Dell Networking OS10: How to Run Certificate Update Directly from the OS10 Switch
摘要: How to run the OS10 certificate update script directly from the switch.
本文章適用於
本文章不適用於
本文無關於任何特定產品。
本文未識別所有產品版本。
說明
Table of Contents
- Requirements To Be Met
- Steps to Run Script from OS10 Switch
- Command Summary
- APT Removal and Cleanup
- Items to Take Note
Requirements To Be Met
- Must have Internet access
- Must have a working DNS configured (IP name-server)
- Requires .zip or the extracted files transferred to one switch on local flash
- Switch Sysadmin role user
- Must not have "system-cli disable" configured
Steps to Run Script from OS10 Switch
-
Configure the name-server
OS10(config)# ip name-server <dnsserverip>
-
Confirm can ping DNS name
OS10# ping debian.org PING debian.org (130.89.148.77) 56(84) bytes of data. 64 bytes from klecker-misc.debian.org (130.89.148.77): icmp_seq=1 ttl=45 time=123 ms 64 bytes from klecker-misc.debian.org (130.89.148.77): icmp_seq=2 ttl=45 time=123 ms ^C --- debian.org ping statistics --- 2 packets transmitted, 2 received, 0% packet loss, time 1000ms
-
Copy file to local flash
OS10# copy scp://root@<fileserverip>/cert_upgrade_script-3.zip home://cert_upgrade_script-3.zip password: OS10# dir home Directory contents for folder: home Date (modified) Size (bytes) Name --------------------- ------------ ------------------------------------------ 2021-05-18T00:28:45Z 8426 cert_upgrade_script-3.zip
-
Move to a shell prompt. Install "unzip" and then install "except" (if the file is not extracted).
leaf-2# system "sudo -i” We trust you have received the usual lecture from the local System Administrator. It usually boils down to these three things: #1) Respect the privacy of others. #2) Think before you type. #3) With great power comes great responsibility. [sudo] password for admin: root@leaf-2:~# cd /home/admin/ root@OS10:/home/admin# apt-get update Get:1 http://security.debian.org stretch/updates InRelease [53.0 kB] <<snippet>> Fetched 13.6 MB in 5s (2562 kB/s) Reading package lists... Done root@OS10:/home/admin# apt-get install unzip Reading package lists... Done Building dependency tree Reading state information... Done The following packages were automatically installed and are no longer required: libevent-2.0-5 libfile-copy-recursive-perl openbsd-inetd update-inetd Use 'apt autoremove' to remove them. Suggested packages: zip The following NEW packages will be installed: unzip 0 upgraded, 1 newly installed, 0 to remove and 78 not upgraded. Need to get 172 kB of archives. After this operation, 559 kB of additional disk space will be used. Get:1 http://httpredir.debian.org/debian stretch/main amd64 unzip amd64 6.0-21+deb9u2 [172 kB] Fetched 172 kB in 0s (354 kB/s) Selecting previously unselected package unzip. (Reading database ... 30678 files and directories currently installed.) Preparing to unpack .../unzip_6.0-21+deb9u2_amd64.deb ... Unpacking unzip (6.0-21+deb9u2) ... Processing triggers for mime-support (3.60) ... Setting up unzip (6.0-21+deb9u2) ... root@OS10:/home/admin # apt-get install expect <<snippet>> Need to get 24.6 MB of archives. After this operation, 186 MB of additional disk space will be used. Do you want to continue? [Y/n] y <<snippet>
-
Extract and chmod to change the file to executable
root@OS10:/home/admin# unzip cert_upgrade_script-3.zip Archive: cert_upgrade_script-3.zip inflating: cert_upgrade_script/cert.py inflating: cert_upgrade_script/cert.sh inflating: cert_upgrade_script/hosts.txt inflating: cert_upgrade_script/newdelldefault.crt inflating: cert_upgrade_script/README.md root@OS10:/home/admin# cd cert_upgrade_script root@OS10:/home/admin/cert_upgrade_script# ls -l total 31 -rw-r--r-- 1 root root 5019 Mar 25 14:52 README.md -rw-r--r-- 1 root root 9464 Apr 12 15:02 cert.py -rw-r--r-- 1 root root 11793 Apr 12 15:02 cert.sh -rw-r--r-- 1 root root 128 Feb 26 17:17 hosts.txt -rw-r--r-- 1 root root 2049 Mar 2 18:06 newdelldefault.crt root@OS10:/home/admin/cert_upgrade_script# chmod +x cert.sh
-
Run file to each switch IP or with a host file per readme.
root@OS10:/home/admin/cert_upgrade_script# ./cert.sh -u admin -p admin -h 192.168.122.243 -c 192.168.122.243 Vulnerable root@OS10:/home/admin/cert_upgrade_script# ./cert.sh -u admin -p admin -h 192.168.122.243 192.168.122.243 Success root@OS10:/home/admin/cert_upgrade_script# ./cert.sh -u admin -p admin -h 192.168.122.243 -c 192.168.122.243 Not Vulnerable
-
After running the script, check the LKB article (Dell Networking OS10 Certificate Expiration and Solution) for the next steps.
ALERT: Flap the VLTi or reload switch based on KB steps for the cert to take effect.
Command Summary
| Configuration | Explanation |
|---|---|
OS10(config)# ip name-server <dnsserverip> |
Configure DNS for APT to get needed files |
OS10# ping debian.org |
Ensure Debian.org is reachable |
OS10# copy scp://root@<fileserverip>/cert_upgrade_script-3.zip home://cert_upgrade_script-3.zip |
Copy script file to switch |
leaf-2# system "sudo -i” |
Enter system bash as root |
root@leaf-2:~# cd /home/admin/ |
Change to the user home directory where we downloaded the file |
root@OS10:/home/admin# apt-get update |
Update current apt app table |
root@OS10:/home/admin# apt-get install unzip |
Install unzip |
root@OS10:/home/admin # apt-get install expect |
Install expect |
root@OS10:/home/admin# unzip cert_upgrade_script-3.zip |
Extract cert update file |
root@OS10:/home/admin# cd cert_upgrade_script |
Move into the script file |
root@OS10:/home/admin/cert_upgrade_script# ls -l |
Check file permissions |
root@OS10:/home/admin/cert_upgrade_script# chmod +x cert.sh |
Change cert.sh to executable |
root@OS10:/home/admin/cert_upgrade_script# ./cert.sh -u admin -p admin -h 192.168.122.243 -c |
Check if the switch is vulnerable |
root@OS10:/home/admin/cert_upgrade_script# ./cert.sh -u admin -p admin -h 192.168.122.243 |
Apply fix to switch by IP |
root@OS10:/home/admin/cert_upgrade_script# ./cert.sh -u admin -p admin -h 192.168.122.243 -c |
Confirm not vulnerable after upgrade attempt. |
Apt Removal and Cleanup
| Configuration | Explanation |
|---|---|
root@OS10:/home/admin/cert_upgrade_script#apt-get remove unzip |
Remove unzip from the switch |
root@OS10:/home/admin/cert_upgrade_script#apt-get remove expect |
Remove expect from the switch |
Items to Take Note
- The script does version checks if running lower than 10.4.3.x
- If running lower than this version creates the message "running a version less than 10.4.3.x, upgrade to a newer version"
- The script does a version check for greater than 10.5.1.0. (in script version v4)
- The system not vulnerable if other switches in the cluster are also running 10.5.1.0 or later
- Newer firmware may have affected cert however it is not in use as such can be ignored or upgraded without concern
- Ensure to use ' (single quotes) if special characters are in the username or password on Linux.
- If existing Linux OS, ensure expect version is 5.45 or greater
受影響的產品
PowerSwitch S3048-ON, PowerSwitch S4048-ON, Dell EMC Networking MX5108n, Dell EMC Networking MX9116n, Dell EMC Networking N3200-ON, PowerSwitch S4048T-ON, PowerSwitch S4148U-ON, PowerSwitch S5148F-ON, PowerSwitch S5212F-ON, PowerSwitch S5224F-ON產品
PowerSwitch S4112F-ON/S4112T-ON, PowerSwitch S4128F-ON/S4128T-ON, PowerSwitch S4148F-ON/S4148T-ON/S4148FE-ON, PowerSwitch S4248FB-ON /S4248FBL-ON, PowerSwitch S5232F-ON, PowerSwitch S5248F-ON, PowerSwitch S5296F-ON, PowerSwitch S6010-ON
, PowerSwitch S6100-ON, PowerSwitch Z9100-ON, PowerSwitch Z9264F-ON, PowerSwitch Z9332F-ON, PowerSwitch Z9432F-ON
...
文章屬性
文章編號: 000188436
文章類型: How To
上次修改時間: 23 7月 2025
版本: 7
向其他 Dell 使用者尋求您問題的答案
支援服務
檢查您的裝置是否在支援服務的涵蓋範圍內。