<chapter id="wanbootexamples-1" arch="sparc"><title>Installing With WAN Boot (Examples)</title><highlights><para>This chapter provides an example of setting up and installing client
systems over a wide area network (WAN). The examples in this chapter describe
how to perform a secure WAN boot installation over an HTTPS connection.</para><itemizedlist><listitem><para><olink targetptr="wanbootexamples-3asg" remap="internal">Sample Site Setup</olink></para>
</listitem><listitem><para><olink targetptr="wanbootexamples-5dsaf" remap="internal">Create the Document
Root Directory</olink></para>
</listitem><listitem><para><olink targetptr="wanbootexamples-3fg" remap="internal">Create the WAN Boot
Miniroot</olink></para>
</listitem><listitem><para><olink targetptr="wanbootexamples-12plkjn" remap="internal">Check the Client
OBP for WAN Boot Support</olink></para>
</listitem><listitem><para><olink targetptr="wanbootexamples-17" remap="internal">Install the wanboot
Program on the WAN Boot Server</olink></para>
</listitem><listitem><para><olink targetptr="wanbootexamples-9vczv" remap="internal">Create the /etc/netboot
Hierarchy</olink></para>
</listitem><listitem><para><olink targetptr="wanbootexamples-10qwer" remap="internal">Copy the wanboot-cgi
Program to the WAN Boot Server</olink></para>
</listitem><listitem><para><olink targetptr="wanbootexamples-7sdfg" remap="internal">(Optional) Configure
the WAN Boot Server as a Logging Server</olink></para>
</listitem><listitem><para><olink targetptr="wanbootexamples-5rte" remap="internal">Configure the WAN
Boot Server to Use HTTPS</olink></para>
</listitem><listitem><para><olink targetptr="wanbootexamples-14" remap="internal">Provide the Trusted
Certificate to the Client</olink></para>
</listitem><listitem><para><olink targetptr="wanbootexamples-88" remap="internal">(Optional) Use Private
Key and Certificate for Client Authentication</olink></para>
</listitem><listitem><para><olink targetptr="wanbootexamples-15" remap="internal">Create the Keys for
the Server and the Client</olink></para>
</listitem><listitem><para><olink targetptr="wanbootexamples-3ll" remap="internal">Create the Solaris
Flash Archive</olink></para>
</listitem><listitem><para><olink targetptr="wanbootexamples-9llasdf" remap="internal">Create the sysidcfg
File</olink></para>
</listitem><listitem><para><olink targetptr="wanbootexamples-8llfda" remap="internal">Create the Client's
Profile</olink></para>
</listitem><listitem><para><olink targetptr="wanbootexamples-7llasfd" remap="internal">Create and Validate
the rules File</olink></para>
</listitem><listitem><para><olink targetptr="wanbootexamples-11hjkp" remap="internal">Create the System
Configuration File</olink></para>
</listitem><listitem><para><olink targetptr="wanbootexamples-6vfwdfg" remap="internal">Create the wanboot.conf
File</olink></para>
</listitem><listitem><para><olink targetptr="wanbootexamples-18net" remap="internal">Check the net Device
Alias in OBP</olink></para>
</listitem><listitem><para><olink targetptr="wanbootexamples-8poiuy" remap="internal">Install Keys on
the Client</olink></para>
</listitem><listitem><para><olink targetptr="wanbootexamples-13lkjh" remap="internal">Install the Client</olink></para>
</listitem>
</itemizedlist>
</highlights><sect1 id="wanbootexamples-3asg"><title>Sample Site Setup</title><para><olink targetptr="wanbootexamples-fig-16" remap="internal">Figure 13&ndash;1</olink> shows
the site setup for this example.</para><figure id="wanbootexamples-fig-16"><title>Sample Site for WAN Boot Installation</title><mediaobject><imageobject><imagedata entityref="wanboot-sample-site"/>
</imageobject><textobject><simpara>The context describes the graphic.</simpara>
</textobject>
</mediaobject>
</figure><para>This sample site has the following characteristics.</para><itemizedlist><listitem><para>The server <literal>wanserver-1</literal> is to be configured
as a WAN boot server and an install server. </para>
</listitem><listitem><para>The IP address of <literal>wanserver-1</literal> is 192.168.198.2.</para>
</listitem><listitem><para>The domain name of <literal>wanserver-1</literal> is <literal>www.example.com</literal>.</para>
</listitem><listitem><para><literal>wanserver-1</literal> is running the current Solaris release.</para>
</listitem><listitem><para><literal>wanserver-1</literal> is running the Apache web server.
The Apache software on <literal>wanserver-1</literal> is configured to support
HTTPS.</para>
</listitem><listitem><para>The client to be installed is named <literal>wanclient-1</literal>.</para>
</listitem><listitem><para><literal>wanclient-1</literal> is an UltraSPARCII system.</para>
</listitem><listitem><para>The client ID for <literal>wanclient-1</literal> is 010003BA152A42.</para>
</listitem><listitem><para>The IP address of <literal>wanclient-1</literal> is 192.168.198.210.</para>
</listitem><listitem><para>The IP address of the client's subnet is 192.168.198.0.</para>
</listitem><listitem><para>The client system <literal>wanclient-1</literal> has Internet
access, but is not directly connected to the network that includes <literal>wanserver-1</literal>.</para>
</listitem><listitem><para><literal>wanclient-1</literal> is a new system that is to
be installed with the current Solaris release software.</para>
</listitem>
</itemizedlist>
</sect1><sect1 id="wanbootexamples-5dsaf"><title>Create the Document Root Directory</title><para>To store the installation files and data, set up the following directories
in the document root directory (<filename>/opt/apache/htdocs</filename>) on <literal>wanserver-1</literal>. </para><itemizedlist><listitem><para>Solaris Flash directory</para><screen>wanserver-1# <userinput>mkdir -p /opt/apache/htdocs/flash/</userinput></screen>
</listitem><listitem><para>WAN boot miniroot directory</para><screen>wanserver-1# <userinput>mkdir -p /opt/apache/htdocs/miniroot/</userinput></screen>
</listitem><listitem><para><filename>wanboot</filename> program directory</para><screen>wanserver-1# <userinput>mkdir -p /opt/apache/htdocs/wanboot/</userinput></screen>
</listitem>
</itemizedlist>
</sect1><sect1 id="wanbootexamples-3fg"><title>Create the WAN Boot Miniroot</title><para>Use the <olink targetdoc="refman1m" targetptr="setup-install-server-1m" remap="external"><citerefentry><refentrytitle>setup_install_server</refentrytitle><manvolnum>1M</manvolnum></citerefentry></olink> with the <option>w</option> option to copy the WAN
boot miniroot and the Solaris software image to the <filename>/export/install/Solaris_11</filename> directory
of <literal>wanserver-1</literal>. </para><para>Insert the Solaris Software media in the media drive that is attached
to <literal>wanserver-1</literal>. Type the following commands.</para><screen width="100">wanserver-1# <userinput>mkdir -p /export/install/cdrom0</userinput>
wanserver-1# <userinput>cd /cdrom/cdrom0/s0/Solaris_11/Tools</userinput>
wanserver-1# <userinput>./setup_install_server -w /export/install/cdrom0/miniroot \</userinput>
<userinput>/export/install/cdrom0</userinput></screen><para>Move the WAN boot miniroot to the document root directory (<filename>/opt/apache/htdocs/</filename>) of the WAN boot server.</para><screen width="100">wanserver-1# <userinput>mv /export/install/cdrom0/miniroot/miniroot \</userinput>
<userinput>/opt/apache/htdocs/miniroot/miniroot.s10_sparc</userinput></screen><sect2 id="wanbootexamples-12plkjn"><title>Check the Client OBP for WAN Boot
Support</title><para>Determine that the client OBP supports WAN boot by typing the following
command on the client system.</para><screen># <userinput>eeprom | grep network-boot-arguments</userinput>
network-boot-arguments: data not available</screen><para>In the previous example, the <literal>network-boot-arguments: data not
available</literal> output indicates that the client OBP supports WAN boot.</para>
</sect2>
</sect1><sect1 id="wanbootexamples-17"><title>Install the <filename>wanboot</filename> Program
on the WAN Boot Server</title><para>To install the <filename>wanboot</filename> program on the WAN boot
server, copy the program from the Solaris Software media to the WAN boot
server's document root directory.</para><para>Insert the Solaris DVD or the Solaris Software - 1 CD in the media
drive that is attached to <literal>wanserver-1</literal> and type the following
commands.</para><screen>wanserver-1# <userinput>cd /cdrom/cdrom0/s0/Solaris_11/Tools/Boot/platform/sun4u/</userinput>
wanserver-1# <userinput>cp wanboot /opt/apache/htdocs/wanboot/wanboot.s10_sparc</userinput></screen>
</sect1><sect1 id="wanbootexamples-9vczv"><title>Create the <filename>/etc/netboot</filename> Hierarchy</title><para>Create the <literal>wanclient-1</literal> subdirectories of the <filename>/etc/netboot</filename> directory on the WAN boot server. The WAN boot installation programs
retrieve configuration and security information from this directory during
the installation.</para><para><literal>wanclient-1</literal> is located on the subnet 192.168.198.0,
and has a client ID of 010003BA152A42. To create the appropriate subdirectory
of <filename>/etc/netboot</filename> for <literal>wanclient-1</literal>, perform
the following tasks.</para><itemizedlist><listitem><para>Create the <filename>/etc/netboot</filename> directory.</para>
</listitem><listitem><para>Change the permissions of the <filename>/etc/netboot</filename> directory
to 700.</para>
</listitem><listitem><para>Change the ownership of the <filename>/etc/netboot</filename> directory
to the owner of the web server process.</para>
</listitem><listitem><para>Assume the same user role as the web server user.</para>
</listitem><listitem><para>Create a subdirectory of <filename>/etc/netboot</filename> that
is named after the subnet (192.168.198.0).</para>
</listitem><listitem><para>Create a subdirectory of the subnet directory that is named
after the client ID.</para>
</listitem><listitem><para>Change the permissions of the <filename>/etc/netboot</filename> subdirectories
to 700.</para>
</listitem>
</itemizedlist><screen>wanserver-1# <userinput>cd /</userinput>
wanserver-1# <userinput>mkdir /etc/netboot/</userinput>
wanserver-1# <userinput>chmod 700 /etc/netboot</userinput>
wanserver-1# <userinput>chown nobody:admin /etc/netboot</userinput>
wanserver-1# <userinput>exit</userinput>
wanserver-1# <userinput>su nobody</userinput>
Password:
nobody# <userinput>mkdir -p /etc/netboot/192.168.198.0/010003BA152A42</userinput>
nobody# <userinput>chmod 700 /etc/netboot/192.168.198.0</userinput>
nobody# <userinput>chmod 700 /etc/netboot/192.168.198.0/010003BA152A42</userinput></screen>
</sect1><sect1 id="wanbootexamples-10qwer"><title>Copy the <filename>wanboot-cgi</filename> Program
to the WAN Boot Server</title><para>On systems that are running the current Solaris release, the <filename>wanboot-cgi</filename> program is located in the <filename>/usr/lib/inet/wanboot/</filename> directory.
To enable the WAN boot server to transmit the installation data, copy the <filename>wanboot-cgi</filename> program to the <filename>cgi-bin</filename> directory
in the web server software directory.</para><screen>wanserver-1# <userinput>cp /usr/lib/inet/wanboot/wanboot-cgi \</userinput>
<userinput>/opt/apache/cgi-bin/wanboot-cgi</userinput>
wanserver-1# <userinput>chmod 755 /opt/apache/cgi-bin/wanboot-cgi</userinput></screen>
</sect1><sect1 id="wanbootexamples-7sdfg"><title>(Optional) Configure the WAN Boot
Server as a Logging Server</title><para>By default, all WAN boot logging messages are displayed on the client
system. This default behavior enables you to quickly debug any installation
issues.</para><para>If you want to view the boot and installation messages on the WAN boot
server, copy the <filename>bootlog-cgi</filename> script to the <filename>cgi-bin</filename> directory on <literal>wanserver-1</literal>.</para><screen>wanserver-1# <userinput>cp /usr/lib/inet/wanboot/bootlog-cgi /opt/apache/cgi-bin/</userinput>
wanserver-1# <userinput>chmod 755 /opt/apache/cgi-bin/bootlog-cgi</userinput></screen>
</sect1><sect1 id="wanbootexamples-5rte"><title>Configure the WAN Boot Server to Use
HTTPS</title><para>To use HTTPS in your WAN boot installation, you must enable SSL support
in the web server software. You must also install a digital certificate on
the WAN boot server. This example assumes that the Apache web server on <literal>wanserver-1</literal> is configured to use SSL. This example also assumes
that a digital certificate and a certificate authority that establish the
identity of <literal>wanserver-1</literal> are already installed on <literal>wanserver-1</literal>.</para><para>For examples about how to configure your web server software to use
SSL, see you web server documentation.</para>
</sect1><sect1 id="wanbootexamples-14"><title>Provide the Trusted Certificate to the
Client</title><para>By requiring the server to authenticate itself to the client, you protect
the data that is transmitted from the server to the client over HTTPS. To
enable server authentication, you provide a trusted certificate to the client.
The trusted certificate enables the client to verify the identity of the server
during the installation.</para><para>To provide the trusted certificate to the client, assume the same user
role as the web server user. Then, split the certificate to extract a trusted
certificate. Then, insert the trusted certificate in the client's <filename>truststore</filename> file in the <filename>/etc/netboot</filename> hierarchy.</para><para>In this example, you assume the web server user role of <literal>nobody</literal>.
Then, you split the server PKCS#12 certificate that is named <filename>cert.p12</filename>,
and insert the trusted certificate in <filename>/etc/netboot</filename> directory
for <literal>wanclient-1</literal>.</para><screen>wanserver-1# <userinput>su nobody</userinput>
Password:
wanserver-1# <userinput>wanbootutil p12split -i cert.p12 -t \</userinput>
<userinput>/etc/netboot/192.168.198.0/010003BA152A42/truststore</userinput></screen>
</sect1><sect1 id="wanbootexamples-88"><title>(Optional) Use Private Key and Certificate
for Client Authentication</title><para>To further protect your data during the installation, you might want
to require <literal>wanclient-1</literal> to authenticate itself to <literal>wanserver-1</literal>. To enable client authentication in your WAN boot installation,
insert a client certificate and private key in the client subdirectory of
the <filename>/etc/netboot</filename> hierarchy.</para><para>To provide a private key and certificate to the client, perform the
following tasks.</para><itemizedlist><listitem><para>Assume the same user role as the web server user</para>
</listitem><listitem><para>Split the PKCS#12 file into a private key and a client certificate</para>
</listitem><listitem><para>Insert the certificate in the client's <filename>certstore</filename> file</para>
</listitem><listitem><para>Insert the private key in the client's <filename>keystore</filename> file</para>
</listitem>
</itemizedlist><para>In this example, you assume the web server user role of <literal>nobody</literal>.
Then, you split the server PKCS#12 certificate that is named <filename>cert.p12</filename>.
You insert certificate in the <filename>/etc/netboot</filename> hierarchy
for <literal>wanclient-1</literal>. You then insert the private key that you
named <filename>wanclient.key</filename> in the client's <filename>keystore</filename> file.</para><screen>wanserver-1# <userinput>su nobody</userinput>
Password:
wanserver-1<userinput># wanbootutil p12split -i cert.p12 -c \</userinput>
<userinput>/etc/netboot/192.168.198.0/010003BA152A42/certstore -k wanclient.key</userinput>
wanserver-1# <userinput>wanbootutil keymgmt -i -k wanclient.key \</userinput>
<userinput>-s  /etc/netboot/192.168.198.0/010003BA152A42/keystore \</userinput>
<userinput>-o type=rsa</userinput></screen>
</sect1><sect1 id="wanbootexamples-15"><title>Create the Keys for the Server and the
Client</title><para>To protect the data transmitted between the server and client, you create
a hashing key and an encryption key. The server uses the hashing key to protect
the integrity of the <filename>wanboot</filename> program. The server uses
the encryption key to encrypt the configuration and installation data. The
client uses the hashing key to check the integrity of the downloaded <filename>wanboot</filename> program. The client uses the encryption key to decrypt the data
during the installation.</para><para>First, you assume the same user role as the web server user. In this
example, the web server user role is <literal>nobody</literal>.</para><screen>wanserver-1# <userinput>su nobody</userinput>
Password:</screen><para>Then, you use the <command>wanbootutil keygen</command> command to create
a master HMAC SHA1 key for <literal>wanserver-1</literal>.</para><screen>wanserver-1# <userinput>wanbootutil keygen -m</userinput></screen><para>Then, create a hashing key and an encryption key for <literal>wanclient-1</literal>.</para><screen width="100">wanserver-1# <userinput>wanbootutil keygen -c -o net=192.168.198.0,cid=010003BA152A42,type=sha1</userinput>
wanserver-1# <userinput>wanbootutil keygen -c -o net=192.168.198.0,cid=010003BA152A42,type=3des</userinput></screen><para>The previous command creates a HMAC SHA1 hashing key and a 3DES encryption
key for <literal>wanclient-1</literal>. 192.168.198.0 specifies the subnet
of <literal>wanclient-1</literal>, and 010003BA152A42 specifies the client
ID of <literal>wanclient-1</literal>.</para>
</sect1><sect1 id="wanbootexamples-3ll"><title>Create the Solaris Flash Archive</title><para>In this example, you create your Solaris Flash archive by cloning the <literal>wanserver-1</literal> master system. The archive is named <literal>sol_10_sparc</literal>,
and is copied exactly from the master system. The archive is an exact duplicate
of the master system. The archive is stored in <filename>sol_10_sparc.flar</filename>.
You save the archive in the <filename>flash/archives</filename> subdirectory
of the document root directory on the WAN boot server.</para><screen>wanserver-1# <userinput>flarcreate -n sol_10_sparc \
/opt/apache/htdocs/flash/archives/sol_10_sparc.flar</userinput></screen>
</sect1><sect1 id="wanbootexamples-9llasdf"><title>Create the <filename>sysidcfg</filename> File</title><para>To preconfigure the <literal>wanclient-1</literal> system, specify keywords
and values in the <filename>sysidcfg</filename> file. Save this file in the
appropriate subdirectory of the document root directory of <literal>wanserver-1</literal>.</para><example id="wanbootexamples-ex-6llasf"><title><filename>sysidcfg</filename> File
for <literal>client-1</literal> System</title><para>The following is an example of a <filename>sysidcfg</filename> file
for <literal>wanclient-1</literal>. The host name, IP address, and netmask
of these systems have been preconfigured by editing the naming service. This
file is located in the <filename>/opt/apache/htdocs/flash/</filename> directory.</para><programlisting>network_interface=primary {hostname=wanclient-1
                           default_route=192.168.198.1
                           ip_address=192.168.198.210
                           netmask=255.255.255.0
                           protocol_ipv6=no}
timezone=US/Central
system_locale=C
terminal=xterm
timeserver=localhost
name_service=NIS {name_server=matter(192.168.254.254)
                  domain_name=leti.example.com
                  }
security_policy=none</programlisting>
</example>
</sect1><sect1 id="wanbootexamples-8llfda"><title>Create the Client's Profile</title><para>For the <literal>wanclient-1</literal> system, create a profile that
is named <filename>wanclient_1_prof</filename>. The <filename>wanclient_1_prof</filename> file
contains the following entries, which define the current Solaris release software to be
installed on the <literal>wanclient-1</literal> system.</para><programlisting width="100"># profile keywords         profile values
# ----------------         -------------------
install_type               flash_install
archive_location           https://192.168.198.2/flash/archives/cdrom0.flar
partitioning               explicit
filesys                    c0t1d0s0 4000 /
filesys                    c0t1d0s1 512 swap
filesys                    c0t1d0s7 free /export/home</programlisting><para>The following list describes some of the keywords and values from this
example.</para><variablelist><varlistentry><term><literal>install_type</literal></term><listitem><para>The profile installs a Solaris Flash archive on the clone
system. All files are overwritten as in an initial installation.</para>
</listitem>
</varlistentry><varlistentry><term><literal>archive_location</literal></term><listitem><para>The compressed Solaris Flash archive is retrieved from <literal>wanserver-1</literal>.</para>
</listitem>
</varlistentry><varlistentry><term><literal>partitioning</literal></term><listitem><para>The file system slices are determined by the <literal>filesys</literal> keywords,
value <filename>explicit</filename>. The size of root (<filename>/</filename>)
is based on the size of the Solaris Flash archive. The size of <filename>swap</filename> is
set to the necessary size and is installed on <literal>c0t1d0s1</literal>. <filename>/export/home</filename> is based on the remaining disk space. <filename>/export/home</filename> is installed on <literal>c0t1d0s7</literal>.</para>
</listitem>
</varlistentry>
</variablelist>
</sect1><sect1 id="wanbootexamples-7llasfd"><title>Create and Validate the <filename>rules</filename> File</title><para>The custom JumpStart programs use the <filename>rules</filename> file
to select the correct installation profile for the <literal>wanclient-1</literal> system.
Create a text file that is named <filename>rules</filename>. Then, add keywords
and values to this file.</para><para>The IP address of the <literal>wanclient-1</literal> system is 192.168.198.210,
and the netmask is 255.255.255.0. Use the <literal>network</literal> rule
keyword to specify the profile that the custom JumpStart programs should use
to install <literal>wanclient-1</literal>.</para><screen>network 192.168.198.0 - wanclient_1_prof - </screen><para>This <filename>rules</filename> file instructs the custom JumpStart
programs to use the <filename>wanclient_1_prof</filename> to install the current Solaris release software
on <literal>wanclient-1</literal>.</para><para>Name this rule file <filename>wanclient_rule</filename>.</para><para>After you create the profile and the <filename>rules</filename> file,
you run the <filename>check</filename> script to verify that the files are
valid.</para><screen>wanserver-1# <userinput>./check -r wanclient_rule</userinput></screen><para>If the <command>check</command> script does not find any errors, the
script creates the <filename>rules.ok</filename> file. </para><para>Save the <filename>rules.ok</filename> file in the <filename>/opt/apache/htdocs/flash/</filename> directory.</para>
</sect1><sect1 id="wanbootexamples-11hjkp"><title>Create the System Configuration
File</title><para>Create a system configuration file that lists the locations of the <filename>sysidcfg</filename> file and the custom JumpStart files on the install server.
Save this file in a directory that is accessible to the WAN boot server.</para><para>In the following example, the <filename>wanboot-cgi</filename> program
looks for the <filename>sysidcfg</filename> and custom JumpStart files in
the document root directory of the WAN boot server. The domain name of the
WAN boot server is <literal>https://www.example.com</literal>. The WAN boot
server is configured to use secure HTTP, so the data and files are protected
during the installation.</para><para>In this example, the system configuration file is named <filename>sys-conf.s10&ndash;sparc</filename>, and the file is saved in the <filename>/etc/netboot</filename> hierarchy
on the WAN boot server. The <filename>sysidcfg</filename> and custom JumpStart
files are located in the <filename>flash</filename> subdirectory of the document
root directory.</para><programlisting>SsysidCF=https://www.example.com/flash/
SjumpsCF=https://www.example.com/flash/</programlisting>
</sect1><sect1 id="wanbootexamples-6vfwdfg"><title>Create the <filename>wanboot.conf</filename> File</title><para>WAN boot uses the configuration information that is included in the <filename>wanboot.conf</filename> file to install the client machine. Create the <filename>wanboot.conf</filename> file in a text editor. Save the file to the appropriate
client subdirectory in the <filename>/etc/netboot</filename> hierarchy on
the WAN boot server.</para><para>The following <filename>wanboot.conf</filename> file for <literal>wanclient-1</literal> includes configuration information for a WAN installation that
uses secure HTTP. This file also instructs WAN boot to use a HMAC SHA1 hashing
key and a 3DES encryption key to protect data.</para><programlisting>boot_file=/wanboot/wanboot.s10_sparc
root_server=https://www.example.com/cgi-bin/wanboot-cgi
root_file=/miniroot/miniroot.s10_sparc
signature_type=sha1
encryption_type=3des
server_authentication=yes
client_authentication=no
resolve_hosts=
boot_logger=
system_conf=sys-conf.s10&ndash;sparc</programlisting><para>This <filename>wanboot.conf</filename> file specifies the following
configuration.</para><variablelist><varlistentry><term><literal>boot_file=/wanboot/wanboot.s10_sparc</literal></term><listitem><para>The <filename>wanboot</filename> program is named <filename>wanboot.s10_sparc</filename>. This program is located in the <filename>wanboot</filename> directory
in the document root directory on <literal>wanserver-1</literal>.</para>
</listitem>
</varlistentry><varlistentry><term><literal>root_server=https://www.example.com/cgi-bin/wanboot-cgi</literal></term><listitem><para>The location of the <filename>wanboot-cgi</filename> program
on <literal>wanserver-1</literal> is <literal>https://www.example.com/cgi-bin/wanboot-cgi</literal>. The <filename>https</filename> portion of the URL indicates that
this WAN boot installation uses secure HTTP.</para>
</listitem>
</varlistentry><varlistentry><term><literal>root_file=/miniroot/miniroot.s10_sparc</literal></term><listitem><para>The WAN boot miniroot is named <filename>miniroot.s10_sparc</filename>.
The miniroot is located in the <filename>miniroot</filename> directory in
the  document root directory on <literal>wanserver-1</literal>.</para>
</listitem>
</varlistentry><varlistentry><term><literal>signature_type=sha1</literal></term><listitem><para>The <filename>wanboot</filename> program and the WAN boot
file system are signed by using a HMAC SHA1 hashing key.</para>
</listitem>
</varlistentry><varlistentry><term><literal>encryption_type=3des</literal></term><listitem><para>The <filename>wanboot</filename> program and the WAN boot
file system are encrypted with a 3DES key.</para>
</listitem>
</varlistentry><varlistentry><term><literal>server_authentication=yes</literal></term><listitem><para>The server is authenticated during the installation.</para>
</listitem>
</varlistentry><varlistentry><term><literal>client_authentication=no</literal></term><listitem><para>The client is not authenticated during the installation.</para><note><para>If you performed the tasks in <olink targetptr="wanbootexamples-88" remap="internal">(Optional)
Use Private Key and Certificate for Client Authentication</olink>, set this
parameter as <literal>client_authentication=yes</literal></para>
</note>
</listitem>
</varlistentry><varlistentry><term><literal>resolve_hosts=</literal></term><listitem><para>No additional host names are needed to perform the WAN installation.
All the host names that are required by the <filename>wanboot-cgi</filename> program
are specified in the <filename>wanboot.conf</filename> file and the client
certificate.</para>
</listitem>
</varlistentry><varlistentry><term><literal>boot_logger=</literal></term><listitem><para>Booting and installation log messages are displayed on the
system console. If you configured the logging server in <olink targetptr="wanbootexamples-7sdfg" remap="internal">(Optional) Configure the WAN Boot Server
as a Logging Server</olink>, and you want WAN boot messages to appear on the
WAN boot server as well, set this parameter to <literal>boot_logger=https://www.example.com/cgi-bin/bootlog-cgi</literal>.</para>
</listitem>
</varlistentry><varlistentry><term><literal>system_conf=sys-conf.s10&ndash;sparc</literal></term><listitem><para>The system configuration file that specifies the locations
of the <filename>sysidcfg</filename> and JumpStart files is located in the <filename>sys-conf.s10&ndash;sparc</filename> file in the <filename>/etc/netboot</filename> hierarchy
on <literal>wanserver-1</literal>.</para>
</listitem>
</varlistentry>
</variablelist><para>In this example, you save the <filename>wanboot.conf</filename> file
in the <filename>/etc/netboot/192.168.198.0/010003BA152A42</filename> directory
on <literal>wanserver-1</literal>.</para>
</sect1><sect1 id="wanbootexamples-18net"><title>Check the <literal>net</literal> Device
Alias in OBP</title><para>To boot the client from the WAN with the <command>boot net</command>,
the <literal>net</literal> device alias must be set to the client's primary
network device. At the client <literal>ok</literal> prompt, type the <command>devalias</command> command to verify that the <literal>net</literal> alias is set
to the primary network device <filename>/pci@1f,0/pci@1,1/network@c,1</filename>.</para><screen>ok <userinput>devalias</userinput>
screen                   /pci@1f,0/pci@1,1/SUNW,m64B@2
net                      /pci@1f,0/pci@1,1/network@c,1
net2                     /pci@1f,0/pci@1,1/network@5,1
disk                     /pci@1f,0/pci@1/scsi@8/disk@0,0
cdrom                    /pci@1f,0/pci@1,1/ide@d/cdrom@0,0:f
keyboard                 /pci@1f,0/pci@1,1/ebus@1/su@14,3083f8
mouse                    /pci@1f,0/pci@1,1/ebus@1/su@14,3062f8</screen><para>In the previous output example, the primary network device <filename>/pci@1f,0/pci@1,1/network@c,1</filename> is assigned to the <literal>net</literal> alias. You do not need
to reset the alias.</para>
</sect1><sect1 id="wanbootexamples-8poiuy"><title>Install Keys on the Client</title><para>In <olink targetptr="wanbootexamples-15" remap="internal">Create the Keys for the Server
and the Client</olink>, you created the hashing key and encryption key to
protect your data during the installation. To enable the client to decrypt
the data transmitted from <literal>wanserver-1</literal> during the installation,
install these keys on <literal>wanclient-1</literal>.</para><para>On <literal>wanserver-1</literal>, display the key values.</para><screen width="100">wanserver-1# <userinput>wanbootutil keygen -d -c -o net=192.168.198.0,cid=010003BA152A42,type=sha</userinput>1
b482aaab82cb8d5631e16d51478c90079cc1d463
wanserver-1# <userinput>wanbootutil keygen -d -c -o net=192.168.198.0,cid=010003BA152A42,type=3des</userinput>
9ebc7a57f240e97c9b9401e9d3ae9b292943d3c143d07f04</screen><para>The previous example uses the following information.</para><variablelist><varlistentry><term><literal>net=192.168.198.0</literal></term><listitem><para>Specifies the IP address of the client's subnet</para>
</listitem>
</varlistentry><varlistentry><term><literal>cid=010003BA152A42</literal></term><listitem><para>Specifies the client's ID</para>
</listitem>
</varlistentry><varlistentry><term><literal>b482aaab82cb8d5631e16d51478c90079cc1d463</literal></term><listitem><para>Specifies the value of the client's HMAC SHA1 hashing key</para>
</listitem>
</varlistentry><varlistentry><term><literal>9ebc7a57f240e97c9b9401e9d3ae9b292943d3c143d07f04</literal></term><listitem><para>Specifies the value of the client's 3DES encryption key</para><para>If you use an AES encryption key in your installation, change <literal>type=3des</literal> to <literal>type=aes</literal> to display the encryption key value.</para>
</listitem>
</varlistentry>
</variablelist><para>At the <literal>ok</literal> prompt on <literal>wanclient-1</literal>,
install the keys.</para><screen width="100">ok <userinput>set-security-key wanboot-hmac-sha1  b482aaab82cb8d5631e16d51478c90079cc1d463</userinput>
ok <userinput>set-security-key wanboot-3des  9ebc7a57f240e97c9b9401e9d3ae9b292943d3c143d07f04</userinput></screen><para>The previous commands perform the following tasks.</para><itemizedlist><listitem><para>Installs the HMAC SHA1 hashing key with a value of <literal>b482aaab82cb8d5631e16d51478c90079cc1d463</literal> on <literal>wanclient-1</literal></para>
</listitem><listitem><para>Installs the 3DES encryption key with a value of <literal>9ebc7a57f240e97c9b9401e9d3ae9b292943d3c143d07f04</literal> on <literal>wanclient-1</literal></para>
</listitem>
</itemizedlist>
</sect1><sect1 id="wanbootexamples-13lkjh"><title>Install the Client</title><para>You can perform an unattended installation by setting network boot argument
variables for <literal>wanclient-1</literal> at the <literal>ok</literal> prompt,
and then booting the client.</para><screen width="100">ok <userinput>setenv network-boot-arguments host-ip=192.168.198.210,</userinput>
<userinput>router-ip=192.168.198.1,subnet-mask=255.255.255.0,hostname=wanclient-1,</userinput>
<userinput>file=http://192.168.198.2/cgi-bin/wanboot-cgi</userinput>
ok <userinput>boot net - install</userinput>
Resetting ...




Sun Blade 100 (UltraSPARC-IIe), No Keyboard
Copyright 1998-2003 Sun Microsystems, Inc.  All rights reserved.
OpenBoot 4.x.build_28, 512 MB memory installed, Serial #50335475.
Ethernet address 0:3:ba:e:f3:75, Host ID: 83000ef3.



Rebooting with command: boot net - install
Boot device: /pci@1f,0/network@c,1  File and args: - install



&lt;time unavailable> wanboot progress: wanbootfs: Read 68 of 68 kB (100%) 
&lt;time unavailable> wanboot info: wanbootfs: Download complete
Fri Jun 20 09:16:06 wanboot progress: miniroot: Read 166067 of 166067 kB (100%)
Fri Jun 20Tue Apr 15 09:16:06 wanboot info: miniroot: Download complete
SunOS Release 5.10 Version WANboot10:04/11/03 64-bit
Copyright 1983-2003 Sun Microsystems, Inc.  All rights reserved.
Use is subject to license terms.
Configuring devices.</screen><para>The following variables are set.</para><itemizedlist><listitem><para>The client IP address is set to 192.168.198.210.</para>
</listitem><listitem><para>The client's router IP address is set to 192.168.198.1</para>
</listitem><listitem><para>The client's subnet mask is set to 255.255.255.0</para>
</listitem><listitem><para>The client's host name is set to <literal>wanclient-1</literal></para>
</listitem><listitem><para>The <filename>wanboot-cgi</filename> program is located at <literal>http://192.168.198.2/cgi-bin/wanboot-cgi</literal></para>
</listitem>
</itemizedlist><para>The client installs over the WAN. If the <filename>wanboot</filename> program
does not find all the necessary installation information, you might be prompted
to provide the missing information at the command line.</para>
</sect1>
</chapter>