Changes between Version 10 and Version 11 of Internal/Soekris
- Timestamp:
- Sep 20, 2006, 9:16:38 PM (18 years ago)
Legend:
- Unmodified
- Added
- Removed
- Modified
-
Internal/Soekris
v10 v11 9 9 On the other hand, all five ethernet (NatSemi) devices are fully supported pretty much everywhere. 10 10 11 You will want a paperclip. You're going to be hitting that reset switch a lot.11 You will want a paperclip. You're going to be poking that reset switch a lot. 12 12 13 13 == connect a console == 14 14 15 Get a linux laptop with a serial port. Connect the Soekris serial port to it using a crossover serial cable. There are a billionof these, unused, floating around ORBIT. They have "X OVER" written on them.15 Get a linux laptop with a serial port. Connect the Soekris serial port to it using a crossover serial cable. There are a lot of these, unused, floating around ORBIT. They have "X OVER" written on them. 16 16 17 17 Run minicom in a terminal window that can handle vt102 (any of them can). Minicom should be set for 9600 baud, 8 databits, no parity, 1 stop bit, no flow control. Turn hardware flow control off in minicom. The UNIX device for talking to the console is almost certainly /dev/ttyS0. … … 21 21 == configure the Soekris net4801 BIOS == 22 22 23 Look at the banner from when the net4801 boots. Get the BIOS version and check it against the Soekris web site. 23 Look at the banner from when the net4801 boots. Get the BIOS version and check it against the Soekris web site. Make sure you have the latest. 24 24 25 25 Hit C-p as it is booting to get to a BIOS prompt. … … 27 27 Issue these commands at the BIOS prompt, filling in today's date and the current time. 28 28 29 {{{ 29 30 date YYYY/MM/DD 30 31 31 time HH:MM:SS 32 33 32 set ConSpeed=9600 33 }}} 34 34 35 35 The only reliable way to obtain the MAC address of 'Eth 0', without having an operating system already loaded, is to watch the diagnostic output of 36 36 37 {{{ 37 38 boot f0 39 }}} 38 40 39 41 == net install == 40 42 41 The netboot image for debian is already around. You need43 The netboot image for debian is already around. You might need 42 44 43 wgethttp://centerclick.org/net4801/pxelinux/pxelinux.0.gz45 http://centerclick.org/net4801/pxelinux/pxelinux.0.gz 44 46 45 as opposed to the pxelinux.bin that's already around. You need to make a link in pxelinux.cfg to an appropriate pxelinux configuration file, namely the one for serial. To the end of the 'install' image you want to add:47 as opposed to the pxelinux.bin that's already around. The pxelinux.0 that comes with the net-install.tar.gz from debian works, but does not print banners to minicom properly. You need to make a link in pxelinux.cfg to an appropriate pxelinux configuration file, namely the one for serial. To the end of the 'install' image you want to add: 46 48 49 {{{ 47 50 DEBIAN_FRONTEND=text 51 }}} 48 52 49 53 (we did this, so it's probably already there.) … … 69 73 Get the tarball, untar it on your linux laptop as root like this: 70 74 75 {{{ 71 76 sudo tar --numeric-owner -zxvf voyage-0.2pre4.tar.gz 77 }}} 72 78 73 79 Attach the CF card. If it gets automounted, unmount it. Cd into the untarred directory and run voyage.update as root. The CF card is likely to be /dev/sdb. On an Ubuntu box you can use /media/usbdisk as the mount point. When this finishes, move the CF card into the Soekris net4801, and reboot it. … … 77 83 Log in as root. The default root password is, predictably, 'voyage'. Voyage linux tries to be cute by mounting everything read only, so you need to remount the root partition as read write, like this: 78 84 85 {{{ 79 86 mount -o remount,rw / 87 }}} 80 88 81 89 Now you can and should change the root password. … … 87 95 Run 88 96 97 {{{ 89 98 apt-get update 90 91 99 apt-get upgrade 100 }}} 92 101 93 102 as usual. … … 99 108 http://tldp.org/HOWTO/ppp-ssh 100 109 110 The idea is: 101 111 112 1. Create a vpn account on the landing. 113 2. Allow the vpn account on the landing to run pppd as root, by configuring /etc/sudoers with lines like these 114 {{{ 115 Cmnd_Alias VPN=/usr/bin/pppd 116 vpn: ALL=NOPASSWD: VPN 117 }}} 118 3. Allow the vpn client to log in to the vpn account on the landing using an ssh key with no password. 119 4. Run a script like the following on the landing. 120 {{{ 121 #!/bin/bash 122 case "$1" in 123 start) 124 /usr/sbin/pppd updetach noauth passive pty "ssh vpn@${LANDING} -o Batchmode=yes sudo /usr/sbin/pppd nodetach notty noauth" ipparam vpn ${LANDING_IP}:${CLIENT_IP} 125 ;; 126 stop) 127 killall -9 pppd 128 ;; 129 *) 130 echo please stop or start 131 exit 1 132 ;; 133 esac 134 exit 0 135 }}} 136 5. Change iptables so that the traffic incoming