all the information you need to Boot Installations” on page 148
perform a WAN boot installation.
Create the document root directory Create the document root directory “Creating the Document Root
on the WAN boot server. and any subdirectories to serve the Directory” on page 155
configuration and installation files.
TABLE 12–2 Task Map: Preparing to Perform an Insecure WAN Boot Installation (Continued)
Task Description For Instructions
Create the WAN boot miniroot. Use the setup_install_server “SPARC: To Create a WAN Boot
command to create the WAN boot Miniroot” on page 156
miniroot.
Verify that the client system Check the client OBP for boot “To Check the Client OBP for
supports WAN boot. argument support of WAN boot. WAN Boot Support” on page 159
Install the wanboot program on the Copy the wanboot program to the “Installing the wanboot Program on
WAN boot server. document root directory of the the WAN Boot Server” on page 160
WAN boot server.
Install the wanboot-cgi program Copy the wanboot-cgi program to “To Copy the wanboot-cgi
on the WAN boot server. the WAN boot server's CGI Program to the WAN Boot Server”
directory. on page 165
(Optional) Set up the logging Configure a dedicated system for “(Optional) To Configure the
server. displaying boot and installation log WAN Boot Logging Server” on
messages. page 166
Set up the /etc/netboot hierarchy. Populate the /etc/netboot “Creating the /etc/netboot
hierarchy with the configuration Hierarchy on the WAN Boot
and security files that are required Server” on page 162
for a WAN boot installation.
(Optional) Create a hashing key. Use the wanbootutil keygen “(Optional) To Create a Hashing
command to create HMAC SHA1 Key and an Encryption Key” on
key. page 170
For insecure installations that
check data integrity, complete this
task to create an HMAC SHA1
hashing key.
Create the Solaris Flash archive. Use the flarcreate command to “To Create the Solaris Flash
create an archive of the software Archive” on page 173
that you want to install on the
client.
Create the installation files for the Use a text editor to create the “To Create the sysidcfg File” on
custom JumpStart installation. following files: page 175
■ sysidcfg
“To Create the Profile” on page 176
■ profile
■ rules.ok “To Create the rules File” on
■ begin scripts page 178
■ finish scripts “(Optional) Creating Begin and
Finish Scripts” on page 180
Create the system configuration Set the configuration information “To Create the System
file. in the system.conf file. Configuration File” on page 181
TABLE 12–2 Task Map: Preparing to Perform an Insecure WAN Boot Installation (Continued)
Task Description For Instructions
Create the WAN boot Set the configuration information “To Create the wanboot.conf File”
configuration file. in the wanboot.conf file. on page 183
(Optional) Configure the DHCP Set Sun vendor options and macros “Preconfiguring System
server to support a WAN boot in the DHCP server. Configuration Information With
installation. the DHCP Service (Tasks)” on
page 43
This section describes the following tasks required to configure the WAN boot server for a
WAN boot installation.
■ “Creating the Document Root Directory” on page 155
■ “Creating the WAN Boot Miniroot” on page 156
■ “Installing the wanboot Program on the WAN Boot Server” on page 160
■ “Creating the /etc/netboot Hierarchy on the WAN Boot Server” on page 162
■ “Copying the WAN Boot CGI Program to the WAN Boot Server” on page 165
■ “(Optional) Protecting Data by Using HTTPS” on page 167
If you want to use a document root directory to serve the configuration and installation files,
you must create this directory. See your web server documentation for information about how
to create the document root directory. For detailed information about how to design your
document root directory, see “Storing Installation and Configuration Files in the Document
Root Directory” on page 142.
For an example of how to set up this directory, see “Create the Document Root Directory” on
page 213.
After you create the document root directory, create the WAN boot miniroot. For instructions,
see “Creating the WAN Boot Miniroot” on page 156.
Before You Begin This procedure assumes that the WAN boot server is running the Volume Manager. If you are
not using the Volume Manager, see System Administration Guide: Devices and File Systems.
2 Insert the Solaris Software - 1 CD or the Solaris DVD in the install server's drive.
3 Create a directory for the WAN boot miniroot and Solaris installation image.
# mkdir -p wan-dir-path install-dir-path
-p Instructs the mkdir command to create all the necessary parent directories
for the directory you want to create.
wan-dir-path Specifies the directory where the WAN boot miniroot is to be created on the
install server. This directory needs to accommodate miniroots that are
typically 250 Mbytes in size.
install-dir-path Specifies the directory on the install server where the Solaris software image
is to be copied. This directory can be removed later in this procedure.
In the previous example, cdrom0 is the path to the drive that contains the Solaris OS media.
5 Copy the WAN boot miniroot and the Solaris software image to the WAN boot server's hard disk.
# ./setup_install_server -w wan-dir-path install-dir-path
wan-dir-path Specifies the directory where the WAN boot miniroot is to be copied
install-dir-path Specifies the directory where the Solaris software image is to be copied
Note – The setup_install_server command indicates whether you have enough disk space
available for the Solaris Software disc images. To determine available disk space, use the df -kl
command.
The setup_install_server -w command creates the WAN boot miniroot and a network
installation image of the Solaris software.
7 Make the WAN boot miniroot available to the WAN boot server in one of the following ways.
■ Create a symbolic link to the WAN boot miniroot in the document root directory of the WAN
boot server.
# cd /document-root-directory/miniroot
# ln -s /wan-dir-path/miniroot .
document-root-directory/miniroot Specifies the directory in the WAN boot server's
document root directory where you want to link to
the WAN boot miniroot
/wan-dir-path/miniroot Specifies the path to the WAN boot miniroot
■ Move the WAN boot miniroot to the document root directory on the WAN boot server.
# mv /wan-dir-path/miniroot /document-root-directory/miniroot/miniroot-name
wan-dir-path/miniroot Specifies the path to the WAN boot miniroot.
/document-root-directory/miniroot/ Specifies the path to the WAN boot miniroot
directory in the WAN boot server's document
root directory.
Insert the Solaris Software media in the media drive that is attached to wanserver-1. Type the
following commands.
Move the WAN boot miniroot to the document root directory (/opt/apache/htdocs/) of the
WAN boot server. In this example the name the WAN boot miniroot is set to
miniroot.s10_sparc.
wanserver-1# mv /export/install/cdrom0/miniroot/miniroot \
/opt/apache/htdocs/miniroot/miniroot.s10_sparc
See Also For additional information about the setup_install_server command, see
install_scripts(1M).
You can determine if the client supports WAN boot by checking the client's OBP configuration
variables. Perform the following procedure to check the client for WAN boot support.
Note – Not all client OBPs support WAN Boot. For those clients use the next option.
■ After you complete the preparation tasks and are ready to install the client, perform the
WAN boot installation from the Solaris Software CD1 or DVD. This option works in all
cases when the current OBP does not provide WAN Boot support.
For instructions about how to boot the client from CD1, see “To Perform a WAN Boot
Installation With Local CD Media” on page 206. To continue preparing for the WAN
boot installation, see “Creating the /etc/netboot Hierarchy on the WAN Boot Server”
on page 162.
Example 12–2 Verifying OBP Support for WAN Boot on the Client
The following command shows how to check the client OBP for WAN boot support.
In this example, the output network-boot-arguments: data not available indicates that the
client OBP supports WAN boot.
If the client OBP does not support WAN boot, you do not need to copy the wanboot program to
the WAN boot server. You must provide the wanboot program to the client on a local CD. To
continue the installation, see “Creating the /etc/netboot Hierarchy on the WAN Boot Server”
on page 162.
See Also For additional information about the setup_install_server command, see Chapter 4,
“Installing From the Network (Overview).”
To perform a WAN boot installation, you must provide the wanboot program to the client
during the installation. You can provide this program to the client in the following ways.
■ If your client's PROM supports WAN boot, you can transmit the program from the WAN
boot server to the client. You must install the wanboot program on the WAN boot server.
To check if your client's PROM supports WAN boot, see “To Check the Client OBP for
WAN Boot Support” on page 159.
■ If your client's PROM does not support WAN boot, you must provide the program to the
client on a local CD. If your client's PROM does not support WAN boot, go to “Creating the
/etc/netboot Hierarchy on the WAN Boot Server” on page 162 to continue preparing for
your installation.
This procedure assumes that the WAN boot server is running the Volume Manager. If you are
not using the Volume Manager, see System Administration Guide: Devices and File Systems.
Before You Begin Verify that your client system supports WAN boot. See “To Check the Client OBP for WAN
Boot Support” on page 159 for more information.
2 Insert the Solaris Software - 1 CD or the Solaris DVD in the install server's drive.
3 Change to the sun4u platform directory on the Solaris Software - 1 CD or the Solaris DVD.
# cd /cdrom/cdrom0/Solaris_10/Tools/Boot/platform/sun4u/
5 Make the wanboot program available to the WAN boot server in one of the following ways.
■ Create a symbolic link to the wanboot program in the document root directory of the WAN
boot server.
# cd /document-root-directory/wanboot
# ln -s /wan-dir-path/wanboot .
document-root-directory/wanboot Specifies the directory in the WAN boot server's
document root directory where you want to link to
the wanboot program
/wan-dir-path/wanboot Specifies the path to the wanboot program
■ Move the WAN boot miniroot to the document root directory on the WAN boot server.
# mv /wan-dir-path/wanboot /document-root-directory/wanboot/wanboot-name
wan-dir-path/wanboot Specifies the path to the wanboot program
/document-root-directory/wanboot/ Specifies the path to the wanboot program
directory in the WAN boot server's document root
directory.
wanboot-name Specifies the name of the wanboot program. Name
the file descriptively, for example
wanboot.s10_sparc.
Example 12–3 Installing the wanboot Program on the WAN Boot Server
To install the wanboot program on the WAN boot server, copy the program from the Solaris
Software media to the WAN boot server's document root directory.
Insert the Solaris DVD or the Solaris Software - 1 CD in the media drive that is attached to
wanserver-1 and type the following commands.
wanserver-1# cd /cdrom/cdrom0/Solaris_10/Tools/Boot/platform/sun4u/
wanserver-1# cp wanboot /opt/apache/htdocs/wanboot/wanboot.s10_sparc
See Also For overview information about the wanboot program, see “What Is WAN Boot?” on page 131.
You can create subdirectories within the /etc/netboot directory to customize the scope of the
WAN installation. Use the following directory structures to define how configuration
information is shared among the clients that you want to install.
■ Global configuration – If you want all the clients on your network to share configuration
information, store the files that you want to share in the /etc/netboot directory.
■ Network-specific configuration – If you want only those machines on a specific subnet to
share configuration information, store the configuration files that you want to share in a
subdirectory of /etc/netboot. Have the subdirectory follow this naming convention.
/etc/netboot/net-ip
/etc/netboot/net-ip/client-ID
In this example, net-ip is the IP address of the subnet. client-ID is either the client ID that is
assigned by the DHCP server, or a user-specified client ID.
For detailed planning information about these configurations, see “Storing Configuration and
Security Information in the /etc/netboot Hierarchy” on page 144.
4 Change the owner of the /etc/netboot directory to the web server owner.
# chown web-server-user:web-server-group /etc/netboot/
web-server-user Specifies the user owner of the web server process
web-server-group Specifies the group owner of the web server process
8 For each directory in the /etc/netboot hierarchy, change the permissions to 700.
# chmod 700 /etc/netboot/dir-name
dir-name Specifies the name of a directory in the /etc/netboot hierarchy
Example 12–4 Creating the /etc/netboot Hierarchy on the WAN Boot Server
The following example shows how to create the /etc/netboot hierarchy for the client
010003BA152A42 on subnet 192.168.198.0. In this example, the user nobody and the group
admin own the web server process.
# cd /
# mkdir /etc/netboot/
# chmod 700 /etc/netboot
# chown nobody:admin /etc/netboot
# exit
server# su nobody
Password:
nobody# mkdir -p /etc/netboot/192.168.198.0/010003BA152A42
nobody# chmod 700 /etc/netboot/192.168.198.0
nobody# chmod 700 /etc/netboot/192.168.198.0/010003BA152A42
See Also For detailed planning information about how to design the /etc/netboot hierarchy, see
“Storing Configuration and Security Information in the /etc/netboot Hierarchy” on page 144.
The wanboot-cgi program is installed on the system when you install the current Solaris release
software. To enable the WAN boot server to use this program, copy this program to the
cgi-bin directory of the WAN boot server.
3 On the WAN boot server, change the permissions of the CGI program to 755.
# chmod 755 /WAN-server-root/cgi-bin/wanboot-cgi
If you do not want to set up a separate logging server, see “(Optional) Protecting Data by Using
HTTPS” on page 167 for instructions about how to set up the security features of a WAN boot
installation.
See Also For overview information about the wanboot-cgi program, see “What Is WAN Boot?” on
page 131.
If you want to record boot and installation logging messages on a system other than the client,
you must set up a logging server. If you want to use a logging server with HTTPS during the
installation, you must configure the WAN boot server as the logging server.
1 Copy the bootlog-cgi script to the logging server's CGI script directory.
# cp /usr/lib/inet/wanboot/bootlog-cgi \ log-server-root/cgi-bin
log-server-root/cgi-bin Specifies the cgi-bin directory in the logging server's web server
directory
Example 12–5 Configuring a Logging Server for WAN Boot Installation Over HTTPS
The following example configures the WAN boot server as a logging server.
# cp /usr/lib/inet/wanboot/bootlog-cgi /opt/apache/cgi-bin/
# chmod 755 /opt/apache/cgi-bin/bootlog-cgi
If you do not want to perform a secure WAN boot, skip the procedures in this section. To
continue preparing for your less secure installation, see “Creating the Custom JumpStart
Installation Files” on page 173.
To enable the web server software on the WAN boot server to use HTTPS, you must perform
the following tasks.
■ Activate Secure Sockets Layer (SSL) support in your web server software.
The processes for enabling SSL support and client authentication vary by web server. This
document does not describe how to enable these security features on your web server. For
information about these features, see the following documentation.
■ For information about activating SSL on the SunONE and iPlanet web servers, see the
SunONE and iPlanet documentation collections on http://docs.sun.com.
■ For information about activating SSL on the Apache web server, see the Apache
Documentation Project at http://httpd.apache.org/docs-project/.
■ If you are using web server software that is not listed in the previous list, see your web
server software documentation.
■ Install digital certificates on the WAN boot server.
For information about using digital certificates with WAN boot, see “(Optional) To Use
Digital Certificates for Server and Client Authentication” on page 168.
■ Provide a trusted certificate to the client.
For instructions about how to create a trusted certificate, see “(Optional) To Use Digital
Certificates for Server and Client Authentication” on page 168.
■ Create a hashing key and an encryption key.
For instructions about how to create keys, see “(Optional) To Create a Hashing Key and an
Encryption Key” on page 170.
■ (Optional) Configure the web server software to support client authentication.
For information about how to configure your web server to support client authentication,
see your web server documentation.
This section describes how to use digital certificates and keys in your WAN boot installation.
To use a PKCS#12 file in a WAN boot installation, you perform the following tasks.
■ Split the PKCS#12 file into separate SSL private key and trusted certificate files.
■ Insert the trusted certificate in the client's truststore file in the /etc/netboot hierarchy.
The trusted certificate instructs the client to trust the server.
■ (Optional) Insert the contents of the SSL private key file in the client's keystore file in the
/etc/netboot hierarchy.
The wanbootutil command provides options to perform the tasks in the previous list.
If you do not want to perform a secure WAN boot, skip this procedure. To continue preparing
for your less secure installation, see “Creating the Custom JumpStart Installation Files” on
page 173.
Follow these steps to create a trusted certificate and a client private key.
Before You Begin Before you split a PKCS#12 file, create the appropriate subdirectories of the /etc/netboot
hierarchy on the WAN boot server.
■ For overview information that describes the /etc/netboot hierarchy, see “Storing
Configuration and Security Information in the /etc/netboot Hierarchy” on page 144.
■ For instructions about how to create the /etc/netboot hierarchy, see “Creating the
/etc/netboot Hierarchy on the WAN Boot Server” on page 162.
1 Assume the same user role as the web server user on the WAN boot server.
2 Extract the trusted certificate from the PKCS#12 file. Insert the certificate in the client's
truststore file in the /etc/netboot hierarchy.
# wanbootutil p12split -i p12cert \
-t /etc/netboot/net-ip/client-ID/truststore
p12split
Option to wanbootutil command that splits a PKCS#12 file into separate private key and
certificate files.
-i p12cert
Specifies the name of the PKCS#12 file to split.
-t /etc/netboot/net-ip/client-ID/truststore
Inserts the certificate in the client's truststore file. net-ip is the IP address of the client's
subnet. client-ID can be a user-defined ID or the DHCP client ID.
■ If no, go to “(Optional) To Create a Hashing Key and an Encryption Key”on page 170.
p12split
Option to wanbootutil command that splits a PKCS#12 file into separate private key
and certificate files.
-i p12cert
Specifies the name of the PKCS#12 file to split.
-c /etc/netboot/net-ip/client-ID/certstore
Inserts the client's certificate in the client's certstore. net-ip is the IP address of the
client's subnet. client-ID can be a user-defined ID or the DHCP client ID.
-k keyfile
Specifies the name of the client's SSL private key file to create from the split PKCS#12
file.
keymgmt -i
Inserts an SSL private key in the client's keystore
-k keyfile
Specifies the name of the client's private key file that was created in the previous step
-s /etc/netboot/net-ip/client-ID/keystore
Specifies the path to the client's keystore
-o type=rsa
Specifies the key type as RSA
server# su nobody
Password:
nobody# wanbootutil p12split -i client.p12 \
-t /etc/netboot/192.168.198.0/010003BA152A42/truststore
nobody# chmod 600 /etc/netboot/192.168.198.0/010003BA152A42/truststore
See Also For more information about how to create trusted certificates, see the man page
wanbootutil(1M).
1 Assume the same user role as the web server user on the WAN boot server.
keygen -m Creates the master HMAC SHA1 key for the WAN boot server
3 Create the HMAC SHA1 hashing key for the client from the master key.
# wanbootutil keygen -c -o [net=net-ip,{cid=client-ID,}]type=sha1
-c Creates the client's hashing key from the master key.
-o Indicates that additional options are included for the
wanbootutil keygen command.
(Optional) net=net-ip Specifies the IP address for the client's subnet. If you do not use
the net option, the key is stored in the /etc/netboot/keystore
file, and can be used by all WAN boot clients.
(Optional) cid=client-ID Specifies the client ID. The client ID can be a user-defined ID or
the DHCP client ID. The cid option must be preceded by a valid
net= value. If you do not specify the cid option with the net
option, the key is stored in the /etc/netboot/net-ip/keystore
file. This key can be used by all WAN boot clients on the net-ip
subnet.
type=sha1 Instructs the wanbootutil keygen utility to create a HMAC
SHA1 hashing key for the client.
(Optional) cid=client-ID Specifies the client ID. The client ID can be a user-defined ID, or
the DHCP client ID. The cid option must be preceded by a valid
net= value. If you do not specify the cid option with the net
option, the key is stored in the /etc/netboot/net-ip/keystore
file. This key can be used by all WAN boot clients on the net-ip
subnet.
type=key-type Instructs the wanbootutil keygen utility to create an encryption
key for the client. key-type can have a value of 3des or aes.
Example 12–7 Creating Required Keys for WAN Boot Installation Over HTTPS
The following example creates a master HMAC SHA1 key for the WAN boot server. This
example also creates a HMAC SHA1 hashing key and 3DES encryption key for client
010003BA152A42 on subnet 192.168.198.0.
Before you execute these commands, you must first assume the same user role as the web server
user. In this example, the web server user role is nobody.
server# su nobody
Password:
nobody# wanbootutil keygen -m
nobody# wanbootutil keygen -c -o net=192.168.198.0,cid=010003BA152A42,type=sha1
nobody# wanbootutil keygen -c -o net=192.168.198.0,cid=010003BA152A42,type=3des
See Also For overview information on hashing keys and encryption keys, see “Protecting Data During a
WAN Boot Installation” on page 135.
For more information about how to create hashing and encryption keys, see the man page
wanbootutil(1M).
To prepare the custom JumpStart files for a WAN boot installation, complete the following
tasks.
■ “To Create the Solaris Flash Archive” on page 173
■ “To Create the sysidcfg File” on page 175
■ “To Create the rules File” on page 178
■ “To Create the Profile” on page 176
■ “(Optional) Creating Begin and Finish Scripts” on page 180
For detailed information on the custom JumpStart installation method, see Chapter 2, “Custom
JumpStart (Overview),” in Solaris 10 10/09 Installation Guide: Custom JumpStart and Advanced
Installations.
■ Check your web server software documentation to verify that the software can transmit
files that are the size of a Solaris Flash archive.
■ The flarcreate command no longer has size limitations on individual files. You can
create a Solaris Flash archive that contains individual files over 4 Gbytes.
For more information, see “Creating an Archive That Contains Large Files” in
Solaris 10 10/09 Installation Guide: Solaris Flash Archives (Creation and Installation).
Example 12–8 Creating a Solaris Flash Archive for a WAN Boot Installation
In this example, you create your Solaris Flash archive by cloning the WAN boot server system
with the host name wanserver. The archive is named sol_10_sparc, and is copied exactly from
the master system. The archive is an exact duplicate of the master system. The archive is stored
in sol_10_sparc.flar. You save the archive in the flash/archives subdirectory of the
document root directory on the WAN boot server.
See Also For detailed instructions about how to create a Solaris Flash archive, see Chapter 3, “Creating
Solaris Flash Archives (Tasks),” in Solaris 10 10/09 Installation Guide: Solaris Flash Archives
(Creation and Installation).
For more information about the flarcreate command, see the man page flarcreate(1M).
Before You Begin Create the Solaris Flash archive. See “To Create the Solaris Flash Archive” on page 173 for
detailed instructions.
3 Save the sysidcfg file in a location that is accessible to the WAN boot server.
Save the file to one of the following locations.
■ If the WAN boot server and install server are hosted on the same machine, save this file to
the flash subdirectory of the document root directory on the WAN boot server.
■ If the WAN boot server and install server are not on the same machine, save this file to the
flash subdirectory of the document root directory of the install server.
network_interface=primary {hostname=wanclient
default_route=192.168.198.1
ip_address=192.168.198.210
netmask=255.255.255.0
protocol_ipv6=no}
timezone=US/Central
system_locale=C
terminal=xterm
timeserver=localhost
name_service=NIS {name_server=matter(192.168.255.255)
domain_name=mind.over.example.com
}
security_policy=none
See Also For more detailed information about sysidcfg keywords and values, see “Preconfiguring With
the sysidcfg File” on page 18.
For detailed information about how to create profiles, see “Creating a Profile” in
Solaris 10 10/09 Installation Guide: Custom JumpStart and Advanced Installations.
Before You Begin Create the sysidcfg file for the client. See “To Create the sysidcfg File” on page 175 for
detailed instructions.
1 Create a text file on the install server. Name the file descriptively.
Ensure that the name of the profile reflects how you intend to use the profile to install the Solaris
software on a system. For example, you might name the profiles basic_install, eng_profile,
or user_profile.
3 Save the profile in a location that is accessible to the WAN boot server.
Save the profile in one of the following locations.
■ If the WAN boot server and install server are hosted on the same machine, save this file to
the flash subdirectory of the document root directory on the WAN boot server.
■ If the WAN boot server and install server are not on the same machine, save this file to the
flash subdirectory of the document root directory of the install server.
4 Ensure that root owns the profile and that the permissions are set to 644.
Example 12–10 Retrieving a Solaris Flash Archive From a Secure HTTP Server
In the following example, the profile indicates that the custom JumpStart program retrieves the
Solaris Flash archive from a secure HTTP server.
The following list describes some of the keywords and values from this example.
install_type The profile installs a Solaris Flash archive on the clone system. All files
are overwritten as in an initial installation.
archive_location The compressed Solaris Flash archive is retrieved from a secure HTTP
server.
partitioning The file system slices are determined by the filesys keywords, value
explicit. The size of root (/) is based on the size of the Solaris Flash
archive. The size of swap is set to the necessary size and is installed on
c0t1d0s1. /export/home is based on the remaining disk space.
See Also For more information about how to create a profile, see “Creating a Profile” in Solaris 10 10/09
Installation Guide: Custom JumpStart and Advanced Installations.
For more detailed information about profile keywords and values, see “Profile Keywords and
Values” in Solaris 10 10/09 Installation Guide: Custom JumpStart and Advanced Installations.
The rules file is used to create the rules.ok file, which is required for custom JumpStart
installations.
For detailed information about how to create a rules file, see “Creating the rules File” in
Solaris 10 10/09 Installation Guide: Custom JumpStart and Advanced Installations.
Before You Begin Create the profile for the client. See “To Create the Profile” on page 176 for detailed
instructions.
2 Add a rule in the rules file for each group of systems you want to install.
For detailed information about how to create a rules file, see “Creating the rules File” in
Solaris 10 10/09 Installation Guide: Custom JumpStart and Advanced Installations.
Use this option to run the most recent version of check if your system is
running a previous version of the Solaris OS.
-r file_name Specifies a rules file other than the file that is named rules. By using this
option, you can test the validity of a rule before you integrate the rule into the
rules file.
As the check script runs, the script reports the checking of the validity of the rules file and each
profile. If no errors are encountered, the script reports: The custom JumpStart configuration
is ok. The check script creates the rules.ok file.
5 Save the rules.ok file in a location that is accessible to the WAN boot server.
Save the file to one of the following locations.
■ If the WAN boot server and install server are hosted on the same machine, save this file to
the flash subdirectory of the document root directory on the WAN boot server.
■ If the WAN boot server and install server are not on the same machine, save this file to the
flash subdirectory of the document root directory of the install server.
6 Ensure that root owns the rules.ok file and that the permissions are set to 644.
The IP address of the client system is 192.168.198.210, and the netmask is 255.255.255.0. Use
the network rule keyword to specify the profile that the custom JumpStart programs should use
to install the client.
This rules file instructs the custom JumpStart programs to use the wanclient_prof to install
the current Solaris release software on the client.
After you create the profile and the rules file, you run the check script to verify that the files are
valid.
If the check script does not find any errors, the script creates the rules.ok file.
If you do not want to set up begin and finish scripts, see “Creating the Configuration Files” on
page 181 to continue the WAN boot installation.
See Also For more information about how to create a rules file, see “Creating the rules File” in
Solaris 10 10/09 Installation Guide: Custom JumpStart and Advanced Installations.
For more detailed information about rules file keywords and values, see “Rule Keywords and
Values” in Solaris 10 10/09 Installation Guide: Custom JumpStart and Advanced Installations.
You can use begin scripts to create derived profiles. Finish scripts enable you to perform various
postinstallation tasks, such as adding files, packages, patches, or additional software.
You must store the begin and finish scripts in the same directory as the sysidcfg, rules.ok,
and profile files on the install server.
■ For more information about creating begin scripts, see “Creating Begin Scripts” in
Solaris 10 10/09 Installation Guide: Custom JumpStart and Advanced Installations.
■ For more information about creating finish scripts, see “Creating Finish Scripts” in
Solaris 10 10/09 Installation Guide: Custom JumpStart and Advanced Installations.
To continue preparing for your WAN boot installation, see “Creating the Configuration Files”
on page 181.
This section describes how to create and store these two files.
WAN boot follows the pointers in the system configuration file to install and configure the
client.
The system configuration file is a plain text file, and must be formatted in the following pattern.
setting=value
To use a system configuration file to direct the WAN installation programs to the sysidcfg,
rules.ok, and profile files, follow these steps.
Before You Begin Before you create the system configuration file, you must create the installation files for you
WAN boot installation. See “Creating the Custom JumpStart Installation Files” on page 173 for
detailed instructions.
1 Assume the same user role as the web server user on the WAN boot server.
2 Create a text file. Name the file descriptively, for example, sys-conf.s10–sparc.
For WAN installations that use HTTPS, set the value to a valid HTTPS URL.
SjumpsCF=jumpstart-files-URL
This setting points to the Solaris Flash directory on the install server that contains the
rules.ok file, profile file, and begin and finish scripts. Make sure that this URL matches the
path to the custom JumpStart files that you created in “To Create the Profile” on page 176
and “To Create the rules File” on page 178.
For WAN installations that use HTTPS, set the value to a valid HTTPS URL.
4 Save the file to a directory that is accessible to the WAN boot server.
For administration purposes, you might want to save the file to the appropriate client directory
in the /etc/netboot directory on the WAN boot server.
Example 12–12 System Configuration File for WAN Boot Installation Over HTTPS
In the following example, the WAN boot programs check for the sysidcfg and custom
JumpStart files on the web server https://www.example.com on port 1234. The web server uses
secure HTTP to encrypt data and files during the installation.
The sysidcfg and custom JumpStart files are located in the flash subdirectory of the
document root directory /opt/apache/htdocs.
SsysidCF=https://www.example.com:1234/flash
SjumpsCF=https://www.example.com:1234/flash
Example 12–13 System Configuration File for Insecure WAN Boot Installation
In the following example, the WAN boot programs check for the sysidcfg and custom
JumpStart files on the web server http://www.example.com. The web server uses HTTP, so the
data and files are not protected during the installation.
The sysidcfg and custom JumpStart files are located in the flash subdirectory of the
document root directory /opt/apache/htdocs.
SsysidCF=http://www.example.com/flash
SjumpsCF=http://www.example.com/flash
Save the wanboot.conf file in the appropriate client subdirectory in the /etc/netboot
hierarchy on the WAN boot server. For information about how to define the scope of your
WAN boot installation with the /etc/netboot hierarchy, see “Creating the /etc/netboot
Hierarchy on the WAN Boot Server” on page 162.
If the WAN boot server is running the current Solaris release, a sample wanboot.conf file is
located in /etc/netboot/wanboot.conf.sample. You can use this sample as a template for
your WAN boot installation.
WAN boot server information ■ Path to wanboot program on the WAN boot server
■ URL of wanboot-cgi program on WAN boot server
Install server information ■ Path to WAN boot miniroot on the install server
■ Path to system configuration file on the WAN boot server that
specifies location of sysidcfg and custom JumpStart files
Security information ■ Signature type for the WAN boot file system or WAN boot
miniroot
■ Encryption type for the WAN boot file system
■ Whether the server should be authenticated during the WAN
boot installation
■ Whether the client should be authenticated during the WAN boot
installation
Optional information ■ Additional hosts that might need to be resolved for the client
during a WAN boot installation
■ URL to the bootlog-cgi script on the logging server
You specify this information by listing parameters with associated values in the following
format.
parameter=value
For detailed information about wanboot.conf file parameters and syntax, see “wanboot.conf
File Parameters and Syntax” on page 229.
1 Assume the same user role as the web server user on the WAN boot server.
4 Save the wanboot.conf file to the appropriate subdirectory of the /etc/netboot hierarchy.
For information about how to create the /etc/netboot hierarchy, see “Creating the
/etc/netboot Hierarchy on the WAN Boot Server” on page 162.
Example 12–14 wanboot.conf File for WAN Boot Installation Over HTTPS
The following wanboot.conf file example includes configuration information for a WAN
installation that uses secure HTTP. The wanboot.conf file also indicates that a 3DES encryption
key is used in this installation.
boot_file=/wanboot/wanboot.s10_sparc
root_server=https://www.example.com:1234/cgi-bin/wanboot-cgi
root_file=/miniroot/miniroot.s10_sparc
signature_type=sha1
encryption_type=3des
server_authentication=yes
client_authentication=no
resolve_hosts=
boot_logger=https://www.example.com:1234/cgi-bin/bootlog-cgi
system_conf=sys-conf.s10–sparc
For instructions on how to set up a logging server for your WAN boot installation, see
“(Optional) To Configure the WAN Boot Logging Server” on page 166.
system_conf=sys-conf.s10–sparc
The system configuration file that contains the locations of the sysidcfg and JumpStart files
is located in a subdirectory of the /etc/netboot hierarchy. The system configuration file is
named sys-conf.s10–sparc.
boot_file=/wanboot/wanboot.s10_sparc
root_server=http://www.example.com/cgi-bin/wanboot-cgi
root_file=/miniroot/miniroot.s10_sparc
signature_type=
encryption_type=
server_authentication=no
client_authentication=no
resolve_hosts=
boot_logger=http://www.example.com/cgi-bin/bootlog-cgi
system_conf=sys-conf.s10–sparc
resolve_hosts=
No additional host names are needed to perform the installation. All required files and
information are located in the document root directory on the WAN boot server.
boot_logger=http://www.example.com/cgi-bin/bootlog-cgi
(Optional) Booting and installation log messages are recorded on the WAN boot server.
For instructions on how to set up a logging server for your WAN boot installation, see
“(Optional) To Configure the WAN Boot Logging Server” on page 166.
system_conf=sys-conf.s10–sparc
The system configuration file that contains the locations of the sysidcfg and JumpStart files
is named sys-conf.s10–sparc. This file is located in the appropriate client subdirectory of
the /etc/netboot hierarchy.
If you do not want to use a DHCP server in your WAN boot installation, see “To Check the net
Device Alias in the Client OBP” on page 190 to continue the WAN boot installation.
See Also For detailed descriptions of wanboot.conf parameters and values, see “wanboot.conf File
Parameters and Syntax” on page 229 and the man page wanboot.conf(4).
You can use the following DHCP vendor options in your WAN boot installation.
SHTTPproxy Specifies the IP address of the network's proxy server
SbootURI Specifies the URL of the wanboot-cgi program on the WAN boot server
For information about setting these vendor options on a Solaris DHCP server, see
“Preconfiguring System Configuration Information With the DHCP Service (Tasks)” on
page 43.
For detailed information about setting up a Solaris DHCP server, see Chapter 14, “Configuring
the DHCP Service (Tasks),” in System Administration Guide: IP Services.
To continue with your WAN boot installation, see Chapter 13, “SPARC: Installing With WAN
Boot (Tasks).”
This chapter describes how to perform a WAN boot installation on a SPARC based client. For
information about how to prepare for a WAN boot installation, see Chapter 12, “Installing
With WAN Boot (Tasks).”
Prepare the network for a WAN Set up the servers and files that are Chapter 12, “Installing With WAN
boot installation. required to perform a WAN boot Boot (Tasks)”
installation.
Verify that the net device alias is set Use the devalias command to “To Check the net Device Alias in
correctly in the client OBP. verify that the net device alias is set the Client OBP” on page 190
to the primary network interface.
189
Preparing the Client for a WAN Boot Installation
Provide keys to the client Provide keys to the client by setting “Installing Keys on the Client” on
OBP variables or entering key page 192
values during the installation.
This task is required for secure
installation configurations. For
insecure installations that check
data integrity, complete this task to
provide the HMAC SHA1 hashing
key to the client.
Install the client over a wide area Choose the appropriate method to “To Perform a Noninteractive
network. install your client. WAN Boot Installation” on
page 198
“To Perform an Interactive WAN
Boot Installation” on page 200
“To Perform a WAN Boot
Installation With a DHCP Server”
on page 204
“To Perform a WAN Boot
Installation With Local CD Media”
on page 206
For more information about setting device aliases, see “The Device Tree” in OpenBoot 3.x
Command Reference Manual.
Follow these steps to check the net device alias on the client.
3 At the ok prompt, check device aliases that are set in the OBP.
ok devalias
The devalias command outputs information that is similar to the following example.
screen /pci@1f,0/pci@1,1/SUNW,m64B@2
net /pci@1f,0/pci@1,1/network@c,1
net2 /pci@1f,0/pci@1,1/network@5,1
disk /pci@1f,0/pci@1/scsi@8/disk@0,0
cdrom /pci@1f,0/pci@1,1/ide@d/cdrom@0,0:f
keyboard /pci@1f,0/pci@1,1/ebus@1/su@14,3083f8
mouse /pci@1f,0/pci@1,1/ebus@1/su@14,3062f8
■ If the net alias is set to the network device you wan to use during the installation, you do not
need to reset the alias. Go to “Installing Keys on the Client” on page 192 to continue your
installation.
■ If the net alias is not set to the network device you want to use, you must reset the alias.
Continue.
ok devalias
screen /pci@1f,0/pci@1,1/SUNW,m64B@2
net /pci@1f,0/pci@1,1/network@c,1
net2 /pci@1f,0/pci@1,1/network@5,1
disk /pci@1f,0/pci@1/scsi@8/disk@0,0
cdrom /pci@1f,0/pci@1,1/ide@d/cdrom@0,0:f
keyboard /pci@1f,0/pci@1,1/ebus@1/su@14,3083f8
mouse /pci@1f,0/pci@1,1/ebus@1/su@14,3062f8
If you want to use the /pci@1f,0/pci@1,1/network@5,1 network device, type the following
command.
You can also install keys in the OBP of a running client. If you want to install keys on a running
client, the system must be running the Solaris 9 12/03 OS, or compatible version.
When you install keys on your client, ensure that the key values are not transmitted over an
insecure connection. Follow your site's security policies to ensure the privacy of the key values.
■ For instructions about how to assign key values to OBP network boot argument variables,
see “To Install Keys in the Client OBP” on page 193.
■ For instructions about how to install keys during the boot process, see “To Perform an
Interactive WAN Boot Installation” on page 200.
■ For instructions about how to install keys in the OBP of a running client, see “To Install a
Hashing Key and an Encryption Key on a Running Client” on page 195.
If you want to assign key values to OBP network boot argument variables, follow these steps.
1 Assume the same user role as the web server user on the WAN boot server.
3 Repeat the previous step for each type of client key you want to install.
5 At the client ok prompt, set the value for the hashing key.
ok set-security-key wanboot-hmac-sha1 key-value
set-security-key Installs the key on the client
wanboot-hmac-sha1 Instructs OBP to install a HMAC SHA1 hashing key
key-value Specifies the hexadecimal string that is displayed in Step 2.
The HMAC SHA1 hashing key is installed in the client OBP.
7 (Optional) Verify that the keys are set in the client OBP.
ok list-security-keys
Security Keys:
wanboot-hmac-sha1
wanboot-3des
If you use an AES encryption key in your installation, change wanboot-3des to wanboot-aes
to display the encryption key value.
Install the keys on the client system.
See Also For more information about how to display key values, see the man page wanbootutil(1M).
1 Assume the same user role as the web server user on the WAN boot server.
key-type The key type you want to install on the client. Valid key types are 3des, aes, or
sha1.
The hexadecimal value for the key is displayed.
3 Repeat the previous step for each type of client key you want to install.
6 Repeat the previous step for each type of client key you want to install.
After you install the keys, you are ready to install the client. See “Installing the Client” on
page 197 for instructions about how to install the client system.
If you use an AES encryption key in your installation, change type=3des to type=aes to
display the encryption key value.
See Also For more information about how to display key values, see the man page wanbootutil(1M).
For additional information about how to install keys on a running system, see ickey(1M).
Noninteractive installation Use this installation method if you ■ To install keys on the client
want to install keys on the client before the installation, see
and set the client configuration “Installing Keys on the Client”
information before you boot the
on page 192.
client.
■ To perform a noninteractive
installation, see “To Perform a
Noninteractive WAN Boot
Installation” on page 198.
Interactive installation Use this installation method if you “To Perform an Interactive WAN
want to set the client configuration Boot Installation” on page 200
information during the boot
process.
Installing with a DHCP server Use this installation method if you ■ To configure a DHCP server to
configured the network DHCP support a WAN boot
server to provide client installation, see “(Optional)
configuration information during
Providing Configuration
the installation.
Information With a DHCP
Server” on page 187.
■ To use a DHCP server during
your installation, see “To
Perform a WAN Boot
Installation With a DHCP
Server” on page 204.
Installing with local CD media If your client OBP does not support ■ To determine if the client OBP
WAN boot, boot the client from a supports WAN boot, see “To
local copy of the Solaris Software Check the Client OBP for
CD.
WAN Boot Support” on
page 159.
■ To install the client with a local
copy of the Solaris Software
CD, see “To Perform a WAN
Boot Installation With Local
CD Media” on page 206.
This procedure assumes that you have either installed keys in the client's OBP, or that you are
performing an insecure installation. For information about installing keys on the client before
your installation, see “Installing Keys on the Client” on page 192.
1 If the client system is currently running, bring the system to run level 0.
# init 0
The ok prompt is displayed.
2 At the ok prompt on the client system, set the network boot argument variables in OBP.
ok setenv network-boot-arguments host-ip=client-IP,
router-ip=router-ip,subnet-mask=mask-value,
hostname=client-name,http-proxy=proxy-ip:port,
file=wanbootCGI-URL
Note – The line breaks in this command sample are included for formatting purposes only. Do
not enter a carriage return until you finish typing the command.
See Also For more information about how to set network boot arguments, see set(1).
This procedure assumes that you are using HTTPS in your WAN installation. If you are
performing an insecure installation that does not use keys, do not display or install the client
keys.
1 Assume the same user role as the web server user on the WAN boot server.
client-ID The ID of the client you want to install. The client ID can be a user-defined ID or
the DHCP client ID.
key-type The key type you want to install on the client. Valid key types are 3des, aes, or
sha1.
The hexadecimal value for the key is displayed.
3 Repeat the previous step for each type of client key you are installing.
4 If the client system is currently running, bring the client to run level 0.
5 At the ok prompt on the client system, set the network boot argument variables in OBP.
ok setenv network-boot-arguments host-ip=client-IP,router-ip=router-ip,
subnet-mask=mask-value,hostname=client-name,
http-proxy=proxy-ip:port,bootserver=wanbootCGI-URL
Note – The line breaks in this command sample are included for formatting purposes only. Do
not enter a carriage return until you finish typing the command.
If you use an AES encryption key, use the following format for this
command.
boot> aes=key-value
cid=010003BA152A42
Specifies the client's ID
b482aaab82cb8d5631e16d51478c90079cc1d463
Specifies the value of the client's HMAC SHA1 hashing key
9ebc7a57f240e97c9b9401e9d3ae9b292943d3c143d07f04
Specifies the value of the client's 3DES encryption key
If you use an AES encryption key in your installation, change type=3des to type=aes to
display the encryption key value.
Set the network boot argument variables in the OBP on the client.
boot> 3des=9ebc7a57f240e97c9b9401e9d3ae9b292943d3c143d07f04
boot> sha1=b482aaab82cb8d5631e16d51478c90079cc1d463
boot> go
See Also For more information about how to display key values, see wanbootutil(1M).
For more information about how to set network boot arguments, see set(1).
For more information about how to boot a system, see boot(1M).
1 If the client system is currently running, bring the system to run level 0.
# init 0
The ok prompt is displayed.
2 At the ok prompt on the client system, set the network boot argument variables in OBP.
ok setenv network-boot-arguments dhcp,hostname=client-name
setenv network-boot-arguments Instructs the OBP to set the following boot arguments
dhcp Instructs the OBP to use the DHCP server to configure
the client
hostname=client-name Specifies the host name you want to assign to the client
See Also For more information about how to set network boot arguments, see set(1).
For more information about how to configure a DHCP server, see “(Optional) Providing
Configuration Information With a DHCP Server” on page 187.
This procedure assumes that you are using HTTPS in your WAN installation. If you are
performing an insecure installation, do not display or install the client keys.
Follow these steps to perform a WAN boot installation from a local CD.
1 Assume the same user role as the web server user on the WAN boot server.
3 Repeat the previous step for each type of client key you are installing.
4 On the client system, insert the Solaris Software - 1 CD in the CD-ROM drive.
If you use an AES encryption key, use the following format for this
command.
boot> aes=key-value
boot> host-ip=client-IP
boot> subnet-mask=mask-value
■ Type all the variable and value pairs on one boot> prompt line, then press the Return key.
Type commas to separate each variable and value pair.
boot> host-ip=client-IP,subnet-mask=mask-value,
router-ip=router-ip,hostname=client-name,
http-proxy=proxy-ip:port,bootserver=wanbootCGI-URL
If you use an AES encryption key in your installation, change type=3des to type=aes to
display the encryption key value.
boot> 3des=9ebc7a57f240e97c9b9401e9d3ae9b292943d3c143d07f04
boot> sha1=b482aaab82cb8d5631e16d51478c90079cc1d463
boot> host-ip=192.168.198.124
boot> subnet-mask=255.255.255.128
boot> router-ip=192.168.198.1
boot> hostname=myclient
boot> client-id=010003BA152A42
boot> bootserver=http://192.168.198.135/cgi-bin/wanboot-cgi
boot> go
See Also For more information about how to display key values, see wanbootutil(1M).
For more information about how to set network boot arguments, see set(1).
This chapter provides an example of setting up and installing client systems over a wide area
network (WAN). The examples in this chapter describe how to perform a secure WAN boot
installation over an HTTPS connection.
■ “Sample Site Setup” on page 212
■ “Create the Document Root Directory” on page 213
■ “Create the WAN Boot Miniroot” on page 213
■ “Check the Client OBP for WAN Boot Support” on page 213
■ “Install the wanboot Program on the WAN Boot Server” on page 214
■ “Create the /etc/netboot Hierarchy” on page 214
■ “Copy the wanboot-cgi Program to the WAN Boot Server” on page 215
■ “(Optional) Configure the WAN Boot Server as a Logging Server” on page 215
■ “Configure the WAN Boot Server to Use HTTPS” on page 215
■ “Provide the Trusted Certificate to the Client” on page 215
■ “(Optional) Use Private Key and Certificate for Client Authentication” on page 216
■ “Create the Keys for the Server and the Client” on page 217
■ “Create the Solaris Flash Archive” on page 217
■ “Create the sysidcfg File” on page 218
■ “Create the Client's Profile” on page 218
■ “Create and Validate the rules File” on page 219
■ “Create the System Configuration File” on page 219
■ “Create the wanboot.conf File” on page 220
■ “Check the net Device Alias in OBP” on page 221
■ “Install Keys on the Client” on page 222
■ “Install the Client” on page 223
211
Sample Site Setup
WAN LAN
wanclient-1
wanserver-1
ID: 010003BA 152A42
Combination WAN
IP address: boot server and
192.168.198.210 install server
Network address: IP Address:
192.168.198.0 192.168.198.2
Domain:
www.example.com
Insert the Solaris Software media in the media drive that is attached to wanserver-1. Type the
following commands.
Move the WAN boot miniroot to the document root directory (/opt/apache/htdocs/) of the
WAN boot server.
wanserver-1# mv /export/install/cdrom0/miniroot/miniroot \
/opt/apache/htdocs/miniroot/miniroot.s10_sparc
Insert the Solaris DVD or the Solaris Software - 1 CD in the media drive that is attached to
wanserver-1 and type the following commands.
wanserver-1# cd /cdrom/cdrom0/Solaris_10/Tools/Boot/platform/sun4u/
wanserver-1# cp wanboot /opt/apache/htdocs/wanboot/wanboot.s10_sparc
wanserver-1# cd /
wanserver-1# mkdir /etc/netboot/
wanserver-1# chmod 700 /etc/netboot
wanserver-1# chown nobody:admin /etc/netboot
wanserver-1# exit
wanserver-1# su nobody
Password:
nobody# mkdir -p /etc/netboot/192.168.198.0/010003BA152A42
nobody# chmod 700 /etc/netboot/192.168.198.0
nobody# chmod 700 /etc/netboot/192.168.198.0/010003BA152A42
wanserver-1# cp /usr/lib/inet/wanboot/wanboot-cgi \
/opt/apache/cgi-bin/wanboot-cgi
wanserver-1# chmod 755 /opt/apache/cgi-bin/wanboot-cgi
In this example, you assume the web server user role of nobody. Then, you split the server
PKCS#12 certificate that is named cert.p12, and insert the trusted certificate in /etc/netboot
directory for wanclient-1.
wanserver-1# su nobody
Password:
wanserver-1# wanbootutil p12split -i cert.p12 -t \
/etc/netboot/192.168.198.0/010003BA152A42/truststore
To provide a private key and certificate to the client, perform the following tasks.
■ Assume the same user role as the web server user
■ Split the PKCS#12 file into a private key and a client certificate
■ Insert the certificate in the client's certstore file
■ Insert the private key in the client's keystore file
In this example, you assume the web server user role of nobody. Then, you split the server
PKCS#12 certificate that is named cert.p12. You insert certificate in the /etc/netboot
hierarchy for wanclient-1. You then insert the private key that you named wanclient.key in
the client's keystore file.
wanserver-1# su nobody
Password:
wanserver-1# wanbootutil p12split -i cert.p12 -c \
/etc/netboot/192.168.198.0/010003BA152A42/certstore -k wanclient.key
wanserver-1# wanbootutil keymgmt -i -k wanclient.key \
-s /etc/netboot/192.168.198.0/010003BA152A42/keystore \
-o type=rsa
First, you assume the same user role as the web server user. In this example, the web server user
role is nobody.
wanserver-1# su nobody
Password:
Then, you use the wanbootutil keygen command to create a master HMAC SHA1 key for
wanserver-1.
The previous command creates a HMAC SHA1 hashing key and a 3DES encryption key for
wanclient-1. 192.168.198.0 specifies the subnet of wanclient-1, and 010003BA152A42
specifies the client ID of wanclient-1.
The following is an example of a sysidcfg file for wanclient-1. The host name, IP address, and
netmask of these systems have been preconfigured by editing the naming service. This file is
located in the /opt/apache/htdocs/flash/ directory.
network_interface=primary {hostname=wanclient-1
default_route=192.168.198.1
ip_address=192.168.198.210
netmask=255.255.255.0
protocol_ipv6=no}
timezone=US/Central
system_locale=C
terminal=xterm
timeserver=localhost
name_service=NIS {name_server=matter(192.168.254.254)
domain_name=leti.example.com
}
security_policy=none
The following list describes some of the keywords and values from this example.
install_type The profile installs a Solaris Flash archive on the clone system. All files
are overwritten as in an initial installation.
archive_location The compressed Solaris Flash archive is retrieved from wanserver-1.
partitioning The file system slices are determined by the filesys keywords, value
explicit. The size of root (/) is based on the size of the Solaris Flash
archive. The size of swap is set to the necessary size and is installed on
c0t1d0s1. /export/home is based on the remaining disk space.
/export/home is installed on c0t1d0s7.
The IP address of the wanclient-1 system is 192.168.198.210, and the netmask is 255.255.255.0.
Use the network rule keyword to specify the profile that the custom JumpStart programs should
use to install wanclient-1.
This rules file instructs the custom JumpStart programs to use the wanclient_1_prof to install
the current Solaris release software on wanclient-1.
After you create the profile and the rules file, you run the check script to verify that the files are
valid.
If the check script does not find any errors, the script creates the rules.ok file.
In the following example, the wanboot-cgi program looks for the sysidcfg and custom
JumpStart files in the document root directory of the WAN boot server. The domain name of
the WAN boot server is https://www.example.com. The WAN boot server is configured to use
secure HTTP, so the data and files are protected during the installation.
In this example, the system configuration file is named sys-conf.s10–sparc, and the file is
saved in the /etc/netboot hierarchy on the WAN boot server. The sysidcfg and custom
JumpStart files are located in the flash subdirectory of the document root directory.
SsysidCF=https://www.example.com/flash/
SjumpsCF=https://www.example.com/flash/
The following wanboot.conf file for wanclient-1 includes configuration information for a
WAN installation that uses secure HTTP. This file also instructs WAN boot to use a HMAC
SHA1 hashing key and a 3DES encryption key to protect data.
boot_file=/wanboot/wanboot.s10_sparc
root_server=https://www.example.com/cgi-bin/wanboot-cgi
root_file=/miniroot/miniroot.s10_sparc
signature_type=sha1
encryption_type=3des
server_authentication=yes
client_authentication=no
resolve_hosts=
boot_logger=
system_conf=sys-conf.s10–sparc
encryption_type=3des
The wanboot program and the WAN boot file system are encrypted with a 3DES key.
server_authentication=yes
The server is authenticated during the installation.
client_authentication=no
The client is not authenticated during the installation.
Note – If you performed the tasks in “(Optional) Use Private Key and Certificate for Client
Authentication” on page 216, set this parameter as client_authentication=yes
resolve_hosts=
No additional host names are needed to perform the WAN installation. All the host names
that are required by the wanboot-cgi program are specified in the wanboot.conf file and the
client certificate.
boot_logger=
Booting and installation log messages are displayed on the system console. If you configured
the logging server in “(Optional) Configure the WAN Boot Server as a Logging Server” on
page 215, and you want WAN boot messages to appear on the WAN boot server as well, set
this parameter to boot_logger=https://www.example.com/cgi-bin/bootlog-cgi.
system_conf=sys-conf.s10–sparc
The system configuration file that specifies the locations of the sysidcfg and JumpStart files
is located in the sys-conf.s10–sparc file in the /etc/netboot hierarchy on wanserver-1.
ok devalias
screen /pci@1f,0/pci@1,1/SUNW,m64B@2
net /pci@1f,0/pci@1,1/network@c,1
net2 /pci@1f,0/pci@1,1/network@5,1
disk /pci@1f,0/pci@1/scsi@8/disk@0,0
cdrom /pci@1f,0/pci@1,1/ide@d/cdrom@0,0:f
keyboard /pci@1f,0/pci@1,1/ebus@1/su@14,3083f8
mouse /pci@1f,0/pci@1,1/ebus@1/su@14,3062f8
If you use an AES encryption key in your installation, change type=3des to type=aes to
display the encryption key value.
The client installs over the WAN. If the wanboot program does not find all the necessary
installation information, you might be prompted to provide the missing information at the
command line.
This chapter briefly describes the commands and files you use to perform a WAN installation.
■ “WAN Boot Installation Commands” on page 225
■ “OBP Commands” on page 228
■ “System Configuration File Settings and Syntax” on page 229
■ “wanboot.conf File Parameters and Syntax” on page 229
TABLE 15–1 Preparing the WAN Boot Installation and Configuration Files
225
WAN Boot Installation Commands
TABLE 15–1 Preparing the WAN Boot Installation and Configuration Files (Continued)
Task and Description Command
Create a master HMAC SHA1 key for the WAN boot wanbootutil keygen -m
server.
Create a HMAC SHA1 hashing key for the client. wanbootutil keygen -c -o
■ net-ip is the IP address of the client's subnet. net=net-ip,cid=client-ID,type=sha1
■ client-ID can be a user-defined ID or the DHCP
client ID.
Split a PKCS#12 certificate file and insert the wanbootutil p12split -i p12cert -t
certificate in the client's truststore. /etc/netboot/net-ip/client-ID/truststore
■ p12cert is the name of the PKCS#12 certificate
file.
■ net-ip is the IP address of the client's subnet.
■ client-ID can be a user-defined ID or the DHCP
client ID.
Split a PKCS#12 certificate file and insert the client wanbootutil p12split -i p12cert -c
certificate in the client's certstore. /etc/netboot/net-ip/client-ID/certstore -k keyfile
■ p12cert is the name of the PKCS#12 certificate
file.
■ net-ip is the IP address of the client's subnet.
■ client-ID can be a user-defined ID or the DHCP
client ID.
■ keyfile is the name of the client's private key.
Insert the client private key from a split PKCS#12 file wanbootutil keymgmt -i -k keyfile -s
in the client's keystore. /etc/netboot/net-ip/client-ID/keystore -o
■ keyfile is the name of the client's private key. type=rsa
■ net-ip is the IP address of the client's subnet.
■ client-ID can be a user-defined ID or a DHCP
client ID.
OBP Commands
The following table lists the OBP commands that you type at the client ok prompt to perform a
WAN boot installation.
Begin a WAN boot installation from a local CD. boot cdrom –F wanboot - install
Install a hashing key before you begin a WAN boot set-security-key wanboot-hmac-sha1 key-value
installation.key-value is the hexadecimal value of the
hashing key.
Install an encryption key before you begin a WAN set-security-key key-type key-value
boot installation.
■ key-type is either wanboot-3des or wanboot-aes.
■ key-value is the hexadecimal value of the
encryption key.
Set the network device alias, where device-path is the ■ To set the alias for the current installation only,
path to the primary network device. type devalias net device-path.
■ To permanently set the alias, type nvvalias net
device-path.
The system configuration file is a plain text file, and must be formatted in the following pattern.
setting=value
You can store the system.conf in any directory that is accessible to the WAN boot server.
Save the wanboot.conf file in the appropriate client subdirectory in the /etc/netboot
hierarchy on the WAN boot server. For information on how to define the scope of your WAN
boot installation with the /etc/netboot hierarchy, see “Creating the /etc/netboot Hierarchy
on the WAN Boot Server” on page 162.
You specify information in the wanboot.conf file by listing parameters with associated values
in the following format.
parameter=value
Parameter entries cannot span lines. You can include comments in the file by preceding the
comments with the # character.
For detailed information about the wanboot.conf file, see the man page wanboot.conf(4).
boot_file=/wanboot/wanboot.s10_sparc
root_server=wanbootCGI-URL/wanboot-cgi
This parameter specifies the URL of the wanboot-cgi program on the WAN boot server.
■ Use an HTTP URL if you are performing a WAN boot installation without client or
server authentication.
root_server=http://www.example.com/cgi-bin/wanboot-cgi
■ Use an HTTPS URL if you are performing a WAN boot installation with server
authentication, or server and client authentication.
root_server=https://www.example.com/cgi-bin/wanboot-cgi
root_file=miniroot-path
This parameter specifies the path to the WAN boot miniroot on the WAN boot server. The
value is a path relative to the document root directory on the WAN boot server.
root_file=/miniroot/miniroot.s10_sparc
signature_type=sha1 | empty
This parameter specifies the type of hashing key to use to check the integrity of the data and
files that are transmitted.
■ For WAN boot installations that use a hashing key to protect the wanboot program, set
this value to sha1.
signature_type=sha1
■ For insecure WAN installations that do not use a hashing key, leave this value blank.
signature_type=
encryption_type=3des | aes | empty
This parameter specifies the type of encryption to use to encrypt the wanboot program and
WAN boot file system.
■ For WAN boot installations that use HTTPS, set this value to 3des or aes to match the
key formats you use. You must also set the signature_type keyword value to sha1.
encryption_type=3des
or
encryption_type=aes
■ For an insecure WAN boot installations that do not use encryption key, leave this value
blank.
encryption_type=
server_authentication=yes | no
This parameter specifies if the server should be authenticated during the WAN boot
installation.
■ For WAN boot installations with server authentication or server and client
authentication, set this value to yes. You must also set the value of signature_type to
sha1, encryption_type to 3des or aes, and the URL of root_server to an HTTPS value.
server_authentication=yes
■ For insecure WAN boot installations that do not use server authentication or server and
client authentication, set this value to no. You can also leave the value blank.
server_authentication=no
client_authentication=yes | no
This parameter specifies if the client should be authenticated during a WAN boot
installation.
■ For WAN boot installations with server and client authentication, set this value to yes.
You must also set the value of signature_type to sha1, encryption_type to 3des or
aes, and the URL of root_server to an HTTPS value.
client_authentication=yes
■ For WAN boot installations that do not use client authentication, set this value to no. You
can also leave the value blank.
client_authentication=no
resolve_hosts=hostname | empty
This parameter specifies additional hosts that need to be resolved for the wanboot-cgi
program during the installation.
Set the value to the host names of systems that are not specified previously in the
wanboot.conf file or in a client certificate.
■ If all the required hosts are listed in the wanboot.conf file or the client certificate, leave
this value blank.
resolve_hosts=
■ If specific hosts are not listed in the wanboot.conf file or the client certificate, set the
value to these host names.
resolve_hosts=seahag,matters
boot_logger=bootlog-cgi-path | empty
This parameter specifies the URL to the bootlog-cgi script on the logging server.
■ To record boot or installation log messages on a dedicated logging server, set the value to
the URL of the bootlog-cgi script on the logging server.
boot_logger=http://www.example.com/cgi-bin/bootlog-cgi
■ To display boot and installation messages on the client console, leave this value blank.
boot_logger=
system_conf=system.conf | custom-system-conf
This parameter specifies the path to the system configuration file that includes the location of
sysidcfg and custom JumpStart files.
Set the value to the path to the sysidcfg and custom JumpStart files on the web server.
system_conf=sys.conf
Appendixes
This part provides reference information.
233
234
A
A P P E N D I X A
Troubleshooting (Tasks)
This chapter contains a list of specific error messages and general problems you might
encounter when installing Solaris 10 10/09 software. The chapter also explains how to fix the
problems. Start by using this list of sections to determine where in the installation process the
problem occurred.
■ “Problems With Setting Up Network Installations” on page 235
■ “Problems With Booting a System” on page 236
■ “Initial Installation of the Solaris OS” on page 241
■ “Upgrading the Solaris OS” on page 244
Note – When you see the phrase “bootable media,” this means the Solaris installation program
and JumpStart installation method.
Solution: Add the host host_name to the naming service and run the add_install_client
command again.
Error: <system name> does not exist in the NIS ethers map
Add it, and rerun the add_install_client command
Description: When you run the add_install_client command, the command fails with the
above error.
Cause: The client you are adding to the install server does not exist in the server's
/etc/ethers file.
235
Problems With Booting a System
Solution: Add the needed information to the /etc/ethers file on the install server and run
the add_install_client command again.
1. Become superuser or assume an equivalent role.
2. On the client, find the ethers address.
Solution: If this is a nonnetworked system, ignore this message. If this is a networked system,
ensure that the Ethernet cabling is attached securely.
Solution: Verify that the system has been set up properly to install the Solaris 10 10/09
software from the network from an install server. The following are examples of checks you
can make.
■ If you copied the images of the Solaris DVD or the Solaris Software CDs to the install
server, ensure that you specified the correct platform group for the system when you set
it up.
■ If you are using DVD or CD media, ensure that the Solaris DVD or Solaris Software - 1
CD is mounted and accessible on the install server.
WARNING: clock gained xxx days -- CHECK AND RESET DATE! (SPARC based systems
only)
Description: This is an informational message.
Solution: Select the BIOS to boot. See your BIOS documentation for instructions.
Note – If this flag is not given, the messages are still printed, but the output is directed to the
system log file. For more information, see syslogd(1M).
Solution: For SPARC based systems, at the ok prompt, type the following command.
Boot from DVD media fails on systems with Toshiba SD-M 1401 DVD-ROM
Description: If your system has a Toshiba SD-M1401 DVD-ROM with firmware revision
1007, the system cannot boot from the Solaris DVD.
Solution: Apply patch 111649–03, or later version, to update the Toshiba SD-M1401
DVD-ROM drive's firmware. The patch 111649–03 is available at sunsolve.sun.com.
The system hangs or panics when nonmemory PC cards are inserted. (x86 based
systems only)
Cause: Nonmemory PC cards cannot use the same memory resources that are used by other
devices.
Solution: To correct this problem, see the instructions for your PC card and check for the
address range.
The system hangs before displaying the system prompt. (x86 based systems only)
Solution: You have hardware that is not supported. Check your hardware manufacturer's
documentation.
Cause: Reason 1:/etc/bootparams files might exist on different servers with an entry for this
install client.
Solution: Reason 1: Ensure that servers on the network do not have multiple
/etc/bootparams entries for the install client. If they do have multiple entries, remove
duplicate client entries in the /etc/bootparams file on all install servers and boot servers
except the one you want the install client to use.
Cause: Reason 2: Multiple /tftpboot or /rplboot directory entries might exist for this install
client.
Solution: Reason 2: Ensure that servers on the network do not have multiple /tftpboot or
/rplboot directory entries for the install client. If they do have multiple entries, remove
duplicate client entries from the /tftpboot or /rplboot directories on all install servers and
boot servers except the one you want the install client to use.
Cause: Reason 3: An install client entry might exist in the /etc/bootparams file on a server
and an entry in another /etc/bootparams file that enables all systems to access the profile
server. Such an entry resembles the following:
* install_config=profile_server:path
A line that resembles the previous entry in the NIS or NIS+ bootparams table can also cause
this error.
Solution: Reason 3: If a wildcard entry is in the naming service bootparams map or table (for
example, * install_config=), delete it and add it to the /etc/bootparams file on the boot
server.
Solution: Ensure that you correctly set up the system to install from the network. See “Adding
Systems to Be Installed From the Network With a CD Image” on page 92.
prom_panic: Could not mount file system (SPARC based systems only)
Cause: This error occurs when you are installing Solaris from a network, but the boot
software cannot locate the following:
■ Solaris DVD, either the DVD or a copy of the DVD image on the install server
■ Solaris Software - 1 CD image, either the Solaris Software - 1 CD or a copy of the CD
image on the install server
Solution: Reason 1: Verify the system's host name is in the NIS or NIS+ naming service. Also,
verify the bootparams search order in the boot server's /etc/nsswitch.conf file.
For example, the following line in the /etc/nsswitch.conf file indicates that JumpStart or
the Solaris installation program first looks in the NIS maps for bootparams information. If
the program does not find any information, the installer looks in the boot server's
/etc/bootparams file.
Solution: Reason 2: Verify that the client's Ethernet address in the install server's
/etc/ethers file is correct.
Cause: Reason 3: In a custom JumpStart installation, the add_install_client command
specifies the platform group that uses a specified server as an install server. If the wrong
architecture value is used when using the add_install_client, this problem occurs. For
example, the machine you want to install is a sun4u, but you used i86pc instead.
Solution: Reason 3: Rerun add_install_client with the correct architecture value.
ip: joining multicasts failed on tr0 - will use link layer broadcasts for
multicast (x86 based systems only)
Cause: This error message is displayed when you boot a system with a token ring card.
Ethernet multicast and token ring multicast do not work the same way. The driver returns
this error message because an invalid multicast address was provided to it.
Solution: Ignore this error message. If multicast does not work, IP uses layer broadcasts
instead and does not cause the installation to fail.
RPC: Timed out No bootparams (whoami) server responding; still trying... (x86
based systems only)
Cause: The client is trying to boot from the network, but it cannot find a system with an entry
in the /etc/bootparams file on the install server.
Solution: Use add_install_client on the install server. Using this command adds the
proper entry in the /etc/bootparams file, enabling the client to boot from the network.
Solution: On the install server, execute add_install_client for the system to be installed.
The add_install_client command sets up an /rplboot directory, which contains the
necessary network boot program.
Solution: In the DHCP Manager software, verify that the options and macros are correctly
defined. Confirm that the Router option is defined, and that the value of the Router option is
correct for the subnet you are using for the network installation.
Solution: On the name server, update the /etc/bootparams entry for the system that is being
installed. The entry should conform to the following syntax:
Also, ensure that only one bootparams entry is on the subnet for the install client.
The system does not boot from the network (network installations with DHCP only).
Cause: The DHCP server is not configured correctly. This error might occur if the system is
not configured as an installation client on the DHCP server.
Solution: In the DHCP manager software, verify that installation options and macros are
defined for the client system. For more information, see “Preconfiguring System
Configuration Information With the DHCP Service (Tasks)” on page 43.
You cannot uninstall the Solaris software after the software has been partially installed. You
must restore your system from a backup or begin the Solaris installation process again.
x86 only – If you are using the locale keyword to test a custom JumpStart profile for an initial
installation, the pfinstall -D command fails to test the profile. For a workaround, see the error
message “could not select locale,” in the section, “Upgrading the Solaris OS” on page 244.
3 When you are prompted to select an installation type, select option 6, Single user shell.
5 Specify the IDE disk drive on which you want to perform a surface analysis.
# cxdy
cx Is the controller number
dy Is the device number
format> fdisk
format> repair
Solution: A patch is needed to install Solaris Live Upgrade. Ensure that you have the most
recently updated patch list by consulting http://sunsolve.sun.com. Search for the info doc
72099 on the SunSolve web site.
Solution: To upgrade, you can either create a swap slice that is larger than or equal to 512
Mbytes or use another method of upgrading such as the Solaris installation program from
Solaris DVD, a net installation image, or JumpStart.
With the introduction of GRUB software, the miniroot is compressed. The software can no
longer find the list of locales from the compressed miniroot. The miniroot is the smallest
possible Solaris root (/) file system and is found on the Solaris installation media.
# LOFI_DEVICE=/usr/sbin/lofiadm -a $TEMP_FILE_NAME
# echo $LOFI_DEVICE
/dev/lofi/1
4. Mount the miniroot with the lofi command under the Miniroot directory.
# umount $LOFI_DEVICE
7. Delete the lofi device.
# lofiadm -d $TEMP_FILE_NAME
Solution: Reason 1: Move the /var/sadm directory into the root (/) or /var file system.
Solution: Reason 2: Create a new INST_RELEASE file by using the following template:
OS=Solaris
VERSION=x
REV=0
x Is the version of Solaris software on the system
Solution: Solution 3: You need to do an initial installation. The Solaris software is not
upgradable.
The upgrade fails because the Solaris installation program cannot mount a file
system.
Cause: During an upgrade, the script attempts to mount all the file systems that are listed in
the system's /etc/vfstab file on the root (/) file system that is being upgraded. If the
installation script cannot mount a file system, it fails and exits.
Solution: Ensure that all file systems in the system's /etc/vfstab file can be mounted.
Comment out any file systems in the /etc/vfstab file that cannot be mounted or that might
cause the problem so that the Solaris installation program does not try to mount them
during the upgrade. Any system-based file systems that contain software to be upgraded (for
example, /usr) cannot be commented out.
Cause: Check “Upgrading With Disk Space Reallocation” in Solaris 10 10/09 Installation
Guide: Planning for Installation and Upgrade for the space problem and see if you can fix it
without using auto-layout to reallocate space.
1 Reboot the system from the Solaris DVD, the Solaris Software - 1 CD, or from the network.
Cause: An older version of Solaris Live Upgrade is being used. The Solaris Live Upgrade
packages you have installed on your system are incompatible with the media and the release
on that media.
Solution: Always use the Solaris Live Upgrade packages from the release you are upgrading
to.
Example: In the following example, the error message indicates that the Solaris Live Upgrade
packages on the system are not the same version as on the media.
Solution: Before using Solaris Live Upgrade, always install all the required patches. Ensure
that you have the most recently updated patch list by consulting http://sunsolve.sun.com.
Search for the info doc 72099 on the SunSolve web site.
ERROR: Device mapping command </sbin/biosdev> failed. Please reboot and try
again.
Cause: Reason 1: Solaris Live Upgrade is unable to map devices because of previous
administrative tasks.
Solution: Reason 1: Reboot the system and try Solaris Live Upgrade again
Cause: Reason 2: If you reboot your system and get the same error message, you have two or
more identical disks. The device mapping command is unable to distinguish between them.
Solution: Reason 2: Create a new dummy fdisk partition on one of the disks. See the
fdisk(1M) man page. Then reboot the system.
Cannot delete the boot environment that contains the GRUB menu
Cause: Solaris Live Upgrade imposes the restriction that a boot environment cannot be
deleted if the boot environment contains the GRUB menu.
The file system containing the GRUB menu was accidentally remade. However, the
disk has the same slices as before. For example, the disk was not re-sliced.
Cause: The file system that contains the GRUB menu is critical to keeping the system
bootable. Solaris Live Upgrade commands do not destroy the GRUB menu. But, if you
accidentally remake or otherwise destroy the file system containing the GRUB menu with a
command other than a Solaris Live Upgrade command, the recovery software attempts to
reinstall the GRUB menu. The recovery software puts the GRUB menu back in the same file
system at the next reboot. For example, you might have used the newfs or mkfs commands
on the file system and accidentally destroyed the GRUB menu. To restore the GRUB menu
correctly, the slice must adhere to the following conditions:
■ Contain a mountable file system
■ Remain a part of the same Solaris Live Upgrade boot environment where the slice
resided previously
Before rebooting the system, make any necessary corrective actions on the slice.
Solution: Reboot the system. A backup copy of the GRUB menu is automatically installed.
3 Before upgrading the inactive boot environment, you must disable the existing Veritas software
on the inactive boot environment.
c. Make a copy of the inactive boot environment's vfstab file, for example:
# cp vfstab vfstab.501
d. In the copied vfstab, comment out all Veritas file system entries, for example:
# sed ’/vx\/dsk/s/^/#/g’ < vfstab > vfstab.novxfs
The first character of each line is changed to #, which makes the line a comment line. Note
that this comment line is different than the system file-comment lines.
f. Change directories to the inactive boot environment's system file, for example:
# cd /mnt/etc
g. Make a copy of the inactive boot environment's system file, for example:
# cp system system.501
4 Upgrade the inactive boot environment. See Chapter 5,“Upgrading With Solaris Live Upgrade
(Tasks),” in Solaris 10 10/09 Installation Guide: Solaris Live Upgrade and Upgrade Planning.
5 Activate the inactive boot environment. See “Activating a Boot Environment”in Solaris 10 10/09
Installation Guide: Solaris Live Upgrade and Upgrade Planning.
8 Upgrade Veritas.
a. Remove the Veritas VRTSvmsa package from the system, for example:
# pkgrm VRTSvmsa
If you installed the Solaris 8 2/02 OS on a system with a service partition, the installation
program might not have preserved the service partition. If you did not manually edit the fdisk
boot partition layout to preserve the service partition, the installation program deleted the
service partition during the installation.
Note – If you did not specifically preserve the service partition when you installed the Solaris 8
2/02 OS, you might not be able to re-create the service partition and upgrade to the current
Solaris release.
If you want to include a service partition on the disk that contains the Solaris partition, choose
one of the following workarounds.
2 Before you install, create the service partition by using the diagnostics CD for your system.
For information about how to create the service partition, see your hardware documentation.
2 Before you install, create the service partition by using the diagnostics CD for your system.
For information about how to create the service partition, see your hardware documentation.
3 The installation program prompts you to choose a method for creating the Solaris partition.
This appendix describes how to use the Solaris installation program to install or upgrade to the
Solaris OS on a machine or domain that does not have a directly attached DVD-ROM or
CD-ROM drive.
Note – If you are installing or upgrading the Solaris OS on a multi–domain server, refer to the
system controller or system service processor documentation before beginning the installation
process.
In the following procedure, the remote system with the DVD-ROM or CD-ROM is identified as
remote system. The system that is the client to be installed is identified as client system.
253
SPARC: Using the Solaris Installation Program to Install or Upgrade From a Remote DVD-ROM or CD-ROM
1 Identify a system that is running the Solaris OS and has a DVD-ROM or CD-ROM drive.
2 On the remote system with the DVD-ROM or CD-ROM drive, insert the Solaris DVD or the Solaris
Software for SPARC Platforms - 1 CD in the drive.
The Volume Manager mounts the disc.
3 On the remote system, change directories to the DVD or CD where the add_install_client
command is located.
■ For DVD media, type:
4 On the remote system, add the system that you want to install as a client.
■ For DVD media, type:
■ If you are using CD media, the machine reboots and the Solaris installation program begins.
After the Welcome panel, the Specify Media panel appears with Network File System
selected. Proceed to Step 7.
8 On the remote system where the DVD or CD is mounted, change directories to root.
remote system# cd /
9 On the remote system, check for the path to the slice that has been shared.
remote system# share
10 On the remote system, unshare the Solaris DVD or Solaris Software for SPARC Platforms - 1 CD by
using the path that is found in Step 9. If paths lead to two slices, unshare both slices.
remote system# unshare absolute_path
absolute_path Is the absolute path shown in the share command
In this example, slice 0 and slice 1 are unshared.
11 On the client system that you are installing, continue the Solaris installation by clicking Next.
12 If the Solaris installation program prompts you to insert the Solaris Software - 2 CD, repeat
Step 9 through Step 11 to unshare the Solaris Software - 1 CD and to export and install the
Solaris Software - 2 CD.
13 If the Solaris installation program prompts you to insert additional Solaris Software CDs, repeat
Step 9 through Step 11 to unshare the Solaris Software CDs and to export and install the
additional CDs.
14 If the Solaris installation program prompts you to insert the first Solaris Languages CD, repeat
Step 9 through Step 11 to unshare the Solaris Software CDs and to export and install each
Solaris Languages CD.
When you export a Solaris Languages CD, an installer window appears on the machine where
the CD-ROM is mounted. Ignore the installer window while you install the Solaris Languages
CD. After you complete the installation of the Solaris Languages CDs, close the installer
window.
3DES ([Triple DES] Triple-Data Encryption Standard). A symmetric-key encryption method that provides a key
length of 168 bits.
AES (Advanced Encryption Standard) A symmetric 128-bit block data encryption technique. The U.S.
government adopted the Rijndael variant of the algorithm as its encryption standard in October 2000. AES
replaces DES encryption as the government standard.
archive A file that contains a collection of files that were copied from a master system. The file also contains
identification information about the archive, such as a name and the date that you created the archive.
After you install an archive on a system, the system contains the exact configuration of the master system.
An archive could be a differential archive, which is a Solaris Flash archive that contains only the differences
between two system images, an unchanged master image and an updated master image. The differential
archive contains files to be retained, modified, or deleted from the clone system. A differential update
changes only the files specified and is restricted to systems that contain software consistent with the
unchanged master image.
arrow keys One of the four directional keys on the numeric keypad.
begin script A user-defined Bourne shell script, specified within the rules file, that performs tasks before the Solaris
software is installed on the system. You can use begin scripts only with custom JumpStart installations.
boot To load the system software into memory and start it.
boot archive x86 only: A boot archive is a collection of critical files that is used to boot the Solaris OS. These files are
needed during system startup before the root (/) file system is mounted. Two boot archives are maintained
on a system:
■ The boot archive that is used to boot the Solaris OS on a system. This boot archive is sometimes called the
primary boot archive.
■ The boot archive that is used for recovery when the primary boot archive is damaged. This boot archive
starts the system without mounting the root (/) file system. On the GRUB menu, this boot archive is called
failsafe. The archive's essential purpose is to regenerate the primary boot archive, which is usually used to
boot the system.
boot environment A collection of mandatory file systems (disk slices and mount points) that are critical to the operation of
the Solaris OS. These disk slices might be on the same disk or distributed across multiple disks.
257
boot loader
The active boot environment is the one that is currently booted. Exactly one active boot environment can
be booted. An inactive boot environment is not currently booted, but can be in a state of waiting for
activation on the next reboot.
boot loader x86 only: The boot loader is the first software program that runs after you turn on a system. This program
begins the booting process.
boot server A server system that provides client systems on the same network subnet with the programs and
information that they need to start. A boot server is required to install over the network if the install server
is on a different subnet than the systems on which Solaris software is to be installed.
bootlog-cgi The CGI program that enables a web server to collect and store remote client-booting and installation
program console messages during a WAN boot installation.
certificate (CA) A trusted third-party organization or company that issues digital certificates that are used to create
authority digital signatures and public-private key pairs. The CA guarantees that the individual who is granted the
unique certificate is who she or he claims to be.
certstore file A file that contains a digital certificate for a specific client system. During an SSL negotiation, the client
might be asked to provide the certificate file to the server. The server uses this file to verify the identity of
the client.
CGI (Common Gateway Interface) An interface by which external programs communicate with the HTTP
server. Programs that are written to use CGI are called CGI programs or CGI scripts. CGI programs
handle forms or parse output the server does not normally handle or parse.
checksum The result of adding a group of data items that are used for checking the group. The data items can be
either numerals or other character strings that are treated as numerals during the checksum calculation.
The checksum value verifies that communication between two devices is successful.
client In the client-server model for communications, the client is a process that remotely accesses resources of a
compute server, such as compute power and large memory capacity.
clone system A system that you install by using a Solaris Flash archive. The clone system has the same installation
configuration as the master system.
cluster A logical collection of packages (software modules). The Solaris software is divided into software groups,
which are each composed of clusters and packages.
command line A string of characters that begins with a command, often followed by arguments, including options, file
names, and other expressions, and terminated by the end-of-line character.
concatenation A RAID-0 volume. If slices are concatenated, the data is written to the first available slice until that slice is
full. When that slice is full, the data is written to the next slice, serially. A concatenation provides no data
redundancy unless it is contained in a mirror. See also RAID-0 volume.
Core Software A software group that contains the minimum software that is required to boot and run the Solaris OS on a
Group system. Core includes some networking software and the drivers that are required to run the Common
Desktop Environment (CDE) desktop. Core does not include the CDE software.
critical file systems File systems that are required by the Solaris OS. When you use Solaris Live Upgrade, these file systems are
separate mount points in the vfstab file of the active and inactive boot environments. Example file
systems are root (/), /usr, /var, and /opt. These file systems are always copied from the source to the
inactive boot environment.
custom JumpStart A type of installation in which the Solaris software is automatically installed on a system that is based on a
user-defined profile. You can create customized profiles for different types of users and systems. A custom
JumpStart installation is a JumpStart installation you create.
custom probes file A file, which must be located in the same JumpStart directory as the rules file, that is a Bourne shell script
that contains two types of functions: probe and comparison. Probe functions gather the information you
want or do the actual work and set a corresponding SI_ environment variable you define. Probe functions
become probe keywords. Comparison functions call a corresponding probe function, compare the output
of the probe function, and return 0 if the keyword matches or 1 if the keyword doesn't match. Comparison
functions become rule keywords. See also rules file.
dataset A generic name for the following ZFS entities: clones, file systems, snapshots, or volumes.
decryption The process of converting coded data to plain text. See also encryption.
derived profile A profile that is dynamically created by a begin script during a custom JumpStart installation.
DES (Data Encryption Standard) A symmetric-key encryption method that was developed in 1975 and
standardized by ANSI in 1981 as ANSI X.3.92. DES uses a 56-bit key.
Developer Solaris A software group that contains the End User Solaris Software Group plus the libraries, include files, man
Software Group pages, and programming tools for developing software.
DHCP (Dynamic Host Configuration Protocol) An application-layer protocol. Enables individual computers, or
clients, on a TCP/IP network to extract an IP address and other network configuration information from a
designated and centrally maintained DHCP server or servers. This facility reduces the overhead of
maintaining and administering a large IP network.
differential archive A Solaris Flash archive that contains only the differences between two system images, an unchanged
master image and an updated master image. The differential archive contains files to be retained,
modified, or deleted from the clone system. A differential update changes only the files that are specified
and is restricted to systems that contain software consistent with the unchanged master image.
digital certificate A nontransferable, nonforgeable, digital file issued from a third party that both communicating parties
already trust.
disc An optical disc, as opposed to a magnetic disk, which recognizes the common spelling that is used in the
compact disc (CD) market. For example, a CD-ROM or DVD-ROM is an optical disc.
disk A round platter, or set of platters, of a magnetized medium that is organized into concentric tracks and
sectors for storing data such as files. See also disc.
disk configuration A file that represents a structure of a disk (for example, bytes/sector, flags, slices). Disk configuration files
file enable you to use the pfinstall command from a single system to test profiles on different–size disks.
diskless client A client on a network that relies on a server for all of its disk storage.
259
document root directory
document root The root of a hierarchy on a web server machine that contains the files, images, and data you want to
directory present to users who are accessing the web server.
domain A part of the Internet naming hierarchy. A domain represents a group of systems on a local network that
share administrative files.
domain name The name that is assigned to a group of systems on a local network that share administrative files. The
domain name is required for the Network Information Service (NIS) database to work properly. A domain
name consists of a sequence of component names that are separated by periods (for example:
tundra.mpk.ca.us). As you read a domain name from left to right, the component names identify more
general (and usually remote) areas of administrative authority.
encryption The process of protecting information from unauthorized use by making the information unintelligible.
Encryption is based on a code, called a key, which is used to decrypt the information. See also decryption.
End User Solaris A software group that contains the Core Software Group plus the recommended software for an end user,
Software Group including the Common Desktop Environment (CDE) and DeskSet software.
Entire Solaris A software group that contains the entire Solaris release.
Software Group
Entire Solaris A software group that contains the entire Solaris release plus additional hardware support for OEMs. This
Software Group software group is recommended when installing Solaris software on SPARC based servers.
Plus OEM Support
/etc directory A directory that contains critical system configuration files and maintenance commands.
/etc/netboot The directory on a WAN boot server that contains the client configuration information and security data
directory that are required for a WAN boot installation.
/export file system A file system on an OS server that is shared with other systems on a network. For example, the /export file
system can contain the root (/) file system and swap space for diskless clients and the home directories for
users on the network. Diskless clients rely on the /export file system on an OS server to boot and run.
failsafe boot x86 only: A boot archive that is used for recovery when the primary boot archive is damaged. This boot
archive archive starts the system without mounting the root (/) file system. This boot archive is called failsafe on
the GRUB menu. The archive's essential purpose is to regenerate the primary boot archive, which is
usually used to boot the system. See boot archive.
fallback A reversion to the environment that ran previously. Use fallback when you are activating an environment
and the boot environment that is designated for booting fails or shows some undesirable behavior.
fdisk partition A logical partition of a disk drive that is dedicated to a particular operating system on x86 based systems.
To install the Solaris software, you must set up at least one Solaris fdisk partition on an x86 based system.
x86 based systems allow up to four different fdisk partitions on a disk. These partitions can be used to
hold individual operating systems. Each operating system must be located on a unique fdisk partition. A
system can only have one Solaris fdisk partition per disk.
file server A server that provides the software and file storage for systems on a network.
file system In the SunOSTM operating system, a tree-structured network of files and directories that you can access.
finish script A user-defined Bourne shell script, specified within the rules file, that performs tasks after the Solaris
software is installed on the system but before the system reboots. You use finish scripts with custom
JumpStart installations.
format To put data into a structure or divide a disk into sectors for receiving data.
function key One of the 10 or more keyboard keys that are labeled F1, F2, F3, and so on that are mapped to particular
tasks.
global zone In Solaris Zones, the global zone is both the default zone for the system and the zone used for system-wide
administrative control. The global zone is the only zone from which a non-global zone can be configured,
installed, managed, or uninstalled. Administration of the system infrastructure, such as physical devices,
routing, or dynamic reconfiguration (DR), is only possible in the global zone. Appropriately privileged
processes running in the global zone can access objects associated with other zones. See also Solaris Zones
and non-global zone.
GRUB x86 only: GNU GRand Unified Bootloader (GRUB) is an open source boot loader with a simple menu
interface. The menu displays a list of operating systems that are installed on a system. GRUB enables you
to easily boot these various operating systems, such as the Solaris OS, Linux, or Microsoft Windows.
GRUB edit menu x86 only: A boot menu that is a submenu of the GRUB main menu. GRUB commands are displayed on
this menu. These commands can be edited to change boot behavior.
GRUB main menu x86 only: A boot menu that lists the operating systems that are installed on a system. From this menu, you
can easily boot an operating system without modifying the BIOS or fdisk partition settings.
hard link A directory entry that references a file on disk. More than one such directory entry can reference the same
physical file.
hash A number that is produced by taking some input and generating a number that is significantly shorter
than the input. The same output value is always generated for identical inputs. Hash functions can be used
in table search algorithms, in error detection, and in tamper detection. When used for tamper detection,
hash functions are chosen such that it is difficult to find two inputs that yield the same hash result. MD5
and SHA-1 are examples of one-way hash functions. For example, a message digest takes a variable-length
input such as a disk file and reduces it to a small value.
hashing The process of changing a string of characters into a value or key that represents the original string.
HMAC Keyed hashing method for message authentication. HMAC is used with an iterative cryptographic hash
function, such as MD5 or SHA-1, in combination with a secret shared key. The cryptographic strength of
HMAC depends on the properties of the underlying hash function.
host name The name by which a system is known to other systems on a network. This name must be unique among
all the systems within a particular domain (usually, this means within any single organization). A host
name can be any combination of letters, numbers, and minus signs (-), but it cannot begin or end with a
minus sign.
HTTP (Hypertext Transfer Protocol) (n.) The Internet protocol that fetches hypertext objects from remote hosts.
This protocol is based on TCP/IP.
HTTPS A secure version of HTTP, implemented by using the Secure Sockets Layer (SSL).
261
initial installation
initial installation An installation that overwrites the currently running software or initializes a blank disk.
An initial installation of the Solaris OS overwrites the system's disk or disks with the new version of the
Solaris OS. If your system is not running the Solaris OS, you must perform an initial installation. If your
system is running an upgradable version of the Solaris OS, an initial installation overwrites the disk and
does not preserve the OS or local modifications.
install server A server that provides the Solaris DVD or CD images from which other systems on a network can install
Solaris (also called a media server). You can create an install server by copying the Solaris DVD or CD
images to the server's hard disk.
IPv6 IPv6 is a version (version 6) of Internet Protocol (IP) that is designed to be an evolutionary step from the
current version, IPv4 (version 4). Deploying IPv6, by using defined transition mechanisms, does not
disrupt current operations. In addition, IPv6 provides a platform for new Internet functionality.
keystore file A file that contains keys shared by a client and server. During a WAN boot installation, the client system
uses the keys to verify the integrity of, or decrypt the data and files transmitted from, the server.
LAN (local area network) A group of computer systems in close proximity that can communicate by way of
some connecting hardware and software.
LDAP (Lightweight Directory Access Protocol) A standard, extensible directory access protocol that is used by
LDAP naming service clients and servers to communicate with each other.
locale A geographic or political region or community that shares the same language, customs, or cultural
conventions (English for the U.S. is en_US, and English for the U.K. is en_UK).
logical device A group of physical slices on one or more disks that appear to the system as a single device. A logical device
is called a volume in Solaris Volume Manager. A volume is functionally identical to a physical disk for the
purposes of an application or file system.
manifest section A section of a Solaris Flash archive that is used to validate a clone system. The manifest section lists the files
on a system to be retained, added to, or deleted from the clone system. This section is informational only.
The section lists the files in an internal format and cannot be used for scripting.
master system A system that you use to create a Solaris Flash archive. The system configuration is saved in the archive.
MD5 (Message Digest 5) An iterative cryptographic hash function that is used for message authentication,
including digital signatures. The function was developed in 1991 by Rivest.
mount The process of accessing a directory from a disk that is attached to a machine that is making the mount
request or a remote disk on a network. To mount a file system, you need a mount point on the local system
and the name of the file system to be mounted (for example, /usr).
mount point A workstation directory to which you mount a file system that exists on a remote machine.
name server A server that provides a naming service to systems on a network.
naming service A distributed network database that contains key system information about all the systems on a network
so that the systems can communicate with each other. With a naming service, the system information can
be maintained, managed, and accessed on a network-wide basis. Without a naming service, each system
has to maintain its own copy of the system information in the local /etc files. Sun supports the following
naming services: LDAP, NIS, and NIS+.
network A way to install software over the network from a system with a CD-ROM or DVD-ROM drive to a system
installation without a CD-ROM or DVD-ROM drive. Network installations require a name server and an install server.
networked systems A group of systems (called hosts) that are connected through hardware and software so that they can
communicate and share information. Referred to as a local area network (LAN). One or more servers are
usually needed when systems are networked.
NIS The SunOS 4.0 (minimum) Network Information Service. A distributed network database that contains
key information about the systems and the users on the network. The NIS database is stored on the master
server and all the slave servers.
NIS+ The SunOS 5.0 (minimum) Network Information Service. NIS+ replaces NIS, the SunOS 4.0 (minimum)
Network Information Service.
non-global zone A virtualized operating system environment created within a single instance of the Solaris Operating
System. One or more applications can run in a non-global zone without interacting with the rest of the
system. Non-global zones are also called zones. See also Solaris Zones and global zone.
nonnetworked Systems that are not connected to a network or do not rely on other systems.
systems
263
/opt file system
/opt file system A file system that contains the mount points for third-party and unbundled software.
OS server A system that provides services to systems on a network. To serve diskless clients, an OS server must have
disk space set aside for each diskless client's root (/) file system and swap space (/export/root,
/export/swap).
package A collection of software that is grouped into a single entity for modular installation. The Solaris software is
divided into software groups, which are each composed of clusters and packages.
panel A container for organizing the contents of a window, a dialog box, or applet. The panel might collect and
confirm user input. Panels might be used by wizards and follow an ordered sequence to fulfill a designated
task.
patch analyzer A script that you can run manually or as part of the Solaris installation program. The patch analyzer
performs an analysis on your system to determine which (if any) patches will be removed by upgrading to
a Solaris update.
platform group A vendor-defined grouping of hardware platforms for the purpose of distributing specific software.
Examples of valid platform groups are i86pc and sun4u.
platform name The output of the uname -i command. For example, the platform name for the Ultra 60 is
SUNW,Ultra-60.
pool A logical group of devices describing the layout and physical characteristics of the available ZFS storage.
Space for datasets is allocated from a pool.
Power Software that automatically saves the state of a system and turns it off after it is idle for 30 minutes. When
Management you install the Solaris software on a system that complies with Version 2 of the U.S. Environmental
Protection Agency's Energy Star guidelines, the Power Management software is installed by default. A
sun4u SPARC based system is an example of a system that has Power Management installed by default.
After a subsequent reboot, you are prompted to enable or disable the Power Management software.
Energy Star guidelines require that systems or monitors automatically enter a “sleep state” (consume 30
watts or less) after the system or monitor becomes inactive.
primary boot A boot archive that is used to boot the Solaris OS on a system. This boot archive is sometimes called the
archive primary boot archive. See boot archive.
profile A text file that defines how to install the Solaris software when using the custom JumpStart method. For
example, a profile defines which software group to install. Every rule specifies a profile that defines how a
system is to be installed when the rule is matched. You usually create a different profile for every rule.
However, the same profile can be used in more than one rule. See also rules file.
profile diskette A diskette that contains all the essential custom JumpStart files in its root directory (JumpStart directory).
profile server A server that contains all the essential custom JumpStart files in a JumpStart directory.
public-key A cryptographic system that uses two keys: a public key known to everyone, and a private key known only
cryptography to the recipient of the message.
RAID-0 volume A class of volume that can be a stripe or a concatenation. These components are also called submirrors. A
stripe or concatenation is the basic building block for mirrors.
RAID-1 volume A class of volume that replicates data by maintaining multiple copies. A RAID-1 volume is composed of
one or more RAID-0 volumes called submirrors. A RAID-1 volume is sometimes called a mirror.
RAID-Z storage A virtual device that stores data and parity on multiple disks that can be used as a ZFS storage pool.
pool RAID-Z is similar to RAID-5.
Reduced Network A software group that contains the minimum code that is required to boot and run a Solaris system with
Support Software limited network service support. The Reduced Networking Software Group provides a multiuser
Group text-based console and system administration utilities. This software group also enables the system to
recognize network interfaces, but does not activate network services.
root The top level of a hierarchy of items. Root is the one item from which all other items are descended. See
root directory or root (/) file system.
root (/) file system The top-level file system from which all other file systems stem. The root (/) file system is the base on
which all other file systems are mounted, and is never unmounted. The root (/) file system contains the
directories and files critical for system operation, such as the kernel, device drivers, and the programs that
are used to start (boot) a system.
root directory The top-level directory from which all other directories stem.
rule A series of values that assigns one or more system attributes to a profile. A rule is used in a custom
JumpStart installation.
rules file A text file that contains a rule for each group of systems or single systems that you want to install
automatically. Each rule distinguishes a group of systems, based on one or more system attributes. The
rules file links each group to a profile, which is a text file that defines how the Solaris software is to be
installed on each system in the group. A rules file is used in a custom JumpStart installation. See also
profile.
rules.ok file A generated version of the rules file. The rules.ok file is required by the custom JumpStart installation
software to match a system to a profile. You must use the check script to create the rules.ok file.
Secure Sockets (SSL) A software library establishing a secure connection between two parties (client and server) used to
Layer implement HTTPS, the secure version of HTTP.
server A network device that manages resources and supplies services to a client.
SHA1 (Secure Hashing Algorithm) The algorithm that operates on any input length less than 264 to produce a
message digest.
265
shareable file systems
shareable file File systems that are user-defined files such as /export/home and /swap. These file systems are shared
systems between the active and inactive boot environment when you use Solaris Live Upgrade. Shareable file
systems contain the same mount point in the vfstab file in both the active and inactive boot
environments. Updating shared files in the active boot environment also updates data in the inactive boot
environment. Shareable file systems are shared by default, but you can specify a destination slice, and then
the file systems are copied.
slice The unit into which the disk space is divided by the software.
snapshot A read-only image of a ZFS file system or volume at a given point in time.
software group A logical grouping of the Solaris software (clusters and packages). During a Solaris installation, you can
install one of the following software groups: Core, End User Solaris Software, Developer Solaris Software,
or Entire Solaris Software, and for SPARC systems only, Entire Solaris Software Group Plus OEM Support.
Solaris DVD or CD The Solaris software that is installed on a system, which you can access on the Solaris DVDs or CDs or an
images install server's hard disk to which you have copied the Solaris DVD or CD images.
Solaris Flash A Solaris installation feature that enables you to create an archive of the files on a system, called the master
system. You can then use the archive to install other systems, making the other systems identical in their
configuration to the master system. See also archive.
Solaris installation A graphical user interface (GUI) or command-line interface (CLI) installation program that uses wizard
program panels to guide you step-by-step through installing the Solaris software and third-party software.
Solaris Live An upgrade method that enables a duplicate boot environment to be upgraded while the active boot
Upgrade environment is still running, thus eliminating downtime of the production environment.
Solaris Zones A software partitioning technology used to virtualize operating system services and provide an isolated
and secure environment for running applications. When you create a non-global zone, you produce an
application execution environment in which processes are isolated from all other zones. This isolation
prevents processes that are running in a zone from monitoring or affecting processes that are running in
any other zones. See also global zone and non-global zone.
standalone A computer that does not require support from any other machine.
state database A database that stores information about the state of your Solaris Volume Manager configuration. The
state database is a collection of multiple, replicated database copies. Each copy is referred to as a state
database replica. The state database tracks the location and status of all known state database replicas.
state database A copy of a state database. The replica ensures that the data in the database is valid.
replica
swap space A slice or file that temporarily holds the contents of a memory area till it can be reloaded in memory. Also
called the /swap or swap volume.
sysidcfg file A file in which you specify a set of special system configuration keywords that preconfigure a system.
system (system.conf) A text file in which you specify the locations of the sysidcfg file and the custom JumpStart
configuration file files you want to use in a WAN boot installation.
time zone Any of the 24 longitudinal divisions of the earth's surface for which a standard time is kept.
truststore file A file that contains one or more digital certificates. During a WAN boot installation, the client system
verifies the identity of the server that is trying to perform the installation by consulting the data in the
truststore file.
unmount The process of removing access to a directory on a disk that is attached to a machine or to a remote disk on
a network.
update An installation, or to perform an installation, on a system that changes software that is of the same type.
Unlike an upgrade, an update might downgrade the system. Unlike an initial installation, software of the
same type that is being installed must be present before an update can occur.
upgrade An installation that merges files with existing files and preserves modifications where possible.
An upgrade of the Solaris OS merges the new version of the Solaris OS with the existing files on the
system's disk or disks. An upgrade saves as many modifications as possible that you have made to the
previous version of the Solaris OS.
upgrade option An option that is presented by the Solaris installation program. The upgrade procedure merges the new
version of Solaris with existing files on your disk or disks. An upgrade also saves as many local
modifications as possible since the last time Solaris was installed.
URL (Uniform Resource Locator) The addressing system used by the server and the client to request
documents. A URL is often called a location. The format of a URL is protocol://machine:port/document.
utility A standard program, usually furnished at no charge with the purchase of a computer, that does the
computer's housekeeping.
/var file system A file system or directory (on standalone systems) that contains system files that are likely to change or
grow over the life of the system. These files include system logs, vi files, mail files, and UUCP files.
virtual device A logical device in a ZFS pool, which can be a physical device, a file, or a collection of devices.
volume A group of physical slices or other volumes that appear to the system as a single logical device. A volume is
functionally identical to a physical disk for the purposes of an application or file system.
In some command-line utilities, a volume is called a metadevice. Volume is also called pseudo device or
virtual device in standard UNIX terms.
267
Volume Manager
Volume Manager A program that provides a mechanism to administer and obtain access to the data on DVD-ROMs,
CD-ROMs, and diskettes.
WAN (wide area network) A network that connects multiple local area networks (LANs) or systems at different
geographical sites by using telephone, fiber-optic, or satellite links.
WAN boot A type of installation that enables you to boot and install software over a wide area network (WAN) by
installation using HTTP or HTTPS. The WAN boot installation method enables you to transmit an encrypted Solaris
Flash archive over a public network and perform a custom JumpStart installation on a remote client.
WAN boot A miniroot that has been modified to perform a WAN boot installation. The WAN boot miniroot contains
miniroot a subset of the software in the Solaris miniroot. See also miniroot.
WAN boot server A web server that provides the configuration and security files that are used during a WAN boot
installation.
wanboot-cgi The CGI program that retrieves and transmits the data and files that are used in a WAN boot installation.
program
wanboot.conf file A text file in which you specify the configuration information and security settings that are required to
perform a WAN boot installation.
wanboot program The second-level boot program that loads the WAN boot miniroot, client configuration files, and
installation files that are required to perform a WAN boot installation. For WAN boot installations, the
wanboot binary performs tasks similar to the ufsboot or inetboot second-level boot programs.
ZFS A file system using storage pools to manage physical storage.
A B
add_install_client, description, 123 banner command, 124
add_install_client command boot: cannot open /kernel/unix message, 236
example boot command syntax for WAN boot
boot server for DVD media, 73 installations, 228
for boot server for CD media, 96 boot_file parameter, 230
same subnet for CD media, 95 boot_logger parameter, 232
specifying serial console, 74, 96 boot server
with DHCP for CD media, 95, 96 creating on subnet
with DHCP for DVD media, 72, 73 with DVD media, 67
example for specifying a serial console, 74, 96
creating on subnet with CD media, 90
add_to_install_server, description, 123
creating with DVD media, example, 69
adding
description, 58
dataless clients
requirement for network installation, 58
with CD media, 92
with DVD media, 69 bootconfchk command, syntax, 226
locale.org_dir table entries, 42 booting the system, resetting terminals and display
systems from network, 63, 85 first, 124
AES encryption key bootlog-cgi program, specifying in wanboot.conf
installing file, 232
with wanboot program, 202 bootlog file, directing to logging server, 166
encrypting data for WAN boot installation, 136 bootparams file, updating, 241
archive bootserver variable, 201
creating an archive, WAN boot installation, 173
installing with WAN boot, 197-209
269
Index
F
E failed upgrade, rebooting problems, 246
eeprom command, checking OBP support of WAN boot file variable, 199
installations, 226 files and file systems
encrypting data during WAN boot installation displaying mounted file systems, 123
with digital certificate, 215-216, 216 displaying shared file systems, 123
with HTTPS, 167-172 system configuration syntax, 229
with private key, 216 WAN boot file system, 132
encrypting data with HTTPS, WAN boot wanboot.conf
installation, 136-137 description, 229-232
encryption key syntax, 229-232
creating, 217 flarcreate command, syntax for WAN boot
description, 136 installations, 226
encrypting data during WAN boot installation, 136
installing
example, 194, 196, 222
methods to install, 192-197 G
with wanboot program, 202 graphical user interface (GUI), command to start (x86
specifying in wanboot.conf file, 230 based systems), 80, 103
encryption_type parameter, 230 graphics card, preconfiguring, 39
/etc/bootparams file, enabling JumpStart directory GRUB based booting
access, 241 command reference, 124-128
/etc/locale file, 41 installing x86 clients over the network with
/etc/netboot directory (DVD), 77, 100
configuration and security files, description, 145
configuring client and server authentication, 216
creating, 162-165, 214
description, 144-147 H
example, 146 hard disks, size, space available, 65
271
Index
hashing key K
creating, 217 Kerberos, preconfiguring, 38
description, 136 keyboard language and layout, preconfiguring, 39
installing keys, See encryption key, hashing key
example, 222 keystore file
methods to install, 192-197 description, 145
with wanboot program, 202 inserting client private key, 216
protecting data during WAN boot installation, 136 keywords, sysidcfg file, 22-36
specifying in wanboot.conf file, 230
HMAC SHA1 hashing key, See hashing key
host-ip variable, 199 L
host name, preconfiguring, 38 le0: No carrier - transceiver cable problem
hostname variable, 199 message, 236
HTTP over Secure Sockets Layer, See HTTPS list-security-keys command, syntax, 228
http-proxy variable, 199 locale file, 41
HTTPS locale.org_dir table, adding entries, 42
description, 136-137 log files, for WAN boot installation, 166
protecting data during WAN boot logging server
installation, 136-137 configuring for WAN boot installation, 215
requirements to use with WAN boot, 167-172 description, 140
location of log messages, 166
WAN boot installation requirements, 140
logging server, specifying in wanboot.conf file, 232
I
install server
creating with CD media, 86
creating with CD media, example, 89, 115, 119 M
Makefile file, 40
creating with DVD media, 64
memory, WAN boot installation requirements, 140
creating with DVD media, example, 66, 114, 116
monitor type, preconfiguring, 38
on subnet, 66, 109, 112
mount command, 123
system types applicable, 57-59 mounting, displaying mounted file systems, 123
WAN boot installation requirements, 140
install time updates (ITUs), installing, 80, 102
installation, WAN boot, description, 131-132
installing N
device drivers, 80, 102 name server, preconfiguring, 38
install time updates (ITUs), 80, 102 names/naming
IP addresses host name, 95
preconfiguring, 38 system configuration file for WAN boot
preconfiguring a default route, 38 installation, 181
IPv6, preconfiguring, 38 system platform name determination, 124
IRQ level, preconfiguring, 39 naming service, preconfiguring, 38
net device alias, checking and resetting, 191, 221-222
273
Index
275
Index
WAN boot installation, configuring (Continued) WAN boot installation, examples (Continued)
DHCP service support, 187-188 custom JumpStart profile, 177
WAN boot server, 155-166 document root directory, 213
copying wanboot-cgi program, 165 enabling client authentication, 216
corrupted binaries, 148 enabling server authentication, 169, 216
creating /etc/netboot directory, 146
begin scripts, 180 inserting client certificate, 169, 216
finish scripts, 180 inserting client private key, 169, 216
Solaris Flash archive, 173 inserting trusted certificate, 169, 215-216
denial of service attacks, 148 installing encryption key in OBP, 194, 222
description, 131-132 installing encryption key on running client, 196
digital certificates, requirements, 147 installing from local CD media, 208
document root directory installing hashing key in OBP, 194, 222
description, 142 installing hashing key on running client, 196
example, 142 installing wanboot program, 214
files, 142 installing with DHCP service, 205
encrypting data interactive installation, 202
with encryption key, 136 network setup, 212
with HTTPS, 136-137, 167-172 noninteractive installation, 199, 223
encryption key preparing digital certificates, 216
displaying value, 192-197 setting net device alias, 191
installing, 192-197 sysidcfg file, 175
specifying in wanboot.conf file, 230 system configuration file, 182
encryption key privacy issues, 148 unattended installation, 199, 223
/etc/netboot directory using encryption, 217
creating, 162-165 wanboot.conf file, 184, 186, 220-221
description, 144-147 hashing key
example, 146 displaying value, 192-197
setting permissions, 163 installing, 192-197
examples specifying in wanboot.conf file, 230
checking client OBP support, 159, 213 hashing key privacy issues, 148
checking net device alias, 191, 221-222 information required to install, 148-149
configuring logging server, 166, 215 insecure configuration, 138
copying wanboot-cgi program, 215 installing a client
creating /etc/netboot directory, 164 methods to install, 197
creating custom JumpStart profile, 218-219 required tasks, 189
creating encryption key, 172, 217 installing encryption key, 192-197
creating hashing key, 172, 217 installing hashing key, 192-197
creating rules file, 219 installing the wanboot program, 160-162
creating Solaris Flash archive, 217 logging server, specifying in wanboot.conf file, 232
creating sysidcfg file, 218 noninteractive installation, 223
creating system configuration file, 219-220 planning
creating the /etc/netboot directory, 214 document root directory, 142
creating the WAN boot miniroot, 213 /etc/netboot directory, 144-147
WAN boot installation, planning (Continued) WAN boot installation, WAN boot miniroot
server layout, 141-142 (Continued)
sharing configuration and security files, 144 description, 132
storing configuration and security files, 144-147 specifying in wanboot.conf file, 230
storing installation files, 142 storing in document root directory, 143
system requirements, 139 wanboot-cgi program, 165
protecting data, 136 copying to WAN boot server, 165
requirements specifying in wanboot.conf file, 230
client CPU, 140 wanboot.conf file
client disk space, 140 parameters, 229-232
client memory, 140 syntax, 229-232
DHCP service, 140 validating, 184
digital certificates, 147 wanboot program
install server disk space, 140 description, 131
logging server, 140 installing, 160-162
OBP for client, 140
specifying in wanboot.conf file, 230
operating system for web server, 141
storing in document root directory, 143
SSL version support, 141
wanbootutil command
WAN boot server, 139
creating encryption key, 217
web proxy, 141
creating hashing key, 217
web server, 141
creating private key, 168
secure configuration
creating trusted certificate, 168
description, 137-138
web server requirements, 141
requirements, 137-138
tasks to install, 151 when to use, 132
security configurations, description, 137-138 WAN boot miniroot
security issues, 148 creating, 156-158, 213
sequence of events, 133-135 description, 132
server authentication specifying in wanboot.conf file, 230
requirements, 137-138 storing in document root directory, 143
specifying in wanboot.conf file, 231 WAN boot server
server configurations, description, 141-142 configuring, 155-166
sharing configuration and security files copying wanboot-cgi program, 165
entire network, 144, 162 description, 139
entire subnet, 144, 162 requirements, 139
specific client, 144, 163 web server requirements, 141
storing the wanboot-cgi program, 147 wanboot-cgi program
system requirements, 139 copying to WAN boot server, 165, 215
system configuration file description, 144
specifying in wanboot.conf file, 232 order of search through /etc/netboot
syntax, 229 directory, 145
unattended installation, 223 selecting client configuration information, 145
WAN boot miniroot specifying in wanboot.conf file, 230
creating, 156-158 storing, 147
277
Index
wanboot.conf file
creating for WAN boot installation, 220-221,
229-232
description, 145, 229-232
examples
insecure WAN boot installation, 186
secure WAN boot installation, 184, 220
syntax, 229-232
validating for WAN boot installation, 184, 220-221
wanboot program
description, 131
installing keys for WAN boot installation, 202
installing on WAN boot server, 160-162, 214
storing in document root directory, 143
tasks performed during WAN boot installation, 135
wanboot program, specifying in wanboot.conf file, 230
wanbootutil command
configuring client and server authentication, 168,
216, 217
creating a hashing key, 217
creating an encryption key, 217
displaying a hashing key value, 222
displaying an encryption key value, 222
inserting client digital certificate, 168, 216
inserting client private key, 168, 216
inserting trusted certificate, 168, 215-216
splitting a PKCS#12 file, 168, 215-216, 216
WARNING: CHANGE DEFAULT BOOT
DEVICE, 242
WARNING: clock gained xxx days message, 236
web proxy, WAN boot installation requirements, 141
web proxy, preconfiguring, 38